From 07f8dd0a8fb4fb1994492779593a7c6d8a18d292 Mon Sep 17 00:00:00 2001 From: Pedro Sampaio Date: Tue, 31 Jul 2018 19:03:28 -0300 Subject: [PATCH] CVE-2016-8639 --- 2016/8xxx/CVE-2016-8639.json | 91 +++++++++++++++++++++++++++++------- 1 file changed, 75 insertions(+), 16 deletions(-) diff --git a/2016/8xxx/CVE-2016-8639.json b/2016/8xxx/CVE-2016-8639.json index 356279524bf..d4a40d769e6 100644 --- a/2016/8xxx/CVE-2016-8639.json +++ b/2016/8xxx/CVE-2016-8639.json @@ -1,18 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2016-8639", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2016-8639", + "ASSIGNER": "psampaio@redhat.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "The Foreman Project", + "product": { + "product_data": [ + { + "product_name": "foreman", + "version": { + "version_data": [ + { + "version_value": "1.13.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8639", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8639", + "refsource": "CONFIRM" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code within the web interface." + } + ] + }, + "impact": { + "cvss": [ + [ + { + "vectorString": "6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.0" + } + ], + [ + { + "vectorString": "4.9/AV:N/AC:M/Au:S/C:P/I:P/A:N", + "version": "2.0" + } + ] + ] + } }