From f3e84b0010be12b5dedec0648781a6d27d349c2f Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Fri, 24 Jan 2020 13:51:41 -0700 Subject: [PATCH] add CVE-2020-5225 for GHSA-6gc6-m364-85ww --- 2020/5xxx/CVE-2020-5225.json | 84 +++++++++++++++++++++++++++++++++--- 1 file changed, 77 insertions(+), 7 deletions(-) diff --git a/2020/5xxx/CVE-2020-5225.json b/2020/5xxx/CVE-2020-5225.json index 9e2e2234e05..84d1d7aad7f 100644 --- a/2020/5xxx/CVE-2020-5225.json +++ b/2020/5xxx/CVE-2020-5225.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-5225", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Log injection in SimpleSAMLphp" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SimpleSAMLphp", + "version": { + "version_data": [ + { + "version_value": "< 1.18.4" + } + ] + } + } + ] + }, + "vendor_name": "simplesamlphp" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Log injection in SimpleSAMLphp before version 1.18.4.\n\nThe www/erroreport.php script, which receives error reports and sends them via email to the system administrator, did not properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID.\n\nWhen configured to use the file logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the reportID parameter received in a request sent to www/errorreport.php was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-532: Inclusion of Sensitive Information in Log Files" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-6gc6-m364-85ww", + "refsource": "CONFIRM", + "url": "https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-6gc6-m364-85ww" + }, + { + "name": "https://simplesamlphp.org/security/202001-02", + "refsource": "MISC", + "url": "https://simplesamlphp.org/security/202001-02" + } + ] + }, + "source": { + "advisory": "GHSA-6gc6-m364-85ww", + "discovery": "UNKNOWN" } -} \ No newline at end of file +}