From fa93ba645693e344facceef0bb91dc83ac8502af Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 27 Jul 2020 14:01:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/15xxx/CVE-2020-15592.json | 61 ++++++++- 2020/15xxx/CVE-2020-15593.json | 61 ++++++++- 2020/15xxx/CVE-2020-15955.json | 18 +++ 2020/4xxx/CVE-2020-4405.json | 180 ++++++++++++------------- 2020/4xxx/CVE-2020-4408.json | 180 ++++++++++++------------- 2020/4xxx/CVE-2020-4498.json | 234 ++++++++++++++++----------------- 6 files changed, 425 insertions(+), 309 deletions(-) create mode 100644 2020/15xxx/CVE-2020-15955.json diff --git a/2020/15xxx/CVE-2020-15592.json b/2020/15xxx/CVE-2020-15592.json index 7f8d7857ce0..dbc0833309b 100644 --- a/2020/15xxx/CVE-2020-15592.json +++ b/2020/15xxx/CVE-2020-15592.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-15592", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-15592", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SteelCentral Aternity Agent before 11.0.0.120 on Windows allows Privilege Escalation via a crafted file. It uses an executable running as a high privileged Windows service to perform administrative tasks and collect data from other processes. It distributes functionality among different processes and uses IPC (Inter-Process Communication) primitives to enable the processes to cooperate. The remotely callable methods from remotable objects available through interprocess communication allow loading of arbitrary plugins (i.e., C# assemblies) from the \"%PROGRAMFILES(X86)%/Aternity Information Systems/Assistant/plugins\u201d directory, where the name of the plugin is passed as part of an XML-serialized object. However, because the name of the DLL is concatenated with the \u201c.\\plugins\u201d string, a directory traversal vulnerability exists in the way plugins are resolved." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://aternity.force.com/customersuccess/s/article/Recorder-tool-security-notification-mitigation-steps-for-On-Prem", + "url": "https://aternity.force.com/customersuccess/s/article/Recorder-tool-security-notification-mitigation-steps-for-On-Prem" + }, + { + "refsource": "MISC", + "name": "https://sec-consult.com/en/blog/advisories/privilege-escalation-vulnerability-in-steelcentral-aternity-agent-cve-2020-15592-cve-2020-15593/", + "url": "https://sec-consult.com/en/blog/advisories/privilege-escalation-vulnerability-in-steelcentral-aternity-agent-cve-2020-15592-cve-2020-15593/" } ] } diff --git a/2020/15xxx/CVE-2020-15593.json b/2020/15xxx/CVE-2020-15593.json index f7eeed17372..1606b060f25 100644 --- a/2020/15xxx/CVE-2020-15593.json +++ b/2020/15xxx/CVE-2020-15593.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-15593", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-15593", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SteelCentral Aternity Agent 11.0.0.120 on Windows mishandles IPC. It uses an executable running as a high privileged Windows service to perform administrative tasks and collect data from other processes. It distributes functionality among different processes and uses IPC (Inter-Process Communication) primitives to enable the processes to cooperate. Any user in the system is allowed to access the interprocess communication channel AternityAgentAssistantIpc, retrieve a serialized object and call object methods remotely. Among others, the methods allow any user to: (1) Create and/or overwrite arbitrary XML files across the system; (2) Create arbitrary directories across the system; and (3) Load arbitrary plugins (i.e., C# assemblies) from the \"%PROGRAMFILES(X86)/Aternity Information Systems/Assistant/plugins\u201d directory and execute code contained in them." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://aternity.force.com/customersuccess/s/article/Recorder-tool-security-notification-mitigation-steps-for-On-Prem", + "url": "https://aternity.force.com/customersuccess/s/article/Recorder-tool-security-notification-mitigation-steps-for-On-Prem" + }, + { + "refsource": "MISC", + "name": "https://sec-consult.com/en/blog/advisories/privilege-escalation-vulnerability-in-steelcentral-aternity-agent-cve-2020-15592-cve-2020-15593/", + "url": "https://sec-consult.com/en/blog/advisories/privilege-escalation-vulnerability-in-steelcentral-aternity-agent-cve-2020-15592-cve-2020-15593/" } ] } diff --git a/2020/15xxx/CVE-2020-15955.json b/2020/15xxx/CVE-2020-15955.json new file mode 100644 index 00000000000..fbebe94f959 --- /dev/null +++ b/2020/15xxx/CVE-2020-15955.