"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-04-06 06:00:46 +00:00
parent f53430c0b4
commit 1accb17bc3
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
39 changed files with 557 additions and 248 deletions

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Radius configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The Radius configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4543-98220-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4543-98220-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4543-98220-1.html"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The DNS configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The DNS configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4544-0a409-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4544-0a409-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4544-0a409-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The LDAP configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The LDAP configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4547-88e43-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4547-88e43-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4547-88e43-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The UEFI configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The UEFI configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4548-7a2c6-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4548-7a2c6-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4548-7a2c6-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Media support configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Media support configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4549-c97ba-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4549-c97ba-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4549-c97ba-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Audit log configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Audit log configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4550-5ee8c-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4550-5ee8c-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4550-5ee8c-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Remote video configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Remote video configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4551-5dd2f-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4551-5dd2f-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4551-5dd2f-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Web Service configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The Web Service configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4552-5b2c4-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4552-5b2c4-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4552-5b2c4-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Web License configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Web License configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4553-06ae2-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4553-06ae2-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4553-06ae2-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Active Directory configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The Active Directory configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4554-10a74-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4554-10a74-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4554-10a74-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (ActiveX configuration-1 acquisition) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (ActiveX configuration-1 acquisition) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4555-3c7c3-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4555-3c7c3-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4555-3c7c3-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (ActiveX configuration-2 acquisition) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (ActiveX configuration-2 acquisition) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4556-ece3d-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4556-ece3d-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4556-ece3d-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Generate new SSL certificate) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Generate new SSL certificate) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4557-1019f-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4557-1019f-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4557-1019f-1.html"
}
]
},

View File

@ -5,7 +5,7 @@
"DATE_PUBLIC": "2021-04-06T02:48:00.000Z",
"ID": "CVE-2021-28188",
"STATE": "PUBLIC",
"TITLE": "ASUS BMC's firmware: buffer overflow - Modify users information function"
"TITLE": "ASUS BMC's firmware: buffer overflow - Modify user\u2019s information function"
},
"affects": {
"vendor": {
@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Modify users information function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Modify user\u2019s information function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4558-ad16e-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4558-ad16e-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4558-ad16e-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The SMTP configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The SMTP configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4559-ad2b5-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4559-ad2b5-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4559-ad2b5-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Generate new certificate function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Generate new certificate function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4560-2f01f-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4560-2f01f-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4560-2f01f-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Firmware update function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The Firmware update function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4561-062d0-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4561-062d0-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4561-062d0-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Remote video storage function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Remote video storage function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4562-4b207-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4562-4b207-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4562-4b207-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The SMTP configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The SMTP configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4563-e4092-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4563-e4092-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4563-e4092-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Remote image configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Remote image configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4564-7ef3d-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4564-7ef3d-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4564-7ef3d-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Radius configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The Radius configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4565-59c97-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4565-59c97-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4565-59c97-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Generate SSL certificate function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Generate SSL certificate function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4566-9154b-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4566-9154b-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4566-9154b-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Active Directory configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The Active Directory configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4567-34350-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4567-34350-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4567-34350-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Firmware protocol configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The Firmware protocol configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4568-627f7-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4568-627f7-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4568-627f7-1.html"
}
]
},

View File

@ -5,7 +5,7 @@
"DATE_PUBLIC": "2021-04-06T02:48:00.000Z",
"ID": "CVE-2021-28199",
"STATE": "PUBLIC",
"TITLE": "ASUS BMC's firmware: buffer overflow - Modify users information function"
"TITLE": "ASUS BMC's firmware: buffer overflow - Modify user\u2019s information function"
},
"affects": {
"vendor": {
@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Modify users information function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Modify user\u2019s information function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4569-6b391-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4569-6b391-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4569-6b391-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The CD media configuration function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The CD media configuration function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4570-4d216-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4570-4d216-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4570-4d216-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Service configuration-1 function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The Service configuration-1 function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4571-d454c-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4571-d454c-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4571-d454c-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Service configuration-2 function in ASUS BMCs firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
"value": "The Service configuration-2 function in ASUS BMC\u2019s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4571-d454c-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4571-d454c-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4571-d454c-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Web Set Media Image function in ASUS BMCs firmware Web management page does not filter the specific parameter. As obtaining the administrator permission, remote attackers can launch command injection to execute command arbitrary."
"value": "The Web Set Media Image function in ASUS BMC\u2019s firmware Web management page does not filter the specific parameter. As obtaining the administrator permission, remote attackers can launch command injection to execute command arbitrary."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4573-aa336-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4573-aa336-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4573-aa336-1.html"
}
]
},

View File

@ -5,7 +5,7 @@
"DATE_PUBLIC": "2021-04-06T02:48:00.000Z",
"ID": "CVE-2021-28204",
"STATE": "PUBLIC",
"TITLE": "ASUS BMC's firmware: command injection - Modify users information function"
"TITLE": "ASUS BMC's firmware: command injection - Modify user\u2019s information function"
},
"affects": {
"vendor": {
@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Modify users information function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can launch command injection to execute command arbitrary."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Modify user\u2019s information function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can launch command injection to execute command arbitrary."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4574-b61a6-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4574-b61a6-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4574-b61a6-1.html"
}
]
},

View File

@ -60,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Delete SOL video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Delete SOL video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files."
}
]
},
@ -98,16 +98,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4575-2e32d-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4575-2e32d-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4575-2e32d-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Record video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Record video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4576-422ac-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4576-422ac-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4576-422ac-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Get Help file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Get Help file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4577-60153-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4577-60153-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4577-60153-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Get video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Get video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4578-e5d74-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4578-e5d74-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4578-e5d74-1.html"
}
]
},

View File

@ -468,7 +468,7 @@
"description_data": [
{
"lang": "eng",
"value": "The specific function in ASUS BMCs firmware Web management page (Delete video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files."
"value": "The specific function in ASUS BMC\u2019s firmware Web management page (Delete video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files."
}
]
},
@ -506,16 +506,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-4579-c8827-1.html"
"refsource": "MISC",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/",
"name": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/content/ASUS-Product-Security-Advisory/"
"refsource": "MISC",
"url": "https://www.asus.com/tw/support/callus/",
"name": "https://www.asus.com/tw/support/callus/"
},
{
"refsource": "CONFIRM",
"url": "https://www.asus.com/tw/support/callus/"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-4579-c8827-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-4579-c8827-1.html"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30148",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-30149",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Composr 10.0.36 allows upload and execution of PHP files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/composr-foundation/composr/commit/a71c44e03",
"refsource": "MISC",
"name": "https://gitlab.com/composr-foundation/composr/commit/a71c44e03"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-30150",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Composr 10.0.36 allows XSS in an XML script."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/composr-foundation/composr/commit/833a06466",
"refsource": "MISC",
"name": "https://gitlab.com/composr-foundation/composr/commit/833a06466"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-30151",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/mperham/sidekiq/issues/4852",
"refsource": "MISC",
"name": "https://github.com/mperham/sidekiq/issues/4852"
}
]
}
}