cvelist/2020/5xxx/CVE-2020-5910.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2020-01-06 20:01:13 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5910",
2020-07-02 13:01:28 +00:00
"ASSIGNER": "f5sirt@f5.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "NGINX Controller",
"version": {
"version_data": [
{
"version_value": "3.0.0-3.5.0, 2.0.0-2.9.0, 1.0.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "data leakage"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://support.f5.com/csp/article/K59209532",
"url": "https://support.f5.com/csp/article/K59209532"
}
]
2020-01-06 20:01:13 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-07-02 13:01:28 +00:00
"value": "In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized."
2020-01-06 20:01:13 +00:00
}
]
}
}