"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-10-01 18:01:03 +00:00
parent 5bc6109051
commit c5a4022d07
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
5 changed files with 81 additions and 57 deletions

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75",
"url": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2233",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75",
"url": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2233",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html"
}
]
}

View File

@ -1,63 +1,67 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "bressers@elastic.co",
"ID": "CVE-2019-7618",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Elastic",
"product": {
"product_data": [
{
"product_name": "Elastic Code",
"version": {
"version_data": [
{
"version_value": "7.3.0, 7.3.1, and 7.3.2"
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@elastic.co",
"ID": "CVE-2019-7618",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Elastic",
"product": {
"product_data": [
{
"product_name": "Elastic Code",
"version": {
"version_data": [
{
"version_value": "7.3.0, 7.3.1, and 7.3.2"
}
]
}
}
]
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-538: File and Directory Information Exposure"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-538: File and Directory Information Exposure"
}
]
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://staging-website.elastic.co/community/security"
},
{
"url": "https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A local file disclosure flaw was found in Elastic Code versions 7.3.0, 7.3.1, and 7.3.2. If a malicious code repository is imported into Code it is possible to read arbitrary files from the local filesystem of the Kibana instance running Code with the permission of the Kibana system user."
}
]
}
}
},
"references": {
"reference_data": [
{
"url": "https://staging-website.elastic.co/community/security",
"refsource": "MISC",
"name": "https://staging-website.elastic.co/community/security"
},
{
"url": "https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831",
"refsource": "MISC",
"name": "https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A local file disclosure flaw was found in Elastic Code versions 7.3.0, 7.3.1, and 7.3.2. If a malicious code repository is imported into Code it is possible to read arbitrary files from the local filesystem of the Kibana instance running Code with the permission of the Kibana system user."
}
]
}
}

View File

@ -223,6 +223,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2949",
"url": "https://access.redhat.com/errata/RHSA-2019:2949"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2232",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html"
}
]
},

View File

@ -223,6 +223,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2949",
"url": "https://access.redhat.com/errata/RHSA-2019:2949"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2232",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html"
}
]
},