Auto-Update: 2024-02-07T17:00:54.586642+00:00

This commit is contained in:
cad-safe-bot 2024-02-07 17:00:58 +00:00
parent 02df7a606e
commit 65b4291df5
14 changed files with 867 additions and 62 deletions

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-31005",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-03T01:15:08.283",
"lastModified": "2024-02-05T02:09:43.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-07T16:04:27.170",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a local user to escalate their privileges due to an improper security configuration. IBM X-Force ID: 254767."
},
{
"lang": "es",
"value": "IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 a 10.0.6.1 e IBM Security Verify Access Docker 10.0.0.0 a 10.0.6.1) podr\u00eda permitir a un usuario local escalar sus privilegios debido a una configuraci\u00f3n de seguridad incorrecta. ID de IBM X-Force: 254767."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -46,14 +70,48 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0.0",
"versionEndIncluding": "10.0.6.1",
"matchCriteriaId": "A9EE363F-9A8F-4B2C-9769-6D5CB216CA2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_access_docker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0.0",
"versionEndIncluding": "10.0.6.1",
"matchCriteriaId": "269E635A-02F3-402A-A5E0-2058658BE5A5"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/254767",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7106586",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-31006",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-03T01:15:08.467",
"lastModified": "2024-02-05T02:09:43.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-07T16:39:47.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) is vulnerable to a denial of service attacks on the DSC server. IBM X-Force ID: 254776."
},
{
"lang": "es",
"value": "IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 a 10.0.6.1 e IBM Security Verify Access Docker 10.0.0.0 a 10.0.6.1) es vulnerable a ataques de denegaci\u00f3n de servicio en el servidor DSC. ID de IBM X-Force: 254776."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -36,8 +60,18 @@
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +80,48 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0.0",
"versionEndIncluding": "10.0.6.1",
"matchCriteriaId": "A9EE363F-9A8F-4B2C-9769-6D5CB216CA2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_access_docker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0.0",
"versionEndIncluding": "10.0.6.1",
"matchCriteriaId": "269E635A-02F3-402A-A5E0-2058658BE5A5"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/254776",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7106586",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-32327",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-03T01:15:08.653",
"lastModified": "2024-02-05T02:09:43.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-07T16:16:58.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 254783."
},
{
"lang": "es",
"value": "IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 a 10.0.6.1 e IBM Security Verify Access Docker 10.0.0.0 a 10.0.6.1) es vulnerable a un ataque de inyecci\u00f3n de entidad externa XML (XXE) al procesar datos XML. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad para exponer informaci\u00f3n confidencial o consumir recursos de memoria. ID de IBM X-Force: 254783."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -46,14 +70,48 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0.0",
"versionEndIncluding": "10.0.6.1",
"matchCriteriaId": "A9EE363F-9A8F-4B2C-9769-6D5CB216CA2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_access_docker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0.0",
"versionEndIncluding": "10.0.6.1",
"matchCriteriaId": "269E635A-02F3-402A-A5E0-2058658BE5A5"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/254783",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7106586",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7069",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-01T04:15:49.780",
"lastModified": "2024-02-05T19:15:08.487",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-07T16:28:40.250",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -38,14 +58,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tinywebgallery:advanced_iframe:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2024.0",
"matchCriteriaId": "AC775F37-6749-489F-8C20-71F2F57E0C5E"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3027702%40advanced-iframe&new=3027702%40advanced-iframe&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e32c51d-2d96-4545-956f-64f65c54b33b?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-22012",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-02-07T16:15:47.687",
"lastModified": "2024-02-07T16:15:47.687",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In TBD of TBD, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-02-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-23108",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-02-05T14:15:57.827",
"lastModified": "2024-02-05T18:25:58.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-07T15:02:00.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via\u00a0crafted API requests."
},
{
"lang": "es",
"value": "Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiSIEM versi\u00f3n 7.1.0 a 7.1.1 y 7.0.0 a 7.0.2 y 6.7.0 a 6.7.8 y 6.6.0 a trav\u00e9s 6.6.3 y 6.5.0 a 6.5.2 y 6.4.0 a 6.4.2 permiten al atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes API manipuladas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -46,10 +70,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndIncluding": "6.4.2",
"matchCriteriaId": "23FA8F49-E85A-402F-91CF-293EF5C60B29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5.0",
"versionEndIncluding": "6.5.2",
"matchCriteriaId": "CE42081E-AF1E-4FEB-9570-324A7FB8A9A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.0",
"versionEndIncluding": "6.6.3",
"matchCriteriaId": "EB301503-0ECB-4D21-B341-ACF0F302CF85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndIncluding": "6.7.8",
"matchCriteriaId": "71C5093F-7D96-46B5-8DF7-068877E71F67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.2",
"matchCriteriaId": "AFE7DE50-FC7B-4F64-8324-F6BF302B4667"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C9E32B0-8C95-40D7-B31F-54626D1F7AFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0016873D-3247-4B9A-9519-46C88EEBB3BF"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-130",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-23109",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-02-05T14:15:59.100",
"lastModified": "2024-02-05T18:25:58.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-07T15:04:28.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via\u00a0crafted API requests."
