Skip to content

Commit

Permalink
generated content from 2023-11-21
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 21, 2023
1 parent 4d3a447 commit aca3ed8
Show file tree
Hide file tree
Showing 74 changed files with 1,679 additions and 0 deletions.
73 changes: 73 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -218057,3 +218057,76 @@ vulnerability,CVE-2023-6187,vulnerability--92e1369f-48d7-4e3b-8bad-fc63dd4b636d
vulnerability,CVE-2023-41129,vulnerability--eddac17b-fa14-4f99-a3f6-0c6ed62b839d
vulnerability,CVE-2023-28780,vulnerability--0d5d75c5-441e-47a4-89df-9fa6ecc0d5c1
vulnerability,CVE-2023-5341,vulnerability--b459d129-830f-4577-aacb-2770e444222d
vulnerability,CVE-2021-22636,vulnerability--7cf8069e-9b01-462c-856a-6a2376982e07
vulnerability,CVE-2021-27429,vulnerability--53c4209f-013b-44c5-b30d-5b41d5145dcb
vulnerability,CVE-2022-46337,vulnerability--4c08f0c3-2eca-48a0-8641-7f90365a30fb
vulnerability,CVE-2023-38884,vulnerability--63c3a7d0-7374-40c7-b218-cbfb98a91489
vulnerability,CVE-2023-38885,vulnerability--3e54b460-020e-4408-b528-2d16a8ca7518
vulnerability,CVE-2023-38879,vulnerability--77120df7-ba45-4b33-b669-b931d5baa3b5
vulnerability,CVE-2023-38882,vulnerability--9a90fe4c-0363-4fa2-a958-18cd63c5b028
vulnerability,CVE-2023-38880,vulnerability--dcd83285-8e50-4f09-a5ad-2b8c6d9b323a
vulnerability,CVE-2023-38881,vulnerability--93a0977a-b89a-47e2-b11f-104dbcd353f9
vulnerability,CVE-2023-38823,vulnerability--9104e4ed-8432-4bff-b4ef-6870cc53e4b3
vulnerability,CVE-2023-38883,vulnerability--fa4104be-dfcb-4167-95d0-1fb4ebd012cc
vulnerability,CVE-2023-47217,vulnerability--86122faa-3a8b-4ad0-b261-19211aece518
vulnerability,CVE-2023-47175,vulnerability--c8e94c06-cdc7-45fb-bf08-29f1f49d2a39
vulnerability,CVE-2023-47311,vulnerability--c0b24705-87ed-4fbb-abc6-4292e7400f2e
vulnerability,CVE-2023-47417,vulnerability--aa483005-a412-4dd8-9b46-58ffe43a9316
vulnerability,CVE-2023-47172,vulnerability--4b1f658c-9f24-4a27-a191-b19b415a7668
vulnerability,CVE-2023-47772,vulnerability--d0c839c0-8409-4249-b143-ba9f3705f9de
vulnerability,CVE-2023-5610,vulnerability--f4451461-ba85-4444-980d-2f033b44b12a
vulnerability,CVE-2023-5509,vulnerability--d6d5cb2a-5ed9-4049-8bef-1d568afff34e
vulnerability,CVE-2023-5609,vulnerability--e1b2dfca-ef48-47de-9a3e-3c6ef722c07b
vulnerability,CVE-2023-5340,vulnerability--4ee8b2d0-9666-49cd-86bd-c27eb7f990f9
vulnerability,CVE-2023-5140,vulnerability--0b0b4590-778e-43d0-b2c1-8da66a2d42df
vulnerability,CVE-2023-5640,vulnerability--021375a5-0114-4409-b4d4-a964dcfd8b57
vulnerability,CVE-2023-5652,vulnerability--78857509-0ba8-4a01-aadd-bba362f56bb7
vulnerability,CVE-2023-5343,vulnerability--8dd719f0-5244-445a-8b31-c73fff4b1fae
vulnerability,CVE-2023-5593,vulnerability--0f401533-e954-41a5-bf97-68f706699b14
vulnerability,CVE-2023-5651,vulnerability--4eefbaec-b250-40d9-8c0f-cb8972f769b6
vulnerability,CVE-2023-5119,vulnerability--7c3725da-7c8e-478a-9e2e-a6048c09ae9f
vulnerability,CVE-2023-5799,vulnerability--18d2380f-b644-473b-b75e-da52f2e5ce27
vulnerability,CVE-2023-4808,vulnerability--3fa8890c-f406-401a-a4da-7b36e6c887cf
vulnerability,CVE-2023-4824,vulnerability--79108105-0227-44f2-ab23-ad47316a8b03
vulnerability,CVE-2023-4970,vulnerability--5f64a996-7165-46fa-a7b7-5b21b319ee49
vulnerability,CVE-2023-4799,vulnerability--eb21c840-6c74-4588-a93f-48c0ab00560b
vulnerability,CVE-2023-48110,vulnerability--96eb395a-5146-4c44-83ba-f5dc007b1663
vulnerability,CVE-2023-48310,vulnerability--f1099024-204a-4272-86cf-1653d802b4b9
vulnerability,CVE-2023-48192,vulnerability--da62089b-14d6-4ca3-9bdc-314dd8ea9cfb
vulnerability,CVE-2023-48292,vulnerability--2387302b-6dbf-4059-b754-0e0226416d85
vulnerability,CVE-2023-48241,vulnerability--24f63e60-98a7-46ee-9f31-f8064b1d6769
vulnerability,CVE-2023-48051,vulnerability--cda9ecf1-fb52-46ab-8912-da2dd25b486d
vulnerability,CVE-2023-48240,vulnerability--aa25822e-f6dd-467e-a7f0-c741ff87088f
