mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
98 lines
3.7 KiB
JSON
98 lines
3.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"ID": "CVE-2020-15150",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Remote Code Execution in paginator(hex)"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "paginator",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "< 1.0.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "duffelhq"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "There is a vulnerability in Paginator (Elixir/Hex package) which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the paginate() function. This will potentially affect all current users of Paginator prior to version 1.0.0. The vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version >=1.5."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9,
|
|
"baseSeverity": "CRITICAL",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "{\"CWE-94\":\"Improper Control of Generation of Code ('Code Injection')\"}"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj"
|
|
},
|
|
{
|
|
"name": "https://hex.pm/packages/paginator",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://hex.pm/packages/paginator"
|
|
},
|
|
{
|
|
"name": "https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8"
|
|
},
|
|
{
|
|
"name": "https://github.com/duffelhq/paginator/blob/ccf0f37fa96347cc8c8a7e9eb2c64462cec4b2dc/README.md#security-considerations",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/duffelhq/paginator/blob/ccf0f37fa96347cc8c8a7e9eb2c64462cec4b2dc/README.md#security-considerations"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-w98m-2xqg-9cvj",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |