mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
162 lines
6.7 KiB
JSON
162 lines
6.7 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-25499",
|
|
"ASSIGNER": "security@vaadin.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "When adding non-visible components to the UI in server side, content is sent to the browser in Vaadin 10.0.0 through 10.0.22, 11.0.0 through 14.10.0, 15.0.0 through 22.0.28, 23.0.0 through 23.3.12, 24.0.0 through 24.0.5 and 24.1.0.alpha1 to 24.1.0.beta1, resulting in potential information disclosure.\n\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
|
|
"cweId": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "vaadin",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "vaadin",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "10.0.0",
|
|
"version_value": "10.0.22"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "11.0.0",
|
|
"version_value": "14.10.0"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "15.0.0",
|
|
"version_value": "22.0.28"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "23.0.0",
|
|
"version_value": "23.3.12"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "24.0.0",
|
|
"version_value": "24.0.5"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "24.1.0.alpha1",
|
|
"version_value": "24.1.0.beta1"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "flow-server",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "1.0.0",
|
|
"version_value": "24.0.0.beta1"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "1.1.0",
|
|
"version_value": "2.8.9"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "3.3.0",
|
|
"version_value": "9.1.0"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "23.0.0",
|
|
"version_value": "23.3.10"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "24.0.0",
|
|
"version_value": "24.0.7"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "24.1.0.alpha1",
|
|
"version_value": "24.1.0.beta1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://vaadin.com/security/CVE-2023-25499",
|
|
"refsource": "MISC",
|
|
"name": "https://vaadin.com/security/CVE-2023-25499"
|
|
},
|
|
{
|
|
"url": "https://github.com/vaadin/flow/pull/15885",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/vaadin/flow/pull/15885"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Kim Lepp\u00e4nen"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.7,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |