From 7ce31840678a166b6426f7cdaaadc8f81b8c8df2 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 13 Feb 2024 05:00:28 +0000 Subject: [PATCH] Auto-Update: 2024-02-13T05:00:24.783317+00:00 --- CVE-2023/CVE-2023-472xx/CVE-2023-47218.json | 59 +++++++++++++++++++++ CVE-2023/CVE-2023-503xx/CVE-2023-50358.json | 55 +++++++++++++++++++ CVE-2024/CVE-2024-220xx/CVE-2024-22024.json | 43 +++++++++++++++ CVE-2024/CVE-2024-221xx/CVE-2024-22129.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-221xx/CVE-2024-22130.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-221xx/CVE-2024-22131.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-221xx/CVE-2024-22132.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-247xx/CVE-2024-24739.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-247xx/CVE-2024-24740.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-247xx/CVE-2024-24741.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-247xx/CVE-2024-24742.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-247xx/CVE-2024-24743.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-256xx/CVE-2024-25642.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-256xx/CVE-2024-25643.json | 59 +++++++++++++++++++++ README.md | 40 +++++++------- 15 files changed, 825 insertions(+), 21 deletions(-) create mode 100644 CVE-2023/CVE-2023-472xx/CVE-2023-47218.json create mode 100644 CVE-2023/CVE-2023-503xx/CVE-2023-50358.json create mode 100644 CVE-2024/CVE-2024-220xx/CVE-2024-22024.json create mode 100644 CVE-2024/CVE-2024-221xx/CVE-2024-22129.json create mode 100644 CVE-2024/CVE-2024-221xx/CVE-2024-22130.json create mode 100644 CVE-2024/CVE-2024-221xx/CVE-2024-22131.json create mode 100644 CVE-2024/CVE-2024-221xx/CVE-2024-22132.json create mode 100644 CVE-2024/CVE-2024-247xx/CVE-2024-24739.json create mode 100644 CVE-2024/CVE-2024-247xx/CVE-2024-24740.json create mode 100644 CVE-2024/CVE-2024-247xx/CVE-2024-24741.json create mode 100644 CVE-2024/CVE-2024-247xx/CVE-2024-24742.json create mode 100644 CVE-2024/CVE-2024-247xx/CVE-2024-24743.json create mode 100644 CVE-2024/CVE-2024-256xx/CVE-2024-25642.json create mode 100644 CVE-2024/CVE-2024-256xx/CVE-2024-25643.json diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47218.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47218.json new file mode 100644 index 00000000000..a024a2a5130 --- /dev/null +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47218.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-47218", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2024-02-13T03:15:07.700", + "lastModified": "2024-02-13T03:15:07.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.5.2645 build 20240116 and later\nQuTS hero h5.1.5.2647 build 20240118 and later\nQuTScloud c5.1.5.2651 and later\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-23-57", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50358.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50358.json new file mode 100644 index 00000000000..b36b13738d8 --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50358.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-50358", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2024-02-13T03:15:07.963", + "lastModified": "2024-02-13T03:15:07.963", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.5.2645 build 20240116 and later\nQTS 4.5.4.2627 build 20231225 and later\nQTS 4.3.6.2665 build 20240131 and later\nQTS 4.3.4.2675 build 20240131 and later\nQTS 4.3.3.2644 build 20240131 and later\nQTS 4.2.6 build 20240131 and later\nQuTS hero h5.1.5.2647 build 20240118 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\nQuTScloud c5.1.5.2651 and later\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-23-57", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22024.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22024.json new file mode 100644 index 00000000000..263ca8daa76 --- /dev/null +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22024.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-22024", + "sourceIdentifier": "support@hackerone.com", + "published": "2024-02-13T04:15:07.943", + "lastModified": "2024-02-13T04:15:07.943", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.7 + } + ] + }, + "references": [ + { + "url": "https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json new file mode 100644 index 00000000000..9782259c309 --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22129", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T04:15:08.133", + "lastModified": "2024-02-13T04:15:08.133", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP Companion - version <3.1.38, has a URL with parameter that could be vulnerable to XSS attack. The attacker could send a malicious link to a user that would possibly allow an attacker to retrieve the sensitive information and cause minor impact on the integrity of the web application.