From 9247be3e92648d6809cd3ba50b06791daec9a65c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 11 Dec 2023 12:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/6xxx/CVE-2023-6185.json | 89 ++++++++++++++++++++++++++++++++++-- 2023/6xxx/CVE-2023-6186.json | 89 ++++++++++++++++++++++++++++++++++-- 2023/6xxx/CVE-2023-6678.json | 18 ++++++++ 2023/6xxx/CVE-2023-6679.json | 18 ++++++++ 4 files changed, 206 insertions(+), 8 deletions(-) create mode 100644 2023/6xxx/CVE-2023-6678.json create mode 100644 2023/6xxx/CVE-2023-6679.json diff --git a/2023/6xxx/CVE-2023-6185.json b/2023/6xxx/CVE-2023-6185.json index 39559aba61b..7341b3cb3bc 100644 --- a/2023/6xxx/CVE-2023-6185.json +++ b/2023/6xxx/CVE-2023-6185.json @@ -1,17 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-6185", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@documentfoundation.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins.\n\nIn affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "The Document Foundation", + "product": { + "product_data": [ + { + "product_name": "LibreOffice", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.5", + "version_value": "7.5.9" + }, + { + "version_affected": "<", + "version_name": "7.6", + "version_value": "7.6.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185", + "refsource": "MISC", + "name": "https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Thanks to Reginaldo Silva of ubercomp.com for finding and reporting this issue" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/6xxx/CVE-2023-6186.json b/2023/6xxx/CVE-2023-6186.json index ec3526ede8d..8fa0f0cefd2 100644 --- a/2023/6xxx/CVE-2023-6186.json +++ b/2023/6xxx/CVE-2023-6186.json @@ -1,17 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-6186", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@documentfoundation.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning.\n\nIn affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "The Document Foundation", + "product": { + "product_data": [ + { + "product_name": "LibreOffice", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7.5", + "version_value": "7.5.9" + }, + { + "version_affected": "<", + "version_name": "7.6", + "version_value": "7.6.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186", + "refsource": "MISC", + "name": "https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Thanks to Reginaldo Silva of ubercomp.com for finding and reporting this issue" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/6xxx/CVE-2023-6678.json b/2023/6xxx/CVE-2023-6678.json new file mode 100644 index 00000000000..35c568d258f --- /dev/null +++ b/2023/6xxx/CVE-2023-6678.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-6678", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/6xxx/CVE-2023-6679.json b/2023/6xxx/CVE-2023-6679.json new file mode 100644 index 00000000000..761f00dd7b9 --- /dev/null +++ b/2023/6xxx/CVE-2023-6679.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-6679", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file