diff --git a/2020/27xxx/CVE-2020-27213.json b/2020/27xxx/CVE-2020-27213.json index 182e3055066..5b902368bc1 100644 --- a/2020/27xxx/CVE-2020-27213.json +++ b/2020/27xxx/CVE-2020-27213.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27213", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27213", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Ethernut Nut/OS 5.1. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. While the ISN generator seems to adhere to RFC 793 (where a global 32-bit counter is incremented roughly every 4 microseconds), proper ISN generation should aim to follow at least the specifications outlined in RFC 6528." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.ethernut.de/en/download/index.html", + "refsource": "MISC", + "name": "http://www.ethernut.de/en/download/index.html" + }, + { + "url": "http://lists.egnite.de/mailman/listinfo/en-nut-announce", + "refsource": "MISC", + "name": "http://lists.egnite.de/mailman/listinfo/en-nut-announce" + }, + { + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01" + }, + { + "refsource": "MISC", + "name": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/", + "url": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/" } ] } diff --git a/2020/27xxx/CVE-2020-27630.json b/2020/27xxx/CVE-2020-27630.json index e8aa8b773f4..0a6131e837d 100644 --- a/2020/27xxx/CVE-2020-27630.json +++ b/2020/27xxx/CVE-2020-27630.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27630", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27630", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Silicon Labs uC/TCP-IP 3.6.0, TCP ISNs are improperly random." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.forescout.com", + "refsource": "MISC", + "name": "https://www.forescout.com" + }, + { + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01" + }, + { + "refsource": "MISC", + "name": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/", + "url": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/" } ] } diff --git a/2020/27xxx/CVE-2020-27631.json b/2020/27xxx/CVE-2020-27631.json index d6a6178318a..73d27b012cd 100644 --- a/2020/27xxx/CVE-2020-27631.json +++ b/2020/27xxx/CVE-2020-27631.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27631", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27631", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Oryx CycloneTCP 1.9.6, TCP ISNs are improperly random." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.forescout.com", + "refsource": "MISC", + "name": "https://www.forescout.com" + }, + { + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01" + }, + { + "refsource": "MISC", + "name": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/", + "url": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/" } ] } diff --git a/2020/27xxx/CVE-2020-27632.json b/2020/27xxx/CVE-2020-27632.json index 9e233903e52..fb3b6171c5d 100644 --- a/2020/27xxx/CVE-2020-27632.json +++ b/2020/27xxx/CVE-2020-27632.json @@ -56,6 +56,16 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01" + }, + { + "refsource": "MISC", + "name": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/", + "url": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/" } ] } diff --git a/2020/27xxx/CVE-2020-27633.json b/2020/27xxx/CVE-2020-27633.json index 0e0f0a87327..7f2c17748a8 100644 --- a/2020/27xxx/CVE-2020-27633.json +++ b/2020/27xxx/CVE-2020-27633.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27633", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27633", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In FNET 4.6.3, TCP ISNs are improperly random." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.forescout.com", + "refsource": "MISC", + "name": "https://www.forescout.com" + }, + { + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01" + }, + { + "refsource": "MISC", + "name": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/", + "url": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/" } ] } diff --git a/2020/27xxx/CVE-2020-27634.json b/2020/27xxx/CVE-2020-27634.json index ce0cad18122..f7cd08fceaa 100644 --- a/2020/27xxx/CVE-2020-27634.json +++ b/2020/27xxx/CVE-2020-27634.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27634", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27634", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Contiki 4.5, TCP ISNs are improperly random." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.forescout.com", + "refsource": "MISC", + "name": "https://www.forescout.com" + }, + { + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01" + }, + { + "refsource": "MISC", + "name": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/", + "url": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/" } ] } diff --git a/2020/27xxx/CVE-2020-27635.json b/2020/27xxx/CVE-2020-27635.json index e4e3a5be161..3903553d5f2 100644 --- a/2020/27xxx/CVE-2020-27635.json +++ b/2020/27xxx/CVE-2020-27635.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27635", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27635", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In PicoTCP 1.7.0, TCP ISNs are improperly random." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.forescout.com", + "refsource": "MISC", + "name": "https://www.forescout.com" + }, + { + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01" + }, + { + "refsource": "MISC", + "name": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/", + "url": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/" } ] } diff --git a/2020/27xxx/CVE-2020-27636.json b/2020/27xxx/CVE-2020-27636.json index 103b275e2e1..77fe6f0175a 100644 --- a/2020/27xxx/CVE-2020-27636.json +++ b/2020/27xxx/CVE-2020-27636.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-27636", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-27636", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Microchip MPLAB Net 3.6.1, TCP ISNs are improperly random." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.forescout.com", + "refsource": "MISC", + "name": "https://www.forescout.com" + }, + { + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01" + }, + { + "refsource": "MISC", + "name": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/", + "url": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/" } ] } diff --git a/2022/22xxx/CVE-2022-22298.json b/2022/22xxx/CVE-2022-22298.json index ab581f406ba..a4ecfd245f4 100644 --- a/2022/22xxx/CVE-2022-22298.json +++ b/2022/22xxx/CVE-2022-22298.json @@ -1,17 +1,115 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-22298", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiIsolator version 1.0.0, FortiIsolator version 1.1.0, FortiIsolator version 1.2.0 through 1.2.2, FortiIsolator version 2.0.0 through 2.0.1, FortiIsolator version 2.1.0 through 2.1.2, FortiIsolator version 2.2.0, FortiIsolator version 2.3.0 through 2.3.4 allows attacker to execute arbitrary OS commands in the underlying shell via specially crafted input parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiIsolator", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.3.0", + "version_value": "2.3.3" + }, + { + "version_affected": "=", + "version_value": "2.2.0" + }, + { + "version_affected": "<=", + "version_name": "2.1.0", + "version_value": "2.1.2" + }, + { + "version_affected": "<=", + "version_name": "2.0.0", + "version_value": "2.0.1" + }, + { + "version_affected": "<=", + "version_name": "1.2.0", + "version_value": "1.2.2" + }, + { + "version_affected": "=", + "version_value": "1.1.0" + }, + { + "version_affected": "=", + "version_value": "1.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-21-233", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-21-233" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Upgrade to FortiIsolator version\u00a02.4.0 or above." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:H/RL:X/RC:C" } ] } diff --git a/2022/35xxx/CVE-2022-35919.json b/2022/35xxx/CVE-2022-35919.json index 19d7a882282..9f7428aa668 100644 --- a/2022/35xxx/CVE-2022-35919.json +++ b/2022/35xxx/CVE-2022-35919.json @@ -83,6 +83,11 @@ "name": "https://github.com/minio/minio/commit/bc72e4226e669d98c8e0f3eccc9297be9251c692", "refsource": "MISC", "url": "https://github.com/minio/minio/commit/bc72e4226e669d98c8e0f3eccc9297be9251c692" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/175010/Minio-2022-07-29T19-40-48Z-Path-Traversal.html", + "url": "http://packetstormsecurity.com/files/175010/Minio-2022-07-29T19-40-48Z-Path-Traversal.html" } ] }, diff --git a/2023/25xxx/CVE-2023-25604.json b/2023/25xxx/CVE-2023-25604.json index 04c41afc462..421ed788b53 100644 --- a/2023/25xxx/CVE-2023-25604.json +++ b/2023/25xxx/CVE-2023-25604.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-25604", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure", + "cweId": "CWE-532" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiGuest", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-052", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-052" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiGuest version 1.1.0 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:X/RC:X" } ] } diff --git a/2023/25xxx/CVE-2023-25607.json b/2023/25xxx/CVE-2023-25607.json index c65e83a0ba3..4af851d2c74 100644 --- a/2023/25xxx/CVE-2023-25607.json +++ b/2023/25xxx/CVE-2023-25607.json @@ -1,17 +1,171 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-25607", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADC\u00a0 7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafe\u00a0usage of the wordexp function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiAnalyzer", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.2" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.7" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.11" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.12" + }, + { + "version_affected": "<=", + "version_name": "6.0.0", + "version_value": "6.0.12" + } + ] + } + }, + { + "product_name": "FortiManager", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.2" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.7" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.11" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.12" + }, + { + "version_affected": "<=", + "version_name": "6.0.0", + "version_value": "6.0.12" + } + ] + } + }, + { + "product_name": "FortiADC", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.1.0" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.3" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.6" + }, + { + "version_affected": "<=", + "version_name": "6.1.0", + "version_value": "6.1.6" + }, + { + "version_affected": "<=", + "version_name": "6.0.0", + "version_value": "6.0.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-22-352", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-22-352" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiAnalyzer version 7.4.0 or above Please upgrade to FortiAnalyzer version 7.2.3 or above Please upgrade to FortiAnalyzer version 7.0.8 or above Please upgrade to FortiAnalyzer version 6.4.12 or above Please upgrade to FortiManager version 7.4.0 or above Please upgrade to FortiManager version 7.2.3 or above Please upgrade to FortiManager version 7.0.8 or above Please upgrade to FortiManager version 6.4.12 or above Please upgrade to FortiADC version 7.1.1 or above Please upgrade to FortiADC version 7.0.4 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C" } ] } diff --git a/2023/33xxx/CVE-2023-33301.json b/2023/33xxx/CVE-2023-33301.json index bd8167b3222..7a3654ae55a 100644 --- a/2023/33xxx/CVE-2023-33301.json +++ b/2023/33xxx/CVE-2023-33301.json @@ -1,17 +1,92 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-33301", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper access control vulnerability in Fortinet FortiOS 7.2.0 - 7.2.4 and 7.4.0 allows an attacker to access a restricted resource from a non trusted host." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control", + "cweId": "CWE-284" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-139", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-139" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiOS version 7.4.1 or above Please upgrade to FortiOS version 7.2.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:X/RC:X" } ] } diff --git a/2023/34xxx/CVE-2023-34985.json b/2023/34xxx/CVE-2023-34985.json index ffd0103c059..fa925011450 100644 --- a/2023/34xxx/CVE-2023-34985.json +++ b/2023/34xxx/CVE-2023-34985.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-34985", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiWLM", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.6.0", + "version_value": "8.6.5" + }, + { + "version_affected": "<=", + "version_name": "8.5.0", + "version_value": "8.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-141", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-141" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/34xxx/CVE-2023-34986.json b/2023/34xxx/CVE-2023-34986.json index 43be15a48f4..5e2b4e67c33 100644 --- a/2023/34xxx/CVE-2023-34986.json +++ b/2023/34xxx/CVE-2023-34986.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-34986", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiWLM", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.6.0", + "version_value": "8.6.5" + }, + { + "version_affected": "<=", + "version_name": "8.5.0", + "version_value": "8.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-141", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-141" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/34xxx/CVE-2023-34987.json b/2023/34xxx/CVE-2023-34987.json index 28b3886b4e8..07d030b89ca 100644 --- a/2023/34xxx/CVE-2023-34987.json +++ b/2023/34xxx/CVE-2023-34987.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-34987", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiWLM", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.6.0", + "version_value": "8.6.5" + }, + { + "version_affected": "<=", + "version_name": "8.5.0", + "version_value": "8.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-141", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-141" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/34xxx/CVE-2023-34988.json b/2023/34xxx/CVE-2023-34988.json index d2b6d7dd47a..5322d84fa76 100644 --- a/2023/34xxx/CVE-2023-34988.json +++ b/2023/34xxx/CVE-2023-34988.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-34988", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiWLM", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.6.0", + "version_value": "8.6.5" + }, + { + "version_affected": "<=", + "version_name": "8.5.0", + "version_value": "8.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-141", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-141" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/34xxx/CVE-2023-34989.json b/2023/34xxx/CVE-2023-34989.json index edcf1a9b4bb..bbb092658ad 100644 --- a/2023/34xxx/CVE-2023-34989.json +++ b/2023/34xxx/CVE-2023-34989.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-34989", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiWLM", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.6.0", + "version_value": "8.6.5" + }, + { + "version_affected": "<=", + "version_name": "8.5.0", + "version_value": "8.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-141", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-141" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/34xxx/CVE-2023-34992.json b/2023/34xxx/CVE-2023-34992.json index 22527dc86a7..eab6f81c661 100644 --- a/2023/34xxx/CVE-2023-34992.json +++ b/2023/34xxx/CVE-2023-34992.json @@ -1,17 +1,107 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-34992", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via\u00a0crafted API requests." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiSIEM", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.0.0" + }, + { + "version_affected": "<=", + "version_name": "6.7.0", + "version_value": "6.7.5" + }, + { + "version_affected": "<=", + "version_name": "6.6.0", + "version_value": "6.6.3" + }, + { + "version_affected": "<=", + "version_name": "6.5.0", + "version_value": "6.5.1" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-130", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-130" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiSIEM version 7.0.1 or above\r\nPlease upgrade to FortiSIEM version 6.7.6 or above\r\nPlease upgrade to FortiSIEM upcoming version 6.6.4 or above\r\nPlease upgrade to FortiSIEM upcoming version 6.5.2 or above\r\nPlease upgrade to FortiSIEM upcoming version 6.4.3 or above" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/34xxx/CVE-2023-34993.json b/2023/34xxx/CVE-2023-34993.json index b6d9f6f3f05..ce588e3792f 100644 --- a/2023/34xxx/CVE-2023-34993.json +++ b/2023/34xxx/CVE-2023-34993.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-34993", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiWLM", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.6.0", + "version_value": "8.6.5" + }, + { + "version_affected": "<=", + "version_name": "8.5.0", + "version_value": "8.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-140", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-140" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/36xxx/CVE-2023-36478.json b/2023/36xxx/CVE-2023-36478.json index df3728b1773..dd13f275395 100644 --- a/2023/36xxx/CVE-2023-36478.json +++ b/2023/36xxx/CVE-2023-36478.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-36478", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to\nexceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295\nwill overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-400: Uncontrolled Resource Consumption", + "cweId": "CWE-400" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "eclipse", + "product": { + "product_data": [ + { + "product_name": "jetty.project", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">= 10.0.0, < 10.0.16" + }, + { + "version_affected": "=", + "version_value": ">= 11.0.0, < 11.0.16" + }, + { + "version_affected": "=", + "version_value": ">= 9.3.0, < 9.4.53" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgh7-54f2-x98r", + "refsource": "MISC", + "name": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgh7-54f2-x98r" + }, + { + "url": "https://github.com/eclipse/jetty.project/pull/9634", + "refsource": "MISC", + "name": "https://github.com/eclipse/jetty.project/pull/9634" + }, + { + "url": "https://github.com/eclipse/jetty.project/releases/tag/jetty-10.0.16", + "refsource": "MISC", + "name": "https://github.com/eclipse/jetty.project/releases/tag/jetty-10.0.16" + }, + { + "url": "https://github.com/eclipse/jetty.project/releases/tag/jetty-11.0.16", + "refsource": "MISC", + "name": "https://github.com/eclipse/jetty.project/releases/tag/jetty-11.0.16" + }, + { + "url": "https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.53.v20231009", + "refsource": "MISC", + "name": "https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.53.v20231009" + } + ] + }, + "source": { + "advisory": "GHSA-wgh7-54f2-x98r", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2023/36xxx/CVE-2023-36547.json b/2023/36xxx/CVE-2023-36547.json index 24559788ad3..5925bf10546 100644 --- a/2023/36xxx/CVE-2023-36547.json +++ b/2023/36xxx/CVE-2023-36547.