Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2025-AVI-0838
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.109 | ||
Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2406 antérieures à 9.2.2406.123 | ||
Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2408 antérieures à 9.3.2408.119 | ||
Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.1 | ||
Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406 antérieures à 9.2.2406.123 | ||
Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.0 | ||
Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.8 | ||
Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.4 | ||
Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.6 | ||
Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411 antérieures à 9.3.2411.108 | ||
Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408 antérieures à 9.3.2408.118 | ||
Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.111 |
References
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.109", "product": { "name": "Splunk Cloud Platform", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Cloud Platform versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123", "product": { "name": "Splunk Cloud Platform", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Cloud Platform versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.119", "product": { "name": "Splunk Cloud Platform", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.1", "product": { "name": "Splunk Enterprise", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Enterprise Cloud versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123", "product": { "name": "Splunk Enterprise", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.0", "product": { "name": "Splunk Enterprise", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.8", "product": { "name": "Splunk Enterprise", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.4", "product": { "name": "Splunk Enterprise", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.6", "product": { "name": "Splunk Enterprise", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Enterprise Cloud versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.108", "product": { "name": "Splunk Enterprise", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Enterprise Cloud versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.118", "product": { "name": "Splunk Enterprise", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.111", "product": { "name": "Splunk Cloud Platform", "vendor": { "name": "Splunk", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2021-44906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906" }, { "name": "CVE-2022-46175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175" }, { "name": "CVE-2015-5237", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5237" }, { "name": "CVE-2025-20367", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20367" }, { "name": "CVE-2024-7553", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7553" }, { "name": "CVE-2025-20366", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20366" }, { "name": "CVE-2025-52999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999" }, { "name": "CVE-2022-37601", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37601" }, { "name": "CVE-2025-20370", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20370" }, { "name": "CVE-2024-45337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337" }, { "name": "CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "name": "CVE-2025-20369", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20369" }, { "name": "CVE-2025-5025", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5025" }, { "name": "CVE-2024-1351", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1351" }, { "name": "CVE-2025-20371", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20371" }, { "name": "CVE-2025-20368", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20368" }, { "name": "CVE-2025-32415", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415" }, { "name": "CVE-2025-4947", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4947" }, { "name": "CVE-2025-0725", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725" }, { "name": "CVE-2025-0167", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167" } ], "initial_release_date": "2025-10-02T00:00:00", "last_revision_date": "2025-10-02T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0838", "revisions": [ { "description": "Version initiale", "revision_date": "2025-10-02T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk", "vendor_advisories": [ { "published_at": "2025-10-01", "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1006", "url": "https://advisory.splunk.com/advisories/SVD-2025-1006" }, { "published_at": "2025-10-01", "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1005", "url": "https://advisory.splunk.com/advisories/SVD-2025-1005" }, { "published_at": "2025-10-01", "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1002", "url": "https://advisory.splunk.com/advisories/SVD-2025-1002" }, { "published_at": "2025-10-01", "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1004", "url": "https://advisory.splunk.com/advisories/SVD-2025-1004" }, { "published_at": "2025-10-01", "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1007", "url": "https://advisory.splunk.com/advisories/SVD-2025-1007" }, { "published_at": "2025-10-01", "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1003", "url": "https://advisory.splunk.com/advisories/SVD-2025-1003" }, { "published_at": "2025-10-01", "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1001", "url": "https://advisory.splunk.com/advisories/SVD-2025-1001" } ] }
CVE-2025-0167 (GCVE-0-2025-0167)
Vulnerability from cvelistv5
Published
2025-02-05 09:15
Modified
2025-03-07 00:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
When asked to use a `.netrc` file for credentials **and** to follow HTTP
redirects, curl could leak the password used for the first host to the
followed-to host under certain circumstances.
This flaw only manifests itself if the netrc file has a `default` entry that
omits both login and password. A rare circumstance.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
curl | curl |
Version: 8.11.1 ≤ 8.11.1 Version: 8.11.0 ≤ 8.11.0 Version: 8.10.1 ≤ 8.10.1 Version: 8.10.0 ≤ 8.10.0 Version: 8.9.1 ≤ 8.9.1 Version: 8.9.0 ≤ 8.9.0 Version: 8.8.0 ≤ 8.8.0 Version: 8.7.1 ≤ 8.7.1 Version: 8.7.0 ≤ 8.7.0 Version: 8.6.0 ≤ 8.6.0 Version: 8.5.0 ≤ 8.5.0 Version: 8.4.0 ≤ 8.4.0 Version: 8.3.0 ≤ 8.3.0 Version: 8.2.1 ≤ 8.2.1 Version: 8.2.0 ≤ 8.2.0 Version: 8.1.2 ≤ 8.1.2 Version: 8.1.1 ≤ 8.1.1 Version: 8.1.0 ≤ 8.1.0 Version: 8.0.1 ≤ 8.0.1 Version: 8.0.0 ≤ 8.0.0 Version: 7.88.1 ≤ 7.88.1 Version: 7.88.0 ≤ 7.88.0 Version: 7.87.0 ≤ 7.87.0 Version: 7.86.0 ≤ 7.86.0 Version: 7.85.0 ≤ 7.85.0 Version: 7.84.0 ≤ 7.84.0 Version: 7.83.1 ≤ 7.83.1 Version: 7.83.0 ≤ 7.83.0 Version: 7.82.0 ≤ 7.82.0 Version: 7.81.0 ≤ 7.81.0 Version: 7.80.0 ≤ 7.80.0 Version: 7.79.1 ≤ 7.79.1 Version: 7.79.0 ≤ 7.79.0 Version: 7.78.0 ≤ 7.78.0 Version: 7.77.0 ≤ 7.77.0 Version: 7.76.1 ≤ 7.76.1 Version: 7.76.0 ≤ 7.76.0 |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-0167", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T15:52:41.551530Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-06T14:48:00.488Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://curl.se/docs/CVE-2025-0167.html" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-03-07T00:10:48.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20250306-0008/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "curl", "vendor": "curl", "versions": [ { "lessThanOrEqual": "8.11.1", "status": "affected", "version": "8.11.1", "versionType": "semver" }, { "lessThanOrEqual": "8.11.0", "status": "affected", "version": "8.11.0", "versionType": "semver" }, { "lessThanOrEqual": "8.10.1", "status": "affected", "version": "8.10.1", "versionType": "semver" }, { "lessThanOrEqual": "8.10.0", "status": "affected", "version": "8.10.0", "versionType": "semver" }, { "lessThanOrEqual": "8.9.1", "status": "affected", "version": "8.9.1", "versionType": "semver" }, { "lessThanOrEqual": "8.9.0", "status": "affected", "version": "8.9.0", "versionType": "semver" }, { "lessThanOrEqual": "8.8.0", "status": "affected", "version": "8.8.0", "versionType": "semver" }, { "lessThanOrEqual": "8.7.1", "status": "affected", "version": "8.7.1", "versionType": "semver" }, { "lessThanOrEqual": "8.7.0", "status": "affected", "version": "8.7.0", "versionType": "semver" }, { "lessThanOrEqual": "8.6.0", "status": "affected", "version": "8.6.0", "versionType": "semver" }, { "lessThanOrEqual": "8.5.0", "status": "affected", "version": "8.5.0", "versionType": "semver" }, { "lessThanOrEqual": "8.4.0", "status": "affected", "version": "8.4.0", "versionType": "semver" }, { "lessThanOrEqual": "8.3.0", "status": "affected", "version": "8.3.0", "versionType": "semver" }, { "lessThanOrEqual": "8.2.1", "status": "affected", "version": "8.2.1", "versionType": "semver" }, { "lessThanOrEqual": "8.2.0", "status": "affected", "version": "8.2.0", "versionType": "semver" }, { "lessThanOrEqual": "8.1.2", "status": "affected", "version": "8.1.2", "versionType": "semver" }, { "lessThanOrEqual": "8.1.1", "status": "affected", "version": "8.1.1", "versionType": "semver" }, { "lessThanOrEqual": "8.1.0", "status": "affected", "version": "8.1.0", "versionType": "semver" }, { "lessThanOrEqual": "8.0.1", "status": "affected", "version": "8.0.1", "versionType": "semver" }, { "lessThanOrEqual": "8.0.0", "status": "affected", "version": "8.0.0", "versionType": "semver" }, { "lessThanOrEqual": "7.88.1", "status": "affected", "version": "7.88.1", "versionType": "semver" }, { "lessThanOrEqual": "7.88.0", "status": "affected", "version": "7.88.0", "versionType": "semver" }, { "lessThanOrEqual": "7.87.0", "status": "affected", "version": "7.87.0", "versionType": "semver" }, { "lessThanOrEqual": "7.86.0", "status": "affected", "version": "7.86.0", "versionType": "semver" }, { "lessThanOrEqual": "7.85.0", "status": "affected", "version": "7.85.0", "versionType": "semver" }, { "lessThanOrEqual": "7.84.0", "status": "affected", "version": "7.84.0", "versionType": "semver" }, { "lessThanOrEqual": "7.83.1", "status": "affected", "version": "7.83.1", "versionType": "semver" }, { "lessThanOrEqual": "7.83.0", "status": "affected", "version": "7.83.0", "versionType": "semver" }, { "lessThanOrEqual": "7.82.0", "status": "affected", "version": "7.82.0", "versionType": "semver" }, { "lessThanOrEqual": "7.81.0", "status": "affected", "version": "7.81.0", "versionType": "semver" }, { "lessThanOrEqual": "7.80.0", "status": "affected", "version": "7.80.0", "versionType": "semver" }, { "lessThanOrEqual": "7.79.1", "status": "affected", "version": "7.79.1", "versionType": "semver" }, { "lessThanOrEqual": "7.79.0", "status": "affected", "version": "7.79.0", "versionType": "semver" }, { "lessThanOrEqual": "7.78.0", "status": "affected", "version": "7.78.0", "versionType": "semver" }, { "lessThanOrEqual": "7.77.0", "status": "affected", "version": "7.77.0", "versionType": "semver" }, { "lessThanOrEqual": "7.76.1", "status": "affected", "version": "7.76.1", "versionType": "semver" }, { "lessThanOrEqual": "7.76.0", "status": "affected", "version": "7.76.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Yihang Zhou" }, { "lang": "en", "type": "remediation developer", "value": "Daniel Stenberg" } ], "descriptions": [ { "lang": "en", "value": "When asked to use a `.netrc` file for credentials **and** to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has a `default` entry that\nomits both login and password. A rare circumstance." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T09:15:06.891Z", "orgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "shortName": "curl" }, "references": [ { "name": "json", "url": "https://curl.se/docs/CVE-2025-0167.json" }, { "name": "www", "url": "https://curl.se/docs/CVE-2025-0167.html" }, { "name": "issue", "url": "https://hackerone.com/reports/2917232" } ], "title": "netrc and default credential leak" } }, "cveMetadata": { "assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "assignerShortName": "curl", "cveId": "CVE-2025-0167", "datePublished": "2025-02-05T09:15:06.891Z", "dateReserved": "2024-12-31T23:07:29.650Z", "dateUpdated": "2025-03-07T00:10:48.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45337 (GCVE-0-2024-45337)
Vulnerability from cvelistv5
Published
2024-12-11 18:55
Modified
2025-02-18 20:48
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
golang.org/x/crypto | golang.org/x/crypto/ssh |
Version: 0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-01-31T15:02:46.088Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/12/11/2" }, { "url": "https://security.netapp.com/advisory/ntap-20250131-0007/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-45337", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T17:57:55.896008Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T17:58:29.810Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://pkg.go.dev", "defaultStatus": "unaffected", "packageName": "golang.org/x/crypto/ssh", "product": "golang.org/x/crypto/ssh", "programRoutines": [ { "name": "ServerConfig.PublicKeyCallback" }, { "name": "connection.serverAuthenticate" }, { "name": "NewServerConn" } ], "vendor": "golang.org/x/crypto", "versions": [ { "lessThan": "0.31.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "value": "Damien Tournoud (Platform.sh / Upsun)" }, { "lang": "en", "value": "Patrick Dawkins (Platform.sh / Upsun)" }, { "lang": "en", "value": "Vince Parker (Platform.sh / Upsun)" }, { "lang": "en", "value": "Jules Duvivier (Platform.sh / Upsun)" } ], "descriptions": [ { "lang": "en", "value": "Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that \"A call to this function does not guarantee that the key offered is in fact used to authenticate.\" Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-1108: Excessive Reliance on Global Variables", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-18T20:48:40.404Z", "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "shortName": "Go" }, "references": [ { "url": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909" }, { "url": "https://go.dev/cl/635315" }, { "url": "https://go.dev/issue/70779" }, { "url": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ" }, { "url": "https://pkg.go.dev/vuln/GO-2024-3321" } ], "title": "Misuse of connection.serverAuthenticate may cause authorization bypass in golang.org/x/crypto" } }, "cveMetadata": { "assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "assignerShortName": "Go", "cveId": "CVE-2024-45337", "datePublished": "2024-12-11T18:55:58.506Z", "dateReserved": "2024-08-27T19:41:58.555Z", "dateUpdated": "2025-02-18T20:48:40.404Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20369 (GCVE-0-2025-20369)
Vulnerability from cvelistv5
Published
2025-10-01 16:07
Modified
2025-10-01 17:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-776 - The software uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.
Summary
In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the "admin" or "power" Splunk roles could perform an extensible markup language (XML) external entity (XXE) injection through the dashboard tab label field. The XXE injection has the potential to cause denial of service (DoS) attacks.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 10.0 < 10.0.0 Version: 9.4 < 9.4.4 Version: 9.3 < 9.3.6 Version: 9.2 < 9.2.8 |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20369", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-10-01T17:22:49.875195Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-01T17:36:17.809Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "10.0.0", "status": "affected", "version": "10.0", "versionType": "custom" }, { "lessThan": "9.4.4", "status": "affected", "version": "9.4", "versionType": "custom" }, { "lessThan": "9.3.6", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.8", "status": "affected", "version": "9.2", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.2411.108", "status": "affected", "version": "9.3.2411", "versionType": "custom" }, { "lessThan": "9.3.2408.118", "status": "affected", "version": "9.3.2408", "versionType": "custom" }, { "lessThan": "9.2.2406.123", "status": "affected", "version": "9.2.2406", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Eric LaMothe, Splunk" } ], "datePublic": "2025-10-01T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the \"admin\" or \"power\" Splunk roles could perform an extensible markup language (XML) external entity (XXE) injection through the dashboard tab label field. The XXE injection has the potential to cause denial of service (DoS) attacks." } ], "value": "In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the \"admin\" or \"power\" Splunk roles could perform an extensible markup language (XML) external entity (XXE) injection through the dashboard tab label field. The XXE injection has the potential to cause denial of service (DoS) attacks." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-776", "description": "The software uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-01T16:07:52.488Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2025-1004" } ], "source": { "advisory": "SVD-2025-1004" }, "title": "Extensible Markup Language (XML) External Entity Injection (XXE) through Dashboard label field on Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20369", "datePublished": "2025-10-01T16:07:52.488Z", "dateReserved": "2024-10-10T19:15:13.261Z", "dateUpdated": "2025-10-01T17:36:17.809Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0725 (GCVE-0-2025-0725)
Vulnerability from cvelistv5
Published
2025-02-05 09:18
Modified
2025-06-12 16:04
Severity ?
VLAI Severity ?
EPSS score ?
Summary
When libcurl is asked to perform automatic gzip decompression of
content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,
**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would
make libcurl perform a buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
curl | curl |
