- Added submissions from Atlassian from 2017-11-22.

This commit is contained in:
CVE Team 2017-11-27 10:10:17 -05:00
parent 288a87fd54
commit 70d4bcee67
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
2 changed files with 108 additions and 6 deletions

View File

@ -1,8 +1,42 @@
{ {
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER" : "security@atlassian.com",
"DATE_PUBLIC" : "2017-11-22T00:00:00",
"ID" : "CVE-2017-14585", "ID" : "CVE-2017-14585",
"STATE" : "RESERVED" "STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Hipchat Server",
"version" : {
"version_data" : [
{
"version_value" : "2.2.0 <= version < 4.3"
}
]
}
},
{
"product_name" : "Hipchat Data Center",
"version" : {
"version_data" : [
{
"version_value" : "3.0.0 <= version < 3.1.0"
}
]
}
}
]
},
"vendor_name" : "Atlassian"
}
]
}
}, },
"data_format" : "MITRE", "data_format" : "MITRE",
"data_type" : "CVE", "data_type" : "CVE",
@ -11,7 +45,29 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value" : "A Server Side Request Forgery (SSRF) vulnerability could lead to remote code execution for authenticated administrators. This issue was introduced in version 2.2.0 of Hipchat Server and version 3.0.0 of Hipchat Data Center. Versions of Hipchat Server starting with 2.2.0 and before 2.2.6 are affected by this vulnerability. Versions of Hipchat Data Center starting with 3.0.0 and before 3.1.0 are affected."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Remote Code Execution"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://confluence.atlassian.com/hc/hipchat-server-security-advisory-2017-11-22-939946293.html"
},
{
"url" : "https://jira.atlassian.com/browse/HCPUB-3526"
} }
] ]
} }

View File

@ -1,8 +1,32 @@
{ {
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER" : "security@atlassian.com",
"DATE_PUBLIC" : "2017-11-22T00:00:00",
"ID" : "CVE-2017-14586", "ID" : "CVE-2017-14586",
"STATE" : "RESERVED" "STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Hipchat for Mac desktop client",
"version" : {
"version_data" : [
{
"version_value" : "4.0 <= version < 4.30"
}
]
}
}
]
},
"vendor_name" : "Atlassian"
}
]
}
}, },
"data_format" : "MITRE", "data_format" : "MITRE",
"data_type" : "CVE", "data_type" : "CVE",
@ -11,7 +35,29 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value" : "The Hipchat for Mac desktop client is vulnerable to client-side remote code execution via video call link parsing. Hipchat for Mac desktop clients at or above version 4.0 and before version 4.30 are affected by this vulnerability."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Client Side Remote Code Execution"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://confluence.atlassian.com/hc/hipchat-server-security-advisory-2017-11-22-939946293.html"
},
{
"url" : "https://jira.atlassian.com/browse/HCPUB-3473"
} }
] ]
} }