-
Notifications
You must be signed in to change notification settings - Fork 17
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto-Update: 2025-01-24T17:00:32.072783+00:00
- Loading branch information
1 parent
9c51232
commit b8e02dc
Showing
108 changed files
with
6,169 additions
and
615 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2020-13377", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-05-12T11:15:12.560", | ||
"lastModified": "2024-11-21T05:01:07.813", | ||
"lastModified": "2025-01-24T16:15:27.070", | ||
"vulnStatus": "Modified", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -32,6 +32,26 @@ | |
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 5.2 | ||
}, | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", | ||
"baseScore": 8.1, | ||
"baseSeverity": "HIGH", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"availabilityImpact": "NONE" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 5.2 | ||
} | ||
] | ||
}, | ||
|
@@ -45,6 +65,16 @@ | |
"value": "CWE-22" | ||
} | ||
] | ||
}, | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-22" | ||
} | ||
] | ||
} | ||
], | ||
"configurations": [ | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2020-13378", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-05-12T01:15:09.023", | ||
"lastModified": "2024-11-21T05:01:07.997", | ||
"lastModified": "2025-01-24T16:15:27.830", | ||
"vulnStatus": "Modified", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -32,6 +32,26 @@ | |
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 5.9 | ||
}, | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", | ||
"baseScore": 8.8, | ||
"baseSeverity": "HIGH", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"availabilityImpact": "HIGH" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 5.9 | ||
} | ||
] | ||
}, | ||
|
@@ -45,6 +65,16 @@ | |
"value": "CWE-78" | ||
} | ||
] | ||
}, | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-78" | ||
} | ||
] | ||
} | ||
], | ||
"configurations": [ | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,16 +2,55 @@ | |
"id": "CVE-2021-42718", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2025-01-23T23:15:07.717", | ||
"lastModified": "2025-01-23T23:15:07.717", | ||
"vulnStatus": "Received", | ||
"lastModified": "2025-01-24T15:15:08.273", | ||
"vulnStatus": "Awaiting Analysis", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Information Disclosure in API in Replicated Replicated Classic versions prior to 2.53.1 on all platforms allows authenticated users with Admin Console access to retrieve sensitive data, including application secrets, via accessing container definitions with environment variables through the Admin Console API on port 8800.\n\nThis CVE was originally reserved in 2021 and later publicly disclosed by Replicated on their website on 21 October 2021. However, it mistakenly remained in the Reserved But Public (RBP) status with the CVE Numbering Authority (CNA). Please note that this product reached its end of life on 31 December 2024. Publishing this CVE with the CNA was required to comply with CNA rules, despite the fact that the issue was disclosed and fixed four years ago, and the affected product is no longer supported as of 2024.\n\nSummary of VulnerabilityThis advisory discloses a low severity security vulnerability in the versions of Replicated Classic listed above (\u201cAffected Replicated Classic Versions\u201d)\n\nDescriptionReplicated Classic versions prior to 2.53.1 have an authenticated API from the Replicated Admin Console that may expose sensitive data including application secrets, depending on how the application manifests are written. A user with valid credentials and access to the Admin Console port (8800) on the Replicated Classic server can retrieve container definitions including environment variables which may contain passwords and other secrets depending on how the application is configured.\n\nThis data is shared over authenticated sessions to the Admin Console only, and was never displayed or used in the application processing. To remediate this issue, we removed the sensitive data from the API, sending only the data to the Admin Console that was needed.\n\nTimelineThis issue was discovered during a security review on 16 September 2021.\nPatched versions were released on 23 September 2021.\nThis advisory was published on 21 October 2021.\n\n\nThe CVE Numbering Authority (CNA) notified Replicated on 23 January 2025 that the CVE was still in Reserved But Public (RBP) status. Upon discovering the oversight in updating the status to published with the CNA, Replicated submitted the updated report on the same day, 23 January 2025." | ||
}, | ||
{ | ||
"lang": "es", | ||
