-
Notifications
You must be signed in to change notification settings - Fork 168
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- 4 new CVEs: CVE-2024-43383, CVE-2024-43984, CVE-2024-49674, CVE-2024-49685 - 0 updated CVEs:
- Loading branch information
cvelistV5 Github Action
committed
Oct 31, 2024
1 parent
85264a7
commit 14f2aaa
Showing
6 changed files
with
577 additions
and
50 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,116 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-43383", | ||
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "apache", | ||
"dateReserved": "2024-08-10T16:38:34.946Z", | ||
"datePublished": "2024-10-31T09:57:29.062Z", | ||
"dateUpdated": "2024-10-31T09:57:29.062Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://www.nuget.org/packages/Lucene.Net.Replicator/4.8.0-beta00016", | ||
"defaultStatus": "unaffected", | ||
"packageName": "Lucene.Net.Replicator", | ||
"product": "Apache Lucene.Net.Replicator", | ||
"vendor": "Apache Software Foundation", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "4.8.0-beta00016", | ||
"status": "affected", | ||
"version": "4.8.0-beta00005", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "reporter", | ||
"value": "Summ3r, Vidar-Team" | ||
}, | ||
{ | ||
"lang": "en", | ||
"type": "remediation developer", | ||
"value": "Apache Lucene" | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "<p>Deserialization of Untrusted Data vulnerability in Apache Lucene.Net.Replicator.</p><p>This issue affects Apache Lucene.NET's Replicator library: from 4.8.0-beta00005 through 4.8.0-beta00016.</p><p>An attacker that can intercept traffic between a replication client and server, or control the target replication node URL, can provide a specially-crafted JSON response that is deserialized as an attacker-provided exception type. This can result in remote code execution or other potential unauthorized access.<br></p><p>Users are recommended to upgrade to version 4.8.0-beta00017, which fixes the issue.</p>" | ||
} | ||
], | ||
"value": "Deserialization of Untrusted Data vulnerability in Apache Lucene.Net.Replicator.\n\nThis issue affects Apache Lucene.NET's Replicator library: from 4.8.0-beta00005 through 4.8.0-beta00016.\n\nAn attacker that can intercept traffic between a replication client and server, or control the target replication node URL, can provide a specially-crafted JSON response that is deserialized as an attacker-provided exception type. This can result in remote code execution or other potential unauthorized access.\n\n\nUsers are recommended to upgrade to version 4.8.0-beta00017, which fixes the issue." | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV3_1": { | ||
"attackComplexity": "LOW", | ||
"attackVector": "ADJACENT_NETWORK", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 8, | ||
"baseSeverity": "HIGH", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"privilegesRequired": "LOW", | ||
"scope": "UNCHANGED", | ||
"userInteraction": "NONE", | ||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", | ||
"version": "3.1" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-502", | ||
"description": "CWE-502 Deserialization of Untrusted Data", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", | ||
"shortName": "apache", | ||
"dateUpdated": "2024-10-31T09:57:29.062Z" | ||
}, | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"vendor-advisory" | ||
], | ||
"url": "https://lists.apache.org/thread/wlz1p76dxpt4rl9o29voxjd5zl7717nh" | ||
} | ||
], | ||
"source": { | ||
"discovery": "EXTERNAL" | ||
}, | ||
"title": "Apache Lucene.Net.Replicator: Remote Code Execution in Lucene.Net.Replicator", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.1.0-dev" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,142 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-43984", | ||
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "Patchstack", | ||
"dateReserved": "2024-08-18T21:57:10.849Z", | ||
"datePublished": "2024-10-31T10:02:27.979Z", | ||
"dateUpdated": "2024-10-31T10:02:27.979Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"defaultStatus": "unaffected", | ||
"packageName": "podlove-podcasting-plugin-for-wordpress", | ||
"product": "Podlove Podcast Publisher", | ||
"vendor": "Podlove", | ||
"versions": [ | ||
{ | ||
"changes": [ | ||
{ | ||
"at": "4.1.14", | ||
"status": "unaffected" | ||
} | ||
], | ||
"lessThanOrEqual": "4.1.13", | ||
"status": "affected", | ||
"version": "n/a", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"user": "00000000-0000-4000-9000-000000000000", | ||
