mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
80 lines
3.0 KiB
JSON
80 lines
3.0 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2019-6679",
|
|
"ASSIGNER": "f5sirt@f5.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "F5",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "BIG-IP",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "15.0.0-15.0.1"
|
|
},
|
|
{
|
|
"version_value": "14.1.0.2-14.1.2.2"
|
|
},
|
|
{
|
|
"version_value": "14.0.0.5-14.0.1"
|
|
},
|
|
{
|
|
"version_value": "13.1.1.5-13.1.3.1"
|
|
},
|
|
{
|
|
"version_value": "12.1.4.1-12.1.5"
|
|
},
|
|
{
|
|
"version_value": "11.6.4-11.6.5"
|
|
},
|
|
{
|
|
"version_value": "11.5.9-11.5.10"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "DoS"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://support.f5.com/csp/article/K54336216",
|
|
"url": "https://support.f5.com/csp/article/K54336216"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "On BIG-IP versions 15.0.0-15.0.1, 14.1.0.2-14.1.2.2, 14.0.0.5-14.0.1, 13.1.1.5-13.1.3.1, 12.1.4.1-12.1.5, 11.6.4-11.6.5, and 11.5.9-11.5.10, the access controls implemented by scp.whitelist and scp.blacklist are not properly enforced for paths that are symlinks. This allows authenticated users with SCP access to overwrite certain configuration files that would otherwise be restricted."
|
|
}
|
|
]
|
|
}
|
|
} |