-
Notifications
You must be signed in to change notification settings - Fork 216
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- 2 new CVEs: CVE-2024-54461, CVE-2024-54462 - 0 updated CVEs:
- Loading branch information
cvelistV5 Github Action
committed
Jan 29, 2025
1 parent
24981c8
commit 68c8409
Showing
4 changed files
with
270 additions
and
56 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,119 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-54461", | ||
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "Google", | ||
"dateReserved": "2024-12-03T10:16:06.217Z", | ||
"datePublished": "2025-01-29T11:51:04.255Z", | ||
"dateUpdated": "2025-01-29T11:51:04.255Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"defaultStatus": "unaffected", | ||
"product": "file_selector_android", | ||
"vendor": "Flutter", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "0.5.1+11", | ||
"status": "affected", | ||
"version": "0.5.1", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "<p>The file names constructed within file_selector are missing sanitization checks leaving them vulnerable to malicious document providers. This may result in cases where a user with a malicious document provider installed can select a document file from that provider while using your app and could potentially override internal files in your app cache. Issue patched in 0.5.1+12. It is recommended to update to the latest version of file_selector_android that contains the changes to address this vulnerability.</p>" | ||
} | ||
], | ||
"value": "The file names constructed within file_selector are missing sanitization checks leaving them vulnerable to malicious document providers. This may result in cases where a user with a malicious document provider installed can select a document file from that provider while using your app and could potentially override internal files in your app cache. Issue patched in 0.5.1+12. It is recommended to update to the latest version of file_selector_android that contains the changes to address this vulnerability." | ||
} | ||
], | ||
"impacts": [ | ||
{ | ||
"capecId": "CAPEC-126", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-126 Path Traversal" | ||
} | ||
] | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV4_0": { | ||
"Automatable": "NOT_DEFINED", | ||
"Recovery": "NOT_DEFINED", | ||
"Safety": "NOT_DEFINED", | ||
"attackComplexity": "HIGH", | ||
"attackRequirements": "NONE", | ||
"attackVector": "LOCAL", | ||
"baseScore": 2.1, | ||
"baseSeverity": "LOW", | ||
"privilegesRequired": "LOW", | ||
"providerUrgency": "NOT_DEFINED", | ||
"subAvailabilityImpact": "HIGH", | ||
"subConfidentialityImpact": "NONE", | ||
"subIntegrityImpact": "HIGH", | ||
"userInteraction": "ACTIVE", | ||
"valueDensity": "NOT_DEFINED", | ||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:H/SA:H", | ||
"version": "4.0", | ||
"vulnAvailabilityImpact": "LOW", | ||
"vulnConfidentialityImpact": "NONE", | ||
"vulnIntegrityImpact": "LOW", | ||
"vulnerabilityResponseEffort": "NOT_DEFINED" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-23", | ||
"description": "CWE-23", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778", | ||
"shortName": "Google", | ||
"dateUpdated": "2025-01-29T11:51:04.255Z" | ||
}, | ||
"references": [ | ||
{ | ||
"url": "https://github.com/flutter/packages/security/advisories/GHSA-r465-vhm9-7r5h" | ||
} | ||
], | ||
"source": { | ||
"discovery": "UNKNOWN" | ||
}, | ||
"title": "Unsanitized Filenames in Flutter package file_selector_android Allow File Overwrites", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,119 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-54462", | ||
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "Google", | ||
"dateReserved": "2024-12-03T10:16:06.217Z", | ||
"datePublished": "2025-01-29T11:52:05.386Z", | ||
"dateUpdated": "2025-01-29T11:52:05.386Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"defaultStatus": "unaffected", | ||
"product": "image_picker_android", | ||
"vendor": "Flutter", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "0.8.12+17", | ||
"status": "affected", | ||
"version": "0.8.5+6", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "<p>The file names constructed within image_picker are missing sanitization checks leaving them vulnerable to malicious document providers. This may result in cases where a user with a malicious document provider installed can select an image file from that provider while using your app and could potentially override internal files in your app cache. Issue patched in 0.8.12+18. It is recommended to u<span style=\"background-color: var(--wht);\">pdate to the latest version of image_picker_android that contains the changes to address this vulnerability.</span></p>" | ||
