From 8fd378169adf8e2870a31dd2b9eeaf1165ad40d2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 26 Dec 2023 08:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/42xxx/CVE-2023-42436.json | 58 +++++++++++++++++++++++++++++++--- 2023/45xxx/CVE-2023-45737.json | 58 +++++++++++++++++++++++++++++++--- 2023/45xxx/CVE-2023-45740.json | 58 +++++++++++++++++++++++++++++++--- 2023/45xxx/CVE-2023-45741.json | 58 +++++++++++++++++++++++++++++++--- 2023/46xxx/CVE-2023-46681.json | 58 +++++++++++++++++++++++++++++++--- 2023/46xxx/CVE-2023-46699.json | 58 +++++++++++++++++++++++++++++++--- 2023/46xxx/CVE-2023-46711.json | 58 +++++++++++++++++++++++++++++++--- 2023/47xxx/CVE-2023-47215.json | 58 +++++++++++++++++++++++++++++++--- 2023/49xxx/CVE-2023-49119.json | 58 +++++++++++++++++++++++++++++++--- 2023/49xxx/CVE-2023-49598.json | 58 +++++++++++++++++++++++++++++++--- 2023/49xxx/CVE-2023-49779.json | 58 +++++++++++++++++++++++++++++++--- 2023/49xxx/CVE-2023-49807.json | 58 +++++++++++++++++++++++++++++++--- 2023/50xxx/CVE-2023-50175.json | 58 +++++++++++++++++++++++++++++++--- 2023/50xxx/CVE-2023-50294.json | 58 +++++++++++++++++++++++++++++++--- 2023/50xxx/CVE-2023-50332.json | 58 +++++++++++++++++++++++++++++++--- 2023/50xxx/CVE-2023-50339.json | 58 +++++++++++++++++++++++++++++++--- 2023/51xxx/CVE-2023-51363.json | 58 +++++++++++++++++++++++++++++++--- 17 files changed, 918 insertions(+), 68 deletions(-) diff --git a/2023/42xxx/CVE-2023-42436.json b/2023/42xxx/CVE-2023-42436.json index 41b1bc257e6..fa3e10dfc5f 100644 --- a/2023/42xxx/CVE-2023-42436.json +++ b/2023/42xxx/CVE-2023-42436.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-42436", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability exists in the presentation feature of GROWI versions prior to v3.4.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v3.4.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/45xxx/CVE-2023-45737.json b/2023/45xxx/CVE-2023-45737.json index 72c50f56f6a..1fc0563b4a4 100644 --- a/2023/45xxx/CVE-2023-45737.json +++ b/2023/45xxx/CVE-2023-45737.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-45737", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page and the Markdown Settings (/admin/markdown) page of GROWI versions prior to v3.5.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v3.5.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/45xxx/CVE-2023-45740.json b/2023/45xxx/CVE-2023-45740.json index 1bfecf461db..c0874596ad6 100644 --- a/2023/45xxx/CVE-2023-45740.json +++ b/2023/45xxx/CVE-2023-45740.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-45740", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability when processing profile images exists in GROWI versions prior to v4.1.3. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v4.1.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/45xxx/CVE-2023-45741.json b/2023/45xxx/CVE-2023-45741.json index 0fcf2fa846c..b78417959f5 100644 --- a/2023/45xxx/CVE-2023-45741.json +++ b/2023/45xxx/CVE-2023-45741.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-45741", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "VR-S1000 firmware Ver. 2.37 and earlier allows an attacker with access to the product's web management page to execute arbitrary OS commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "OS command injection" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "BUFFALO INC.", + "product": { + "product_data": [ + { + "product_name": "VR-S1000", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "firmware Ver. 2.37 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.buffalo.jp/news/detail/20231225-01.html", + "refsource": "MISC", + "name": "https://www.buffalo.jp/news/detail/20231225-01.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN23771490/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN23771490/" } ] } diff --git a/2023/46xxx/CVE-2023-46681.json b/2023/46xxx/CVE-2023-46681.json index 61873970da1..11864faeab7 100644 --- a/2023/46xxx/CVE-2023-46681.json +++ b/2023/46xxx/CVE-2023-46681.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-46681", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability in VR-S1000 firmware Ver. 2.37 and earlier allows an authenticated attacker who can access to the product's command line interface to execute an arbitrary command." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper neutralization of argument delimiters in a command ('Argument Injection')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "BUFFALO INC.", + "product": { + "product_data": [ + { + "product_name": "VR-S1000", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "firmware Ver. 2.37 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.buffalo.jp/news/detail/20231225-01.html", + "refsource": "MISC", + "name": "https://www.buffalo.jp/news/detail/20231225-01.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN23771490/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN23771490/" } ] } diff --git a/2023/46xxx/CVE-2023-46699.json b/2023/46xxx/CVE-2023-46699.json index a6c3f931f20..f97df81e005 100644 --- a/2023/46xxx/CVE-2023-46699.json +++ b/2023/46xxx/CVE-2023-46699.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-46699", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site request forgery (CSRF) vulnerability exists in the User settings (/me) page of GROWI versions prior to v6.0.0. If a user views a malicious page while logging in, settings may be changed without the user's intention." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site request forgery (CSRF)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v6.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/46xxx/CVE-2023-46711.json b/2023/46xxx/CVE-2023-46711.json index 62c8d416c3f..fe9ce977de0 100644 --- a/2023/46xxx/CVE-2023-46711.json +++ b/2023/46xxx/CVE-2023-46711.