JPCERT/CC 2020-02-14

This commit is contained in:
Ikuya Fukumoto 2020-02-14 17:33:21 +09:00
parent 1d99aeee54
commit b935d0b66a
No known key found for this signature in database
GPG Key ID: 603034D3468A3441

View File

@ -1,17 +1,64 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5532",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"references": {
"reference_data": [
{
"url": "http://jvn.jp/en/jp/JVN35496038/index.html"
},
{
"url": "https://play.google.com/store/apps/details?id=jp.extrun.ilbo&hl=en"
},
{
"url": "https://apps.apple.com/us/app/ilbo/id1116864683"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "ilbo App (ilbo App for Android prior to version 1.1.8 and ilbo App for iOS prior to version 1.2.01) allows an attacker on the same network segment to bypass authentication and to view the images which were recorded by the other ilbo user's device via unspecified vectors."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "ilbo App for Android prior to version 1.1.8 and ilbo App for iOS prior to version 1.2.0"
}
]
},
"product_name": "ilbo App"
}
]
},
"vendor_name": "EXTRUN Ltd."
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-5532",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Authentication bypass"
}
]
}
]
}