"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-06-27 16:00:54 +00:00 committed by Nayan Chandni
parent 5f79569a30
commit a5cdd25b6c
16 changed files with 217 additions and 4 deletions

View File

@ -71,6 +71,11 @@
"name": "GLSA-201801-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201801-17"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://gitlab.freedesktop.org/poppler/poppler/issues/654",
"refsource": "MISC",
"url": "https://gitlab.freedesktop.org/poppler/poppler/issues/654"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -86,6 +86,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-d04944813d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276",
"refsource": "MISC",
"name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41275",
"refsource": "MISC",
"name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41275"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274",
"refsource": "MISC",
"name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276",
"refsource": "MISC",
"name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-0ea42f074e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-cb2bff6d48",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-0ea42f074e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-7226",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,48 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The ABB IDAL HTTP server CGI interface contains a URL that allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. Specifically, /cgi/loginDefaultUser creates a session in an authenticated state and returns the session ID along with what may be the username and cleartext password of the user. An attacker can then supply an IDALToken value in a cookie, which will allow them to perform privileged operations such as restarting the service with /cgi/restart. A GET request to /cgi/loginDefaultUser may result in \"1 #S_OK IDALToken=532c8632b86694f0232a68a0897a145c admin admin\" or a similar response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "FULLDISC",
"name": "20190624 XL-19-010 - ABB IDAL HTTP Server Authentication Bypass Vulnerability",
"url": "http://seclists.org/fulldisclosure/2019/Jun/39"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/153402/ABB-IDAL-HTTP-Server-Authentication-Bypass.html",
"url": "http://packetstormsecurity.com/files/153402/ABB-IDAL-HTTP-Server-Authentication-Bypass.html"
},
{
"refsource": "BID",
"name": "108886",
"url": "http://www.securityfocus.com/bid/108886"
},
{
"refsource": "MISC",
"name": "https://www.darkmatter.ae/xen1thlabs/abb-idal-http-server-authentication-bypass-vulnerability-xl-19-010/",
"url": "https://www.darkmatter.ae/xen1thlabs/abb-idal-http-server-authentication-bypass-vulnerability-xl-19-010/"
},
{
"refsource": "FULLDISC",
"name": "20190620 XL-19-010 - ABB IDAL HTTP Server Authentication Bypass\tVulnerability",
"url": "http://seclists.org/fulldisclosure/2019/Jun/39"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-7227",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,53 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the ABB IDAL FTP server, an authenticated attacker can traverse to arbitrary directories on the hard disk with \"CWD ../\" and then use the FTP server functionality to download and upload files. An unauthenticated attacker can take advantage of the hardcoded or default credential pair exor/exor to become an authenticated attacker."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "FULLDISC",
"name": "20190624 XL-19-008 - ABB IDAL FTP Server Path Traversal Vulnerability",
"url": "http://seclists.org/fulldisclosure/2019/Jun/37"
},
{
"refsource": "CONFIRM",
"name": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch",
"url": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/153396/ABB-IDAL-FTP-Server-Path-Traversal.html",
"url": "http://packetstormsecurity.com/files/153396/ABB-IDAL-FTP-Server-Path-Traversal.html"
},
{
"refsource": "BID",
"name": "108886",
"url": "http://www.securityfocus.com/bid/108886"
},
{
"refsource": "FULLDISC",
"name": "20190620 XL-19-008 - ABB IDAL FTP Server Path Traversal Vulnerability",
"url": "http://seclists.org/fulldisclosure/2019/Jun/37"
},
{
"refsource": "MISC",
"name": "https://www.darkmatter.ae/xen1thlabs/abb-idal-ftp-server-path-traversal-vulnerability-xl-19-008/",
"url": "https://www.darkmatter.ae/xen1thlabs/abb-idal-ftp-server-path-traversal-vulnerability-xl-19-008/"
}
]
}

View File

@ -52,11 +52,26 @@
},
"references": {
"reference_data": [
{
"refsource": "FULLDISC",
"name": "20190624 XL-19-012 - ABB IDAL HTTP Server Uncontrolled Format String Vulnerability",
"url": "http://seclists.org/fulldisclosure/2019/Jun/43"
},
{
"refsource": "CONFIRM",
"name": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch",
"url": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/153404/ABB-IDAL-HTTP-Server-Uncontrolled-Format-String.html",
"url": "http://packetstormsecurity.com/files/153404/ABB-IDAL-HTTP-Server-Uncontrolled-Format-String.html"
},
{
"refsource": "BID",
"name": "108886",
"url": "http://www.securityfocus.com/bid/108886"
},
{
"refsource": "MISC",
"name": "https://www.darkmatter.ae/xen1thlabs/abb-idal-http-server-uncontrolled-format-string-vulnerability-xl-19-012/",

View File

@ -91,6 +91,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-d04944813d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190408 [SECURITY] [DLA 1752-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00011.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-3193a75b06",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/"
},
{
"refsource": "UBUNTU",
"name": "USN-4042-1",
"url": "https://usn.ubuntu.com/4042-1/"
}
]
}