- Synchronized data.

This commit is contained in:
CVE Team 2018-10-09 09:05:17 -04:00
parent f8dfa0c555
commit c6c8cf9f55
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
13 changed files with 250 additions and 232 deletions

View File

@ -1,99 +1,99 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.de",
"DATE_PUBLIC": "2018-09-26T00:00:00.000Z",
"ID": "CVE-2018-12474",
"STATE": "PUBLIC",
"TITLE": "Crafted service parameters allows to induce unexpected behaviour in obs-service-tar_scm"
"CVE_data_meta" : {
"ASSIGNER" : "security@suse.de",
"DATE_PUBLIC" : "2018-09-26T00:00:00.000Z",
"ID" : "CVE-2018-12474",
"STATE" : "PUBLIC",
"TITLE" : "Crafted service parameters allows to induce unexpected behaviour in obs-service-tar_scm"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "Open Build Service",
"version": {
"version_data": [
"product_name" : "Open Build Service",
"version" : {
"version_data" : [
{
"affected": "<",
"version_value": "51a17c553b6ae2598820b7a90fd0c11502a49106"
"affected" : "<",
"version_value" : "51a17c553b6ae2598820b7a90fd0c11502a49106"
}
]
}
}
]
},
"vendor_name": "openSUSE"
"vendor_name" : "openSUSE"
}
]
}
},
"credit": [
"credit" : [
{
"lang": "eng",
"value": "Matthias Gerstner of SUSE"
"lang" : "eng",
"value" : "Matthias Gerstner of SUSE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "Inproper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations.\nAffected releases are openSUSE Open Build Service:\n versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106."
"lang" : "eng",
"value" : "Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "LOW",
"attackVector" : "NETWORK",
"availabilityImpact" : "NONE",
"baseScore" : 5.4,
"baseSeverity" : "MEDIUM",
"confidentialityImpact" : "LOW",
"integrityImpact" : "LOW",
"privilegesRequired" : "LOW",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"lang" : "eng",
"value" : "CWE-20: Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1107507",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507"
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=1107507",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1107507"
},
{
"name": "https://github.com/openSUSE/obs-service-tar_scm/pull/254",
"refsource": "CONFIRM",
"url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254"
"name" : "https://github.com/openSUSE/obs-service-tar_scm/pull/254",
"refsource" : "CONFIRM",
"url" : "https://github.com/openSUSE/obs-service-tar_scm/pull/254"
}
]
},
"source": {
"advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1107507",
"defect": [
"source" : {
"advisory" : "https://bugzilla.suse.com/show_bug.cgi?id=1107507",
"defect" : [
"https://bugzilla.suse.com/show_bug.cgi?id=1107507"
],
"discovery": "INTERNAL"
"discovery" : "INTERNAL"
}
}

View File

@ -1,93 +1,93 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.de",
"DATE_PUBLIC": "2018-09-26T00:00:00.000Z",
"ID": "CVE-2018-12477",
"STATE": "PUBLIC",
"TITLE": "obs-service-refresh_patches can be tricked into deleting '..' or other unrelated directories"
"CVE_data_meta" : {
"ASSIGNER" : "security@suse.de",
"DATE_PUBLIC" : "2018-09-26T00:00:00.000Z",
"ID" : "CVE-2018-12477",
"STATE" : "PUBLIC",
"TITLE" : "obs-service-refresh_patches can be tricked into deleting '..' or other unrelated directories"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "Open Build Service",
"version": {
"version_data": [
"product_name" : "Open Build Service",
"version" : {
"version_data" : [
{
"affected": "<",
"version_value": "d6244245dda5367767efc989446fe4b5e4609cce"
"affected" : "<",
"version_value" : "d6244245dda5367767efc989446fe4b5e4609cce"
}
]
}
}
]
},
"vendor_name": "openSUSE"
"vendor_name" : "openSUSE"
}
]
}
},
"credit": [
"credit" : [
{
"lang": "eng",
"value": "Matthias Gerstner of SUSE"
"lang" : "eng",
"value" : "Matthias Gerstner of SUSE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "A Improper Neutralization of CRLF Sequences vulnerability in Open Build Service allows remote attackers to cause deletion of directories by tricking obs-service-refresh_patches to delete them. \nAffected releases are openSUSE Open Build Service:\n versions prior to d6244245dda5367767efc989446fe4b5e4609cce."
"lang" : "eng",
"value" : "A Improper Neutralization of CRLF Sequences vulnerability in Open Build Service allows remote attackers to cause deletion of directories by tricking obs-service-refresh_patches to delete them. Affected releases are openSUSE Open Build Service: versions prior to d6244245dda5367767efc989446fe4b5e4609cce."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "LOW",
"attackVector" : "NETWORK",
"availabilityImpact" : "NONE",
"baseScore" : 3.5,
"baseSeverity" : "LOW",
"confidentialityImpact" : "NONE",
"integrityImpact" : "LOW",
"privilegesRequired" : "LOW",
"scope" : "UNCHANGED",
"userInteraction" : "REQUIRED",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')"
"lang" : "eng",
"value" : "CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1108189",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1108189"
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=1108189",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1108189"
}
]
},
"source": {
"defect": [
"source" : {
"defect" : [
"https://bugzilla.suse.com/show_bug.cgi?id=1108189"
],
"discovery": "INTERNAL"
"discovery" : "INTERNAL"
}
}
}

View File

@ -1,93 +1,93 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.de",
"DATE_PUBLIC": "2018-09-26T00:00:00.000Z",
"ID": "CVE-2018-12478",
"STATE": "PUBLIC",
"TITLE": "obs-service-replace_using_package_version allows to specify arbitrary input files "
"CVE_data_meta" : {
"ASSIGNER" : "security@suse.de",
"DATE_PUBLIC" : "2018-09-26T00:00:00.000Z",
"ID" : "CVE-2018-12478",
"STATE" : "PUBLIC",
"TITLE" : "obs-service-replace_using_package_version allows to specify arbitrary input files "
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "Open Build Service",
"version": {
"version_data": [
"product_name" : "Open Build Service",
"version" : {
"version_data" : [
{
"affected": "<",
"version_value": "n/a"
"affected" : "<",
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name": "openSUSE"
"vendor_name" : "openSUSE"
}
]
}
},
"credit": [
"credit" : [
{
"lang": "eng",
"value": "Matthias Gerstner of SUSE"
"lang" : "eng",
"value" : "Matthias Gerstner of SUSE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "A Improper Input Validation vulnerability in Open Build Service allows remote attackers to extract files from the system where the service runs.\nAffected releases are openSUSE Open Build Service:\nstatus of is unknown."
"lang" : "eng",
"value" : "A Improper Input Validation vulnerability in Open Build Service allows remote attackers to extract files from the system where the service runs. Affected releases are openSUSE Open Build Service: status of is unknown."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "HIGH",
"attackVector" : "NETWORK",
"availabilityImpact" : "NONE",
"baseScore" : 4.8,
"baseSeverity" : "MEDIUM",
"confidentialityImpact" : "HIGH",
"integrityImpact" : "NONE",
"privilegesRequired" : "LOW",
"scope" : "UNCHANGED",
"userInteraction" : "REQUIRED",
"vectorString" : "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"lang" : "eng",
"value" : "CWE-20: Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1108280",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1108280"
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=1108280",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1108280"
}
]
},
"source": {
"defect": [
"source" : {
"defect" : [
"https://bugzilla.suse.com/show_bug.cgi?id=1108280"
],
"discovery": "INTERNAL"
"discovery" : "INTERNAL"
}
}