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-15955", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4405.json b/2020/4xxx/CVE-2020-4405.json index 51868ff6704..1850fb64751 100644 --- a/2020/4xxx/CVE-2020-4405.json +++ b/2020/4xxx/CVE-2020-4405.json @@ -1,93 +1,93 @@ { - "data_format" : "MITRE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6252479", - "title" : "IBM Security Bulletin 6252479 (Verify Gateway (IVG))", - "name" : "https://www.ibm.com/support/pages/node/6252479", - "refsource" : "CONFIRM" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/179484", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "name" : "ibm-ivg-cve20204405-info-disc (179484)" - } - ] - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2020-07-23T00:00:00", - "ID" : "CVE-2020-4405", - "ASSIGNER" : "psirt@us.ibm.com" - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - }, - "BM" : { - "S" : "U", - "AV" : "N", - "A" : "N", - "AC" : "H", - "SCORE" : "3.100", - "C" : "L", - "I" : "N", - "UI" : "N", - "PR" : "L" - } - } - }, - "description" : { - "description_data" : [ - { - "value" : "IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 could disclose potentially sensitive information to an authenticated user due to world readable log files. IBM X-Force ID: 179484.", - "lang" : "eng" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "1.0.0" - }, - { - "version_value" : "1.0.1" - } - ] - }, - "product_name" : "Verify Gateway (IVG)" - } - ] - } + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] } - ] - } - }, - "data_type" : "CVE", - "data_version" : "4.0" -} + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6252479", + "title": "IBM Security Bulletin 6252479 (Verify Gateway (IVG))", + "name": "https://www.ibm.com/support/pages/node/6252479", + "refsource": "CONFIRM" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/179484", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "name": "ibm-ivg-cve20204405-info-disc (179484)" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "DATE_PUBLIC": "2020-07-23T00:00:00", + "ID": "CVE-2020-4405", + "ASSIGNER": "psirt@us.ibm.com" + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + }, + "BM": { + "S": "U", + "AV": "N", + "A": "N", + "AC": "H", + "SCORE": "3.100", + "C": "L", + "I": "N", + "UI": "N", + "PR": "L" + } + } + }, + "description": { + "description_data": [ + { + "value": "IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 could disclose potentially sensitive information to an authenticated user due to world readable log files. IBM X-Force ID: 179484.", + "lang": "eng" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "1.0.0" + }, + { + "version_value": "1.0.1" + } + ] + }, + "product_name": "Verify Gateway (IVG)" + } + ] + } + } + ] + } + }, + "data_type": "CVE", + "data_version": "4.0" +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4408.json b/2020/4xxx/CVE-2020-4408.json index 08b4dcb46d5..d88508f8eb6 100644 --- a/2020/4xxx/CVE-2020-4408.json +++ b/2020/4xxx/CVE-2020-4408.json @@ -1,93 +1,93 @@ { - "data_type" : "CVE", - "data_version" : "4.0", - "impact" : { - "cvssv3" : { - "BM" : { - "AC" : "H", - "A" : "N", - "AV" : "P", - "S" : "U", - "PR" : "N", - "UI" : "N", - "I" : "N", - "C" : "H", - "SCORE" : "4.200" - }, - "TM" : { - "E" : "U", - "RL" : "O", - "RC" : "C" - } - } - }, - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 6252401 (Qradar Advisor)", - "url" : "https://www.ibm.com/support/pages/node/6252401", - "name" : "https://www.ibm.com/support/pages/node/6252401", - "refsource" : "CONFIRM" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/179536", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "name" : "ibm-qradar-cve20204408-info-disc (179536)" - } - ] - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2020-07-23T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-4408" - }, - "description" : { - "description_data" : [ - { - "value" : "The IBM QRadar Advisor 1.1 through 2.5.2 with Watson App for IBM QRadar SIEM does not adequately mask all passwords during input, which could be obtained by a physical attacker nearby. IBM X-Force ID: 179536.", - "lang" : "eng" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Qradar Advisor", - "version" : { - "version_data" : [ - { - "version_value" : "1.1" - }, - { - "version_value" : "2.5.2" - } - ] - } - } - ] - } + "data_type": "CVE", + "data_version": "4.0", + "impact": { + "cvssv3": { + "BM": { + "AC": "H", + "A": "N", + "AV": "P", + "S": "U", + "PR": "N", + "UI": "N", + "I": "N", + "C": "H", + "SCORE": "4.200" + }, + "TM": { + "E": "U", + "RL": "O", + "RC": "C" } - ] - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } + } + }, + "references": { + "reference_data": [ + { + "title": "IBM Security Bulletin 6252401 (Qradar Advisor)", + "url": "https://www.ibm.com/support/pages/node/6252401", + "name": "https://www.ibm.com/support/pages/node/6252401", + "refsource": "CONFIRM" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/179536", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "name": "ibm-qradar-cve20204408-info-disc (179536)" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "DATE_PUBLIC": "2020-07-23T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-4408" + }, + "description": { + "description_data": [ + { + "value": "The IBM QRadar Advisor 1.1 through 2.5.2 with Watson App for IBM QRadar SIEM does not adequately mask all passwords during input, which could be obtained by a physical attacker nearby. IBM X-Force ID: 179536.", + "lang": "eng" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Qradar Advisor", + "version": { + "version_data": [ + { + "version_value": "1.1" + }, + { + "version_value": "2.5.2" + } + ] + } + } + ] + } + } ] - } - ] - }, - "data_format" : "MITRE" -} + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2020/4xxx/CVE-2020-4498.json b/2020/4xxx/CVE-2020-4498.json index c8191048ec9..0af74d4a3e1 100644 --- a/2020/4xxx/CVE-2020-4498.json +++ b/2020/4xxx/CVE-2020-4498.json @@ -1,120 +1,120 @@ { - "data_format" : "MITRE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } - ] - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "RL" : "O", - "E" : "U" - }, - "BM" : { - "AC" : "H", - "AV" : "L", - "A" : "N", - "S" : "U", - "UI" : "N", - "PR" : "H", - "SCORE" : "4.100", - "I" : "N", - "C" : "H" - } - } - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2020-4498", - "DATE_PUBLIC" : "2020-07-23T00:00:00" - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6252409", - "title" : "IBM Security Bulletin 6252409 (MQ Appliance)", - "name" : "https://www.ibm.com/support/pages/node/6252409", - "refsource" : "CONFIRM" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/182118", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-mq-cve20204498-info-disc (182118)", - "refsource" : "XF" - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM MQ Appliance 9.1 LTS and 9.1 CD could allow a local privileged user to obtain highly sensitve information due to inclusion of data within trace files. IBM X-Force ID: 182118." - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "9.1.0.0" - }, - { - "version_value" : "9.1.0.1" - }, - { - "version_value" : "9.1.1" - }, - { - "version_value" : "9.1.0.2" - }, - { - "version_value" : "9.1.2" - }, - { - "version_value" : "9.1.0.3" - }, - { - "version_value" : "9.1.3" - }, - { - "version_value" : "9.1.0.4" - }, - { - "version_value" : "9.1.4" - }, - { - "version_value" : "9.1.0.5" - }, - { - "version_value" : "9.1.5" - } - ] - }, - "product_name" : "MQ Appliance" - } - ] - }, - "vendor_name" : "IBM" + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] } - ] - } - }, - "data_type" : "CVE", - "data_version" : "4.0" -} + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "RL": "O", + "E": "U" + }, + "BM": { + "AC": "H", + "AV": "L", + "A": "N", + "S": "U", + "UI": "N", + "PR": "H", + "SCORE": "4.100", + "I": "N", + "C": "H" + } + } + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2020-4498", + "DATE_PUBLIC": "2020-07-23T00:00:00" + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6252409", + "title": "IBM Security Bulletin 6252409 (MQ Appliance)", + "name": "https://www.ibm.com/support/pages/node/6252409", + "refsource": "CONFIRM" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/182118", + "title": "X-Force Vulnerability Report", + "name": "ibm-mq-cve20204498-info-disc (182118)", + "refsource": "XF" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM MQ Appliance 9.1 LTS and 9.1 CD could allow a local privileged user to obtain highly sensitve information due to inclusion of data within trace files. IBM X-Force ID: 182118." + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "9.1.0.0" + }, + { + "version_value": "9.1.0.1" + }, + { + "version_value": "9.1.1" + }, + { + "version_value": "9.1.0.2" + }, + { + "version_value": "9.1.2" + }, + { + "version_value": "9.1.0.3" + }, + { + "version_value": "9.1.3" + }, + { + "version_value": "9.1.0.4" + }, + { + "version_value": "9.1.4" + }, + { + "version_value": "9.1.0.5" + }, + { + "version_value": "9.1.5" + } + ] + }, + "product_name": "MQ Appliance" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "data_type": "CVE", + "data_version": "4.0" +} \ No newline at end of file