From 33adaada95e09a0d72fcf6d6c122feb73a67a4c3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 8 Jan 2024 14:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/51xxx/CVE-2023-51701.json | 81 ++++++++++++++++++++++++++++++-- 2023/7xxx/CVE-2023-7224.json | 55 ++++++++++++++++++++-- 2024/0xxx/CVE-2024-0323.json | 18 +++++++ 2024/21xxx/CVE-2024-21644.json | 81 ++++++++++++++++++++++++++++++-- 2024/21xxx/CVE-2024-21645.json | 81 ++++++++++++++++++++++++++++++-- 2024/21xxx/CVE-2024-21647.json | 85 ++++++++++++++++++++++++++++++++-- 6 files changed, 381 insertions(+), 20 deletions(-) create mode 100644 2024/0xxx/CVE-2024-0323.json diff --git a/2023/51xxx/CVE-2023-51701.json b/2023/51xxx/CVE-2023-51701.json index bb6a77e4e27..19d511d90d1 100644 --- a/2023/51xxx/CVE-2023-51701.json +++ b/2023/51xxx/CVE-2023-51701.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-51701", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. A reverse proxy server built with `@fastify/reply-from` could misinterpret the incoming body by passing an header `ContentType: application/json ; charset=utf-8`. This can lead to bypass of security checks. This vulnerability has been patched in '@fastify/reply-from` version 9.6.0. \n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", + "cweId": "CWE-444" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "fastify", + "product": { + "product_data": [ + { + "product_name": "fastify-reply-from", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 9.6.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-v2v2-hph8-q5xp", + "refsource": "MISC", + "name": "https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-v2v2-hph8-q5xp" + }, + { + "url": "https://github.com/fastify/fastify-reply-from/releases/tag/v9.6.0", + "refsource": "MISC", + "name": "https://github.com/fastify/fastify-reply-from/releases/tag/v9.6.0" + } + ] + }, + "source": { + "advisory": "GHSA-v2v2-hph8-q5xp", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/7xxx/CVE-2023-7224.json b/2023/7xxx/CVE-2023-7224.json index 884b637f0b3..15075656055 100644 --- a/2023/7xxx/CVE-2023-7224.json +++ b/2023/7xxx/CVE-2023-7224.json @@ -1,17 +1,64 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-7224", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@openvpn.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')", + "cweId": "CWE-95" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenVPN", + "product": { + "product_data": [ + { + "product_name": "OpenVPN Connect", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "3.0", + "version_value": "3.4.6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/", + "refsource": "MISC", + "name": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/" } ] } diff --git a/2024/0xxx/CVE-2024-0323.json b/2024/0xxx/CVE-2024-0323.json new file mode 100644 index 00000000000..0463d7dc6df --- /dev/null +++ b/2024/0xxx/CVE-2024-0323.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0323", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/21xxx/CVE-2024-21644.json b/2024/21xxx/CVE-2024-21644.json index 87daad1a114..17465da0a4f 100644 --- a/2024/21xxx/CVE-2024-21644.json +++ b/2024/21xxx/CVE-2024-21644.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-21644", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284: Improper Access Control", + "cweId": "CWE-284" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "pyload", + "product": { + "product_data": [ + { + "product_name": "pyload", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 0.5.0b3.dev77" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv", + "refsource": "MISC", + "name": "https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv" + }, + { + "url": "https://github.com/pyload/pyload/commit/bb22063a875ffeca357aaf6e2edcd09705688c40", + "refsource": "MISC", + "name": "https://github.com/pyload/pyload/commit/bb22063a875ffeca357aaf6e2edcd09705688c40" + } + ] + }, + "source": { + "advisory": "GHSA-mqpq-2p68-46fv", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/21xxx/CVE-2024-21645.json b/2024/21xxx/CVE-2024-21645.json index a2280fba15c..c35e75e8a89 100644 --- a/2024/21xxx/CVE-2024-21645.json +++ b/2024/21xxx/CVE-2024-21645.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-21645", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be used to cover an attacker\u2019s tracks or even to implicate another party in the commission of a malicious act. This vulnerability has been patched in version 0.5.0b3.dev77.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "pyload", + "product": { + "product_data": [ + { + "product_name": "pyload", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 0.5.0b3.dev77" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr", + "refsource": "MISC", + "name": "https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr" + }, + { + "url": "https://github.com/pyload/pyload/commit/4159a1191ec4fe6d927e57a9c4bb8f54e16c381d", + "refsource": "MISC", + "name": "https://github.com/pyload/pyload/commit/4159a1191ec4fe6d927e57a9c4bb8f54e16c381d" + } + ] + }, + "source": { + "advisory": "GHSA-ghmw-rwh8-6qmr", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/21xxx/CVE-2024-21647.json b/2024/21xxx/CVE-2024-21647.json index b867cae88a7..109367139fb 100644 --- a/2024/21xxx/CVE-2024-21647.json +++ b/2024/21xxx/CVE-2024-21647.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-21647", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies in a way that allowed HTTP request smuggling. Fixed versions limits the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. This vulnerability has been fixed in versions 6.4.2 and 5.6.8.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", + "cweId": "CWE-444" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "puma", + "product": { + "product_data": [ + { + "product_name": "puma", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 5.6.8" + }, + { + "version_affected": "=", + "version_value": ">= 6.0.0, < 6.4.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/puma/puma/security/advisories/GHSA-c2f4-cvqm-65w2", + "refsource": "MISC", + "name": "https://github.com/puma/puma/security/advisories/GHSA-c2f4-cvqm-65w2" + }, + { + "url": "https://github.com/puma/puma/commit/5fc43d73b6ff193325e657a24ed76dec79133e93", + "refsource": "MISC", + "name": "https://github.com/puma/puma/commit/5fc43d73b6ff193325e657a24ed76dec79133e93" + } + ] + }, + "source": { + "advisory": "GHSA-c2f4-cvqm-65w2", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] }