From 379093ea8b284dd00d478d91e429ac67bcd19c51 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 6 Feb 2025 19:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/57xxx/CVE-2024-57523.json | 61 +++++++++++++++++++--- 2024/57xxx/CVE-2024-57668.json | 61 +++++++++++++++++++--- 2024/57xxx/CVE-2024-57968.json | 5 ++ 2025/22xxx/CVE-2025-22992.json | 56 +++++++++++++++++--- 2025/24xxx/CVE-2025-24786.json | 95 ++++++++++++++++++++++++++++++++-- 2025/24xxx/CVE-2025-24787.json | 81 +++++++++++++++++++++++++++-- 2025/25xxx/CVE-2025-25181.json | 5 ++ 7 files changed, 338 insertions(+), 26 deletions(-) diff --git a/2024/57xxx/CVE-2024-57523.json b/2024/57xxx/CVE-2024-57523.json index 219f7629289..048fdc05d66 100644 --- a/2024/57xxx/CVE-2024-57523.json +++ b/2024/57xxx/CVE-2024-57523.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57523", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57523", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Request Forgery (CSRF) in Users.php in SourceCodester Packers and Movers Management System 1.0 allows attackers to create unauthorized admin accounts via crafted requests sent to an authenticated admin user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://sourcecodester.com", + "refsource": "MISC", + "name": "http://sourcecodester.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/HackWidMaddy/CVE-2024-57523.", + "url": "https://github.com/HackWidMaddy/CVE-2024-57523." } ] } diff --git a/2024/57xxx/CVE-2024-57668.json b/2024/57xxx/CVE-2024-57668.json index 7733e0355c6..33d74ea156e 100644 --- a/2024/57xxx/CVE-2024-57668.json +++ b/2024/57xxx/CVE-2024-57668.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-57668", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-57668", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Code-projects Shopping Portal v1.0, the insert-product.php page has an arbitrary file upload vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://code-projects.org/shopping-portal-using-php-source-code/", + "refsource": "MISC", + "name": "https://code-projects.org/shopping-portal-using-php-source-code/" + }, + { + "refsource": "MISC", + "name": "https://github.com/passevery/vul/issues/1", + "url": "https://github.com/passevery/vul/issues/1" } ] } diff --git a/2024/57xxx/CVE-2024-57968.json b/2024/57xxx/CVE-2024-57968.json index b0c89ef6631..bb787577358 100644 --- a/2024/57xxx/CVE-2024-57968.json +++ b/2024/57xxx/CVE-2024-57968.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://intezer.com/blog/research/xe-group-exploiting-zero-days/", "url": "https://intezer.com/blog/research/xe-group-exploiting-zero-days/" + }, + { + "refsource": "MISC", + "name": "https://www.solissecurity.com/en-us/insights/xe-group-from-credit-card-skimming-to-exploiting-zero-days/", + "url": "https://www.solissecurity.com/en-us/insights/xe-group-from-credit-card-skimming-to-exploiting-zero-days/" } ] } diff --git a/2025/22xxx/CVE-2025-22992.json b/2025/22xxx/CVE-2025-22992.json index a0e7162866b..b679be94b7c 100644 --- a/2025/22xxx/CVE-2025-22992.json +++ b/2025/22xxx/CVE-2025-22992.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-22992", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-22992", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A SQL Injection vulnerability exists in the /feed/insert.json endpoint of the Emoncms project >= 11.6.9. The vulnerability is caused by improper handling of user-supplied input in the data query parameter, allowing attackers to execute arbitrary SQL commands under specific conditions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/emoncms/emoncms/issues/1916", + "url": "https://github.com/emoncms/emoncms/issues/1916" } ] } diff --git a/2025/24xxx/CVE-2025-24786.json b/2025/24xxx/CVE-2025-24786.json index e7e22367690..2d6054beb4f 100644 --- a/2025/24xxx/CVE-2025-24786.json +++ b/2025/24xxx/CVE-2025-24786.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-24786", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WhoDB is an open source database management tool. While the application only displays Sqlite3 databases present in the directory `/db`, there is no path traversal prevention in place. This allows an unauthenticated attacker to open any Sqlite3 database present on the host machine that the application is running on. Affected versions of WhoDB allow users to connect to Sqlite3 databases. By default, the databases must be present in `/db/` (or alternatively `./tmp/` if development mode is enabled). If no databases are present in the default directory, the UI indicates that the user is unable to open any databases. The database file is an user-controlled value. This value is used in `.Join()` with the default directory, in order to get the full path of the database file to open. No checks are performed whether the database file that is eventually opened actually resides in the default directory `/db`. This allows an attacker to use path traversal (`../../`) in order to open any Sqlite3 database present on the system. This issue has been addressed in version 0.45.