ALT-PU-2020-3173-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15690
In Nim before 1.2.6, the standard library asyncftpclient lacks a check for whether a message contains a newline character.
- [oss-security] 20210204 [CVE-2020-15690] Nim - stdlib asyncftpd - Crlf Injection
- [oss-security] 20210204 [CVE-2020-15690] Nim - stdlib asyncftpd - Crlf Injection
- https://consensys.net/diligence/vulnerabilities/nim-asyncftpd-crlf-injection/
- https://consensys.net/diligence/vulnerabilities/nim-asyncftpd-crlf-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/asyncftpclient.nim#L145
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/asyncftpclient.nim#L145
- https://github.com/nim-lang/Nim/compare/v1.2.4...v1.2.6
- https://github.com/nim-lang/Nim/compare/v1.2.4...v1.2.6
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2020-15690
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2020-15690
Modified: 2024-11-21
CVE-2020-15692
In Nim 1.2.4, the standard library browsers mishandles the URL argument to browsers.openDefaultBrowser. This argument can be a local file path that will be opened in the default explorer. An attacker can pass one argument to the underlying open command to execute arbitrary registered system commands.
- [oss-security] 20210204 [CVE-2020-15692] Nim - stdlib Browsers - `open` Argument Injection
- [oss-security] 20210204 [CVE-2020-15692] Nim - stdlib Browsers - `open` Argument Injection
- https://consensys.net/diligence/vulnerabilities/nim-browsers-argument-injection/
- https://consensys.net/diligence/vulnerabilities/nim-browsers-argument-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/browsers.nim#L48
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/browsers.nim#L48
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
Modified: 2024-11-21
CVE-2020-15693
In Nim 1.2.4, the standard library httpClient is vulnerable to a CR-LF injection in the target URL. An injection is possible if the attacker controls any part of the URL provided in a call (such as httpClient.get or httpClient.post), the User-Agent header value, or custom HTTP header names or values.
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
- https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/httpclient.nim#L1023
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/httpclient.nim#L1023
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
Modified: 2024-11-21
CVE-2020-15694
In Nim 1.2.4, the standard library httpClient fails to properly validate the server response. For example, httpClient.get().contentLength() does not raise any error if a malicious server provides a negative Content-Length.
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
- https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/httpclient.nim#L241
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/httpclient.nim#L241
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html