Version: 8.11.1 ≤ 8.11.1 Version: 8.11.0 ≤ 8.11.0 Version: 8.10.1 ≤ 8.10.1 Version: 8.10.0 ≤ 8.10.0 Version: 8.9.1 ≤ 8.9.1 Version: 8.9.0 ≤ 8.9.0 Version: 8.8.0 ≤ 8.8.0 Version: 8.7.1 ≤ 8.7.1 Version: 8.7.0 ≤ 8.7.0 Version: 8.6.0 ≤ 8.6.0 Version: 8.5.0 ≤ 8.5.0 Version: 8.4.0 ≤ 8.4.0 Version: 8.3.0 ≤ 8.3.0 Version: 8.2.1 ≤ 8.2.1 Version: 8.2.0 ≤ 8.2.0 Version: 8.1.2 ≤ 8.1.2 Version: 8.1.1 ≤ 8.1.1 Version: 8.1.0 ≤ 8.1.0 Version: 8.0.1 ≤ 8.0.1 Version: 8.0.0 ≤ 8.0.0 Version: 7.88.1 ≤ 7.88.1 Version: 7.88.0 ≤ 7.88.0 Version: 7.87.0 ≤ 7.87.0 Version: 7.86.0 ≤ 7.86.0 Version: 7.85.0 ≤ 7.85.0 Version: 7.84.0 ≤ 7.84.0 Version: 7.83.1 ≤ 7.83.1 Version: 7.83.0 ≤ 7.83.0 Version: 7.82.0 ≤ 7.82.0 Version: 7.81.0 ≤ 7.81.0 Version: 7.80.0 ≤ 7.80.0 Version: 7.79.1 ≤ 7.79.1 Version: 7.79.0 ≤ 7.79.0 Version: 7.78.0 ≤ 7.78.0 Version: 7.77.0 ≤ 7.77.0 Version: 7.76.1 ≤ 7.76.1 Version: 7.76.0 ≤ 7.76.0 Version: 7.75.0 ≤ 7.75.0 Version: 7.74.0 ≤ 7.74.0 Version: 7.73.0 ≤ 7.73.0 Version: 7.72.0 ≤ 7.72.0 Version: 7.71.1 ≤ 7.71.1 Version: 7.71.0 ≤ 7.71.0 Version: 7.70.0 ≤ 7.70.0 Version: 7.69.1 ≤ 7.69.1 Version: 7.69.0 ≤ 7.69.0 Version: 7.68.0 ≤ 7.68.0 Version: 7.67.0 ≤ 7.67.0 Version: 7.66.0 ≤ 7.66.0 Version: 7.65.3 ≤ 7.65.3 Version: 7.65.2 ≤ 7.65.2 Version: 7.65.1 ≤ 7.65.1 Version: 7.65.0 ≤ 7.65.0 Version: 7.64.1 ≤ 7.64.1 Version: 7.64.0 ≤ 7.64.0 Version: 7.63.0 ≤ 7.63.0 Version: 7.62.0 ≤ 7.62.0 Version: 7.61.1 ≤ 7.61.1 Version: 7.61.0 ≤ 7.61.0 Version: 7.60.0 ≤ 7.60.0 Version: 7.59.0 ≤ 7.59.0 Version: 7.58.0 ≤ 7.58.0 Version: 7.57.0 ≤ 7.57.0 Version: 7.56.1 ≤ 7.56.1 Version: 7.56.0 ≤ 7.56.0 Version: 7.55.1 ≤ 7.55.1 Version: 7.55.0 ≤ 7.55.0 Version: 7.54.1 ≤ 7.54.1 Version: 7.54.0 ≤ 7.54.0 Version: 7.53.1 ≤ 7.53.1 Version: 7.53.0 ≤ 7.53.0 Version: 7.52.1 ≤ 7.52.1 Version: 7.52.0 ≤ 7.52.0 Version: 7.51.0 ≤ 7.51.0 Version: 7.50.3 ≤ 7.50.3 Version: 7.50.2 ≤ 7.50.2 Version: 7.50.1 ≤ 7.50.1 Version: 7.50.0 ≤ 7.50.0 Version: 7.49.1 ≤ 7.49.1 Version: 7.49.0 ≤ 7.49.0 Version: 7.48.0 ≤ 7.48.0 Version: 7.47.1 ≤ 7.47.1 Version: 7.47.0 ≤ 7.47.0 Version: 7.46.0 ≤ 7.46.0 Version: 7.45.0 ≤ 7.45.0 Version: 7.44.0 ≤ 7.44.0 Version: 7.43.0 ≤ 7.43.0 Version: 7.42.1 ≤ 7.42.1 Version: 7.42.0 ≤ 7.42.0 Version: 7.41.0 ≤ 7.41.0 Version: 7.40.0 ≤ 7.40.0 Version: 7.39.0 ≤ 7.39.0 Version: 7.38.0 ≤ 7.38.0 Version: 7.37.1 ≤ 7.37.1 Version: 7.37.0 ≤ 7.37.0 Version: 7.36.0 ≤ 7.36.0 Version: 7.35.0 ≤ 7.35.0 Version: 7.34.0 ≤ 7.34.0 Version: 7.33.0 ≤ 7.33.0 Version: 7.32.0 ≤ 7.32.0 Version: 7.31.0 ≤ 7.31.0 Version: 7.30.0 ≤ 7.30.0 Version: 7.29.0 ≤ 7.29.0 Version: 7.28.1 ≤ 7.28.1 Version: 7.28.0 ≤ 7.28.0 Version: 7.27.0 ≤ 7.27.0 Version: 7.26.0 ≤ 7.26.0 Version: 7.25.0 ≤ 7.25.0 Version: 7.24.0 ≤ 7.24.0 Version: 7.23.1 ≤ 7.23.1 Version: 7.23.0 ≤ 7.23.0 Version: 7.22.0 ≤ 7.22.0 Version: 7.21.7 ≤ 7.21.7 Version: 7.21.6 ≤ 7.21.6 Version: 7.21.5 ≤ 7.21.5 Version: 7.21.4 ≤ 7.21.4 Version: 7.21.3 ≤ 7.21.3 Version: 7.21.2 ≤ 7.21.2 Version: 7.21.1 ≤ 7.21.1 Version: 7.21.0 ≤ 7.21.0 Version: 7.20.1 ≤ 7.20.1 Version: 7.20.0 ≤ 7.20.0 Version: 7.19.7 ≤ 7.19.7 Version: 7.19.6 ≤ 7.19.6 Version: 7.19.5 ≤ 7.19.5 Version: 7.19.4 ≤ 7.19.4 Version: 7.19.3 ≤ 7.19.3 Version: 7.19.2 ≤ 7.19.2 Version: 7.19.1 ≤ 7.19.1 Version: 7.19.0 ≤ 7.19.0 Version: 7.18.2 ≤ 7.18.2 Version: 7.18.1 ≤ 7.18.1 Version: 7.18.0 ≤ 7.18.0 Version: 7.17.1 ≤ 7.17.1 Version: 7.17.0 ≤ 7.17.0 Version: 7.16.4 ≤ 7.16.4 Version: 7.16.3 ≤ 7.16.3 Version: 7.16.2 ≤ 7.16.2 Version: 7.16.1 ≤ 7.16.1 Version: 7.16.0 ≤ 7.16.0 Version: 7.15.5 ≤ 7.15.5 Version: 7.15.4 ≤ 7.15.4 Version: 7.15.3 ≤ 7.15.3 Version: 7.15.2 ≤ 7.15.2 Version: 7.15.1 ≤ 7.15.1 Version: 7.15.0 ≤ 7.15.0 Version: 7.14.1 ≤ 7.14.1 Version: 7.14.0 ≤ 7.14.0 Version: 7.13.2 ≤ 7.13.2 Version: 7.13.1 ≤ 7.13.1 Version: 7.13.0 ≤ 7.13.0 Version: 7.12.3 ≤ 7.12.3 Version: 7.12.2 ≤ 7.12.2 Version: 7.12.1 ≤ 7.12.1 Version: 7.12.0 ≤ 7.12.0 Version: 7.11.2 ≤ 7.11.2 Version: 7.11.1 ≤ 7.11.1 Version: 7.11.0 ≤ 7.11.0 Version: 7.10.8 ≤ 7.10.8 Version: 7.10.7 ≤ 7.10.7 Version: 7.10.6 ≤ 7.10.6 Version: 7.10.5 ≤ 7.10.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-06-12T16:04:29.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/02/05/3" }, { "url": "http://www.openwall.com/lists/oss-security/2025/02/06/2" }, { "url": "http://www.openwall.com/lists/oss-security/2025/02/06/4" }, { "url": "https://security.netapp.com/advisory/ntap-20250306-0009/" }, { "url": "https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-0725", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T14:33:50.737849Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T14:34:15.390Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "curl", "vendor": "curl", "versions": [ { "lessThanOrEqual": "8.11.1", "status": "affected", "version": "8.11.1", "versionType": "semver" }, { "lessThanOrEqual": "8.11.0", "status": "affected", "version": "8.11.0", "versionType": "semver" }, { "lessThanOrEqual": "8.10.1", "status": "affected", "version": "8.10.1", "versionType": "semver" }, { "lessThanOrEqual": "8.10.0", "status": "affected", "version": "8.10.0", "versionType": "semver" }, { "lessThanOrEqual": "8.9.1", "status": "affected", "version": "8.9.1", "versionType": "semver" }, { "lessThanOrEqual": "8.9.0", "status": "affected", "version": "8.9.0", "versionType": "semver" }, { "lessThanOrEqual": "8.8.0", "status": "affected", "version": "8.8.0", "versionType": "semver" }, { "lessThanOrEqual": "8.7.1", "status": "affected", "version": "8.7.1", "versionType": "semver" }, { "lessThanOrEqual": "8.7.0", "status": "affected", "version": "8.7.0", "versionType": "semver" }, { "lessThanOrEqual": "8.6.0", "status": "affected", "version": "8.6.0", "versionType": "semver" }, { "lessThanOrEqual": "8.5.0", "status": "affected", "version": "8.5.0", "versionType": "semver" }, { "lessThanOrEqual": "8.4.0", "status": "affected", "version": "8.4.0", "versionType": "semver" }, { "lessThanOrEqual": "8.3.0", "status": "affected", "version": "8.3.0", "versionType": "semver" }, { "lessThanOrEqual": "8.2.1", "status": "affected", "version": "8.2.1", "versionType": "semver" }, { "lessThanOrEqual": "8.2.0", "status": "affected", "version": "8.2.0", "versionType": "semver" }, { "lessThanOrEqual": "8.1.2", "status": "affected", "version": "8.1.2", "versionType": "semver" }, { "lessThanOrEqual": "8.1.1", "status": "affected", "version": "8.1.1", "versionType": "semver" }, { "lessThanOrEqual": "8.1.0", "status": "affected", "version": "8.1.0", "versionType": "semver" }, { "lessThanOrEqual": "8.0.1", "status": "affected", "version": "8.0.1", "versionType": "semver" }, { "lessThanOrEqual": "8.0.0", "status": "affected", "version": "8.0.0", "versionType": "semver" }, { "lessThanOrEqual": "7.88.1", "status": "affected", "version": "7.88.1", "versionType": "semver" }, { "lessThanOrEqual": "7.88.0", "status": "affected", "version": "7.88.0", "versionType": "semver" }, { "lessThanOrEqual": "7.87.0", "status": "affected", "version": "7.87.0", "versionType": "semver" }, { "lessThanOrEqual": "7.86.0", "status": "affected", "version": "7.86.0", "versionType": "semver" }, { "lessThanOrEqual": "7.85.0", "status": "affected", "version": "7.85.0", "versionType": "semver" }, { "lessThanOrEqual": "7.84.0", "status": "affected", "version": "7.84.0", "versionType": "semver" }, { "lessThanOrEqual": "7.83.1", "status": "affected", "version": "7.83.1", "versionType": "semver" }, { "lessThanOrEqual": "7.83.0", "status": "affected", "version": "7.83.0", "versionType": "semver" }, { "lessThanOrEqual": "7.82.0", "status": "affected", "version": "7.82.0", "versionType": "semver" }, { "lessThanOrEqual": "7.81.0", "status": "affected", "version": "7.81.0", "versionType": "semver" }, { "lessThanOrEqual": "7.80.0", "status": "affected", "version": "7.80.0", "versionType": "semver" }, { "lessThanOrEqual": "7.79.1", "status": "affected", "version": "7.79.1", "versionType": "semver" }, { "lessThanOrEqual": "7.79.0", "status": "affected", "version": "7.79.0", "versionType": "semver" }, { "lessThanOrEqual": "7.78.0", "status": "affected", "version": "7.78.0", "versionType": "semver" }, { "lessThanOrEqual": "7.77.0", "status": "affected", "version": "7.77.0", "versionType": "semver" }, { "lessThanOrEqual": "7.76.1", "status": "affected", "version": "7.76.1", "versionType": "semver" }, { "lessThanOrEqual": "7.76.0", "status": "affected", "version": "7.76.0", "versionType": "semver" }, { "lessThanOrEqual": "7.75.0", "status": "affected", "version": "7.75.0", "versionType": "semver" }, { "lessThanOrEqual": "7.74.0", "status": "affected", "version": "7.74.0", "versionType": "semver" }, { "lessThanOrEqual": "7.73.0", "status": "affected", "version": "7.73.0", "versionType": "semver" }, { "lessThanOrEqual": "7.72.0", "status": "affected", "version": "7.72.0", "versionType": "semver" }, { "lessThanOrEqual": "7.71.1", "status": "affected", "version": "7.71.1", "versionType": "semver" }, { "lessThanOrEqual": "7.71.0", "status": "affected", "version": "7.71.0", "versionType": "semver" }, { "lessThanOrEqual": "7.70.0", "status": "affected", "version": "7.70.0", "versionType": "semver" }, { "lessThanOrEqual": "7.69.1", "status": "affected", "version": "7.69.1", "versionType": "semver" }, { "lessThanOrEqual": "7.69.0", "status": "affected", "version": "7.69.0", "versionType": "semver" }, { "lessThanOrEqual": "7.68.0", "status": "affected", "version": "7.68.0", "versionType": "semver" }, { "lessThanOrEqual": "7.67.0", "status": "affected