cvelist/2020/8xxx/CVE-2020-8656.json

72 lines
2.5 KiB
JSON
Raw Normal View History

2020-02-06 02:01:07 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-02-07 00:01:08 +00:00
"ID": "CVE-2020-8656",
"STATE": "PUBLIC"
2020-02-06 02:01:07 +00:00
},
2020-02-07 00:01:08 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-02-06 02:01:07 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-02-07 00:01:08 +00:00
"value": "An issue was discovered in EyesOfNetwork 5.3. The EyesOfNetwork API 2.4.2 is prone to SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the username field to getApiKey in include/api_functions.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/EyesOfNetworkCommunity/eonapi/issues/16",
"url": "https://github.com/EyesOfNetworkCommunity/eonapi/issues/16"
2020-02-10 17:01:13 +00:00
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html"
2020-03-03 16:01:10 +00:00
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html",
"url": "http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html"
2020-02-06 02:01:07 +00:00
}
]
}
}