From 460068c078c62a5f6fc59743590cd34028a797c5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 20 Sep 2023 17:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/40xxx/CVE-2023-40043.json | 111 +++++++++++++++++++++++++++++-- 2023/42xxx/CVE-2023-42656.json | 117 +++++++++++++++++++++++++++++++-- 2023/42xxx/CVE-2023-42660.json | 111 +++++++++++++++++++++++++++++-- 2023/43xxx/CVE-2023-43494.json | 75 +++++++++++++++++++-- 2023/43xxx/CVE-2023-43495.json | 69 +++++++++++++++++-- 2023/43xxx/CVE-2023-43496.json | 69 +++++++++++++++++-- 2023/43xxx/CVE-2023-43497.json | 69 +++++++++++++++++-- 2023/43xxx/CVE-2023-43498.json | 69 +++++++++++++++++-- 2023/43xxx/CVE-2023-43499.json | 54 +++++++++++++-- 2023/43xxx/CVE-2023-43500.json | 54 +++++++++++++-- 2023/43xxx/CVE-2023-43501.json | 54 +++++++++++++-- 2023/43xxx/CVE-2023-43502.json | 54 +++++++++++++-- 2023/5xxx/CVE-2023-5092.json | 18 +++++ 13 files changed, 876 insertions(+), 48 deletions(-) create mode 100644 2023/5xxx/CVE-2023-5092.json diff --git a/2023/40xxx/CVE-2023-40043.json b/2023/40xxx/CVE-2023-40043.json index ddaca69e4d4..a4c52b44e3a 100644 --- a/2023/40xxx/CVE-2023-40043.json +++ b/2023/40xxx/CVE-2023-40043.json @@ -1,17 +1,120 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-40043", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@progress.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "\nIn Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a SQL injection vulnerability has been identified in the MOVEit Transfer web interface\u00a0that could allow a MOVEit system administrator account to gain unauthorized access to the MOVEit Transfer database. A\u00a0MOVEit system administrator\n\n could submit a crafted payload to the MOVEit Transfer web interface which could result in modification and disclosure of MOVEit database content.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Progress Software Corporation", + "product": { + "product_data": [ + { + "product_name": "MOVEit Transfer", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "2023.0.6 (15.0.6)", + "status": "affected", + "version": "2023.0.0 (15.0.0)", + "versionType": "semver" + }, + { + "lessThan": "2022.1.9 (14.1.9)", + "status": "affected", + "version": "2022.1.0 (14.1.0)", + "versionType": "semver" + }, + { + "lessThan": "2022.0.8 (14.0.8)", + "status": "affected", + "version": "2022.0.0 (14.0.0)", + "versionType": "semver" + }, + { + "lessThan": "2021.1.8 (13.1.8)", + "status": "affected", + "version": "2021.1.0 (13.1.0)", + "versionType": "semver" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.progress.com/moveit", + "refsource": "MISC", + "name": "https://www.progress.com/moveit" + }, + { + "url": "https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-September-2023", + "refsource": "MISC", + "name": "https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-September-2023" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/42xxx/CVE-2023-42656.json b/2023/42xxx/CVE-2023-42656.json index 27e6eae5e2d..1b5b9d1be61 100644 --- a/2023/42xxx/CVE-2023-42656.json +++ b/2023/42xxx/CVE-2023-42656.json @@ -1,17 +1,126 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-42656", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@progress.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "\nIn Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a reflected cross-site scripting\u00a0(XSS) vulnerability has been identified in MOVEit Transfer's web interface.\u00a0 An attacker could craft a malicious payload targeting\u00a0MOVEit Transfer users during the package composition procedure.\u00a0 If a MOVEit user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Progress Software Corporation", + "product": { + "product_data": [ + { + "product_name": "MOVEit Transfer", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "2023.0.6 (15.0.6)", + "status": "affected", + "version": "2023.0.0 (15.0.0)", + "versionType": "semver" + }, + { + "lessThan": "2022.1.9 (14.1.9)", + "status": "affected", + "version": "2022.1.0 (14.1.0)", + "versionType": "semver" + }, + { + "lessThan": "2022.0.8 (14.0.8)", + "status": "affected", + "version": "2022.0.0 (14.0.0)", + "versionType": "semver" + }, + { + "lessThan": "2021.1.8 (13.1.8)", + "status": "affected", + "version": "2021.1.0 (13.1.0)", + "versionType": "semver" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.progress.com/moveit", + "refsource": "MISC", + "name": "https://www.progress.com/moveit" + }, + { + "url": "https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-September-2023", + "refsource": "MISC", + "name": "https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-September-2023" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Bugcrowd - HusseiN98D" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2023/42xxx/CVE-2023-42660.json b/2023/42xxx/CVE-2023-42660.json index bf766eb5b4f..f39daa9fcfc 100644 --- a/2023/42xxx/CVE-2023-42660.json +++ b/2023/42xxx/CVE-2023-42660.json @@ -1,17 +1,120 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-42660", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@progress.