diff --git a/2023/0xxx/CVE-2023-0619.json b/2023/0xxx/CVE-2023-0619.json new file mode 100644 index 00000000000..b04a8145679 --- /dev/null +++ b/2023/0xxx/CVE-2023-0619.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0619", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22501.json b/2023/22xxx/CVE-2023-22501.json index 1491c95c835..ec0f5ce6ce4 100644 --- a/2023/22xxx/CVE-2023-22501.json +++ b/2023/22xxx/CVE-2023-22501.json @@ -1,17 +1,121 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-22501", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@atlassian.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An authentication vulnerability was discovered in Jira Service Management Server and Data Center which allows an attacker to impersonate another user and gain access to a Jira Service Management instance under certain circumstances_._ With write access to a User Directory and outgoing email enabled on a Jira Service Management instance, an attacker could gain access to signup tokens sent to users with accounts that have never been logged into. Access to these tokens can be obtained in two cases: * If the attacker is included on Jira issues or requests with these users, or * If the attacker is forwarded or otherwise gains access to emails containing a \u201cView Request\u201d link from these users. Bot accounts are particularly susceptible to this scenario. On instances with single sign-on, external customer accounts can be affected in projects where anyone can create their own account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "BASM (Broken Authentication & Session Management)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Atlassian", + "product": { + "product_data": [ + { + "product_name": "Jira Service Management Data Center", + "version": { + "version_data": [ + { + "version_value": "before 5.3.0", + "version_affected": "!" + }, + { + "version_value": "before 5.3.3", + "version_affected": "=" + }, + { + "version_value": "before 5.4.2", + "version_affected": "=" + }, + { + "version_value": "before 5.5.1", + "version_affected": "=" + }, + { + "version_value": "before 5.6.0", + "version_affected": "=" + } + ] + } + }, + { + "product_name": "Jira Service Management Server", + "version": { + "version_data": [ + { + "version_value": "before 5.3.0", + "version_affected": "!" + }, + { + "version_value": "before 5.3.3", + "version_affected": "=" + }, + { + "version_value": "before 5.4.2", + "version_affected": "=" + }, + { + "version_value": "before 5.5.1", + "version_affected": "=" + }, + { + "version_value": "before 5.6.0", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://jira.atlassian.com/browse/JSDSERVER-12312", + "refsource": "MISC", + "name": "https://jira.atlassian.com/browse/JSDSERVER-12312" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Atlassian" + } + ], + "impact": { + "cvss": [ + { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" } ] } diff --git a/2023/23xxx/CVE-2023-23469.json b/2023/23xxx/CVE-2023-23469.json index b51fc1ca3b9..9669a607f6f 100644 --- a/2023/23xxx/CVE-2023-23469.json +++ b/2023/23xxx/CVE-2023-23469.json @@ -1,17 +1,91 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-23469", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM ICP4A - Automation Decision Services 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 244504." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "525 Information Exposure Through Browser Caching" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Cloud Pak for Business Automation", + "version": { + "version_data": [ + { + "version_value": "18.0.0, 18.0.1,18.0.2,19.0.1,19.0.2,19.0.3,20.0.1,20.0.2,20.0.3,21.0.1,21.0.2,21.0.3,22.0.1,22.0.2", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6857999", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/6857999" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/244504", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/244504" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/23xxx/CVE-2023-23969.json b/2023/23xxx/CVE-2023-23969.json index 2154fd0a486..d692b926056 100644 --- a/2023/23xxx/CVE-2023-23969.json +++ b/2023/23xxx/CVE-2023-23969.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-23969", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-23969", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://groups.google.com/forum/#!forum/django-announce", + "refsource": "MISC", + "name": "https://groups.google.com/forum/#!forum/django-announce" + }, + { + "url": "https://docs.djangoproject.com/en/4.1/releases/security/", + "refsource": "MISC", + "name": "https://docs.djangoproject.com/en/4.1/releases/security/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/", + "url": "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/" } ] }