cvelist/2021/20xxx/CVE-2021-20672.json
2021-03-10 10:00:45 +00:00

67 lines
2.2 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20672",
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI (v4.2 Series)",
"version": {
"version_data": [
{
"version_value": "versions from v4.2.0 to v4.2.7"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/",
"refsource": "MISC",
"name": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/"
},
{
"url": "https://jvn.jp/en/jp/JVN86438134/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN86438134/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Reflected cross-site scripting vulnerability due to insufficient verification of URL query parameters in GROWI (v4.2 Series) versions from v4.2.0 to v4.2.7 allows remote attackers to inject an arbitrary script via unspecified vectors."
}
]
}
}