{"id":2665,"date":"2023-07-18T18:19:44","date_gmt":"2023-07-18T18:19:44","guid":{"rendered":"https:\/\/devel0pment.de\/?page_id=2665"},"modified":"2024-10-10T06:51:21","modified_gmt":"2024-10-10T06:51:21","slug":"about","status":"publish","type":"page","link":"https:\/\/devel0pment.de\/?page_id=2665","title":{"rendered":"About"},"content":{"rendered":"\n<p>Hi, my name is Stefan Schiller (<a href=\"https:\/\/twitter.com\/scryh_\">@scryh_<\/a>). I have been a computer enthusiasts since my early childhood. Nowadays my main focus of interest is security research.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Discovered Vulnerabilities<\/h2>\n\n\n\n<p>Here is a list of vulnerabilities I discovered in public software:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td><strong>Software<\/strong><\/td><td><strong>Vulnerability<\/strong><\/td><td><strong>Impact<\/strong><\/td><td><strong>CVE<\/strong><\/td><td><strong>Reference <\/strong><\/td><\/tr><tr><td>Overleaf<\/td><td>Argument Injection<\/td><td>Load Arbitrary Dictionary File<\/td><td>CVE-2024-45312<\/td><td><a href=\"https:\/\/github.com\/overleaf\/overleaf\/security\/advisories\/GHSA-pxm4-p454-vppg\">GitHub<\/a><\/td><\/tr><tr><td>Overleaf<\/td><td>Insecure Default Setting<\/td><td>RCE<\/td><td>CVE-2024-45313<\/td><td><a href=\"https:\/\/github.com\/overleaf\/overleaf\/security\/advisories\/GHSA-m95q-g8qg-wgj4\">GitHub<\/a><\/td><\/tr><tr><td>OpenAPI Generator<\/td><td>Unvalidated User Input<\/td><td>Arbitrary File Read \/ Delete<\/td><td>CVE-2024-35219<\/td><td><a href=\"https:\/\/github.com\/OpenAPITools\/openapi-generator\/security\/advisories\/GHSA-g3hr-p86p-593h\">GitHub<\/a><\/td><\/tr><tr><td>Wyze Cam v3<\/td><td>Command Injection<\/td><td>Assisted RCE<\/td><td>CVE-2024-6247<\/td><td><a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-24-838\/\">ZDI-24-838<\/a><\/td><\/tr><tr><td>Joomla<\/td><td>Sanitizer Bypass (Cross-Site Scripting)<\/td><td>Assisted RCE<\/td><td>CVE-2024-21726<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/joomla-multiple-xss-vulnerabilities\/\">Blog<\/a><\/td><\/tr><tr><td>Firefly III<\/td><td>Cross-Site Scripting<\/td><td>Limited by CSP<\/td><td>CVE-2024-22075<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/dangerous-import-sourceforge-patches-critical-code-vulnerability\/\">B<\/a><a href=\"https:\/\/www.sonarsource.com\/blog\/front-end-frameworks-when-bypassing-built-in-sanitization-might-backfire\/\">l<\/a><a href=\"https:\/\/www.sonarsource.com\/blog\/dangerous-import-sourceforge-patches-critical-code-vulnerability\/\">og<\/a><\/td><\/tr><tr><td>Apache Allura (SourceForge)<\/td><td>Logical (Arbitrary File Read)<\/td><td>RCE<\/td><td>CVE-2023-46851<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/dangerous-import-sourceforge-patches-critical-code-vulnerability\/\">Blog<\/a><\/td><\/tr><tr><td>Squidex<\/td><td>Cross-Site Scripting<\/td><td>Assisted RCE<\/td><td>CVE-2023-46252<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/who-are-you-the-importance-of-verifying-message-origins\/\">Blog<\/a><\/td><\/tr><tr><td>Squidex<\/td><td>Path Traversal<\/td><td>RCE<\/td><td>CVE-2023-46253<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/who-are-you-the-importance-of-verifying-message-origins\/\">Blog<\/a><\/td><\/tr><tr><td>JetBrains TeamCity<\/td><td>Authentication Bypass<\/td><td>RCE<\/td><td>CVE-2023-42793<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/teamcity-vulnerability\/\">Blog<\/a><\/td><\/tr><tr><td>DOMSanitizer<\/td><td>Sanitizer Bypass (Cross-Site Scripting)<\/td><td>App Specific<\/td><td>CVE-2023-49146<\/td><td><a href=\"https:\/\/github.com\/rhukster\/dom-sanitizer\/commit\/c2a98f27ad742668b254282ccc5581871d0fb601\">Commit<\/a><\/td><\/tr><tr><td>Apache Guacamole<\/td><td>Use-After-Free<\/td><td>RCE<\/td><td>CVE-2023-30576<\/td><td><a href=\"https:\/\/guacamole.apache.org\/security\/\">Patch Notes<\/a><\/td><\/tr><tr><td>Apache Guacamole<\/td><td>Guacamole Protocol Injection<\/td><td>Information Disclosure, File Read<\/td><td>CVE-2023-30575<\/td><td><a href=\"https:\/\/guacamole.apache.org\/security\/\">Patch Notes<\/a><\/td><\/tr><tr><td>Apache OpenMeetings<\/td><td>Null-Byte Injection<\/td><td>RCE<\/td><td>CVE-2023-29246<\/td><td><a href=\"https:\/\/openmeetings.apache.org\/security.html\">Patch Notes<\/a><\/td><\/tr><tr><td>Apache OpenMeetings<\/td><td>Logical<\/td><td>Auth Bypass<\/td><td>CVE-2023-29032<\/td><td><a href=\"https:\/\/openmeetings.apache.org\/security.html\">Patch Notes<\/a><\/td><\/tr><tr><td>Apache OpenMeetings<\/td><td>Weak Hash Comparison<\/td><td>Auth Bypass<\/td><td>CVE-2023-28936<\/td><td><a href=\"https:\/\/openmeetings.apache.org\/security.html\">Patch Notes<\/a><\/td><\/tr><tr><td>OpenRefine<\/td><td>Zip Slip<\/td><td>Assisted RCE<\/td><td>CVE-2023-37476<\/td><td><a href=\"https:\/\/github.com\/OpenRefine\/OpenRefine\/security\/advisories\/GHSA-m88m-crr9-jvqq\">GitHub<\/a><\/td><\/tr><tr><td>NETGEAR RAX30<\/td><td>Stack-based Buffer Overflow<\/td><td>RCE<\/td><td>CVE-2023-34285<\/td><td><a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-23-839\/\">ZDI-23-839<\/a><\/td><\/tr><tr><td>Pretalx<\/td><td>Path Traversal<\/td><td>Limited File Write<\/td><td>CVE-2023-28458<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference\/\">Blog<\/a><\/td><\/tr><tr><td>Pretalx<\/td><td>Path Traversal<\/td><td>Arbitrary File Read<\/td><td>CVE-2023-28459<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference\/\">Blog<\/a><\/td><\/tr><tr><td>Netdata<\/td><td>Command Injection<\/td><td>RCE<\/td><td>CVE-2023-22496<\/td><td><a href=\"https:\/\/github.com\/netdata\/netdata\/security\/advisories\/GHSA-xg38-3vmw-2978\">GitHub<\/a><\/td><\/tr><tr><td>Netdata<\/td><td>Logical<\/td><td>Auth Bypass<\/td><td>CVE-2023-22497<\/td><td><a href=\"https:\/\/github.com\/netdata\/netdata\/security\/advisories\/GHSA-jx85-39cw-66f2\">GitHub<\/a><\/td><\/tr><tr><td>OpenNMS<\/td><td>Unauthenticated, Stored XSS<\/td><td>Assisted RCE<\/td><td>CVE-2023-0846<\/td><td><a href=\"https:\/\/github.com\/advisories\/GHSA-79jr-8fhm-8wv3\">GitHub<\/a><\/td><\/tr><tr><td>LibreNMS<\/td><td>Unauthenticated, Stored XSS<\/td><td>Assisted RCE<\/td><td>&#8211;<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/it-s-a-snmp-trap-gaining-code-execution-on-librenms\/\">Blog<\/a>, <a href=\"https:\/\/huntr.dev\/bounties\/0c24bb60-4a8f-454f-9534-ba21b7470b55\/\">huntr.dev<\/a><\/td><\/tr><tr><td>Cacti<\/td><td>Logical, Command Injection<\/td><td>RCE<\/td><td>CVE-2022-46169<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/cacti-unauthenticated-remote-code-execution\/\">Blog<\/a>, <a