CWE-140
Improper Neutralization of Delimiters
The product does not neutralize or incorrectly neutralizes delimiters.
CVE-2023-31208 (GCVE-0-2023-31208)
Vulnerability from cvelistv5
- CWE-140 - Improper Neutralization of Delimiters
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
Checkmk GmbH | Checkmk |
Version: 2.2.0 ≤ Version: 2.1.0 ≤ Version: 2.0.0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:45:26.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://checkmk.com/werk/15191" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-31208", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-21T21:07:40.332832Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-21T21:07:58.592Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Checkmk", "vendor": "Checkmk GmbH", "versions": [ { "lessThan": "2.2.0b8", "status": "affected", "version": "2.2.0", "versionType": "semver" }, { "lessThan": "2.1.0p28", "status": "affected", "version": "2.1.0", "versionType": "semver" }, { "lessThan": "2.0.0p36", "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper neutralization of livestatus command delimiters in the RestAPI in Checkmk \u003c 2.0.0p36, \u003c 2.1.0p28, and \u003c 2.2.0b8 (beta) allows arbitrary livestatus command execution for authorized users." } ], "impacts": [ { "capecId": "CAPEC-15", "descriptions": [ { "lang": "en", "value": "CAPEC-15: Command Delimiters" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-140", "description": "CWE-140: Improper Neutralization of Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-17T08:24:59.173Z", "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "shortName": "Tribe29" }, "references": [ { "url": "https://checkmk.com/werk/15191" } ], "title": "Livestatus command injection in RestAPI" } }, "cveMetadata": { "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "assignerShortName": "Tribe29", "cveId": "CVE-2023-31208", "datePublished": "2023-05-17T08:24:59.173Z", "dateReserved": "2023-04-25T08:49:15.442Z", "dateUpdated": "2025-01-21T21:07:58.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-38488 (GCVE-0-2023-38488)
Vulnerability from cvelistv5
- CWE-140 - Improper Neutralization of Delimiters
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:39:13.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getkirby/kirby/security/advisories/GHSA-x5mr-p6v4-wp93", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-x5mr-p6v4-wp93" }, { "name": "https://github.com/getkirby/kirby/commit/a1e0f81c799ddae1af91cf37216f8ded9cb93540", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getkirby/kirby/commit/a1e0f81c799ddae1af91cf37216f8ded9cb93540" }, { "name": "https://github.com/getkirby/kirby/releases/tag/3.5.8.3", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getkirby/kirby/releases/tag/3.5.8.3" }, { "name": "https://github.com/getkirby/kirby/releases/tag/3.6.6.3", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getkirby/kirby/releases/tag/3.6.6.3" }, { "name": "https://github.com/getkirby/kirby/releases/tag/3.7.5.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getkirby/kirby/releases/tag/3.7.5.2" }, { "name": "https://github.com/getkirby/kirby/releases/tag/3.8.4.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getkirby/kirby/releases/tag/3.8.4.1" }, { "name": "https://github.com/getkirby/kirby/releases/tag/3.9.6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getkirby/kirby/releases/tag/3.9.6" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38488", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T13:01:01.010438Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T13:05:58.803Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "kirby", "vendor": "getkirby", "versions": [ { "status": "affected", "version": "\u003c 3.5.8.3" }, { "status": "affected", "version": "\u003e= 3.6.0, \u003c 3.6.6.3" }, { "status": "affected", "version": "\u003e= 3.7.0, \u003c 3.7.5.2" }, { "status": "affected", "version": "\u003e= 3.8.0, \u003c 3.8.41" }, { "status": "affected", "version": "\u003e= 3.9.0, \u003c 3.9.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to update a Kirby content file (e.g. via a contact or comment form). Kirby sites are *not* affected if they don\u0027t allow write access for untrusted users or visitors.\n\nA field injection in a content storage implementation is a type of vulnerability that allows attackers with content write access to overwrite content fields that the site developer didn\u0027t intend to be modified. In a Kirby site this can be used to alter site content, break site behavior or inject malicious data or code. The exact security risk depends on the field type and usage.\n\nKirby stores content of the site, of pages, files and users in text files by default. The text files use Kirby\u0027s KirbyData format where each field is separated by newlines and a line with four dashes (`----`). When reading a KirbyData file, the affected code first removed the Unicode BOM sequence from the file contents and afterwards split the content into fields by the field separator.\n\nWhen writing to a KirbyData file, field separators in field data are escaped to prevent user input from interfering with the field structure. However this escaping could be tricked by including a Unicode BOM sequence in a field separator (e.g. `--\\xEF\\xBB\\xBF--`). When writing, this was not detected as a separator, but because the BOM was removed during reading, it could be abused by attackers to inject other field data into content files.\n\nBecause each field can only be defined once per content file, this vulnerability only affects fields in the content file that were defined above the vulnerable user-writable field or not at all. Fields that are defined below the vulnerable field override the injected field content and were therefore already protected.\n\nThe problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have fixed the affected code to only remove the Unicode BOM sequence at the beginning of the file. This fixes this vulnerability both for newly written as well as for existing content files." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-140", "description": "CWE-140: Improper Neutralization of Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-27T15:45:13.153Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getkirby/kirby/security/advisories/GHSA-x5mr-p6v4-wp93", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-x5mr-p6v4-wp93" }, { "name": "https://github.com/getkirby/kirby/commit/a1e0f81c799ddae1af91cf37216f8ded9cb93540", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getkirby/kirby/commit/a1e0f81c799ddae1af91cf37216f8ded9cb93540" }, { "name": "https://github.com/getkirby/kirby/releases/tag/3.5.8.3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getkirby/kirby/releases/tag/3.5.8.3" }, { "name": "https://github.com/getkirby/kirby/releases/tag/3.6.6.3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getkirby/kirby/releases/tag/3.6.6.3" }, { "name": "https://github.com/getkirby/kirby/releases/tag/3.7.5.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getkirby/kirby/releases/tag/3.7.5.2" }, { "name": "https://github.com/getkirby/kirby/releases/tag/3.8.4.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getkirby/kirby/releases/tag/3.8.4.1" }, { "name": "https://github.com/getkirby/kirby/releases/tag/3.9.6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getkirby/kirby/releases/tag/3.9.6" } ], "source": { "advisory": "GHSA-x5mr-p6v4-wp93", "discovery": "UNKNOWN" }, "title": "Kirby vulnerable to field injection in the KirbyData text storage handler" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-38488", "datePublished": "2023-07-27T14:31:00.179Z", "dateReserved": "2023-07-18T16:28:12.074Z", "dateUpdated": "2024-10-17T13:05:58.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6156 (GCVE-0-2023-6156)
Vulnerability from cvelistv5
- CWE-140 - Improper Neutralization of Delimiters
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
Checkmk GmbH | Checkmk |
Version: 2.2.0 ≤ Version: 2.1.0 ≤ Version: 2.0.0 ≤ 2.0.0p39 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:21:17.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://checkmk.com/werk/16221" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Checkmk", "vendor": "Checkmk GmbH", "versions": [ { "lessThan": "2.2.0p15", "status": "affected", "version": "2.2.0", "versionType": "semver" }, { "lessThan": "2.1.0p37", "status": "affected", "version": "2.1.0", "versionType": "semver" }, { "lessThanOrEqual": "2.0.0p39", "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper neutralization of livestatus command delimiters in the availability timeline in Checkmk \u003c= 2.0.0p39, \u003c 2.1.0p37, and \u003c 2.2.0p15 allows arbitrary livestatus command execution for authorized users." } ], "impacts": [ { "capecId": "CAPEC-15", "descriptions": [ { "lang": "en", "value": "CAPEC-15: Command Delimiters" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-140", "description": "CWE-140: Improper Neutralization of Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-22T16:24:15.515Z", "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "shortName": "Checkmk" }, "references": [ { "url": "https://checkmk.com/werk/16221" } ], "title": "Livestatus injection in availability timeline" } }, "cveMetadata": { "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "assignerShortName": "Checkmk", "cveId": "CVE-2023-6156", "datePublished": "2023-11-22T16:24:15.515Z", "dateReserved": "2023-11-15T16:38:31.845Z", "dateUpdated": "2024-08-02T08:21:17.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6157 (GCVE-0-2023-6157)
Vulnerability from cvelistv5
- CWE-140 - Improper Neutralization of Delimiters
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
Checkmk GmbH | Checkmk |
Version: 2.2.0 ≤ Version: 2.1.0 ≤ Version: 2.0.0 ≤ 2.0.0p39 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:21:17.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://checkmk.com/werk/16221" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Checkmk", "vendor": "Checkmk GmbH", "versions": [ { "lessThan": "2.2.0p15", "status": "affected", "version": "2.2.0", "versionType": "semver" }, { "lessThan": "2.1.0p37", "status": "affected", "version": "2.1.0", "versionType": "semver" }, { "lessThanOrEqual": "2.0.0p39", "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper neutralization of livestatus command delimiters in ajax_search in Checkmk \u003c= 2.0.0p39, \u003c 2.1.0p37, and \u003c 2.2.0p15 allows arbitrary livestatus command execution for authorized users." } ], "impacts": [ { "capecId": "CAPEC-15", "descriptions": [ { "lang": "en", "value": "CAPEC-15: Command Delimiters" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-140", "description": "CWE-140: Improper Neutralization of Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-22T16:24:22.002Z", "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "shortName": "Checkmk" }, "references": [ { "url": "https://checkmk.com/werk/16221" } ], "title": "Livestatus injection in ajax_search" } }, "cveMetadata": { "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "assignerShortName": "Checkmk", "cveId": "CVE-2023-6157", "datePublished": "2023-11-22T16:24:22.002Z", "dateReserved": "2023-11-15T16:39:53.614Z", "dateUpdated": "2024-08-02T08:21:17.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-38865 (GCVE-0-2024-38865)
Vulnerability from cvelistv5
- CWE-140 - Improper Neutralization of Delimiters
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
Checkmk GmbH | Checkmk |
Version: 2.3.0 ≤ Version: 2.2.0 ≤ Version: 2.1.0 ≤ 2.1.0p50 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38865", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-10T13:09:48.020379Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-10T13:09:56.033Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Checkmk", "vendor": "Checkmk GmbH", "versions": [ { "lessThan": "2.3.0p25", "status": "affected", "version": "2.3.0", "versionType": "semver" }, { "lessThan": "2.2.0p39", "status": "affected", "version": "2.2.0", "versionType": "semver" }, { "lessThanOrEqual": "2.1.0p50", "status": "affected", "version": "2.1.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper neutralization of livestatus command delimiters in a specific endpoint within RestAPI of Checkmk prior to 2.2.0p39, 2.3.0p25, and 2.1.0p51 (EOL) allows arbitrary livestatus command execution. Exploitation requires the attacker to have a contact group assigned to their user account and for an event to originate from a host with the same contact group or from an event generated with an unknown host." } ], "impacts": [ { "capecId": "CAPEC-15", "descriptions": [ { "lang": "en", "value": "CAPEC-15: Command Delimiters" } ] } ], "metrics": [ { "cvssV4_0": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-140", "description": "CWE-140: Improper Neutralization of Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T07:35:35.143Z", "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "shortName": "Checkmk" }, "references": [ { "url": "https://checkmk.com/werk/17028" } ], "title": "Livestatus command injection in RestAPI" } }, "cveMetadata": { "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "assignerShortName": "Checkmk", "cveId": "CVE-2024-38865", "datePublished": "2025-04-10T07:35:35.143Z", "dateReserved": "2024-06-20T10:03:09.179Z", "dateUpdated": "2025-04-10T13:09:56.033Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-38866 (GCVE-0-2024-38866)
Vulnerability from cvelistv5
- CWE-140 - Improper Neutralization of Delimiters
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38866", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:08:08.015563Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-27T14:08:22.600Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Nagvis", "vendor": "Nagvis", "versions": [ { "lessThan": "1.9.47", "status": "affected", "version": "1.9.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper neutralization of input in Nagvis before version 1.9.47 which can lead to livestatus injection" } ], "impacts": [ { "capecId": "CAPEC-15", "descriptions": [ { "lang": "en", "value": "CAPEC-15: Command Delimiters" } ] } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:L", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-140", "description": "CWE-140: Improper Neutralization of Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-27T07:01:35.160Z", "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "shortName": "Checkmk" }, "references": [ { "url": "https://github.com/NagVis/nagvis/pull/398/commits/8d5d07e22dfca78df7420ac81cffff6f45ca9694" }, { "url": "https://www.nagvis.org/downloads/changelog/1.9.47" } ], "title": "Livestatus Injection in dynmaps" } }, "cveMetadata": { "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "assignerShortName": "Checkmk", "cveId": "CVE-2024-38866", "datePublished": "2025-05-27T07:01:35.160Z", "dateReserved": "2024-06-20T10:03:09.179Z", "dateUpdated": "2025-05-27T14:08:22.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42385 (GCVE-0-2024-42385)
Vulnerability from cvelistv5
- CWE-140 - Improper Neutralization of Delimiters
Vendor | Product | Version | ||
---|---|---|---|---|
Cesanta | Mongoose Web Server |
Version: 0 ≤ 7.14 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42385", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T13:36:31.747012Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T13:36:49.176Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://github.com/cesanta/mongoose", "defaultStatus": "unaffected", "product": "Mongoose Web Server", "vendor": "Cesanta", "versions": [ { "lessThanOrEqual": "7.14", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Gabriele Quagliarella" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Delimiters vulnerability in Cesanta Mongoose Web Server v7.14 allows to trigger an out-of-bound memory write if the PEM certificate contains unexpected characters." } ], "value": "Improper Neutralization of Delimiters vulnerability in Cesanta Mongoose Web Server v7.14 allows to trigger an out-of-bound memory write if the PEM certificate contains unexpected characters." