From ec37cf45433aba8deaad20862e1af79b6220aeb5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 13 Dec 2021 16:01:05 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/22xxx/CVE-2021-22279.json | 95 +++++++++++++++++++++++++++++++--- 2021/37xxx/CVE-2021-37808.json | 10 ++++ 2021/39xxx/CVE-2021-39910.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39915.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39916.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39917.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39918.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39919.json | 85 ++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39930.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39931.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39932.json | 85 ++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39933.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39934.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39935.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39936.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39937.json | 85 ++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39938.json | 85 ++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39939.json | 85 ++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39940.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39941.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39944.json | 90 ++++++++++++++++++++++++++++++-- 2021/39xxx/CVE-2021-39945.json | 90 ++++++++++++++++++++++++++++++-- 2021/40xxx/CVE-2021-40007.json | 50 ++++++++++++++++-- 2021/40xxx/CVE-2021-40008.json | 59 +++++++++++++++++++-- 2021/41xxx/CVE-2021-41646.json | 5 ++ 2021/42xxx/CVE-2021-42668.json | 10 ++++ 2021/43xxx/CVE-2021-43983.json | 91 +++++++++++++++++++++++++++++--- 2021/45xxx/CVE-2021-45033.json | 18 +++++++ 2021/45xxx/CVE-2021-45034.json | 18 +++++++ 29 files changed, 2031 insertions(+), 100 deletions(-) create mode 100644 2021/45xxx/CVE-2021-45033.json create mode 100644 2021/45xxx/CVE-2021-45034.json diff --git a/2021/22xxx/CVE-2021-22279.json b/2021/22xxx/CVE-2021-22279.json index d085c3fbb4e..e25729d8e72 100644 --- a/2021/22xxx/CVE-2021-22279.json +++ b/2021/22xxx/CVE-2021-22279.json @@ -1,18 +1,99 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cybersecurity@ch.abb.com", + "DATE_PUBLIC": "2021-12-01T07:48:00.000Z", "ID": "CVE-2021-22279", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "OmniCore RobotWare Missing Authentication Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "RobotWare", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "7.3.2" + } + ] + } + } + ] + }, + "vendor_name": "ABB" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Missing Authentication vulnerability in RobotWare for the OmniCore robot controller allows an attacker to read and modify files on the robot controller if the attacker has access to the Connected Services Gateway Ethernet port." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306 Missing Authentication for Critical Function" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://search.abb.com/library/Download.aspx?DocumentID=SI20265&LanguageCode=en&DocumentPartId=&Action=Launch", + "name": "https://search.abb.com/library/Download.aspx?DocumentID=SI20265&LanguageCode=en&DocumentPartId=&Action=Launch" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "The problem is corrected in RobotWare version 7.3.2.\nABB recommends that customers apply the update at earliest convenience. The update is available for download from RobotStudio.\n" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "eng", + "value": "ABB has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they can help block known attack vectors:\n\u2022 Do not use Connected Services Ethernet port connection until the update has been applied, or\n\u2022 Protect Connected Services Gateway Ethernet port with a firewall, which prevents inbound connections." + } + ] } \ No newline at end of file diff --git a/2021/37xxx/CVE-2021-37808.json b/2021/37xxx/CVE-2021-37808.json index 253bba6ae40..f1da833d7ce 100644 --- a/2021/37xxx/CVE-2021-37808.json +++ b/2021/37xxx/CVE-2021-37808.json @@ -56,6 +56,16 @@ "url": "https://packetstormsecurity.com/files/163575/News-Portal-Project-3.1-SQL-Injection.html", "refsource": "MISC", "name": "https://packetstormsecurity.com/files/163575/News-Portal-Project-3.1-SQL-Injection.html" + }, + { + "refsource": "MISC", + "name": "https://www.nu11secur1ty.com/2021/12/cve-2021-37808.html", + "url": "https://www.nu11secur1ty.com/2021/12/cve-2021-37808.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37808", + "url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37808" } ] } diff --git a/2021/39xxx/CVE-2021-39910.json b/2021/39xxx/CVE-2021-39910.json index 13d78c0d5ce..16dc04ca75f 100644 --- a/2021/39xxx/CVE-2021-39910.json +++ b/2021/39xxx/CVE-2021-39910.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39910", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=12.6, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper neutralization of input during web page generation ('cross-site scripting') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/325901", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/325901", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1133656", + "url": "https://hackerone.com/reports/1133656", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39910.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39910.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab was vulnerable to HTML Injection through the Swagger UI feature." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 2.6, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @kannthu for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39915.json b/2021/39xxx/CVE-2021-39915.json index d98ff147f52..e981880eb04 100644 --- a/2021/39xxx/CVE-2021-39915.json +++ b/2021/39xxx/CVE-2021-39915.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39915", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=13.0, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/340803", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/340803", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1336059", + "url": "https://hackerone.com/reports/1336059", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39915.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39915.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control in the GraphQL API in GitLab CE/EE affecting all versions starting from 13.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to see the names of project access tokens on arbitrary projects" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @joaxcar for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39916.json b/2021/39xxx/CVE-2021-39916.json index c706e098dad..7cb1bf90cef 100644 --- a/2021/39xxx/CVE-2021-39916.json +++ b/2021/39xxx/CVE-2021-39916.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39916", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=14.1, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Authorization bypass through user-controlled key in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/343379", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/343379", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1372216", + "url": "https://hackerone.com/reports/1372216", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39916.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39916.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Lack of an access control check in the External Status Check feature allowed any authenticated user to retrieve the configuration of any External Status Check in GitLab EE starting from 14.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @joaxcar for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39917.json b/2021/39xxx/CVE-2021-39917.json index e9b67ae81de..387f1cd67a0 100644 --- a/2021/39xxx/CVE-2021-39917.json +++ b/2021/39xxx/CVE-2021-39917.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39917", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=12.9, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/338486", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/338486", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1277918", + "url": "https://hackerone.com/reports/1277918", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39917.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39917.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.9 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression related to quick actions features was susceptible to catastrophic backtracking that could cause a DOS attack." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @hashkitten, for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39918.json b/2021/39xxx/CVE-2021-39918.json index 5ccb0d98062..8b9ad5483f0 100644 --- a/2021/39xxx/CVE-2021-39918.json +++ b/2021/39xxx/CVE-2021-39918.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39918", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=11.1, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Incorrect authorization in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/329916", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/329916", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1180043", + "url": "https://hackerone.com/reports/1180043", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39918.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39918.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Incorrect Authorization in GitLab EE affecting all versions starting from 11.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows a user to add comments to a vulnerability which cannot be accessed." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 3.0, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @wi11 for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39919.json b/2021/39xxx/CVE-2021-39919.json index 7e394a71cf2..e828e8ac74d 100644 --- a/2021/39xxx/CVE-2021-39919.json +++ b/2021/39xxx/CVE-2021-39919.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39919", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=14.0, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information exposure in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/342445", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/342445", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39919.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39919.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of GitLab CE/EE starting version 14.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, the reset password token and new user email token are accidentally logged which may lead to information disclosure." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability was discovered internally by a member of the GitLab team." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39930.json b/2021/39xxx/CVE-2021-39930.json index 4964d4d5273..9081329f2b9 100644 --- a/2021/39xxx/CVE-2021-39930.json +++ b/2021/39xxx/CVE-2021-39930.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39930", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=12.4, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Direct request ('forced browsing') in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/26103", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/26103", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/475240", + "url": "https://hackerone.com/reports/475240", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39930.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39930.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Missing authorization in GitLab EE versions between 12.4 and 14.3.6, between 14.4.0 and 14.4.4, and between 14.5.0 and 14.5.2 allowed an attacker to access a user's custom project and group templates" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @ngalog for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39931.json b/2021/39xxx/CVE-2021-39931.json index 517ff5368bf..a7e5acfa564 100644 --- a/2021/39xxx/CVE-2021-39931.json +++ b/2021/39xxx/CVE-2021-39931.