From b33a3dd754a8ffa3d2f0a980c190fbc0168bbd65 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 3 Feb 2023 22:00:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/23xxx/CVE-2022-23498.json | 76 +++++++++++++++++++++-- 2022/24xxx/CVE-2022-24894.json | 97 ++++++++++++++++++++++++++++-- 2022/24xxx/CVE-2022-24895.json | 107 +++++++++++++++++++++++++++++++-- 2023/0xxx/CVE-2023-0664.json | 18 ++++++ 2023/0xxx/CVE-2023-0665.json | 18 ++++++ 2023/22xxx/CVE-2023-22746.json | 99 ++++++++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23082.json | 76 +++++++++++++++++++++-- 2023/23xxx/CVE-2023-23615.json | 80 ++++++++++++++++++++++-- 8 files changed, 545 insertions(+), 26 deletions(-) create mode 100644 2023/0xxx/CVE-2023-0664.json create mode 100644 2023/0xxx/CVE-2023-0665.json diff --git a/2022/23xxx/CVE-2022-23498.json b/2022/23xxx/CVE-2022-23498.json index 399bee1a681..662cb6f1b13 100644 --- a/2022/23xxx/CVE-2022-23498.json +++ b/2022/23xxx/CVE-2022-23498.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23498", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Grafana is an open-source platform for monitoring and observability. When datasource query caching is enabled, Grafana caches all headers, including `grafana_session`. As a result, any user that queries a datasource where the caching is enabled can acquire another user\u2019s session. To mitigate the vulnerability you can disable datasource query caching for all datasources. This issue has been patched in versions 9.2.10 and 9.3.4." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "grafana", + "product": { + "product_data": [ + { + "product_name": "grafana", + "version": { + "version_data": [ + { + "version_value": ">= 8.3.0-beta1, < 9.2.10", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8", + "refsource": "MISC", + "name": "https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8" + } + ] + }, + "source": { + "advisory": "GHSA-2j8f-6whh-frc8", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", + "version": "3.1" } ] } diff --git a/2022/24xxx/CVE-2022-24894.json b/2022/24xxx/CVE-2022-24894.json index 39016228656..a9783b78ed4 100644 --- a/2022/24xxx/CVE-2022-24894.json +++ b/2022/24xxx/CVE-2022-24894.json @@ -1,17 +1,106 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-24894", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony HTTP cache system, acts as a reverse proxy: It caches entire responses (including headers) and returns them to the clients. In a recent change in the `AbstractSessionListener`, the response might contain a `Set-Cookie` header. If the Symfony HTTP cache system is enabled, this response might bill stored and return to the next clients. An attacker can use this vulnerability to retrieve the victim's session. This issue has been patched and is available for branch 4.4." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization", + "cweId": "CWE-285" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "symfony", + "product": { + "product_data": [ + { + "product_name": "symfony", + "version": { + "version_data": [ + { + "version_value": ">= 2.0.0, < 4.4.50", + "version_affected": "=" + }, + { + "version_value": ">= 5.0.0, < 5.4.20", + "version_affected": "=" + }, + { + "version_value": ">= 6.0.0, < 6.0.20", + "version_affected": "=" + }, + { + "version_value": ">= 6.1.0, < 6.1.12", + "version_affected": "=" + }, + { + "version_value": ">= 6.2.0, < 6.2.6", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv", + "refsource": "MISC", + "name": "https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv" + }, + { + "url": "https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb", + "refsource": "MISC", + "name": "https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb" + } + ] + }, + "source": { + "advisory": "GHSA-h7vf-5wrv-9fhv", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L", + "version": "3.1" } ] } diff --git a/2022/24xxx/CVE-2022-24895.json b/2022/24xxx/CVE-2022-24895.json index 42f39c9a10d..f7739ed02c7 100644 --- a/2022/24xxx/CVE-2022-24895.json +++ b/2022/24xxx/CVE-2022-24895.json @@ -1,17 +1,116 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-24895", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Symfony is a PHP framework for web and console applications and a set of reusable PHP components. When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. This issue has been fixed in the 4.4 branch." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-384: Session Fixation", + "cweId": "CWE-384" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "symfony", + "product": { + "product_data": [ + { + "product_name": "symfony", + "version": { + "version_data": [ + { + "version_value": ">= 2.0.0, < 4.4.50", + "version_affected": "=" + }, + { + "version_value": ">= 5.0.0, < 5.4.20", + "version_affected": "=" + }, + { + "version_value": ">= 6.0.0, < 6.0.20", + "version_affected": "=" + }, + { + "version_value": ">= 6.1.0, < 6.1.12", + "version_affected": "=" + }, + { + "version_value": ">= 6.2.0, < 6.2.6", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/symfony/symfony/security/advisories/GHSA-3gv2-29qc-v67m", + "refsource": "MISC", + "name": "https://github.com/symfony/symfony/security/advisories/GHSA-3gv2-29qc-v67m" + }, + { + "url": "https://github.com/symfony/security-bundle/commit/076fd2088ada33d760758d98ff07ddedbf567946", + "refsource": "MISC", + "name": "https://github.com/symfony/security-bundle/commit/076fd2088ada33d760758d98ff07ddedbf567946" + }, + { + "url": "https://github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4", + "refsource": "MISC", + "name": "https://github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4" + }, + { + "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-bundle/CVE-2022-24895.yaml", + "refsource": "MISC", + "name": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-bundle/CVE-2022-24895.yaml" + } + ] + }, + "source": { + "advisory": "GHSA-3gv2-29qc-v67m", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2023/0xxx/CVE-2023-0664.json b/2023/0xxx/CVE-2023-0664.json new file mode 100644 index 00000000000..2f6e8d38639 --- /dev/null +++ b/2023/0xxx/CVE-2023-0664.