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-140", "description": "CWE-140 Improper Neutralization of Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T09:05:03.540Z", "orgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "shortName": "Nozomi" }, "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42385" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "It is suggested to update the Mongoose Web Server library to v7.15." } ], "value": "It is suggested to update the Mongoose Web Server library to v7.15." } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper Neutralization of Delimiters in Mongoose Web Server library", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIt is highly recommended to not expose the vulnerable component inside an untrusted network.\u003c/span\u003e\u003cbr\u003e" } ], "value": "It is highly recommended to not expose the vulnerable component inside an untrusted network." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "assignerShortName": "Nozomi", "cveId": "CVE-2024-42385", "datePublished": "2024-11-18T09:05:03.540Z", "dateReserved": "2024-07-31T12:51:37.203Z", "dateUpdated": "2024-11-18T13:36:49.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42392 (GCVE-0-2024-42392)
Vulnerability from cvelistv5
- CWE-140 - Improper Neutralization of Delimiters
Vendor | Product | Version | ||
---|---|---|---|---|
Cesanta | Mongoose Web Server |
Version: 0 ≤ 7.14 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42392", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T13:35:12.960867Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T13:35:30.655Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://github.com/cesanta/mongoose", "defaultStatus": "unaffected", "product": "Mongoose Web Server", "vendor": "Cesanta", "versions": [ { "lessThanOrEqual": "7.14", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Gabriele Quagliarella" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Delimiters vulnerability in Cesanta Mongoose Web Server v7.14 allows to trigger an infinite loop bug if the input string contains unexpected characters." } ], "value": "Improper Neutralization of Delimiters vulnerability in Cesanta Mongoose Web Server v7.14 allows to trigger an infinite loop bug if the input string contains unexpected characters." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-140", "description": "CWE-140 Improper Neutralization of Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T09:07:09.562Z", "orgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "shortName": "Nozomi" }, "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42392" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "It is suggested to update the Mongoose Web Server library to v7.15." } ], "value": "It is suggested to update the Mongoose Web Server library to v7.15." } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper Neutralization of Delimiters in Mongoose Web Server library", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIt is highly recommended to not expose the vulnerable component inside an untrusted network.\u003c/span\u003e\u003cbr\u003e" } ], "value": "It is highly recommended to not expose the vulnerable component inside an untrusted network." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "assignerShortName": "Nozomi", "cveId": "CVE-2024-42392", "datePublished": "2024-11-18T09:07:09.562Z", "dateReserved": "2024-07-31T12:51:37.204Z", "dateUpdated": "2024-11-18T13:35:30.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42482 (GCVE-0-2024-42482)
Vulnerability from cvelistv5
- CWE-140 - Improper Neutralization of Delimiters
► | URL | Tags |
---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
fish-shop | syntax-check |
Version: < 1.6.12 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42482", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T17:36:32.903995Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-13T17:48:18.971Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "syntax-check", "vendor": "fish-shop", "versions": [ { "status": "affected", "version": "\u003c 1.6.12" } ] } ], "descriptions": [ { "lang": "en", "value": "fish-shop/syntax-check is a GitHub action for syntax checking fish shell files. Improper neutralization of delimiters in the `pattern` input (specifically the command separator `;` and command substitution characters `(` and `)`) mean that arbitrary command injection is possible by modification of the input value used in a workflow. This has the potential for exposure or exfiltration of sensitive information from the workflow runner, such as might be achieved by sending environment variables to an external entity. It is recommended that users update to the patched version `v1.6.12` or the latest release version `v2.0.0`, however remediation may be possible through careful control of workflows and the `pattern` input value used by this action." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-140", "description": "CWE-140: Improper Neutralization of Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-12T15:35:57.157Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/fish-shop/syntax-check/security/advisories/GHSA-xj87-mqvh-88w2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/fish-shop/syntax-check/security/advisories/GHSA-xj87-mqvh-88w2" }, { "name": "https://github.com/fish-shop/syntax-check/commit/91e6817c48ad475542fe4e78139029b036a53b03", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fish-shop/syntax-check/commit/91e6817c48ad475542fe4e78139029b036a53b03" }, { "name": "https://github.com/fish-shop/syntax-check/commit/c2cb11395e21119ff8d6e7ea050430ee7d6f49ca", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fish-shop/syntax-check/commit/c2cb11395e21119ff8d6e7ea050430ee7d6f49ca" } ], "source": { "advisory": "GHSA-xj87-mqvh-88w2", "discovery": "UNKNOWN" }, "title": "fish-shop/syntax-check Improper Neutralization of Delimiters" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-42482", "datePublished": "2024-08-12T15:35:57.157Z", "dateReserved": "2024-08-02T14:13:04.617Z", "dateUpdated": "2024-08-13T17:48:18.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6542 (GCVE-0-2024-6542)
