cvelist/2021/20xxx/CVE-2021-20672.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2020-12-17 22:01:53 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20672",
2021-03-10 10:00:45 +00:00
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
2021-03-10 18:12:35 +09:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI (v4.2 Series)",
"version": {
"version_data": [
{
"version_value": "versions from v4.2.0 to v4.2.7"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
2021-03-10 10:00:45 +00:00
"url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/",
"refsource": "MISC",
"name": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/"
2021-03-10 18:12:35 +09:00
},
{
2021-03-10 10:00:45 +00:00
"url": "https://jvn.jp/en/jp/JVN86438134/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN86438134/index.html"
2021-03-10 18:12:35 +09:00
}
]
2020-12-17 22:01:53 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2021-03-10 18:12:35 +09:00
"value": "Reflected cross-site scripting vulnerability due to insufficient verification of URL query parameters in GROWI (v4.2 Series) versions from v4.2.0 to v4.2.7 allows remote attackers to inject an arbitrary script via unspecified vectors."
2020-12-17 22:01:53 +00:00
}
]
}
}