cvelist/2020/15xxx/CVE-2020-15230.json
2020-10-02 19:01:54 +00:00

93 lines
3.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-15230",
"STATE": "PUBLIC",
"TITLE": "Arbitrary file read un Vapor"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "vapor",
"version": {
"version_data": [
{
"version_value": "< 4.29.4"
}
]
}
}
]
},
"vendor_name": "vapor"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vapor is a web framework for Swift. In Vapor before version 4.29.4, Attackers can access data at arbitrary filesystem paths on the same host as an application. Only applications using FileMiddleware are affected. This is fixed in version 4.29.4."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "{\"CWE-22\":\"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\"}"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/vapor/vapor/security/advisories/GHSA-vcvg-xgr8-p5gq",
"refsource": "CONFIRM",
"url": "https://github.com/vapor/vapor/security/advisories/GHSA-vcvg-xgr8-p5gq"
},
{
"name": "https://github.com/vapor/vapor/pull/2500",
"refsource": "MISC",
"url": "https://github.com/vapor/vapor/pull/2500"
},
{
"name": "https://github.com/vapor/vapor/commit/cf1651f7ff76515593f4d8ca6e6e15d2247fe255",
"refsource": "MISC",
"url": "https://github.com/vapor/vapor/commit/cf1651f7ff76515593f4d8ca6e6e15d2247fe255"
}
]
},
"source": {
"advisory": "GHSA-vcvg-xgr8-p5gq",
"discovery": "UNKNOWN"
}
}