mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
Create CVE-2021-31411
This commit is contained in:
parent
85faba3bb4
commit
aa9c6580fb
@ -2,17 +2,174 @@
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.0.9"
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-31411",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2021-31411",
|
||||
"ASSIGNER": "security@vaadin.com",
|
||||
"DATE_PUBLIC": "2021-05-04T08:17:00.000Z",
|
||||
"TITLE": "Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19",
|
||||
"AKA": "",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"source": {
|
||||
"defect": [],
|
||||
"advisory": "",
|
||||
"discovery": "INTERNAL"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Vaadin",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Vaadin",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": ">=",
|
||||
"version_value": "14.0.3",
|
||||
"platform": ""
|
||||
},
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": "<=",
|
||||
"version_value": "14.5.2",
|
||||
"platform": ""
|
||||
},
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": ">=",
|
||||
"version_value": "15.0.0",
|
||||
"platform": ""
|
||||
},
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": "<",
|
||||
"version_value": "19.0.0",
|
||||
"platform": ""
|
||||
},
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": ">=",
|
||||
"version_value": "19.0.0",
|
||||
"platform": ""
|
||||
},
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": "<=",
|
||||
"version_value": "19.0.4",
|
||||
"platform": ""
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "flow-server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": ">=",
|
||||
"version_value": "2.0.9",
|
||||
"platform": ""
|
||||
},
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": "<=",
|
||||
"version_value": "2.5.2",
|
||||
"platform": ""
|
||||
},
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": ">=",
|
||||
"version_value": "3.0.0",
|
||||
"platform": ""
|
||||
},
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": "<",
|
||||
"version_value": "6.0.0",
|
||||
"platform": ""
|
||||
},
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": ">=",
|
||||
"version_value": "6.0.0",
|
||||
"platform": ""
|
||||
},
|
||||
{
|
||||
"version_name": "",
|
||||
"version_affected": "<=",
|
||||
"version_value": "6.0.5",
|
||||
"platform": ""
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-379 Creation of Temporary File in Directory with Incorrect Permissions"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds."
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://vaadin.com/security/cve-2021-31411",
|
||||
"name": "https://vaadin.com/security/cve-2021-31411"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/vaadin/flow/pull/10640",
|
||||
"name": "https://github.com/vaadin/flow/pull/10640"
|
||||
}
|
||||
]
|
||||
},
|
||||
"configuration": [],
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
},
|
||||
"exploit": [],
|
||||
"work_around": [],
|
||||
"solution": [],
|
||||
"credit": []
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user