VARIoT IoT vulnerabilities database
| VAR-202102-0065 | CVE-2020-11920 | Svakom Siime Eye In OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. A command injection vulnerability resides in the HOST/IP section of the NFS settings menu in the webserver running on the device. By injecting Bash commands via shell metacharacters here, the device executes arbitrary code with root privileges (all of the device's services are running as root). Svakom Siime Eye Has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state.
------------------------------------------
[Vulnerability Type]
Incorrect Access Control
------------------------------------------
[Vendor of Product]
Svakom
------------------------------------------
[Affected Product Code Base]
Siime eye - 14.1.00000001.3.330.0.0.3.14
------------------------------------------
[Affected Component]
Siime Eye, web interface
------------------------------------------
[Attack Type]
Context-dependent
------------------------------------------
[Impact Code execution]
true
------------------------------------------
[Attack Vectors]
An attacker needs to be connected to the device's access point and have access to the admin panel (e.g through sniffing or bruteforcing the credentials)
------------------------------------------
[Reference]
https://www.pentestpartners.com/security-blog/vulnerable-wi-fi-dildo-camera-endoscope-yes-really/
N/A
------------------------------------------
[Has vendor confirmed or acknowledged the vulnerability?]
true
------------------------------------------
[Discoverer]
Willem Westerhof, Jasper Nota, Edwin Gozeling from Qbit cyber security in assignment for the Consumentenbond In addition, Pentest partners discovered this as well but did not request CVE's.
Use CVE-2020-11920
| VAR-202102-0064 | CVE-2020-11915 | Svakom Siime Eye Vulnerability in resetting resources to unsafe default values in |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. By sending a set_params.cgi?telnetd=1&save=1&reboot=1 request to the webserver, it is possible to enable the telnet interface on the device. The telnet interface can then be used to obtain access to the device with root privileges via a reecam4debug default password. This default telnet password is the same across all Siime Eye devices. In order for the attack to be exploited, an attacker must be physically close in order to connect to the device's Wi-Fi access point. Svakom Siime Eye There is a vulnerability in the initialization of resources to insecure default values.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state.
------------------------------------------
[Additional Information]
The vulnerability was first discovered by Pentest Partners, later on it was also discovered by Qbit as the issues remain unaddressed by the vendor.
default telnet password is the same across all
Siime Eye devices and possibly even across all devices created by this
developer
------------------------------------------
[Vulnerability Type]
Incorrect Access Control
------------------------------------------
[Vendor of Product]
Svakom
------------------------------------------
[Affected Product Code Base]
Siime Eye - 14.1.00000001.3.330.0.0.3.14
------------------------------------------
[Affected Component]
Siime Eye device
------------------------------------------
[Attack Type]
Physical
------------------------------------------
[Impact Code execution]
true
------------------------------------------
[Attack Vectors]
An attacker must first obtain access to the Wi-Fi access point of the device, after which the exploit can be done using simple network commands.
------------------------------------------
[Reference]
https://www.pentestpartners.com/security-blog/vulnerable-wi-fi-dildo-camera-endoscope-yes-really/
N/A
------------------------------------------
[Has vendor confirmed or acknowledged the vulnerability?]
true
------------------------------------------
[Discoverer]
Willem Westerhof, Jasper Nota, Edwin Gozeling from Qbit during an assignment for the Consumentenbond. Unknown personnel at pentest partners who did not request a CVE back then.
Use CVE-2020-11915
| VAR-202102-1555 | No CVE | An unauthorized access vulnerability exists in the NC601B web configuration page of Anhui Kanghai Times Technology Co., Ltd. |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
NC601B is a serial server of Anhui Kanghai Times Technology Co., Ltd.
An unauthorized access vulnerability exists in the NC601B web configuration page of Anhui Kanghai Times Technology Co., Ltd. Attackers can use this vulnerability to obtain critical information of the system, leading to the disclosure of sensitive information.
| VAR-202102-1589 | No CVE | Binary vulnerability exists in Nanjing Keyuan SyncView |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Nanjing Keyuan Automation Group Co., Ltd. (Stock Abbreviation: Keyuan Stock Code: 002380) was founded in 1993. It is a leading domestic supplier of industrial automation and information technology, products and solutions with more than 1,000 employees. The company successfully landed in the A-share market on March 31, 2010.
