From f99f84327b090970970e1da10176e055c28453e2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 14 May 2021 22:00:42 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/22xxx/CVE-2021-22866.json | 150 +++++++++++++++++---------------- 2021/33xxx/CVE-2021-33030.json | 18 ++++ 2021/33xxx/CVE-2021-33031.json | 18 ++++ 2021/33xxx/CVE-2021-33032.json | 18 ++++ 4 files changed, 130 insertions(+), 74 deletions(-) create mode 100644 2021/33xxx/CVE-2021-33030.json create mode 100644 2021/33xxx/CVE-2021-33031.json create mode 100644 2021/33xxx/CVE-2021-33032.json diff --git a/2021/22xxx/CVE-2021-22866.json b/2021/22xxx/CVE-2021-22866.json index 7d03823b691..94680f89016 100644 --- a/2021/22xxx/CVE-2021-22866.json +++ b/2021/22xxx/CVE-2021-22866.json @@ -1,82 +1,84 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-cna@github.com", - "ID": "CVE-2021-22866", - "STATE": "PUBLIC", - "TITLE": "UI misrepresentation of granted permissions in GitHub Enterprise Server leading to unauthorized access to user resources" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "GitHub Enterprise Server", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "3.0", - "version_value": "3.0.7" + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2021-22866", + "STATE": "PUBLIC", + "TITLE": "UI misrepresentation of granted permissions in GitHub Enterprise Server leading to unauthorized access to user resources" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.0", + "version_value": "3.0.7" + }, + { + "version_affected": "<", + "version_name": "2.22", + "version_value": "2.22.13" + } + ] + } + } + ] }, - { - "version_affected": "<", - "version_name": "2.22", - "version_value": "2.22.13" - } - ] + "vendor_name": "GitHub" } - } ] - }, - "vendor_name": "GitHub" } - ] - } - }, - "credit": [ - { - "lang": "eng", - "value": "Vaibhav Singh (vaib25vicky)" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. All permissions being granted would properly be shown during the first authorization, but in certain circumstances, if the user revisits the authorization flow after the GitHub App has configured additional user-level permissions, those additional permissions may not be shown, leading to more permissions being granted than the user potentially intended. This vulnerability affected GitHub Enterprise Server 3.0.x prior to 3.0.7 and 2.22.x prior to 2.22.13. It was fixed in versions 3.0.7 and 2.22.13. This vulnerability was reported via the GitHub Bug Bounty program." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { + }, + "credit": [ + { "lang": "eng", - "value": "CWE-451: User Interface (UI) Misrepresentation of Critical Information" - } + "value": "Vaibhav Singh (vaib25vicky)" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. All permissions being granted would properly be shown during the first authorization, but in certain circumstances, if the user revisits the authorization flow after the GitHub App has configured additional user-level permissions, those additional permissions may not be shown, leading to more permissions being granted than the user potentially intended. This vulnerability affected GitHub Enterprise Server 3.0.x prior to 3.0.7 and 2.22.x prior to 2.22.13. It was fixed in versions 3.0.7 and 2.22.13. This vulnerability was reported via the GitHub Bug Bounty program." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.7" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.13" - } - ] - }, - "source": { - "discovery": "EXTERNAL" - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-451: User Interface (UI) Misrepresentation of Critical Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.7", + "name": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.7" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.13", + "name": "https://docs.github.com/en/enterprise-server@2.22/admin/release-notes#2.22.13" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33030.json b/2021/33xxx/CVE-2021-33030.json new file mode 100644 index 00000000000..3ba2dfb994b --- /dev/null +++ b/2021/33xxx/CVE-2021-33030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33031.json b/2021/33xxx/CVE-2021-33031.json new file mode 100644 index 00000000000..1672b91b735 --- /dev/null +++ b/2021/33xxx/CVE-2021-33031.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33031", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33032.json b/2021/33xxx/CVE-2021-33032.json new file mode 100644 index 00000000000..10d8cb8160a --- /dev/null +++ b/2021/33xxx/CVE-2021-33032.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33032", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file