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39931", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=8.11, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Vulnerability in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/340445", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/340445", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1318379", + "url": "https://hackerone.com/reports/1318379", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39931.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39931.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.11 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Under specific condition an unauthorised project member was allowed to delete a protected branches due to a business logic error." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 3.0, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @joaxcar for reporting this vulnerability through our HackerOne bug bounty program." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39932.json b/2021/39xxx/CVE-2021-39932.json index 93f912bbd95..c17fc0901d4 100644 --- a/2021/39xxx/CVE-2021-39932.json +++ b/2021/39xxx/CVE-2021-39932.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39932", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=12.10, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/217360", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/217360", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39932.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39932.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Using large payloads, the diff feature could be used to trigger high load time for users reviewing code changes." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39933.json b/2021/39xxx/CVE-2021-39933.json index f31790b6450..7910b21b677 100644 --- a/2021/39xxx/CVE-2021-39933.json +++ b/2021/39xxx/CVE-2021-39933.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39933", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=12.10, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/340449", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/340449", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1320077", + "url": "https://hackerone.com/reports/1320077", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39933.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39933.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression used for handling user input (notes, comments, etc) was susceptible to catastrophic backtracking that could cause a DOS attack." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @hashkitten, for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39934.json b/2021/39xxx/CVE-2021-39934.json index 1ece4b34441..60d58be1167 100644 --- a/2021/39xxx/CVE-2021-39934.json +++ b/2021/39xxx/CVE-2021-39934.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39934", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=12.10, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Authorization bypass through user-controlled key in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/342823", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/342823", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1360744", + "url": "https://hackerone.com/reports/1360744", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39934.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39934.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control allows any project member to retrieve the service desk email address in GitLab CE/EE versions starting 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @gratitude101 for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39935.json b/2021/39xxx/CVE-2021-39935.json index 74ab25d3913..84842eeb2fd 100644 --- a/2021/39xxx/CVE-2021-39935.json +++ b/2021/39xxx/CVE-2021-39935.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39935", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=10.5, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Server-side request forgery (ssrf) in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/346187", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/346187", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1236965", + "url": "https://hackerone.com/reports/1236965", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39935.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39935.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @minhli for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39936.json b/2021/39xxx/CVE-2021-39936.json index 35a8732bce0..79123218e26 100644 --- a/2021/39xxx/CVE-2021-39936.json +++ b/2021/39xxx/CVE-2021-39936.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39936", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=10.7, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/241767", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/241767", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/964057", + "url": "https://hackerone.com/reports/964057", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39936.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39936.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control in GitLab CE/EE affecting all versions starting from 10.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker in possession of a deploy token to access a project's disabled wiki." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 3.5, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @vaib25vicky for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39937.json b/2021/39xxx/CVE-2021-39937.json index 8a3ae2b3321..0ff8e9ba36c 100644 --- a/2021/39xxx/CVE-2021-39937.json +++ b/2021/39xxx/CVE-2021-39937.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39937", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=0.0, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/336802", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/336802", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39937.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39937.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A collision in access memoization logic in all versions of GitLab CE/EE before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, leads to potential elevated privileges in groups and projects under rare circumstances" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39938.json b/2021/39xxx/CVE-2021-39938.json index bfe4f3765ec..bafc91ed2df 100644 --- a/2021/39xxx/CVE-2021-39938.json +++ b/2021/39xxx/CVE-2021-39938.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39938", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=14.5, <14.5.2" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=8.15, <14.3.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/344873", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/344873", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39938.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39938.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerable regular expression pattern in GitLab CE/EE since version 8.15 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to cause uncontrolled resource consumption leading to Denial of Service via specially crafted deploy Slash commands" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 3.0, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39939.json b/2021/39xxx/CVE-2021-39939.json index 8ef47fec171..ab17deb77fb 100644 --- a/2021/39xxx/CVE-2021-39939.json +++ b/2021/39xxx/CVE-2021-39939.json @@ -4,15 +4,92 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39939", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab Runner", + "version": { + "version_data": [ + { + "version_value": ">=13.7, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab Runner" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab-runner/-/issues/28630", + "url": "https://gitlab.com/gitlab-org/gitlab-runner/-/issues/28630", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39939.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39939.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An uncontrolled resource consumption vulnerability in GitLab Runner affecting all versions starting from 13.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker triggering a job with a specially crafted docker image to exhaust resources on runner manager" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "This vulnerability has been discovered internally by the GitLab team" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39940.json b/2021/39xxx/CVE-2021-39940.json index 28d645f4b53..fdce2de529a 100644 --- a/2021/39xxx/CVE-2021-39940.json +++ b/2021/39xxx/CVE-2021-39940.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39940", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=14.5, <14.5.2" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=13.2, <14.3.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncontrolled resource consumption in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/263116", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/263116", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/997961", + "url": "https://hackerone.com/reports/997961", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39940.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39940.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab Maven Package registry is vulnerable to a regular expression denial of service when a specifically crafted string is sent." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @anyday for reporting this vulnerability through our HackerOne bug bounty program." + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39941.json b/2021/39xxx/CVE-2021-39941.json index 675e8650844..1367027253a 100644 --- a/2021/39xxx/CVE-2021-39941.json +++ b/2021/39xxx/CVE-2021-39941.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39941", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=12.0, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information exposure in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/33864", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/33864", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/706361", + "url": "https://hackerone.com/reports/706361", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39941.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39941.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An information disclosure vulnerability in GitLab CE/EE versions 12.0 to 14.3.6, 14.4 to 14.4.4, and 14.5 to 14.5.2 allowed non-project members to see the default branch name for projects that restrict access to the repository to project members" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 3.6, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39944.json b/2021/39xxx/CVE-2021-39944.json index a52bdcef5e5..8760f5aa345 100644 --- a/2021/39xxx/CVE-2021-39944.json +++ b/2021/39xxx/CVE-2021-39944.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39944", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=11.0, <14.3.6" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=14.5, <14.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper authentication in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/336531", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/336531", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1256017", + "url": "https://hackerone.com/reports/1256017", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39944.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39944.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A permissions validation flaw allowed group members with a developer role to elevate their privilege to a maintainer on projects they import" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @justas_b for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39945.json b/2021/39xxx/CVE-2021-39945.json index 253d119dec0..75c7388a8c9 100644 --- a/2021/39xxx/CVE-2021-39945.json +++ b/2021/39xxx/CVE-2021-39945.json @@ -4,15 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-39945", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_value": ">=14.5, <14.5.2" + }, + { + "version_value": ">=14.4, <14.4.4" + }, + { + "version_value": ">=9.4, <14.3.