vulnerability,CVE-2023-48218,vulnerability--8f59e6d0-a7dc-4153-958e-ec6a6fdef1c5
vulnerability,CVE-2023-48090,vulnerability--abac584f-ca56-447e-be41-525bb569c37e
vulnerability,CVE-2023-48109,vulnerability--886eb65e-10fa-42b8-b747-d337186775a4
vulnerability,CVE-2023-48293,vulnerability--cd33e5dc-b197-4145-9757-3ca708221265
vulnerability,CVE-2023-48221,vulnerability--f0c5aa86-cb51-4290-bafd-950749742a4c
vulnerability,CVE-2023-48223,vulnerability--58207164-479e-4531-8d2c-dbab1b79b3fd
vulnerability,CVE-2023-48300,vulnerability--76a79d84-8c58-4e49-9a18-073944169ecd
vulnerability,CVE-2023-48176,vulnerability--32bce542-e9e1-4cf6-91e1-57aca40a6fbb
vulnerability,CVE-2023-48309,vulnerability--351d064b-9d8c-44e3-8587-231eae923d73
vulnerability,CVE-2023-48111,vulnerability--97c79490-1ab8-4490-8d71-22987d8349d8
vulnerability,CVE-2023-48039,vulnerability--5c6424ba-14fd-4974-97d7-3a09bd2e9ab7
vulnerability,CVE-2023-35762,vulnerability--aba74958-d561-4a3c-b1d6-eb896bc6b7cf
vulnerability,CVE-2023-6045,vulnerability--f46a1f91-6dc6-4b8a-9863-f6dd66a61b0f
vulnerability,CVE-2023-6062,vulnerability--f52bc8c4-9457-4caf-af8c-2cbc5d7f339b
vulnerability,CVE-2023-6199,vulnerability--3d3c327b-f090-43c6-a3c9-9db4d99ae5dd
vulnerability,CVE-2023-6178,vulnerability--a34c2a96-efa8-4068-8af2-6f7d0ac3fc42
vulnerability,CVE-2023-6197,vulnerability--27adde62-9609-40dc-9c39-b2cbe8b24e7c
vulnerability,CVE-2023-6196,vulnerability--8030b3de-1ff7-421d-94b3-9452803e5229
vulnerability,CVE-2023-6144,vulnerability--bcdb5f02-9a0f-4a21-b98c-7bd6aa05041e
vulnerability,CVE-2023-6142,vulnerability--c59c61dd-62d8-4325-a675-464c1fc4d79d
vulnerability,CVE-2023-3116,vulnerability--ec453fdd-701c-4296-8266-7b361b4a8da7
vulnerability,CVE-2023-3379,vulnerability--ac2f7e54-28c8-4daf-8fd6-bc71f57aabee
vulnerability,CVE-2023-43612,vulnerability--49e05c0a-a10f-4645-a44d-af028bde40e2
vulnerability,CVE-2023-36013,vulnerability--e3d510d6-ca11-4194-929f-de1ad7d1d2ed
vulnerability,CVE-2023-42774,vulnerability--8f94eb78-fded-4c50-b222-975d185fa134
vulnerability,CVE-2023-29155,vulnerability--40e60946-f856-42bf-a9a3-c2c544f209b1
vulnerability,CVE-2023-46100,vulnerability--87718cdd-ca26-41b0-8211-8c853471e542
vulnerability,CVE-2023-46990,vulnerability--cc7d4f69-fddf-4c4b-85e2-218b9f87705d
vulnerability,CVE-2023-46700,vulnerability--ad064360-0fca-46be-ba0f-cc41e4bf12d3
vulnerability,CVE-2023-46471,vulnerability--6d42e8a1-4ff0-49d9-8a40-685966a94905
vulnerability,CVE-2023-46470,vulnerability--c7b49e7b-f8de-4e71-a37c-79daffc89883
vulnerability,CVE-2023-46302,vulnerability--080bcf04-425d-4eff-bbd1-14ee8a84bd1d
vulnerability,CVE-2023-46705,vulnerability--60b38199-7bf1-418b-9c39-8916e8389ae1
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--54797ed6-8c72-4de2-8497-aca876f57fbd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--021375a5-0114-4409-b4d4-a964dcfd8b57",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-21T00:16:55.549345Z",
"modified": "2023-11-21T00:16:55.549345Z",
"name": "CVE-2023-5640",
"description": "The Article Analytics WordPress plugin does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5640"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7716a7c6-9c51-4994-90ea-6d34516953ff",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--080bcf04-425d-4eff-bbd1-14ee8a84bd1d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-21T00:16:57.177339Z",
"modified": "2023-11-21T00:16:57.177339Z",
"name": "CVE-2023-46302",
