From cf83e60ee276fe3e5b758fef9d30ec85b8431e37 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 13 May 2024 14:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/52xxx/CVE-2023-52656.json | 126 +++++++++++++++++++++++++++++++-- 2024/25xxx/CVE-2024-25641.json | 81 +++++++++++++++++++-- 2024/27xxx/CVE-2024-27082.json | 76 ++++++++++++++++++-- 2024/28xxx/CVE-2024-28866.json | 91 ++++++++++++++++++++++-- 2024/33xxx/CVE-2024-33931.json | 34 ++++++++- 2024/35xxx/CVE-2024-35048.json | 56 +++++++++++++-- 2024/35xxx/CVE-2024-35049.json | 56 +++++++++++++-- 2024/35xxx/CVE-2024-35050.json | 56 +++++++++++++-- 2024/4xxx/CVE-2024-4819.json | 100 ++++++++++++++++++++++++-- 2024/4xxx/CVE-2024-4820.json | 100 ++++++++++++++++++++++++-- 10 files changed, 731 insertions(+), 45 deletions(-) diff --git a/2023/52xxx/CVE-2023-52656.json b/2023/52xxx/CVE-2023-52656.json index b8228c79f5f..001a53688a0 100644 --- a/2023/52xxx/CVE-2023-52656.json +++ b/2023/52xxx/CVE-2023-52656.json @@ -1,18 +1,136 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-52656", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: drop any code related to SCM_RIGHTS\n\nThis is dead code after we dropped support for passing io_uring fds\nover SCM_RIGHTS, get rid of it." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "cfb24022bb2c" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.4.273", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.214", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.15.153", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.1.83", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.7.11", + "lessThanOrEqual": "6.7.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.8", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/cfb24022bb2c31f1f555dc6bc3cc5e2547446fb3", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/cfb24022bb2c31f1f555dc6bc3cc5e2547446fb3" + }, + { + "url": "https://git.kernel.org/stable/c/a6771f343af90a25f3a14911634562bb5621df02", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a6771f343af90a25f3a14911634562bb5621df02" + }, + { + "url": "https://git.kernel.org/stable/c/d909d381c3152393421403be4b6435f17a2378b4", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/d909d381c3152393421403be4b6435f17a2378b4" + }, + { + "url": "https://git.kernel.org/stable/c/a3812a47a32022ca76bf46ddacdd823dc2aabf8b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a3812a47a32022ca76bf46ddacdd823dc2aabf8b" + }, + { + "url": "https://git.kernel.org/stable/c/88c49d9c896143cdc0f77197c4dcf24140375e89", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/88c49d9c896143cdc0f77197c4dcf24140375e89" + }, + { + "url": "https://git.kernel.org/stable/c/6e5e6d274956305f1fc0340522b38f5f5be74bdb", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/6e5e6d274956305f1fc0340522b38f5f5be74bdb" + } + ] + }, + "generator": { + "engine": "bippy-d175d3acf727" } } \ No newline at end of file diff --git a/2024/25xxx/CVE-2024-25641.json b/2024/25xxx/CVE-2024-25641.json index f66578287aa..c364d312def 100644 --- a/2024/25xxx/CVE-2024-25641.json +++ b/2024/25xxx/CVE-2024-25641.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-25641", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the \"Package Import\" feature, allows authenticated users having the \"Import Templates\" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cacti", + "product": { + "product_data": [ + { + "product_name": "cacti", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 1.2.27" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88", + "refsource": "MISC", + "name": "https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88" + }, + { + "url": "https://github.com/Cacti/cacti/commit/eff35b0ff26cc27c82d7880469ed6d5e3bef6210", + "refsource": "MISC", + "name": "https://github.com/Cacti/cacti/commit/eff35b0ff26cc27c82d7880469ed6d5e3bef6210" + } + ] + }, + "source": { + "advisory": "GHSA-7cmj-g5qc-pj88", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/27xxx/CVE-2024-27082.json b/2024/27xxx/CVE-2024-27082.json index 38cf6db2728..801b2fd5606 100644 --- a/2024/27xxx/CVE-2024-27082.json +++ b/2024/27xxx/CVE-2024-27082.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-27082", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cacti provides an operational monitoring and fault management framework. Versions of Cacti prior to 1.2.27 are vulnerable to stored cross-site scripting, a type of cross-site scripting where malicious scripts are permanently stored on a target server and served to users who access a particular page. Version 1.2.27 contains a patch for the issue." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Cacti", + "product": { + "product_data": [ + { + "product_name": "cacti", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 1.2.27" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-j868-7vjp-rp9h", + "refsource": "MISC", + "name": "https://github.com/Cacti/cacti/security/advisories/GHSA-j868-7vjp-rp9h" + } + ] + }, + "source": { + "advisory": "GHSA-j868-7vjp-rp9h", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H", + "version": "3.1" } ] } diff --git a/2024/28xxx/CVE-2024-28866.json b/2024/28xxx/CVE-2024-28866.json index be99d8d9699..7382e806fc8 100644 --- a/2024/28xxx/CVE-2024-28866.json +++ b/2024/28xxx/CVE-2024-28866.json @@ -1,17 +1,100 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-28866", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GoCD is a continuous delivery server. GoCD versions from 19.4.0 to 23.5.0 (inclusive) are potentially vulnerable to a reflected cross-site scripting vulnerability on the loading page displayed while GoCD is starting, via abuse of a `redirect_to` query parameter with inadequate validation.\n\nAttackers could theoretically abuse the query parameter to steal session tokens or other values from the user's browser. In practice exploiting this to perform privileged actions is likely rather difficult to exploit because the target user would need to be triggered to open an attacker-crafted link in the period where the server is starting up (but not completely started), requiring chaining with a separate denial-of-service vulnerability. Additionally, GoCD server restarts invalidate earlier session tokens (i.e GoCD does not support persistent sessions), so a stolen session token would be unusable once the server has completed restart, and executed XSS would be done within a logged-out context.\n\nThe issue is fixed in GoCD 24.1.0. As a workaround, it is technically possible in earlier GoCD versions to override the loading page with an earlier version which is not vulnerable, by starting GoCD with the Java system property override as either `-Dloading.page.resource.path=/loading_pages/default.loading.page.html` (simpler early version of loading page without GoCD introduction) or `-Dloading.page.resource.path=/does_not_exist.html` (to display a simple message with no interactivity)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "gocd", + "product": { + "product_data": [ + { + "product_name": "gocd", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">= 19.4.0, < 24.1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gocd/gocd/security/advisories/GHSA-q882-q6mm-mgvh", + "refsource": "MISC", + "name": "https://github.com/gocd/gocd/security/advisories/GHSA-q882-q6mm-mgvh" + }, + { + "url": "https://github.com/gocd/gocd/commit/388d8893ec4cac51d2b76e923cc9b55c7703e402", + "refsource": "MISC", + "name": "https://github.com/gocd/gocd/commit/388d8893ec4cac51d2b76e923cc9b55c7703e402" + }, + { + "url": "https://github.com/gocd/gocd/releases/tag/24.1.0", + "refsource": "MISC", + "name": "https://github.com/gocd/gocd/releases/tag/24.1.0" + }, + { + "url": "https://www.gocd.org/releases/#24-1-0", + "refsource": "MISC", + "name": "https://www.gocd.org/releases/#24-1-0" + } + ] + }, + "source": { + "advisory": "GHSA-q882-q6mm-mgvh", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/33xxx/CVE-2024-33931.json b/2024/33xxx/CVE-2024-33931.json index 4b1ecc9ef11..26304c7303c 100644 --- a/2024/33xxx/CVE-2024-33931.json +++ b/2024/33xxx/CVE-2024-33931.json @@ -40,9 +40,24 @@ "version": { "version_data": [ { - "version_affected": "<=", - "version_name": "n/a", - "version_value": "2.3.3" + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "2.3.4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "2.3.3", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } } ] } @@ -68,6 +83,19 @@ "source": { "discovery": "EXTERNAL" }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 2.3.4 or a higher version." + } + ], + "value": "Update to\u00a02.3.4 or a higher version." + } + ], "credits": [ { "lang": "en", diff --git a/2024/35xxx/CVE-2024-35048.json b/2024/35xxx/CVE-2024-35048.json index 6c9803daac7..1f28fe5a7ae 100644 --- a/2024/35xxx/CVE-2024-35048.json +++ b/2024/35xxx/CVE-2024-35048.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-35048", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-35048", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in SurveyKing v1.3.1 allows attackers to execute a session replay attack after a user changes their password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/javahuang/SurveyKing/issues/56", + "refsource": "MISC", + "name": "https://github.com/javahuang/SurveyKing/issues/56" } ] } diff --git a/2024/35xxx/CVE-2024-35049.json b/2024/35xxx/CVE-2024-35049.json index 73f4a5cb881..60798819f99 100644 --- a/2024/35xxx/CVE-2024-35049.json +++ b/2024/35xxx/CVE-2024-35049.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-35049", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-35049", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SurveyKing v1.3.1 was discovered to keep users' sessions active after logout. Related to an incomplete fix for CVE-2022-25590." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/javahuang/SurveyKing/issues/55", + "refsource": "MISC", + "name": "https://github.com/javahuang/SurveyKing/issues/55" } ] } diff --git a/2024/35xxx/CVE-2024-35050.json b/2024/35xxx/CVE-2024-35050.json index 0d0b96ab029..2d803be05d9 100644 --- a/2024/35xxx/CVE-2024-35050.json +++ b/2024/35xxx/CVE-2024-35050.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-35050", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-35050", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in SurveyKing v1.3.1 allows attackers to escalate privileges via re-using the session ID of a user that was deleted by an Admin." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/javahuang/SurveyKing/issues/57", + "refsource": "MISC", + "name": "https://github.com/javahuang/SurveyKing/issues/57" } ] } diff --git a/2024/4xxx/CVE-2024-4819.json b/2024/4xxx/CVE-2024-4819.json index 953b847e40d..4a10dc0f229 100644 --- a/2024/4xxx/CVE-2024-4819.json +++ b/2024/4xxx/CVE-2024-4819.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-4819", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Campcodes Online Laundry Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file admin_class.php. The manipulation of the argument type with the input 1 leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263940." + }, + { + "lang": "deu", + "value": "Es wurde eine problematische Schwachstelle in Campcodes Online Laundry Management System 1.0 ausgemacht. Es betrifft eine unbekannte Funktion der Datei admin_class.php. Mittels Manipulieren des Arguments type mit der Eingabe 1 mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285 Improper Authorization", + "cweId": "CWE-285" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Campcodes", + "product": { + "product_data": [ + { + "product_name": "Online Laundry Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.263940", + "refsource": "MISC", + "name": "https://vuldb.com/?id.263940" + }, + { + "url": "https://vuldb.com/?ctiid.263940", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.263940" + }, + { + "url": "https://vuldb.com/?submit.333058", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.333058" + }, + { + "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md", + "refsource": "MISC", + "name": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "yylm (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" } ] } diff --git a/2024/4xxx/CVE-2024-4820.json b/2024/4xxx/CVE-2024-4820.json index bb3689f7467..38c549b21c6 100644 --- a/2024/4xxx/CVE-2024-4820.json +++ b/2024/4xxx/CVE-2024-4820.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-4820", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/SystemSettings.php?f=update_settings. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263941 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "In SourceCodester Online Computer and Laptop Store 1.0 wurde eine kritische Schwachstelle ausgemacht. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /classes/SystemSettings.php?f=update_settings. Durch das Manipulieren mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-434 Unrestricted Upload", + "cweId": "CWE-434" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Online Computer and Laptop Store", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.263941", + "refsource": "MISC", + "name": "https://vuldb.com/?id.263941" + }, + { + "url": "https://vuldb.com/?ctiid.263941", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.263941" + }, + { + "url": "https://vuldb.com/?submit.333272", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.333272" + }, + { + "url": "https://github.com/jxm68868/cve/blob/main/upload.md", + "refsource": "MISC", + "name": "https://github.com/jxm68868/cve/blob/main/upload.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Jimi (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] }