CVE-2019-10137

This commit is contained in:
mrehak@redhat.com 2019-07-01 16:23:26 +02:00
parent 712a53b093
commit fe2c57aa11
No known key found for this signature in database
GPG Key ID: 61C2AB3CDC29106F

View File

@ -4,15 +4,68 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10137",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "mrehak@redhat.com"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "spacewalkproject",
"product": {
"product_data": [
{
"product_name": "spacewalk-proxy",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10137",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10137",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A path traversal flaw was found in spacewalk-proxy in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to the proxy's filesystem, or can execute arbitrary code in the context of the httpd process."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
]
}
}
}