From d98d4a1c68572466ed2603cb104bbfc8510bc7ac Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 18 Dec 2023 17:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/46xxx/CVE-2023-46445.json | 17 ++++- 2023/46xxx/CVE-2023-46446.json | 7 +- 2023/46xxx/CVE-2023-46617.json | 85 +++++++++++++++++++++++-- 2023/48xxx/CVE-2023-48762.json | 113 +++++++++++++++++++++++++++++++-- 2023/48xxx/CVE-2023-48766.json | 85 +++++++++++++++++++++++-- 2023/48xxx/CVE-2023-48795.json | 32 +++++++++- 2023/6xxx/CVE-2023-6920.json | 8 +-- 7 files changed, 328 insertions(+), 19 deletions(-) diff --git a/2023/46xxx/CVE-2023-46445.json b/2023/46xxx/CVE-2023-46445.json index 148f6ae62f0..0718d96e301 100644 --- a/2023/46xxx/CVE-2023-46445.json +++ b/2023/46xxx/CVE-2023-46445.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info message (RFC 8308) via a man-in-the-middle attack." + "value": "An issue in AsyncSSH before 2.14.1 allows attackers to control the extension info message (RFC 8308) via a man-in-the-middle attack, aka a \"Rogue Extension Negotiation.\"" } ] }, @@ -61,6 +61,21 @@ "refsource": "FEDORA", "name": "FEDORA-2023-d2956318e4", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ME34ROZWMDK5KLMZKTSA422XVJZ7IMTE/" + }, + { + "refsource": "MISC", + "name": "https://www.terrapin-attack.com", + "url": "https://www.terrapin-attack.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst", + "url": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst" + }, + { + "refsource": "MISC", + "name": "https://github.com/advisories/GHSA-cfc2-wr2v-gxm5", + "url": "https://github.com/advisories/GHSA-cfc2-wr2v-gxm5" } ] } diff --git a/2023/46xxx/CVE-2023-46446.json b/2023/46xxx/CVE-2023-46446.json index afcb06138d3..e37462a5e5c 100644 --- a/2023/46xxx/CVE-2023-46446.json +++ b/2023/46xxx/CVE-2023-46446.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka \"Rogue Extension Negotiation.\"" + "value": "An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a \"Rogue Session Attack.\"" } ] }, @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst", "url": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst" + }, + { + "refsource": "MISC", + "name": "https://github.com/advisories/GHSA-c35q-ffpf-5qpm", + "url": "https://github.com/advisories/GHSA-c35q-ffpf-5qpm" } ] } diff --git a/2023/46xxx/CVE-2023-46617.json b/2023/46xxx/CVE-2023-46617.json index ab540d4f2cc..f43f0708e46 100644 --- a/2023/46xxx/CVE-2023-46617.json +++ b/2023/46xxx/CVE-2023-46617.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-46617", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in AdFoxly AdFoxly \u2013 Ad Manager, AdSense Ads & Ads.Txt.This issue affects AdFoxly \u2013 Ad Manager, AdSense Ads & Ads.Txt: from n/a through 1.8.5.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)", + "cweId": "CWE-352" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "AdFoxly", + "product": { + "product_data": [ + { + "product_name": "AdFoxly \u2013 Ad Manager, AdSense Ads & Ads.txt", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "n/a", + "version_value": "1.8.5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/adfoxly/wordpress-adfoxly-ad-manager-adsense-ads-ads-txt-plugin-1-8-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/adfoxly/wordpress-adfoxly-ad-manager-adsense-ads-ads-txt-plugin-1-8-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "LVT-tholv2k (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "version": "3.1" } ] } diff --git a/2023/48xxx/CVE-2023-48762.json b/2023/48xxx/CVE-2023-48762.json index 922ee33b384..203e5278b18 100644 --- a/2023/48xxx/CVE-2023-48762.json +++ b/2023/48xxx/CVE-2023-48762.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-48762", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Crocoblock JetElements For Elementor.This issue affects JetElements For Elementor: from n/a through 2.6.13.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)", + "cweId": "CWE-352" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Crocoblock", + "product": { + "product_data": [ + { + "product_name": "JetElements For Elementor", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "2.6.13.1", + "status": "unaffected" + } + ], + "lessThanOrEqual": "2.6.13", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 2.6.13.1 or a higher version." + } + ], + "value": "Update to\u00a02.6.13.1 or a higher version." + } + ], + "credits": [ + { + "lang": "en", + "value": "Rafie Muhammad (Patchstack)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2023/48xxx/CVE-2023-48766.json b/2023/48xxx/CVE-2023-48766.json index 73d67e44cd1..0e7a77310e8 100644 --- a/2023/48xxx/CVE-2023-48766.json +++ b/2023/48xxx/CVE-2023-48766.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-48766", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SVGator SVGator \u2013 Add Animated SVG Easily.This issue affects SVGator \u2013 Add Animated SVG Easily: from n/a through 1.2.4.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)", + "cweId": "CWE-352" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SVGator", + "product": { + "product_data": [ + { + "product_name": "SVGator \u2013 Add Animated SVG Easily", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "n/a", + "version_value": "1.2.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/vulnerability/svgator/wordpress-svgator-add-animated-svg-easily-plugin-1-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/vulnerability/svgator/wordpress-svgator-add-animated-svg-easily-plugin-1-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Abdi Pranata (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2023/48xxx/CVE-2023-48795.json b/2023/48xxx/CVE-2023-48795.json index a3aea5f49e8..00b677adf68 100644 --- a/2023/48xxx/CVE-2023-48795.json +++ b/2023/48xxx/CVE-2023-48795.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, and PuTTY before 0.80; and there could be effects on Bitvise SSH through 9.31, AsyncSSH through 2.14.1, libssh through 0.10.5, and golang.org/x/crypto through 2023-12-17." + "value": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, and AsyncSSH before 2.14.2; and there could be effects on Bitvise SSH through 9.31, libssh through 0.10.5, and golang.org/x/crypto through 2023-12-17." } ] }, @@ -121,6 +121,36 @@ "refsource": "MISC", "name": "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25", "url": "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25" + }, + { + "refsource": "MISC", + "name": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst", + "url": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst" + }, + { + "refsource": "MISC", + "name": "https://thorntech.com/cve-2023-48795-and-sftp-gateway/", + "url": "https://thorntech.com/cve-2023-48795-and-sftp-gateway/" + }, + { + "refsource": "MISC", + "name": "https://github.com/warp-tech/russh/releases/tag/v0.40.2", + "url": "https://github.com/warp-tech/russh/releases/tag/v0.40.2" + }, + { + "refsource": "MISC", + "name": "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0", + "url": "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2023/12/18/2", + "url": "https://www.openwall.com/lists/oss-security/2023/12/18/2" + }, + { + "refsource": "MISC", + "name": "https://twitter.com/TrueSkrillor/status/1736774389725565005", + "url": "https://twitter.com/TrueSkrillor/status/1736774389725565005" } ] } diff --git a/2023/6xxx/CVE-2023-6920.json b/2023/6xxx/CVE-2023-6920.json index b1842827797..bd56bd9c347 100644 --- a/2023/6xxx/CVE-2023-6920.json +++ b/2023/6xxx/CVE-2023-6920.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-6920", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This flaw was found to be a duplicate of CVE-2023-6927. Please see https://access.redhat.com/security/cve/CVE-2023-6927 for information about affected products and security errata." } ] }