},
{
"lang": "es",
"value": "Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiSIEM versi\u00f3n 7.1.0 a 7.1.1 y 7.0.0 a 7.0.2 y 6.7.0 a 6.7.8 y 6.6.0 a trav\u00e9s 6.6.3 y 6.5.0 a 6.5.2 y 6.4.0 a 6.4.2 permiten al atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes API manipuladas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -46,10 +80,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndIncluding": "6.4.2",
"matchCriteriaId": "23FA8F49-E85A-402F-91CF-293EF5C60B29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5.0",
"versionEndIncluding": "6.5.2",
"matchCriteriaId": "CE42081E-AF1E-4FEB-9570-324A7FB8A9A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.0",
"versionEndIncluding": "6.6.3",
"matchCriteriaId": "EB301503-0ECB-4D21-B341-ACF0F302CF85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndIncluding": "6.7.8",
"matchCriteriaId": "71C5093F-7D96-46B5-8DF7-068877E71F67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.2",
"matchCriteriaId": "AFE7DE50-FC7B-4F64-8324-F6BF302B4667"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C9E32B0-8C95-40D7-B31F-54626D1F7AFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0016873D-3247-4B9A-9519-46C88EEBB3BF"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-130",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,79 @@
{
"id": "CVE-2024-24771",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-07T15:15:08.283",
"lastModified": "2024-02-07T15:15:08.283",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Open Forms allows users create and publish smart forms. Versions prior to 2.2.9, 2.3.7, 2.4.5, and 2.5.2 contain a non-exploitable multi-factor authentication weakness. Superusers who have their credentials (username + password) compromised could potentially have the second-factor authentication bypassed if an attacker somehow managed to authenticate to Open Forms. The maintainers of Open Forms do not believe it is or has been possible to perform this login. However, if this were possible, the victim's account may be abused to view (potentially sensitive) submission data or have been used to impersonate other staff accounts to view and/or modify data. Three mitigating factors to help prevent exploitation include: the usual login page (at `/admin/login/`) does not fully log in the user until the second factor was succesfully provided; the additional non-MFA protected login page at `/api/v2/api-authlogin/` was misconfigured and could not be used to log in; and there are no additional ways to log in. This also requires credentials of a superuser to be compromised to be exploitable. Versions 2.2.9, 2.3.7, 2.4.5, and 2.5.2 contain the following patches to address these weaknesses: Move and only enable the API auth endpoints (`/api/v2/api-auth/login/`) with `settings.DEBUG = True`. `settings.DEBUG = True` is insecure and should never be applied in production settings. Additionally, apply a custom permission check to the hijack flow to only allow second-factor-verified superusers to perform user hijacking."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-654"
}
]
}
],
"references": [
{
"url": "https://github.com/open-formulieren/open-forms/releases/tag/2.2.9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-formulieren/open-forms/releases/tag/2.3.7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-formulieren/open-forms/releases/tag/2.4.5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-formulieren/open-forms/releases/tag/2.5.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-formulieren/open-forms/security/advisories/GHSA-64r3-x3gf-vp63",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-24811",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-07T15:15:08.507",
"lastModified": "2024-02-07T15:15:08.507",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQLAlchemyDA is a generic database adapter for ZSQL methods. A vulnerability found in versions prior to 2.2 allows unauthenticated execution of arbitrary SQL statements on the database to which the SQLAlchemyDA instance is connected. All users are affected. The problem has been patched in version 2.2. There is no workaround for the problem."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/zopefoundation/Products.SQLAlchemyDA/commit/e682b99f8406f20bc3f0f2c77153ed7345fd215a",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zopefoundation/Products.SQLAlchemyDA/security/advisories/GHSA-r3jc-3qmm-w3pw",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-24812",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-07T15:15:08.703",