", "version": "7.67.0", "versionType": "semver" }, { "lessThanOrEqual": "7.66.0", "status": "affected", "version": "7.66.0", "versionType": "semver" }, { "lessThanOrEqual": "7.65.3", "status": "affected", "version": "7.65.3", "versionType": "semver" }, { "lessThanOrEqual": "7.65.2", "status": "affected", "version": "7.65.2", "versionType": "semver" }, { "lessThanOrEqual": "7.65.1", "status": "affected", "version": "7.65.1", "versionType": "semver" }, { "lessThanOrEqual": "7.65.0", "status": "affected", "version": "7.65.0", "versionType": "semver" }, { "lessThanOrEqual": "7.64.1", "status": "affected", "version": "7.64.1", "versionType": "semver" }, { "lessThanOrEqual": "7.64.0", "status": "affected", "version": "7.64.0", "versionType": "semver" }, { "lessThanOrEqual": "7.63.0", "status": "affected", "version": "7.63.0", "versionType": "semver" }, { "lessThanOrEqual": "7.62.0", "status": "affected", "version": "7.62.0", "versionType": "semver" }, { "lessThanOrEqual": "7.61.1", "status": "affected", "version": "7.61.1", "versionType": "semver" }, { "lessThanOrEqual": "7.61.0", "status": "affected", "version": "7.61.0", "versionType": "semver" }, { "lessThanOrEqual": "7.60.0", "status": "affected", "version": "7.60.0", "versionType": "semver" }, { "lessThanOrEqual": "7.59.0", "status": "affected", "version": "7.59.0", "versionType": "semver" }, { "lessThanOrEqual": "7.58.0", "status": "affected", "version": "7.58.0", "versionType": "semver" }, { "lessThanOrEqual": "7.57.0", "status": "affected", "version": "7.57.0", "versionType": "semver" }, { "lessThanOrEqual": "7.56.1", "status": "affected", "version": "7.56.1", "versionType": "semver" }, { "lessThanOrEqual": "7.56.0", "status": "affected", "version": "7.56.0", "versionType": "semver" }, { "lessThanOrEqual": "7.55.1", "status": "affected", "version": "7.55.1", "versionType": "semver" }, { "lessThanOrEqual": "7.55.0", "status": "affected", "version": "7.55.0", "versionType": "semver" }, { "lessThanOrEqual": "7.54.1", "status": "affected", "version": "7.54.1", "versionType": "semver" }, { "lessThanOrEqual": "7.54.0", "status": "affected", "version": "7.54.0", "versionType": "semver" }, { "lessThanOrEqual": "7.53.1", "status": "affected", "version": "7.53.1", "versionType": "semver" }, { "lessThanOrEqual": "7.53.0", "status": "affected", "version": "7.53.0", "versionType": "semver" }, { "lessThanOrEqual": "7.52.1", "status": "affected", "version": "7.52.1", "versionType": "semver" }, { "lessThanOrEqual": "7.52.0", "status": "affected", "version": "7.52.0", "versionType": "semver" }, { "lessThanOrEqual": "7.51.0", "status": "affected", "version": "7.51.0", "versionType": "semver" }, { "lessThanOrEqual": "7.50.3", "status": "affected", "version": "7.50.3", "versionType": "semver" }, { "lessThanOrEqual": "7.50.2", "status": "affected", "version": "7.50.2", "versionType": "semver" }, { "lessThanOrEqual": "7.50.1", "status": "affected", "version": "7.50.1", "versionType": "semver" }, { "lessThanOrEqual": "7.50.0", "status": "affected", "version": "7.50.0", "versionType": "semver" }, { "lessThanOrEqual": "7.49.1", "status": "affected", "version": "7.49.1", "versionType": "semver" }, { "lessThanOrEqual": "7.49.0", "status": "affected", "version": "7.49.0", "versionType": "semver" }, { "lessThanOrEqual": "7.48.0", "status": "affected", "version": "7.48.0", "versionType": "semver" }, { "lessThanOrEqual": "7.47.1", "status": "affected", "version": "7.47.1", "versionType": "semver" }, { "lessThanOrEqual": "7.47.0", "status": "affected", "version": "7.47.0", "versionType": "semver" }, { "lessThanOrEqual": "7.46.0", "status": "affected", "version": "7.46.0", "versionType": "semver" }, { "lessThanOrEqual": "7.45.0", "status": "affected", "version": "7.45.0", "versionType": "semver" }, { "lessThanOrEqual": "7.44.0", "status": "affected", "version": "7.44.0", "versionType": "semver" }, { "lessThanOrEqual": "7.43.0", "status": "affected", "version": "7.43.0", "versionType": "semver" }, { "lessThanOrEqual": "7.42.1", "status": "affected", "version": "7.42.1", "versionType": "semver" }, { "lessThanOrEqual": "7.42.0", "status": "affected", "version": "7.42.0", "versionType": "semver" }, { "lessThanOrEqual": "7.41.0", "status": "affected", "version": "7.41.0", "versionType": "semver" }, { "lessThanOrEqual": "7.40.0", "status": "affected", "version": "7.40.0", "versionType": "semver" }, { "lessThanOrEqual": "7.39.0", "status": "affected", "version": "7.39.0", "versionType": "semver" }, { "lessThanOrEqual": "7.38.0", "status": "affected", "version": "7.38.0", "versionType": "semver" }, { "lessThanOrEqual": "7.37.1", "status": "affected", "version": "7.37.1", "versionType": "semver" }, { "lessThanOrEqual": "7.37.0", "status": "affected", "version": "7.37.0", "versionType": "semver" }, { "lessThanOrEqual": "7.36.0", "status": "affected", "version": "7.36.0", "versionType": "semver" }, { "lessThanOrEqual": "7.35.0", "status": "affected", "version": "7.35.0", "versionType": "semver" }, { "lessThanOrEqual": "7.34.0", "status": "affected", "version": "7.34.0", "versionType": "semver" }, { "lessThanOrEqual": "7.33.0", "status": "affected", "version": "7.33.0", "versionType": "semver" }, { "lessThanOrEqual": "7.32.0", "status": "affected", "version": "7.32.0", "versionType": "semver" }, { "lessThanOrEqual": "7.31.0", "status": "affected", "version": "7.31.0", "versionType": "semver" }, { "lessThanOrEqual": "7.30.0", "status": "affected", "version": "7.30.0", "versionType": "semver" }, { "lessThanOrEqual": "7.29.0", "status": "affected", "version": "7.29.0", "versionType": "semver" }, { "lessThanOrEqual": "7.28.1", "status": "affected", "version": "7.28.1", "versionType": "semver" }, { "lessThanOrEqual": "7.28.0", "status": "affected", "version": "7.28.0", "versionType": "semver" }, { "lessThanOrEqual": "7.27.0", "status": "affected", "version": "7.27.0", "versionType": "semver" }, { "lessThanOrEqual": "7.26.0", "status": "affected", "version": "7.26.0", "versionType": "semver" }, { "lessThanOrEqual": "7.25.0", "status": "affected", "version": "7.25.0", "versionType": "semver" }, { "lessThanOrEqual": "7.24.0", "status": "affected", "version": "7.24.0", "versionType": "semver" }, { "lessThanOrEqual": "7.23.1", "status": "affected", "version": "7.23.1", "versionType": "semver" }, { "lessThanOrEqual": "7.23.0", "status": "affected", "version": "7.23.0", "versionType": "semver" }, { "lessThanOrEqual": "7.22.0", "status": "affected", "version": "7.22.0", "versionType": "semver" }, { "lessThanOrEqual": "7.21.7", "status": "affected", "version": "7.21.7", "versionType": "semver" }, { "lessThanOrEqual": "7.21.6", "status": "affected", "version": "7.21.6", "versionType": "semver" }, { "lessThanOrEqual": "7.21.5", "status": "affected", "version": "7.21.5", "versionType": "semver" }, { "lessThanOrEqual": "7.21.4", "status": "affected", "version": "7.21.4", "versionType": "semver" }, { "lessThanOrEqual": "7.21.3", "status": "affected", "version": "7.21.3", "versionType": "semver" }, { "lessThanOrEqual": "7.21.2", "status": "affected", "version": "7.21.2", "versionType": "semver" }, { "lessThanOrEqual": "7.21.1", "status": "affected", "version": "7.21.1", "versionType": "semver" }, { "lessThanOrEqual": "7.21.0", "status": "affected", "version": "7.21.0", "versionType": "semver" }, { "lessThanOrEqual": "7.20.1", "status": "affected", "version": "7.20.1", "versionType": "semver" }, { "lessThanOrEqual": "7.20.0", "status": "affected", "version": "7.20.0", "versionType": "semver" }, { "lessThanOrEqual": "7.19.7", "status": "affected", "version": "7.19.7", "versionType": "semver" }, { "lessThanOrEqual": "7.19.6", "status": "affected", "version": "7.19.6", "versionType": "semver" }, { "lessThanOrEqual": "7.19.5", "status": "affected", "version": "7.19.5", "versionType": "semver" }, { "lessThanOrEqual": "7.19.4", "status": "affected", "version": "7.19.4", "versionType": "semver" }, { "lessThanOrEqual": "7.19.3", "status": "affected", "version": "7.19.3", "versionType": "semver" }, { "lessThanOrEqual": "7.19.2", "status": "affected", "version": "7.19.2", "versionType": "semver" }, { "lessThanOrEqual": "7.19.1", "status": "affected", "version": "7.19.1", "versionType": "semver" }, { "lessThanOrEqual": "7.19.0", "status": "affected", "version": "7.19.0", "versionType": "semver" }, { "lessThanOrEqual": "7.18.2", "status": "affected", "version": "7.18.2", "versionType": "semver" }, { "lessThanOrEqual": "7.18.1", "status": "affected", "version": "7.18.1", "versionType": "semver" }, { "lessThanOrEqual": "7.18.0", "status": "affected", "version": "7.18.0", "versionType": "semver" }, { "lessThanOrEqual": "7.17.1", "status": "affected", "version": "7.17.1", "versionType": "semver" }, { "lessThanOrEqual": "7.17.0", "status": "affected", "version": "7.17.0", "versionType": "semver" }, { "lessThanOrEqual": "7.16.4", "status": "affected", "version": "7.16.4", "versionType": "semver" }, { "lessThanOrEqual": "7.16.3", "status": "affected", "version": "7.16.3", "versionType": "semver" }, { "lessThanOrEqual": "7.16.2", "status": "affected", "version": "7.16.2", "versionType": "semver" }, { "lessThanOrEqual": "7.16.1", "status": "affected", "version": "7.16.1", "versionType": "semver" }, { "lessThanOrEqual": "7.16.0", "status": "affected", "version": "7.16.0", "versionType": "semver" }, { "lessThanOrEqual": "7.15.5", "status": "affected", "version": "7.15.5", "versionType": "semver" }, { "lessThanOrEqual": "7.15.4", "status": "affected", "version": "7.15.4", "versionType": "semver" }, { "lessThanOrEqual": "7.15.3", "status": "affected", "version": "7.15.3", "versionType": "semver" }, { "lessThanOrEqual": "7.15.2", "status": "affected", "version": "7.15.2", "versionType": "semver" }, { "lessThanOrEqual": "7.15.1", "status": "affected", "version": "7.15.1", "versionType": "semver" }, { "lessThanOrEqual": "7.15.0", "status": "affected", "version": "7.15.0", "versionType": "semver" }, { "lessThanOrEqual": "7.14.1", "status": "affected", "version": "7.14.1", "versionType": "semver" }, { "lessThanOrEqual": "7.14.0", "status": "affected", "version": "7.14.0", "versionType": "semver" }, { "lessThanOrEqual": "7.13.2", "status": "affected", "version": "7.13.2", "versionType": "semver" }, { "lessThanOrEqual": "7.13.1", "status": "affected", "version": "7.13.1", "versionType": "semver" }, { "lessThanOrEqual": "7.13.0", "status": "affected", "version": "7.13.0", "versionType": "semver" }, { "lessThanOrEqual": "7.12.3", "status": "affected", "version": "7.12.3", "versionType": "semver" }, { "lessThanOrEqual": "7.12.2", "status": "affected", "version": "7.12.2", "versionType": "semver" }, { "lessThanOrEqual": "7.12.1", "status": "affected", "version": "7.12.1", "versionType": "semver" }, { "lessThanOrEqual": "7.12.0", "status": "affected", "version": "7.12.0", "versionType": "semver" }, { "lessThanOrEqual": "7.11.2", "status": "affected", "version": "7.11.2", "versionType": "semver" }, { "lessThanOrEqual": "7.11.1", "status": "affected", "version": "7.11.1", "versionType": "semver" }, { "lessThanOrEqual": "7.11.0", "status": "affected", "version": "7.11.0", "versionType": "semver" }, { "lessThanOrEqual": "7.10.8", "status": "affected", "version": "7.10.8", "versionType": "semver" }, { "lessThanOrEqual": "7.10.7", "status": "affected", "version": "7.10.7", "versionType": "semver" }, { "lessThanOrEqual": "7.10.6", "status": "affected", "version": "7.10.6", "versionType": "semver" }, { "lessThanOrEqual": "7.10.5", "status": "affected", "version": "7.10.5", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "z2_" }, { "lang": "en", "type": "remediation developer", "value": "Daniel Stenberg" } ], "descriptions": [ { "lang": "en", "value": "When libcurl is asked to perform automatic gzip decompression of\ncontent-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,\n**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would\nmake libcurl perform a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-680 Integer Overflow to Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T09:18:20.468Z", "orgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "shortName": "curl" }, "references": [ { "name": "json", "url": "https://curl.se/docs/CVE-2025-0725.json" }, { "name": "www", "url": "https://curl.se/docs/CVE-2025-0725.html" }, { "name": "issue", "url": "https://hackerone.com/reports/2956023" } ], "title": "gzip integer overflow" } }, "cveMetadata": { "assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "assignerShortName": "curl", "cveId": "CVE-2025-0725", "datePublished": "2025-02-05T09:18:20.468Z", "dateReserved": "2025-01-27T04:58:09.514Z", "dateUpdated": "2025-06-12T16:04:29.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-46175 (GCVE-0-2022-46175)
Vulnerability from cvelistv5
Published
2022-12-24 00:00
Modified
2024-08-03 14:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1321 - Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Summary
JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:24:03.459Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h" }, { "tags": [ "x_transferred" ], "url": "https://github.com/json5/json5/issues/199" }, { "tags": [ "x_transferred" ], "url": "https://github.com/json5/json5/issues/295" }, { "tags": [ "x_transferred" ], "url": "https://github.com/json5/json5/pull/298" }, { "name": "FEDORA-2023-e7297a4aeb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3S26TLPLVFAJTUN3VIXFDEBEXDYO22CE/" }, { "name": "[debian-lts-announce] 20231125 [SECURITY] [DLA 3665-1] node-json5 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "json5", "vendor": "json5", "versions": [ { "status": "affected", "version": "\u003c 2.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1321", "description": "CWE-1321: Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-26T00:06:12.132080", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h" }, { "url": "https://github.com/json5/json5/issues/199" }, { "url": "https://github.com/json5/json5/issues/295" }, { "url": "https://github.com/json5/json5/pull/298" }, { "name": "FEDORA-2023-e7297a4aeb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3S26TLPLVFAJTUN3VIXFDEBEXDYO22CE/" }, { "name": "[debian-lts-announce] 20231125 [SECURITY] [DLA 3665-1] node-json5 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00021.html" } ], "source": { "advisory": "GHSA-9c47-m6qq-7p4h", "discovery": "UNKNOWN" } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-46175", "datePublished": "2022-12-24T00:00:00", "dateReserved": "2022-11-28T00:00:00", "dateUpdated": "2024-08-03T14:24:03.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20366 (GCVE-0-2025-20366)
Vulnerability from cvelistv5
Published
2025-10-01 16:07
Modified
2025-10-01 17:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Summary
In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.111, 9.3.2408.119, and 9.2.2406.122, a low-privileged user that does not hold the admin or power Splunk roles could access sensitive search results if Splunk Enterprise runs an administrative search job in the background. If the low privileged user guesses the search job’s unique Search ID (SID), the user could retrieve the results of that job, potentially exposing sensitive search results. For more information see https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/about-jobs-and-job-management and https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/manage-search-jobs.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 10.0 < 10.0.0 Version: 9.4 < 9.4.4 Version: 9.3 < 9.3.6 Version: 9.2 < 9.2.8 |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20366", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-10-01T17:47:15.448129Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-01T17:47:24.781Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "10.0.0", "status": "affected", "version": "10.0", "versionType": "custom" }, { "lessThan": "9.4.4", "status": "affected", "version": "9.4", "versionType": "custom" }, { "lessThan": "9.3.6", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.8", "status": "affected", "version": "9.2", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.2411.111", "status": "affected", "version": "9.3.2411", "versionType": "custom" }, { "lessThan": "9.3.2408.119", "status": "affected", "version": "9.3.2408", "versionType": "custom" }, { "lessThan": "9.2.2406.122", "status": "affected", "version": "9.2.2406", "versionType": "custom" } ] } ], "datePublic": "2025-10-01T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.111, 9.3.2408.119, and 9.2.2406.122, a low-privileged user that does not hold the admin or power Splunk roles could access sensitive search results if Splunk Enterprise runs an administrative search job in the background. If the low privileged user guesses the search job\u2019s unique Search ID (SID), the user could retrieve the results of that job, potentially exposing sensitive search results. For more information see https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/about-jobs-and-job-management and https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/manage-search-jobs." } ], "value": "In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.111, 9.3.2408.119, and 9.2.2406.122, a low-privileged user that does not hold the admin or power Splunk roles could access sensitive search results if Splunk Enterprise runs an administrative search job in the background. If the low privileged user guesses the search job\u2019s unique Search ID (SID), the user could retrieve the results of that job, potentially exposing sensitive search results. For more information see https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/about-jobs-and-job-management and https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/manage-search-jobs." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-01T16:07:56.027Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2025-1001" } ], "source": { "advisory": "SVD-2025-1001" }, "title": "Improper Access Control in Background Job Submission in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20366", "datePublished": "2025-10-01T16:07:56.027Z", "dateReserved": "2024-10-10T19:15:13.261Z", "dateUpdated": "2025-10-01T17:47:24.781Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-7553 (GCVE-0-2024-7553)
Vulnerability from cvelistv5
Published
2024-08-07 09:57
Modified
2024-08-07 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.