"value": "Muhammad Daffa (Patchstack Alliance)" | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher allows Code Injection.<p>This issue affects Podlove Podcast Publisher: from n/a through 4.1.13.</p>" | ||
} | ||
], | ||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher allows Code Injection.This issue affects Podlove Podcast Publisher: from n/a through 4.1.13." | ||
} | ||
], | ||
"impacts": [ | ||
{ | ||
"capecId": "CAPEC-242", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-242 Code Injection" | ||
} | ||
] | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV3_1": { | ||
"attackComplexity": "LOW", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 9.6, | ||
"baseSeverity": "CRITICAL", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"privilegesRequired": "NONE", | ||
"scope": "CHANGED", | ||
"userInteraction": "REQUIRED", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", | ||
"version": "3.1" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-352", | ||
"description": "CWE-352 Cross-Site Request Forgery (CSRF)", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3", | ||
"shortName": "Patchstack", | ||
"dateUpdated": "2024-10-31T10:02:27.979Z" | ||
}, | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"vdb-entry" | ||
], | ||
"url": "https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-4-1-13-csrf-to-remote-code-execution-rce-vulnerability?_s_id=cve" | ||
} | ||
], | ||
"solutions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "Update to 4.1.14 or a higher version." | ||
} | ||
], | ||
"value": "Update to 4.1.14 or a higher version." | ||
} | ||
], | ||
"source": { | ||
"discovery": "EXTERNAL" | ||
}, | ||
"title": "WordPress Podlove Podcast Publisher plugin <= 4.1.13 - CSRF to Remote Code Execution (RCE) vulnerability", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.1.0-dev" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,123 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-49674", | ||
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "Patchstack", | ||
"dateReserved": "2024-10-17T09:52:10.631Z", | ||
"datePublished": "2024-10-31T10:01:19.117Z", | ||
"dateUpdated": "2024-10-31T10:01:19.117Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"defaultStatus": "unaffected", | ||
"packageName": "ekc-tournament-manager", | ||
"product": "EKC Tournament Manager", | ||
"vendor": "Lukas Huser", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "2.2.1", | ||
"status": "affected", | ||
"version": "n/a", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"user": "00000000-0000-4000-9000-000000000000", | ||
"value": "Joshua Chan (Patchstack Alliance)" | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Lukas Huser EKC Tournament Manager allows Upload a Web Shell to a Web Server.<p>This issue affects EKC Tournament Manager: from n/a through 2.2.1.</p>" | ||
} | ||
], | ||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Lukas Huser EKC Tournament Manager allows Upload a Web Shell to a Web Server.This issue affects EKC Tournament Manager: from n/a through 2.2.1." | ||
} | ||
], | ||
"impacts": [ | ||
{ | ||
"capecId": "CAPEC-650", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-650 Upload a Web Shell to a Web Server" | ||
} | ||
] | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV3_1": { | ||
"attackComplexity": "LOW", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 9.6, | ||
"baseSeverity": "CRITICAL", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"privilegesRequired": "NONE", | ||
"scope": "CHANGED", | ||
"userInteraction": "REQUIRED", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", | ||
"version": "3.1" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-352", | ||
"description": "CWE-352 Cross-Site Request Forgery (CSRF)", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3", | ||
"shortName": "Patchstack", | ||
"dateUpdated": "2024-10-31T10:01:19.117Z" | ||
}, | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"vdb-entry" | ||
], | ||
"url": "https://patchstack.com/database/vulnerability/ekc-tournament-manager/wordpress-ekc-tournament-manager-plugin-2-2-1-csrf-to-arbitrary-file-upload-vulnerability?_s_id=cve" | ||
} | ||
], | ||
"source": { | ||
"discovery": "EXTERNAL" | ||
}, | ||
"title": "WordPress EKC Tournament Manager plugin <= 2.2.1 - CSRF to Arbitrary File Upload vulnerability", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.1.0-dev" | ||
} | ||
} | ||
} | ||
} |
Oops, something went wrong.