more CVE's from failed commit 1008

This commit is contained in:
Kurt Seifried 2018-09-06 09:04:49 -06:00
parent 40b749ec8a
commit 010f2de66c
No known key found for this signature in database
GPG Key ID: F15CADC4A00F8174
11 changed files with 12 additions and 0 deletions

View File

@ -0,0 +1 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.966786", "DATE_REQUESTED": "2018-08-19T14:41:24", "ID": "CVE-2018-1000658", "REQUESTER": "xct@vulndev.io" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LimeSurvey", "version": { "version_data": [ { "version_value": "prior to 3.14.4" } ] } } ] }, "vendor_name": "LimeSurvey" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LimeSurvey version prior to 3.14.4 contains a file upload vulnerability in upload functionality that can result in an attacker gaining code execution via webshell. This attack appear to be exploitable via an authenticated user uploading a zip archive which can contains malicious php files that can be called under certain circumstances. This vulnerability appears to have been fixed in after commit 91d143230eb357260a19c8424b3005deb49a47f7 / version 3.14.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "file upload vulnerabilities" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/LimeSurvey/LimeSurvey/commit/91d143230eb357260a19c8424b3005deb49a47f7" }, { "url": "https://github.com/LimeSurvey/LimeSurvey/commit/20fc85edccc80e7e7f162613542792380c44446a" } ] } }

View File

@ -0,0 +1 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.968273", "DATE_REQUESTED": "2018-08-19T14:48:40", "ID": "CVE-2018-1000659", "REQUESTER": "xct@vulndev.io" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LimeSurvey", "version": { "version_data": [ { "version_value": "3.14.4 and earlier" } ] } } ] }, "vendor_name": "LimeSurvey" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LimeSurvey version 3.14.4 and earlier contains a directory traversal in file upload that allows upload of webshell vulnerability in file upload functionality that can result in remote code execution as authenticated user. This attack appear to be exploitable via An authenticated user can upload a specially crafted zip file to get remote code execution. This vulnerability appears to have been fixed in after commit 72a02ebaaf95a80e26127ee7ee2b123cccce05a7 / version 3.14.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "directory traversal in file upload allows upload of webshell" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/LimeSurvey/LimeSurvey/commit/72a02ebaaf95a80e26127ee7ee2b123cccce05a7" } ] } }

View File

@ -0,0 +1 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.969603", "DATE_REQUESTED": "2018-08-20T08:59:35", "ID": "CVE-2018-1000660", "REQUESTER": "ivanaf@mit.edu" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "TOCK", "version": { "version_data": [ { "version_value": "prior to commit 42f7f36e74088036068d62253e1d8fb26605feed" } ] } } ] }, "vendor_name": "TOCK" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TOCK version prior to commit 42f7f36e74088036068d62253e1d8fb26605feed. For example dfde28196cd12071fcf6669f7654be7df482b85d contains a Insecure Permissions vulnerability in Function get_package_name in the file kernel/src/tbfheader.rs, variable \"pub package_name: &'static str,\" in the file process.rs that can result in A tock capsule (untrusted driver) could access arbitrary memory by using only safe code. This vulnerability appears to have been fixed in commit 42f7f36e74088036068d62253e1d8fb26605feed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insecure Permissions" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/tock/tock/issues/1147" } ] } }

View File

@ -0,0 +1 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.970854", "DATE_REQUESTED": "2018-08-20T09:34:46", "ID": "CVE-2018-1000661", "REQUESTER": "m.dominiak@samsung.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "jsish", "version": { "version_data": [ { "version_value": "2.4.67" } ] } } ] }, "vendor_name": "jsish" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "jsish version 2.4.67 contains a CWE-476: NULL Pointer Dereference vulnerability in Jsi_LogMsg (jsiUtils.c:196) that can result in Crash due to segmentation fault. This attack appear to be exploitable via the victim executing specially crafted javascript code. This vulnerability appears to have been fixed in 2.4.69." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476: NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "url": "https://jsish.org/fossil/jsi/tktview/2adeb066894695b38309d92771aea11c8e0a56a8" } ] } }

View File

@ -0,0 +1,2 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.972937", "DATE_REQUESTED": "2018-08-21T09:40:58", "ID": "CVE-2018-1000663", "REQUESTER": "m.dominiak@samsung.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "jsish", "version": { "version_data": [ { "version_value": "2.4.70 2.047" } ] } } ] }, "vendor_name": "jsish" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "jsish version 2.4.70 2.047 contains a Buffer Overflow vulnerability in function _jsi_evalcode from jsiEval.c that can result in Crash due to segmentation fault. This attack appear to be exploitable via The victim must execute crafted javascript code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "url": "https://jsish.org/fossil/jsi/tktview/c253f6d80c9018d841e857b69e7ad6436ed95cb9" } ] } }

View File

@ -0,0 +1 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.973925", "DATE_REQUESTED": "2018-08-22T00:24:28", "ID": "CVE-2018-1000664", "REQUESTER": "andrewklaus@gmail.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DSub for Subsonic (Android client)", "version": { "version_data": [ { "version_value": "5.4.1" } ] } } ] }, "vendor_name": "daneren2005" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "daneren2005 DSub for Subsonic (Android client) version 5.4.1 contains a CWE-295: Improper Certificate Validation vulnerability in HTTPS Client that can result in Any non-CA signed server certificate, including self signed and expired, are accepted by the client. This attack appear to be exploitable via The victim connects to a server that's MITM/Proxied by an attacker." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295: Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/daneren2005/Subsonic/issues/60" } ] } }

