Skip to content
This repository has been archived by the owner on Oct 16, 2024. It is now read-only.

Commit

Permalink
more imgs & organization
Browse files Browse the repository at this point in the history
  • Loading branch information
racheljiang310 committed Jun 5, 2024
1 parent ccdd0f0 commit 7c711dd
Show file tree
Hide file tree
Showing 21 changed files with 153 additions and 118 deletions.
18 changes: 15 additions & 3 deletions content/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,23 @@ description:
layout: single
url: /
---
### A Collection of our Completed CVEXes
This static HUGO website serves as a database of completed CVEXes. These CVEXes were created by the Team of Professors Kruegel & Vigna, with 4 undergraduate researchers affiliated with UCSB's Early Research Scholars Program 2023-2024 cohort.

### What is a CVEX?
CVEX is an executable that runs a software exploit and outputs relevant data in the form of network traffic. Each CVEX is packaged in the form of a Docker container, which has the benefit of being convenient and compatible with any operating system. As a result, CVEXes can be run and analyzed by any person curious to understand the workings of a software vulnerability.

<!-- ![CVEX](./images/cvex.png#center) -->

### Our Mission

#### We aim to extract more information from each CVE vulnerabilitity by tranforming this...

![Before](./images/zoom.png#center)

#### To something like this

![Before](./images/poc.png#center)

### A Collection of our Completed CVEXes
This static HUGO website serves as a database of completed CVEXes. These CVEXes were created by the Team of Professors Kruegel & Vigna, with 4 undergraduate researchers affiliated with UCSB's Early Research Scholars Program 2023-2024 cohort.


*Special thanks to Noah Spahn, Professor Giovanni Vigna, and Professor Christopher Kruegel, and UCSB SecLab.*
File renamed without changes
Binary file added content/images/files.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/images/poc.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/images/poster.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/images/zoom.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
18 changes: 10 additions & 8 deletions content/research.md
Original file line number Diff line number Diff line change
@@ -1,20 +1,22 @@
---
title: About Xplor CVEX
title: About the Problem
description:
layout: single
url: /research/
---

# Problem Statement
Though the CVE framework standardizes historical security vulnerabilities found across various corporations, it does not provide enough information for researchers or other developers to understand the
vulnerability and how it’s exploited from a technical, and practical level. It lacks details ranging from
analyses of port mappings and network traffic to remote code execution scripts, all of which may serve
towards an elevated understanding of security vulnerabilities and exploits for future security patches.
vulnerability and how it’s exploited from a technical standpoint. Oftentimes, the documentation lacks details ranging from
analyses of network traffic, to stack traces, to control flow graphs, to remote code execution scripts, all of which may serve to elevate our understanding of digital security vulnerabilities and exploits for future security patches and protective measures.
Studies have shown that being able to simulate or reproduce a vulnerability is key to a better understanding of each vulnerability, which ultimately results in faster, more efficient patching workflows [2].
Currently, there is no standardized method to reproduce cybersecurity vulnerabilities, nor is there a data
set that links a security vulnerability with an executable to simulate it. Research on this idea is limited
due to its novelty and most disclosed vulnerabilities do not have the depth of information required to effectively rebuild them, whether due to the lack of transparency from the corporations that discovery such
vulnerabilities or its lack of documentation.

![Image](/images/poster.png)

Existing methods to reproduce cybersecurity vulnerabilities remain limited and have yet to be fully standardized and integrated into the CVE historical database.
The implementation for symbolic execution of CVEs requires oftentimes require manual efforts, which can be consuming and expensive to carry out. Various disclosed vulnerabilities oftentimes do not have the depth of information and stack traces required to effectively reproduce the vulnerability, whether its due to the lack of transparency from the corporations that discover them or lack of documentation.

![Image](/images/zoom.png)

Previous attempts to reproduce vulnerabilities have been oriented towards more specific contexts. For instance, Analyzing Vulnerability Reproducibility for the Firefox
Browser [3] primarily targets the analysis and prediction of vulnerabilities within the Firefox browser’s
Expand Down
18 changes: 9 additions & 9 deletions public/404.html
Original file line number Diff line number Diff line change
@@ -1,18 +1,18 @@
<!DOCTYPE html>
<html lang="en">
<head><script src="/livereload.js?mindelay=10&amp;v=2&amp;port=1313&amp;path=livereload" data-no-instant defer></script>
<head><script src="/livereload.js?mindelay=10&amp;v=2&amp;port=62861&amp;path=livereload" data-no-instant defer></script>
<title>404 Page not found :: Common Vulneravilities and Exposures with Exploits</title>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<meta name="description" content="" />
<meta name="keywords" content="" />
<meta name="robots" content="noodp" />
<link rel="canonical" href="http://localhost:1313/404.html" />
<link rel="canonical" href="http://localhost:62861/404.html" />
<meta property="og:locale" content="en" />
<meta property="og:title" content="404 Page not found :: Common Vulneravilities and Exposures with Exploits" />
<meta property="og:description" content="" />
<meta property="og:type" content="website" />
<meta property="og:url" content="http://localhost:1313/404.html" />
<meta property="og:url" content="http://localhost:62861/404.html" />
<meta property="og:site_name" content="Common Vulneravilities and Exposures with Exploits" />
<meta property="og:image" content="" />
<meta property="og:image:width" content="2048" />
Expand All @@ -28,7 +28,7 @@
rel="stylesheet"
/>
<link href="./404.html" rel="alternate" type="application/rss+xml" title="Common Vulneravilities and Exposures with Exploits" />
<link rel="stylesheet" href="http://localhost:1313/styles.css" />
<link rel="stylesheet" href="http://localhost:62861/styles.css" />
</head>

<body>
Expand All @@ -38,7 +38,7 @@
<nav class="navbar">
<div class="navbar__first">
<ul class="navbar__list borders">
<li><a href="http://localhost:1313/">Home</a></li>
<li><a href="http://localhost:62861/">Home</a></li>
<li><a href="./research/">Statement</a></li>
<li><a href="./directoryv1/">CVEX 1.0 Directory</a></li>
<li><a href="./directoryv2/">CVEX 2.0 Directory</a></li>
Expand All @@ -64,20 +64,20 @@
<h1 class="post-title">404 — Page not found...</h1>
</header>
<p>
<a href="http://localhost:1313/">Back to home page&nbsp;→</a>
<a href="http://localhost:62861/">Back to home page&nbsp;→</a>
</p>
</article>
</main>
<footer class="site-footer">
<p class="buildinfo">
<time datetime="2024-06-02 16:42:18 PDT">Site built on: 2024-06-02 16:42:18 PDT</time>
<time datetime="2024-06-05 10:47:09 PDT">Site built on: 2024-06-05 10:47:09 PDT</time>
</p>
<div class="copyright">
<p></p>
<nav class="navbar">
<ul class="navbar__list">
<li><a href="http://localhost:1313/posts/index.xml">RSS</a></li>
<li><a href="http://localhost:1313/sitemap.xml">Sitemap</a></li>
<li><a href="http://localhost:62861/posts/index.xml">RSS</a></li>
<li><a href="http://localhost:62861/sitemap.xml">Sitemap</a></li>
</ul>
</nav>
</div>
Expand Down
18 changes: 9 additions & 9 deletions public/CVEX-2017-1000499/index.html
Original file line number Diff line number Diff line change
@@ -1,21 +1,21 @@
<!DOCTYPE html>
<html lang="en">
<head><script src="/livereload.js?mindelay=10&amp;v=2&amp;port=1313&amp;path=livereload" data-no-instant defer></script>
<head><script src="/livereload.js?mindelay=10&amp;v=2&amp;port=62861&amp;path=livereload" data-no-instant defer></script>
<title>CVEX-2017-1000499 :: Common Vulneravilities and Exposures with Exploits</title>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<meta name="description" content="phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc." />
<meta name="keywords" content="" />
<meta name="robots" content="noodp" />
<link rel="canonical" href="http://localhost:1313/CVEX-2017-1000499/" />
<link rel="canonical" href="http://localhost:62861/CVEX-2017-1000499/" />
<meta property="og:locale" content="en" />
<meta property="og:title" content="CVEX-2017-1000499 :: Common Vulneravilities and Exposures with Exploits" />
<meta property="og:description" content="phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc." />
<meta property="og:type" content="article" />
<meta property="article:published_time" content="2024-05-27 15:34:00 -0700 PDT" />
<meta property="article:modified_time" content="2024-05-27 15:34:00 PDT" />
<meta property="article:author" content="Common Vulneravilities and Exposures with Exploits" />
<meta property="og:url" content="http://localhost:1313/CVEX-2017-1000499/" />
<meta property="og:url" content="http://localhost:62861/CVEX-2017-1000499/" />
<meta property="og:site_name" content="Common Vulneravilities and Exposures with Exploits" />
<meta property="og:image" content="" />
<meta property="og:image:width" content="2048" />
Expand All @@ -31,7 +31,7 @@
rel="stylesheet"
/>
<link href="../CVEX-2017-1000499/" rel="alternate" type="application/rss+xml" title="Common Vulneravilities and Exposures with Exploits" />
<link rel="stylesheet" href="http://localhost:1313/styles.css" />
<link rel="stylesheet" href="http://localhost:62861/styles.css" />
</head>

<body>
Expand All @@ -41,7 +41,7 @@
<nav class="navbar">
<div class="navbar__first">
<ul class="navbar__list borders">
<li><a href="http://localhost:1313/">Home</a></li>
<li><a href="http://localhost:62861/">Home</a></li>
<li><a href="../research/">Statement</a></li>
<li><a href="../directoryv1/">CVEX 1.0 Directory</a></li>
<li><a href="../directoryv2/">CVEX 2.0 Directory</a></li>
Expand All @@ -63,7 +63,7 @@
</header>
<main class="site-main"><article class="post">
<header class="post-header">
<h1 class="post-title"><a href="http://localhost:1313/CVEX-2017-1000499/">CVEX-2017-1000499</a></h1>
<h1 class="post-title"><a href="http://localhost:62861/CVEX-2017-1000499/">CVEX-2017-1000499</a></h1>
<div class="post-meta">
<time pubdate datetime="2024-05-27 15:34:00 PDT">
Published on
Expand All @@ -86,14 +86,14 @@ <h1 class="post-title"><a href="http://localhost:1313/CVEX-2017-1000499/">CVEX-2
</main>
<footer class="site-footer">
<p class="buildinfo">
<time datetime="2024-06-02 16:42:18 PDT">Site built on: 2024-06-02 16:42:18 PDT</time>
<time datetime="2024-06-05 10:47:09 PDT">Site built on: 2024-06-05 10:47:09 PDT</time>
</p>
<div class="copyright">
<p></p>
<nav class="navbar">
<ul class="navbar__list">
<li><a href="http://localhost:1313/posts/index.xml">RSS</a></li>
<li><a href="http://localhost:1313/sitemap.xml">Sitemap</a></li>
<li><a href="http://localhost:62861/posts/index.xml">RSS</a></li>
<li><a href="http://localhost:62861/sitemap.xml">Sitemap</a></li>
</ul>
</nav>
</div>
Expand Down
18 changes: 9 additions & 9 deletions public/CVEX-2023-28155/index.html
Original file line number Diff line number Diff line change
@@ -1,21 +1,21 @@
<!DOCTYPE html>
<html lang="en">
<head><script src="/livereload.js?mindelay=10&amp;v=2&amp;port=1313&amp;path=livereload" data-no-instant defer></script>
<head><script src="/livereload.js?mindelay=10&amp;v=2&amp;port=62861&amp;path=livereload" data-no-instant defer></script>
<title>CVEX-2023-28155 :: Common Vulneravilities and Exposures with Exploits</title>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<meta name="description" content="The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). This vulnerability only affects products that are no longer supported by the maintainer." />
<meta name="keywords" content="" />
<meta name="robots" content="noodp" />
<link rel="canonical" href="http://localhost:1313/CVEX-2023-28155/" />
<link rel="canonical" href="http://localhost:62861/CVEX-2023-28155/" />
<meta property="og:locale" content="en" />
<meta property="og:title" content="CVEX-2023-28155 :: Common Vulneravilities and Exposures with Exploits" />
<meta property="og:description" content="The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). This vulnerability only affects products that are no longer supported by the maintainer." />
<meta property="og:type" content="article" />
<meta property="article:published_time" content="2024-05-27 15:34:00 -0700 PDT" />
<meta property="article:modified_time" content="2024-05-27 15:34:00 PDT" />
<meta property="article:author" content="Common Vulneravilities and Exposures with Exploits" />
<meta property="og:url" content="http://localhost:1313/CVEX-2023-28155/" />
<meta property="og:url" content="http://localhost:62861/CVEX-2023-28155/" />
<meta property="og:site_name" content="Common Vulneravilities and Exposures with Exploits" />
<meta property="og:image" content="" />
<meta property="og:image:width" content="2048" />
Expand All @@ -31,7 +31,7 @@
rel="stylesheet"
/>
<link href="../CVEX-2023-28155/" rel="alternate" type="application/rss+xml" title="Common Vulneravilities and Exposures with Exploits" />
<link rel="stylesheet" href="http://localhost:1313/styles.css" />
<link rel="stylesheet" href="http://localhost:62861/styles.css" />
</head>

<body>
Expand All @@ -41,7 +41,7 @@
<nav class="navbar">
<div class="navbar__first">
<ul class="navbar__list borders">
<li><a href="http://localhost:1313/">Home</a></li>
<li><a href="http://localhost:62861/">Home</a></li>
<li><a href="../research/">Statement</a></li>
<li><a href="../directoryv1/">CVEX 1.0 Directory</a></li>
<li><a href="../directoryv2/">CVEX 2.0 Directory</a></li>
Expand All @@ -63,7 +63,7 @@
</header>
<main class="site-main"><article class="post">
<header class="post-header">
<h1 class="post-title"><a href="http://localhost:1313/CVEX-2023-28155/">CVEX-2023-28155</a></h1>
<h1 class="post-title"><a href="http://localhost:62861/CVEX-2023-28155/">CVEX-2023-28155</a></h1>
<div class="post-meta">
<time pubdate datetime="2024-05-27 15:34:00 PDT">
Published on
Expand All @@ -86,14 +86,14 @@ <h1 class="post-title"><a href="http://localhost:1313/CVEX-2023-28155/">CVEX-202
</main>
<footer class="site-footer">
<p class="buildinfo">
<time datetime="2024-06-02 16:42:18 PDT">Site built on: 2024-06-02 16:42:18 PDT</time>
<time datetime="2024-06-05 10:47:09 PDT">Site built on: 2024-06-05 10:47:09 PDT</time>
</p>
<div class="copyright">
<p></p>
<nav class="navbar">
<ul class="navbar__list">
<li><a href="http://localhost:1313/posts/index.xml">RSS</a></li>
<li><a href="http://localhost:1313/sitemap.xml">Sitemap</a></li>
<li><a href="http://localhost:62861/posts/index.xml">RSS</a></li>
<li><a href="http://localhost:62861/sitemap.xml">Sitemap</a></li>
</ul>
</nav>
</div>
Expand Down
18 changes: 9 additions & 9 deletions public/CVEX-2023-31419/index.html
Original file line number Diff line number Diff line change
@@ -1,21 +1,21 @@
<!DOCTYPE html>
<html lang="en">
<head><script src="/livereload.js?mindelay=10&amp;v=2&amp;port=1313&amp;path=livereload" data-no-instant defer></script>
<head><script src="/livereload.js?mindelay=10&amp;v=2&amp;port=62861&amp;path=livereload" data-no-instant defer></script>
<title>CVEX-2023-31419 :: Common Vulneravilities and Exposures with Exploits</title>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<meta name="description" content="A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service." />
<meta name="keywords" content="" />
<meta name="robots" content="noodp" />
<link rel="canonical" href="http://localhost:1313/CVEX-2023-31419/" />
<link rel="canonical" href="http://localhost:62861/CVEX-2023-31419/" />
<meta property="og:locale" content="en" />
<meta property="og:title" content="CVEX-2023-31419 :: Common Vulneravilities and Exposures with Exploits" />
<meta property="og:description" content="A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service." />
<meta property="og:type" content="article" />
<meta property="article:published_time" content="2024-05-27 15:34:00 -0700 PDT" />
<meta property="article:modified_time" content="2024-05-27 15:34:00 PDT" />
<meta property="article:author" content="Common Vulneravilities and Exposures with Exploits" />
<meta property="og:url" content="http://localhost:1313/CVEX-2023-31419/" />
<meta property="og:url" content="http://localhost:62861/CVEX-2023-31419/" />
<meta property="og:site_name" content="Common Vulneravilities and Exposures with Exploits" />
<meta property="og:image" content="" />
<meta property="og:image:width" content="2048" />
Expand All @@ -31,7 +31,7 @@
rel="stylesheet"
/>
<link href="../CVEX-2023-31419/" rel="alternate" type="application/rss+xml" title="Common Vulneravilities and Exposures with Exploits" />
<link rel="stylesheet" href="http://localhost:1313/styles.css" />
<link rel="stylesheet" href="http://localhost:62861/styles.css" />
</head>

