From 6014142e01b98016211a3f7ca4fe1fa05affff37 Mon Sep 17 00:00:00 2001 From: santosomar Date: Thu, 20 Jun 2019 01:39:07 +0000 Subject: [PATCH] Adding Cisco CVE-2019-1629 --- 2019/1xxx/CVE-2019-1629.json | 77 ++++++++++++++++++++++++++++++++++-- 1 file changed, 73 insertions(+), 4 deletions(-) diff --git a/2019/1xxx/CVE-2019-1629.json b/2019/1xxx/CVE-2019-1629.json index b4363ec4401..09e035464ac 100644 --- a/2019/1xxx/CVE-2019-1629.json +++ b/2019/1xxx/CVE-2019-1629.json @@ -1,8 +1,34 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2019-06-19T16:00:00-0700", "ID": "CVE-2019-1629", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Integrated Management Controller Arbitrary File Write Vulnerability" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Unified Computing System (Management Software) ", + "version": { + "version_data": [ + { + "affected": "=", + "version_value": "4.0" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,8 +37,51 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the configuration import utility of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to have write access and upload arbitrary data to the filesystem. The vulnerability is due to a failure to delete temporarily uploaded files. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the affected device. An exploit could allow the attacker to fill up the filesystem or upload malicious scripts. " } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "5.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20190619 Cisco Integrated Management Controller Arbitrary File Write Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-filewrite" + } + ] + }, + "source": { + "advisory": "cisco-sa-20190619-imc-filewrite", + "defect": [ + [ + "CSCvo35982" + ] + ], + "discovery": "INTERNAL" } -} \ No newline at end of file +}