2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-15150" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2020-09-01T17:15:11.840" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T05:04:56.983" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "There is a vulnerability in Paginator (Elixir/Hex package) which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the paginate() function. This will potentially affect all current users of Paginator prior to version 1.0.0. The vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version >=1.5."
} ,
{
"lang" : "es" ,
"value" : "Se presenta una vulnerabilidad en Paginator (paquete Elixir/Hex) que lo hace susceptible a ataques de Ejecuci\u00f3n de C\u00f3digo Remota (RCE) por medio de par\u00e1metros de entrada a la funci\u00f3n paginate(). Esto afectar\u00e1 potencialmente a todos los usuarios actuales de Paginator versiones anteriores a 1.0.0. La vulnerabilidad ha sido parcheada en la versi\u00f3n 1.0.0 y todos los usuarios deben actualizar a esta versi\u00f3n de inmediato. Tome en cuenta que esta versi\u00f3n parcheada usa una dependencia que requiere una versi\u00f3n de Elixir posterior a 1.5 incluy\u00e9ndola"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-11-23 13:10:58 +00:00
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-11-23 13:10:58 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" ,
"baseScore" : 9.0 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
2024-11-23 13:10:58 +00:00
"attackComplexity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2024-11-23 13:10:58 +00:00
"scope" : "CHANGED" ,
2023-04-24 12:24:31 +02:00
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-11-23 13:10:58 +00:00
"exploitabilityScore" : 2.2 ,
"impactScore" : 6.0
2023-04-24 12:24:31 +02:00
} ,
{
2024-11-23 13:10:58 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-11-23 13:10:58 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
2024-11-23 13:10:58 +00:00
"attackComplexity" : "LOW" ,
2023-04-24 12:24:31 +02:00
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2024-11-23 13:10:58 +00:00
"scope" : "UNCHANGED" ,
2023-04-24 12:24:31 +02:00
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-11-23 13:10:58 +00:00
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
2023-04-24 12:24:31 +02:00
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-94"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:duffel:paginator:*:*:*:*:*:elixir:*:*" ,
"versionEndExcluding" : "1.0.0" ,
"matchCriteriaId" : "533F934A-92A9-4407-9EBF-519DDCD86EB1"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://github.com/duffelhq/paginator/blob/ccf0f37fa96347cc8c8a7e9eb2c64462cec4b2dc/README.md#security-considerations" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://hex.pm/packages/paginator" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Product"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "https://github.com/duffelhq/paginator/blob/ccf0f37fa96347cc8c8a7e9eb2c64462cec4b2dc/README.md#security-considerations" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://hex.pm/packages/paginator" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Product"
]
2023-04-24 12:24:31 +02:00
}
]
}