From 293057c7af74e7d4d70ab78e59fcd39fd4562276 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 17 Dec 2020 03:01:42 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/15xxx/CVE-2020-15117.json | 5 +++ 2020/25xxx/CVE-2020-25094.json | 56 ++++++++++++++++++++++++++++++---- 2020/25xxx/CVE-2020-25095.json | 56 ++++++++++++++++++++++++++++++---- 2020/25xxx/CVE-2020-25096.json | 56 ++++++++++++++++++++++++++++++---- 2020/29xxx/CVE-2020-29660.json | 10 ++++++ 2020/29xxx/CVE-2020-29661.json | 10 ++++++ 6 files changed, 175 insertions(+), 18 deletions(-) diff --git a/2020/15xxx/CVE-2020-15117.json b/2020/15xxx/CVE-2020-15117.json index 544e41dd076..6c9446b22da 100644 --- a/2020/15xxx/CVE-2020-15117.json +++ b/2020/15xxx/CVE-2020-15117.json @@ -83,6 +83,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-cc19e88a1f", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VFDEQED64YLWQK2TF73EMXZDYX7YT2DD/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-2ef60a0580", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAQYCMBWNVCIEM27NPIKK3DGJCNBYLAK/" } ] }, diff --git a/2020/25xxx/CVE-2020-25094.json b/2020/25xxx/CVE-2020-25094.json index 8a6ef2c9c15..dc8c38f3331 100644 --- a/2020/25xxx/CVE-2020-25094.json +++ b/2020/25xxx/CVE-2020-25094.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-25094", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-25094", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LogRhythm Platform Manager 7.4.9 allows Command Injection. To exploit this, an attacker can inject arbitrary program names and arguments into a WebSocket. These are forwarded to any remote server with a LogRhythm Smart Response agent installed. By default, the commands are run with LocalSystem privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://cybercx.com.au/blog/2020/12/15/logrhythm-zero-days/", + "url": "https://cybercx.com.au/blog/2020/12/15/logrhythm-zero-days/" } ] } diff --git a/2020/25xxx/CVE-2020-25095.json b/2020/25xxx/CVE-2020-25095.json index a41a1208dbc..521d7f3259d 100644 --- a/2020/25xxx/CVE-2020-25095.json +++ b/2020/25xxx/CVE-2020-25095.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-25095", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-25095", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LogRhythm Platform Manager (PM) 7.4.9 allows CSRF. The Web interface is vulnerable to Cross-site WebSocket Hijacking (CSWH). If a logged-in PM user visits a malicious site in the same browser session, that site can perform a CSRF attack to create a WebSocket from the victim client to the vulnerable PM server. Once the socket is created, the malicious site can interact with the vulnerable web server in the context of the logged-in user. This can include WebSocket payloads that result in command execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://cybercx.com.au/blog/2020/12/15/logrhythm-zero-days/", + "url": "https://cybercx.com.au/blog/2020/12/15/logrhythm-zero-days/" } ] } diff --git a/2020/25xxx/CVE-2020-25096.json b/2020/25xxx/CVE-2020-25096.json index eb8f418dd63..86fba922a4f 100644 --- a/2020/25xxx/CVE-2020-25096.json +++ b/2020/25xxx/CVE-2020-25096.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-25096", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-25096", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LogRhythm Platform Manager (PM) 7.4.9 has Incorrect Access Control. Users within LogRhythm can be delegated different roles and privileges, intended to limit what data and services they can interact with. However, no access control is enforced for WebSocket-based communication to the PM application server, which will forward requests to any configured back-end server, regardless of whether the user's access rights should permit this. As a result, even the most low-privileged user can interact with any back-end component that has a LogRhythm agent installed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://cybercx.com.au/blog/2020/12/15/logrhythm-zero-days/", + "url": "https://cybercx.com.au/blog/2020/12/15/logrhythm-zero-days/" } ] } diff --git a/2020/29xxx/CVE-2020-29660.json b/2020/29xxx/CVE-2020-29660.json index 88e7fb11844..1db854e9e52 100644 --- a/2020/29xxx/CVE-2020-29660.json +++ b/2020/29xxx/CVE-2020-29660.json @@ -61,6 +61,16 @@ "refsource": "MLIST", "name": "[oss-security] 20201210 2 kernel issues", "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-b732958765", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-bc0cc81a7a", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/" } ] } diff --git a/2020/29xxx/CVE-2020-29661.json b/2020/29xxx/CVE-2020-29661.json index eb06233a034..725e79b8f0c 100644 --- a/2020/29xxx/CVE-2020-29661.json +++ b/2020/29xxx/CVE-2020-29661.json @@ -61,6 +61,16 @@ "refsource": "MLIST", "name": "[oss-security] 20201210 2 kernel issues", "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-b732958765", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-bc0cc81a7a", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/" } ] }