Updates after review

patch-1
sullo 2023-04-18 09:53:50 -04:00
parent 8be127b7cb
commit 4126332ae6
4 changed files with 6 additions and 6 deletions

View File

@ -1,10 +1,10 @@
id: CVE-2019-10405
info:
name: Jenkins <=2.196 - Cross-Site Scripting
name: Jenkins <=2.196 - Cookie Exposure
author: c-sh0
severity: medium
description: Jenkins through 2.196, LTS 2.176.3 and earlier, contains a cross-site scripting vulnerability. An attacker can print the value of the cookie on the /whoAmI/ URL despite it being marked HttpOnly, thus making it possible to inject arbitrary script in the browser of an unsuspecting user, steal cookie-based authentication credentials and launch other attacks.
description: Jenkins through 2.196, LTS 2.176.3 and earlier prints the value of the cookie on the /whoAmI/ URL despite it being marked HttpOnly, thus making it possible to steal cookie-based authentication credentials if the URL is exposed or accessed via another cross-site scripting issue.
reference:
- https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1505
- http://www.openwall.com/lists/oss-security/2019/09/25/3

View File

@ -1,10 +1,10 @@
id: CVE-2020-5775
info:
name: Canvas 2020-07-29 - Blind Server-Side Request Forgery
name: Canvas LMS v2020-07-29 - Blind Server-Side Request Forgery
author: alph4byt3
severity: medium
description: Canvas 2020-07-29 is susceptible to blind server-side request forgery. An attacker can cause Canvas to perform HTTP GET requests to arbitrary domains and thus potentially access sensitive information, modify data, and/or execute unauthorized operations.
description: Canvas version 2020-07-29 is susceptible to blind server-side request forgery. An attacker can cause Canvas to perform HTTP GET requests to arbitrary domains and thus potentially access sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://www.tenable.com/security/research/tra-2020-49
- https://nvd.nist.gov/vuln/detail/CVE-2020-5775

View File

@ -2,7 +2,7 @@ id: CVE-2022-46169
info:
name: Cacti <=1.2.22 - Remote Command Injection
author: Hardik-Solanki
author: Hardik-Solanki,j4vaovo
severity: critical
description: |
Cacti through 1.2.22 is susceptible to remote command injection. There is insufficient authorization within the remote agent when handling HTTP requests with a custom Forwarded-For HTTP header. An attacker can send a specially crafted HTTP request to the affected instance and execute arbitrary OS commands on the server, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.

View File

@ -4,7 +4,7 @@ info:
name: OpenX Login Panel - Detect
author: pikpikcu
severity: info
description: OpenX login panel was detected.
description: OpenX login panel was detected. Note that OpenX is now Revive Adserver.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0