@@ -3,7 +3,7 @@ Use of this source code is governed by a BSD-style
3
3
license that can be found in the LICENSE file.
4
4
5
5
Repo in the shape of "https://github.com/CVEProject/cvelistV5".
6
- Updated with real data 2024-06-05T20 :00:00-04:00.
6
+ Updated with real data 2024-07-18T20 :00:00-04:00.
7
7
Auto-generated; do not edit directly.
8
8
9
9
-- README.md --
@@ -1471,6 +1471,128 @@ ignore me please
1471
1471
}
1472
1472
}
1473
1473
}
1474
+ -- cves/2024/21xxx/CVE-2024-21527.json --
1475
+ {
1476
+ "dataType": "CVE_RECORD",
1477
+ "dataVersion": "5.1",
1478
+ "cveMetadata": {
1479
+ "cveId": "CVE-2024-21527",
1480
+ "assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
1481
+ "state": "PUBLISHED",
1482
+ "assignerShortName": "snyk",
1483
+ "dateReserved": "2023-12-22T12:33:20.122Z",
1484
+ "datePublished": "2024-07-19T05:00:04.457Z",
1485
+ "dateUpdated": "2024-07-19T05:00:04.457Z"
1486
+ },
1487
+ "containers": {
1488
+ "cna": {
1489
+ "metrics": [
1490
+ {
1491
+ "cvssV3_1": {
1492
+ "version": "3.1",
1493
+ "attackVector": "NETWORK",
1494
+ "attackComplexity": "LOW",
1495
+ "privilegesRequired": "NONE",
1496
+ "userInteraction": "NONE",
1497
+ "scope": "UNCHANGED",
1498
+ "confidentialityImpact": "HIGH",
1499
+ "integrityImpact": "LOW",
1500
+ "availabilityImpact": "NONE",
1501
+ "baseScore": 8.2,
1502
+ "baseSeverity": "HIGH",
1503
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P"
1504
+ }
1505
+ }
1506
+ ],
1507
+ "credits": [
1508
+ {
1509
+ "value": "Filip Ochnik",
1510
+ "lang": "en"
1511
+ }
1512
+ ],
1513
+ "problemTypes": [
1514
+ {
1515
+ "descriptions": [
1516
+ {
1517
+ "cweId": "CWE-918",
1518
+ "description": "Server-side Request Forgery (SSRF)",
1519
+ "lang": "en"
1520
+ }
1521
+ ]
1522
+ }
1523
+ ],
1524
+ "providerMetadata": {
1525
+ "orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
1526
+ "shortName": "snyk",
1527
+ "dateUpdated": "2024-07-19T05:00:04.457Z"
1528
+ },
1529
+ "descriptions": [
1530
+ {
1531
+ "value": "Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src=\"\\\\localhost/etc/passwd\">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system.\r\r Workaround\rAn alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.",
1532
+ "lang": "en"
1533
+ }
1534
+ ],
1535
+ "references": [
1536
+ {
1537
+ "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGGOTENBERG-7537081"
1538
+ },
1539
+ {
1540
+ "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESCHROMIUM-7537082"
1541
+ },
1542
+ {
1543
+ "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESWEBHOOK-7537083"
1544
+ },
1545
+ {
1546
+ "url": "https://github.com/gotenberg/gotenberg/releases/tag/v8.1.0"
1547
+ },
1548
+ {
1549
+ "url": "https://github.com/gotenberg/gotenberg/commit/ad152e62e5124b673099a9103eb6e7f933771794"
1550
+ },
1551
+ {
1552
+ "url": "https://gist.github.com/filipochnik/bc88a3d1cc17c07cec391ee98e1e6356"
1553
+ }
1554
+ ],
1555
+ "affected": [
1556
+ {
1557
+ "product": "github.com/gotenberg/gotenberg/v8/pkg/gotenberg",
1558
+ "versions": [
1559
+ {
1560
+ "version": "0",
1561
+ "lessThan": "8.1.0",
1562
+ "status": "affected",
1563
+ "versionType": "semver"
1564
+ }
1565
+ ],
1566
+ "vendor": "n/a"
1567
+ },
1568
+ {
1569
+ "product": "github.com/gotenberg/gotenberg/v8/pkg/modules/chromium",
1570
+ "versions": [
1571
+ {
1572
+ "version": "0",
1573
+ "lessThan": "8.1.0",
1574
+ "status": "affected",
1575
+ "versionType": "semver"
1576
+ }
1577
+ ],
1578
+ "vendor": "n/a"
1579
+ },
1580
+ {
1581
+ "product": "github.com/gotenberg/gotenberg/v8/pkg/modules/webhook",
