From 4702ec19673b8133fe19813fca11ba9658cf2b10 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 23 Nov 2020 22:01:54 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/25xxx/CVE-2020-25660.json | 60 ++++++++++++++++++++++++++++-- 2020/25xxx/CVE-2020-25688.json | 50 +++++++++++++++++++++++-- 2020/25xxx/CVE-2020-25696.json | 55 ++++++++++++++++++++++++++-- 2020/26xxx/CVE-2020-26227.json | 2 +- 2020/26xxx/CVE-2020-26228.json | 2 +- 2020/26xxx/CVE-2020-26229.json | 2 +- 2020/28xxx/CVE-2020-28984.json | 67 ++++++++++++++++++++++++++++++++++ 2020/28xxx/CVE-2020-28985.json | 18 +++++++++ 2020/28xxx/CVE-2020-28986.json | 18 +++++++++ 2020/4xxx/CVE-2020-4006.json | 50 +++++++++++++++++++++++-- 10 files changed, 309 insertions(+), 15 deletions(-) create mode 100644 2020/28xxx/CVE-2020-28984.json create mode 100644 2020/28xxx/CVE-2020-28985.json create mode 100644 2020/28xxx/CVE-2020-28986.json diff --git a/2020/25xxx/CVE-2020-25660.json b/2020/25xxx/CVE-2020-25660.json index db78b6f20b0..6cd0e46bbec 100644 --- a/2020/25xxx/CVE-2020-25660.json +++ b/2020/25xxx/CVE-2020-25660.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-25660", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ceph", + "version": { + "version_data": [ + { + "version_value": "All ceph versions before 15.2.6 and before 14.2.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-294" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1890354", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890354" + }, + { + "refsource": "MISC", + "name": "https://ceph.io/community/v15-2-6-octopus-released/", + "url": "https://ceph.io/community/v15-2-6-octopus-released/" + }, + { + "refsource": "MISC", + "name": "https://ceph.io/releases/v14-2-14-nautilus-released/", + "url": "https://ceph.io/releases/v14-2-14-nautilus-released/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability." } ] } diff --git a/2020/25xxx/CVE-2020-25688.json b/2020/25xxx/CVE-2020-25688.json index 782011fd402..9535babaa80 100644 --- a/2020/25xxx/CVE-2020-25688.json +++ b/2020/25xxx/CVE-2020-25688.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-25688", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "rhacm", + "version": { + "version_data": [ + { + "version_value": "All rhacm versions before 2.0.5 and before 2.1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-321" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1892551", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892551" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a cluster, they could use the private key to decode API requests that should be protected by TLS sessions, potentially obtaining information they would not otherwise be able to. These certificates are not used for service authentication, so no opportunity for impersonation or active MITM attacks were made possible." } ] } diff --git a/2020/25xxx/CVE-2020-25696.json b/2020/25xxx/CVE-2020-25696.json index d448719f8a8..35ba1b6337a 100644 --- a/2020/25xxx/CVE-2020-25696.json +++ b/2020/25xxx/CVE-2020-25696.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-25696", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "PostgreSQL", + "version": { + "version_data": [ + { + "version_value": "All PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-183->CWE-270" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1894430", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894430" + }, + { + "refsource": "MISC", + "name": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/", + "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \\gset when querying a compromised server, the attacker can execute arbitrary code as the operating system account running psql. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] } diff --git a/2020/26xxx/CVE-2020-26227.json b/2020/26xxx/CVE-2020-26227.json index e9ce50a4517..8c03f73e86b 100644 --- a/2020/26xxx/CVE-2020-26227.json +++ b/2020/26xxx/CVE-2020-26227.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.23 and 10.4.10 the system extension Fluid (typo3/cms-fluid) of the TYPO3 core is vulnerable to cross-site scripting passing user-controlled data as argument to Fluid view helpers. Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.\n\n" + "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.23 and 10.4.10 the system extension Fluid (typo3/cms-fluid) of the TYPO3 core is vulnerable to cross-site scripting passing user-controlled data as argument to Fluid view helpers. Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described." } ] }, diff --git a/2020/26xxx/CVE-2020-26228.json b/2020/26xxx/CVE-2020-26228.json index 3434a7939cd..942472ea656 100644 --- a/2020/26xxx/CVE-2020-26228.json +++ b/2020/26xxx/CVE-2020-26228.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.23 and 10.4.10 user session identifiers were stored in cleartext - without processing with additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system.\n\nUpdate to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described." + "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.23 and 10.4.10 user session identifiers were stored in cleartext - without processing with additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described." } ] }, diff --git a/2020/26xxx/CVE-2020-26229.json b/2020/26xxx/CVE-2020-26229.json index c6c3ca683fe..f96f5e6d5fa 100644 --- a/2020/26xxx/CVE-2020-26229.json +++ b/2020/26xxx/CVE-2020-26229.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 from version 10.4.0, and before version 10.4.10, RSS widgets are susceptible to XML external entity processing.\nThis vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability with current PHP versions of supported and maintained system distributions.\n\nAt least with libxml2 version 2.9, the processing of XML external entities is disabled per default - and cannot be exploited. Besides that, a valid backend user account is needed.\n\nUpdate to TYPO3 version 10.4.10 to fix the problem described." + "value": "TYPO3 is an open source PHP based web content management system. In TYPO3 from version 10.4.0, and before version 10.4.10, RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability with current PHP versions of supported and maintained system distributions. At least with libxml2 version 2.9, the processing of XML external entities is disabled per default - and cannot be exploited. Besides that, a valid backend user account is needed. Update to TYPO3 version 10.4.10 to fix the problem described." } ] }, diff --git a/2020/28xxx/CVE-2020-28984.json b/2020/28xxx/CVE-2020-28984.json new file mode 100644 index 00000000000..c836bc5def9 --- /dev/null +++ b/2020/28xxx/CVE-2020-28984.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-28984", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://git.spip.net/spip/spip/commit/ae4267eba1022dabc12831ddb021c5d6e09040f8", + "refsource": "MISC", + "name": "https://git.spip.net/spip/spip/commit/ae4267eba1022dabc12831ddb021c5d6e09040f8" + }, + { + "url": "https://git.spip.net/spip/spip/compare/v3.2.7...v3.2.8", + "refsource": "MISC", + "name": "https://git.spip.net/spip/spip/compare/v3.2.7...v3.2.8" + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28985.json b/2020/28xxx/CVE-2020-28985.json new file mode 100644 index 00000000000..9f3e4a1272b --- /dev/null +++ b/2020/28xxx/CVE-2020-28985.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28985", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28986.json b/2020/28xxx/CVE-2020-28986.json new file mode 100644 index 00000000000..e0713d1e0a3 --- /dev/null +++ b/2020/28xxx/CVE-2020-28986.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28986", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4006.json b/2020/4xxx/CVE-2020-4006.json index 6817e463be5..54cb1a3a44a 100644 --- a/2020/4xxx/CVE-2020-4006.json +++ b/2020/4xxx/CVE-2020-4006.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-4006", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@vmware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "VMware Workspace One Access (Access), VMware Workspace One Access Connector (Access Connector), VMware Identity Manager (vIDM), VMware Identity Manager Connector (vIDM Connector), VMware Cloud Foundation, vRealize Suite Lifecycle Manager", + "version": { + "version_data": [ + { + "version_value": "Multiple" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.vmware.com/security/advisories/VMSA-2020-0027.html", + "url": "https://www.vmware.com/security/advisories/VMSA-2020-0027.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector address have a command injection vulnerability." } ] }