支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 185a4117bce98eff4be11e72492ddeb9531d90a4

来源
关联漏洞
标题:Google protobuf 安全漏洞 (CVE-2021-22569)
Description:Google protobuf是美国谷歌(Google)公司的一种数据交换格式。 Google protobuf java 存在安全漏洞,该漏洞允许一个小的恶意负载可以通过创建大量导致频繁、重复暂停的短期对象来占用解析器几分钟。
Description
A potential Denial of Service issue in protobuf-java high severity GitHub Reviewed Published 5 days ago in protocolbuffers/protobuf • Updated yesterday Vulnerability details Dependabot alerts 2 Package  com.google.protobuf:protobuf-java (maven) Affected versions < 3.16.1 >= 3.18.0, < 3.18.2 >= 3.19.0, < 3.19.2 Patched versions 3.16.1 3.18.2 3.19.2 Package  com.google.protobuf:protobuf-kotlin (maven) Affected versions >= 3.18.0, < 3.18.2 >= 3.19.0, < 3.19.2 Patched versions 3.18.2 3.19.2 Package  google-protobuf (RubyGems) Affected versions < 3.19.2 Patched versions 3.19.2 Description Summary A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data.  Reporter: OSS-Fuzz  Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf "javalite" users (typically Android) are not affected.  Severity CVE-2021-22569 High - CVSS Score: 7.5, An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated GC pauses.  Proof of Concept For reproduction details, please refer to the oss-fuzz issue that identifies the specific inputs that exercise this parsing weakness.  Remediation and Mitigation Please update to the latest available versions of the following packages:  protobuf-java (3.16.1, 3.18.2, 3.19.2) protobuf-kotlin (3.18.2, 3.19.2) google-protobuf [JRuby gem only] (3.19.2) References GHSA-wrvw-hg22-4m67 https://nvd.nist.gov/vuln/detail/CVE-2021-22569 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 https://cloud.google.com/support/bulletins#gcp-2022-001
介绍
# A-potential-Denial-of-Service-issue-in-protobuf-java
A potential Denial of Service issue in protobuf-java high severity GitHub Reviewed Published 5 days ago in protocolbuffers/protobuf • Updated yesterday Vulnerability details Dependabot alerts 2 Package  com.google.protobuf:protobuf-java (maven) Affected versions &lt; 3.16.1 >= 3.18.0, &lt; 3.18.2 >= 3.19.0, &lt; 3.19.2 Patched versions 3.16.1 3.18.2 3.19.2 Package  com.google.protobuf:protobuf-kotlin (maven) Affected versions >= 3.18.0, &lt; 3.18.2 >= 3.19.0, &lt; 3.19.2 Patched versions 3.18.2 3.19.2 Package  google-protobuf (RubyGems) Affected versions &lt; 3.19.2 Patched versions 3.19.2 Description Summary A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data.  Reporter: OSS-Fuzz  Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf "javalite" users (typically Android) are not affected.  Severity CVE-2021-22569 High - CVSS Score: 7.5, An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated GC pauses.  Proof of Concept For reproduction details, please refer to the oss-fuzz issue that identifies the specific inputs that exercise this parsing weakness.  Remediation and Mitigation Please update to the latest available versions of the following packages:  protobuf-java (3.16.1, 3.18.2, 3.19.2) protobuf-kotlin (3.18.2, 3.19.2) google-protobuf [JRuby gem only] (3.19.2) References GHSA-wrvw-hg22-4m67 https://nvd.nist.gov/vuln/detail/CVE-2021-22569 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 https://cloud.google.com/support/bulletins#gcp-2022-001
文件快照

[4.0K] /data/pocs/185a4117bce98eff4be11e72492ddeb9531d90a4 ├── [ 48K] Bazel ├── [3.0K] Bazel project ├── [2.3K] Byteorder ├── [7.1K] Byteorder. ├── [4.2K] ComparingRandomAccessIO.java ├── [3.4K] Convert Java ├── [1.3K] iPhone ios ├── [ 11K] LICENSE ├── [240K] Pyrometa ├── [1.8K] README.md ├── [ 12K] ReadUtil.java ├── [281K] TODO └── [6.3K] WriteUtil.java 0 directories, 13 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。