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3404025", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json new file mode 100644 index 00000000000..cafa05eba98 --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22130", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T03:15:08.163", + "lastModified": "2024-02-13T03:15:08.163", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Print preview option in\u00a0SAP CRM WebClient UI - versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, S4FND 108, WEBCUIF 700, WEBCUIF 701, WEBCUIF 730, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability. An attacker with low privileges can cause limited impact to confidentiality and integrity of the appliaction data after successful exploitation.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3410875", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json new file mode 100644 index 00000000000..5abec415cef --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22131", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T03:15:08.363", + "lastModified": "2024-02-13T03:15:08.363", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In SAP ABA (Application Basis) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, an attacker authenticated as a user with a remote execution authorization can use a vulnerable interface. This allows the attacker to use the interface to\u00a0invoke\u00a0an application function to perform actions which they would not normally be permitted to perform. \u00a0Depending on the function executed, the attack can read or modify any user/business data and can make the entire system unavailable.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3420923", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json new file mode 100644 index 00000000000..a2f17c24505 --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22132", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T03:15:08.570", + "lastModified": "2024-02-13T03:15:08.570", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP IDES ECC-systems contain code that permits the execution of arbitrary program code of user's choice.An attacker can therefore control the behaviour of the system by executing malicious code which can potentially escalate privileges with low impact on confidentiality, integrity and availability of the system.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3421659", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json new file mode 100644 index 00000000000..d5f0d41893b --- /dev/null +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-24739", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T03:15:08.780", + "lastModified": "2024-02-13T03:15:08.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP Bank Account Management (BAM) allows an authenticated user with restricted access to use functions which can result in escalation of privileges with low impact on confidentiality, integrity and availability of the application.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/2637727", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json new file mode 100644 index 00000000000..290a1c54c1a --- /dev/null +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-24740", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T03:15:08.987", + "lastModified": "2024-02-13T03:15:08.987", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions,\u00a0allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3360827", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json new file mode 100644 index 00000000000..8bdbc13574d --- /dev/null +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-24741", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T04:15:08.340", + "lastModified": "2024-02-13T04:15:08.340", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP Master Data Governance for Material Data - versions 618, 619, 620, 621, 622, 800, 801, 802, 803, 804, does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read some sensitive information but no impact to integrity and availability.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/2897391", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json new file mode 100644 index 00000000000..da6c81a42a8 --- /dev/null +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-24742", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T03:15:09.187", + "lastModified": "2024-02-13T03:15:09.187", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP CRM WebClient UI\u00a0- version S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An attacker with low privileges can cause limited impact to integrity of the application data after successful exploitation. There is no impact on confidentiality and availability.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3158455", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json new file mode 100644 index 00000000000..ab172ed6521 --- /dev/null +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-24743", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T03:15:09.393", + "lastModified": "2024-02-13T03:15:09.393", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP NetWeaver AS Java (CAF - Guided Procedures) - version 7.50, allows an unauthenticated attacker to submit a malicious request with a crafted XML file over the network, which when parsed will enable him to access sensitive files and data but not modify them. There are expansion limits in place so that availability is not affected.