mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
109 lines
4.0 KiB
JSON
109 lines
4.0 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"ID": "CVE-2021-21372",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Nimble arbitrary code execution for specially crafted package metadata"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "security",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "< 1.2.10"
|
|
},
|
|
{
|
|
"version_value": ">= 1.4.0, < 1.4.4"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "nim-lang"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Nimble is a package manager for the Nim programming language. In Nim release version before versions 1.2.10 and 1.4.4, Nimble doCmd is used in different places and can be leveraged to execute arbitrary commands. An attacker can craft a malicious entry in the packages.json package list to trigger code execution."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.3,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-20 Improper Input Validation"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/",
|
|
"refsource": "MISC",
|
|
"url": "https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/"
|
|
},
|
|
{
|
|
"name": "https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p"
|
|
},
|
|
{
|
|
"name": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130"
|
|
},
|
|
{
|
|
"name": "https://github.com/nim-lang/nimble/commit/7bd63d504a4157b8ed61a51af47fb086ee818c37",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/nim-lang/nimble/commit/7bd63d504a4157b8ed61a51af47fb086ee818c37"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-rg9f-w24h-962p",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |