- Synchronized data.

This commit is contained in:
CVE Team 2018-09-18 10:04:55 -04:00
parent 87790ac3e1
commit 5db716f929
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
3 changed files with 62 additions and 34 deletions

View File

@ -35,7 +35,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "If the sshd service in Karaf is left on so an administrator can manage the running instance, any user with rights to the Karaf console can pivot and read/write any file on the file system to which the Karaf process user has access. This can be locked down a bit by using chroot to change the root directory to protect files outside of the Karaf install directory; it can be further locked down by defining a security manager policy that limits file system access to those directories beneath the Karaf home that are necessary for the system to run. However, this still allows anyone with ssh access to the Karaf process to read and write a large number of files as the Karaf process user."
"value" : "In Apache Karaf prior to 4.2.0 release, if the sshd service in Karaf is left on so an administrator can manage the running instance, any user with rights to the Karaf console can pivot and read/write any file on the file system to which the Karaf process user has access. This can be locked down a bit by using chroot to change the root directory to protect files outside of the Karaf install directory; it can be further locked down by defining a security manager policy that limits file system access to those directories beneath the Karaf home that are necessary for the system to run. However, this still allows anyone with ssh access to the Karaf process to read and write a large number of files as the Karaf process user."
}
]
},
@ -54,7 +54,19 @@
"references" : {
"reference_data" : [
{
"name" : "[karaf-dev] 20180918 [SECURITY] New security advisory for CVE-2018-11786 released for Apache Karaf",
"refsource" : "MLIST",
"url" : "https://lists.apache.org/thread.html/5b7ac762c6bbe77ac5d9389f093fc6dbf196c36d788e3d7629e6c1d9@%3Cdev.karaf.apache.org%3E"
},
{
"name" : "http://karaf.apache.org/security/cve-2018-11786.txt",
"refsource" : "CONFIRM",
"url" : "http://karaf.apache.org/security/cve-2018-11786.txt"
},
{
"name" : "https://issues.apache.org/jira/browse/KARAF-5427",
"refsource" : "CONFIRM",
"url" : "https://issues.apache.org/jira/browse/KARAF-5427"
}
]
}

View File

@ -35,7 +35,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "When the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised."
"value" : "In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised."
}
]
},
@ -54,7 +54,19 @@
"references" : {
"reference_data" : [
{
"name" : "[karaf-dev] 20180918 [SECURITY] New security advisory for CVE-2018-11787 released for Apache Karaf",
"refsource" : "MLIST",
"url" : "https://lists.apache.org/thread.html/d9ba4c3104ba32225646879a057b75b54430f349c246c85469037d3c@%3Cdev.karaf.apache.org%3E"
},
{
"name" : "http://karaf.apache.org/security/cve-2018-11787.txt",
"refsource" : "CONFIRM",
"url" : "http://karaf.apache.org/security/cve-2018-11787.txt"
},
{
"name" : "https://issues.apache.org/jira/browse/KARAF-4993",
"refsource" : "CONFIRM",
"url" : "https://issues.apache.org/jira/browse/KARAF-4993"
}
]
}

View File

@ -1,64 +1,68 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@atlassian.com",
"DATE_PUBLIC": "2018-09-17T00:00:00",
"ID": "CVE-2018-13398",
"STATE": "PUBLIC"
"CVE_data_meta" : {
"ASSIGNER" : "security@atlassian.com",
"DATE_PUBLIC" : "2018-09-17T00:00:00",
"ID" : "CVE-2018-13398",
"STATE" : "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "Fisheye and Crucible",
"version": {
"version_data": [
"product_name" : "Fisheye and Crucible",
"version" : {
"version_data" : [
{
"version_value": "4.5.4",
"version_affected": "<"
"version_affected" : "<",
"version_value" : "4.5.4"
}
]
}
}
]
},
"vendor_name": "Atlassian"
"vendor_name" : "Atlassian"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "The administrative smart-commits resource in Atlassian Fisheye and Crucible before version 4.5.4 allows remote attackers to modify smart-commit settings via a Cross-site request forgery (CSRF) vulnerability."
"lang" : "eng",
"value" : "The administrative smart-commits resource in Atlassian Fisheye and Crucible before version 4.5.4 allows remote attackers to modify smart-commit settings via a Cross-site request forgery (CSRF) vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF)"
"lang" : "eng",
"value" : "Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"url": "https://jira.atlassian.com/browse/FE-7100"
"name" : "https://jira.atlassian.com/browse/CRUC-8312",
"refsource" : "CONFIRM",
"url" : "https://jira.atlassian.com/browse/CRUC-8312"
},
{
"url": "https://jira.atlassian.com/browse/CRUC-8312"
"name" : "https://jira.atlassian.com/browse/FE-7100",
"refsource" : "CONFIRM",
"url" : "https://jira.atlassian.com/browse/FE-7100"
}
]
}