From 6e5f74144c12295dd708627997c9249409fff18d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 23 Feb 2023 09:31:36 +0000 Subject: [PATCH] Publish Advisories GHSA-gp5r-64rh-wjrv GHSA-mrpv-5pmr-p92h --- .../GHSA-gp5r-64rh-wjrv.json | 35 +++++++++++++++++++ .../GHSA-mrpv-5pmr-p92h.json | 35 +++++++++++++++++++ 2 files changed, 70 insertions(+) create mode 100644 advisories/unreviewed/2023/02/GHSA-gp5r-64rh-wjrv/GHSA-gp5r-64rh-wjrv.json create mode 100644 advisories/unreviewed/2023/02/GHSA-mrpv-5pmr-p92h/GHSA-mrpv-5pmr-p92h.json diff --git a/advisories/unreviewed/2023/02/GHSA-gp5r-64rh-wjrv/GHSA-gp5r-64rh-wjrv.json b/advisories/unreviewed/2023/02/GHSA-gp5r-64rh-wjrv/GHSA-gp5r-64rh-wjrv.json new file mode 100644 index 0000000000000..fbd3771bff0f3 --- /dev/null +++ b/advisories/unreviewed/2023/02/GHSA-gp5r-64rh-wjrv/GHSA-gp5r-64rh-wjrv.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.3.0", + "id": "GHSA-gp5r-64rh-wjrv", + "modified": "2023-02-23T09:30:17Z", + "published": "2023-02-23T09:30:17Z", + "aliases": [ + "CVE-2023-0939" + ], + "details": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NTN Information Technologies Online Services Software allows SQL Injection.This issue affects Online Services Software: before 1.17.", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0939" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-23-0103" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2023-02-23T08:15:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2023/02/GHSA-mrpv-5pmr-p92h/GHSA-mrpv-5pmr-p92h.json b/advisories/unreviewed/2023/02/GHSA-mrpv-5pmr-p92h/GHSA-mrpv-5pmr-p92h.json new file mode 100644 index 0000000000000..554beb9db3aab --- /dev/null +++ b/advisories/unreviewed/2023/02/GHSA-mrpv-5pmr-p92h/GHSA-mrpv-5pmr-p92h.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.3.0", + "id": "GHSA-mrpv-5pmr-p92h", + "modified": "2023-02-23T09:30:17Z", + "published": "2023-02-23T09:30:17Z", + "aliases": [ + "CVE-2023-25621" + ], + "details": "Privilege Escalation vulnerability in Apache Software Foundation Apache Sling. Any content author is able to create i18n dictionaries in the repository in a location the author has write access to. As these translations are used across the whole product, it allows an author to change any text or dialog in the product. For example an attacker might fool someone by changing the text on a delete button to \"Info\". This issue affects the i18n module of Apache Sling up to version 2.5.18. Version 2.6.2 and higher limit by default i18m dictionaries to certain paths in the repository (/libs and /apps). Users of the module are advised to update to version 2.6.2 or higher, check the configuration for resource loading and then adjust the access permissions for the configured path accordingly.", + "severity": [ + + ], + "affected": [ + + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25621" + }, + { + "type": "WEB", + "url": "https://sling.apache.org/news.html" + } + ], + "database_specific": { + "cwe_ids": [ + + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2023-02-23T09:15:00Z" + } +} \ No newline at end of file