CVE-2023-43123 – Apache Storm: Local Information Disclosure Vulnerability in Storm-core on Unix-Like systems due temporary files
https://notcve.org/view.php?id=CVE-2023-43123
On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method File.createTempFile on unix-like systems creates a file with predefined name (so easily identifiable) and by default will create this file with the permissions -rw-r--r--. Thus, if sensitive information is written to this file, other local users can read this information. File.createTempFile(String, String) will create a temporary file in the system temporary directory if the 'java.io.tmpdir' system property is not explicitly set. This affects the class https://github.com/apache/storm/blob/master/storm-core/src/jvm/org/apache/storm/utils/TopologySpoutLag.java#L99 and was introduced by https://issues.apache.org/jira/browse/STORM-3123 In practice, this has a very limited impact as this class is used only if ui.disable.spout.lag.monitoring is set to false, but its value is true by default. Moreover, the temporary file gets deleted soon after its creation. The solution is to use Files.createTempFile https://docs.oracle.com/en/java/javase/11/docs/api/java.base/java/nio/file/Files.html#createTempFile(java.lang.String,java.lang.String,java.nio.file.attribute.FileAttribute...) instead. We recommend that all users upgrade to the latest version of Apache Storm. • http://www.openwall.com/lists/oss-security/2023/11/23/1 https://lists.apache.org/thread/88oc1vqfjtr29cz5xts0v2wm5pmhbm0l • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2021-40865 – Unsafe Pre-Authentication Deserialization In Workers
https://notcve.org/view.php?id=CVE-2021-40865
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4 Se presenta una vulnerabilidad de deserialización no segura en los servicios de trabajadores del servidor supervisor Apache Storm que permite una ejecución de código remota (RCE) antes de la autenticación. Los usuarios de Apache Storm versiones 2.2.x deben actualizar a la versión 2.2.1 o 2.3.0. • https://github.com/hktalent/CVE-2021-40865 https://lists.apache.org/thread.html/r8d45e74299897b6734dd0f788c46a631009ce2eeb731523386f7a253%40%3Cuser.storm.apache.org%3E https://seclists.org/oss-sec/2021/q4/45 • CWE-502: Deserialization of Untrusted Data •
CVE-2021-38294 – Shell Command Injection Vulnerability in Nimbus Thrift Server
https://notcve.org/view.php?id=CVE-2021-38294
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication. Se presenta una vulnerabilidad de inyección de comandos en el servicio getTopologyHistory de Apache Storm versiones 2.x anteriores a 2.2.1 y Apache Storm versiones 1.x anteriores a 1.2.4. Una petición especialmente diseñada al servidor Nimbus permite una ejecución de código remota (RCE) antes de la autenticación • http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E https://seclists.org/oss-sec/2021/q4/44 https://securitylab.github.com/advisories/GHSL-2021-085-apache-storm • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2009-1807 – BaoFeng - 'config.dll' ActiveX Remote Code Execution
https://notcve.org/view.php?id=CVE-2009-1807
Unspecified vulnerability in Config.dll in Baofeng products 3.09.04.17 and earlier allows remote attackers to execute arbitrary code by calling the SetAttributeValue method, as exploited in the wild in April and May 2009. Vulnerabilidad sin especificar en Config.dll en productos Baofeng v3.09.04.17 y anteriores permite a atacantes remotos ejecutar código de su elección llamando al método SetAttributeValue, como se ha explotado libremente en Abril y Mayo de 2009. • https://www.exploit-db.com/exploits/8757 http://www.cisrt.org/enblog/read.php?245 http://www.vupen.com/english/advisories/2009/1392 •
CVE-2007-4943
https://notcve.org/view.php?id=CVE-2007-4943
Multiple buffer overflows in a certain ActiveX control in sparser.dll in Baofeng Storm 2.8 and earlier allow remote attackers to execute arbitrary code via malformed input in an unknown set of arguments or property values, a different DLL than CVE-2007-4816. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Múltiples desbordamientos de búfer en un cierto controlador ActiveX en sparser.dll en Baofeng Storm 2.8 y anteriores, permiten a atacantes remotos ejecutar código de su elección a través de ciertas entradas mal formadas en un grupo de argumentos desconocido o valores propios, una DLL diferente que CVE-2007-4816. NOTA: la procedencia de esta información es desconocida; los detalles proviene de terceras fuentes de información. • http://www.securityfocus.com/bid/29274 http://www.vupen.com/english/advisories/2007/3111 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •