From 9493c78fb336476abba231c9563d7e8c8dd1415f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 15 Mar 2020 23:01:13 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15708.json | 88 ++++++++++++++++++++++++++++++++++ 2019/17xxx/CVE-2019-17654.json | 68 ++++++++++++++++++++++++++ 2019/6xxx/CVE-2019-6696.json | 64 ++++++++++++++++++++++--- 3 files changed, 213 insertions(+), 7 deletions(-) create mode 100644 2019/15xxx/CVE-2019-15708.json create mode 100644 2019/17xxx/CVE-2019-17654.json diff --git a/2019/15xxx/CVE-2019-15708.json b/2019/15xxx/CVE-2019-15708.json new file mode 100644 index 00000000000..7fe2e7f5061 --- /dev/null +++ b/2019/15xxx/CVE-2019-15708.json @@ -0,0 +1,88 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15708", + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiAP-S/W2", + "version": { + "version_data": [ + { + "version_value": "6.2.1" + }, + { + "version_value": "6.2.0" + }, + { + "version_value": "6.0.5 and below" + } + ] + } + }, + { + "product_name": "Fortinet FortiAP-U", + "version": { + "version_data": [ + { + "version_value": "6.0.5 and below" + } + ] + } + }, + { + "product_name": "Fortinet FortiAP", + "version": { + "version_data": [ + { + "version_value": "below 6.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/psirt/FG-IR-19-209", + "url": "https://fortiguard.com/psirt/FG-IR-19-209" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands." + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17654.json b/2019/17xxx/CVE-2019-17654.json new file mode 100644 index 00000000000..7ab60ac3889 --- /dev/null +++ b/2019/17xxx/CVE-2019-17654.json @@ -0,0 +1,68 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-17654", + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiManager", + "version": { + "version_data": [ + { + "version_value": "6.2.1" + }, + { + "version_value": "6.2.0" + }, + { + "version_value": "6.0.6 and below" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/psirt/FG-IR-19-191", + "url": "https://fortiguard.com/psirt/FG-IR-19-191" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An Insufficient Verification of Data Authenticity vulnerability in FortiManager 6.2.1, 6.2.0, 6.0.6 and below may allow an unauthenticated attacker to perform a Cross-Site WebSocket Hijacking (CSWSH) attack." + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6696.json b/2019/6xxx/CVE-2019-6696.json index 21e6de3cf2e..0c535ac3d07 100644 --- a/2019/6xxx/CVE-2019-6696.json +++ b/2019/6xxx/CVE-2019-6696.json @@ -1,17 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6696", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6696", + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiOS", + "version": { + "version_data": [ + { + "version_value": "6.2.1" + }, + { + "version_value": "6.2.0" + }, + { + "version_value": "6.0.8 and below until 5.4.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/psirt/FG-IR-19-179", + "url": "https://fortiguard.com/psirt/FG-IR-19-179" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper input validation vulnerability in FortiOS 6.2.1, 6.2.0, 6.0.8 and below until 5.4.0 under admin webUI may allow an attacker to perform an URL redirect attack via a specifically crafted request to the admin initial password change webpage." } ] }