CVE-2021-25985 – FactorJS - Insufficient Session Expiration Leads to a Local Account Takeover
https://notcve.org/view.php?id=CVE-2021-25985
In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover. En Factor (App Framework & Headless CMS) versiones v1.0.4 a v1.8.30, invalida inapropiadamente la sesión de un usuario incluso después de que éste cierre la sesión de la aplicación. Además, las sesiones de usuarios se guardan en el almacenamiento local del navegador, que por defecto no presenta un tiempo de caducidad. • https://github.com/FactorJS/factor/blob/v1.8.30/%40factor/user/util.ts#L65 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985 • CWE-613: Insufficient Session Expiration •
CVE-2021-25984 – FactorJS - Stored Cross-Site Scripting (XSS) in Post Reply Functionality
https://notcve.org/view.php?id=CVE-2021-25984
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.3 to v1.8.30, are vulnerable to stored Cross-Site Scripting (XSS) at the “post reply” section. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies. En Factor (App Framework & Headless CMS) forum plugin, versiones v1.3.3 a v1.8.30, son vulnerables a un ataque de tipo Cross-Site Scripting (XSS) almacenado en la sección "post reply". Un atacante no autenticado puede ejecutar código JavaScript malicioso y robar las cookies de sesión • https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-reply.vue#L119 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25984 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-25983 – FactorJS - Reflected Cross-Site Scripting (XSS) in Tags and Categories Functionality
https://notcve.org/view.php?id=CVE-2021-25983
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies. En Factor (App Framework & Headless CMS) forum plugin, versiones v1.3.8 a v1.8.30, son vulnerables a un ataque de tipo Cross-Site Scripting (XSS) reflejado en los parámetros "tags" y "category" de la URL. Un atacante no autenticado puede ejecutar código JavaScript malicioso y robar las cookies de sesión • https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-list.vue#L141-L143 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25983 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-25982 – FactorJS - Reflected Cross-Site Scripting (XSS) in Search Functionality
https://notcve.org/view.php?id=CVE-2021-25982
In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies. En Factor (App Framework & Headless CMS) forum plugin, versiones 1.3.5 a 1.8.30, es vulnerable a un ataque de tipo Cross-Site Scripting (XSS) reflejado en el parámetro "search" de la URL. Un atacante no autenticado puede ejecutar código JavaScript malicioso y robar las cookies de sesión • https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-list.vue#L139 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25982 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2008-1148
https://notcve.org/view.php?id=CVE-2008-1148
A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka "Algorithm A0"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting. Cierto algoritmo generador de números pseudo-aleatorios(PRNG) que usa ADD con 0 saltos aleatorios(también conocido como "algoritmo A0"), usado en OpenBSD de la v3.5 a la 4.2 y NetBSD v1.6.2 a la 4.0, permite a atacantes remotos adivinar datos sensibles como (1)los IDs de una transacción DNS, (2)IDs de una fragmentación IP observando una secuencias generadas previamente. NOTA: este fallo puede ser aprovechado por ataques como el envenenamiento de la cachés DNS, la inyección de paquetes TCP y OS fingerprinting. • http://secunia.com/advisories/28819 http://www.securiteam.com/securityreviews/5PP0H0UNGW.html http://www.securityfocus.com/archive/1/487658 http://www.securityfocus.com/bid/27647 http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/40329 https://exchange.xforce.ibmcloud.com/vulnerabilities/41157 •