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3426111", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json new file mode 100644 index 00000000000..8f768b56205 --- /dev/null +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-25642", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T03:15:09.613", + "lastModified": "2024-02-13T03:15:09.613", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Due to improper validation of certificate in SAP Cloud Connector - version 2.0, attacker can impersonate the genuine servers to interact with SCC breaking the mutual authentication. Hence, the attacker can intercept the request to view/modify sensitive information. There is no impact on the availability of the system.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3424610", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json new file mode 100644 index 00000000000..7aa0d6b79a7 --- /dev/null +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-25643", + "sourceIdentifier": "cna@sap.com", + "published": "2024-02-13T04:15:08.590", + "lastModified": "2024-02-13T04:15:08.590", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The SAP Fiori app (My Overtime Request) - version 605, does not perform the necessary authorization checks for an authenticated user which may result in an escalation of privileges. It is possible to manipulate the URLs of data requests to access information that the user should not have access to. There is no impact on integrity and availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3237638", + "source": "cna@sap.com" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 135660274af..175be6b2da7 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-13T03:00:23.830766+00:00 +2024-02-13T05:00:24.783317+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-13T02:15:08.323000+00:00 +2024-02-13T04:15:08.590000+00:00 ``` ### Last Data Feed Release @@ -29,35 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -238222 +238236 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `14` -* [CVE-2023-42374](CVE-2023/CVE-2023-423xx/CVE-2023-42374.json) (`2024-02-13T01:15:07.913`) -* [CVE-2023-49339](CVE-2023/CVE-2023-493xx/CVE-2023-49339.json) (`2024-02-13T01:15:08.287`) -* [CVE-2023-52059](CVE-2023/CVE-2023-520xx/CVE-2023-52059.json) (`2024-02-13T01:15:08.353`) -* [CVE-2023-52060](CVE-2023/CVE-2023-520xx/CVE-2023-52060.json) (`2024-02-13T01:15:08.413`) -* [CVE-2024-25407](CVE-2024/CVE-2024-254xx/CVE-2024-25407.json) (`2024-02-13T01:15:08.470`) -* [CVE-2024-22126](CVE-2024/CVE-2024-221xx/CVE-2024-22126.json) (`2024-02-13T02:15:08.107`) -* [CVE-2024-22128](CVE-2024/CVE-2024-221xx/CVE-2024-22128.json) (`2024-02-13T02:15:08.323`) +* [CVE-2023-47218](CVE-2023/CVE-2023-472xx/CVE-2023-47218.json) (`2024-02-13T03:15:07.700`) +* [CVE-2023-50358](CVE-2023/CVE-2023-503xx/CVE-2023-50358.json) (`2024-02-13T03:15:07.963`) +* [CVE-2024-22130](CVE-2024/CVE-2024-221xx/CVE-2024-22130.json) (`2024-02-13T03:15:08.163`) +* [CVE-2024-22131](CVE-2024/CVE-2024-221xx/CVE-2024-22131.json) (`2024-02-13T03:15:08.363`) +* [CVE-2024-22132](CVE-2024/CVE-2024-221xx/CVE-2024-22132.json) (`2024-02-13T03:15:08.570`) +* [CVE-2024-24739](CVE-2024/CVE-2024-247xx/CVE-2024-24739.json) (`2024-02-13T03:15:08.780`) +* [CVE-2024-24740](CVE-2024/CVE-2024-247xx/CVE-2024-24740.json) (`2024-02-13T03:15:08.987`) +* [CVE-2024-24742](CVE-2024/CVE-2024-247xx/CVE-2024-24742.json) (`2024-02-13T03:15:09.187`) +* [CVE-2024-24743](CVE-2024/CVE-2024-247xx/CVE-2024-24743.json) (`2024-02-13T03:15:09.393`) +* [CVE-2024-25642](CVE-2024/CVE-2024-256xx/CVE-2024-25642.json) (`2024-02-13T03:15:09.613`) +* [CVE-2024-22024](CVE-2024/CVE-2024-220xx/CVE-2024-22024.json) (`2024-02-13T04:15:07.943`) +* [CVE-2024-22129](CVE-2024/CVE-2024-221xx/CVE-2024-22129.json) (`2024-02-13T04:15:08.133`) +* [CVE-2024-24741](CVE-2024/CVE-2024-247xx/CVE-2024-24741.json) (`2024-02-13T04:15:08.340`) +* [CVE-2024-25643](CVE-2024/CVE-2024-256xx/CVE-2024-25643.json) (`2024-02-13T04:15:08.590`) ### CVEs modified in the last Commit -Recently modified CVEs: `9` +Recently modified CVEs: `0` -* [CVE-2023-44031](CVE-2023/CVE-2023-440xx/CVE-2023-44031.json) (`2024-02-13T00:57:11.897`) -* [CVE-2023-43183](CVE-2023/CVE-2023-431xx/CVE-2023-43183.json) (`2024-02-13T00:57:25.583`) -* [CVE-2023-37611](CVE-2023/CVE-2023-376xx/CVE-2023-37611.json) (`2024-02-13T01:15:07.807`) -* [CVE-2023-47620](CVE-2023/CVE-2023-476xx/CVE-2023-47620.json) (`2024-02-13T01:15:07.983`) -* [CVE-2023-47623](CVE-2023/CVE-2023-476xx/CVE-2023-47623.json) (`2024-02-13T01:15:08.143`) -* [CVE-2023-43770](CVE-2023/CVE-2023-437xx/CVE-2023-43770.json) (`2024-02-13T02:00:01.627`) -* [CVE-2024-23550](CVE-2024/CVE-2024-235xx/CVE-2024-23550.json) (`2024-02-13T00:57:33.613`) -* [CVE-2024-22290](CVE-2024/CVE-2024-222xx/CVE-2024-22290.json) (`2024-02-13T00:57:51.120`) -* [CVE-2024-20290](CVE-2024/CVE-2024-202xx/CVE-2024-20290.json) (`2024-02-13T02:15:07.987`) ## Download and Usage