Auto-Update: 2023-11-28T17:00:18.811822+00:00

This commit is contained in:
cad-safe-bot 2023-11-28 17:00:22 +00:00
parent c5373d5470
commit 66aeb67583
11 changed files with 379 additions and 48 deletions

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2022-41678",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-28T16:15:06.840",
"lastModified": "2023-11-28T16:15:06.840",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.\u00a0\n\nIn details, in ActiveMQ configurations, jetty allows\norg.jolokia.http.AgentServlet to handler request to /api/jolokia\n\norg.jolokia.http.HttpRequestHandler#handlePostRequest is able to\ncreate JmxRequest through JSONObject. And calls to\norg.jolokia.http.HttpRequestHandler#executeRequest.\n\nInto deeper calling stacks,\norg.jolokia.handler.ExecHandler#doHandleRequest is able to invoke\nthrough refection.\n\nAnd then, RCE is able to be achieved via\njdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11.\n\n1 Call newRecording.\n\n2 Call setConfiguration. And a webshell data hides in it.\n\n3 Call startRecording.\n\n4 Call copyTo method. The webshell will be written to a .jsp file.\n\nThe mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia.\nA more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://activemq.apache.org/security-advisories.data/CVE-2022-41678-announcement.txt",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/7g17kwbtjl011mm4tr8bn1vnoq9wh4sl",
"source": "security@apache.org"
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-24592",
"sourceIdentifier": "secure@intel.com",
"published": "2023-11-14T19:15:18.710",
"lastModified": "2023-11-14T19:30:32.597",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-28T16:58:37.430",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Path Traversal en algunos software Intel(R) oneAPI Toolkits and Component anteriores a la versi\u00f3n 2023.1 puede permitir que el usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -46,10 +80,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:advisor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1",
"matchCriteriaId": "8A6B4CD2-3E17-4BC8-AC12-38A0F7C5B85D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:inspector:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1",
"matchCriteriaId": "AF974524-D8AA-475F-84E6-86D76C519032"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:mpi_library:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1",
"matchCriteriaId": "A96D75A3-CC27-41EA-837F-4EAD499AD502"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1",
"matchCriteriaId": "E9B0E003-2303-4BAA-AAB5-E41672DD36A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:oneapi_hpc_toolkit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1",
"matchCriteriaId": "140E6A32-DD35-4BD9-8810-26359D76FEB7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-25075",
"sourceIdentifier": "secure@intel.com",
"published": "2023-11-14T19:15:19.190",
"lastModified": "2023-11-14T19:30:32.597",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-28T16:56:44.577",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unquoted search path in the installer for some Intel Server Configuration Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "La ruta de b\u00fasqueda sin comillas en el instalador de alg\u00fan software Intel Server Configuration Utility anterior a la versi\u00f3n 16.0.9 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -46,10 +80,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:server_configuration_utility:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.0.9",
"matchCriteriaId": "BE9882BF-1158-4A70-9B10-C2F15FD95591"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-25080",
"sourceIdentifier": "secure@intel.com",
"published": "2023-11-14T19:15:19.380",
"lastModified": "2023-11-14T19:30:32.597",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-28T16:56:08.080",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Protection mechanism failure in some Intel(R) Distribution of OpenVINO toolkit software before version 2023.0.0 may allow an authenticated user to potentially enable information disclosure via local access."
},
{
"lang": "es",
"value": "La falla del mecanismo de protecci\u00f3n en Intel(R) Distribution de OpenVINO software del kit de herramientas antes de la versi\u00f3n 2023.0.0 puede permitir que un usuario autenticado potencialmente habilite la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -46,10 +80,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:openvino:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.0.0",
"matchCriteriaId": "CB0F7ADC-D7B5-4C50-8CD6-2BE65C79CCA1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00901.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-46589",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-28T16:15:06.943",
"lastModified": "2023-11-28T16:15:06.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single \nrequest as multiple requests leading to the possibility of request \nsmuggling when behind a reverse proxy.\n\nUsers are recommended to upgrade to version 11.0.0-M11\u00a0onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46604",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-27T15:15:14.017",
"lastModified": "2023-11-20T22:15:07.083",
"lastModified": "2023-11-28T15:15:07.597",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-11-02",
"cisaActionDue": "2023-11-23",
@ -151,10 +151,6 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html",
"source": "security@apache.org"
},
{
"url": "https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt",
"source": "security@apache.org",
@ -166,6 +162,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html",
"source": "security@apache.org"
},
{
"url": "https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231110-0010/",
"source": "security@apache.org"

