From 86f82b2abf4e662b7103e4b28e4d636633500dfa Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 24 Nov 2023 09:16:06 +0000 Subject: [PATCH] Auto-Update: 2023-11-24T09:16:02.904301+00:00 --- CVE-2023/CVE-2023-487xx/CVE-2023-48796.json | 32 +++++++++++ CVE-2023/CVE-2023-61xx/CVE-2023-6118.json | 59 +++++++++++++++++++++ README.md | 18 +++---- 3 files changed, 97 insertions(+), 12 deletions(-) create mode 100644 CVE-2023/CVE-2023-487xx/CVE-2023-48796.json create mode 100644 CVE-2023/CVE-2023-61xx/CVE-2023-6118.json diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48796.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48796.json new file mode 100644 index 00000000000..a9941ee3249 --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48796.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-48796", + "sourceIdentifier": "security@apache.org", + "published": "2023-11-24T08:15:20.810", + "lastModified": "2023-11-24T08:15:20.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.\n\nThe information exposed to unauthorized actors may include sensitive data such as database credentials.\n\nUsers who can't upgrade to the fixed version can also set environment variable `MANAGEMENT_ENDPOINTS_WEB_EXPOSURE_INCLUDE=health,metrics,prometheus` to workaround this, or add the following section in the `application.yaml` file\n\n```\nmanagement:\n\u00a0 endpoints:\n\u00a0 \u00a0 web:\n\u00a0 \u00a0 \u00a0 exposure:\n\u00a0 \u00a0 \u00a0 \u00a0 include: health,metrics,prometheus\n```\n\nThis issue affects Apache DolphinScheduler: from 3.0.0 before 3.0.2.\n\nUsers are recommended to upgrade to version 3.0.2, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/ffrmkcwgr2lcz0f5nnnyswhpn3fytsvo", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6118.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6118.json new file mode 100644 index 00000000000..ae1d83123f0 --- /dev/null +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6118.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-6118", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2023-11-23T15:15:10.583", + "lastModified": "2023-11-24T08:15:21.163", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal: '/../filedir' vulnerability in Neutron IP Camera allows Absolute Path Traversal.This issue affects IP Camera: before b1130.1.0.1.\n\n" + }, + { + "lang": "es", + "value": ": Path Traversal: la vulnerabilidad '/../filedir' en Neutron IP Camera permite un Absolute Path Traversal. Este problema afecta a IP Camera: anterior a b1130.1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-25" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-23-0658", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0ee8ddc78b3..7f23a0d413b 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-24T05:08:09.772071+00:00 +2023-11-24T09:16:02.904301+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-24T03:15:08.063000+00:00 +2023-11-24T08:15:21.163000+00:00 ``` ### Last Data Feed Release @@ -29,27 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -231470 +231471 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -* [CVE-2023-44303](CVE-2023/CVE-2023-443xx/CVE-2023-44303.json) (`2023-11-24T03:15:07.317`) +* [CVE-2023-48796](CVE-2023/CVE-2023-487xx/CVE-2023-48796.json) (`2023-11-24T08:15:20.810`) ### CVEs modified in the last Commit -Recently modified CVEs: `7` +Recently modified CVEs: `1` -* [CVE-2023-48231](CVE-2023/CVE-2023-482xx/CVE-2023-48231.json) (`2023-11-24T03:15:07.513`) -* [CVE-2023-48232](CVE-2023/CVE-2023-482xx/CVE-2023-48232.json) (`2023-11-24T03:15:07.617`) -* [CVE-2023-48233](CVE-2023/CVE-2023-482xx/CVE-2023-48233.json) (`2023-11-24T03:15:07.713`) -* [CVE-2023-48234](CVE-2023/CVE-2023-482xx/CVE-2023-48234.json) (`2023-11-24T03:15:07.800`) -* [CVE-2023-48235](CVE-2023/CVE-2023-482xx/CVE-2023-48235.json) (`2023-11-24T03:15:07.893`) -* [CVE-2023-48236](CVE-2023/CVE-2023-482xx/CVE-2023-48236.json) (`2023-11-24T03:15:07.973`) -* [CVE-2023-48237](CVE-2023/CVE-2023-482xx/CVE-2023-48237.json) (`2023-11-24T03:15:08.063`) +* [CVE-2023-6118](CVE-2023/CVE-2023-61xx/CVE-2023-6118.json) (`2023-11-24T08:15:21.163`) ## Download and Usage