From 3dcfa40a4ec675ad6c331dc61ade6b6958ff3c60 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 19 Dec 2018 17:04:31 -0500 Subject: [PATCH] - Synchronized data. --- 2018/15xxx/CVE-2018-15754.json | 113 ++++++++++++++++++--------------- 2018/15xxx/CVE-2018-15798.json | 103 +++++++++++++++--------------- 2018/15xxx/CVE-2018-15801.json | 103 +++++++++++++++--------------- 2018/20xxx/CVE-2018-20299.json | 62 ++++++++++++++++++ 4 files changed, 228 insertions(+), 153 deletions(-) create mode 100644 2018/20xxx/CVE-2018-20299.json diff --git a/2018/15xxx/CVE-2018-15754.json b/2018/15xxx/CVE-2018-15754.json index 97c04c3c4e1..f8492c162c2 100644 --- a/2018/15xxx/CVE-2018-15754.json +++ b/2018/15xxx/CVE-2018-15754.json @@ -1,84 +1,95 @@ { - "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2018-12-10T00:00:00.000Z", - "ID": "CVE-2018-15754", - "STATE": "PUBLIC", - "TITLE": "UAA can issue tokens across identity providers if users with matching usernames exist" + "CVE_data_meta" : { + "ASSIGNER" : "secure@dell.com", + "DATE_PUBLIC" : "2018-12-10T00:00:00.000Z", + "ID" : "CVE-2018-15754", + "STATE" : "PUBLIC", + "TITLE" : "UAA can issue tokens across identity providers if users with matching usernames exist" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "UAA Release", - "version": { - "version_data": [ + "product_name" : "UAA Release", + "version" : { + "version_data" : [ { - "affected": "<", - "version_name": "60", - "version_value": "66.0" + "affected" : "<", + "version_name" : "60", + "version_value" : "66.0" } ] } } ] }, - "vendor_name": "Cloud Foundry" + "vendor_name" : "Cloud Foundry" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Cloud Foundry UAA, versions 60 prior to 66.0, contain an authorization logic error. In environments with multiple identity providers that contain accounts across identity providers with the same username, a remote authenticated user with access to one of these accounts may be able to obtain a token for an account of the same username in the other identity provider.\n\n" + "lang" : "eng", + "value" : "Cloud Foundry UAA, versions 60 prior to 66.0, contain an authorization logic error. In environments with multiple identity providers that contain accounts across identity providers with the same username, a remote authenticated user with access to one of these accounts may be able to obtain a token for an account of the same username in the other identity provider." } ] }, - "impact": { - "cvss": { - "attackComplexity": "HIGH", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 4.2, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "HIGH", + "attackVector" : "NETWORK", + "availabilityImpact" : "NONE", + "baseScore" : 4.2, + "baseSeverity" : "MEDIUM", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "privilegesRequired" : "LOW", + "scope" : "UNCHANGED", + "userInteraction" : "NONE", + "vectorString" : "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Improper Authentication" + "lang" : "eng", + "value" : "Improper Authentication" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "refsource": "CONFIRM", - "url": "https://www.cloudfoundry.org/blog/cve-2018-15754/" + "name" : "https://www.cloudfoundry.org/blog/cve-2018-15754", + "refsource" : "CONFIRM", + "url" : "https://www.cloudfoundry.org/blog/cve-2018-15754" + }, + { + "name" : "https://www.cloudfoundry.org/blog/cve-2018-15754/", + "refsource" : "CONFIRM", + "url" : "https://www.cloudfoundry.org/blog/cve-2018-15754/" + }, + { + "name" : "106240", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106240" } ] }, - "source": { - "discovery": "UNKNOWN" + "source" : { + "discovery" : "UNKNOWN" } -} \ No newline at end of file +} diff --git a/2018/15xxx/CVE-2018-15798.json b/2018/15xxx/CVE-2018-15798.json index ba877f47d25..9341ff08e80 100644 --- a/2018/15xxx/CVE-2018-15798.json +++ b/2018/15xxx/CVE-2018-15798.json @@ -1,84 +1,85 @@ { - "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2018-12-13T00:00:00.000Z", - "ID": "CVE-2018-15798", - "STATE": "PUBLIC", - "TITLE": "Pivotal Concourse allows malicious redirect urls on login" + "CVE_data_meta" : { + "ASSIGNER" : "secure@dell.com", + "DATE_PUBLIC" : "2018-12-13T00:00:00.000Z", + "ID" : "CVE-2018-15798", + "STATE" : "PUBLIC", + "TITLE" : "Pivotal Concourse allows malicious redirect urls on login" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "Concourse", - "version": { - "version_data": [ + "product_name" : "Concourse", + "version" : { + "version_data" : [ { - "affected": "<", - "version_name": "4.x", - "version_value": "4.2.2" + "affected" : "<", + "version_name" : "4.x", + "version_value" : "4.2.2" } ] } } ] }, - "vendor_name": "Pivotal" + "vendor_name" : "Pivotal" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse." + "lang" : "eng", + "value" : "Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse." } ] }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 7.6, - "baseSeverity": "HIGH", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "LOW", + "attackVector" : "NETWORK", + "availabilityImpact" : "HIGH", + "baseScore" : 7.6, + "baseSeverity" : "HIGH", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "privilegesRequired" : "NONE", + "scope" : "UNCHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Open Redirect" + "lang" : "eng", + "value" : "Open Redirect" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "refsource": "CONFIRM", - "url": "https://pivotal.io/security/cve-2018-15798" + "name" : "https://pivotal.io/security/cve-2018-15798", + "refsource" : "CONFIRM", + "url" : "https://pivotal.io/security/cve-2018-15798" } ] }, - "source": { - "discovery": "UNKNOWN" + "source" : { + "discovery" : "UNKNOWN" } -} \ No newline at end of file +} diff --git a/2018/15xxx/CVE-2018-15801.json b/2018/15xxx/CVE-2018-15801.json index 98ed4b206c2..3fc45913fd7 100644 --- a/2018/15xxx/CVE-2018-15801.json +++ b/2018/15xxx/CVE-2018-15801.json @@ -1,84 +1,85 @@ { - "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2018-12-18T00:00:00.000Z", - "ID": "CVE-2018-15801", - "STATE": "PUBLIC", - "TITLE": "Authorization Bypass During JWT Issuer Validation with spring-security" + "CVE_data_meta" : { + "ASSIGNER" : "secure@dell.com", + "DATE_PUBLIC" : "2018-12-18T00:00:00.000Z", + "ID" : "CVE-2018-15801", + "STATE" : "PUBLIC", + "TITLE" : "Authorization Bypass During JWT Issuer Validation with spring-security" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "Spring Security", - "version": { - "version_data": [ + "product_name" : "Spring Security", + "version" : { + "version_data" : [ { - "affected": "<", - "version_name": "5.1.x", - "version_value": "5.1.2" + "affected" : "<", + "version_name" : "5.1.x", + "version_value" : "5.1.2" } ] } } ] }, - "vendor_name": "Spring by Pivotal" + "vendor_name" : "Spring by Pivotal" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer." + "lang" : "eng", + "value" : "Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer." } ] }, - "impact": { - "cvss": { - "attackComplexity": "HIGH", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 3.3, - "baseSeverity": "LOW", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "HIGH", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "HIGH", + "attackVector" : "NETWORK", + "availabilityImpact" : "NONE", + "baseScore" : 3.3, + "baseSeverity" : "LOW", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "privilegesRequired" : "HIGH", + "scope" : "UNCHANGED", + "userInteraction" : "NONE", + "vectorString" : "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Business Logic Errors" + "lang" : "eng", + "value" : "Business Logic Errors" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "refsource": "CONFIRM", - "url": "https://pivotal.io/security/cve-2018-15801" + "name" : "https://pivotal.io/security/cve-2018-15801", + "refsource" : "CONFIRM", + "url" : "https://pivotal.io/security/cve-2018-15801" } ] }, - "source": { - "discovery": "UNKNOWN" + "source" : { + "discovery" : "UNKNOWN" } -} \ No newline at end of file +} diff --git a/2018/20xxx/CVE-2018-20299.json b/2018/20xxx/CVE-2018-20299.json new file mode 100644 index 00000000000..07188251573 --- /dev/null +++ b/2018/20xxx/CVE-2018-20299.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20299", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in several Bosch Smart Home cameras (360 degree indoor camera and Eyes outdoor camera) with firmware before 6.52.4. A malicious client could potentially succeed in the unauthorized execution of code on the device via the network interface, because there is a buffer overflow in the RCP+ parser of the web server." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://psirt.bosch.com/Advisory/BOSCH-2018-1203.html", + "refsource" : "MISC", + "url" : "https://psirt.bosch.com/Advisory/BOSCH-2018-1203.html" + } + ] + } +}