From a5cdd25b6cc003769cb0a91ec687f17b1d5eca99 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 27 Jun 2019 16:00:54 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/9xxx/CVE-2017-9865.json | 5 +++ 2018/18xxx/CVE-2018-18897.json | 5 +++ 2018/20xxx/CVE-2018-20662.json | 5 +++ 2019/10xxx/CVE-2019-10018.json | 5 +++ 2019/10xxx/CVE-2019-10019.json | 5 +++ 2019/10xxx/CVE-2019-10021.json | 5 +++ 2019/10xxx/CVE-2019-10023.json | 5 +++ 2019/10xxx/CVE-2019-10872.json | 5 +++ 2019/10xxx/CVE-2019-10873.json | 5 +++ 2019/12xxx/CVE-2019-12293.json | 5 +++ 2019/7xxx/CVE-2019-7226.json | 68 ++++++++++++++++++++++++++++++- 2019/7xxx/CVE-2019-7227.json | 73 +++++++++++++++++++++++++++++++++- 2019/7xxx/CVE-2019-7228.json | 15 +++++++ 2019/9xxx/CVE-2019-9200.json | 5 +++ 2019/9xxx/CVE-2019-9631.json | 5 +++ 2019/9xxx/CVE-2019-9903.json | 5 +++ 16 files changed, 217 insertions(+), 4 deletions(-) diff --git a/2017/9xxx/CVE-2017-9865.json b/2017/9xxx/CVE-2017-9865.json index 35f9814a4eb..731e842f8e5 100644 --- a/2017/9xxx/CVE-2017-9865.json +++ b/2017/9xxx/CVE-2017-9865.json @@ -71,6 +71,11 @@ "name": "GLSA-201801-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201801-17" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2018/18xxx/CVE-2018-18897.json b/2018/18xxx/CVE-2018-18897.json index b2d6cbe6550..e4d7ac2a412 100644 --- a/2018/18xxx/CVE-2018-18897.json +++ b/2018/18xxx/CVE-2018-18897.json @@ -56,6 +56,11 @@ "name": "https://gitlab.freedesktop.org/poppler/poppler/issues/654", "refsource": "MISC", "url": "https://gitlab.freedesktop.org/poppler/poppler/issues/654" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2018/20xxx/CVE-2018-20662.json b/2018/20xxx/CVE-2018-20662.json index 9feacd49e13..46580525a37 100644 --- a/2018/20xxx/CVE-2018-20662.json +++ b/2018/20xxx/CVE-2018-20662.json @@ -86,6 +86,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-d04944813d", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2019/10xxx/CVE-2019-10018.json b/2019/10xxx/CVE-2019-10018.json index 97bf78df999..38111927a2e 100644 --- a/2019/10xxx/CVE-2019-10018.json +++ b/2019/10xxx/CVE-2019-10018.json @@ -56,6 +56,11 @@ "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276", "refsource": "MISC", "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2019/10xxx/CVE-2019-10019.json b/2019/10xxx/CVE-2019-10019.json index fc9c208843b..f0497251cbc 100644 --- a/2019/10xxx/CVE-2019-10019.json +++ b/2019/10xxx/CVE-2019-10019.json @@ -56,6 +56,11 @@ "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41275", "refsource": "MISC", "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41275" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2019/10xxx/CVE-2019-10021.json b/2019/10xxx/CVE-2019-10021.json index 9d2a5b8298f..a22a61a8755 100644 --- a/2019/10xxx/CVE-2019-10021.json +++ b/2019/10xxx/CVE-2019-10021.json @@ -56,6 +56,11 @@ "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274", "refsource": "MISC", "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2019/10xxx/CVE-2019-10023.json b/2019/10xxx/CVE-2019-10023.json index 1d7acb55118..e6858195fdd 100644 --- a/2019/10xxx/CVE-2019-10023.json +++ b/2019/10xxx/CVE-2019-10023.json @@ -56,6 +56,11 @@ "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276", "refsource": "MISC", "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2019/10xxx/CVE-2019-10872.json b/2019/10xxx/CVE-2019-10872.json index 0f0caa54ac3..6f92617c38d 100644 --- a/2019/10xxx/CVE-2019-10872.json +++ b/2019/10xxx/CVE-2019-10872.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-0ea42f074e", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2019/10xxx/CVE-2019-10873.json b/2019/10xxx/CVE-2019-10873.json index 01d7b8de471..5fcc899e374 100644 --- a/2019/10xxx/CVE-2019-10873.json +++ b/2019/10xxx/CVE-2019-10873.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-cb2bff6d48", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2019/12xxx/CVE-2019-12293.json b/2019/12xxx/CVE-2019-12293.json index e70d0181550..28381aa4412 100644 --- a/2019/12xxx/CVE-2019-12293.json +++ b/2019/12xxx/CVE-2019-12293.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-0ea42f074e", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2019/7xxx/CVE-2019-7226.json b/2019/7xxx/CVE-2019-7226.json index 9110723dfe2..49fc8cc70f1 100644 --- a/2019/7xxx/CVE-2019-7226.json +++ b/2019/7xxx/CVE-2019-7226.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7226", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,48 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The ABB IDAL HTTP server CGI interface contains a URL that allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. Specifically, /cgi/loginDefaultUser creates a session in an authenticated state and returns the session ID along with what may be the username and cleartext password of the user. An attacker can then supply an IDALToken value in a cookie, which will allow them to perform privileged operations such as restarting the service with /cgi/restart. A GET request to /cgi/loginDefaultUser may result in \"1 #S_OK IDALToken=532c8632b86694f0232a68a0897a145c admin admin\" or a similar response." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "FULLDISC", + "name": "20190624 XL-19-010 - ABB IDAL HTTP Server Authentication Bypass Vulnerability", + "url": "http://seclists.org/fulldisclosure/2019/Jun/39" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153402/ABB-IDAL-HTTP-Server-Authentication-Bypass.html", + "url": "http://packetstormsecurity.com/files/153402/ABB-IDAL-HTTP-Server-Authentication-Bypass.html" + }, + { + "refsource": "BID", + "name": "108886", + "url": "http://www.securityfocus.com/bid/108886" + }, + { + "refsource": "MISC", + "name": "https://www.darkmatter.ae/xen1thlabs/abb-idal-http-server-authentication-bypass-vulnerability-xl-19-010/", + "url": "https://www.darkmatter.ae/xen1thlabs/abb-idal-http-server-authentication-bypass-vulnerability-xl-19-010/" + }, + { + "refsource": "FULLDISC", + "name": "20190620 XL-19-010 - ABB IDAL HTTP Server Authentication Bypass\tVulnerability", + "url": "http://seclists.org/fulldisclosure/2019/Jun/39" } ] } diff --git a/2019/7xxx/CVE-2019-7227.json b/2019/7xxx/CVE-2019-7227.json index 4bed2d83d51..bd3d78eaf63 100644 --- a/2019/7xxx/CVE-2019-7227.json +++ b/2019/7xxx/CVE-2019-7227.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7227", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,53 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the ABB IDAL FTP server, an authenticated attacker can traverse to arbitrary directories on the hard disk with \"CWD ../\" and then use the FTP server functionality to download and upload files. An unauthenticated attacker can take advantage of the hardcoded or default credential pair exor/exor to become an authenticated attacker." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "FULLDISC", + "name": "20190624 XL-19-008 - ABB IDAL FTP Server Path Traversal Vulnerability", + "url": "http://seclists.org/fulldisclosure/2019/Jun/37" + }, + { + "refsource": "CONFIRM", + "name": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch", + "url": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153396/ABB-IDAL-FTP-Server-Path-Traversal.html", + "url": "http://packetstormsecurity.com/files/153396/ABB-IDAL-FTP-Server-Path-Traversal.html" + }, + { + "refsource": "BID", + "name": "108886", + "url": "http://www.securityfocus.com/bid/108886" + }, + { + "refsource": "FULLDISC", + "name": "20190620 XL-19-008 - ABB IDAL FTP Server Path Traversal Vulnerability", + "url": "http://seclists.org/fulldisclosure/2019/Jun/37" + }, + { + "refsource": "MISC", + "name": "https://www.darkmatter.ae/xen1thlabs/abb-idal-ftp-server-path-traversal-vulnerability-xl-19-008/", + "url": "https://www.darkmatter.ae/xen1thlabs/abb-idal-ftp-server-path-traversal-vulnerability-xl-19-008/" } ] } diff --git a/2019/7xxx/CVE-2019-7228.json b/2019/7xxx/CVE-2019-7228.json index f84ac35ade4..f41ac613124 100644 --- a/2019/7xxx/CVE-2019-7228.json +++ b/2019/7xxx/CVE-2019-7228.json @@ -52,11 +52,26 @@ }, "references": { "reference_data": [ + { + "refsource": "FULLDISC", + "name": "20190624 XL-19-012 - ABB IDAL HTTP Server Uncontrolled Format String Vulnerability", + "url": "http://seclists.org/fulldisclosure/2019/Jun/43" + }, { "refsource": "CONFIRM", "name": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch", "url": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch" }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153404/ABB-IDAL-HTTP-Server-Uncontrolled-Format-String.html", + "url": "http://packetstormsecurity.com/files/153404/ABB-IDAL-HTTP-Server-Uncontrolled-Format-String.html" + }, + { + "refsource": "BID", + "name": "108886", + "url": "http://www.securityfocus.com/bid/108886" + }, { "refsource": "MISC", "name": "https://www.darkmatter.ae/xen1thlabs/abb-idal-http-server-uncontrolled-format-string-vulnerability-xl-19-012/", diff --git a/2019/9xxx/CVE-2019-9200.json b/2019/9xxx/CVE-2019-9200.json index 8a3b6f8cfa7..9c1def28b0c 100644 --- a/2019/9xxx/CVE-2019-9200.json +++ b/2019/9xxx/CVE-2019-9200.json @@ -91,6 +91,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-d04944813d", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2019/9xxx/CVE-2019-9631.json b/2019/9xxx/CVE-2019-9631.json index 3adc8d41d2f..385c675064c 100644 --- a/2019/9xxx/CVE-2019-9631.json +++ b/2019/9xxx/CVE-2019-9631.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20190408 [SECURITY] [DLA 1752-1] poppler security update", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00011.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] } diff --git a/2019/9xxx/CVE-2019-9903.json b/2019/9xxx/CVE-2019-9903.json index 12f1095eb2a..acb81079075 100644 --- a/2019/9xxx/CVE-2019-9903.json +++ b/2019/9xxx/CVE-2019-9903.json @@ -81,6 +81,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-3193a75b06", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4042-1", + "url": "https://usn.ubuntu.com/4042-1/" } ] }