Required Configuration:
Only environments with Windows as the underlying operating system is affected by this issue
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
MongoDB Inc | MongoDB Server |
Version: 5.0 < 5.0.27 Version: 6.0 < 6.0.16 Version: 7.0 < 7.0.12 Version: 7.3 < 7.3.3 cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.3.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:c_driver:0.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.3.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.5.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.5.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.7:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.7.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.8:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.8.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.90.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.92.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.92.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.94.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.94.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.96.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.96.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.96.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.98.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:0.98.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.0.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.0.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.7:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.8:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.9:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.10:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.1.11:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.0:beta:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.2.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.0:beta0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.3.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.0:beta0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.4.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc3:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc4:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.0:rc6:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.5.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.6.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.6.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.6.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.6.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.6.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.7.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.7.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.7.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.7.0:rc2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.8.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.8.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.8.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.8.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.8.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.9.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.10.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.10.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.10.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.10.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.11.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.12.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.13.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.13.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.14.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.14.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.15.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.15.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.15.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.15.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.16.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.16.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.16.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.0:beta:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.0:beta2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.17.7:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.18.0:alpha:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.18.0:alpha2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.18.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.19.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.19.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.19.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.20.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.20.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.21.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.21.0:beta0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.21.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.21.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.22.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.22.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.22.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.23.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.24.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.24.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.24.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.24.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.24.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.25.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.25.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.25.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.25.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.25.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.26.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:c_driver:1.26.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.1.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.2.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.3.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.3.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.4.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.4.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.5.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.5.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.6.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.6.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.6.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:0.6.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:alpha1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:alpha2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:beta2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.0:rc0:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.0.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.7:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.8:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.9:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.1.10:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.0:alpha1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.0:alpha2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.0:alpha3:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.6:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.7:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.8:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.9:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.10:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.2.11:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.0:beta2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.3.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.0:rc2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.4.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.5.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.0:alpha1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.0:alpha2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.0:alpha3:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.6.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.4:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.7.5:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.0:beta2:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.8.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.9.0:-:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.9.0:rc1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.9.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.9.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.10.0:alpha1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.10.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.11.0:alpha1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.11.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.11.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.12.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.12.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.13.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.14.0:beta1:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.14.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.14.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.14.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.15.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.15.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.15.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.15.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.16.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.16.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.16.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.17.0:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.17.1:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.17.2:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.17.3:*:*:*:*:mongodb:*:* cpe:2.3:a:mongodb:php_driver:1.18.0:*:*:*:*:mongodb:*:* |
||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-7553", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T15:27:26.847490Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-07T15:27:46.258Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:c_driver:0.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.5.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.7.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.8.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.90.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.92.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.92.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.94.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.94.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.96.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.96.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.96.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.98.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.98.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.0.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.0.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.9:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.10:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.11:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:beta:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.0:beta0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.0:beta0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc3:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc4:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc6:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:rc2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.11.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.12.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.13.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.13.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.14.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.14.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.16.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.16.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.16.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:beta:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.18.0:alpha:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.18.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.18.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.19.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.19.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.19.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.20.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.20.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.0:beta0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.22.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.22.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.22.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.26.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.26.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.2.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.3.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.4.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.4.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.5.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.9:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.10:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha3:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.9:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.10:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.11:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:rc2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha3:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.10.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.10.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.11.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.11.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.11.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.12.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.12.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.13.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.16.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.16.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.16.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.18.0:*:*:*:*:mongodb:*:*" ], "defaultStatus": "unaffected", "product": "MongoDB Server", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "5.0.27", "status": "affected", "version": "5.0", "versionType": "custom" }, { "lessThan": "6.0.16", "status": "affected", "version": "6.0", "versionType": "custom" }, { "lessThan": "7.0.12", "status": "affected", "version": "7.0", "versionType": "custom" }, { "lessThan": "7.3.3", "status": "affected", "version": "7.3", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "MongoDB C Driver", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "1.26.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "MongoDB PHP Driver", "vendor": "MongoDB Inc", "versions": [ { "lessThan": "1.18.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: var(--wht);\"\u003eOnly environments with Windows as the underlying operating system is affected by this issue\u003c/span\u003e\u003cbr\u003e\u003ci\u003e\u003cbr\u003e\u003c/i\u003e\u003cbr\u003e" } ], "value": "Only environments with Windows as the underlying operating system is affected by this issue" } ], "credits": [ { "lang": "en", "type": "finder", "value": "T. Do\u011fa Geli\u015fli" } ], "datePublic": "2024-08-07T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIncorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cp\u003e\u003cb\u003eRequired Configuration:\u003c/b\u003e\u003c/p\u003e\u003cp\u003eOnly environments with Windows as the underlying operating system is affected by this issue\u003c/p\u003e" } ], "value": "Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.\n\nRequired Configuration:\n\nOnly environments with Windows as the underlying operating system is affected by this issue" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-07T12:51:42.281Z", "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb", "shortName": "mongodb" }, "references": [ { "url": "https://jira.mongodb.org/browse/PHPC-2369" }, { "url": "https://jira.mongodb.org/browse/SERVER-93211" }, { "url": "https://jira.mongodb.org/browse/CDRIVER-5650" } ], "source": { "discovery": "EXTERNAL" }, "title": "Accessing Untrusted Directory May Allow Local Privilege Escalation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb", "assignerShortName": "mongodb", "cveId": "CVE-2024-7553", "datePublished": "2024-08-07T09:57:49.818Z", "dateReserved": "2024-08-06T08:34:10.195Z", "dateUpdated": "2024-08-07T15:27:46.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20367 (GCVE-0-2025-20367)
Vulnerability from cvelistv5
Published
2025-10-01 16:08
Modified
2025-10-01 17:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Summary
In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the 'admin' or 'power' Splunk roles could craft a malicious payload through the `dataset.command` parameter of the `/app/search/table` endpoint, which could result in execution of unauthorized JavaScript code in the browser of a user.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 10.0 < 10.0.0 Version: 9.4 < 9.4.4 Version: 9.3 < 9.3.6 Version: 9.2 < 9.2.8 |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-10-01T17:19:40.128884Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-01T17:40:43.251Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "10.0.0", "status": "affected", "version": "10.0", "versionType": "custom" }, { "lessThan": "9.4.4", "status": "affected", "version": "9.4", "versionType": "custom" }, { "lessThan": "9.3.6", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.8", "status": "affected", "version": "9.2", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.2411.109", "status": "affected", "version": "9.3.2411", "versionType": "custom" }, { "lessThan": "9.3.2408.119", "status": "affected", "version": "9.3.2408", "versionType": "custom" }, { "lessThan": "9.2.2406.122", "status": "affected", "version": "9.2.2406", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" }, { "lang": "en", "value": "Anudeep Gandla, Splunk" } ], "datePublic": "2025-10-01T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the \u0027admin\u0027 or \u0027power\u0027 Splunk roles could craft a malicious payload through the `dataset.command` parameter of the `/app/search/table` endpoint, which could result in execution of unauthorized JavaScript code in the browser of a user." } ], "value": "In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the \u0027admin\u0027 or \u0027power\u0027 Splunk roles could craft a malicious payload through the `dataset.command` parameter of the `/app/search/table` endpoint, which could result in execution of unauthorized JavaScript code in the browser of a user." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-01T16:08:01.304Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2025-1002" } ], "source": { "advisory": "SVD-2025-1002" }, "title": "Reflected Cross-site Scripting (XSS) in \u0027/app/search/table\u0027 endpoint through the \u0027dataset.command\u0027 parameter on Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20367", "datePublished": "2025-10-01T16:08:01.304Z", "dateReserved": "2024-10-10T19:15:13.261Z", "dateUpdated": "2025-10-01T17:40:43.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-1351 (GCVE-0-2024-1351)
Vulnerability from cvelistv5
Published
2024-03-07 16:10
Modified
2025-02-13 17:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-295 - Improper Certificate Validation
Summary
Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28.
Required Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured.
References
URL | Tags | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
MongoDB Inc | MongoDB Server |
Version: 7.0 < Version: 6.0 < Version: 5.0 < Version: 4.4 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T18:33:25.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jira.mongodb.org/browse/SERVER-72839" }, { "tags": [ "release-notes", "x_transferred" ], "url": "https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024" }, { "tags": [ "release-notes", "x_transferred" ], "url": "https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024" }, { "tags": [ "release-notes", "x_transferred" ], "url": "https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024" }, { "tags": [ "release-notes", "x_transferred" ], "url": "https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240524-0010/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mongodb", "vendor": "mongodb", "versions": [ { "lessThanOrEqual": "7.0.5", "status": "affected", "version": "7.0", "versionType": "custom" }, { "lessThanOrEqual": "6.0.13", "status": "affected", "version": "6.0", "versionType": "custom" }, { "lessThanOrEqual": "5.0.24", "status": "affected", "version": "5.0", "versionType": "custom" }, { "lessThanOrEqual": "4.4.28", "status": "affected", "version": "4.4", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-1351", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-07T18:56:20.004972Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T17:06:22.918Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "MongoDB Server", "vendor": "MongoDB Inc", "versions": [ { "lessThanOrEqual": "7.0.5", "status": "affected", "version": "7.0", "versionType": "custom" }, { "lessThanOrEqual": "6.0.13", "status": "affected", "version": "6.0", "versionType": "custom" }, { "lessThanOrEqual": "5.0.24", "status": "affected", "version": "5.0", "versionType": "custom" }, { "lessThanOrEqual": "4.4.28", "status": "affected", "version": "4.4", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured.\u003cbr\u003e" } ], "value": "A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured." } ], "datePublic": "2024-02-29T09:31:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUnder certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28.\u003c/p\u003e\u003cp\u003eRequired Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured.\u003c/p\u003e" } ], "value": "Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28.\n\nRequired Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T16:11:00.782Z", "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb", "shortName": "mongodb" }, "references": [ { "url": "https://jira.mongodb.org/browse/SERVER-72839" }, { "tags": [ "release-notes" ], "url": "https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024" }, { "tags": [ "release-notes" ], "url": "https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024" }, { "tags": [ "release-notes" ], "url": "https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024" }, { "tags": [ "release-notes" ], "url": "https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024" }, { "url": "https://security.netapp.com/advisory/ntap-20240524-0010/" } ], "source": { "discovery": "INTERNAL" }, "title": "MongoDB Server may allow successful untrusted connection", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb", "assignerShortName": "mongodb", "cveId": "CVE-2024-1351", "datePublished": "2024-03-07T16:10:19.597Z", "dateReserved": "2024-02-08T16:36:39.507Z", "dateUpdated": "2025-02-13T17:27:37.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-37601 (GCVE-0-2022-37601)
Vulnerability from cvelistv5
Published
2022-10-12 00:00
Modified
2024-10-28 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils via the name variable in parseQuery.js. This affects all versions prior to 1.4.1 and 2.0.3.
