From 2a60c1a54a8f51d81036f73f0fc2be251252c807 Mon Sep 17 00:00:00 2001 From: Michael Hess Date: Tue, 1 Jun 2021 18:30:25 -0400 Subject: [PATCH] Update CVE-2020-13663.json --- 2020/13xxx/CVE-2020-13663.json | 150 ++++++++++++++++----------------- 1 file changed, 73 insertions(+), 77 deletions(-) diff --git a/2020/13xxx/CVE-2020-13663.json b/2020/13xxx/CVE-2020-13663.json index ef89294d60e..dea472c9ee6 100644 --- a/2020/13xxx/CVE-2020-13663.json +++ b/2020/13xxx/CVE-2020-13663.json @@ -1,83 +1,79 @@ -{ - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2020-13663", - "ASSIGNER": "security@drupal.org", - "STATE": "RESERVED" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Drupal", - "product": { - "product_data": [ - { - "product_name": "Drupal Core", - "version": { - "version_data": [ - { - "version_name": "7.x", - "version_affected": "<", - "version_value": "7.72", - "platform": "" + + "CVE_data_meta": { + "ASSIGNER": "security@drupal.org", + "ID": "CVE-2020-13663", + "STATE": "RESERVED" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Drupal Core", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.x", + "version_value": "7.72" + }, + { + "version_affected": "<", + "version_name": "8.8.x", + "version_value": "8.8.8" + }, + { + "version_affected": "<", + "version_name": "8.9.x", + "version_value": "8.9.1" + }, + { + "version_affected": "<", + "version_name": "9.0.x", + "version_value": "9.0.1" + } + ] + } + } + ] }, - { - "version_name": "8.8.x", - "version_affected": "<", - "version_value": "8.8.8", - "platform": "" - }, - { - "version_name": "8.9.x", - "version_affected": "<", - "version_value": "8.9.1", - "platform": "" - }, - { - "version_name": "9.0.x", - "version_affected": "<", - "version_value": "9.0.1", - "platform": "" - } - ] + "vendor_name": "Drupal" } - } ] - } } - ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Cross Site Request Forgery" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Cross Site Request Forgery vulnerability in Drupal Coree Form API does not properly handle certain form input from cross-site requests, which can lead to other vulnerabilities.\n\nThis issue affects:\nDrupal Drupal Core\n7.x version 7.72 and prior versions;\n8.8.x version 8.8.8 and prior versions;\n8.9.x version 8.9.1 and prior versions;\n9.0.x version 9.0.1 and prior versions." + } ] - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Cross Site Request Forgery vulnerability in Drupal Coree Form API does not properly handle certain form input from cross-site requests, which can lead to other vulnerabilities.\n\nThis issue affects:\nDrupal Drupal Core\n7.x version 7.72 and prior versions;\n8.8.x version 8.8.8 and prior versions;\n8.9.x version 8.9.1 and prior versions;\n9.0.x version 9.0.1 and prior versions." - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://www.drupal.org/sa-core-2020-004", - "name": "https://www.drupal.org/sa-core-2020-004" - } - ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Request Forgery" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.drupal.org/sa-core-2020-004", + "refsource": "CONFIRM", + "url": "https://www.drupal.org/sa-core-2020-004" + } + ] + } }