- Synchronized data.

This commit is contained in:
CVE Team 2019-01-28 14:05:16 -05:00
parent 60d9c77be6
commit 9a0677de1e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 224 additions and 189 deletions

View File

@ -1,25 +1,16 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta" : { "CVE_data_meta" : {
"ID": "CVE-2017-6922", "AKA" : "",
"ASSIGNER" : "mlhess@drupal.org", "ASSIGNER" : "mlhess@drupal.org",
"DATE_PUBLIC" : "", "DATE_PUBLIC" : "",
"TITLE": "Files uploaded by anonymous users into a private file system can be accessed by other anonymous users", "ID" : "CVE-2017-6922",
"AKA": "", "STATE" : "PUBLIC",
"STATE": "PUBLIC" "TITLE" : "Files uploaded by anonymous users into a private file system can be accessed by other anonymous users"
},
"source": {
"defect": [],
"advisory": "SA-CORE-2017-003",
"discovery": "UNKNOWN"
}, },
"affects" : { "affects" : {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
{ {
"vendor_name": "Drupal",
"product" : { "product" : {
"product_data" : [ "product_data" : [
{ {
@ -27,34 +18,57 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_name": "Drupal 8 ",
"affected" : "<", "affected" : "<",
"version_value": "8.3.3", "platform" : "",
"platform": "" "version_name" : "Drupal 8 ",
"version_value" : "8.3.3"
}, },
{ {
"version_name": "Drupal 7 ",
"affected" : "<", "affected" : "<",
"version_value": "7.55", "platform" : "",
"platform": "" "version_name" : "Drupal 7 ",
"version_value" : "7.55"
} }
] ]
} }
} }
] ]
} },
"vendor_name" : "Drupal"
} }
] ]
} }
}, },
"configuration" : [],
"credit" : [],
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : { "description" : {
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value": "Private files that have been uploaded by an anonymous user but not permanently attached to content on the site should only be visible to the anonymous user that uploaded them, rather than all anonymous users. Drupal core before 7.56 and 8.x before 8.3.4 did not previously provide this protection, allowing an access bypass vulnerability to occur. This issue is mitigated by the fact that in order to be affected, the site must allow anonymous users to upload files into a private file system." "value" : "In Drupal core 8.x prior to 8.3.4 and Drupal core 7.x prior to 7.56; Private files that have been uploaded by an anonymous user but not permanently attached to content on the site should only be visible to the anonymous user that uploaded them, rather than all anonymous users. Drupal core did not previously provide this protection, allowing an access bypass vulnerability to occur. This issue is mitigated by the fact that in order to be affected, the site must allow anonymous users to upload files into a private file system."
} }
] ]
}, },
"exploit" : [],
"impact" : {
"cvss" : {
"attackComplexity" : "HIGH",
"attackVector" : "PHYSICAL",
"availabilityImpact" : "NONE",
"baseScore" : 0,
"baseSeverity" : "NONE",
"confidentialityImpact" : "NONE",
"integrityImpact" : "NONE",
"privilegesRequired" : "HIGH",
"scope" : "UNCHANGED",
"userInteraction" : "REQUIRED",
"vectorString" : "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N",
"version" : "3.0"
}
},
"problemtype" : { "problemtype" : {
"problemtype_data" : [ "problemtype_data" : [
{ {
@ -70,31 +84,32 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-06-21/drupal-core-multiple",
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-06-21/drupal-core-multiple", "url" : "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-06-21/drupal-core-multiple"
"name": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-06-21/drupal-core-multiple" },
{
"name" : "DSA-3897",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-3897"
},
{
"name" : "99219",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99219"
},
{
"name" : "1038781",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038781"
} }
] ]
}, },
"configuration": [],
"impact": {
"cvss": {
"version": "3.0",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N",
"baseScore": 0,
"baseSeverity": "NONE"
}
},
"exploit": [],
"work_around": [],
"solution" : [], "solution" : [],
"credit": [] "source" : {
"advisory" : "SA-CORE-2017-003",
"defect" : [],
"discovery" : "UNKNOWN"
},
"work_around" : []
} }

