cvelist/2020/35xxx/CVE-2020-35577.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2020-12-20 06:01:43 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-02-18 14:00:39 +00:00
"ID": "CVE-2020-35577",
"STATE": "PUBLIC"
2020-12-20 06:01:43 +00:00
},
2021-02-18 14:00:39 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-12-20 06:01:43 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-02-18 14:00:39 +00:00
"value": "In Endalia Selection Portal before 4.205.0, an Insecure Direct Object Reference (IDOR) allows any authenticated user to download every file uploaded to the platform by changing the value of the file identifier (aka CommonDownload identification number)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.endalia.com/en/software/",
"refsource": "MISC",
"name": "https://www.endalia.com/en/software/"
},
{
"refsource": "MISC",
"name": "https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-35577",
"url": "https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-35577"
2020-12-20 06:01:43 +00:00
}
]
}
}