add CVE-2020-15129 for GHSA-6qq8-5wq3-86rp

This commit is contained in:
Robert Schultheis 2020-07-30 09:18:08 -06:00
parent e5a9b5b33b
commit f4faa05c0a
No known key found for this signature in database
GPG Key ID: 348C4211B4D8BB40

View File

@ -1,18 +1,111 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-15129",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Open redirect in Traefik"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "traefik",
"version": {
"version_data": [
{
"version_value": "< 1.7.26"
},
{
"version_value": ">= 2.0.0, < 2.2.8"
}
]
}
}
]
},
"vendor_name": "containous"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the \"X-Forwarded-Prefix\" header. The Traefik API dashboard component doesn't validate that the value of the header \"X-Forwarded-Prefix\" is a site relative path and will redirect to any header provided URI. Successful exploitation of an open redirect can be used to entice victims to disclose sensitive information.\n\nActive Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios.\n\n"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/containous/traefik/security/advisories/GHSA-6qq8-5wq3-86rp",
"refsource": "CONFIRM",
"url": "https://github.com/containous/traefik/security/advisories/GHSA-6qq8-5wq3-86rp"
},
{
"name": "https://github.com/containous/traefik/releases/tag/v1.7.26",
"refsource": "MISC",
"url": "https://github.com/containous/traefik/releases/tag/v1.7.26"
},
{
"name": "https://github.com/containous/traefik/releases/tag/v2.2.8",
"refsource": "MISC",
"url": "https://github.com/containous/traefik/releases/tag/v2.2.8"
},
{
"name": "https://github.com/containous/traefik/releases/tag/v2.3.0-rc3",
"refsource": "MISC",
"url": "https://github.com/containous/traefik/releases/tag/v2.3.0-rc3"
},
{
"name": "https://github.com/containous/traefik/pull/7109",
"refsource": "MISC",
"url": "https://github.com/containous/traefik/pull/7109"
},
{
"name": "https://github.com/containous/traefik/commit/e63db782c11c7b8bfce30be4c902e7ef8f9f33d2",
"refsource": "MISC",
"url": "https://github.com/containous/traefik/commit/e63db782c11c7b8bfce30be4c902e7ef8f9f33d2"
}
]
},
"source": {
"advisory": "GHSA-6qq8-5wq3-86rp",
"discovery": "UNKNOWN"
}
}