mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
90 lines
2.9 KiB
JSON
90 lines
2.9 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2019-10174",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "[UNKNOWN]",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "infinispan",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "10.0.0.Final"
|
|
},
|
|
{
|
|
"version_value": "9.4.17.Final"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-470"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10174",
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10174",
|
|
"refsource": "CONFIRM"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0481",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0481"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2020:0727",
|
|
"url": "https://access.redhat.com/errata/RHSA-2020:0727"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://security.netapp.com/advisory/ntap-20220210-0018/",
|
|
"url": "https://security.netapp.com/advisory/ntap-20220210-0018/"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan's privileges. The attacker can use reflection to introduce new, malicious behavior into the application."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
[
|
|
{
|
|
"vectorString": "7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"version": "3.0"
|
|
}
|
|
]
|
|
]
|
|
}
|
|
} |