diff --git a/2022/39xxx/CVE-2022-39039.json b/2022/39xxx/CVE-2022-39039.json index ff54cc416c2..eb6451c77fc 100644 --- a/2022/39xxx/CVE-2022-39039.json +++ b/2022/39xxx/CVE-2022-39039.json @@ -1,18 +1,89 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-14T02:22:00.000Z", "ID": "CVE-2022-39039", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "aEnrich a+HRD - Server-Side Request Forgery (SSRF)" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "a+HRD", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "6.8", + "version_value": "7.0" + } + ] + } + } + ] + }, + "vendor_name": "aEnrich" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "aEnrich’s a+HRD has inadequate filtering for specific URL parameter. An unauthenticated remote attacker can exploit this vulnerability to send arbitrary HTTP(s) request to launch Server-Side Request Forgery (SSRF) attack, to perform arbitrary system command or disrupt service." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-918 Server-Side Request Forgery (SSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6792-c4a62-1.html" + } + ] + }, + "source": { + "advisory": "TVN-202210019", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/39xxx/CVE-2022-39040.json b/2022/39xxx/CVE-2022-39040.json index 25b91653f34..3c9baf37854 100644 --- a/2022/39xxx/CVE-2022-39040.json +++ b/2022/39xxx/CVE-2022-39040.json @@ -1,18 +1,89 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-14T02:24:00.000Z", "ID": "CVE-2022-39040", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "aEnrich a+HRD - Path Traversal" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "a+HRD", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "6.8", + "version_value": "7.0" + } + ] + } + } + ] + }, + "vendor_name": "aEnrich" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "aEnrich a+HRD log read function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6793-66aee-1.html" + } + ] + }, + "source": { + "advisory": "TVN-202210020", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/39xxx/CVE-2022-39041.json b/2022/39xxx/CVE-2022-39041.json index ee5c636fcee..004233f0a34 100644 --- a/2022/39xxx/CVE-2022-39041.json +++ b/2022/39xxx/CVE-2022-39041.json @@ -1,18 +1,89 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-14T02:25:00.000Z", "ID": "CVE-2022-39041", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "aEnrich a+HRD - SQL Injection" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "a+HRD", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "6.8", + "version_value": "7.0" + } + ] + } + } + ] + }, + "vendor_name": "aEnrich" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "aEnrich a+HRD has insufficient user input validation for specific API parameter. An unauthenticated remote attacker can exploit this vulnerability to inject arbitrary SQL commands to access, modify and delete database." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6794-35928-1.html" + } + ] + }, + "source": { + "advisory": "TVN-202210021", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/39xxx/CVE-2022-39042.json b/2022/39xxx/CVE-2022-39042.json index 2221db955e5..2675fa8540f 100644 --- a/2022/39xxx/CVE-2022-39042.json +++ b/2022/39xxx/CVE-2022-39042.json @@ -1,18 +1,89 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-14T02:26:00.000Z", "ID": "CVE-2022-39042", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "aEnrich a+HRD - Improper Authentication" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "a+HRD", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "6.8", + "version_value": "7.0" + } + ] + } + } + ] + }, + "vendor_name": "aEnrich" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "aEnrich a+HRD has improper validation for login function. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and access API function to perform arbitrary system command or disrupt service." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6795-f7fe6-1.html" + } + ] + }, + "source": { + "advisory": "TVN-202210022", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40740.json b/2022/40xxx/CVE-2022-40740.json index 9257ad6207e..09707407aba 100644 --- a/2022/40xxx/CVE-2022-40740.json +++ b/2022/40xxx/CVE-2022-40740.json @@ -1,18 +1,94 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-30T02:01:00.000Z", "ID": "CVE-2022-40740", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Realtek GPON router - Command Injection" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GPON router", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "SDK 1.9" + } + ] + } + } + ] + }, + "vendor_name": "Realtek" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Realtek GPON router has insufficient filtering for special characters. A remote attacker authenticated as an administrator can exploit this vulnerability to perform command injection attacks, to execute arbitrary system command, manipulate system or disrupt service." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78 OS Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6831-19121-1.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Contact tech support from Realtek" + } + ], + "source": { + "advisory": "TVN-202212004", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/43xxx/CVE-2022-43436.json b/2022/43xxx/CVE-2022-43436.json index b2d773b44d1..91d63e4fc2b 100644 --- a/2022/43xxx/CVE-2022-43436.json +++ b/2022/43xxx/CVE-2022-43436.json @@ -1,18 +1,94 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-30T02:07:00.000Z", "ID": "CVE-2022-43436", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "HWA JIUH DIGITAL TECHNOLOGY LTD. EasyTest - Arbitrary File Upload" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "EasyTest", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "22H29" + } + ] + } + } + ] + }, + "vendor_name": "HWA JIUH DIGITAL TECHNOLOGY LTD." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The File Upload function of EasyTest has insufficient filtering for special characters and file type. A remote attacker authenticated as a general user can upload and execute arbitrary files, to manipulate system or disrupt service." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6828-1e5e4-1.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update Easytest version to v.22I26" + } + ], + "source": { + "advisory": "TVN-202212001", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/43xxx/CVE-2022-43437.json b/2022/43xxx/CVE-2022-43437.json index 5b19dd01e7b..65e5010054a 100644 --- a/2022/43xxx/CVE-2022-43437.json +++ b/2022/43xxx/CVE-2022-43437.json @@ -1,18 +1,94 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-30T02:05:00.000Z", "ID": "CVE-2022-43437", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "HWA JIUH DIGITAL TECHNOLOGY LTD. EasyTest - SQL Injection" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "EasyTest", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "17L18S" + } + ] + } + } + ] + }, + "vendor_name": "HWA JIUH DIGITAL TECHNOLOGY LTD." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Download function’s parameter of EasyTest has insufficient validation for user input. A remote attacker authenticated as a general user can inject arbitrary SQL command to access, modify or delete database." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6829-11133-1.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update Easytest version to v.22I26" + } + ], + "source": { + "advisory": "TVN-202212002", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/43xxx/CVE-2022-43438.json b/2022/43xxx/CVE-2022-43438.json index ee6944a1c3e..40a9339c61b 100644 --- a/2022/43xxx/CVE-2022-43438.json +++ b/2022/43xxx/CVE-2022-43438.json @@ -1,18 +1,95 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-30T02:03:00.000Z", "ID": "CVE-2022-43438", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "HWA JIUH DIGITAL TECHNOLOGY LTD. EasyTest - Incorrect Authorization" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "EasyTest", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "17L18S", + "version_value": "22H29" + } + ] + } + } + ] + }, + "vendor_name": "HWA JIUH DIGITAL TECHNOLOGY LTD." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Administrator function of EasyTest has an Incorrect Authorization vulnerability. A remote attacker authenticated as a general user can exploit this vulnerability to bypass the intended access restrictions, to make API functions calls, manipulate system and terminate service." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863 Incorrect Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6830-28746-1.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update Easytest version to v.22I26" + } + ], + "source": { + "advisory": "TVN-202212003", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46304.json b/2022/46xxx/CVE-2022-46304.json index aa0536e7106..b362a8b2570 100644 --- a/2022/46xxx/CVE-2022-46304.json +++ b/2022/46xxx/CVE-2022-46304.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-14T02:10:00.000Z", "ID": "CVE-2022-46304", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "ChangingTec ServiSign - Command Injection" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "ServiSign ", + "version": { + "version_data": [ + { + "version_affected": "?", + "version_value": "0" + } + ] + } + } + ] + }, + "vendor_name": "ChangingTec" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ChangingTec ServiSign component has insufficient filtering for special characters in the connection response parameter. An unauthenticated remote attacker can host a malicious website for the component user to access, which triggers command injection and allows the attacker to execute arbitrary system command to perform arbitrary system operation or disrupt service." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78 OS Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6800-b5cf6-1.html" + } + ] + }, + "source": { + "advisory": "TVN-202211003", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46305.json b/2022/46xxx/CVE-2022-46305.json index b62e21f02ca..6034b352624 100644 --- a/2022/46xxx/CVE-2022-46305.json +++ b/2022/46xxx/CVE-2022-46305.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-14T02:13:00.000Z", "ID": "CVE-2022-46305", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "ChangingTec ServiSign - Path Traversal" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "ServiSign", + "version": { + "version_data": [ + { + "version_affected": "?", + "version_value": "0" + } + ] + } + } + ] + }, + "vendor_name": "ChangingTec" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ChangingTec ServiSign component has a path traversal vulnerability. An unauthenticated LAN attacker can exploit this vulnerability to bypass authentication and access arbitrary system files." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6801-bb704-1.html" + } + ] + }, + "source": { + "advisory": "TVN-202211004", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46306.json b/2022/46xxx/CVE-2022-46306.json index 34c9b7ef378..2076086d177 100644 --- a/2022/46xxx/CVE-2022-46306.json +++ b/2022/46xxx/CVE-2022-46306.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-14T02:14:00.000Z", "ID": "CVE-2022-46306", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "ChangingTec ServiSign - Path Traversal" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "ServiSign", + "version": { + "version_data": [ + { + "version_affected": "?", + "version_value": "0" + } + ] + } + } + ] + }, + "vendor_name": "ChangingTec" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ChangingTec ServiSign component has a path traversal vulnerability due to insufficient filtering for special characters in the DLL file path. An unauthenticated remote attacker can host a malicious website for the component user to access, which triggers the component to load malicious DLL files under arbitrary file path and allows the attacker to perform arbitrary system operation and disrupt of service." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6802-4341b-1.html" + } + ] + }, + "source": { + "advisory": "TVN-202211005", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46309.json b/2022/46xxx/CVE-2022-46309.json index c11de5d45a3..24221bb923d 100644 --- a/2022/46xxx/CVE-2022-46309.json +++ b/2022/46xxx/CVE-2022-46309.json @@ -1,18 +1,89 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-12T02:20:00.000Z", "ID": "CVE-2022-46309", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Galaxy Software Services Corporation. Vitals ESP - Arbitrary Path File Reading" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Vitals ESP", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "3.0.8", + "version_value": "6.2.0" + } + ] + } + } + ] + }, + "vendor_name": "Galaxy Software Services Corporation." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vitals ESP upload function has a path traversal vulnerability. A remote attacker with general user privilege can exploit this vulnerability to access arbitrary system files." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6785-86407-1.html" + } + ] + }, + "source": { + "advisory": "TVN-202211010", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/47xxx/CVE-2022-47618.json b/2022/47xxx/CVE-2022-47618.json index 127cee41f4e..a843628ed91 100644 --- a/2022/47xxx/CVE-2022-47618.json +++ b/2022/47xxx/CVE-2022-47618.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "TWCERT/CC", + "ASSIGNER": "cve@cert.org.tw", + "DATE_PUBLIC": "2022-12-29T02:57:00.000Z", "ID": "CVE-2022-47618", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Merit Lilin Ent. Co., Ltd. AH55B04 & AH55B08 DVR - Hard-coded Credentials" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "AH55B04 DVR firmware", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "SVN#7570" + } + ] + } + }, + { + "product_name": "AH55B08 DVR firmware", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "SVN#7570" + } + ] + } + } + ] + }, + "vendor_name": "Merit Lilin Ent. Co., Ltd." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Merit LILIN AH55B04 & AH55B08 DVR firm has hard-coded administrator credentials. An unauthenticated remote attacker can use these credentials to log in administrator page, to manipulate system or disrupt service." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-798 Use of Hard-coded Credentials" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.twcert.org.tw/tw/cp-132-6825-6691e-1.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update Merit LILIN AH55B04 & AH55B08 DVR version to SVN#8044" + } + ], + "source": { + "advisory": "TVN-202212007", + "discovery": "EXTERNAL" } } \ No newline at end of file