Nanjing Keyuan SyncView has a binary vulnerability. Attackers can use this vulnerability to construct malformed gra files and cause the program to crash.
| VAR-202102-1590 | No CVE | AutoShop V4.0.5.0 timing monitoring graph has memory corruption vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Shenzhen Inovance Technology Co., Ltd. focuses on the R&D, production and sales of industrial automation control products. It is positioned to serve mid- and high-end equipment manufacturers. Based on industrial automation control technology with independent intellectual property rights, it can quickly provide customers with personalized The solution is the main business model to realize the common growth of corporate value and customer value.
AutoShop V4.0.5.0 timing monitor chart (TimeSequenceChart.exe) has a memory corruption vulnerability in processing timing chart files (.TSC files), and constructing malformed timing chart files can cause the program to crash. If successfully used, it can cause arbitrary code execution.
| VAR-202102-1591 | No CVE | InoTouch Editor V2.6.8 has a binary vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Shenzhen Inovance Technology Co., Ltd. focuses on the R&D, production and sales of industrial automation control products. It is positioned to serve mid- and high-end equipment manufacturers. Based on industrial automation control technology with independent intellectual property rights, it can quickly provide customers with personalized The solution is the main business model to realize the common growth of corporate value and customer value.
InoTouch Editor V2.6.8 has a binary vulnerability, which can be exploited by attackers to construct malformed formula files and cause the program to crash.
| VAR-202102-1556 | No CVE | Spectranet 4G LTE Mobile Router has logic flaw vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Spectranet 4G LTE Mobile Router is a mobile router.
Spectranet 4G LTE Mobile Router has logic flaws. Attackers can use vulnerabilities to obtain sensitive information, make arbitrary changes to the configuration, and execute restart commands without authorization.
| VAR-202102-0636 | CVE-2021-22292 | Huawei eCNS280 resource management error vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
There is a denial of service (DoS) vulnerability in eCNS280 versions V100R005C00, V100R005C10. Due to a design defect, remote unauthorized attackers send a large number of specific messages to affected devices, causing system resource exhaustion and web application DoS. Huawei eCNS280 is the core network equipment of China's Huawei (Huawei) wireless broadband trunking system. In addition to providing the network functions of the traditional core network, it also provides capacity configuration for each network element according to the actual application by virtualizing the network element functions and sharing standardized hardware resources among multiple network elements, which improves the efficiency of network expansion and reduction. The vulnerability is due to a design flaw
| VAR-202102-0644 | CVE-2021-22304 | Taurus-AL00A Vulnerabilities in the use of freed memory |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
There is a use after free vulnerability in Taurus-AL00A 10.0.0.1(C00E1R1P1). A module may refer to some memory after it has been freed while dealing with some messages. Attackers can exploit this vulnerability by sending specific message to the affected module. This may lead to module crash, compromising normal service. Taurus-AL00A Is vulnerable to the use of freed memory.Denial of service (DoS) It may be put into a state
| VAR-202102-0640 | CVE-2021-22300 | eCNS280_TD Vulnerability of important information in plaintext |
CVSS V2: 1.9 CVSS V3: 4.1 Severity: MEDIUM |
There is an information leak vulnerability in eCNS280_TD versions V100R005C00 and V100R005C10. A command does not have timeout exit mechanism. Temporary file contains sensitive information. This allows attackers to obtain information by inter-process access that requires other methods. eCNS280_TD Contains a vulnerability in the plaintext storage of important information.Information may be obtained. Huawei eCNS280 is the core network equipment of China's Huawei (Huawei) wireless broadband trunking system. In addition to providing the network functions of the traditional core network, it also provides capacity configuration for each network element according to the actual application by virtualizing the network element functions and sharing standardized hardware resources among multiple network elements, which improves the efficiency of network expansion and reduction. No detailed vulnerability details are currently provided
| VAR-202102-1432 | CVE-2021-3229 | ASUSWRT ASUS RT-AX3000 Firmware vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177 and earlier versions allows an attacker to disrupt the use of device setup services via continuous login error. ASUSWRT ASUS RT-AX3000 There is an unspecified vulnerability in the firmware.Denial of service (DoS) It may be put into a state. ASUS RT-AX3000 is a piece of firmware from ASUS, Taiwan, China that runs in its routers
| VAR-202102-0541 | CVE-2020-9118 | Huawei AIS-BW80H-00 Input Validation Error Vulnerability |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
There is an insufficient integrity check vulnerability in Huawei Sound X Product. The system does not check certain software package's integrity sufficiently. Successful exploit could allow an attacker to load a crafted software package to the device. Affected product versions include:AIS-BW80H-00 versions 9.0.3.1(H100SP13C00),9.0.3.1(H100SP18C00),9.0.3.1(H100SP3C00),9.0.3.1(H100SP9C00),9.0.3.2(H100SP1C00),9.0.3.2(H100SP2C00),9.0.3.2(H100SP5C00),9.0.3.2(H100SP8C00),9.0.3.3(H100SP1C00). AIS-BW80H-00 Exists in a data integrity verification vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. The Huawei AIS-BW80H-00 is a smart speaker device from the Chinese company Huawei
| VAR-202104-0196 | CVE-2020-29624 | plural Apple Out-of-bounds write vulnerabilities in the product |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted font file may lead to arbitrary code execution. plural Apple The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Apple macOS is a set of dedicated operating systems developed by Apple Corporation for Mac computers
| VAR-202102-0771 | CVE-2020-6649 | FortiNet FortiIsolator Session deadline vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks). FortiNet FortiIsolator Is vulnerable to a session expiration.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Fortinet FortiIsolator is an application provided by Fortinet Corporation of the United States to provide remote security isolation functions for browsers. The application adds additional advanced threat protection to the Fortinet Security Fabric and protects critical business data from sophisticated threats on the network. Content and files from the web are accessed in remote containers, which then present risk-free content to users
| VAR-202102-0745 | CVE-2021-22122 | FortiWeb GUI Cross-site scripting vulnerability in interface |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
An improper neutralization of input during web page generation in FortiWeb GUI interface 6.3.0 through 6.3.7 and version before 6.2.4 may allow an unauthenticated, remote attacker to perform a reflected cross site scripting attack (XSS) by injecting malicious payload in different vulnerable API end-points. FortiWeb GUI A cross-site scripting vulnerability exists in the interface.Information may be obtained and information may be tampered with. Fortinet FortiWeb is a web application layer firewall developed by Fortinet, which can block threats such as cross-site scripting, SQL injection, cookie poisoning, schema poisoning, etc., to ensure the security of web applications and protect sensitive database content
| VAR-202102-0638 | CVE-2021-22298 | Huawei Gauss100 OLTP Product vulnerabilities |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
There is a logic vulnerability in Huawei Gauss100 OLTP Product. An attacker with certain permissions could perform specific SQL statement to exploit this vulnerability. Due to insufficient security design, successful exploit can cause service abnormal. Affected product versions include: ManageOne versions 6.5.1.1.B020, 6.5.1.1.B030, 6.5.1.1.B040, 6.5.1.SPC100.B050, 6.5.1.SPC101.B010, 6.5.1.SPC101.B040, 6.5.1.SPC200, 6.5.1.SPC200.B010, 6.5.1.SPC200.B030, 6.5.1.SPC200.B040, 6.5.1.SPC200.B050, 6.5.1.SPC200.B060, 6.5.1.SPC200.B070, 6.5.1RC1.B070, 6.5.1RC1.B080, 6.5.1RC2.B040, 6.5.1RC2.B050, 6.5.1RC2.B060, 6.5.1RC2.B070, 6.5.1RC2.B080, 6.5.1RC2.B090. Huawei Gauss100 OLTP The product contains unspecified vulnerabilities.Denial of service (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Huawei Manageone is a set of cloud data center management solutions of China Huawei (Huawei). The product supports unified management of heterogeneous cloud resource pools, and provides functions such as multi-level VDC matching customer organization model, service catalog planning, self-service, centralized alarm analysis, and intelligent operation and maintenance
| VAR-202102-0898 | CVE-2021-20016 | SonicWall SSLVPN SMA100 In the product SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A SQL-Injection vulnerability in the SonicWall SSLVPN SMA100 product allows a remote unauthenticated attacker to perform SQL query to access username password and other session related information. This vulnerability impacts SMA100 build version 10.x. SonicWall SSLVPN SMA100 The product has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Sonicwall SMA100 is a security access gateway device of American Sonicwall Company
| VAR-202112-2069 | CVE-2021-20134 | D-Link DIR-2640 Path Traversal Vulnerability |
CVSS V2: 7.4 CVSS V3: 8.4 Severity: HIGH |
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by either Quagga service (zebra or ripd). Subsequent log messages will be appended to the file, prefixed by a timestamp and some logging metadata. Remote code execution can be achieved by using this vulnerability to append to a shell script on the router's filesystem, and then awaiting or triggering the execution of that script. A remote, unauthenticated root shell can easily be obtained on the device in this fashion. D-Link DIR-2640 Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-2640 is a high-power Wi-Fi router from D-Link, a Taiwanese company.
A path traversal vulnerability exists in D-Link DIR-2640 Quagga 1.11B02 and its previous versions. The vulnerability stems from the lack of effective filtering of path parameters in the software
| VAR-202102-1477 | CVE-2021-21702 | PHP In NULL Pointer dereference vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash. PHP Has NULL A pointer dereference vulnerability exists.Denial of service (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A security issue was found in PHP prior to 8.0.2, 7.4.15 and 7.3.27. PHP will crash with a SIGSEGV whenever an XML is provided to the SoapClient query() function without an existing field. The issue is fixed in versions 8.0.2, 7.4.15 and 7.3.27. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202105-23
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: PHP: Multiple vulnerabilities
Date: May 26, 2021
Bugs: #764314, #768756, #788892
ID: 202105-23
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in PHP, the worst of which
could result in a Denial of Service condition.
Background
==========
PHP is an open source general-purpose scripting language that is
especially suited for web development.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-lang/php < 8.0.6 >= 7.3.28:7.3
>= 7.4.19:7.4
>= 8.0.6:8.0
Description
===========
Multiple vulnerabilities have been discovered in PHP. Please review the
CVE identifiers and bugs referenced below for details.
Impact
======
Please review the referenced CVE identifiers and bugs for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All PHP 7.3.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/php-7.3.28:7.3"
All PHP 7.4.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/php-7.4.19:7.4"
All PHP 8.0.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/php-8.0.6:8.0"
References
==========
[ 1 ] CVE-2020-7071
https://nvd.nist.gov/vuln/detail/CVE-2020-7071
[ 2 ] CVE-2021-21702
https://nvd.nist.gov/vuln/detail/CVE-2021-21702
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202105-23
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. ==========================================================================
Ubuntu Security Notice USN-5006-1
July 07, 2021
php7.2, php7.4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in PHP. A remote
attacker could possibly use this issue to cause PHP to crash, resulting in
a denial of service, or possibly obtain sensitive information. This issue
only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-7068)
It was discovered that PHP incorrectly handled parsing URLs with passwords.
A remote attacker could possibly use this issue to cause PHP to mis-parse
the URL and produce wrong data. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 20.10. A remote attacker could possibly
use this issue to cause PHP to crash, resulting in a denial of service.
This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu
20.10. (CVE-2021-21702)
It was discovered that PHP incorrectly handled the pdo_firebase module. A
remote attacker could possibly use this issue to cause PHP to crash,
resulting in a denial of service. (CVE-2021-21704)
It was discovered that PHP incorrectly handled the FILTER_VALIDATE_URL
check. A remote attacker could possibly use this issue to perform a server-
side request forgery attack. (CVE-2021-21705)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 21.04:
libapache2-mod-php7.4 7.4.16-1ubuntu2.1
php7.4-cgi 7.4.16-1ubuntu2.1
php7.4-cli 7.4.16-1ubuntu2.1
php7.4-fpm 7.4.16-1ubuntu2.1
Ubuntu 20.10:
libapache2-mod-php7.4 7.4.9-1ubuntu1.2
php7.4-cgi 7.4.9-1ubuntu1.2
php7.4-cli 7.4.9-1ubuntu1.2
php7.4-fpm 7.4.9-1ubuntu1.2
Ubuntu 20.04 LTS:
libapache2-mod-php7.4 7.4.3-4ubuntu2.5
php7.4-cgi 7.4.3-4ubuntu2.5
php7.4-cli 7.4.3-4ubuntu2.5
php7.4-fpm 7.4.3-4ubuntu2.5
Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.24-0ubuntu0.18.04.8
php7.2-cgi 7.2.24-0ubuntu0.18.04.8
php7.2-cli 7.2.24-0ubuntu0.18.04.8
php7.2-fpm 7.2.24-0ubuntu0.18.04.8
In general, a standard system update will make all the necessary changes. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.5 Release Notes linked from the References section. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: rh-php73-php security, bug fix, and enhancement update
Advisory ID: RHSA-2021:2992-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2992
Issue date: 2021-08-03
CVE Names: CVE-2020-7068 CVE-2020-7069 CVE-2020-7070
CVE-2020-7071 CVE-2021-21702 CVE-2021-21705
====================================================================
1. Summary:
An update for rh-php73-php is now available for Red Hat Software
Collections.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server.
The following packages have been upgraded to a later upstream version:
rh-php73-php (7.3.29). (BZ#1977764)
Security Fix(es):
* php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV
(CVE-2020-7069)
* php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo
(CVE-2020-7071)
* php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705)
* php: Use of freed hash key in the phar_parse_zipfile function
(CVE-2020-7068)
* php: URL decoding of cookie names can lead to different interpretation of
cookies between browser and server (CVE-2020-7070)
* php: NULL pointer dereference in SoapClient (CVE-2021-21702)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon must be restarted
for the update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1868109 - CVE-2020-7068 php: Use of freed hash key in the phar_parse_zipfile function
1885735 - CVE-2020-7069 php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV
1885738 - CVE-2020-7070 php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server
1913846 - CVE-2020-7071 php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo
1925272 - CVE-2021-21702 php: NULL pointer dereference in SoapClient
1977764 - PDO ODBC truncates BLOB records at every 256th byte [rhscl-3.7.z]
1978755 - CVE-2021-21705 php: SSRF bypass in FILTER_VALIDATE_URL
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-php73-php-7.3.29-1.el7.src.rpm
ppc64le:
rh-php73-php-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-bcmath-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-cli-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-common-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-dba-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-dbg-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-devel-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-embedded-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-enchant-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-fpm-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-gd-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-gmp-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-intl-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-json-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-ldap-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-mbstring-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-odbc-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-opcache-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pdo-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pgsql-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-process-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pspell-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-recode-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-snmp-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-soap-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-xml-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-zip-7.3.29-1.el7.ppc64le.rpm
s390x:
rh-php73-php-7.3.29-1.el7.s390x.rpm
rh-php73-php-bcmath-7.3.29-1.el7.s390x.rpm
rh-php73-php-cli-7.3.29-1.el7.s390x.rpm
rh-php73-php-common-7.3.29-1.el7.s390x.rpm
rh-php73-php-dba-7.3.29-1.el7.s390x.rpm
rh-php73-php-dbg-7.3.29-1.el7.s390x.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.s390x.rpm
rh-php73-php-devel-7.3.29-1.el7.s390x.rpm
rh-php73-php-embedded-7.3.29-1.el7.s390x.rpm
rh-php73-php-enchant-7.3.29-1.el7.s390x.rpm
rh-php73-php-fpm-7.3.29-1.el7.s390x.rpm
rh-php73-php-gd-7.3.29-1.el7.s390x.rpm
rh-php73-php-gmp-7.3.29-1.el7.s390x.rpm
rh-php73-php-intl-7.3.29-1.el7.s390x.rpm
rh-php73-php-json-7.3.29-1.el7.s390x.rpm
rh-php73-php-ldap-7.3.29-1.el7.s390x.rpm
rh-php73-php-mbstring-7.3.29-1.el7.s390x.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.s390x.rpm
rh-php73-php-odbc-7.3.29-1.el7.s390x.rpm
rh-php73-php-opcache-7.3.29-1.el7.s390x.rpm
rh-php73-php-pdo-7.3.29-1.el7.s390x.rpm
rh-php73-php-pgsql-7.3.29-1.el7.s390x.rpm
rh-php73-php-process-7.3.29-1.el7.s390x.rpm
rh-php73-php-pspell-7.3.29-1.el7.s390x.rpm
rh-php73-php-recode-7.3.29-1.el7.s390x.rpm
rh-php73-php-snmp-7.3.29-1.el7.s390x.rpm
rh-php73-php-soap-7.3.29-1.el7.s390x.rpm
rh-php73-php-xml-7.3.29-1.el7.s390x.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.s390x.rpm
rh-php73-php-zip-7.3.29-1.el7.s390x.rpm
x86_64:
rh-php73-php-7.3.29-1.el7.x86_64.rpm
rh-php73-php-bcmath-7.3.29-1.el7.x86_64.rpm
rh-php73-php-cli-7.3.29-1.el7.x86_64.rpm
rh-php73-php-common-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dba-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dbg-7.3.29-1.el7.x86_64.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-devel-7.3.29-1.el7.x86_64.rpm
rh-php73-php-embedded-7.3.29-1.el7.x86_64.rpm
rh-php73-php-enchant-7.3.29-1.el7.x86_64.rpm
rh-php73-php-fpm-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-intl-7.3.29-1.el7.x86_64.rpm
rh-php73-php-json-7.3.29-1.el7.x86_64.rpm
rh-php73-php-ldap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mbstring-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-odbc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-opcache-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pdo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pgsql-7.3.29-1.el7.x86_64.rpm
rh-php73-php-process-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pspell-7.3.29-1.el7.x86_64.rpm
rh-php73-php-recode-7.3.29-1.el7.x86_64.rpm
rh-php73-php-snmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-soap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xml-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-zip-7.3.29-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):
Source:
rh-php73-php-7.3.29-1.el7.src.rpm
ppc64le:
rh-php73-php-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-bcmath-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-cli-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-common-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-dba-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-dbg-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-devel-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-embedded-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-enchant-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-fpm-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-gd-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-gmp-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-intl-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-json-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-ldap-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-mbstring-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-odbc-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-opcache-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pdo-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pgsql-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-process-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pspell-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-recode-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-snmp-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-soap-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-xml-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-zip-7.3.29-1.el7.ppc64le.rpm
s390x:
rh-php73-php-7.3.29-1.el7.s390x.rpm
rh-php73-php-bcmath-7.3.29-1.el7.s390x.rpm
rh-php73-php-cli-7.3.29-1.el7.s390x.rpm
rh-php73-php-common-7.3.29-1.el7.s390x.rpm
rh-php73-php-dba-7.3.29-1.el7.s390x.rpm
rh-php73-php-dbg-7.3.29-1.el7.s390x.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.s390x.rpm
rh-php73-php-devel-7.3.29-1.el7.s390x.rpm
rh-php73-php-embedded-7.3.29-1.el7.s390x.rpm
rh-php73-php-enchant-7.3.29-1.el7.s390x.rpm
rh-php73-php-fpm-7.3.29-1.el7.s390x.rpm
rh-php73-php-gd-7.3.29-1.el7.s390x.rpm
rh-php73-php-gmp-7.3.29-1.el7.s390x.rpm
rh-php73-php-intl-7.3.29-1.el7.s390x.rpm
rh-php73-php-json-7.3.29-1.el7.s390x.rpm
rh-php73-php-ldap-7.3.29-1.el7.s390x.rpm
rh-php73-php-mbstring-7.3.29-1.el7.s390x.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.s390x.rpm
rh-php73-php-odbc-7.3.29-1.el7.s390x.rpm
rh-php73-php-opcache-7.3.29-1.el7.s390x.rpm
rh-php73-php-pdo-7.3.29-1.el7.s390x.rpm
