From a7eb721804b3cafa37a5154fefb5c459fa100e7e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 2 Jan 2025 17:01:00 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/11xxx/CVE-2024-11716.json | 89 ++++++++++++++++++++++++++++-- 2024/11xxx/CVE-2024-11717.json | 98 ++++++++++++++++++++++++++++++++-- 2 files changed, 177 insertions(+), 10 deletions(-) diff --git a/2024/11xxx/CVE-2024-11716.json b/2024/11xxx/CVE-2024-11716.json index 53bf4615ee1..681c4e1406d 100644 --- a/2024/11xxx/CVE-2024-11716.json +++ b/2024/11xxx/CVE-2024-11716.json @@ -1,18 +1,97 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11716", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cvd@cert.pl", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "While assignment of a user to a team (bracket) in\u00a0CTFd should be possible only once, at the registration, a flaw in logic implementation allows an authenticated user to reset it's bracket and then pick a new one, joining another team while a competition is already ongoing.\nThis issue impacts releases from 3.7.0 up to 3.7.4 and was addressed by pull request 2636 https://github.com/CTFd/CTFd/pull/2636 \u00a0included in 3.7.5 release." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-837 Improper Enforcement of a Single, Unique Action", + "cweId": "CWE-837" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "CTFd", + "product": { + "product_data": [ + { + "product_name": "CTFd", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "3.7.0", + "version_value": "3.7.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/CTFd/CTFd/pull/2636", + "refsource": "MISC", + "name": "https://github.com/CTFd/CTFd/pull/2636" + }, + { + "url": "https://cert.pl/en/posts/2025/01/CVE-2024-11716", + "refsource": "MISC", + "name": "https://cert.pl/en/posts/2025/01/CVE-2024-11716" + }, + { + "url": "https://ctfd.io/", + "refsource": "MISC", + "name": "https://ctfd.io/" + }, + { + "url": "https://blog.ctfd.io/ctfd-3-7-5/", + "refsource": "MISC", + "name": "https://blog.ctfd.io/ctfd-3-7-5/" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Dec/21", + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2024/Dec/21" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "B\u0142a\u017cej Adamczyk (efigo.pl)" + } + ] } \ No newline at end of file diff --git a/2024/11xxx/CVE-2024-11717.json b/2024/11xxx/CVE-2024-11717.json index 099d08c5d34..dfe524e79b6 100644 --- a/2024/11xxx/CVE-2024-11717.json +++ b/2024/11xxx/CVE-2024-11717.json @@ -1,18 +1,106 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11717", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cvd@cert.pl", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tokens in CTFd used for account activation and password resetting can be used interchangeably for these operations. When used, they are sent to the server as a GET parameter and they are not single use, which means, that during token expiration time an on-path attacker might reuse such a token to change user's password and take over the account.\u00a0Moreover, the tokens also include base64 encoded user email.\n\nThis issue impacts releases up to 3.7.4 and was addressed by pull request 2679 https://github.com/CTFd/CTFd/pull/2679 \u00a0included in 3.7.5 release." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-837 Improper Enforcement of a Single, Unique Action", + "cweId": "CWE-837" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-1391 Use of Weak Credentials", + "cweId": "CWE-1391" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "CTFd", + "product": { + "product_data": [ + { + "product_name": "CTFd", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "3.7.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert.pl/en/posts/2025/01/CVE-2024-11716", + "refsource": "MISC", + "name": "https://cert.pl/en/posts/2025/01/CVE-2024-11716" + }, + { + "url": "https://ctfd.io/", + "refsource": "MISC", + "name": "https://ctfd.io/" + }, + { + "url": "https://github.com/CTFd/CTFd/pull/2679", + "refsource": "MISC", + "name": "https://github.com/CTFd/CTFd/pull/2679" + }, + { + "url": "https://blog.ctfd.io/ctfd-3-7-5/", + "refsource": "MISC", + "name": "https://blog.ctfd.io/ctfd-3-7-5/" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Dec/21", + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2024/Dec/21" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "B\u0142a\u017cej Adamczyk (efigo.pl)" + } + ] } \ No newline at end of file