cvelist/2023/32xxx/CVE-2023-32637.json

73 lines
2.3 KiB
JSON
Raw Normal View History

2023-05-11 05:00:41 +00:00
{
2023-07-25 06:00:46 +00:00
"data_version": "4.0",
2023-05-11 05:00:41 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-32637",
2023-07-25 06:00:46 +00:00
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
2023-05-11 05:00:41 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-07-25 06:00:46 +00:00
"value": "** UNSUPPPORTED WHEN ASSIGNED ** GBrowse accepts files with any formats uploaded and places them in the area accessible through unauthenticated web requests. Therefore, anyone who can upload files through the product may execute arbitrary code on the server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Unrestricted Upload of File with Dangerous Type"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Generic Model Organism Database Project",
"product": {
"product_data": [
{
"product_name": "GBrowse",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "unspecified"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://gmod.org/wiki/GBrowse",
"refsource": "MISC",
"name": "http://gmod.org/wiki/GBrowse"
},
{
"url": "https://jbrowse.org/jb2/",
"refsource": "MISC",
"name": "https://jbrowse.org/jb2/"
},
{
"url": "https://jvn.jp/en/jp/JVN35897618/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN35897618/"
2023-05-11 05:00:41 +00:00
}
]
}
}