From ef5e24e7b49332d935e55da33d3865f5f5a72c4b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 7 Sep 2022 13:46:13 +0000 Subject: [PATCH] Add CVE-2022-31149 for GHSA-v9fg-6g9j-h4x4 Add CVE-2022-31149 for GHSA-v9fg-6g9j-h4x4 --- 2022/31xxx/CVE-2022-31149.json | 87 +++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-) diff --git a/2022/31xxx/CVE-2022-31149.json b/2022/31xxx/CVE-2022-31149.json index d9ea3b9137b..c8b67379e32 100644 --- a/2022/31xxx/CVE-2022-31149.json +++ b/2022/31xxx/CVE-2022-31149.json @@ -1,18 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31149", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "ActivityWatch vulnerable to DNS rebinding attack" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "activitywatch", + "version": { + "version_data": [ + { + "version_value": "< 0.12.0b2" + } + ] + } + } + ] + }, + "vendor_name": "ActivityWatch" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ActivityWatch open-source automated time tracker. Versions prior to 0.12.0b2 are vulnerable to DNS rebinding attacks. This vulnerability impacts everyone running ActivityWatch and gives the attacker full access to the ActivityWatch REST API. Users should upgrade to v0.12.0b2 or later to receive a patch. As a workaround, block DNS lookups that resolve to 127.0.0.1." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-290: Authentication Bypass by Spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/ActivityWatch/activitywatch/security/advisories/GHSA-v9fg-6g9j-h4x4", + "refsource": "CONFIRM", + "url": "https://github.com/ActivityWatch/activitywatch/security/advisories/GHSA-v9fg-6g9j-h4x4" + }, + { + "name": "https://gist.github.com/zozs/fdebbce75fc8538c15851b46db944a16", + "refsource": "MISC", + "url": "https://gist.github.com/zozs/fdebbce75fc8538c15851b46db944a16" + }, + { + "name": "https://github.com/ActivityWatch/activitywatch/discussions/778", + "refsource": "MISC", + "url": "https://github.com/ActivityWatch/activitywatch/discussions/778" + } + ] + }, + "source": { + "advisory": "GHSA-v9fg-6g9j-h4x4", + "discovery": "UNKNOWN" } } \ No newline at end of file