"lastModified": "2024-02-07T15:15:08.703",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and a tightly integrated client side library. Prior to versions 14.59.0 and 15.5.0, portal pages are susceptible to Cross-Site Scripting (XSS) which can be used to inject malicious JS code if user clicks on a malicious link. This vulnerability has been patched in versions 14.59.0 and 15.5.0. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://github.com/frappe/frappe/releases/tag/v14.59.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/frappe/frappe/releases/tag/v15.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/frappe/frappe/security/advisories/GHSA-7p3m-h76m-hg9v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-24815",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-07T16:15:47.753",
"lastModified": "2024-02-07T16:15:47.753",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability has been discovered in the core HTML parsing module in versions of CKEditor4 prior to 4.24.0-lts. It may affect all editor instances that enabled full-page editing mode or enabled CDATA elements in Advanced Content Filtering configuration (defaults to `script` and `style` elements). The vulnerability allows attackers to inject malformed HTML content bypassing Advanced Content Filtering mechanism, which could result in executing JavaScript code. An attacker could abuse faulty CDATA content detection and use it to prepare an intentional attack on the editor. A fix is available in version 4.24.0-lts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://ckeditor.com/docs/ckeditor4/latest/api/CKEDITOR_dtd.html#property-S-cdata",
"source": "security-advisories@github.com"
},
{
"url": "https://ckeditor.com/docs/ckeditor4/latest/features/fullpage.html)",
"source": "security-advisories@github.com"
},
{
"url": "https://ckeditor.com/docs/ckeditor4/latest/guide/dev_advanced_content_filter.html",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ckeditor/ckeditor4/commit/8ed1a3c93d0ae5f49f4ecff5738ab8a2972194cb",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-fq6h-4g8v-qqvm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25143",
"sourceIdentifier": "security@liferay.com",
"published": "2024-02-07T15:15:08.907",
"lastModified": "2024-02-07T15:15:08.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Document and Media widget In Liferay Portal 7.2.0 through 7.3.6, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 13, and older unsupported versions, does not limit resource consumption when generating a preview image, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted PNG images."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@liferay.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@liferay.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25143",
"source": "security@liferay.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25145",
"sourceIdentifier": "security@liferay.com",
"published": "2024-02-07T15:15:09.097",
"lastModified": "2024-02-07T15:15:09.097",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting (XSS) vulnerability in the Portal Search module's Search Result app in Liferay Portal 7.2.0 through 7.4.3.11, and older unsupported versions, and Liferay DXP 7.4 before update 8, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML into the Search Result app's search result if highlighting is disabled by adding any searchable content (e.g., blog, message board message, web content article) to the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@liferay.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@liferay.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25145",
"source": "security@liferay.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-07T15:01:12.885635+00:00
2024-02-07T17:00:54.586642+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-07T14:58:45.913000+00:00
2024-02-07T16:39:47.010000+00:00
```
### Last Data Feed Release
@ -29,53 +29,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
237875
237882
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `7`
* [CVE-2023-39196](CVE-2023/CVE-2023-391xx/CVE-2023-39196.json) (`2024-02-07T13:15:07.933`)