rh-php73-php-pgsql-7.3.29-1.el7.s390x.rpm
rh-php73-php-process-7.3.29-1.el7.s390x.rpm
rh-php73-php-pspell-7.3.29-1.el7.s390x.rpm
rh-php73-php-recode-7.3.29-1.el7.s390x.rpm
rh-php73-php-snmp-7.3.29-1.el7.s390x.rpm
rh-php73-php-soap-7.3.29-1.el7.s390x.rpm
rh-php73-php-xml-7.3.29-1.el7.s390x.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.s390x.rpm
rh-php73-php-zip-7.3.29-1.el7.s390x.rpm
x86_64:
rh-php73-php-7.3.29-1.el7.x86_64.rpm
rh-php73-php-bcmath-7.3.29-1.el7.x86_64.rpm
rh-php73-php-cli-7.3.29-1.el7.x86_64.rpm
rh-php73-php-common-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dba-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dbg-7.3.29-1.el7.x86_64.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-devel-7.3.29-1.el7.x86_64.rpm
rh-php73-php-embedded-7.3.29-1.el7.x86_64.rpm
rh-php73-php-enchant-7.3.29-1.el7.x86_64.rpm
rh-php73-php-fpm-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-intl-7.3.29-1.el7.x86_64.rpm
rh-php73-php-json-7.3.29-1.el7.x86_64.rpm
rh-php73-php-ldap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mbstring-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-odbc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-opcache-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pdo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pgsql-7.3.29-1.el7.x86_64.rpm
rh-php73-php-process-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pspell-7.3.29-1.el7.x86_64.rpm
rh-php73-php-recode-7.3.29-1.el7.x86_64.rpm
rh-php73-php-snmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-soap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xml-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-zip-7.3.29-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-php73-php-7.3.29-1.el7.src.rpm
x86_64:
rh-php73-php-7.3.29-1.el7.x86_64.rpm
rh-php73-php-bcmath-7.3.29-1.el7.x86_64.rpm
rh-php73-php-cli-7.3.29-1.el7.x86_64.rpm
rh-php73-php-common-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dba-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dbg-7.3.29-1.el7.x86_64.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-devel-7.3.29-1.el7.x86_64.rpm
rh-php73-php-embedded-7.3.29-1.el7.x86_64.rpm
rh-php73-php-enchant-7.3.29-1.el7.x86_64.rpm
rh-php73-php-fpm-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-intl-7.3.29-1.el7.x86_64.rpm
rh-php73-php-json-7.3.29-1.el7.x86_64.rpm
rh-php73-php-ldap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mbstring-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-odbc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-opcache-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pdo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pgsql-7.3.29-1.el7.x86_64.rpm
rh-php73-php-process-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pspell-7.3.29-1.el7.x86_64.rpm
rh-php73-php-recode-7.3.29-1.el7.x86_64.rpm
rh-php73-php-snmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-soap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xml-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-zip-7.3.29-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-7068
https://access.redhat.com/security/cve/CVE-2020-7069
https://access.redhat.com/security/cve/CVE-2020-7070
https://access.redhat.com/security/cve/CVE-2020-7071
https://access.redhat.com/security/cve/CVE-2021-21702
https://access.redhat.com/security/cve/CVE-2021-21705
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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waMi
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
.
For the stable distribution (buster), these problems have been fixed in
version 7.3.27-1~deb10u1.
We recommend that you upgrade your php7.3 packages.
For the detailed security status of php7.3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.3
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=9Q7e
-----END PGP SIGNATURE-----
| VAR-202102-0568 | CVE-2021-1297 | plural Cisco Small Business RV Absolute Path Traversal Vulnerability in Routers |
CVSS V2: 9.4 CVSS V3: 7.5 Severity: High |
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to conduct directory traversal attacks and overwrite certain files that should be restricted on an affected system. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by using the web-based management interface to upload a file to location on an affected device that they should not have access to. A successful exploit could allow the attacker to overwrite files on the file system of the affected device. plural Cisco Small Business RV A router contains a vulnerability related to absolute path traversal.Information may be tampered with. This vulnerability allows network-adjacent attackers to create arbitrary files on affected installations of Cisco RV16x and RV26x routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the web service, which listens on TCP port 443 by default. When parsing the filename parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create files in the context of root