"value": "Divulgaci\u00f3n de informaci\u00f3n en la API en Replicated Las versiones cl\u00e1sicas de Replicated anteriores a la 2.53.1 en todas las plataformas permiten a los usuarios autenticados con acceso a la Consola de administraci\u00f3n recuperar datos confidenciales, incluidos los secretos de la aplicaci\u00f3n, mediante el acceso a las definiciones de contenedor con variables de entorno a trav\u00e9s de la API de la Consola de administraci\u00f3n en el puerto 8800. Esta CVE se reserv\u00f3 originalmente en 2021 y luego Replicated la divulg\u00f3 p\u00fablicamente en su sitio web el 21 de octubre de 2021. Sin embargo, permaneci\u00f3 por error en el estado Reservado pero p\u00fablico (RBP) con la Autoridad de numeraci\u00f3n de CVE (CNA). Tenga en cuenta que este producto lleg\u00f3 al final de su vida \u00fatil el 31 de diciembre de 2024. La publicaci\u00f3n de este CVE con la CNA fue necesaria para cumplir con las reglas de la CNA, a pesar del hecho de que el problema se divulg\u00f3 y solucion\u00f3 hace cuatro a\u00f1os, y el producto afectado ya no recibe soporte a partir de 2024. Resumen de la vulnerabilidadEste aviso revela una vulnerabilidad de seguridad de baja gravedad en las versiones de Replicated Classic enumeradas anteriormente (\"Versiones de Replicated Classic afectadas\") Descripci\u00f3nLas versiones de Replicated Classic anteriores a 2.53.1 tienen una API autenticada de la Consola de administraci\u00f3n de Replicated que puede exponer datos confidenciales, incluidos secretos de la aplicaci\u00f3n, seg\u00fan c\u00f3mo se escriban los manifiestos de la aplicaci\u00f3n. Un usuario con credenciales v\u00e1lidas y acceso al puerto de la Consola de administraci\u00f3n (8800) en el servidor de Replicated Classic puede recuperar definiciones de contenedor, incluidas variables de entorno que pueden contener contrase\u00f1as y otros secretos seg\u00fan c\u00f3mo est\u00e9 configurada la aplicaci\u00f3n. Estos datos se comparten a trav\u00e9s de sesiones autenticadas solo con la Consola de administraci\u00f3n, y nunca se mostraron ni se usaron en el procesamiento de la aplicaci\u00f3n. Para solucionar este problema, eliminamos los datos confidenciales de la API y enviamos solo los datos necesarios a la consola de administraci\u00f3n. Cronolog\u00edaEste problema se descubri\u00f3 durante una revisi\u00f3n de seguridad el 16 de septiembre de 2021. Las versiones parcheadas se publicaron el 23 de septiembre de 2021. Este aviso se public\u00f3 el 21 de octubre de 2021. La autoridad de numeraci\u00f3n de CVE (CNA) notific\u00f3 a Replicated el 23 de enero de 2025 que la CVE todav\u00eda estaba en estado de reservada pero p\u00fablica (RBP). Al descubrir el descuido al actualizar el estado a publicado con la CNA, Replicated envi\u00f3 el informe actualizado el mismo d\u00eda, 23 de enero de 2025." | ||
} | ||
], | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", | ||
"baseScore": 4.9, | ||
"baseSeverity": "MEDIUM", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "HIGH", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "NONE", | ||
"availabilityImpact": "NONE" | ||
}, | ||
"exploitabilityScore": 1.2, | ||
"impactScore": 3.6 | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-922" | ||
} | ||
] | ||
} | ||
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "https://www.replicated.com/cve-2021-42718", | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,16 +2,51 @@ | |
"id": "CVE-2022-47090", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2025-01-24T14:15:29.983", | ||
"lastModified": "2025-01-24T14:15:29.983", | ||
"vulnStatus": "Received", | ||
"lastModified": "2025-01-24T15:15:09.350", | ||
"vulnStatus": "Awaiting Analysis", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "GPAC MP4box 2.1-DEV-rev574-g9d5bb184b contains a buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c, check needed for num_exp_tile_columns" | ||
} | ||
], | ||
"metrics": {}, | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", | ||
"baseScore": 7.8, | ||
"baseSeverity": "HIGH", | ||
"attackVector": "LOCAL", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "REQUIRED", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"availabilityImpact": "HIGH" | ||
}, | ||
"exploitabilityScore": 1.8, | ||
"impactScore": 5.9 | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-120" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://github.com/gpac/gpac/commit/48760768611f6766bf9e7378bb7cc66cebd6e49d", | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2022-47879", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-05-12T14:15:09.567", | ||
"lastModified": "2024-11-21T07:32:27.340", | ||
"lastModified": "2025-01-24T16:15:28.653", | ||
"vulnStatus": "Modified", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -32,6 +32,26 @@ | |
}, | ||
"exploitabilityScore": 1.6, | ||
"impactScore": 5.9 | ||
}, | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", | ||
"baseScore": 7.5, | ||
"baseSeverity": "HIGH", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "HIGH", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"availabilityImpact": "HIGH" | ||
}, | ||
"exploitabilityScore": 1.6, | ||
"impactScore": 5.9 | ||
} | ||
] | ||
}, | ||
|
@@ -45,6 +65,16 @@ | |
"value": "NVD-CWE-noinfo" | ||
} | ||
] | ||
}, | ||
{ | ||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-94" | ||
} | ||
] | ||
} | ||
], | ||
"configurations": [ | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.