cvelist/2016/2xxx/CVE-2016-2164.json

78 lines
2.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
2018-10-23 15:04:45 -04:00
"ASSIGNER" : "secalert@redhat.com",
2017-10-16 12:31:07 -04:00
"ID" : "CVE-2016-2164",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The (1) FileService.importFileByInternalUserId and (2) FileService.importFile SOAP API methods in Apache OpenMeetings before 3.1.1 improperly use the Java URL class without checking the specified protocol handler, which allows remote attackers to read arbitrary files by attempting to upload a file."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20160325 [CVE-2016-2164] Arbitrary file read via SOAP API",
"refsource" : "BUGTRAQ",
2018-10-09 15:05:48 -04:00
"url" : "http://www.securityfocus.com/archive/1/537887/100/0/threaded"
2017-10-16 12:31:07 -04:00
},
{
"name" : "http://packetstormsecurity.com/files/136434/Apache-OpenMeetings-3.0.7-Arbitary-File-Read.html",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://packetstormsecurity.com/files/136434/Apache-OpenMeetings-3.0.7-Arbitary-File-Read.html"
},
{
"name" : "http://openmeetings.apache.org/security.html",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://openmeetings.apache.org/security.html"
},
{
"name" : "https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG"
}
]
}
}