1582
+ "versions": [
1583
+ {
1584
+ "version": "0",
1585
+ "lessThan": "8.1.0",
1586
+ "status": "affected",
1587
+ "versionType": "semver"
1588
+ }
1589
+ ],
1590
+ "vendor": "n/a"
1591
+ }
1592
+ ]
1593
+ }
1594
+ }
1595
+ }
1474
1596
-- cves/2024/3xxx/CVE-2024-3094.json --
1475
1597
{
1476
1598
"dataType": "CVE_RECORD",
@@ -1804,15 +1926,15 @@ ignore me please
1804
1926
-- cves/2024/33xxx/CVE-2024-33522.json --
1805
1927
{
1806
1928
"dataType": "CVE_RECORD",
1807
- "dataVersion": "5.0 ",
1929
+ "dataVersion": "5.1 ",
1808
1930
"cveMetadata": {
1809
1931
"cveId": "CVE-2024-33522",
1810
1932
"assignerOrgId": "e6d453f4-3dae-4941-bcea-9af25f4e824d",
1811
1933
"state": "PUBLISHED",
1812
1934
"assignerShortName": "Tigera",
1813
1935
"dateReserved": "2024-04-23T16:32:33.170Z",
1814
1936
"datePublished": "2024-04-29T22:19:06.908Z",
1815
- "dateUpdated": "2024-04-29T22:19:06.908Z "
1937
+ "dateUpdated": "2024-06-12T17:09:59.549Z "
1816
1938
},
1817
1939
"containers": {
1818
1940
"cna": {
@@ -2011,6 +2133,112 @@ ignore me please
2011
2133
"x_generator": {
2012
2134
"engine": "Vulnogram 0.1.0-dev"
2013
2135
}
2014
- }
2136
+ },
2137
+ "adp": [
2138
+ {
2139
+ "affected": [
2140
+ {
2141
+ "vendor": "tigera",
2142
+ "product": "calico",
2143
+ "cpes": [
2144
+ "cpe:2.3:a:tigera:calico:*:*:*:*:*:*:*:*"
2145
+ ],
2146
+ "defaultStatus": "unaffected",
2147
+ "versions": [
2148
+ {
2149
+ "version": "0",
2150
+ "status": "affected",
2151
+ "lessThan": "v3.26.5",
2152
+ "versionType": "semver"
2153
+ },
2154
+ {
2155
+ "version": "v3.27.0",
2156
+ "status": "affected",
2157
+ "lessThan": "v3.27.3",
2158
+ "versionType": "semver"
2159
+ },
2160
+ {
2161
+ "version": "v3.28.0",
2162
+ "status": "unaffected"
2163
+ }
2164
+ ]
2165
+ },
2166
+ {
2167
+ "vendor": "tigera",
2168
+ "product": "calico_enterprise",
2169
+ "cpes": [
2170
+ "cpe:2.3:a:tigera:calico_enterprise:*:*:*:*:*:*:*:*"
2171
+ ],
2172
+ "defaultStatus": "unaffected",
2173
+ "versions": [
2174
+ {
2175
+ "version": "0",
2176
+ "status": "affected",
2177
+ "lessThan": "v3.17.4",
2178
+ "versionType": "semver"
2179
+ },
2180
+ {
2181
+ "version": "v3.18.0",
2182
+ "status": "affected",
2183
+ "lessThan": "v3.18.2",
2184
+ "versionType": "semver"
2185
+ },
2186
+ {
2187
+ "version": "v3.19.0-1.0",
2188
+ "status": "affected",
2189
+ "lessThan": "v3.19.0-2.0",
2190
+ "versionType": "semver"
2191
+ }
2192
+ ]
2193
+ },
2194
+ {
2195
+ "vendor": "tigera",
2196
+ "product": "calico_cloud",
2197
+ "cpes": [
2198
+ "cpe:2.3:a:tigera:calico_cloud:*:*:*:*:*:*:*:*"
2199
+ ],
2200
+ "defaultStatus": "unaffected",
2201
+ "versions": [
2202
+ {
2203
+ "version": "0",
2204
+ "status": "affected",
2205
+ "lessThan": "v19.3.0",
2206
+ "versionType": "semver"
2207
+ }
2208
+ ]
2209
+ }
2210
+ ],
2211
+ "metrics": [
2212
+ {
2213
+ "other": {
2214
+ "type": "ssvc",
2215
+ "content": {
2216
+ "timestamp": "2024-06-12T16:51:23.967533Z",
2217
+ "id": "CVE-2024-33522",
2218
+ "options": [
2219
+ {
2220
+ "Exploitation": "none"
2221
+ },
2222
+ {
2223
+ "Automatable": "no"
2224
+ },
2225
+ {
2226
+ "Technical Impact": "total"
2227
+ }
2228
+ ],
2229
+ "role": "CISA Coordinator",
2230
+ "version": "2.0.3"
2231
+ }
2232
+ }
2233
+ }
2234
+ ],
2235
+ "title": "CISA ADP Vulnrichment",
2236
+ "providerMetadata": {
2237
+ "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
2238
+ "shortName": "CISA-ADP",
2239
+ "dateUpdated": "2024-06-12T17:09:59.549Z"
2240
+ }
2241
+ }
2242
+ ]
2015
2243
}
2016
2244
}
0 commit comments