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "\nIn Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a SQL injection vulnerability has been identified in the MOVEit Transfer machine interface\u00a0that could allow an authenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to the MOVEit Transfer machine interface which could result in modification and disclosure of MOVEit database content.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Progress Software Corporation", + "product": { + "product_data": [ + { + "product_name": "MOVEit Transfer", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "2023.0.6 (15.0.6)", + "status": "affected", + "version": "2023.0.0 (15.0.0)", + "versionType": "semver" + }, + { + "lessThan": "2022.1.9 (14.1.9)", + "status": "affected", + "version": "2022.1.0 (14.1.0)", + "versionType": "semver" + }, + { + "lessThan": "2022.0.8 (14.0.8)", + "status": "affected", + "version": "2022.0.0 (14.0.0)", + "versionType": "semver" + }, + { + "lessThan": "2021.1.8 (13.1.8)", + "status": "affected", + "version": "2021.1.0 (13.1.0)", + "versionType": "semver" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.progress.com/moveit", + "refsource": "MISC", + "name": "https://www.progress.com/moveit" + }, + { + "url": "https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-September-2023", + "refsource": "MISC", + "name": "https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-September-2023" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/43xxx/CVE-2023-43494.json b/2023/43xxx/CVE-2023-43494.json index 10f154dff27..0a49be4d739 100644 --- a/2023/43xxx/CVE-2023-43494.json +++ b/2023/43xxx/CVE-2023-43494.json @@ -1,17 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-43494", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins Project", + "product": { + "product_data": [ + { + "product_name": "Jenkins", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "0", + "versionType": "maven", + "lessThan": "2.50", + "status": "unaffected" + }, + { + "version": "2.424", + "versionType": "maven", + "lessThan": "*", + "status": "unaffected" + }, + { + "version": "2.414.2", + "versionType": "maven", + "lessThan": "2.414.*", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3261", + "refsource": "MISC", + "name": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3261" } ] } diff --git a/2023/43xxx/CVE-2023-43495.json b/2023/43xxx/CVE-2023-43495.json index e6dc4f85814..139b689d5e3 100644 --- a/2023/43xxx/CVE-2023-43495.json +++ b/2023/43xxx/CVE-2023-43495.json @@ -1,17 +1,78 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-43495", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins Project", + "product": { + "product_data": [ + { + "product_name": "Jenkins", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "2.424", + "versionType": "maven", + "lessThan": "*", + "status": "unaffected" + }, + { + "version": "2.414.2", + "versionType": "maven", + "lessThan": "2.414.*", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245", + "refsource": "MISC", + "name": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245" } ] } diff --git a/2023/43xxx/CVE-2023-43496.json b/2023/43xxx/CVE-2023-43496.json index b12502e2856..7f4b6be5edf 100644 --- a/2023/43xxx/CVE-2023-43496.json +++ b/2023/43xxx/CVE-2023-43496.json @@ -1,17 +1,78 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-43496", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins Project", + "product": { + "product_data": [ + { + "product_name": "Jenkins", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "2.424", + "versionType": "maven", + "lessThan": "*", + "status": "unaffected" + }, + { + "version": "2.414.2", + "versionType": "maven", + "lessThan": "2.414.*", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3072", + "refsource": "MISC", + "name": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3072" } ] } diff --git a/2023/43xxx/CVE-2023-43497.json b/2023/43xxx/CVE-2023-43497.json index 41fd24c3ba8..fe63bd41598 100644 --- a/2023/43xxx/CVE-2023-43497.json +++ b/2023/43xxx/CVE-2023-43497.json @@ -1,17 +1,78 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-43497", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins Project", + "product": { + "product_data": [ + { + "product_name": "Jenkins", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "2.424", + "versionType": "maven", + "lessThan": "*", + "status": "unaffected" + }, + { + "version": "2.414.2", + "versionType": "maven", + "lessThan": "2.414.*", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073", + "refsource": "MISC", + "name": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073" } ] } diff --git a/2023/43xxx/CVE-2023-43498.json b/2023/43xxx/CVE-2023-43498.json index 1a91a7519ed..b6a3b11e07a 100644 --- a/2023/43xxx/CVE-2023-43498.json +++ b/2023/43xxx/CVE-2023-43498.json @@ -1,17 +1,78 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-43498", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins Project", + "product": { + "product_data": [ + { + "product_name": "Jenkins", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "2.424", + "versionType": "maven", + "lessThan": "*", + "status": "unaffected" + }, + { + "version": "2.414.2", + "versionType": "maven", + "lessThan": "2.414.*", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073", + "refsource": "MISC", + "name": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073" } ] } diff --git a/2023/43xxx/CVE-2023-43499.json b/2023/43xxx/CVE-2023-43499.json index 55fe3ecbec6..270b7d74e46 100644 --- a/2023/43xxx/CVE-2023-43499.json +++ b/2023/43xxx/CVE-2023-43499.json @@ -1,17 +1,63 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-43499", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier does not escape Failure Cause names in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or update Failure Causes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins Project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Build Failure Analyzer Plugin", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "2.4.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3244", + "refsource": "MISC", + "name": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3244" } ] } diff --git a/2023/43xxx/CVE-2023-43500.json b/2023/43xxx/CVE-2023-43500.json index 49db8472032..70487cf114a 100644 --- a/2023/43xxx/CVE-2023-43500.json +++ b/2023/43xxx/CVE-2023-43500.json @@ -1,17 +1,63 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-43500", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins Project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Build Failure Analyzer Plugin", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "2.4.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3226", + "refsource": "MISC", + "name": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3226" } ] } diff --git a/2023/43xxx/CVE-2023-43501.json b/2023/43xxx/CVE-2023-43501.json index c1822c821e9..4c4242e3383 100644 --- a/2023/43xxx/CVE-2023-43501.json +++ b/2023/43xxx/CVE-2023-43501.json @@ -1,17 +1,63 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-43501", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A missing permission check in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins Project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Build Failure Analyzer Plugin", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "2.4.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3226", + "refsource": "MISC", + "name": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3226" } ] } diff --git a/2023/43xxx/CVE-2023-43502.json b/2023/43xxx/CVE-2023-43502.json index f22710a72f9..f1b340d9e65 100644 --- a/2023/43xxx/CVE-2023-43502.json +++ b/2023/43xxx/CVE-2023-43502.json @@ -1,17 +1,63 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-43502", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers to delete Failure Causes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins Project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Build Failure Analyzer Plugin", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "2.4.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3239", + "refsource": "MISC", + "name": "https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3239" } ] } diff --git a/2023/5xxx/CVE-2023-5092.json b/2023/5xxx/CVE-2023-5092.json new file mode 100644 index 00000000000..0f017454d53 --- /dev/null +++ b/2023/5xxx/CVE-2023-5092.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-5092", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file