cvelist/2020/10xxx/CVE-2020-10235.json

77 lines
2.7 KiB
JSON
Raw Normal View History

2020-03-09 16:01:18 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-10235",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Froxlor before 0.10.14. Remote attackers with access to the installation routine could have executed arbitrary code via the database configuration options that were passed unescaped to exec, because of _backupExistingDatabase in install/lib/class.FroxlorInstall.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Froxlor/Froxlor/commit/7e361274c5bf687b6a42dd1871f6d75506c5d207",
"refsource": "MISC",
"name": "https://github.com/Froxlor/Froxlor/commit/7e361274c5bf687b6a42dd1871f6d75506c5d207"
},
{
"url": "https://github.com/Froxlor/Froxlor/commit/62ce21c9ec393f9962515c88f0c489ace42bf656",
"refsource": "MISC",
"name": "https://github.com/Froxlor/Froxlor/commit/62ce21c9ec393f9962515c88f0c489ace42bf656"
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1165721",
"refsource": "MISC",
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1165721"
},
{
"url": "https://github.com/Froxlor/Froxlor/compare/0.10.13...0.10.14",
"refsource": "MISC",
"name": "https://github.com/Froxlor/Froxlor/compare/0.10.13...0.10.14"
}
]
}
}