Skip to content

Commit

Permalink
Publish Advisories
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] committed Dec 27, 2024
1 parent b310558 commit a0e0a0a
Show file tree
Hide file tree
Showing 3 changed files with 143 additions and 40 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,66 @@
{
"schema_version": "1.4.0",
"id": "GHSA-j5vv-6wjg-cfr8",
"modified": "2024-12-27T18:02:02Z",
"published": "2024-12-27T18:02:02Z",
"aliases": [
"CVE-2024-56509"
],
"summary": "changedetection.io Vulnerable to Improper Input Validation Leading to LFR/Path Traversal",
"details": "### Summary\nImproper input validation in the application can allow attackers to perform local file read (LFR) or path traversal attacks. These vulnerabilities occur when user input is used to construct file paths without adequate sanitization or validation. For example, using `file:../../../etc/passwd` or `file: ///etc/passwd` can bypass weak validations and allow unauthorized access to sensitive files. Even though this has been addressed in previous patch, it is still insufficient.\n\n### Details\nThe check in this line of code is insufficient.\n```\nif re.search(r'^file:/', url.strip(), re.IGNORECASE):\n```\nThe attacker can still bypass this by using:\n-`file:../../../../etc/passwd`\n-`file: ///etc/passwd` (with space before /)\n\n### PoC\n- Open up a changedetection.io instance with a webdriver configured.\n- Create a new watch with `file:../../../../etc/passwd`.\n- Check the watch preview.\n- The contents of `/etc/passwd` should pop out.\n\n### Screenshots\n![image](https://github.com/user-attachments/assets/55c34f2e-cafb-4a7a-a7ef-ec222e3f519b)\n![image](https://github.com/user-attachments/assets/d41189f5-7bf2-48b5-9ce3-c26f79cefeda)",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
}
],
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "changedetection.io"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.48.05"
}
]
}
]
}
],
"references": [
{
"type": "WEB",
"url": "https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-j5vv-6wjg-cfr8"
},
{
"type": "WEB",
"url": "https://github.com/dgtlmoon/changedetection.io/commit/4419bc0e61d0b03c588bd573a3602bbcfd953671"
},
{
"type": "WEB",
"url": "https://github.com/dgtlmoon/changedetection.io/commit/f7e9846c9b40a229813d19cdb66bf60fbe5e6a2a"
},
{
"type": "PACKAGE",
"url": "https://github.com/dgtlmoon/changedetection.io"
}
],
"database_specific": {
"cwe_ids": [
"CWE-200",
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-12-27T18:02:02Z",
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
{
"schema_version": "1.4.0",
"id": "GHSA-pq9p-pc3p-9hm4",
"modified": "2024-12-27T18:02:42Z",
"published": "2024-12-27T03:31:23Z",
"aliases": [
"CVE-2024-9774"
],
"summary": "python-sql SQL injection vulnerability",
"details": "A vulnerability was found in python-sql where unary operators do not escape non-Expression (like `And` and `Or`) which makes any system exposing those vulnerable to an SQL injection attack.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
}
],
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "python-sql"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.5.2"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9774"
},
{
"type": "WEB",
"url": "https://bugs.tryton.org/python-sql/93"
},
{
"type": "WEB",
"url": "https://discuss.tryton.org/t/security-release-for-issue-93/7889"
},
{
"type": "WEB",
"url": "https://discuss.tryton.org/t/security-release-for-issue-93/7889/3"
},
{
"type": "WEB",
"url": "https://foss.heptapod.net/tryton/python-sql/-/commit/f20551bbb8b3b4c4dd0a2c3d36f377bff6f2f349"
},
{
"type": "PACKAGE",
"url": "https://github.com/tryton/python-sql"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00023.html"
}
],
"database_specific": {
"cwe_ids": [
"CWE-150"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2024-12-27T18:02:41Z",
"nvd_published_at": "2024-12-27T02:15:07Z"
}
}

This file was deleted.

0 comments on commit a0e0a0a

Please sign in to comment.