"description": "Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The bug is caused by snakeyaml https://nvd.nist.gov/vuln/detail/CVE-2022-1471 .\n\nApache Submarine uses JAXRS to define REST endpoints. In order to\nhandle YAML requests (using application/yaml content-type), it defines\na YamlEntityProvider entity provider that will process all incoming\nYAML requests. In order to unmarshal the request, the readFrom method\nis invoked, passing the entityStream containing the user-supplied data in `submarine-server/server-core/src/main/java/org/apache/submarine/server/utils/YamlUtils.java`.\n \nWe have now fixed this issue in the new version by replacing to `jackson-dataformat-yaml`.\nThis issue affects Apache Submarine: from 0.7.0 before 0.8.0. Users are recommended to upgrade to version 0.8.0, which fixes this issue.\nIf using the version smaller than 0.8.0 and not want to upgrade, you can try cherry-pick PR https://github.com/apache/submarine/pull/1054 and rebuild the submart-server image to fix this.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-46302"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cb4c34ed-696b-411b-a070-28066837ef9f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b0b4590-778e-43d0-b2c1-8da66a2d42df",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-21T00:16:55.544442Z",
"modified": "2023-11-21T00:16:55.544442Z",
"name": "CVE-2023-5140",
"description": "The Bonus for Woo WordPress plugin before 5.8.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5140"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1a43c966-3fc8-4ec0-a758-db6c4db803d3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f401533-e954-41a5-bf97-68f706699b14",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-21T00:16:55.565052Z",
"modified": "2023-11-21T00:16:55.565052Z",
"name": "CVE-2023-5593",
"description": "The out-of-bounds write vulnerability in the Windows-based SecuExtender SSL VPN Client software version 4.0.4.0 could allow an authenticated local user to gain a privilege escalation by sending a crafted CREATE message.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5593"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--45fa72e7-2e2d-4465-beac-a56dfc2f8b95",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--18d2380f-b644-473b-b75e-da52f2e5ce27",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-21T00:16:55.57231Z",
"modified": "2023-11-21T00:16:55.57231Z",
"name": "CVE-2023-5799",
"description": "The WP Hotel Booking WordPress plugin before 2.0.8 does not have proper authorisation when deleting a package, allowing Contributor and above roles to delete posts that do no belong to them",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5799"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3bf216c5-b728-409b-b3e2-ea5aaec54633",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2387302b-6dbf-4059-b754-0e0226416d85",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-21T00:16:55.810124Z",
"modified": "2023-11-21T00:16:55.810124Z",
"name": "CVE-2023-48292",
"description": "The XWiki Admin Tools Application provides tools to help the administration of XWiki. Starting in version 4.4 and prior to version 4.5.1, a cross site request forgery vulnerability in the admin tool for executing shell commands on the server allows an attacker to execute arbitrary shell commands by tricking an admin into loading the URL with the shell command. A very simple possibility for an attack are comments. When the attacker can leave a comment on any page in the wiki it is sufficient to include an image with an URL like `/xwiki/bin/view/Admin/RunShellCommand?command=touch%20/tmp/attacked` in the comment. When an admin views the comment, the file `/tmp/attacked` will be created on the server. The output of the command is also vulnerable to XWiki syntax injection which offers a simple way to execute Groovy in the context of the XWiki installation and thus an even easier way to compromise the integrity and confidentiality of the whole XWiki installation. This has been patched by adding a form token check in version 4.5.1 of the admin tools. Some workarounds are available. The patch can be applied manually to the affected wiki pages. Alternatively, the document `Admin.RunShellCommand` can also be deleted if the possibility to run shell commands isn't needed.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48292"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f303c5e6-4a4e-4fcc-b8b7-9cb9d30c3352",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--24f63e60-98a7-46ee-9f31-f8064b1d6769",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-21T00:16:55.811701Z",