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0664", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/0xxx/CVE-2023-0665.json b/2023/0xxx/CVE-2023-0665.json new file mode 100644 index 00000000000..36307fe7ec5 --- /dev/null +++ b/2023/0xxx/CVE-2023-0665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/22xxx/CVE-2023-22746.json b/2023/22xxx/CVE-2023-22746.json index 8501c1bed90..a13f2ab9713 100644 --- a/2023/22xxx/CVE-2023-22746.json +++ b/2023/22xxx/CVE-2023-22746.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-22746", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CKAN is an open-source DMS (data management system) for powering data hubs and data portals. When creating a new container based on one of the Docker images listed below, the same secret key was being used by default. If the users didn't set a custom value via environment variables in the `.env` file, that key was shared across different CKAN instances, making it easy to forge authentication requests. Users overriding the default secret key in their own `.env` file are not affected by this issue. Note that the legacy images (ckan/ckan) located in the main CKAN repo are not affected by this issue. The affected images are ckan/ckan-docker, (ckan/ckan-base images), okfn/docker-ckan (openknowledge/ckan-base and openknowledge/ckan-dev images) keitaroinc/docker-ckan (keitaro/ckan images)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-344: Use of Invariant Value in Dynamically Changing Context", + "cweId": "CWE-344" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-330: Use of Insufficiently Random Values", + "cweId": "CWE-330" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ckan", + "product": { + "product_data": [ + { + "product_name": "ckan", + "version": { + "version_data": [ + { + "version_value": ">= 2.9.0, < 2.9.7", + "version_affected": "=" + }, + { + "version_value": "< 2.8.12", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ckan/ckan/security/advisories/GHSA-pr8j-v4c8-h62x", + "refsource": "MISC", + "name": "https://github.com/ckan/ckan/security/advisories/GHSA-pr8j-v4c8-h62x" + }, + { + "url": "https://github.com/ckan/ckan/commit/44af0f0a148fcc0e0fbcf02fe69b7db13459a84b", + "refsource": "MISC", + "name": "https://github.com/ckan/ckan/commit/44af0f0a148fcc0e0fbcf02fe69b7db13459a84b" + }, + { + "url": "https://github.com/ckan/ckan/commit/4c22c135fa486afa13855d1cdb9765eaf418d2aa", + "refsource": "MISC", + "name": "https://github.com/ckan/ckan/commit/4c22c135fa486afa13855d1cdb9765eaf418d2aa" + } + ] + }, + "source": { + "advisory": "GHSA-pr8j-v4c8-h62x", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "version": "3.1" } ] } diff --git a/2023/23xxx/CVE-2023-23082.json b/2023/23xxx/CVE-2023-23082.json index 2092d49c6dd..91b3992a852 100644 --- a/2023/23xxx/CVE-2023-23082.json +++ b/2023/23xxx/CVE-2023-23082.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-23082", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-23082", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A heap buffer overflow vulnerability in Kodi Home Theater Software up to 19.5 allows attackers to cause a denial of service due to an improper length of the value passed to the offset argument." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/xbmc/xbmc/issues/22377", + "refsource": "MISC", + "name": "https://github.com/xbmc/xbmc/issues/22377" + }, + { + "url": "https://github.com/fritsch/xbmc/commit/367cc80d66b0310b460f587fea44274b442951f1", + "refsource": "MISC", + "name": "https://github.com/fritsch/xbmc/commit/367cc80d66b0310b460f587fea44274b442951f1" + }, + { + "url": "https://github.com/fritsch/xbmc/commit/54df944584fc9fecd4cd5d69c2289f0934de305b", + "refsource": "MISC", + "name": "https://github.com/fritsch/xbmc/commit/54df944584fc9fecd4cd5d69c2289f0934de305b" + }, + { + "url": "https://github.com/xbmc/xbmc/commit/8c2aafb6d4987833803e037c923aaf83f9ff41e1", + "refsource": "MISC", + "name": "https://github.com/xbmc/xbmc/commit/8c2aafb6d4987833803e037c923aaf83f9ff41e1" + }, + { + "refsource": "MISC", + "name": "https://github.com/xbmc/xbmc/pull/22380", + "url": "https://github.com/xbmc/xbmc/pull/22380" } ] } diff --git a/2023/23xxx/CVE-2023-23615.json b/2023/23xxx/CVE-2023-23615.json index e3f1c1a761f..f917c27ae6d 100644 --- a/2023/23xxx/CVE-2023-23615.json +++ b/2023/23xxx/CVE-2023-23615.json @@ -1,17 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-23615", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Discourse is an open source discussion platform. The embeddable comments can be exploited to create new topics as any user but without any clear title or content. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. As a workaround, disable embeddable comments by deleting all embeddable hosts." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284: Improper Access Control", + "cweId": "CWE-284" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "discourse", + "product": { + "product_data": [ + { + "product_name": "discourse", + "version": { + "version_data": [ + { + "version_value": "< 3.0.1", + "version_affected": "=" + }, + { + "version_value": "< 3.1.0.beta2", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/discourse/discourse/security/advisories/GHSA-7mf3-5v84-wxq8", + "refsource": "MISC", + "name": "https://github.com/discourse/discourse/security/advisories/GHSA-7mf3-5v84-wxq8" + } + ] + }, + "source": { + "advisory": "GHSA-7mf3-5v84-wxq8", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1" } ] }