Auto-merge PR#4486

Auto-merge PR#4486
This commit is contained in:
CVE Team 2020-08-06 11:45:34 -04:00 committed by GitHub
commit 774c53d2d6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 428 additions and 25 deletions

View File

@ -1,18 +1,110 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cve@rapid7.com",
"DATE_PUBLIC": "2020-04-28T10:00:00.000Z",
"ID": "CVE-2020-7352",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "GOG Galaxy GalaxyClientService Privilege Escalation"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GOG GalaxyClientService",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "2.0.12",
"version_value": "2.0.12"
},
{
"version_affected": "<=",
"version_name": "1.2.64",
"version_value": "1.2.64"
}
]
}
}
]
},
"vendor_name": "GOG"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This issue was discovered and reported to Rapid7 by Joe Testa via the Metasploit Framework."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The GalaxyClientService component of GOG Galaxy runs with elevated SYSTEM privileges in a Windows environment. Due to the software shipping with embedded, static RSA private key, an attacker with this key material and local user permissions can effectively send any operating system command to the service for execution in this elevated context. The service listens for such commands on a locally-bound network port, localhost:9978. A Metasploit module has been published which exploits this vulnerability. This issue affects the 2.0.x branch of the software (2.0.12 and earlier) as well as the 1.2.x branch (1.2.64 and earlier). A fix was issued for the 2.0.x branch of the affected software."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-264 Permissions, Privileges, and Access Controls"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/rapid7/metasploit-framework/pull/13444",
"refsource": "MISC",
"url": "https://github.com/rapid7/metasploit-framework/pull/13444"
},
{
"name": "https://www.positronsecurity.com/blog/2020-04-28-gog-galaxy-client-local-privilege-escalation/",
"refsource": "MISC",
"url": "https://www.positronsecurity.com/blog/2020-04-28-gog-galaxy-client-local-privilege-escalation/"
}
]
},
"solution": [
{
"lang": "eng",
"value": "This issue was resolved in version 2.0.13 of the affected software."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}

View File

@ -1,18 +1,109 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cve@rapid7.com",
"DATE_PUBLIC": "2020-04-06T10:00:00.000Z",
"ID": "CVE-2020-7356",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Cayin xPost SQL Injection"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cayin xPost",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "2.5.18103",
"version_value": "2.5.18103"
},
{
"version_affected": "=",
"version_name": "2.0",
"version_value": "2.0"
},
{
"version_affected": "=",
"version_name": "1.0",
"version_value": "1.0"
}
]
}
}
]
},
"vendor_name": "Cayin Technology"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This issue was discovered by Gjoko Krstic of Zero Science Lab."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "CAYIN xPost suffers from an unauthenticated SQL Injection vulnerability. Input passed via the GET parameter 'wayfinder_seqid' in wayfinder_meeting_input.jsp is not properly sanitized before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and execute SYSTEM commands. "
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5571.php",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5571.php"
},
{
"name": "https://github.com/rapid7/metasploit-framework/pull/13607",
"refsource": "MISC",
"url": "https://github.com/rapid7/metasploit-framework/pull/13607"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -1,18 +1,162 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cve@rapid7.com",
"DATE_PUBLIC": "2020-04-06T10:00:00.000Z",
"ID": "CVE-2020-7357",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Cayin CMS Command Injection"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cayin CMS-SE",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "11.0 Build 19179",
"version_value": "11.0 Build 19179"
}
]
}
},
{
"product_name": "Cayin CMS-60",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "11.0 Build 19025",
"version_value": "11.0 Build 19025"
}
]
}
},
{
"product_name": "Cayin CMS-40",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "9.0 Build 14917",
"version_value": "9.0 Build 14917"
}
]
}
},
{
"product_name": "Cayin CMS-20",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "9.0 Build 14917",
"version_value": "9.0 Build 14917"
}
]
}
},
{
"product_name": "Cayin CMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "8.2 Build 12199",
"version_value": "8.2 Build 12199"
},
{
"version_affected": "=",
"version_name": "8.0 Build 11175",
"version_value": "8.0 Build 11175"
},
{
"version_affected": "=",
"version_name": "7.5 Build 11175",
"version_value": "7.5 Build 11175"
}
]
}
}
]
},
"vendor_name": "Cayin Technology"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This issue was discovered by Gjoko Krstic of Zero Science Lab."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cayin CMS suffers from an authenticated OS semi-blind command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the 'NTP_Server_IP' HTTP POST parameter in system.cgi page. This issue affects several branches and versions of the CMS application, including CME-SE, CMS-60, CMS-40, CMS-20, and CMS version 8.2, 8.0, and 7.5."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5570.php",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5570.php"
},
{
"name": "https://github.com/rapid7/metasploit-framework/pull/13607",
"refsource": "MISC",
"url": "https://github.com/rapid7/metasploit-framework/pull/13607"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/182925",
"refsource": "IBM",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/182925"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -1,18 +1,94 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cve@rapid7.com",
"DATE_PUBLIC": "2020-07-08T19:28:00.000Z",
"ID": "CVE-2020-7361",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "ZenTao Pro Command Injection"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ZenTao Pro",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "8.8.2",
"version_value": "8.8.2"
}
]
}
}
]
},
"vendor_name": "EasyCorp"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This issue was discovered by Daniel Monzón."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The EasyCorp ZenTao Pro application suffers from an OS command injection vulnerability in its '/pro/repo-create.html' component. After authenticating to the ZenTao dashboard, attackers may construct and send arbitrary OS commands via the POST parameter 'path', and those commands will run in an elevated SYSTEM context on the underlying Windows operating system."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/rapid7/metasploit-framework/pull/13828",
"refsource": "MISC",
"url": "https://github.com/rapid7/metasploit-framework/pull/13828"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}