"modified": "2023-11-21T00:16:55.811701Z",
"name": "CVE-2023-48241",
"description": "XWiki Platform is a generic wiki platform. Starting in version 6.3-milestone-2 and prior to versions 14.10.15, 15.5.1, and 15.6RC1, the Solr-based search suggestion provider that also duplicates as generic JavaScript API for search results in XWiki exposes the content of all documents of all wikis to anybody who has access to it, by default it is public. This exposes all information stored in the wiki (but not some protected information like password hashes). While there is a right check normally, the right check can be circumvented by explicitly requesting fields from Solr that don't include the data for the right check. This has been fixed in XWiki 15.6RC1, 15.5.1 and 14.10.15 by not listing documents whose rights cannot be checked. No known workarounds are available.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48241"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7ea3ea1a-0e38-46ee-913c-7fee11edd9e7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--27adde62-9609-40dc-9c39-b2cbe8b24e7c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-21T00:16:55.972012Z",
"modified": "2023-11-21T00:16:55.972012Z",
"name": "CVE-2023-6197",
"description": "The Audio Merchant plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.0.4. This is due to missing or incorrect nonce validation on the audio_merchant_save_settings function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6197"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3c72ff22-39a9-4cc2-985a-8f3593621daf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--32bce542-e9e1-4cf6-91e1-57aca40a6fbb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-21T00:16:55.845047Z",
"modified": "2023-11-21T00:16:55.845047Z",
"name": "CVE-2023-48176",
"description": "An Insecure Permissions issue in WebsiteGuide v.0.2 allows a remote attacker to gain escalated privileges via crafted jwt (JSON web token).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48176"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8ffa0da9-0b0d-4241-9468-916f38d3c701",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--351d064b-9d8c-44e3-8587-231eae923d73",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-21T00:16:55.846133Z",
"modified": "2023-11-21T00:16:55.846133Z",
"name": "CVE-2023-48309",
"description": "NextAuth.js provides authentication for Next.js. `next-auth` applications prior to version 4.24.5 that rely on the default Middleware authorization are affected by a vulnerability. A bad actor could create an empty/mock user, by getting hold of a NextAuth.js-issued JWT from an interrupted OAuth sign-in flow (state, PKCE or nonce). Manually overriding the `next-auth.session-token` cookie value with this non-related JWT would let the user simulate a logged in user, albeit having no user information associated with it. (The only property on this user is an opaque randomly generated string). This vulnerability does not give access to other users' data, neither to resources that require proper authorization via scopes or other means. The created mock user has no information associated with it (ie. no name, email, access_token, etc.) This vulnerability can be exploited by bad actors to peek at logged in user states (e.g. dashboard layout). `next-auth` `v4.24.5` contains a patch for the vulnerability. As a workaround, using a custom authorization callback for Middleware, developers can manually do a basic authentication.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48309"
}
]
}
]
}
Loading

0 comments on commit aca3ed8

Please sign in to comment.