References
URL | Tags | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:29:21.030Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/parseQuery.js#L11" }, { "tags": [ "x_transferred" ], "url": "https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/parseQuery.js#L47" }, { "tags": [ "x_transferred" ], "url": "https://github.com/webpack/loader-utils/issues/212" }, { "tags": [ "x_transferred" ], "url": "https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884" }, { "tags": [ "x_transferred" ], "url": "https://dl.acm.org/doi/abs/10.1145/3488932.3497769" }, { "tags": [ "x_transferred" ], "url": "https://dl.acm.org/doi/pdf/10.1145/3488932.3497769" }, { "tags": [ "x_transferred" ], "url": "http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs2022.pdf" }, { "tags": [ "x_transferred" ], "url": "https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826" }, { "name": "[debian-lts-announce] 20221231 [SECURITY] [DLA 3258-1] node-loader-utils security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00044.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-37601", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T19:39:00.731353Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T19:41:38.297Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils via the name variable in parseQuery.js. This affects all versions prior to 1.4.1 and 2.0.3." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-10T15:59:24.822577", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/parseQuery.js#L11" }, { "url": "https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/parseQuery.js#L47" }, { "url": "https://github.com/webpack/loader-utils/issues/212" }, { "url": "https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884" }, { "url": "https://dl.acm.org/doi/abs/10.1145/3488932.3497769" }, { "url": "https://dl.acm.org/doi/pdf/10.1145/3488932.3497769" }, { "url": "http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs2022.pdf" }, { "url": "https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826" }, { "name": "[debian-lts-announce] 20221231 [SECURITY] [DLA 3258-1] node-loader-utils security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00044.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-37601", "datePublished": "2022-10-12T00:00:00", "dateReserved": "2022-08-08T00:00:00", "dateUpdated": "2024-10-28T19:41:38.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20370 (GCVE-0-2025-20370)
Vulnerability from cvelistv5
Published
2025-10-01 16:07
Modified
2025-10-01 17:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Summary
In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a user who holds a role that contains the high-privilege capability `change_authentication`, could send multiple LDAP bind requests to a specific internal endpoint, resulting in high server CPU usage, which could potentially lead to a denial of service (DoS) until the Splunk Enterprise instance is restarted. See https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/10.0/manage-splunk-platform-users-and-roles/define-roles-on-the-splunk-platform-with-capabilities and https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/10.0/use-ldap-as-an-authentication-scheme/configure-ldap-with-splunk-web#cfe47e31_007f_460d_8b3d_8505ffc3f0dd__Configure_LDAP_with_Splunk_Web for more information.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 10.0 < 10.0.1 Version: 9.4 < 9.4.4 Version: 9.3 < 9.3.6 Version: 9.2 < 9.2.8 |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20370", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-10-01T17:22:44.584017Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-01T17:36:09.560Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "10.0.1", "status": "affected", "version": "10.0", "versionType": "custom" }, { "lessThan": "9.4.4", "status": "affected", "version": "9.4", "versionType": "custom" }, { "lessThan": "9.3.6", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.8", "status": "affected", "version": "9.2", "versionType": "custom" } ] }, { "product": "Splunk Enterprise Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.2411.108", "status": "affected", "version": "9.3.2411", "versionType": "custom" }, { "lessThan": "9.3.2408.118", "status": "affected", "version": "9.3.2408", "versionType": "custom" }, { "lessThan": "9.2.2406.123", "status": "affected", "version": "9.2.2406", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "ST\u00d6K / Fredrik Alexandersson" } ], "datePublic": "2025-10-01T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a user who holds a role that contains the high-privilege capability `change_authentication`, could send multiple LDAP bind requests to a specific internal endpoint, resulting in high server CPU usage, which could potentially lead to a denial of service (DoS) until the Splunk Enterprise instance is restarted. See https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/10.0/manage-splunk-platform-users-and-roles/define-roles-on-the-splunk-platform-with-capabilities and https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/10.0/use-ldap-as-an-authentication-scheme/configure-ldap-with-splunk-web#cfe47e31_007f_460d_8b3d_8505ffc3f0dd__Configure_LDAP_with_Splunk_Web for more information." } ], "value": "In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a user who holds a role that contains the high-privilege capability `change_authentication`, could send multiple LDAP bind requests to a specific internal endpoint, resulting in high server CPU usage, which could potentially lead to a denial of service (DoS) until the Splunk Enterprise instance is restarted. See https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/10.0/manage-splunk-platform-users-and-roles/define-roles-on-the-splunk-platform-with-capabilities and https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/10.0/use-ldap-as-an-authentication-scheme/configure-ldap-with-splunk-web#cfe47e31_007f_460d_8b3d_8505ffc3f0dd__Configure_LDAP_with_Splunk_Web for more information." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-01T16:07:57.541Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2025-1005" } ], "source": { "advisory": "SVD-2025-1005" }, "title": "Denial of Service (DoS) through Multiple LDAP Bind Requests in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20370", "datePublished": "2025-10-01T16:07:57.541Z", "dateReserved": "2024-10-10T19:15:13.262Z", "dateUpdated": "2025-10-01T17:36:09.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44906 (GCVE-0-2021-44906)
Vulnerability from cvelistv5
Published
2022-03-17 13:05
Modified
2024-08-04 04:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
References
URL | Tags | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" }, { "tags": [ "x_transferred" ], "url": "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip" }, { "tags": [ "x_transferred" ], "url": "https://github.com/substack/minimist/blob/master/index.js#L69" }, { "tags": [ "x_transferred" ], "url": "https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068" }, { "tags": [ "x_transferred" ], "url": "https://github.com/substack/minimist/issues/164" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Minimist \u003c=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-21T19:07:14.002611", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" }, { "url": "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip" }, { "url": "https://github.com/substack/minimist/blob/master/index.js#L69" }, { "url": "https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068" }, { "url": "https://github.com/substack/minimist/issues/164" }, { "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44906", "datePublished": "2022-03-17T13:05:57", "dateReserved": "2021-12-13T00:00:00", "dateUpdated": "2024-08-04T04:32:13.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4947 (GCVE-0-2025-4947)
Vulnerability from cvelistv5
Published
2025-05-28 06:29
Modified
2025-05-28 13:58
Severity ?
VLAI Severity ?
EPSS score ?
Summary
libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
curl | curl |
Version: 8.13.0 ≤ 8.13.0 Version: 8.12.1 ≤ 8.12.1 Version: 8.12.0 ≤ 8.12.0 Version: 8.11.1 ≤ 8.11.1 Version: 8.11.0 ≤ 8.11.0 Version: 8.10.1 ≤ 8.10.1 Version: 8.10.0 ≤ 8.10.0 Version: 8.9.1 ≤ 8.9.1 Version: 8.9.0 ≤ 8.9.0 Version: 8.8.0 ≤ 8.8.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-05-28T08:03:56.748Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/05/28/4" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-4947", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-28T13:57:59.462879Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T13:58:33.430Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "curl", "vendor": "curl", "versions": [ { "lessThanOrEqual": "8.13.0", "status": "affected", "version": "8.13.0", "versionType": "semver" }, { "lessThanOrEqual": "8.12.1", "status": "affected", "version": "8.12.1", "versionType": "semver" }, { "lessThanOrEqual": "8.12.0", "status": "affected", "version": "8.12.0", "versionType": "semver" }, { "lessThanOrEqual": "8.11.1", "status": "affected", "version": "8.11.1", "versionType": "semver" }, { "lessThanOrEqual": "8.11.0", "status": "affected", "version": "8.11.0", "versionType": "semver" }, { "lessThanOrEqual": "8.10.1", "status": "affected", "version": "8.10.1", "versionType": "semver" }, { "lessThanOrEqual": "8.10.0", "status": "affected", "version": "8.10.0", "versionType": "semver" }, { "lessThanOrEqual": "8.9.1", "status": "affected", "version": "8.9.1", "versionType": "semver" }, { "lessThanOrEqual": "8.9.0", "status": "affected", "version": "8.9.0", "versionType": "semver" }, { "lessThanOrEqual": "8.8.0", "status": "affected", "version": "8.8.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Hiroki Kurosawa" }, { "lang": "en", "type": "remediation developer", "value": "Stefan Eissing" } ], "descriptions": [ { "lang": "en", "value": "libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-295 Improper Certificate Validation", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-28T06:29:34.974Z", "orgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "shortName": "curl" }, "references": [ { "name": "json", "url": "https://curl.se/docs/CVE-2025-4947.json" }, { "name": "www", "url": "https://curl.se/docs/CVE-2025-4947.html" }, { "name": "issue", "url": "https://hackerone.com/reports/3150884" } ], "title": "QUIC certificate check skip with wolfSSL" } }, "cveMetadata": { "assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "assignerShortName": "curl", "cveId": "CVE-2025-4947", "datePublished": "2025-05-28T06:29:34.974Z", "dateReserved": "2025-05-19T06:09:52.737Z", "dateUpdated": "2025-05-28T13:58:33.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-7254 (GCVE-0-2024-7254)
Vulnerability from cvelistv5
Published
2024-09-19 00:18
Modified
2025-09-08 09:37
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Protocol Buffers |
Version: 0 < 28.2 |