Vulnerability from cvelistv5
- CWE-140 - Improper Neutralization of Delimiters
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
Checkmk GmbH | Checkmk |
Version: 2.3.0 ≤ Version: 2.2.0 ≤ Version: 2.1.0 ≤ Version: 2.0.0 ≤ 2.0.0p39 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "checkmk", "vendor": "checkmk", "versions": [ { "lessThanOrEqual": "2.0.0p39", "status": "affected", "version": "2.0.0", "versionType": "semver" }, { "lessThan": "2.1.0p47", "status": "affected", "version": "2.1.0", "versionType": "semver" }, { "lessThan": "2.2.0p32", "status": "affected", "version": "2.2.0", "versionType": "semver" }, { "lessThan": "2.3.0p11", "status": "affected", "version": "2.3.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6542", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-22T13:29:23.832484Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-22T20:26:27.733Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:41:03.497Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://checkmk.com/werk/17013" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Checkmk", "vendor": "Checkmk GmbH", "versions": [ { "lessThan": "2.3.0p11", "status": "affected", "version": "2.3.0", "versionType": "semver" }, { "lessThan": "2.2.0p32", "status": "affected", "version": "2.2.0", "versionType": "semver" }, { "lessThan": "2.1.0p47", "status": "affected", "version": "2.1.0", "versionType": "semver" }, { "lessThanOrEqual": "2.0.0p39", "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper neutralization of livestatus command delimiters in mknotifyd in Checkmk \u003c= 2.0.0p39, \u003c 2.1.0p47, \u003c 2.2.0p32 and \u003c 2.3.0p11 allows arbitrary livestatus command execution." } ], "impacts": [ { "capecId": "CAPEC-15", "descriptions": [ { "lang": "en", "value": "CAPEC-15: Command Delimiters" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-140", "description": "CWE-140: Improper Neutralization of Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-22T09:50:17.736Z", "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "shortName": "Checkmk" }, "references": [ { "url": "https://checkmk.com/werk/17013" } ], "title": "Livestatus injection in mknotifyd" } }, "cveMetadata": { "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "assignerShortName": "Checkmk", "cveId": "CVE-2024-6542", "datePublished": "2024-07-22T09:50:17.736Z", "dateReserved": "2024-07-08T11:59:16.981Z", "dateUpdated": "2024-08-01T21:41:03.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Implementation
Strategy: Input Validation
Description:
- Developers should anticipate that delimiters will be injected/removed/manipulated in the input vectors of their product. Use an appropriate combination of denylists and allowlists to ensure only valid, expected and appropriate input is processed by the system.
Mitigation ID: MIT-5
Phase: Implementation
Strategy: Input Validation
Description:
- Assume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.
- When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, "boat" may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as "red" or "blue."
- Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code's environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.
Mitigation ID: MIT-28
Phase: Implementation
Strategy: Output Encoding
Description:
- While it is risky to use dynamically-generated query strings, code, or commands that mix control and data together, sometimes it may be unavoidable. Properly quote arguments and escape any special characters within those arguments. The most conservative approach is to escape or filter all characters that do not pass an extremely strict allowlist (such as everything that is not alphanumeric or white space). If some special characters are still needed, such as white space, wrap each argument in quotes after the escaping/filtering step. Be careful of argument injection (CWE-88).
Mitigation ID: MIT-20
Phase: Implementation
Strategy: Input Validation
Description:
- Inputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
CAPEC-15: Command Delimiters
An attack of this type exploits a programs' vulnerabilities that allows an attacker's commands to be concatenated onto a legitimate command with the intent of targeting other resources such as the file system or database. The system that uses a filter or denylist input validation, as opposed to allowlist validation is vulnerable to an attacker who predicts delimiters (or combinations of delimiters) not present in the filter or denylist. As with other injection attacks, the attacker uses the command delimiter payload as an entry point to tunnel through the application and activate additional attacks through SQL queries, shell commands, network scanning, and so on.