From fe2c57aa116900e7c3f604f2745587d99eaec7e0 Mon Sep 17 00:00:00 2001 From: "mrehak@redhat.com" Date: Mon, 1 Jul 2019 16:23:26 +0200 Subject: [PATCH 1/2] CVE-2019-10137 --- 2019/10xxx/CVE-2019-10137.json | 61 +++++++++++++++++++++++++++++++--- 1 file changed, 57 insertions(+), 4 deletions(-) diff --git a/2019/10xxx/CVE-2019-10137.json b/2019/10xxx/CVE-2019-10137.json index d765b1597b0..26fb2bcf664 100644 --- a/2019/10xxx/CVE-2019-10137.json +++ b/2019/10xxx/CVE-2019-10137.json @@ -4,15 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10137", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "mrehak@redhat.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "spacewalkproject", + "product": { + "product_data": [ + { + "product_name": "spacewalk-proxy", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10137", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10137", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A path traversal flaw was found in spacewalk-proxy in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to the proxy's filesystem, or can execute arbitrary code in the context of the httpd process." } ] + }, + "impact": { + "cvss": [ + [ + { + "vectorString": "8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + ] + ] } -} \ No newline at end of file +} From d615995b14056bf5c8403291bc0130cdec8cea62 Mon Sep 17 00:00:00 2001 From: "mrehak@redhat.com" Date: Tue, 2 Jul 2019 14:04:55 +0200 Subject: [PATCH 2/2] Versions added --- 2019/10xxx/CVE-2019-10137.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2019/10xxx/CVE-2019-10137.json b/2019/10xxx/CVE-2019-10137.json index 26fb2bcf664..a64abaa5310 100644 --- a/2019/10xxx/CVE-2019-10137.json +++ b/2019/10xxx/CVE-2019-10137.json @@ -18,7 +18,7 @@ "version": { "version_data": [ { - "version_value": "n/a" + "version_value": "spacewalk through 2.8" } ] } @@ -54,7 +54,7 @@ "description_data": [ { "lang": "eng", - "value": "A path traversal flaw was found in spacewalk-proxy in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to the proxy's filesystem, or can execute arbitrary code in the context of the httpd process." + "value": "A path traversal flaw was found in spacewalk-proxy, all versions through 2.8, in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to the proxy's filesystem, or can execute arbitrary code in the context of the httpd process." } ] },