"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-05-28 22:00:34 +00:00
parent f42d870034
commit 2d57f711eb
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
2 changed files with 156 additions and 10 deletions

View File

@ -1,17 +1,114 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-4336",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in ITRS Group monitor-ninja up to 2021.11.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file modules/reports/models/scheduled_reports.php. The manipulation leads to sql injection. Upgrading to version 2021.11.30 is able to address this issue. The name of the patch is 6da9080faec9bca1ca5342386c0421dca0a6c0cc. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230084."
},
{
"lang": "deu",
"value": "Eine kritische Schwachstelle wurde in ITRS Group monitor-ninja bis 2021.11.1 ausgemacht. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei modules/reports/models/scheduled_reports.php. Durch Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 2021.11.30 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 6da9080faec9bca1ca5342386c0421dca0a6c0cc bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ITRS Group",
"product": {
"product_data": [
{
"product_name": "monitor-ninja",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2021.11.0"
},
{
"version_affected": "=",
"version_value": "2021.11.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.230084",
"refsource": "MISC",
"name": "https://vuldb.com/?id.230084"
},
{
"url": "https://vuldb.com/?ctiid.230084",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.230084"
},
{
"url": "https://github.com/ITRS-Group/monitor-ninja/commit/6da9080faec9bca1ca5342386c0421dca0a6c0cc",
"refsource": "MISC",
"name": "https://github.com/ITRS-Group/monitor-ninja/commit/6da9080faec9bca1ca5342386c0421dca0a6c0cc"
},
{
"url": "https://github.com/ITRS-Group/monitor-ninja/releases/tag/v2021.11.30",
"refsource": "MISC",
"name": "https://github.com/ITRS-Group/monitor-ninja/releases/tag/v2021.11.30"
}
]
},
"credits": [
{
"lang": "en",
"value": "VulDB GitHub Commit Analyzer"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.5,
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.5,
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5.2,
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
"baseSeverity": "MEDIUM"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-33291",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-33291",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In ebankIT 6, the public endpoints /public/token/Email/generate and /public/token/SMS/generate allow generation of OTP messages to any e-mail address or phone number without validation. (It cannot be exploited with e-mail addresses or phone numbers that are registered in the application.)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.ebankit.com/digital-banking-platform",
"refsource": "MISC",
"name": "https://www.ebankit.com/digital-banking-platform"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/172476/eBankIT-6-Arbitrary-OTP-Generation.html",
"url": "http://packetstormsecurity.com/files/172476/eBankIT-6-Arbitrary-OTP-Generation.html"
}
]
}