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-35: Path Traversal: '.../...//'", + "cweId": "CWE-35" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "clidey", + "product": { + "product_data": [ + { + "product_name": "whodb", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 0.45.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/clidey/whodb/security/advisories/GHSA-9r4c-jwx3-3j76", + "refsource": "MISC", + "name": "https://github.com/clidey/whodb/security/advisories/GHSA-9r4c-jwx3-3j76" + }, + { + "url": "https://github.com/clidey/whodb/blob/ba6eb81d0ca40baead74bca58b2567166999d6a6/core/src/plugins/sqlite3/db.go#L14-L20", + "refsource": "MISC", + "name": "https://github.com/clidey/whodb/blob/ba6eb81d0ca40baead74bca58b2567166999d6a6/core/src/plugins/sqlite3/db.go#L14-L20" + }, + { + "url": "https://github.com/clidey/whodb/blob/ba6eb81d0ca40baead74bca58b2567166999d6a6/core/src/plugins/sqlite3/db.go#L26", + "refsource": "MISC", + "name": "https://github.com/clidey/whodb/blob/ba6eb81d0ca40baead74bca58b2567166999d6a6/core/src/plugins/sqlite3/db.go#L26" + } + ] + }, + "source": { + "advisory": "GHSA-9r4c-jwx3-3j76", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 10, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "version": "3.1" } ] } diff --git a/2025/24xxx/CVE-2025-24787.json b/2025/24xxx/CVE-2025-24787.json index b86e22e0871..c6c3272a486 100644 --- a/2025/24xxx/CVE-2025-24787.json +++ b/2025/24xxx/CVE-2025-24787.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-24787", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WhoDB is an open source database management tool. In affected versions the application is vulnerable to parameter injection in database connection strings, which allows an attacker to read local files on the machine the application is running on. The application uses string concatenation to build database connection URIs which are then passed to corresponding libraries responsible for setting up the database connections. This string concatenation is done unsafely and without escaping or encoding the user input. This allows an user, in many cases, to inject arbitrary parameters into the URI string. These parameters can be potentially dangerous depending on the libraries used. One of these dangerous parameters is `allowAllFiles` in the library `github.com/go-sql-driver/mysql`. Should this be set to `true`, the library enables running the `LOAD DATA LOCAL INFILE` query on any file on the host machine (in this case, the machine that WhoDB is running on). By injecting `&allowAllFiles=true` into the connection URI and connecting to any MySQL server (such as an attacker-controlled one), the attacker is able to read local files. This issue has been addressed in version 0.45.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-943: Improper Neutralization of Special Elements in Data Query Logic", + "cweId": "CWE-943" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "clidey", + "product": { + "product_data": [ + { + "product_name": "whodb", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 0.45.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/clidey/whodb/security/advisories/GHSA-c7w4-9wv8-7x7c", + "refsource": "MISC", + "name": "https://github.com/clidey/whodb/security/advisories/GHSA-c7w4-9wv8-7x7c" + }, + { + "url": "https://github.com/go-sql-driver/mysql/blob/7403860363ca112af503b4612568c3096fecb466/infile.go#L128", + "refsource": "MISC", + "name": "https://github.com/go-sql-driver/mysql/blob/7403860363ca112af503b4612568c3096fecb466/infile.go#L128" + } + ] + }, + "source": { + "advisory": "GHSA-c7w4-9wv8-7x7c", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2025/25xxx/CVE-2025-25181.json b/2025/25xxx/CVE-2025-25181.json index 491702e2bfd..b0476475b6f 100644 --- a/2025/25xxx/CVE-2025-25181.json +++ b/2025/25xxx/CVE-2025-25181.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://intezer.com/blog/research/xe-group-exploiting-zero-days/", "url": "https://intezer.com/blog/research/xe-group-exploiting-zero-days/" + }, + { + "refsource": "MISC", + "name": "https://www.solissecurity.com/en-us/insights/xe-group-from-credit-card-skimming-to-exploiting-zero-days/", + "url": "https://www.solissecurity.com/en-us/insights/xe-group-from-credit-card-skimming-to-exploiting-zero-days/" } ] }