Add CVE-2022-31149 for GHSA-v9fg-6g9j-h4x4

Add CVE-2022-31149 for GHSA-v9fg-6g9j-h4x4
This commit is contained in:
advisory-database[bot] 2022-09-07 13:46:13 +00:00 committed by GitHub
parent c9cda001b7
commit ef5e24e7b4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,18 +1,93 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-31149",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "ActivityWatch vulnerable to DNS rebinding attack"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "activitywatch",
"version": {
"version_data": [
{
"version_value": "< 0.12.0b2"
}
]
}
}
]
},
"vendor_name": "ActivityWatch"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "ActivityWatch open-source automated time tracker. Versions prior to 0.12.0b2 are vulnerable to DNS rebinding attacks. This vulnerability impacts everyone running ActivityWatch and gives the attacker full access to the ActivityWatch REST API. Users should upgrade to v0.12.0b2 or later to receive a patch. As a workaround, block DNS lookups that resolve to 127.0.0.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-290: Authentication Bypass by Spoofing"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/ActivityWatch/activitywatch/security/advisories/GHSA-v9fg-6g9j-h4x4",
"refsource": "CONFIRM",
"url": "https://github.com/ActivityWatch/activitywatch/security/advisories/GHSA-v9fg-6g9j-h4x4"
},
{
"name": "https://gist.github.com/zozs/fdebbce75fc8538c15851b46db944a16",
"refsource": "MISC",
"url": "https://gist.github.com/zozs/fdebbce75fc8538c15851b46db944a16"
},
{
"name": "https://github.com/ActivityWatch/activitywatch/discussions/778",
"refsource": "MISC",
"url": "https://github.com/ActivityWatch/activitywatch/discussions/778"
}
]
},
"source": {
"advisory": "GHSA-v9fg-6g9j-h4x4",
"discovery": "UNKNOWN"
}
}