From b448306cae86ef99f6ea7bf24135bcc0d7499316 Mon Sep 17 00:00:00 2001 From: Brian Adeloye Date: Tue, 15 Jun 2021 16:38:53 -0400 Subject: [PATCH] updated affected & fixed versions for CVE-2020-29445 --- 2020/29xxx/CVE-2020-29445.json | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/2020/29xxx/CVE-2020-29445.json b/2020/29xxx/CVE-2020-29445.json index 3563f484b77..f780b630bf6 100644 --- a/2020/29xxx/CVE-2020-29445.json +++ b/2020/29xxx/CVE-2020-29445.json @@ -15,6 +15,14 @@ "product_name": "Confluence Server", "version": { "version_data": [ + { + "version_value": "7.4.8", + "version_affected": "<" + }, + { + "version_value": "7.5.0", + "version_affected": ">=" + }, { "version_value": "7.11.0", "version_affected": "<" @@ -36,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "Affected versions of Confluence Server before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters." + "value": "Affected versions of Confluence Server before 7.4.8, and versions from 7.5.0 before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters." } ] }, @@ -61,4 +69,4 @@ } ] } -} \ No newline at end of file +}