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01" "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
} }
] ]

View File

@ -1,25 +1,16 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta" : { "CVE_data_meta" : {
"ID": "CVE-2018-7603", "AKA" : "",
"ASSIGNER" : "mlhess@drupal.org", "ASSIGNER" : "mlhess@drupal.org",
"DATE_PUBLIC" : "", "DATE_PUBLIC" : "",
"TITLE": "Search Autocomplete ", "ID" : "CVE-2018-7603",
"AKA": "", "STATE" : "PUBLIC",
"STATE": "PUBLIC" "TITLE" : "Search Autocomplete "
},
"source": {
"defect": [],
"advisory": "https://www.drupal.org/sa-contrib-2018-070",
"discovery": "UNKNOWN"
}, },
"affects" : { "affects" : {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
{ {
"vendor_name": "Drupal",
"product" : { "product" : {
"product_data" : [ "product_data" : [
{ {
@ -27,28 +18,56 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_name": "7.x-4.x",
"affected" : "<", "affected" : "<",
"version_value": "7.x-4.8", "platform" : "",
"platform": "" "version_name" : "7.x-4.x",
"version_value" : "7.x-4.8"
} }
] ]
} }
} }
] ]
} },
"vendor_name" : "Drupal"
} }
] ]
} }
}, },
"configuration" : [],
"credit" : [
{
"lang" : "eng",
"value" : "Reported By: Simon Kapadia Fixed By: Dominique CLAUSE"
}
],
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : { "description" : {
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value": "In Drupal's 3rd party module Search Autocomplete prior to versions 7.x-4.8 there is a Cross Site Scripting vulnerability. This Search Autocomplete module enables you to autocomplete textfield using data from your website (nodes, comments, etc.). The module doesn't sufficiently filter user-entered text among the autocompletion items leading to a Cross Site Scripting (XSS) vulnerability. This vulnerability can be exploited by any user allowed to create one of the autocompletion item, for instance, nodes, users, comments." "value" : "In Drupal's 3rd party module search auto complete prior to versions 7.x-4.8 there is a Cross Site Scripting vulnerability. This Search Autocomplete module enables you to autocomplete textfield using data from your website (nodes, comments, etc.). The module doesn't sufficiently filter user-entered text among the autocompletion items leading to a Cross Site Scripting (XSS) vulnerability. This vulnerability can be exploited by any user allowed to create one of the autocompletion item, for instance, nodes, users, comments."
} }
] ]
}, },
"exploit" : [],
"impact" : {
"cvss" : {
"attackComplexity" : "HIGH",
"attackVector" : "PHYSICAL",
"availabilityImpact" : "NONE",
"baseScore" : 0,
"baseSeverity" : "NONE",
"confidentialityImpact" : "NONE",
"integrityImpact" : "NONE",
"privilegesRequired" : "HIGH",
"scope" : "UNCHANGED",
"userInteraction" : "REQUIRED",
"vectorString" : "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N",
"version" : "3.0"
}
},
"problemtype" : { "problemtype" : {
"problemtype_data" : [ "problemtype_data" : [
{ {
@ -64,36 +83,17 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://www.drupal.org/sa-contrib-2018-070",
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url": "https://www.drupal.org/sa-contrib-2018-070", "url" : "https://www.drupal.org/sa-contrib-2018-070"
"name": "https://www.drupal.org/sa-contrib-2018-070"
} }
] ]
}, },
"configuration": [],
"impact": {
"cvss": {
"version": "3.0",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N",
"baseScore": 0,
"baseSeverity": "NONE"
}
},
"exploit": [],
"work_around": [],
"solution" : [], "solution" : [],
"credit": [ "source" : {
{ "advisory" : "https://www.drupal.org/sa-contrib-2018-070",
"lang": "eng", "defect" : [],
"value": "Reported By: Simon Kapadia Fixed By: Dominique CLAUSE" "discovery" : "UNKNOWN"
} },
] "work_around" : []
} }

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-6989",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}