* [CVE-2024-24130](CVE-2024/CVE-2024-241xx/CVE-2024-24130.json) (`2024-02-07T14:15:52.720`)
* [CVE-2024-24131](CVE-2024/CVE-2024-241xx/CVE-2024-24131.json) (`2024-02-07T14:15:52.770`)
* [CVE-2024-24133](CVE-2024/CVE-2024-241xx/CVE-2024-24133.json) (`2024-02-07T14:15:52.820`)
* [CVE-2024-24186](CVE-2024/CVE-2024-241xx/CVE-2024-24186.json) (`2024-02-07T14:15:52.870`)
* [CVE-2024-24188](CVE-2024/CVE-2024-241xx/CVE-2024-24188.json) (`2024-02-07T14:15:52.917`)
* [CVE-2024-24189](CVE-2024/CVE-2024-241xx/CVE-2024-24189.json) (`2024-02-07T14:15:52.967`)
* [CVE-2024-25200](CVE-2024/CVE-2024-252xx/CVE-2024-25200.json) (`2024-02-07T14:15:53.013`)
* [CVE-2024-25201](CVE-2024/CVE-2024-252xx/CVE-2024-25201.json) (`2024-02-07T14:15:53.060`)
* [CVE-2024-24771](CVE-2024/CVE-2024-247xx/CVE-2024-24771.json) (`2024-02-07T15:15:08.283`)
* [CVE-2024-24811](CVE-2024/CVE-2024-248xx/CVE-2024-24811.json) (`2024-02-07T15:15:08.507`)
* [CVE-2024-24812](CVE-2024/CVE-2024-248xx/CVE-2024-24812.json) (`2024-02-07T15:15:08.703`)
* [CVE-2024-25143](CVE-2024/CVE-2024-251xx/CVE-2024-25143.json) (`2024-02-07T15:15:08.907`)
* [CVE-2024-25145](CVE-2024/CVE-2024-251xx/CVE-2024-25145.json) (`2024-02-07T15:15:09.097`)
* [CVE-2024-22012](CVE-2024/CVE-2024-220xx/CVE-2024-22012.json) (`2024-02-07T16:15:47.687`)
* [CVE-2024-24815](CVE-2024/CVE-2024-248xx/CVE-2024-24815.json) (`2024-02-07T16:15:47.753`)
### CVEs modified in the last Commit
Recently modified CVEs: `34`
Recently modified CVEs: `6`
* [CVE-2024-24810](CVE-2024/CVE-2024-248xx/CVE-2024-24810.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-23446](CVE-2024/CVE-2024-234xx/CVE-2024-23446.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-23447](CVE-2024/CVE-2024-234xx/CVE-2024-23447.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-0256](CVE-2024/CVE-2024-02xx/CVE-2024-0256.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-0628](CVE-2024/CVE-2024-06xx/CVE-2024-0628.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-1037](CVE-2024/CVE-2024-10xx/CVE-2024-1037.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-1055](CVE-2024/CVE-2024-10xx/CVE-2024-1055.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-0977](CVE-2024/CVE-2024-09xx/CVE-2024-0977.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-1078](CVE-2024/CVE-2024-10xx/CVE-2024-1078.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-1079](CVE-2024/CVE-2024-10xx/CVE-2024-1079.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-24303](CVE-2024/CVE-2024-243xx/CVE-2024-24303.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-24304](CVE-2024/CVE-2024-243xx/CVE-2024-24304.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-24311](CVE-2024/CVE-2024-243xx/CVE-2024-24311.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-1109](CVE-2024/CVE-2024-11xx/CVE-2024-1109.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-1110](CVE-2024/CVE-2024-11xx/CVE-2024-1110.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-1118](CVE-2024/CVE-2024-11xx/CVE-2024-1118.json) (`2024-02-07T13:41:11.463`)
* [CVE-2024-1266](CVE-2024/CVE-2024-12xx/CVE-2024-1266.json) (`2024-02-07T13:41:21.270`)
* [CVE-2024-1267](CVE-2024/CVE-2024-12xx/CVE-2024-1267.json) (`2024-02-07T13:41:21.270`)
* [CVE-2024-22021](CVE-2024/CVE-2024-220xx/CVE-2024-22021.json) (`2024-02-07T13:41:21.270`)
* [CVE-2024-22022](CVE-2024/CVE-2024-220xx/CVE-2024-22022.json) (`2024-02-07T13:41:21.270`)
* [CVE-2024-24019](CVE-2024/CVE-2024-240xx/CVE-2024-24019.json) (`2024-02-07T13:41:21.270`)
* [CVE-2024-1268](CVE-2024/CVE-2024-12xx/CVE-2024-1268.json) (`2024-02-07T13:41:21.270`)
* [CVE-2024-1269](CVE-2024/CVE-2024-12xx/CVE-2024-1269.json) (`2024-02-07T13:41:21.270`)
* [CVE-2024-0849](CVE-2024/CVE-2024-08xx/CVE-2024-0849.json) (`2024-02-07T13:41:21.270`)
* [CVE-2024-1039](CVE-2024/CVE-2024-10xx/CVE-2024-1039.json) (`2024-02-07T14:09:47.017`)
* [CVE-2023-31005](CVE-2023/CVE-2023-310xx/CVE-2023-31005.json) (`2024-02-07T16:04:27.170`)
* [CVE-2023-32327](CVE-2023/CVE-2023-323xx/CVE-2023-32327.json) (`2024-02-07T16:16:58.450`)
* [CVE-2023-7069](CVE-2023/CVE-2023-70xx/CVE-2023-7069.json) (`2024-02-07T16:28:40.250`)
* [CVE-2023-31006](CVE-2023/CVE-2023-310xx/CVE-2023-31006.json) (`2024-02-07T16:39:47.010`)
* [CVE-2024-23108](CVE-2024/CVE-2024-231xx/CVE-2024-23108.json) (`2024-02-07T15:02:00.203`)
* [CVE-2024-23109](CVE-2024/CVE-2024-231xx/CVE-2024-23109.json) (`2024-02-07T15:04:28.237`)
## Download and Usage