diff --git a/2020/8xxx/CVE-2020-8889.json b/2020/8xxx/CVE-2020-8889.json index d0b9742fbbc..518fefa877e 100644 --- a/2020/8xxx/CVE-2020-8889.json +++ b/2020/8xxx/CVE-2020-8889.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.jerdiggity.com/node/869", "url": "https://www.jerdiggity.com/node/869" + }, + { + "refsource": "MISC", + "name": "https://www.jerdiggity.com/node/871", + "url": "https://www.jerdiggity.com/node/871" } ] } diff --git a/2023/28xxx/CVE-2023-28834.json b/2023/28xxx/CVE-2023-28834.json index 1f8efdcae85..669604c3472 100644 --- a/2023/28xxx/CVE-2023-28834.json +++ b/2023/28xxx/CVE-2023-28834.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-28834", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Nextcloud Server is an open source personal cloud server. Nextcloud Server 24.0.0 until 24.0.6 and 25.0.0 until 25.0.4, as well as Nextcloud Enterprise Server 23.0.0 until 23.0.11, 24.0.0 until 24.0.6, and 25.0.0 until 25.0.4, have an information disclosure vulnerability. A user was able to get the full data directory path of the Nextcloud server from an API endpoint. By itself this information is not problematic as it can also be guessed for most common setups, but it could speed up other unknown attacks in the future if the information is known. Nextcloud Server 24.0.6 and 25.0.4 and Nextcloud Enterprise Server 23.0.11, 24.0.6, and 25.0.4 contain patches for this issue. There are no known workarounds." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer", + "cweId": "CWE-212" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "nextcloud", + "product": { + "product_data": [ + { + "product_name": "security-advisories", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">= 23.0.0, < 23.0.14" + }, + { + "version_affected": "=", + "version_value": ">= 24.0.0, < 24.0.10" + }, + { + "version_affected": "=", + "version_value": ">= 25.0.0, < 25.0.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5w64-6c42-rgcv", + "refsource": "MISC", + "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5w64-6c42-rgcv" + }, + { + "url": "https://github.com/nextcloud/server/issues/33883", + "refsource": "MISC", + "name": "https://github.com/nextcloud/server/issues/33883" + }, + { + "url": "https://github.com/nextcloud/server/pull/36094", + "refsource": "MISC", + "name": "https://github.com/nextcloud/server/pull/36094" + }, + { + "url": "https://hackerone.com/reports/1690510", + "refsource": "MISC", + "name": "https://hackerone.com/reports/1690510" + } + ] + }, + "source": { + "advisory": "GHSA-5w64-6c42-rgcv", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/28xxx/CVE-2023-28836.json b/2023/28xxx/CVE-2023-28836.json index 7b3d9f70bc6..3c77dd17d72 100644 --- a/2023/28xxx/CVE-2023-28836.json +++ b/2023/28xxx/CVE-2023-28836.json @@ -1,17 +1,129 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-28836", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Wagtail is an open source content management system built on Django. Starting in version 1.5 and prior to versions 4.1.4 and 4.2.2, a stored cross-site scripting (XSS) vulnerability exists on ModelAdmin views within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with ModelAdmin enabled. For page, the vulnerability is in the \"Choose a parent page\" ModelAdmin view (`ChooseParentView`), available when managing pages via ModelAdmin. For documents, the vulnerability is in the ModelAdmin Inspect view (`InspectView`) when displaying document fields. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2. Site owners who are unable to upgrade to the new versions can disable or override the corresponding functionality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "wagtail", + "product": { + "product_data": [ + { + "product_name": "wagtail", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">= 1.5, < 4.1.4" + }, + { + "version_affected": "=", + "version_value": ">= 4.2, < 4.2.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-5286-f2rf-35c2", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/security/advisories/GHSA-5286-f2rf-35c2" + }, + { + "url": "https://github.com/wagtail/wagtail/commit/158acef60615bbeeae07713b2888dad07b0ee1ff", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/commit/158acef60615bbeeae07713b2888dad07b0ee1ff" + }, + { + "url": "https://github.com/wagtail/wagtail/commit/714147964a532d9797d33284f5db93d231204978", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/commit/714147964a532d9797d33284f5db93d231204978" + }, + { + "url": "https://github.com/wagtail/wagtail/commit/bc84bf9815610cfbf8db3b6050c7ddcbaa4b9713", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/commit/bc84bf9815610cfbf8db3b6050c7ddcbaa4b9713" + }, + { + "url": "https://github.com/wagtail/wagtail/commit/eefc3381d37b476791610e5d30594fae443f33af", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/commit/eefc3381d37b476791610e5d30594fae443f33af" + }, + { + "url": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html#customising-chooseparentview", + "refsource": "MISC", + "name": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html#customising-chooseparentview" + }, + { + "url": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#enabling-customising-inspectview", + "refsource": "MISC", + "name": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#enabling-customising-inspectview" + }, + { + "url": "https://github.com/wagtail/wagtail/releases/tag/v4.1.4", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/releases/tag/v4.1.4" + }, + { + "url": "https://github.com/wagtail/wagtail/releases/tag/v4.2.2", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/releases/tag/v4.2.2" + } + ] + }, + "source": { + "advisory": "GHSA-5286-f2rf-35c2", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2023/28xxx/CVE-2023-28837.json b/2023/28xxx/CVE-2023-28837.json index e8e76f294c4..a3fc2a04360 100644 --- a/2023/28xxx/CVE-2023-28837.json +++ b/2023/28xxx/CVE-2023-28837.json @@ -1,17 +1,133 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-28837", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Wagtail is an open source content management system built on Django. Prior to versions 4.1.4 and 4.2.2, a memory exhaustion bug exists in Wagtail's handling of uploaded images and documents. For both images and documents, files are loaded into memory during upload for additional processing. A user with access to upload images or documents through the Wagtail admin interface could upload a file so large that it results in a crash of denial of service. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. It can only be exploited by admin users with permission to upload images or documents. Image uploads are restricted to 10MB by default, however this validation only happens on the frontend and on the backend after the vulnerable code. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2). Site owners who are unable to upgrade to the new versions are encouraged to add extra protections outside of Wagtail to limit the size of uploaded files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400: Uncontrolled Resource Consumption", + "cweId": "CWE-400" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-770: Allocation of Resources Without Limits or Throttling", + "cweId": "CWE-770" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "wagtail", + "product": { + "product_data": [ + { + "product_name": "wagtail", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 4.1.4" + }, + { + "version_affected": "=", + "version_value": ">= 4.2, < 4.2.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/wagtail/wagtail/releases/tag/v4.1.4", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/releases/tag/v4.1.4" + }, + { + "url": "https://github.com/wagtail/wagtail/releases/tag/v4.2.2", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/releases/tag/v4.2.2" + }, + { + "url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9" + }, + { + "url": "https://github.com/wagtail/wagtail/commit/3c0c64642b9e5b8d28b111263c7f4bddad6c3880", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/commit/3c0c64642b9e5b8d28b111263c7f4bddad6c3880" + }, + { + "url": "https://github.com/wagtail/wagtail/commit/c9d2fcd650a88d76ae122646142245e5927a9165", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/commit/c9d2fcd650a88d76ae122646142245e5927a9165" + }, + { + "url": "https://github.com/wagtail/wagtail/commit/cfa11bbe00dbe7ce8cd4c0bbfe2a898a690df2bf", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/commit/cfa11bbe00dbe7ce8cd4c0bbfe2a898a690df2bf" + }, + { + "url": "https://github.com/wagtail/wagtail/commit/d4022310cbe497993459c3136311467c7ac6329a", + "refsource": "MISC", + "name": "https://github.com/wagtail/wagtail/commit/d4022310cbe497993459c3136311467c7ac6329a" + }, + { + "url": "https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size", + "refsource": "MISC", + "name": "https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size" + } + ] + }, + "source": { + "advisory": "GHSA-33pv-vcgh-jfg9", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] }