2024-12-08 03:06:42 +00:00

145 lines
5.2 KiB
JSON

{
"id": "CVE-2019-16214",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-09-11T04:15:11.887",
"lastModified": "2024-11-21T04:30:17.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Libra Core before 2019-09-03 has an erroneous regular expression for inline comments, which makes it easier for attackers to interfere with code auditing by using a nonstandard line-break character for a comment. For example, a Move module author can enter the // sequence (which introduces a single-line comment), followed by very brief comment text, the \\r character, and code that has security-critical functionality. In many popular environments, this code is displayed on a separate line, and thus a reader may infer that the code is executed. However, the code is NOT executed, because language/compiler/ir_to_bytecode/src/parser.rs allows the comment to continue after the \\r character."
},
{
"lang": "es",
"value": "Libra Core antes del 03-09-2019, presenta una expresi\u00f3n regular err\u00f3nea para comentarios en l\u00ednea, lo que hace m\u00e1s f\u00e1cil para que atacantes interfieran con la auditoria del c\u00f3digo mediante el uso de un car\u00e1cter de salto de l\u00ednea no est\u00e1ndar para un comentario. Por ejemplo, un autor del m\u00f3dulo Move puede ingresar la secuencia // (que introduce un comentario de una sola l\u00ednea), seguido por un texto de comentario muy breve, el car\u00e1cter \\r y el c\u00f3digo que posee una funcionalidad cr\u00edtica para la seguridad. En muchos entornos populares, este c\u00f3digo es desplegado en una l\u00ednea separada y, por lo tanto, un lector puede inferir que el c\u00f3digo est\u00e1 ejecutado. Sin embargo, el c\u00f3digo NO se ejecuta, porque el archivo language/compiler/ir_to_bytecode/src/parser.rs permite que el comentario contin\u00fae despu\u00e9s del car\u00e1cter \\r."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libra:libra_core:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2019-09-03",
"matchCriteriaId": "A2E55F3B-1682-470D-83BA-9452A91FBF98"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.openzeppelin.com/libra-vulnerability-release/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://blog.openzeppelin.com/libra-vulnerability-summary/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/libra/libra/commit/7efb0221989f17fdf7f8486730898ed947a1e19e",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://blog.openzeppelin.com/libra-vulnerability-release/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://blog.openzeppelin.com/libra-vulnerability-summary/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/libra/libra/commit/7efb0221989f17fdf7f8486730898ed947a1e19e",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}