Auto-merge PR#3503

Auto-merge PR#3503
This commit is contained in:
CVE Team 2020-03-31 14:15:21 -04:00 committed by GitHub
commit 44c404179c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,18 +1,93 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-5292",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Time-based blind injection in Leantime"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Leantime",
"version": {
"version_data": [
{
"version_value": "< 2.0.15"
}
]
}
}
]
},
"vendor_name": "Leantime"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Leantime before versions 2.0.15 and 2.1-beta3 has a SQL Injection vulnerability.\n\nThe impact is high. Malicious users/attackers can execute arbitrary SQL queries negatively affecting the confidentiality,\nintegrity, and availability of the site. Attackers can exfiltrate data like the users' and administrators' password hashes,\nmodify data, or drop tables. The unescaped parameter is \"searchUsers\" when sending a POST request to \"/tickets/showKanban\"\nwith a valid session. In the code, the parameter is named \"users\" in class.tickets.php.\n\nThis issue is fixed in versions 2.0.15 and 2.1.0 beta 3."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/Leantime/leantime/security/advisories/GHSA-ww6x-rhvp-55hp",
"refsource": "CONFIRM",
"url": "https://github.com/Leantime/leantime/security/advisories/GHSA-ww6x-rhvp-55hp"
},
{
"name": "https://github.com/Leantime/leantime/pull/181",
"refsource": "MISC",
"url": "https://github.com/Leantime/leantime/pull/181"
},
{
"name": "https://github.com/Leantime/leantime/commit/af0807f0b2c4c3c914b93f1c5d940e6b875f231f",
"refsource": "MISC",
"url": "https://github.com/Leantime/leantime/commit/af0807f0b2c4c3c914b93f1c5d940e6b875f231f"
}
]
},
"source": {
"advisory": "GHSA-ww6x-rhvp-55hp",
"discovery": "UNKNOWN"
}
}
}