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-36547", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiWLM", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.6.0", + "version_value": "8.6.5" + }, + { + "version_affected": "<=", + "version_name": "8.5.0", + "version_value": "8.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-140", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-140" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/36xxx/CVE-2023-36548.json b/2023/36xxx/CVE-2023-36548.json index 1af5578d7a2..d73e41c5e52 100644 --- a/2023/36xxx/CVE-2023-36548.json +++ b/2023/36xxx/CVE-2023-36548.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-36548", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiWLM", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.6.0", + "version_value": "8.6.5" + }, + { + "version_affected": "<=", + "version_name": "8.5.0", + "version_value": "8.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-140", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-140" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/36xxx/CVE-2023-36549.json b/2023/36xxx/CVE-2023-36549.json index be0f49c1f59..000d74507fe 100644 --- a/2023/36xxx/CVE-2023-36549.json +++ b/2023/36xxx/CVE-2023-36549.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-36549", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiWLM", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.6.0", + "version_value": "8.6.5" + }, + { + "version_affected": "<=", + "version_name": "8.5.0", + "version_value": "8.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-140", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-140" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/36xxx/CVE-2023-36550.json b/2023/36xxx/CVE-2023-36550.json index 7c63b6a162c..e18c60af94c 100644 --- a/2023/36xxx/CVE-2023-36550.json +++ b/2023/36xxx/CVE-2023-36550.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-36550", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiWLM", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.6.0", + "version_value": "8.6.5" + }, + { + "version_affected": "<=", + "version_name": "8.5.0", + "version_value": "8.5.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-140", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-140" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/36xxx/CVE-2023-36555.json b/2023/36xxx/CVE-2023-36555.json index bfc30309984..4be403ed2f4 100644 --- a/2023/36xxx/CVE-2023-36555.json +++ b/2023/36xxx/CVE-2023-36555.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-36555", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper neutralization of script-related html tags in a web page (basic xss) in Fortinet FortiOS 7.2.0 - 7.2.4 allows an attacker to execute unauthorized code or commands via the SAML and Security Fabric components." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-80" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiOS", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-104", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-104" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.6 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 3.9, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L/E:U/RL:X/RC:X" } ] } diff --git a/2023/36xxx/CVE-2023-36556.json b/2023/36xxx/CVE-2023-36556.json index 4e76ef2b490..8b64c966bee 100644 --- a/2023/36xxx/CVE-2023-36556.json +++ b/2023/36xxx/CVE-2023-36556.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-36556", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An incorrect authorization vulnerability [CWE-863] in FortiMail webmail version 7.2.0 through 7.2.2, version 7.0.0 through 7.0.5 and below 6.4.7 allows an authenticated attacker to login on other users accounts from the same web domain via crafted HTTP or HTTPs requests." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of privilege", + "cweId": "CWE-863" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiMail", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.2" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.5" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.7" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.9" + }, + { + "version_affected": "<=", + "version_name": "6.0.0", + "version_value": "6.0.12" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-202", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-202" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiMail version 7.4.0 or above Please upgrade to FortiMail version 7.2.3 or above Please upgrade to FortiMail version 7.0.6 or above Please upgrade to FortiMail version 6.4.8 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C" } ] } diff --git a/2023/36xxx/CVE-2023-36637.json b/2023/36xxx/CVE-2023-36637.json index c5814e733b0..12515c485da 100644 --- a/2023/36xxx/CVE-2023-36637.json +++ b/2023/36xxx/CVE-2023-36637.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-36637", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiMail version 7.2.0 through 7.2.2 and before 7.0.5 allows an authenticated attacker to inject HTML tags in FortiMail's calendar via input fields." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiMail", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.2" + }, + { + "version_affected": "<=", + "version_name": "7.0.1", + "version_value": "7.0.5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-194", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-194" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiMail version 7.4.0 or above Please upgrade to FortiMail version 7.2.3 or above Please upgrade to FortiMail version 7.0.6 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 3.4, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:F/RL:X/RC:C" } ] } diff --git a/2023/37xxx/CVE-2023-37935.json b/2023/37xxx/CVE-2023-37935.json index ca5aa9702c5..5f3aeac06a7 100644 --- a/2023/37xxx/CVE-2023-37935.json +++ b/2023/37xxx/CVE-2023-37935.json @@ -1,17 +1,97 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-37935", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use of GET request method with sensitive query strings vulnerability in Fortinet FortiOS 7.0.0 - 7.0.12, 7.2.0 - 7.2.5 and 7.4.0 allows an attacker to view plaintext passwords of remote services such as RDP or VNC, if the attacker is able to read the GET requests to those services." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure", + "cweId": "CWE-598" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.5" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.12" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-120", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-120" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiOS version 7.4.1 or above Please upgrade to FortiOS version 7.2.6 or above Please upgrade to FortiOS version 7.0.13 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:X/RC:X" } ] } diff --git a/2023/37xxx/CVE-2023-37939.json b/2023/37xxx/CVE-2023-37939.json index a611b24a1c1..b0af9052e5e 100644 --- a/2023/37xxx/CVE-2023-37939.json +++ b/2023/37xxx/CVE-2023-37939.json @@ -1,17 +1,170 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-37939", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in\u00a0FortiClient for Windows 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions, Linux 7.2.0, 7.0 all versions, 6.4 all versions, 6.2 all versions and Mac 7.2.0 through 7.2.1, 7.0 all versions, 6.4 all versions, 6.2 all versions, may allow a local authenticated attacker with no Administrative privileges to retrieve the list of\u00a0files or folders excluded from malware scanning." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiClientMac", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.1" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.9" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.10" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.9" + } + ] + } + }, + { + "product_name": "FortiClientWindows", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.2.0" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.9" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.10" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.9" + } + ] + } + }, + { + "product_name": "FortiClientLinux", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.2.0" + }, + { + "version_affected": "<=", + "version_name": "7.0.6", + "version_value": "7.0.9" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.4" + }, + { + "version_affected": "<=", + "version_name": "6.4.7", + "version_value": "6.4.9" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.4" + }, + { + "version_affected": "<=", + "version_name": "6.2.6", + "version_value": "6.2.9" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-22-235", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-22-235" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiClientMac version 7.2.2 or above Please upgrade to FortiClientWindows version 7.2.1 or above Please upgrade to FortiClientLinux version 7.2.1 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 3, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:U/RC:R" } ] } diff --git a/2023/38xxx/CVE-2023-38836.json b/2023/38xxx/CVE-2023-38836.json index 7f0a10fa867..9829e8ffb80 100644 --- a/2023/38xxx/CVE-2023-38836.json +++ b/2023/38xxx/CVE-2023-38836.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/BoidCMS/BoidCMS/issues/27", "url": "https://github.com/BoidCMS/BoidCMS/issues/27" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/175026/BoidCMS-2.0.0-Shell-Upload.html", + "url": "http://packetstormsecurity.com/files/175026/BoidCMS-2.0.0-Shell-Upload.html" } ] } diff --git a/2023/39xxx/CVE-2023-39362.json b/2023/39xxx/CVE-2023-39362.json index aeb22690c76..16799c48e83 100644 --- a/2023/39xxx/CVE-2023-39362.json +++ b/2023/39xxx/CVE-2023-39362.json @@ -58,6 +58,11 @@ "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp", "refsource": "MISC", "name": "https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp" + }, + { + "url": "http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html" } ] }, diff --git a/2023/40xxx/CVE-2023-40718.json b/2023/40xxx/CVE-2023-40718.json index ba7677c19dc..36eec7647ff 100644 --- a/2023/40xxx/CVE-2023-40718.json +++ b/2023/40xxx/CVE-2023-40718.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-40718", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A interpretation conflict in Fortinet IPS Engine versions 7.321, 7.166 and 6.158 allows attacker to evade IPS features via crafted TCP packets." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control", + "cweId": "CWE-436" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "IPS Engine", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.321" + }, + { + "version_affected": "=", + "version_value": "7.166" + }, + { + "version_affected": "=", + "version_value": "6.158" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-090", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-090" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "IPS Engine manual download is not needed unless device is offline and cannot download IPS Engine update automatically.\nFixed in IPS Engine version 6.0159 and later.\r\n\u00a0 FortiOS 6.4.13 and later contains IPS engine 6.0160 as the default IPS Engine.\r\n\u00a0 IPS Engine 6.0162 is downloadable from FortiGuard by FortiGate units with a valid subscription running FortiOS 6.4.x.