"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-01-05 12:01:00 +00:00
parent 1c5c69a092
commit ac8138d6c0
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
2 changed files with 223 additions and 8 deletions

View File

@ -1,17 +1,114 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-13139",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in wangl1989 mysiteforme 1.0. It has been rated as critical. This issue affects the function doContent of the file src/main/java/com/mysiteform/admin/controller/system/FileController. The manipulation of the argument content leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in wangl1989 mysiteforme 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen davon ist die Funktion doContent der Datei src/main/java/com/mysiteform/admin/controller/system/FileController. Dank der Manipulation des Arguments content mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Server-Side Request Forgery",
"cweId": "CWE-918"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "wangl1989",
"product": {
"product_data": [
{
"product_name": "mysiteforme",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.290213",
"refsource": "MISC",
"name": "https://vuldb.com/?id.290213"
},
{
"url": "https://vuldb.com/?ctiid.290213",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.290213"
},
{
"url": "https://vuldb.com/?submit.468513",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.468513"
},
{
"url": "https://github.com/wangl1989/mysiteforme/issues/56",
"refsource": "MISC",
"name": "https://github.com/wangl1989/mysiteforme/issues/56"
},
{
"url": "https://github.com/wangl1989/mysiteforme/issues/56#issue-2757876365",
"refsource": "MISC",
"name": "https://github.com/wangl1989/mysiteforme/issues/56#issue-2757876365"
}
]
},
"credits": [
{
"lang": "en",
"value": "LVZC (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,135 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-13140",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
"value": "Es wurde eine problematische Schwachstelle in Emlog Pro bis 2.4.3 entdeckt. Betroffen hiervon ist ein unbekannter Ablauf der Datei /admin/article.php?action=upload_cover der Komponente Cover Upload Handler. Dank Manipulation des Arguments image mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting",
"cweId": "CWE-79"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Emlog Pro",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.4.0"
},
{
"version_affected": "=",
"version_value": "2.4.1"
},
{
"version_affected": "=",
"version_value": "2.4.2"
},
{
"version_affected": "=",
"version_value": "2.4.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.290214",
"refsource": "MISC",
"name": "https://vuldb.com/?id.290214"
},
{
"url": "https://vuldb.com/?ctiid.290214",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.290214"
},
{
"url": "https://vuldb.com/?submit.468753",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.468753"
},
{
"url": "https://github.com/emlog/emlog/issues/312",
"refsource": "MISC",
"name": "https://github.com/emlog/emlog/issues/312"
},
{
"url": "https://github.com/emlog/emlog/issues/312#issue-2758546837",
"refsource": "MISC",
"name": "https://github.com/emlog/emlog/issues/312#issue-2758546837"
}
]
},
"credits": [
{
"lang": "en",
"value": "jiashenghe (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
}
]
}