"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-10-31 05:00:32 +00:00
parent 78a7e4527b
commit 3d51b745be
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
4 changed files with 181 additions and 10 deletions

View File

@ -1,17 +1,103 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-21537",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "report@snyk.io",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Versions of the package lilconfig from 3.1.0 and before 3.1.1 are vulnerable to Arbitrary Code Execution due to the insecure usage of eval in the dynamicImport function. An attacker can exploit this vulnerability by passing a malicious input through the defaultLoaders function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Arbitrary Code Execution",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "lilconfig",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "3.1.0",
"version_value": "3.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security.snyk.io/vuln/SNYK-JS-LILCONFIG-6263789",
"refsource": "MISC",
"name": "https://security.snyk.io/vuln/SNYK-JS-LILCONFIG-6263789"
},
{
"url": "https://github.com/antonk52/lilconfig/pull/48",
"refsource": "MISC",
"name": "https://github.com/antonk52/lilconfig/pull/48"
},
{
"url": "https://github.com/antonk52/lilconfig/releases/tag/v3.1.1",
"refsource": "MISC",
"name": "https://github.com/antonk52/lilconfig/releases/tag/v3.1.1"
},
{
"url": "https://github.com/antonk52/lilconfig/commit/2c68a1ab8764fc74acc46771e1ad39ab07a9b0a7",
"refsource": "MISC",
"name": "https://github.com/antonk52/lilconfig/commit/2c68a1ab8764fc74acc46771e1ad39ab07a9b0a7"
}
]
},
"credits": [
{
"lang": "en",
"value": "Anton Kastritskiy"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P"
}
]
}

View File

@ -500,7 +500,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
"version": "3:4.4.1-14.rhaos4.13.el9",
"version": "3:4.4.1-13.rhaos4.13.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@ -514,7 +514,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2:1.11.3-3.rhaos4.13.el9",
"version": "2:1.11.3-3.rhaos4.13.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@ -563,7 +563,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2:1.11.3-3.rhaos4.14.el8",
"version": "2:1.11.3-3.rhaos4.14.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@ -607,6 +607,34 @@
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "v4.15.0-202410230304.p0.g366295f.assembly.stream.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "v4.15.0-202410230304.p0.gfde2b2e.assembly.stream.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
@ -647,7 +675,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2:1.14.4-1.rhaos4.16.el8",
"version": "2:1.14.4-1.rhaos4.16.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@ -661,7 +689,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:1.29.5-7.rhaos4.16.git7db4ada.el8",
"version": "0:1.29.5-7.rhaos4.16.git7db4ada.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@ -1508,6 +1536,11 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:8260"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:8425",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:8425"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3727",
"refsource": "MISC",

View File

@ -91,6 +91,27 @@
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 4.15",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:1.28.11-5.rhaos4.15.git35a2431.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 4.16",
"version": {
@ -121,7 +142,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:1.30.6-3.rhaos4.17.git49b5172.el9",
"version": "0:1.30.6-3.rhaos4.17.git49b5172.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@ -210,6 +231,11 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:8263"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:8428",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:8428"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-9341",
"refsource": "MISC",

View File

@ -35,6 +35,27 @@
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat OpenShift Container Platform 4.15",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:1.28.11-5.rhaos4.15.git35a2431.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 4.16",
"version": {
@ -221,6 +242,11 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:8418"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:8428",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:8428"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:8437",
"refsource": "MISC",