From b3fddec8bc7c74b38ac934e545b9b82f710fa91a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 15 Oct 2024 15:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/31xxx/CVE-2023-31493.json | 61 +++++++++++++-- 2024/10xxx/CVE-2024-10000.json | 18 +++++ 2024/47xxx/CVE-2024-47080.json | 77 +++++++++++++++++- 2024/9xxx/CVE-2024-9979.json | 138 ++++++++++++++++++++++++++++++++- 2024/9xxx/CVE-2024-9998.json | 18 +++++ 2024/9xxx/CVE-2024-9999.json | 18 +++++ 6 files changed, 316 insertions(+), 14 deletions(-) create mode 100644 2024/10xxx/CVE-2024-10000.json create mode 100644 2024/9xxx/CVE-2024-9998.json create mode 100644 2024/9xxx/CVE-2024-9999.json diff --git a/2023/31xxx/CVE-2023-31493.json b/2023/31xxx/CVE-2023-31493.json index 1da18362e77..bb7dbc4fdbe 100644 --- a/2023/31xxx/CVE-2023-31493.json +++ b/2023/31xxx/CVE-2023-31493.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31493", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31493", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RCE (Remote Code Execution) exists in ZoneMinder through 1.36.33 as an attacker can create a new .php log file in language folder, while executing a crafted payload and escalate privileges allowing execution of any commands on the remote system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://zoneminder.com", + "refsource": "MISC", + "name": "http://zoneminder.com" + }, + { + "refsource": "MISC", + "name": "https://medium.com/@dk50u1/rce-remote-code-execution-in-zoneminder-up-to-1-36-33-0686f5bcd370", + "url": "https://medium.com/@dk50u1/rce-remote-code-execution-in-zoneminder-up-to-1-36-33-0686f5bcd370" } ] } diff --git a/2024/10xxx/CVE-2024-10000.json b/2024/10xxx/CVE-2024-10000.json new file mode 100644 index 00000000000..2a14e118b30 --- /dev/null +++ b/2024/10xxx/CVE-2024-10000.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10000", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/47xxx/CVE-2024-47080.json b/2024/47xxx/CVE-2024-47080.json index de498850188..0f8c4d4149a 100644 --- a/2024/47xxx/CVE-2024-47080.json +++ b/2024/47xxx/CVE-2024-47080.json @@ -1,18 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-47080", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. In matrix-js-sdk versions versions 9.11.0 through 34.7.0, the method `MatrixClient.sendSharedHistoryKeys` is vulnerable to interception by malicious homeservers. The method was introduced by MSC3061) and is commonly used to share historical message keys with newly invited users, granting them access to past messages in the room. However, it unconditionally sends these \"shared\" keys to all of the invited user's devices, regardless of whether the user's cryptographic identity is verified or whether the user's devices are signed by that identity. This allows the attacker to potentially inject its own devices to receive sensitive historical keys without proper security checks. Note that this only affects clients running the SDK with the legacy crypto stack. Clients using the new Rust cryptography stack (i.e. those that call `MatrixClient.initRustCrypto()` instead of `MatrixClient.initCrypto()`) are unaffected by this vulnerability, because `MatrixClient.sendSharedHistoryKeys()` raises an exception in such environments. The vulnerability was fixed in matrix-js-sdk 34.8.0 by removing the vulnerable functionality. As a workaround, remove use of affected functionality from clients." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication", + "cweId": "CWE-287" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "matrix-org", + "product": { + "product_data": [ + { + "product_name": "matrix-js-sdk", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">= 9.11.0, < 34.8.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-4jf8-g8wp-cx7c", + "refsource": "MISC", + "name": "https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-4jf8-g8wp-cx7c" + }, + { + "url": "https://github.com/matrix-org/matrix-spec-proposals/pull/3061", + "refsource": "MISC", + "name": "https://github.com/matrix-org/matrix-spec-proposals/pull/3061" + }, + { + "url": "https://github.com/matrix-org/matrix-js-sdk/commit/2fb1e659c81f75253c047832dc9dcc2beddfac5f", + "refsource": "MISC", + "name": "https://github.com/matrix-org/matrix-js-sdk/commit/2fb1e659c81f75253c047832dc9dcc2beddfac5f" + } + ] + }, + "source": { + "advisory": "GHSA-4jf8-g8wp-cx7c", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/9xxx/CVE-2024-9979.json b/2024/9xxx/CVE-2024-9979.json index f25699174d1..57e03556ac0 100644 --- a/2024/9xxx/CVE-2024-9979.json +++ b/2024/9xxx/CVE-2024-9979.json @@ -1,17 +1,147 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-9979", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in PyO3. This vulnerability causes a use-after-free issue, potentially leading to memory corruption or crashes via unsound borrowing from weak Python references." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free", + "cweId": "CWE-416" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Red Hat", + "product": { + "product_data": [ + { + "product_name": "Red Hat Ansible Automation Platform 2", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat Enterprise Linux 8", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + }, + { + "product_name": "Red Hat Enterprise Linux 9", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-9979", + "refsource": "MISC", + "name": "https://access.redhat.com/security/cve/CVE-2024-9979" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318646", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2318646" + }, + { + "url": "https://crates.io/crates/pyo3", + "refsource": "MISC", + "name": "https://crates.io/crates/pyo3" + }, + { + "url": "https://github.com/PyO3/pyo3/pull/4590", + "refsource": "MISC", + "name": "https://github.com/PyO3/pyo3/pull/4590" + }, + { + "url": "https://rustsec.org/advisories/RUSTSEC-2024-0378.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2024-0378.html" + } + ] + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/9xxx/CVE-2024-9998.json b/2024/9xxx/CVE-2024-9998.json new file mode 100644 index 00000000000..2eefdd2e853 --- /dev/null +++ b/2024/9xxx/CVE-2024-9998.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-9998", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/9xxx/CVE-2024-9999.json b/2024/9xxx/CVE-2024-9999.json new file mode 100644 index 00000000000..d8b28db89fb --- /dev/null +++ b/2024/9xxx/CVE-2024-9999.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-9999", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file