From 1406c3b34eb06179610eec973f0566379a78618f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 17 Nov 2020 19:01:49 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/1xxx/CVE-2018-1128.json | 5 ++ 2020/13xxx/CVE-2020-13348.json | 85 +++++++++++++++++++++++++++-- 2020/13xxx/CVE-2020-13349.json | 94 ++++++++++++++++++++++++++++++-- 2020/26xxx/CVE-2020-26405.json | 99 ++++++++++++++++++++++++++++++++-- 2020/27xxx/CVE-2020-27347.json | 12 ++--- 2020/28xxx/CVE-2020-28138.json | 61 ++++++++++++++++++--- 2020/28xxx/CVE-2020-28139.json | 61 ++++++++++++++++++--- 2020/28xxx/CVE-2020-28140.json | 61 ++++++++++++++++++--- 2020/7xxx/CVE-2020-7758.json | 9 ++-- 9 files changed, 446 insertions(+), 41 deletions(-) diff --git a/2018/1xxx/CVE-2018-1128.json b/2018/1xxx/CVE-2018-1128.json index de4f122fd8e..295f63402e9 100644 --- a/2018/1xxx/CVE-2018-1128.json +++ b/2018/1xxx/CVE-2018-1128.json @@ -107,6 +107,11 @@ "refsource": "MLIST", "name": "[oss-security] 20201117 CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost", "url": "http://www.openwall.com/lists/oss-security/2020/11/17/3" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20201117 Re: CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost", + "url": "http://www.openwall.com/lists/oss-security/2020/11/17/4" } ] } diff --git a/2020/13xxx/CVE-2020-13348.json b/2020/13xxx/CVE-2020-13348.json index f58fd2445a2..248be5b4c92 100644 --- a/2020/13xxx/CVE-2020-13348.json +++ b/2020/13xxx/CVE-2020-13348.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-13348", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab EE", + "version": { + "version_data": [ + { + "version_value": ">=10.2, <13.3.9" + }, + { + "version_value": ">=13.4, <13.4.5" + }, + { + "version_value": ">=13.5, <13.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization in GitLab EE" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/246928", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/246928", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13348.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13348.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab EE affecting all versions starting from 10.2. Required CODEOWNERS approval could be bypassed by targeting a branch without the CODEOWNERS file. Affected versions are >=10.2, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13349.json b/2020/13xxx/CVE-2020-13349.json index dc368b46b6d..7a454447861 100644 --- a/2020/13xxx/CVE-2020-13349.json +++ b/2020/13xxx/CVE-2020-13349.json @@ -4,15 +4,101 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-13349", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab EE", + "version": { + "version_data": [ + { + "version_value": ">=8.12" + }, + { + "version_value": "<13.3.9" + }, + { + "version_value": ">=13.4" + }, + { + "version_value": "<13.4.5" + }, + { + "version_value": ">=13.5" + }, + { + "version_value": "<13.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/257497", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/257497", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13349.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13349.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab EE affecting all versions starting from 8.12. A regular expression related to a file path resulted in the Advanced Search feature susceptible to catastrophic backtracking. Affected versions are >=8.12, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2020/26xxx/CVE-2020-26405.json b/2020/26xxx/CVE-2020-26405.json index 19b608ed254..e614c98b851 100644 --- a/2020/26xxx/CVE-2020-26405.json +++ b/2020/26xxx/CVE-2020-26405.json @@ -4,15 +4,106 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-26405", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab CE/EE", + "version": { + "version_data": [ + { + "version_value": ">=12.8" + }, + { + "version_value": "<13.3.9" + }, + { + "version_value": ">=13.4" + }, + { + "version_value": "<13.4.5" + }, + { + "version_value": ">=13.5" + }, + { + "version_value": "<13.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper limitation of a pathname to a restricted directory ('path traversal') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/247371", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/247371", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/835427", + "url": "https://hackerone.com/reports/835427", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26405.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26405.