diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3269.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3269.json index 17ed4d380fa..8be83613836 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3269.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3269.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3269", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-11T12:15:10.047", - "lastModified": "2023-07-28T15:15:13.553", + "lastModified": "2023-07-29T08:15:49.040", "vulnStatus": "Modified", "descriptions": [ { @@ -105,6 +105,10 @@ } ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2023/Jul/43", + "source": "secalert@redhat.com" + }, { "url": "http://www.openwall.com/lists/oss-security/2023/07/28/1", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json new file mode 100644 index 00000000000..d8b25999fc7 --- /dev/null +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-36542", + "sourceIdentifier": "security@apache.org", + "published": "2023-07-29T08:15:48.833", + "lastModified": "2023-07-29T08:15:48.833", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/swnly3dzhhq9zo3rofc8djq77stkhbof", + "source": "security@apache.org" + }, + { + "url": "https://nifi.apache.org/security.html#CVE-2023-36542", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1d63ac39818..afd4dba29fc 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-29T06:00:25.914750+00:00 +2023-07-29T10:00:25.157047+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-29T04:15:10.743000+00:00 +2023-07-29T08:15:49.040000+00:00 ``` ### Last Data Feed Release @@ -29,20 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -221271 +221272 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +* [CVE-2023-36542](CVE-2023/CVE-2023-365xx/CVE-2023-36542.json) (`2023-07-29T08:15:48.833`) ### CVEs modified in the last Commit Recently modified CVEs: `1` -* [CVE-2023-38403](CVE-2023/CVE-2023-384xx/CVE-2023-38403.json) (`2023-07-29T04:15:10.743`) +* [CVE-2023-3269](CVE-2023/CVE-2023-32xx/CVE-2023-3269.json) (`2023-07-29T08:15:49.040`) ## Download and Usage