From bd79f52f7564e691bff99cf1104f5f7b2980210a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 30 Nov 2018 08:05:51 -0500 Subject: [PATCH] - Synchronized data. --- 2018/14xxx/CVE-2018-14637.json | 151 +++++++++++++++++---------------- 1 file changed, 76 insertions(+), 75 deletions(-) diff --git a/2018/14xxx/CVE-2018-14637.json b/2018/14xxx/CVE-2018-14637.json index 0f0ed2e6c65..707f7e08c10 100644 --- a/2018/14xxx/CVE-2018-14637.json +++ b/2018/14xxx/CVE-2018-14637.json @@ -1,79 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2018-14637", - "ASSIGNER": "sfowler@redhat.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "[UNKNOWN]", - "product": { - "product_data": [ - { - "product_name": "keycloak", - "version": { - "version_data": [ - { - "version_value": "4.6.0.Final" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "sfowler@redhat.com", + "ID" : "CVE-2018-14637", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "keycloak", + "version" : { + "version_data" : [ + { + "version_value" : "4.6.0.Final" + } + ] + } + } + ] + }, + "vendor_name" : "[UNKNOWN]" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack." + } + ] + }, + "impact" : { + "cvss" : [ + [ + { + "vectorString" : "6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version" : "3.0" + } + ] + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-287" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-287" - } - ] - }, - { - "description": [ - { - "lang": "eng", - "value": "CWE-285" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14637", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14637", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack." - } - ] - }, - "impact": { - "cvss": [ - [ - { - "vectorString": "6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "version": "3.0" - } + }, + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-285" + } ] - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14637", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14637" + } + ] + } }