diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json index a356e1ea9ce..67c4ad96bc0 100644 --- a/2020/1xxx/CVE-2020-1934.json +++ b/2020/1xxx/CVE-2020-1934.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-1934", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@apache.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apache", + "product": { + "product_data": [ + { + "product_name": "Apache HTTP Server", + "version": { + "version_data": [ + { + "version_value": "2.4.0 to 2.4.41" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "mod_proxy_ftp use of uninitialized value" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://httpd.apache.org/security/vulnerabilities_24.html", + "url": "https://httpd.apache.org/security/vulnerabilities_24.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server." } ] } diff --git a/2020/1xxx/CVE-2020-1943.json b/2020/1xxx/CVE-2020-1943.json index a8e1c031f9c..13514ad4cef 100644 --- a/2020/1xxx/CVE-2020-1943.json +++ b/2020/1xxx/CVE-2020-1943.json @@ -11,7 +11,7 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", + "vendor_name": "Apache", "product": { "product_data": [ { @@ -19,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "Apache OFBiz 16.11.01 to 16.11.07" + "version_value": "16.11.01 to 16.11.07" } ] } @@ -55,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks, in Apache OFBiz 16.11.01 to 16.11.07" + "value": "Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07." } ] } diff --git a/2020/5xxx/CVE-2020-5290.json b/2020/5xxx/CVE-2020-5290.json index 2d1ba0667dd..286c415acab 100644 --- a/2020/5xxx/CVE-2020-5290.json +++ b/2020/5xxx/CVE-2020-5290.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "In RedpwnCTF before version 2.3, there is a session fixation vulnerability in exploitable through the `#token=$ssid` hash when making a request to the `/verify` endpoint.\n\n\nAn attacker team could potentially steal flags by, for example, exploiting a stored XSS payload in a CTF challenge so that victim teams who solve the challenge are unknowingly (and against their will) signed into the attacker team's account. Then, the attacker can gain points / value off the backs of the victims.\n\nThis is patched in version 2.3." + "value": "In RedpwnCTF before version 2.3, there is a session fixation vulnerability in exploitable through the `#token=$ssid` hash when making a request to the `/verify` endpoint. An attacker team could potentially steal flags by, for example, exploiting a stored XSS payload in a CTF challenge so that victim teams who solve the challenge are unknowingly (and against their will) signed into the attacker team's account. Then, the attacker can gain points / value off the backs of the victims. This is patched in version 2.3." } ] },