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-46711", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "VR-S1000 firmware Ver. 2.37 and earlier uses a hard-coded cryptographic key which may allow an attacker to analyze the password of a specific product user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use of Hard-coded Cryptographic Key" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "BUFFALO INC.", + "product": { + "product_data": [ + { + "product_name": "VR-S1000", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "firmware Ver. 2.37 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.buffalo.jp/news/detail/20231225-01.html", + "refsource": "MISC", + "name": "https://www.buffalo.jp/news/detail/20231225-01.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN23771490/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN23771490/" } ] } diff --git a/2023/47xxx/CVE-2023-47215.json b/2023/47xxx/CVE-2023-47215.json index a67fee1f108..1471ed93d74 100644 --- a/2023/47xxx/CVE-2023-47215.json +++ b/2023/47xxx/CVE-2023-47215.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-47215", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability which is exploiting a behavior of the XSS Filter exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v6.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/49xxx/CVE-2023-49119.json b/2023/49xxx/CVE-2023-49119.json index 8cfc9218d06..70188159dba 100644 --- a/2023/49xxx/CVE-2023-49119.json +++ b/2023/49xxx/CVE-2023-49119.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49119", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability via the img tags exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v6.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/49xxx/CVE-2023-49598.json b/2023/49xxx/CVE-2023-49598.json index 8a164ff6807..bbdf3696267 100644 --- a/2023/49xxx/CVE-2023-49598.json +++ b/2023/49xxx/CVE-2023-49598.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49598", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability exists in the event handlers of the pre tags in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v6.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/49xxx/CVE-2023-49779.json b/2023/49xxx/CVE-2023-49779.json index 36c66d7060d..680c610d59a 100644 --- a/2023/49xxx/CVE-2023-49779.json +++ b/2023/49xxx/CVE-2023-49779.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49779", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability exists in the anchor tag of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v6.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/49xxx/CVE-2023-49807.json b/2023/49xxx/CVE-2023-49807.json index 83fd8133ef0..736c5bb9762 100644 --- a/2023/49xxx/CVE-2023-49807.json +++ b/2023/49xxx/CVE-2023-49807.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-49807", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability when processing the MathJax exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v6.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/50xxx/CVE-2023-50175.json b/2023/50xxx/CVE-2023-50175.json index b8e669541d9..733ed51fc7e 100644 --- a/2023/50xxx/CVE-2023-50175.json +++ b/2023/50xxx/CVE-2023-50175.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50175", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v6.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/50xxx/CVE-2023-50294.json b/2023/50xxx/CVE-2023-50294.json index d8f32381b2b..91faaf610af 100644 --- a/2023/50xxx/CVE-2023-50294.json +++ b/2023/50xxx/CVE-2023-50294.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50294", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The App Settings (/admin/app) page in GROWI versions prior to v6.0.6 stores sensitive information in cleartext form. As a result, the Secret access key for external service may be obtained by an attacker who can access the App Settings page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cleartext storage of sensitive information" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v6.0.6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/50xxx/CVE-2023-50332.json b/2023/50xxx/CVE-2023-50332.json index edda1947aec..24752c83923 100644 --- a/2023/50xxx/CVE-2023-50332.json +++ b/2023/50xxx/CVE-2023-50332.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50332", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper authorization vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.0.6. If this vulnerability is exploited, a user may delete or suspend its own account without the user's intention.\r\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authorization" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "prior to v6.0.6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/50xxx/CVE-2023-50339.json b/2023/50xxx/CVE-2023-50339.json index bf77960b86b..32fe56bb7f0 100644 --- a/2023/50xxx/CVE-2023-50339.json +++ b/2023/50xxx/CVE-2023-50339.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-50339", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.1.11. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WESEEK, Inc.", + "product": { + "product_data": [ + { + "product_name": "GROWI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "v6.1.11" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "refsource": "MISC", + "name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/" + }, + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN18715935/" } ] } diff --git a/2023/51xxx/CVE-2023-51363.json b/2023/51xxx/CVE-2023-51363.json index 2aadbf91dc2..51c1b7c3ef5 100644 --- a/2023/51xxx/CVE-2023-51363.json +++ b/2023/51xxx/CVE-2023-51363.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-51363", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "VR-S1000 firmware Ver. 2.37 and earlier allows a network-adjacent unauthenticated attacker who can access the product's web management page to obtain sensitive information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "BUFFALO INC.", + "product": { + "product_data": [ + { + "product_name": "VR-S1000", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "firmware Ver. 2.37 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.buffalo.jp/news/detail/20231225-01.html", + "refsource": "MISC", + "name": "https://www.buffalo.jp/news/detail/20231225-01.html" + }, + { + "url": "https://jvn.jp/en/jp/JVN23771490/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN23771490/" } ] }