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper access control in GitLab" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/331675", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/331675", + "refsource": "MISC" + }, + { + "name": "https://hackerone.com/reports/1198317", + "url": "https://hackerone.com/reports/1198317", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39945.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39945.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper access control in the GitLab CE/EE API affecting all versions starting from 9.4 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an author of a Merge Request to approve the Merge Request even after having their project access revoked" } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1", + "baseScore": 2.6, + "baseSeverity": "LOW" + } + }, + "credit": [ + { + "lang": "eng", + "value": "Thanks @muthu_prakash for reporting this vulnerability through our HackerOne bug bounty program" + } + ] } \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40007.json b/2021/40xxx/CVE-2021-40007.json index b794470f730..a4f969842aa 100644 --- a/2021/40xxx/CVE-2021-40007.json +++ b/2021/40xxx/CVE-2021-40007.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-40007", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "eCNS280_TD", + "version": { + "version_data": [ + { + "version_value": "V100R005C10SPC650" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211208-01-informationleak-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211208-01-informationleak-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is an information leak vulnerability in eCNS280_TD V100R005C10SPC650. The vulnerability is caused by improper log output management. An attacker with the ability to access the log file of device may lead to information disclosure." } ] } diff --git a/2021/40xxx/CVE-2021-40008.json b/2021/40xxx/CVE-2021-40008.json index 0b09ed95c3f..dbf734d5b90 100644 --- a/2021/40xxx/CVE-2021-40008.json +++ b/2021/40xxx/CVE-2021-40008.json @@ -4,14 +4,67 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-40008", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CloudEngine 12800;CloudEngine 5800;CloudEngine 6800;CloudEngine 7800", + "version": { + "version_data": [ + { + "version_value": "V200R019C00SPC800" + }, + { + "version_value": "V200R019C00SPC800" + }, + { + "version_value": "V200R019C00SPC800" + }, + { + "version_value": "V200R019C00SPC800" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Memory Leak" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211208-01-memleak-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211208-01-memleak-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a memory leak vulnerability in CloudEngine 12800 V200R019C00SPC800, CloudEngine 5800 V200R019C00SPC800, CloudEngine 6800 V200R019C00SPC800 and CloudEngine 7800 V200R019C00SPC800. The software does not sufficiently track and release allocated memory while parse a series of crafted binary messages, which could consume remaining memory. Successful exploit could cause memory exhaust." } ] } diff --git a/2021/41xxx/CVE-2021-41646.json b/2021/41xxx/CVE-2021-41646.json index 679bd06785f..d79e38e6c44 100644 --- a/2021/41xxx/CVE-2021-41646.json +++ b/2021/41xxx/CVE-2021-41646.json @@ -56,6 +56,11 @@ "url": "https://www.exploit-db.com/exploits/50319", "refsource": "MISC", "name": "https://www.exploit-db.com/exploits/50319" + }, + { + "refsource": "MISC", + "name": "https://www.nu11secur1ty.com/2021/12/cve-2021-41646.html", + "url": "https://www.nu11secur1ty.com/2021/12/cve-2021-41646.html" } ] } diff --git a/2021/42xxx/CVE-2021-42668.json b/2021/42xxx/CVE-2021-42668.json index 4b2390b858e..10d30e0a9b4 100644 --- a/2021/42xxx/CVE-2021-42668.json +++ b/2021/42xxx/CVE-2021-42668.json @@ -61,6 +61,16 @@ "refsource": "MISC", "name": "https://github.com/TheHackingRabbi/CVE-2021-42668", "url": "https://github.com/TheHackingRabbi/CVE-2021-42668" + }, + { + "refsource": "MISC", + "name": "https://www.nu11secur1ty.com/2021/12/cve-2021-42668.html", + "url": "https://www.nu11secur1ty.com/2021/12/cve-2021-42668.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42668", + "url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42668" } ] } diff --git a/2021/43xxx/CVE-2021-43983.json b/2021/43xxx/CVE-2021-43983.json index b804b2df4cc..9f07cb7b581 100644 --- a/2021/43xxx/CVE-2021-43983.json +++ b/2021/43xxx/CVE-2021-43983.json @@ -1,18 +1,95 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2021-12-09T22:34:00.000Z", "ID": "CVE-2021-43983", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "WECON LeviStudioU" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "LeviStudioU", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "All", + "version_value": "2019-09-21" + } + ] + } + } + ] + }, + "vendor_name": "WECON" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to multiple stack-based buffer overflow instances while parsing project files, which may allow an attacker to execute arbitrary code." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121 Stack-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-343-02", + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-343-02" + } + ] + }, + "source": { + "advisory": "ICSA-21-343-02", + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "eng", + "value": "WECON has not responded to requests to work with CISA to mitigate this vulnerability. Users of this affected product are invited to contact WECON technical support for additional information. CISA also recommends users take the following measures to protect themselves from social engineering attacks:" + } + ] } \ No newline at end of file diff --git a/2021/45xxx/CVE-2021-45033.json b/2021/45xxx/CVE-2021-45033.json new file mode 100644 index 00000000000..605952e275c --- /dev/null +++ b/2021/45xxx/CVE-2021-45033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-45033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/45xxx/CVE-2021-45034.json b/2021/45xxx/CVE-2021-45034.json new file mode 100644 index 00000000000..192836be710 --- /dev/null +++ b/2021/45xxx/CVE-2021-45034.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-45034", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file