diff --git a/2020/11xxx/CVE-2020-11987.json b/2020/11xxx/CVE-2020-11987.json index 689eebf60e0..9e66f9b4ae3 100644 --- a/2020/11xxx/CVE-2020-11987.json +++ b/2020/11xxx/CVE-2020-11987.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[poi-dev] 20210304 [Bug 65166] New: Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)", "url": "https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[poi-dev] 20210308 [Bug 65166] Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)", + "url": "https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E" } ] }, diff --git a/2020/11xxx/CVE-2020-11988.json b/2020/11xxx/CVE-2020-11988.json index c1c3d09e718..5aa050e3dd8 100644 --- a/2020/11xxx/CVE-2020-11988.json +++ b/2020/11xxx/CVE-2020-11988.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[jmeter-dev] 20210305 [GitHub] [jmeter] sseide opened a new pull request #648: update xmlgraphics-commons to 2.6 (from 2.3)", "url": "https://lists.apache.org/thread.html/ra8f4d6ae402ec020ee3e8c28632c91be131c4d8b4c9c6756a179b12b@%3Cdev.jmeter.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[poi-dev] 20210308 [Bug 65166] Apache Batik 1.13 vulnerabilities (CVE-2020-11987, CVE-2020-11988)", + "url": "https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21324.json b/2021/21xxx/CVE-2021-21324.json index 7cd2d36f1d1..a3696531513 100644 --- a/2021/21xxx/CVE-2021-21324.json +++ b/2021/21xxx/CVE-2021-21324.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 there is an Insecure Direct Object Reference (IDOR) on \"Solutions\". This vulnerability gives an unauthorized user the ability to enumerate GLPI items names (including users logins) using the knowbase search form (requires authentication). To Reproduce: Perform a valid authentication at your GLPI instance, Browse the ticket list and select any open ticket, click on Solution form, then Search a solution form that will redirect you to the endpoint /\"glpi/front/knowbaseitem.php?item_itemtype=Ticket&item_items_id=18&forcetab=Knowbase$1\", and the item_itemtype=Ticket parameter present in the previous URL will point to the PHP alias of glpi_tickets table, so just replace it with \"Users\" to point to glpi_users table instead; in the same way, item_items_id=18 will point to the related column id, so changing it too you should be able to enumerate all the content which has an alias. Since such id(s) are obviously incremental, a malicious party could exploit the vulnerability simply by guessing-based attempts.\n\n" + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 there is an Insecure Direct Object Reference (IDOR) on \"Solutions\". This vulnerability gives an unauthorized user the ability to enumerate GLPI items names (including users logins) using the knowbase search form (requires authentication). To Reproduce: Perform a valid authentication at your GLPI instance, Browse the ticket list and select any open ticket, click on Solution form, then Search a solution form that will redirect you to the endpoint /\"glpi/front/knowbaseitem.php?item_itemtype=Ticket&item_items_id=18&forcetab=Knowbase$1\", and the item_itemtype=Ticket parameter present in the previous URL will point to the PHP alias of glpi_tickets table, so just replace it with \"Users\" to point to glpi_users table instead; in the same way, item_items_id=18 will point to the related column id, so changing it too you should be able to enumerate all the content which has an alias. Since such id(s) are obviously incremental, a malicious party could exploit the vulnerability simply by guessing-based attempts." } ] }, @@ -69,11 +69,6 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v", - "refsource": "CONFIRM", - "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v" - }, { "name": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc", "refsource": "MISC", @@ -83,6 +78,11 @@ "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + }, + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v" } ] }, diff --git a/2021/21xxx/CVE-2021-21325.json b/2021/21xxx/CVE-2021-21325.json index 93e0e5e2ce8..b115eee310b 100644 --- a/2021/21xxx/CVE-2021-21325.json +++ b/2021/21xxx/CVE-2021-21325.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 a new budget type can be defined by user. This input is not correctly filtered. This results in a cross-site scripting attack. To exploit this endpoint attacker need to be authenticated. This is fixed in version 9.5.4." + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 a new budget type can be defined by user. This input is not correctly filtered. This results in a cross-site scripting attack. To exploit this endpoint attacker need to be authenticated. This is fixed in version 9.5.4." } ] }, @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf", - "refsource": "CONFIRM", - "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf" - }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + }, + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf" } ] }, diff --git a/2021/21xxx/CVE-2021-21326.json b/2021/21xxx/CVE-2021-21326.json index 3c4d650201b..98de70ac239 100644 --- a/2021/21xxx/CVE-2021-21326.json +++ b/2021/21xxx/CVE-2021-21326.json @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh", - "refsource": "CONFIRM", - "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh" - }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + }, + { + "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh", + "refsource": "CONFIRM", + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh" } ] }, diff --git a/2021/21xxx/CVE-2021-21327.json b/2021/21xxx/CVE-2021-21327.json index 6ec45951a13..22c7eee7905 100644 --- a/2021/21xxx/CVE-2021-21327.json +++ b/2021/21xxx/CVE-2021-21327.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a “POP chain”. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors. This is fixed in version 9.5.4." + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a \u201cPOP chain\u201d. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors. This is fixed in version 9.5.4." } ] }, @@ -69,15 +69,20 @@ }, "references": { "reference_data": [ + { + "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", + "refsource": "MISC", + "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp" }, { - "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", - "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" + "name": "http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html", + "url": "http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21972.json b/2021/21xxx/CVE-2021-21972.json index 53bbc99cc5b..ac332f8e888 100644 --- a/2021/21xxx/CVE-2021-21972.json +++ b/2021/21xxx/CVE-2021-21972.json @@ -72,6 +72,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html", "url": "http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html" } ] },