mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
266 lines
9.3 KiB
JSON
266 lines
9.3 KiB
JSON
{
|
|
"id": "CVE-2023-40023",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2023-08-14T20:15:12.530",
|
|
"lastModified": "2024-11-21T08:18:31.987",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "yaklang is a programming language designed for cybersecurity. The Yak Engine has been found to contain a local file inclusion (LFI) vulnerability. This vulnerability allows attackers to include files from the server's local file system through the web application. When exploited, this can lead to the unintended exposure of sensitive data, potential remote code execution, or other security breaches. Users utilizing versions of the Yak Engine prior to 1.2.4-sp1 are impacted. This vulnerability has been patched in version 1.2.4-sp1. Users are advised to upgrade. users unable to upgrade may avoid exposing vulnerable versions to untrusted input and to closely monitor any unexpected server behavior until they can upgrade."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.0:sp6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "46F3DA06-8197-447A-BCE3-D838062BD344"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.0:sp7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA076EFA-4FED-4894-A46D-7DF553B331B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.0:sp8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72C59A71-E85A-4684-9638-DCB1D8F4872F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.1:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EABBAB5A-2C5B-4D7A-BAC0-55901CF817BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.1:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "776E7D1A-29AD-4B66-8BE4-F35D3408934C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.1:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "29A9F6F9-1E01-4898-B29A-A29ADF96EEF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.1:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9B9AB79-69F4-4CA8-984A-8E2629F9FE51"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.1:sp4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "394A1DC3-36A3-4605-AC06-A60D545D6FC1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.1:sp5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "676D35A7-BB18-47C6-AD6C-632956C9C7A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.1:sp6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E594F631-6069-4303-B069-8AA800F677F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.1:sp7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1300104E-98A7-4B3E-97A5-FF039E71625B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.1:sp8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6BD1798E-CF01-4A84-80DF-F25BD1536982"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.1:sp9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6E7E08F1-D67D-41CB-B42D-49A7B333AE58"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.2:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6332A9BD-0B5A-4969-B55B-F272A511E1ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.2:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F3F488F4-C4A8-42A9-A7B7-32807AF02AA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.2:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C85FBE1E-DF14-46C9-A5FF-D4DE67198CEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.2:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A2A688A-E1E0-4EE5-B71B-3CBFBD513D6F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.2:sp4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A50F230-6189-40C7-AB17-A9C542D63B6E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.2:sp5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F069B61E-527E-4311-8A1B-2F596DC6041D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.2:sp6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44A6D499-215E-4311-A104-81C788187D6B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.2:sp7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71ABAD8C-795C-4BA3-B431-06F8A05ECD2A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.3:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9EC848A3-5489-4A76-AD14-4A145500E294"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.3:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC3B8C85-0058-4B8E-9306-6F82D47A7787"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.3:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E41C8D32-620B-4453-952D-DE5F31428133"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.3:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79730955-D4B1-4A62-9BE2-E2ACB9B4E704"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:yaklang:yaklang:1.2.4:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "54936273-80E5-4FC5-B2F9-EF6923ABB6E3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/yaklang/yaklang/pull/295",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/yaklang/yaklang/pull/296",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/yaklang/yaklang/security/advisories/GHSA-xvhg-w6qc-m3qq",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/yaklang/yaklang/pull/295",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/yaklang/yaklang/pull/296",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/yaklang/yaklang/security/advisories/GHSA-xvhg-w6qc-m3qq",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |