From d8307d8871475fc4d10f85fe2b9a5412735cac53 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 18 Aug 2019 17:00:47 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2014/0xxx/CVE-2014-0114.json | 5 +++ 2019/15xxx/CVE-2019-15129.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15130.json | 62 ++++++++++++++++++++++++++++++++++ 3 files changed, 129 insertions(+) create mode 100644 2019/15xxx/CVE-2019-15129.json create mode 100644 2019/15xxx/CVE-2019-15130.json diff --git a/2014/0xxx/CVE-2014-0114.json b/2014/0xxx/CVE-2014-0114.json index f668af28754..2ed9f53065f 100644 --- a/2014/0xxx/CVE-2014-0114.json +++ b/2014/0xxx/CVE-2014-0114.json @@ -541,6 +541,11 @@ "refsource": "MLIST", "name": "[announce] 20190814 [SECURITY] CVE-2019-10086. Apache Commons Beanutils does not suppresses the class property in PropertyUtilsBean by default.", "url": "https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[commons-issues] 20190818 [jira] [Commented] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", + "url": "https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478@%3Cissues.commons.apache.org%3E" } ] } diff --git a/2019/15xxx/CVE-2019-15129.json b/2019/15xxx/CVE-2019-15129.json new file mode 100644 index 00000000000..2965955295f --- /dev/null +++ b/2019/15xxx/CVE-2019-15129.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15129", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Recruitment module in Humanica Humatrix 7 1.0.0.203 and 1.0.0.681 allows an unauthenticated attacker to access all candidates' files in the photo folder on the website by specifying a \"user id\" parameter and file name, such as in a recruitment_online/upload/user/[user_id]/photo/[file_name] URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/izadgot/38a7dd553f8024ed3154134dae0414fd", + "url": "https://gist.github.com/izadgot/38a7dd553f8024ed3154134dae0414fd" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15130.json b/2019/15xxx/CVE-2019-15130.json new file mode 100644 index 00000000000..4ba357740f3 --- /dev/null +++ b/2019/15xxx/CVE-2019-15130.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15130", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Recruitment module in Humanica Humatrix 7 1.0.0.203 and 1.0.0.681 allows an unauthenticated attacker to upload any file type to a candidate's profile picture folder via a crafted recruitment_online/personalData/act_personaltab.cfm multiple-part POST request with a predictable WRC01_USERID parameter. Moreover, the attacker can upload executable content (e.g., asp or aspx) for executing OS commands on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/izadgot/38a7dd553f8024ed3154134dae0414fd", + "url": "https://gist.github.com/izadgot/38a7dd553f8024ed3154134dae0414fd" + } + ] + } +} \ No newline at end of file