\nFixed in IPS Engine version 7.0166 and later.\r\n\u00a0 FortiOS 7.0.12 and later contains IPS engine 7.0167 as the default IPS Engine.\nFixed in IPS Engine version 7.0313 and later.\r\n\u00a0 FortiOS 7.2.5 and later contains IPS engine 7.0314 as the default IPS Engine.\r\n\u00a0 IPS Engine 7.0322 is downloadable from FortiGuard by FortiGate units with a valid subscription running FortiOS 7.2.x.\nFortiOS 7.4.0 and later contains IPS engine 7.0493 as the default IPS Engine.\n\u00a0" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:R" } ] } diff --git a/2023/41xxx/CVE-2023-41675.json b/2023/41xxx/CVE-2023-41675.json index c44ff78aa09..cbd6a127440 100644 --- a/2023/41xxx/CVE-2023-41675.json +++ b/2023/41xxx/CVE-2023-41675.json @@ -1,17 +1,110 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-41675", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-416" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiOS", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.4" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.10" + } + ] + } + }, + { + "product_name": "FortiProxy", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.2" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-184", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-184" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiOS version 7.4.0 or above\r\nPlease upgrade to FortiOS version 7.2.5 or above\r\nPlease upgrade to FortiOS version 7.0.11 or above\r\nPlease upgrade to FortiProxy version 7.2.3 or above\r\nPlease upgrade to FortiProxy version 7.0.9 or above\nFortiSASE is no longer impacted, issue remediated Q2/23" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" } ] } diff --git a/2023/41xxx/CVE-2023-41679.json b/2023/41xxx/CVE-2023-41679.json index 5da910528eb..aef1fb20e9b 100644 --- a/2023/41xxx/CVE-2023-41679.json +++ b/2023/41xxx/CVE-2023-41679.json @@ -1,17 +1,103 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-41679", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper access control vulnerability [CWE-284] in FortiManager management interface 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions may allow a remote and authenticated attacker with at least \"device management\" permission on his profile and belonging to a specific ADOM to add and delete CLI script on other ADOMs" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-284" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiManager", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.2" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.7" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.11" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.12" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-062", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-062" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiManager version 7.4.0 or above\r\nPlease upgrade to FortiManager version 7.2.3 or above\r\nPlease upgrade to FortiManager version 7.0.8 or above\r\nPlease upgrade to FortiManager version 6.4.12 or above" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:X/RC:R" } ] } diff --git a/2023/41xxx/CVE-2023-41838.json b/2023/41xxx/CVE-2023-41838.json index 0b668c97e5e..bf39649b61b 100644 --- a/2023/41xxx/CVE-2023-41838.json +++ b/2023/41xxx/CVE-2023-41838.json @@ -1,17 +1,138 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-41838", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper neutralization of special elements used in an os command ('os command injection') in FortiManager 7.4.0 and 7.2.0 through 7.2.3 may allow attacker to execute unauthorized code or commands via FortiManager cli." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiAnalyzer", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.3" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.8" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.12" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.11" + } + ] + } + }, + { + "product_name": "FortiManager", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.3" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.8" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.12" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.11" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-169", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-169" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.0.9 or above Please upgrade to FortiAnalyzer version 6.4.13 or above Please upgrade to FortiAnalyzer version 6.2.12 or above Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiManager version 7.0.9 or above Please upgrade to FortiManager version 6.4.13 or above Please upgrade to FortiManager version 6.2.12 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/41xxx/CVE-2023-41841.json b/2023/41xxx/CVE-2023-41841.json index 070b662b5bf..f678215327e 100644 --- a/2023/41xxx/CVE-2023-41841.json +++ b/2023/41xxx/CVE-2023-41841.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-41841", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper authorization vulnerability in Fortinet FortiOS 7.0.0 - 7.0.11 and 7.2.0 - 7.2.4 allows an attacker belonging to the prof-admin profile to perform elevated actions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of privilege", + "cweId": "CWE-285" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiOS", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.4" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.11" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-318", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-318" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.5 or above Please upgrade to FortiOS version 7.0.12 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:X/RC:X" } ] } diff --git a/2023/42xxx/CVE-2023-42782.json b/2023/42xxx/CVE-2023-42782.json index 13fbbe44945..d86ffa0f33a 100644 --- a/2023/42xxx/CVE-2023-42782.json +++ b/2023/42xxx/CVE-2023-42782.json @@ -1,17 +1,107 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-42782", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A insufficient verification of data authenticity vulnerability [CWE-345] in FortiAnalyzer version 7.4.0 and below 7.2.3 allows a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer via the knoweldge of an authorized device serial number." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control", + "cweId": "CWE-345" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiAnalyzer", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.3" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.9" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.13" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.12" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-221", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-221" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiAnalyzer version 7.4.1 or above\r\nPlease upgrade to FortiAnalyzer version 7.2.4 or above\n\r\nAND\u00a0\nConfigure the \"un-encrypted-logging\" option to disable receiving syslog without encryption through UDP(514) or TCP(514).\nconfig system log setting\r\n\u00a0 \u00a0 set un-encrypted-logging disable" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:C" } ] } diff --git a/2023/42xxx/CVE-2023-42787.json b/2023/42xxx/CVE-2023-42787.json index acb7294d417..7ef7aae3f80 100644 --- a/2023/42xxx/CVE-2023-42787.json +++ b/2023/42xxx/CVE-2023-42787.json @@ -1,17 +1,138 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-42787", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A client-side enforcement of server-side security [CWE-602] vulnerability\u00a0in Fortinet FortiManager version 7.4.0 and before 7.2.3 and FortiAnalyzer version 7.4.0 and before 7.2.3 may allow a remote attacker with low privileges to access a privileged web console via client side code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control", + "cweId": "CWE-602" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiManager", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.3" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.9" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.13" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.12" + } + ] + } + }, + { + "product_name": "FortiAnalyzer", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.3" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.9" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.13" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.12" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-187", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-187" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:X/RC:X" } ] } diff --git a/2023/42xxx/CVE-2023-42788.json b/2023/42xxx/CVE-2023-42788.json index 50043c2ac49..663342ce30b 100644 --- a/2023/42xxx/CVE-2023-42788.json +++ b/2023/42xxx/CVE-2023-42788.json @@ -1,17 +1,138 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-42788", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper neutralization of special elements used in an os command ('OS Command Injection') vulnerability [CWE-78] in FortiManager & FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.8, version 6.4.0 through 6.4.12 and version 6.2.0 through 6.2.11 may allow a local attacker with low privileges to execute unauthorized code via specifically crafted arguments to a CLI command" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execute unauthorized code or commands", + "cweId": "CWE-78" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiAnalyzer", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.3" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.8" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.12" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.11" + } + ] + } + }, + { + "product_name": "FortiManager", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.3" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.8" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.12" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.11" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-167", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-167" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.0.9 or above Please upgrade to FortiAnalyzer version 6.4.13 or above Please upgrade to FortiAnalyzer version 6.2.12 or above Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiManager version 7.0.9 or above Please upgrade to FortiManager version 6.4.13 or above Please upgrade to FortiManager version 6.2.12 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X" } ] } diff --git a/2023/44xxx/CVE-2023-44249.json b/2023/44xxx/CVE-2023-44249.json index 9b351099929..c6dc549c33b 100644 --- a/2023/44xxx/CVE-2023-44249.json +++ b/2023/44xxx/CVE-2023-44249.json @@ -1,17 +1,138 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-44249", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An authorization bypass through user-controlled key\u00a0[CWE-639] vulnerability in Fortinet FortiManager version 7.4.0 and before 7.2.3 and FortiAnalyzer version 7.4.0 and before 7.2.3 allows a remote attacker with low privileges to read sensitive information via crafted HTTP requests." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure", + "cweId": "CWE-639" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiManager", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.3" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.9" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.13" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.12" + } + ] + } + }, + { + "product_name": "FortiAnalyzer", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7.4.0" + }, + { + "version_affected": "<=", + "version_name": "7.2.0", + "version_value": "7.2.3" + }, + { + "version_affected": "<=", + "version_name": "7.0.0", + "version_value": "7.0.9" + }, + { + "version_affected": "<=", + "version_name": "6.4.0", + "version_value": "6.4.13" + }, + { + "version_affected": "<=", + "version_name": "6.2.0", + "version_value": "6.2.12" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-201", + "refsource": "MISC", + "name": "https://fortiguard.com/psirt/FG-IR-23-201" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above " + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:X" } ] } diff --git a/2023/44xxx/CVE-2023-44399.json b/2023/44xxx/CVE-2023-44399.json index c5be93dabab..7b1c5d6a203 100644 --- a/2023/44xxx/CVE-2023-44399.json +++ b/2023/44xxx/CVE-2023-44399.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-44399", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ZITADEL provides identity infrastructure. In versions 2.37.2 and prior, ZITADEL administrators can enable a setting called \"Ignoring unknown usernames\" which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL. This bug has been patched in versions 2.37.3 and 2.38.0. No known workarounds are available." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-640: Weak Password Recovery Mechanism for Forgotten Password", + "cweId": "CWE-640" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "zitadel", + "product": { + "product_data": [ + { + "product_name": "zitadel", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 2.37.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-v683-rcxx-vpff", + "refsource": "MISC", + "name": "https://github.com/zitadel/zitadel/security/advisories/GHSA-v683-rcxx-vpff" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.37.3", + "refsource": "MISC", + "name": "https://github.com/zitadel/zitadel/releases/tag/v2.37.3" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.38.0", + "refsource": "MISC", + "name": "https://github.com/zitadel/zitadel/releases/tag/v2.38.0" + } + ] + }, + "source": { + "advisory": "GHSA-v683-rcxx-vpff", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/44xxx/CVE-2023-44487.json b/2023/44xxx/CVE-2023-44487.json index 8eb600c4cad..3c2ff8f2945 100644 --- a/2023/44xxx/CVE-2023-44487.json +++ b/2023/44xxx/CVE-2023-44487.json @@ -171,6 +171,21 @@ "refsource": "MISC", "name": "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244", "url": "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244" + }, + { + "refsource": "MISC", + "name": "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0", + "url": "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0" + }, + { + "refsource": "MISC", + "name": "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html", + "url": "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html" + }, + { + "refsource": "MISC", + "name": "https://my.f5.com/manage/s/article/K000137106", + "url": "https://my.f5.com/manage/s/article/K000137106" } ] } diff --git a/2023/4xxx/CVE-2023-4278.json b/2023/4xxx/CVE-2023-4278.json index a8ee4d8294a..ce38c549305 100644 --- a/2023/4xxx/CVE-2023-4278.json +++ b/2023/4xxx/CVE-2023-4278.json @@ -58,6 +58,11 @@ "url": "https://wpscan.com/vulnerability/cb3173ec-9891-4bd8-9d05-24fe805b5235", "refsource": "MISC", "name": "https://wpscan.com/vulnerability/cb3173ec-9891-4bd8-9d05-24fe805b5235" + }, + { + "url": "http://packetstormsecurity.com/files/175007/WordPress-Masterstudy-LMS-3.0.17-Account-Creation.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/175007/WordPress-Masterstudy-LMS-3.0.17-Account-Creation.html" } ] }, diff --git a/2023/5xxx/CVE-2023-5495.json b/2023/5xxx/CVE-2023-5495.json index dba3bb4690a..06c38ba7e36 100644 --- a/2023/5xxx/CVE-2023-5495.json +++ b/2023/5xxx/CVE-2023-5495.json @@ -1,17 +1,99 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5495", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in QDocs Smart School 6.4.1. It has been classified as critical. This affects an unknown part of the file /course/filterRecords/ of the component HTTP POST Request Handler. The manipulation of the argument searchdata[0][title]/searchdata[0][searchfield]/searchdata[0][searchvalue] leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-241647. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in QDocs Smart School 6.4.1 ausgemacht. Sie wurde als kritisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei /course/filterRecords/ der Komponente HTTP POST Request Handler. Durch Beeinflussen des Arguments searchdata[0][title]/searchdata[0][searchfield]/searchdata[0][searchvalue] mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "QDocs", + "product": { + "product_data": [ + { + "product_name": "Smart School", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "6.4.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.241647", + "refsource": "MISC", + "name": "https://vuldb.com/?id.241647" + }, + { + "url": "https://vuldb.com/?ctiid.241647", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.241647" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "skalvin (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2023/5xxx/CVE-2023-5496.json b/2023/5xxx/CVE-2023-5496.json index b19aac9f483..16d52dd0d01 100644 --- a/2023/5xxx/CVE-2023-5496.json +++ b/2023/5xxx/CVE-2023-5496.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5496", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Translator PoqDev Add-On 1.0.11 on Firefox. It has been rated as problematic. This issue affects some unknown processing of the component Select Text Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-241649 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in Translator PoqDev Add-On 1.0.11 f\u00fcr Firefox ausgemacht. Sie wurde als problematisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Komponente Select Text Handler. Dank Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Die Ausnutzbarkeit gilt als schwierig. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Translator", + "product": { + "product_data": [ + { + "product_name": "PoqDev Add-On", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0.11" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.241649", + "refsource": "MISC", + "name": "https://vuldb.com/?id.241649" + }, + { + "url": "https://vuldb.com/?ctiid.241649", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.241649" + }, + { + "url": "https://fastupload.io/en/G5tO8X1vM8ge4qJ/file", + "refsource": "MISC", + "name": "https://fastupload.io/en/G5tO8X1vM8ge4qJ/file" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "pyweb-security (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.1, + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.1, + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 2.6, + "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N" } ] }