View File

@ -1,93 +1,93 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.de",
"DATE_PUBLIC": "2018-09-26T00:00:00.000Z",
"ID": "CVE-2018-12479",
"STATE": "PUBLIC",
"TITLE": "Request controller allows to create requests with arbitrary request IDs"
"CVE_data_meta" : {
"ASSIGNER" : "security@suse.de",
"DATE_PUBLIC" : "2018-09-26T00:00:00.000Z",
"ID" : "CVE-2018-12479",
"STATE" : "PUBLIC",
"TITLE" : "Request controller allows to create requests with arbitrary request IDs"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "Open Build Service",
"version": {
"version_data": [
"product_name" : "Open Build Service",
"version" : {
"version_data" : [
{
"affected": "<",
"version_value": "01b015ca2a320afc4fae823465d1e72da8bd60df"
"affected" : "<",
"version_value" : "01b015ca2a320afc4fae823465d1e72da8bd60df"
}
]
}
}
]
},
"vendor_name": "openSUSE"
"vendor_name" : "openSUSE"
}
]
}
},
"credit": [
"credit" : [
{
"lang": "eng",
"value": "Matthias Gerstner of SUSE"
"lang" : "eng",
"value" : "Matthias Gerstner of SUSE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "A Improper Input Validation vulnerability in Open Build Service allows remote attackers to cause DoS by specifying crafted request IDs.\nAffected releases are openSUSE Open Build Service:\n versions prior to 01b015ca2a320afc4fae823465d1e72da8bd60df."
"lang" : "eng",
"value" : "A Improper Input Validation vulnerability in Open Build Service allows remote attackers to cause DoS by specifying crafted request IDs. Affected releases are openSUSE Open Build Service: versions prior to 01b015ca2a320afc4fae823465d1e72da8bd60df."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "LOW",
"attackVector" : "NETWORK",
"availabilityImpact" : "HIGH",
"baseScore" : 6.5,
"baseSeverity" : "MEDIUM",
"confidentialityImpact" : "NONE",
"integrityImpact" : "NONE",
"privilegesRequired" : "LOW",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation"
"lang" : "eng",
"value" : "CWE-20: Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1108435",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1108435"
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=1108435",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1108435"
}
]
},
"source": {
"defect": [
"source" : {
"defect" : [
"https://bugzilla.suse.com/show_bug.cgi?id=1108435"
],
"discovery": "INTERNAL"
"discovery" : "INTERNAL"
}
}
}

View File

@ -54,10 +54,12 @@
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://launchpad.support.sap.com/#/notes/2618337",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2618337"
},
{
"name" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource" : "CONFIRM",
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
}

View File

@ -58,10 +58,12 @@
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://launchpad.support.sap.com/#/notes/2623618",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2623618"
},
{
"name" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource" : "CONFIRM",
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
}

View File

@ -58,10 +58,12 @@
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://launchpad.support.sap.com/#/notes/2678615",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2678615"
},
{
"name" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource" : "CONFIRM",
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
}

View File

@ -58,10 +58,12 @@
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://launchpad.support.sap.com/#/notes/2679789",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2679789"
},
{
"name" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource" : "CONFIRM",
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
}

View File

@ -70,10 +70,12 @@
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://launchpad.support.sap.com/#/notes/2684760",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2684760"
},
{
"name" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource" : "CONFIRM",
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
}

View File

@ -58,10 +58,12 @@
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://launchpad.support.sap.com/#/notes/2654905",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2654905"
},
{
"name" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource" : "CONFIRM",
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
}

View File

@ -58,10 +58,12 @@
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://launchpad.support.sap.com/#/notes/2667103",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2667103"
},
{
"name" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource" : "CONFIRM",
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
}

View File

@ -54,10 +54,12 @@
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://launchpad.support.sap.com/#/notes/2696889",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2696889"
},
{
"name" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource" : "CONFIRM",
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
}

View File

@ -35,7 +35,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Following the project “Gardener” architecture, the Kubernetes apiserver of “Gardener”, version 0.12.2, managed shoot cluster resides in the corresponding seed cluster. Due to missing network isolation a shoots apiserver can access services/endpoints in the private network of its corresponding seed cluster. Combined with other minor Kubernetes security issues, the missing network isolation theoretically can lead to compromise other shoot or seed clusters in the “Gardener” context. The issue is rated high due to the high impact of a potential exploitation in “Gardener” context. "
"value" : "Following the project \"Gardener\" architecture, the Kubernetes apiserver of \"Gardener\", version 0.12.2, managed shoot cluster resides in the corresponding seed cluster. Due to missing network isolation a shoot's apiserver can access services/endpoints in the private network of its corresponding seed cluster. Combined with other minor Kubernetes security issues, the missing network isolation theoretically can lead to compromise other shoot or seed clusters in the \"Gardener\" context. The issue is rated high due to the high impact of a potential exploitation in \"Gardener\" context."
}
]
},
@ -54,10 +54,12 @@
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://launchpad.support.sap.com/#/notes/2699726",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2699726"
},
{
"name" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
"refsource" : "CONFIRM",
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095"
}