} | ||
], | ||
"value": "The file names constructed within image_picker are missing sanitization checks leaving them vulnerable to malicious document providers. This may result in cases where a user with a malicious document provider installed can select an image file from that provider while using your app and could potentially override internal files in your app cache. Issue patched in 0.8.12+18. It is recommended to update to the latest version of image_picker_android that contains the changes to address this vulnerability." | ||
} | ||
], | ||
"impacts": [ | ||
{ | ||
"capecId": "CAPEC-126", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-126 Path Traversal" | ||
} | ||
] | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV4_0": { | ||
"Automatable": "NOT_DEFINED", | ||
"Recovery": "NOT_DEFINED", | ||
"Safety": "NOT_DEFINED", | ||
"attackComplexity": "HIGH", | ||
"attackRequirements": "NONE", | ||
"attackVector": "LOCAL", | ||
"baseScore": 2.1, | ||
"baseSeverity": "LOW", | ||
"privilegesRequired": "LOW", | ||
"providerUrgency": "NOT_DEFINED", | ||
"subAvailabilityImpact": "HIGH", | ||
"subConfidentialityImpact": "NONE", | ||
"subIntegrityImpact": "HIGH", | ||
"userInteraction": "ACTIVE", | ||
"valueDensity": "NOT_DEFINED", | ||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:H/SA:H", | ||
"version": "4.0", | ||
"vulnAvailabilityImpact": "LOW", | ||
"vulnConfidentialityImpact": "NONE", | ||
"vulnIntegrityImpact": "LOW", | ||
"vulnerabilityResponseEffort": "NOT_DEFINED" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-23", | ||
"description": "CWE-23", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778", | ||
"shortName": "Google", | ||
"dateUpdated": "2025-01-29T11:52:05.386Z" | ||
}, | ||
"references": [ | ||
{ | ||
"url": "https://github.com/flutter/packages/security/advisories/GHSA-98v2-f47x-89xw" | ||
} | ||
], | ||
"source": { | ||
"discovery": "UNKNOWN" | ||
}, | ||
"title": "Unsanitized Filenames in Flutter package image_picker_android Allow File Overwrites", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,50 +1,20 @@ | ||
{ | ||
"fetchTime": "2025-01-29T11:38:05.378Z", | ||
"numberOfChanges": 7, | ||
"new": [], | ||
"updated": [ | ||
"fetchTime": "2025-01-29T11:56:06.063Z", | ||
"numberOfChanges": 2, | ||
"new": [ | ||
{ | ||
"cveId": "CVE-2024-55925", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-55925", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/55xxx/CVE-2024-55925.json", | ||
"dateUpdated": "2025-01-29T11:33:50.927Z" | ||
"cveId": "CVE-2024-54461", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-54461", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/54xxx/CVE-2024-54461.json", | ||
"dateUpdated": "2025-01-29T11:51:04.255Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-55926", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-55926", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/55xxx/CVE-2024-55926.json", | ||
"dateUpdated": "2025-01-29T11:34:21.634Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-55927", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-55927", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/55xxx/CVE-2024-55927.json", | ||
"dateUpdated": "2025-01-29T11:35:36.388Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-55928", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-55928", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/55xxx/CVE-2024-55928.json", | ||
"dateUpdated": "2025-01-29T11:35:56.704Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-55929", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-55929", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/55xxx/CVE-2024-55929.json", | ||
"dateUpdated": "2025-01-29T11:36:18.242Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-55930", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-55930", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/55xxx/CVE-2024-55930.json", | ||
"dateUpdated": "2025-01-29T11:36:38.070Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-55931", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-55931", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/55xxx/CVE-2024-55931.json", | ||
"dateUpdated": "2025-01-29T11:37:01.099Z" | ||
"cveId": "CVE-2024-54462", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-54462", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/54xxx/CVE-2024-54462.json", | ||
"dateUpdated": "2025-01-29T11:52:05.386Z" | ||
} | ||
], | ||
"updated": [], | ||
"error": [] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters