cvelist/2023/39xxx/CVE-2023-39264.json

95 lines
3.0 KiB
JSON
Raw Normal View History

2023-07-26 16:00:33 +00:00
{
2023-09-06 13:00:33 +00:00
"data_version": "4.0",
2023-07-26 16:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-39264",
2023-09-06 13:00:33 +00:00
"ASSIGNER": "security@apache.org",
"STATE": "PUBLIC"
2023-07-26 16:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-09-06 13:00:33 +00:00
"value": "By default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users.\u00a0This vulnerability exists in Apache Superset versions up to and including 2.1.0."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-209 Generation of Error Message Containing Sensitive Information",
"cweId": "CWE-209"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apache Software Foundation",
"product": {
"product_data": [
{
"product_name": "Apache Superset",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0",
"version_value": "2.1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://lists.apache.org/thread/y65t1of7hb445n86o1vdzjct7rfwlx75",
"refsource": "MISC",
"name": "https://lists.apache.org/thread/y65t1of7hb445n86o1vdzjct7rfwlx75"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Miguel Segovia Gil"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
2023-07-26 16:00:33 +00:00
}
]
}
}