View File

@ -0,0 +1 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.974886", "DATE_REQUESTED": "2018-08-22T22:28:15", "ID": "CVE-2018-1000665", "REQUESTER": "setenforce1@gmail.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Dojo Objective Harness (DOH)", "version": { "version_data": [ { "version_value": "prior to version 1.14" } ] } } ] }, "vendor_name": "Dojo" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dojo Dojo Objective Harness (DOH) version prior to version 1.14 contains a Cross Site Scripting (XSS) vulnerability in unit.html and testsDOH/_base/loader/i18n-exhaustive/i18n-test/unit.html and testsDOH/_base/i18nExhaustive.js in the DOH that can result in Victim attacked through their browser - deliver malware, steal HTTP cookies, bypass CORS trust. This attack appear to be exploitable via Victims are typically lured to a web site under the attacker's control; the XSS vulnerability on the target domain is silently exploited without the victim's knowledge. This vulnerability appears to have been fixed in 1.14." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "url": "https://dojotoolkit.org/blog/dojo-1-14-released" }, { "url": "https://github.com/dojo/dojo/pull/307" } ] } }

View File

@ -0,0 +1 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.976167", "DATE_REQUESTED": "2018-08-23T13:16:42", "ID": "CVE-2018-1000666", "REQUESTER": "v.tyukhmenev@bi.zone" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JumpScale Portal 7", "version": { "version_data": [ { "version_value": "before commit 15443122ed2b1cbfd7bdefc048bf106f075becdb" } ] } } ] }, "vendor_name": " GIG Technology NV" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": " GIG Technology NV JumpScale Portal 7 version before commit 15443122ed2b1cbfd7bdefc048bf106f075becdb contains a CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in method: notifySpaceModification; that can result in Improper validation of parameters results in command execution. This attack appear to be exploitable via Network connectivity, required minimal auth privileges (everyone can register an account). This vulnerability appears to have been fixed in After commit 15443122ed2b1cbfd7bdefc048bf106f075becdb." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" } ] } ] }, "references": { "reference_data": [ { "url": "https://telegra.ph/Description-of-vulnerability-in-JumpScale-Portal-7-08-23" }, { "url": "https://github.com/0-complexity/openvcloud/issues/1207" }, { "url": "https://github.com/jumpscale7/jumpscale_portal/pull/108" }, { "url": "https://github.com/jumpscale7/jumpscale_portal/blob/c997bb1824862b08246d60e34e950df06ebac68c/apps/portalbase/system/system__contentmanager/methodclass/system_contentmanager.py#L293-L315" } ] } }

View File

@ -0,0 +1 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.977309", "DATE_REQUESTED": "2018-08-23T17:49:45", "ID": "CVE-2018-1000667", "REQUESTER": "situlingyun@gmail.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "nasm-2.13.03 nasm- 2.14rc15", "version": { "version_data": [ { "version_value": "2.14rc15 and earlier" } ] } } ] }, "vendor_name": "NASM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NASM nasm-2.13.03 nasm- 2.14rc15 version 2.14rc15 and earlier contains a memory corruption (crashed) of nasm when handling a crafted file due to function assemble_file(inname, depend_ptr) at asm/nasm.c:482. vulnerability in function assemble_file(inname, depend_ptr) at asm/nasm.c:482. that can result in aborting/crash nasm program. This attack appear to be exploitable via a specially crafted asm file.." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "memory corruption (crashed) of nasm when handling a crafted file due to function assemble_file(inname, depend_ptr) at asm/nasm.c:482." } ] } ] }, "references": { "reference_data": [ { "url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392507" }, { "url": "https://github.com/cyrillos/nasm/issues/3" } ] } }

View File

@ -0,0 +1 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.978391", "DATE_REQUESTED": "2018-08-24T10:49:05", "ID": "CVE-2018-1000668", "REQUESTER": "m.dominiak@samsung.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "jsish", "version": { "version_data": [ { "version_value": "2.4.70 2.047" } ] } } ] }, "vendor_name": "jsish" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "jsish version 2.4.70 2.047 contains a CWE-125: Out-of-bounds Read vulnerability in function jsi_ObjArrayLookup (jsiObj.c:274) that can result in Crash due to segmentation fault. This attack appear to be exploitable via The victim must execute crafted javascript code. This vulnerability appears to have been fixed in 2.4.71." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125: Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "url": "https://jsish.org/fossil/jsi/tktview?name=9602dbd997" } ] } }

View File

@ -0,0 +1 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-09-03T16:07:16.971905", "DATE_REQUESTED": "2018-08-20T17:57:40", "ID": "CVE-2018-1000800", "REQUESTER": "situlingyun@gmail.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "zephyr-rtos", "version": { "version_data": [ { "version_value": "1.12.0" } ] } } ] }, "vendor_name": "zephyr-rtos" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call the vulnerable kernel APIs (system sys_ring_buf_get() and sys_ring_buf_put)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL base pointer reference" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/zephyrproject-rtos/zephyr/issues/7638" } ] } }