mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-07 13:37:31 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
24be5c48a3
commit
8b142a0c43
@ -1,17 +1,149 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2025-5151",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability classified as critical has been found in defog-ai introspect up to 0.1.4. This affects the function execute_analysis_code_safely of the file introspect/backend/tools/analysis_tools.py. The manipulation of the argument code leads to code injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The patch is named 502. It is recommended to apply a patch to fix this issue. The code maintainer explains, that \"[they] have added some workarounds to address this in #502, but will not be implementing a full fix. This is because this repo is meant to be run in a docker environment, which will significantly mitigate potential security risks. Having said that, we have added a SECURITY section in our README to make this clearer to users.\""
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Es wurde eine Schwachstelle in defog-ai introspect bis 0.1.4 entdeckt. Sie wurde als kritisch eingestuft. Betroffen hiervon ist die Funktion execute_analysis_code_safely der Datei introspect/backend/tools/analysis_tools.py. Mittels Manipulieren des Arguments code mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als 502 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Code Injection",
|
||||
"cweId": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Injection",
|
||||
"cweId": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "defog-ai",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "introspect",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "0.1.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "0.1.1"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "0.1.2"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "0.1.3"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "0.1.4"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.310239",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.310239"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.310239",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.310239"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.574809",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?submit.574809"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/defog-ai/introspect/issues/495",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/defog-ai/introspect/issues/495"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/defog-ai/introspect/issues/495#issuecomment-2894640278",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/defog-ai/introspect/issues/495#issuecomment-2894640278"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/defog-ai/introspect/issues/495#issue-3036141048",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/defog-ai/introspect/issues/495#issue-3036141048"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/defog-ai/introspect/pull/502",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/defog-ai/introspect/pull/502"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ybdesire (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 5.3,
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 5.3,
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 4.3,
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user