CVE-2023-41387
https://notcve.org/view.php?id=CVE-2023-41387
A SQL injection in the flutter_downloader component through 1.11.1 for iOS allows remote attackers to steal session tokens and overwrite arbitrary files inside the app's container. The internal database of the framework is exposed to the local user if an app uses UIFileSharingEnabled and LSSupportsOpeningDocumentsInPlace properties. As a result, local users can obtain the same attack primitives as remote attackers by tampering with the internal database of the framework on the device. Una inyección SQL en el componente flutter_downloader versión 1.11.1 para iOS permite a los atacantes remotos robar tokens de sesión y sobrescribir archivos arbitrarios dentro del contenedor de la aplicación. La base de datos interna del framework se expone al usuario local si una aplicación usa las propiedades UIFileSharingEnabled y LSSupportsOpeningDocumentsInPlace. • https://pub.dev/packages/flutter_downloader/changelog https://seredynski.com/articles/exploiting-ios-apps-to-extract-session-tokens-and-overwrite-user-data • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-40442
https://notcve.org/view.php?id=CVE-2023-40442
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Monterey 12.6.8. An app may be able to read sensitive location information. Se solucionó un problema de privacidad mejorando la redacción de datos privados para las entradas de logs. Este problema se solucionó en macOS Big Sur 11.7.9, iOS 15.7.8 y iPadOS 15.7.8, macOS Monterey 12.6.8. • https://support.apple.com/en-us/HT213842 https://support.apple.com/en-us/HT213844 https://support.apple.com/en-us/HT213845 https://support.apple.com/kb/HT213841 • CWE-532: Insertion of Sensitive Information into Log File •
CVE-2023-41990 – Apple Multiple Products Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-41990
The issue was addressed with improved handling of caches. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1. El problema se solucionó mejorando el manejo de los cachés. • https://support.apple.com/en-us/HT213599 https://support.apple.com/en-us/HT213601 https://support.apple.com/en-us/HT213605 https://support.apple.com/en-us/HT213606 https://support.apple.com/en-us/HT213842 https://support.apple.com/en-us/HT213844 https://support.apple.com/en-us/HT213845 •
CVE-2023-41064 – Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2023-41064
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Se solucionó un problema de Desbordamiento de Búfer de manejo de la memoria mejorada. • https://github.com/alsaeroth/CVE-2023-41064-POC https://github.com/MrR0b0t19/CVE-2023-41064 https://github.com/MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064 https://github.com/sarsaeroth/CVE-2023-41064-POC http://www.openwall.com/lists/oss-security/2023/09/21/4 https://support.apple.com/en-us/HT213905 https://support.apple.com/en-us/HT213906 https://support.apple.com/en-us/HT213913 https://support.apple.com/en-us/HT213914 https://support.apple.com/en-us/HT213915 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-41061 – Apple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-41061
A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Se solucionó el problema de validación con una lógica mejorada. • http://seclists.org/fulldisclosure/2023/Sep/4 http://seclists.org/fulldisclosure/2023/Sep/5 https://support.apple.com/en-us/HT213905 https://support.apple.com/en-us/HT213907 https://support.apple.com/kb/HT213905 https://support.apple.com/kb/HT213907 • CWE-20: Improper Input Validation •