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Path traversal vulnerability in package upload functionality in GitLab CE/EE starting from 12.8 allows an attacker to save packages in arbitrary locations. Affected versions are >=12.8, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks [@vakzz](https://hackerone.com/vakzz) for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2020/27xxx/CVE-2020-27347.json b/2020/27xxx/CVE-2020-27347.json index 6d3d0ce8f37..3b533fc938e 100644 --- a/2020/27xxx/CVE-2020-27347.json +++ b/2020/27xxx/CVE-2020-27347.json @@ -114,15 +114,15 @@ "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2020/11/05/3" }, - { - "refsource": "CONFIRM", - "url": "https://raw.githubusercontent.com/tmux/tmux/3.1c/CHANGES", - "name": "https://raw.githubusercontent.com/tmux/tmux/3.1c/CHANGES" - }, { "refsource": "GENTOO", "name": "GLSA-202011-10", "url": "https://security.gentoo.org/glsa/202011-10" + }, + { + "refsource": "CONFIRM", + "url": "https://raw.githubusercontent.com/tmux/tmux/3.1c/CHANGES", + "name": "https://raw.githubusercontent.com/tmux/tmux/3.1c/CHANGES" } ] }, @@ -130,4 +130,4 @@ "advisory": "https://usn.ubuntu.com/usn/usn-4618-1", "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28138.json b/2020/28xxx/CVE-2020-28138.json index f162367fcff..e923251bf86 100644 --- a/2020/28xxx/CVE-2020-28138.json +++ b/2020/28xxx/CVE-2020-28138.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28138", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28138", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SourceCodester Online Clothing Store 1.0 is affected by a SQL Injection via the txtUserName parameter to login.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.sourcecodester.com/php/14185/online-clothing-store.html", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/php/14185/online-clothing-store.html" + }, + { + "url": "https://www.exploit-db.com/exploits/48429", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/48429" } ] } diff --git a/2020/28xxx/CVE-2020-28139.json b/2020/28xxx/CVE-2020-28139.json index 54a69030a92..b0e8c573bef 100644 --- a/2020/28xxx/CVE-2020-28139.json +++ b/2020/28xxx/CVE-2020-28139.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28139", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28139", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SourceCodester Online Clothing Store 1.0 is affected by a cross-site scripting (XSS) vulnerability via a Offer Detail field in offer.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.sourcecodester.com/php/14185/online-clothing-store.html", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/php/14185/online-clothing-store.html" + }, + { + "url": "https://www.exploit-db.com/exploits/48426", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/48426" } ] } diff --git a/2020/28xxx/CVE-2020-28140.json b/2020/28xxx/CVE-2020-28140.json index e1c707dddcf..8a3c18d1a6e 100644 --- a/2020/28xxx/CVE-2020-28140.json +++ b/2020/28xxx/CVE-2020-28140.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28140", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28140", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SourceCodester Online Clothing Store 1.0 is affected by an arbitrary file upload via the image upload feature of Products.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.sourcecodester.com/php/14185/online-clothing-store.html", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/php/14185/online-clothing-store.html" + }, + { + "url": "https://www.exploit-db.com/exploits/48438", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/48438" } ] } diff --git a/2020/7xxx/CVE-2020-7758.json b/2020/7xxx/CVE-2020-7758.json index 33cf27f01ac..f9275b5646b 100644 --- a/2020/7xxx/CVE-2020-7758.json +++ b/2020/7xxx/CVE-2020-7758.json @@ -13,6 +13,7 @@ "vendor": { "vendor_data": [ { + "vendor_name": "n/a", "product": { "product_data": [ { @@ -20,15 +21,13 @@ "version": { "version_data": [ { - "version_affected": ">=", - "version_value": "0" + "version_value": "before 1.40.2-chrome-stable" } ] } } ] - }, - "vendor_name": "n/a" + } } ] } @@ -68,7 +67,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects all versions of package browserless-chrome. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server." + "value": "This affects versions of package browserless-chrome before 1.40.2-chrome-stable. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server." } ] },