<body>
Expand All @@ -41,7 +41,7 @@
<nav class="navbar">
<div class="navbar__first">
<ul class="navbar__list borders">
<li><a href="http://localhost:1313/">Home</a></li>
<li><a href="http://localhost:62861/">Home</a></li>
<li><a href="../research/">Statement</a></li>
<li><a href="../directoryv1/">CVEX 1.0 Directory</a></li>
<li><a href="../directoryv2/">CVEX 2.0 Directory</a></li>
Expand All @@ -63,7 +63,7 @@
</header>
<main class="site-main"><article class="post">
<header class="post-header">
<h1 class="post-title"><a href="http://localhost:1313/CVEX-2023-31419/">CVEX-2023-31419</a></h1>
<h1 class="post-title"><a href="http://localhost:62861/CVEX-2023-31419/">CVEX-2023-31419</a></h1>
<div class="post-meta">
<time pubdate datetime="2024-05-27 15:34:00 PDT">
Published on
Expand All @@ -86,14 +86,14 @@ <h1 class="post-title"><a href="http://localhost:1313/CVEX-2023-31419/">CVEX-202
</main>
<footer class="site-footer">
<p class="buildinfo">
<time datetime="2024-06-02 16:42:18 PDT">Site built on: 2024-06-02 16:42:18 PDT</time>
<time datetime="2024-06-05 10:47:09 PDT">Site built on: 2024-06-05 10:47:09 PDT</time>
</p>
<div class="copyright">
<p></p>
<nav class="navbar">
<ul class="navbar__list">
<li><a href="http://localhost:1313/posts/index.xml">RSS</a></li>
<li><a href="http://localhost:1313/sitemap.xml">Sitemap</a></li>
<li><a href="http://localhost:62861/posts/index.xml">RSS</a></li>
<li><a href="http://localhost:62861/sitemap.xml">Sitemap</a></li>
</ul>
</nav>
</div>
Expand Down
Loading

0 comments on commit 7c711dd

Please sign in to comment.