cvelist/2020/1xxx/CVE-2020-1760.json
2023-10-23 19:00:32 +00:00

108 lines
3.7 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-1760",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "[UNKNOWN]",
"product": {
"product_data": [
{
"product_name": "ceph",
"version": {
"version_data": [
{
"version_value": "15.2.1"
},
{
"version_value": "14.2.9"
},
{
"version_value": "13.2.9"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1760",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1760",
"refsource": "CONFIRM"
},
{
"url": "https://www.openwall.com/lists/oss-security/2020/04/07/1",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2020/04/07/1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-81b9c6cddc",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/"
},
{
"refsource": "UBUNTU",
"name": "USN-4528-1",
"url": "https://usn.ubuntu.com/4528-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-39",
"url": "https://security.gentoo.org/glsa/202105-39"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210810 [SECURITY] [DLA 2735-1] ceph security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.0"
}
]
]
}
}