href=\"https:\/\/github.com\/Cacti\/cacti\/security\/advisories\/GHSA-6p93-p743-35gf\">GitHub<\/a><\/td><\/tr><tr><td>NagVis<\/td><td>Type Juggling<\/td><td>Auth Bypass<\/td><td>CVE-2022-3979<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/checkmk-rce-chain-2\/\">Blog<\/a><\/td><\/tr><tr><td>NagVis<\/td><td>Arbitrary File Read<\/td><td>RCE chain<\/td><td>CVE-2022-46945<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/checkmk-rce-chain-3\/\">Blog<\/a><\/td><\/tr><tr><td>Checkmk<\/td><td>Code Injection<\/td><td>RCE chain<\/td><td>CVE-2022-46836<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/checkmk-rce-chain-3\/\">Blog<\/a>, <a href=\"https:\/\/checkmk.com\/werk\/14383\">Patch Notes<\/a><\/td><\/tr><tr><td>Checkmk<\/td><td>Line Feed Injection<\/td><td>RCE chain<\/td><td>CVE-2022-47909<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/checkmk-rce-chain-1\/\">Blog<\/a>, <a href=\"https:\/\/checkmk.com\/werk\/14384\">Patch Notes<\/a><\/td><\/tr><tr><td>Checkmk<\/td><td>Server-Side Request Forgery<\/td><td>RCE chain<\/td><td>CVE-2022-48321<\/td><td><a href=\"https:\/\/www.sonarsource.com\/blog\/checkmk-rce-chain-1\/\">Blog<\/a>, <a href=\"https:\/\/checkmk.com\/werk\/14385\">Patch Notes<\/a><\/td><\/tr><tr><td>Open Web Analytics<\/td><td>Information Disclosure \/ Arbitrary File Write<\/td><td>RCE<\/td><td>CVE-2022-24637<\/td><td><a href=\"https:\/\/devel0pment.de\/?p=2494\">Blog<\/a><\/td><\/tr><tr><td>mpv media player<\/td><td>Format String \/ Heap Overflow<\/td><td>Assisted RCE<\/td><td>CVE-2021-30145<\/td><td><a href=\"https:\/\/devel0pment.de\/?p=2217\">Blog<\/a><\/td><\/tr><tr><td>TeamSpeak 3<\/td><td>Double-Free<\/td><td>DoS<\/td><td>&#8211;<\/td><td><a href=\"https:\/\/community.teamspeak.com\/t\/teamspeak-3-client-3-5-5\/13040\">Patch Notes<\/a><\/td><\/tr><tr><td>AnyDesk<\/td><td>Format String<\/td><td>RCE<\/td><td>CVE-2020-13160<\/td><td><a href=\"https:\/\/devel0pment.de\/?p=1881\">Blog<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Hi, my name is Stefan Schiller (@scryh_). I have been a computer enthusiasts since my early childhood. Nowadays my main focus of interest is security research. Discovered Vulnerabilities Here is a list of vulnerabilities I discovered in public software: Software Vulnerability Impact CVE Reference Overleaf Argument Injection Load Arbitrary Dictionary File CVE-2024-45312 GitHub Overleaf Insecure &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/devel0pment.de\/?page_id=2665\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;About&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2665","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/devel0pment.de\/index.php?rest_route=\/wp\/v2\/pages\/2665"}],"collection":[{"href":"https:\/\/devel0pment.de\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/devel0pment.de\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/devel0pment.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devel0pment.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2665"}],"version-history":[{"count":15,"href":"https:\/\/devel0pment.de\/index.php?rest_route=\/wp\/v2\/pages\/2665\/revisions"}],"predecessor-version":[{"id":2690,"href":"https:\/\/devel0pment.de\/index.php?rest_route=\/wp\/v2\/pages\/2665\/revisions\/2690"}],"wp:attachment":[{"href":"https:\/\/devel0pment.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}