From fb22be1ac08bf0bd15bc4d7420c25402061257c5 Mon Sep 17 00:00:00 2001 From: Marc Ruef Date: Sat, 24 Dec 2022 09:05:13 +0100 Subject: [PATCH 1/2] CVE-2020-36626 --- 2020/36xxx/CVE-2020-36626.json | 64 ++++++++++++++++++++++++++++++++-- 1 file changed, 61 insertions(+), 3 deletions(-) diff --git a/2020/36xxx/CVE-2020-36626.json b/2020/36xxx/CVE-2020-36626.json index 1c41fe561a4..69c06ec417e 100644 --- a/2020/36xxx/CVE-2020-36626.json +++ b/2020/36xxx/CVE-2020-36626.json @@ -4,14 +4,72 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-36626", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "TITLE": "Modern Tribe Panel Builder Plugin SearchFilter.php add_post_content_filtered_to_search_sql sql injection", + "REQUESTER": "cna@vuldb.com", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "generator": "vuldb.com", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Modern Tribe", + "product": { + "product_data": [ + { + "product_name": "Panel Builder Plugin", + "version": { + "version_data": [ + { + "version_value": "n\/a" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-89 SQL Injection" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical has been found in Modern Tribe Panel Builder Plugin. Affected is the function add_post_content_filtered_to_search_sql of the file ModularContent\/SearchFilter.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4528d4f855dbbf24e9fc12a162fda84ce3bedc2f. It is recommended to apply a patch to fix this issue. VDB-216738 is the identifier assigned to this vulnerability." + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "baseScore": "5.5", + "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:L\/I:L\/A:L" + } + }, + "references": { + "reference_data": [ + { + "url": "https:\/\/github.com\/moderntribe\/panel-builder\/pull\/173" + }, + { + "url": "https:\/\/github.com\/moderntribe\/panel-builder\/commit\/4528d4f855dbbf24e9fc12a162fda84ce3bedc2f" + }, + { + "url": "https:\/\/vuldb.com\/?id.216738" } ] } From 4058af2d2643cddf437e1a7190f104d37eef2c64 Mon Sep 17 00:00:00 2001 From: Marc Ruef Date: Sat, 24 Dec 2022 09:05:39 +0100 Subject: [PATCH 2/2] CVE-2022-4725 - CVE-2022-4730 --- 2022/4xxx/CVE-2022-4725.json | 67 +++++++++++++++++++- 2022/4xxx/CVE-2022-4726.json | 58 +++++++++++++++++- 2022/4xxx/CVE-2022-4727.json | 115 ++++++++++++++++++++++++++++++++++- 2022/4xxx/CVE-2022-4728.json | 67 +++++++++++++++++++- 2022/4xxx/CVE-2022-4729.json | 67 +++++++++++++++++++- 2022/4xxx/CVE-2022-4730.json | 67 +++++++++++++++++++- 6 files changed, 423 insertions(+), 18 deletions(-) diff --git a/2022/4xxx/CVE-2022-4725.json b/2022/4xxx/CVE-2022-4725.json index 71d801a56fc..383a213c448 100644 --- a/2022/4xxx/CVE-2022-4725.json +++ b/2022/4xxx/CVE-2022-4725.json @@ -4,14 +4,75 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4725", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "TITLE": "AWS SDK XML Parser XpathUtils.java XpathUtils server-side request forgery", + "REQUESTER": "cna@vuldb.com", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "generator": "vuldb.com", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "", + "product": { + "product_data": [ + { + "product_name": "AWS SDK", + "version": { + "version_data": [ + { + "version_value": "2.59.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-918 Server-Side Request Forgery" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in AWS SDK 2.59.1. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core\/src\/main\/java\/com\/amazonaws\/util\/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.60.0 is able to address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability." + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "baseScore": "5.5", + "vectorString": "CVSS:3.1\/AV:A\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + } + }, + "references": { + "reference_data": [ + { + "url": "https:\/\/github.com\/aws-amplify\/aws-sdk-android\/pull\/3100" + }, + { + "url": "https:\/\/github.com\/aws-amplify\/aws-sdk-android\/releases\/tag\/release_v2.60.0" + }, + { + "url": "https:\/\/github.com\/aws-amplify\/aws-sdk-android\/commit\/c3e6d69422e1f0c80fe53f2d757b8df97619af2b" + }, + { + "url": "https:\/\/vuldb.com\/?id.216737" } ] } diff --git a/2022/4xxx/CVE-2022-4726.json b/2022/4xxx/CVE-2022-4726.json index cd4ba5d5977..bf1daf9e88d 100644 --- a/2022/4xxx/CVE-2022-4726.json +++ b/2022/4xxx/CVE-2022-4726.json @@ -4,14 +4,66 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4726", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "TITLE": "SourceCodester Sanitization Management System Admin Login sql injection", + "REQUESTER": "cna@vuldb.com", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "generator": "vuldb.com", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Sanitization Management System", + "version": { + "version_data": [ + { + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-89 SQL Injection" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical was found in SourceCodester Sanitization Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation of the argument username\/password leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216739." + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "baseScore": "6.3", + "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + } + }, + "references": { + "reference_data": [ + { + "url": "https:\/\/vuldb.com\/?id.216739" } ] } diff --git a/2022/4xxx/CVE-2022-4727.json b/2022/4xxx/CVE-2022-4727.json index 59fe4d3850c..d100e96a97b 100644 --- a/2022/4xxx/CVE-2022-4727.json +++ b/2022/4xxx/CVE-2022-4727.json @@ -4,14 +4,123 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4727", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "TITLE": "OpenMRS Appointment Scheduling Module Notes AppointmentRequest.java getNotes cross site scripting", + "REQUESTER": "cna@vuldb.com", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "generator": "vuldb.com", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenMRS", + "product": { + "product_data": [ + { + "product_name": "Appointment Scheduling Module", + "version": { + "version_data": [ + { + "version_value": "1.0" + }, + { + "version_value": "1.1" + }, + { + "version_value": "1.2" + }, + { + "version_value": "1.3" + }, + { + "version_value": "1.4" + }, + { + "version_value": "1.5" + }, + { + "version_value": "1.6" + }, + { + "version_value": "1.7" + }, + { + "version_value": "1.8" + }, + { + "version_value": "1.9" + }, + { + "version_value": "1.10" + }, + { + "version_value": "1.11" + }, + { + "version_value": "1.12" + }, + { + "version_value": "1.13" + }, + { + "version_value": "1.14" + }, + { + "version_value": "1.15" + }, + { + "version_value": "1.16" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as problematic, was found in OpenMRS Appointment Scheduling Module up to 1.16.x. This affects the function getNotes of the file api\/src\/main\/java\/org\/openmrs\/module\/appointmentscheduling\/AppointmentRequest.java of the component Notes Handler. The manipulation of the argument notes leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.17.0 is able to address this issue. The name of the patch is 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8. It is recommended to upgrade the affected component. The identifier VDB-216741 was assigned to this vulnerability." + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "baseScore": "3.5", + "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + } + }, + "references": { + "reference_data": [ + { + "url": "https:\/\/github.com\/openmrs\/openmrs-module-appointmentscheduling\/pull\/39" + }, + { + "url": "https:\/\/github.com\/openmrs\/openmrs-module-appointmentscheduling\/releases\/tag\/1.17.0" + }, + { + "url": "https:\/\/github.com\/openmrs\/openmrs-module-appointmentscheduling\/commit\/2ccbe39c020809765de41eeb8ee4c70b5ec49cc8" + }, + { + "url": "https:\/\/vuldb.com\/?id.216741" } ] } diff --git a/2022/4xxx/CVE-2022-4728.json b/2022/4xxx/CVE-2022-4728.json index 57166ca1fae..3ed42c44467 100644 --- a/2022/4xxx/CVE-2022-4728.json +++ b/2022/4xxx/CVE-2022-4728.json @@ -4,14 +4,75 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4728", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "TITLE": "Graphite Web Cookie cross site scripting", + "REQUESTER": "cna@vuldb.com", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "generator": "vuldb.com", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Graphite", + "product": { + "product_data": [ + { + "product_name": "Web", + "version": { + "version_data": [ + { + "version_value": "n\/a" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in Graphite Web and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. VDB-216742 is the identifier assigned to this vulnerability." + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "baseScore": "3.5", + "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + } + }, + "references": { + "reference_data": [ + { + "url": "https:\/\/github.com\/graphite-project\/graphite-web\/issues\/2744" + }, + { + "url": "https:\/\/github.com\/graphite-project\/graphite-web\/pull\/2785" + }, + { + "url": "https:\/\/github.com\/graphite-project\/graphite-web\/commit\/2f178f490e10efc03cd1d27c72f64ecab224eb23" + }, + { + "url": "https:\/\/vuldb.com\/?id.216742" } ] } diff --git a/2022/4xxx/CVE-2022-4729.json b/2022/4xxx/CVE-2022-4729.json index 2056729fa0c..d6f813a06dc 100644 --- a/2022/4xxx/CVE-2022-4729.json +++ b/2022/4xxx/CVE-2022-4729.json @@ -4,14 +4,75 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4729", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "TITLE": "Graphite Web Template Name cross site scripting", + "REQUESTER": "cna@vuldb.com", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "generator": "vuldb.com", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Graphite", + "product": { + "product_data": [ + { + "product_name": "Web", + "version": { + "version_data": [ + { + "version_value": "n\/a" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Graphite Web and classified as problematic. This issue affects some unknown processing of the component Template Name Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216743." + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "baseScore": "3.5", + "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + } + }, + "references": { + "reference_data": [ + { + "url": "https:\/\/github.com\/graphite-project\/graphite-web\/issues\/2745" + }, + { + "url": "https:\/\/github.com\/graphite-project\/graphite-web\/pull\/2785" + }, + { + "url": "https:\/\/github.com\/graphite-project\/graphite-web\/commit\/2f178f490e10efc03cd1d27c72f64ecab224eb23" + }, + { + "url": "https:\/\/vuldb.com\/?id.216743" } ] } diff --git a/2022/4xxx/CVE-2022-4730.json b/2022/4xxx/CVE-2022-4730.json index 7d538ad4bd6..5051bd7d717 100644 --- a/2022/4xxx/CVE-2022-4730.json +++ b/2022/4xxx/CVE-2022-4730.json @@ -4,14 +4,75 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4730", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "TITLE": "Graphite Web Absolute Time Range cross site scripting", + "REQUESTER": "cna@vuldb.com", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "generator": "vuldb.com", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Graphite", + "product": { + "product_data": [ + { + "product_name": "Web", + "version": { + "version_data": [ + { + "version_value": "n\/a" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216744." + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "baseScore": "3.5", + "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + } + }, + "references": { + "reference_data": [ + { + "url": "https:\/\/github.com\/graphite-project\/graphite-web\/issues\/2746" + }, + { + "url": "https:\/\/github.com\/graphite-project\/graphite-web\/pull\/2785" + }, + { + "url": "https:\/\/github.com\/graphite-project\/graphite-web\/commit\/2f178f490e10efc03cd1d27c72f64ecab224eb23" + }, + { + "url": "https:\/\/vuldb.com\/?id.216744" } ] }