cvelist/2022/1xxx/CVE-2022-1766.json

82 lines
2.8 KiB
JSON
Raw Normal View History

2022-05-17 16:02:15 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"DATE_PUBLIC": "2022-04-29T00:00:00.000Z",
2022-05-17 16:02:15 +00:00
"ID": "CVE-2022-1766",
"STATE": "PUBLIC"
2022-05-17 16:02:15 +00:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Anchore Enterprise",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "4.0.1"
}
]
}
},
{
"product_name": "AnchoreCTL",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "0.1.5"
}
]
}
}
]
},
"vendor_name": "Anchore Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-05-17 16:02:15 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "Anchore Enterprise anchorectl version 0.1.4 improperly stored credentials when generating a Software Bill of Materials. anchorectl will add the credentials used to access Anchore Enterprise API in the Software Bill of Materials (SBOM) generated by anchorectl. Users of anchorectl version 0.1.4 should upgrade to anchorectl version 0.1.5 to resolve this issue."
2022-05-17 16:02:15 +00:00
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-522: Insufficiently Protected Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://docs.anchore.com/current/docs/releasenotes/401/",
"refsource": "CONFIRM",
"url": "https://docs.anchore.com/current/docs/releasenotes/401/"
}
]
},
"source": {
"discovery": "UNKNOWN"
2022-05-17 16:02:15 +00:00
}
}