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-49062",
"sourceIdentifier": "cve-assign@fb.com",
"published": "2023-11-28T16:15:07.023",
"lastModified": "2023-11-28T16:15:07.023",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Katran could disclose non-initialized kernel memory as part of an IP header. The issue was present for IPv4 encapsulation and ICMP (v4) Too Big packet generation. After a bpf_xdp_adjust_head call, Katran code didn\u2019t initialize the Identification field for the IPv4 header, resulting in writing content of kernel memory in that field of IP header. The issue affected all Katran versions prior to commit 6a03106ac1eab39d0303662963589ecb2374c97f"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/facebookincubator/katran/commit/6a03106ac1eab39d0303662963589ecb2374c97f",
"source": "cve-assign@fb.com"
},
{
"url": "https://www.facebook.com/security/advisories/cve-2023-49062",
"source": "cve-assign@fb.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-49313",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-28T15:15:07.710",
"lastModified": "2023-11-28T15:15:07.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A dylib injection vulnerability in XMachOViewer 0.04 allows attackers to compromise integrity. By exploiting this, unauthorized code can be injected into the product's processes, potentially leading to remote control and unauthorized access to sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/horsicq/XMachOViewer",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/louiselalanne/CVE-2023-49313",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-49314",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-28T15:15:07.770",
"lastModified": "2023-11-28T15:15:07.770",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and EnableNodeCliInspectArguments, and thus r3ggi/electroniz3r can be used to perform an attack."
}
],
"metrics": {},
"references": [
{
"url": "https://asana.com/pt/download",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/electron/fuses",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/louiselalanne/CVE-2023-49314",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/r3ggi/electroniz3r",
"source": "cve@mitre.org"
},
{
"url": "https://www.electronjs.org/docs/latest/tutorial/fuses",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6329",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-11-27T17:15:09.860",
"lastModified": "2023-11-27T19:03:35.337",
"lastModified": "2023-11-28T16:15:07.077",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]"
"value": "An authentication bypass vulnerability exists in Control iD iDSecure v4.7.32.0. The login routine used by iDS-Core.dll contains a \"passwordCustom\" option that allows an unauthenticated attacker to compute valid credentials that can be used to bypass authentication and act as an administrative user."
},
{
"lang": "es",
"value": "[TIPO DE PROBLEMA] en [COMPONENTE] en [PROVEEDOR] [PRODUCTO] [VERSI\u00d3N] en [PLATAFORMAS] permite que [ATACANTE] [IMPACTE] a trav\u00e9s de [VECTOR]"
}
],
"metrics": {

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-28T15:00:18.695299+00:00
2023-11-28T17:00:18.811822+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-28T14:15:07.697000+00:00
2023-11-28T16:58:37.430000+00:00
```
### Last Data Feed Release
@ -29,46 +29,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
231633
231638
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `5`
* [CVE-2023-48042](CVE-2023/CVE-2023-480xx/CVE-2023-48042.json) (`2023-11-28T13:15:07.410`)
* [CVE-2023-6239](CVE-2023/CVE-2023-62xx/CVE-2023-6239.json) (`2023-11-28T14:15:07.697`)
* [CVE-2022-41678](CVE-2022/CVE-2022-416xx/CVE-2022-41678.json) (`2023-11-28T16:15:06.840`)
* [CVE-2023-49313](CVE-2023/CVE-2023-493xx/CVE-2023-49313.json) (`2023-11-28T15:15:07.710`)
* [CVE-2023-49314](CVE-2023/CVE-2023-493xx/CVE-2023-49314.json) (`2023-11-28T15:15:07.770`)
* [CVE-2023-46589](CVE-2023/CVE-2023-465xx/CVE-2023-46589.json) (`2023-11-28T16:15:06.943`)
* [CVE-2023-49062](CVE-2023/CVE-2023-490xx/CVE-2023-49062.json) (`2023-11-28T16:15:07.023`)
### CVEs modified in the last Commit
Recently modified CVEs: `62`
Recently modified CVEs: `5`
* [CVE-2023-6225](CVE-2023/CVE-2023-62xx/CVE-2023-6225.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-6226](CVE-2023/CVE-2023-62xx/CVE-2023-6226.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-24023](CVE-2023/CVE-2023-240xx/CVE-2023-24023.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-3368](CVE-2023/CVE-2023-33xx/CVE-2023-3368.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-3533](CVE-2023/CVE-2023-35xx/CVE-2023-3533.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-3545](CVE-2023/CVE-2023-35xx/CVE-2023-3545.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-48022](CVE-2023/CVE-2023-480xx/CVE-2023-48022.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-48023](CVE-2023/CVE-2023-480xx/CVE-2023-48023.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-4220](CVE-2023/CVE-2023-42xx/CVE-2023-4220.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-4221](CVE-2023/CVE-2023-42xx/CVE-2023-4221.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-4222](CVE-2023/CVE-2023-42xx/CVE-2023-4222.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-4223](CVE-2023/CVE-2023-42xx/CVE-2023-4223.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-4224](CVE-2023/CVE-2023-42xx/CVE-2023-4224.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-4225](CVE-2023/CVE-2023-42xx/CVE-2023-4225.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-4226](CVE-2023/CVE-2023-42xx/CVE-2023-4226.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-34053](CVE-2023/CVE-2023-340xx/CVE-2023-34053.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-34054](CVE-2023/CVE-2023-340xx/CVE-2023-34054.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-34055](CVE-2023/CVE-2023-340xx/CVE-2023-34055.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-4667](CVE-2023/CVE-2023-46xx/CVE-2023-4667.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-6150](CVE-2023/CVE-2023-61xx/CVE-2023-6150.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-6151](CVE-2023/CVE-2023-61xx/CVE-2023-6151.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-42004](CVE-2023/CVE-2023-420xx/CVE-2023-42004.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-6201](CVE-2023/CVE-2023-62xx/CVE-2023-6201.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-6359](CVE-2023/CVE-2023-63xx/CVE-2023-6359.json) (`2023-11-28T14:12:58.173`)
* [CVE-2023-5981](CVE-2023/CVE-2023-59xx/CVE-2023-5981.json) (`2023-11-28T14:15:07.620`)
* [CVE-2023-46604](CVE-2023/CVE-2023-466xx/CVE-2023-46604.json) (`2023-11-28T15:15:07.597`)
* [CVE-2023-6329](CVE-2023/CVE-2023-63xx/CVE-2023-6329.json) (`2023-11-28T16:15:07.077`)
* [CVE-2023-25080](CVE-2023/CVE-2023-250xx/CVE-2023-25080.json) (`2023-11-28T16:56:08.080`)
* [CVE-2023-25075](CVE-2023/CVE-2023-250xx/CVE-2023-25075.json) (`2023-11-28T16:56:44.577`)
* [CVE-2023-24592](CVE-2023/CVE-2023-245xx/CVE-2023-24592.json) (`2023-11-28T16:58:37.430`)
## Download and Usage