cvelist/2021/40xxx/CVE-2021-40684.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2021-09-07 22:00:57 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-09-22 17:00:59 +00:00
"ID": "CVE-2021-40684",
"STATE": "PUBLIC"
2021-09-07 22:00:57 +00:00
},
2021-09-22 17:00:59 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-09-07 22:00:57 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-09-22 17:00:59 +00:00
"value": "Talend ESB Runtime in all versions from 5.1 to 7.3.1-R2021-09, 7.2.1-R2021-09, 7.1.1-R2021-09, has an unauthenticated Jolokia HTTP endpoint which allows remote access to the JMX of the runtime container, which would allow an attacker the ability to read or modify the container or software running in the container."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://help.talend.com/r/en-US/7.3/release-notes-esb-products",
"refsource": "MISC",
"name": "https://help.talend.com/r/en-US/7.3/release-notes-esb-products"
},
{
"refsource": "MISC",
"name": "https://jira.talendforge.org/browse/SF-141",
"url": "https://jira.talendforge.org/browse/SF-141"
2021-09-07 22:00:57 +00:00
}
]
}
}