||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:google:protobuf:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "protobuf", "vendor": "google", "versions": [ { "lessThan": "28.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:*", "cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "protobuf-kotlin-lite", "vendor": "google", "versions": [ { "lessThan": "3.25.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.27.5", "status": "affected", "version": "4.27", "versionType": "custom" }, { "lessThan": "4.28.2", "status": "affected", "version": "4.28", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-7254", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T14:29:43.468555Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T14:46:14.517Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-04-19T00:11:07.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20241213-0010/" }, { "url": "https://security.netapp.com/advisory/ntap-20250418-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Protocol Buffers", "repo": "https://github.com/protocolbuffers/protobuf", "vendor": "Google", "versions": [ { "lessThan": "28.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "collectionURL": "https://mvnrepository.com/artifact/com.google.protobuf/protobuf-java", "defaultStatus": "unaffected", "product": "protobuf-java", "vendor": "Google", "versions": [ { "lessThan": "3.25.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.27.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.28.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "protobuf-javalite", "vendor": "Google", "versions": [ { "lessThan": "3.25.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.27.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.28.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "protobuf-kotlin", "vendor": "Google", "versions": [ { "lessThan": "3.25.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.27.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.28.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "protobuf-kotllin-lite", "vendor": "Google", "versions": [ { "lessThan": "3.25.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.27.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.28.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "collectionURL": "https://rubygems.org/gems/google-protobuf", "defaultStatus": "unaffected", "product": "google-protobuf [JRuby Gem]", "vendor": "Google", "versions": [ { "lessThan": "3.25.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.27.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.28.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexis Challande, Trail of Bits Ecosystem Security Team \u003cecosystem@trailofbits.com\u003e" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAny project that parses untrusted Protocol Buffers data\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;containing an arbitrary number of nested \u003c/span\u003e\u003ccode\u003egroup\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003es / series of \u003c/span\u003e\u003ccode\u003eSGROUP\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;tags can corrupted by exceeding the stack limit i.e. StackOverflow. \u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003eParsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\u003c/p\u003e" } ], "value": "Any project that parses untrusted Protocol Buffers data\u00a0containing an arbitrary number of nested groups / series of SGROUP\u00a0tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-674", "description": "CWE-674 Uncontrolled Recursion", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-08T09:37:53.702Z", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "source": { "discovery": "UNKNOWN" }, "title": "Stack overflow in Protocol Buffers Java Lite", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2024-7254", "datePublished": "2024-09-19T00:18:45.824Z", "dateReserved": "2024-07-29T21:41:56.116Z", "dateUpdated": "2025-09-08T09:37:53.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-52999 (GCVE-0-2025-52999)
Vulnerability from cvelistv5
Published
2025-06-25 17:02
Modified
2025-06-25 18:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based Buffer Overflow
Summary
jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FasterXML | jackson-core |
Version: < 2.15.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-52999", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-25T18:04:07.206576Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-25T18:04:23.296Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "jackson-core", "vendor": "FasterXML", "versions": [ { "status": "affected", "version": "\u003c 2.15.0" } ] } ], "descriptions": [ { "lang": "en", "value": "jackson-core contains core low-level incremental (\"streaming\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T17:02:57.428Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3" }, { "name": "https://github.com/FasterXML/jackson-core/pull/943", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FasterXML/jackson-core/pull/943" } ], "source": { "advisory": "GHSA-h46c-h94j-95f3", "discovery": "UNKNOWN" }, "title": "jackson-core Has Potential for StackoverflowError if user parses an input file that contains very deeply nested data" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-52999", "datePublished": "2025-06-25T17:02:57.428Z", "dateReserved": "2025-06-24T03:50:36.795Z", "dateUpdated": "2025-06-25T18:04:23.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-32415 (GCVE-0-2025-32415)
Vulnerability from cvelistv5
Published
2025-04-17 00:00
Modified
2025-04-17 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1284 - Improper Validation of Specified Quantity in Input
Summary
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-32415", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T18:38:26.252207Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:38:30.600Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/890" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "libxml2", "vendor": "xmlsoft", "versions": [ { "lessThan": "2.13.8", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThan": "2.14.2", "status": "affected", "version": "2.14.0", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.13.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.14.2", "versionStartIncluding": "2.14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used." } ], "metrics": [ { "cvssV3_1": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1284", "description": "CWE-1284 Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T17:21:08.467Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/890" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2025-32415", "datePublished": "2025-04-17T00:00:00.000Z", "dateReserved": "2025-04-08T00:00:00.000Z", "dateUpdated": "2025-04-17T18:38:30.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-5025 (GCVE-0-2025-5025)
Vulnerability from cvelistv5
Published
2025-05-28 06:29
Modified
2025-05-30 16:19
Severity ?
VLAI Severity ?
EPSS score ?
Summary
libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
curl | curl |
Version: 8.13.0 ≤ 8.13.0 Version: 8.12.1 ≤ 8.12.1 Version: 8.12.0 ≤ 8.12.0 Version: 8.11.1 ≤ 8.11.1 Version: 8.11.0 ≤ 8.11.0 Version: 8.10.1 ≤ 8.10.1 Version: 8.10.0 ≤ 8.10.0 Version: 8.9.1 ≤ 8.9.1 Version: 8.9.0 ≤ 8.9.0 Version: 8.8.0 ≤ 8.8.0 Version: 8.7.1 ≤ 8.7.1 Version: 8.7.0 ≤ 8.7.0 Version: 8.6.0 ≤ 8.6.0 Version: 8.5.0 ≤ 8.5.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-05-28T08:03:57.908Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/05/28/5" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-5025", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-30T16:19:34.842150Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-30T16:19:53.775Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "curl", "vendor": "curl", "versions": [ { "lessThanOrEqual": "8.13.0", "status": "affected", "version": "8.13.0", "versionType": "semver" }, { "lessThanOrEqual": "8.12.1", "status": "affected", "version": "8.12.1", "versionType": "semver" }, { "lessThanOrEqual": "8.12.0", "status": "affected", "version": "8.12.0", "versionType": "semver" }, { "lessThanOrEqual": "8.11.1", "status": "affected", "version": "8.11.1", "versionType": "semver" }, { "lessThanOrEqual": "8.11.0", "status": "affected", "version": "8.11.0", "versionType": "semver" }, { "lessThanOrEqual": "8.10.1", "status": "affected", "version": "8.10.1", "versionType": "semver" }, { "lessThanOrEqual": "8.10.0", "status": "affected", "version": "8.10.0", "versionType": "semver" }, { "lessThanOrEqual": "8.9.1", "status": "affected", "version": "8.9.1", "versionType": "semver" }, { "lessThanOrEqual": "8.9.0", "status": "affected", "version": "8.9.0", "versionType": "semver" }, { "lessThanOrEqual": "8.8.0", "status": "affected", "version": "8.8.0", "versionType": "semver" }, { "lessThanOrEqual": "8.7.1", "status": "affected", "version": "8.7.1", "versionType": "semver" }, { "lessThanOrEqual": "8.7.0", "status": "affected", "version": "8.7.0", "versionType": "semver" }, { "lessThanOrEqual": "8.6.0", "status": "affected", "version": "8.6.0", "versionType": "semver" }, { "lessThanOrEqual": "8.5.0", "status": "affected", "version": "8.5.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Hiroki Kurosawa" }, { "lang": "en", "type": "remediation developer", "value": "Stefan Eissing" } ], "descriptions": [ { "lang": "en", "value": "libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-295 Improper Certificate Validation", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-28T06:29:51.915Z", "orgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "shortName": "curl" }, "references": [ { "name": "json", "url": "https://curl.se/docs/CVE-2025-5025.json" }, { "name": "www", "url": "https://curl.se/docs/CVE-2025-5025.html" }, { "name": "issue", "url": "https://hackerone.com/reports/3153497" } ], "title": "No QUIC certificate pinning with wolfSSL" } }, "cveMetadata": { "assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9", "assignerShortName": "curl", "cveId": "CVE-2025-5025", "datePublished": "2025-05-28T06:29:51.915Z", "dateReserved": "2025-05-21T06:25:30.863Z", "dateUpdated": "2025-05-30T16:19:53.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-5237 (GCVE-0-2015-5237)
Vulnerability from cvelistv5
Published
2017-09-25 17:00
Modified
2024-08-06 06:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
protobuf allows remote authenticated attackers to cause a heap-based buffer overflow.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:08.584Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/protobuf/issues/760" }, { "name": "[oss-security] 20150827 CVE-2015-5237: Integer overflow in protobuf serialization (currently minor)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256426" }, { "name": "[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "name": "[pulsar-commits] 20200425 [GitHub] [pulsar] guyv opened a new issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ra28fed69eef3a71e5fe5daea001d0456b05b102044237330ec5c7c82%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200428 [GitHub] [pulsar] gaoran10 edited a comment on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r17dc6f394429f6bffb5e4c66555d93c2e9923cbbdc5a93db9a56c1c7%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200428 [GitHub] [pulsar] gaoran10 commented on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r42e47994734cd1980ef3e204a40555336e10cc80096927aca2f37d90%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200428 [GitHub] [pulsar] guyv commented on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/re6d04a214424a97ea59c62190d79316edf311a0a6346524dfef3b940%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200428 [GitHub] [pulsar] guyv edited a comment on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r1263fa5b51e4ec3cb8f09ff40e4747428c71198e9bee93349ec96a3c%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200430 [GitHub] [pulsar] sijie commented on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r42ef6acfb0d86a2df0c2390702ecbe97d2104a331560f2790d17ca69%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200506 [GitHub] [pulsar] gaoran10 commented on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rb71dac1d9dd4e8a8ae3dbc033aeae514eda9be1263c1df3b42a530a2%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200506 [GitHub] [pulsar] gaoran10 edited a comment on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r320dc858da88846ba00bb077bcca2cdf75b7dde0f6eb3a3d60dba6a1%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200506 [GitHub] [pulsar] sijie commented on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r85c9a764b573c786224688cc906c27e28343e18f5b33387f94cae90f%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[flink-dev] 20200806 Dependency vulnerabilities with Apache Flink 1.10.1 version", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb%40%3Cdev.flink.apache.org%3E" }, { "name": "[flink-user] 20200806 Dependency vulnerabilities with Apache Flink 1.10.1 version", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb%40%3Cuser.flink.apache.org%3E" }, { "name": "[pulsar-commits] 20210120 [GitHub] [pulsar] fmiguelez opened a new issue #9250: Protobuf version used in broker and client affected by vulnerability CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r5e52caf41dc49df55b4ee80758356fe1ff2a88179ff24c685de7c28d%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20210120 [GitHub] [pulsar] merlimat commented on issue #9250: Protobuf version used in broker and client affected by vulnerability CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf7539287c90be979bac94af9aaba34118fbf968864944b4871af48dd%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20210128 [GitHub] [pulsar] codelipenghui closed issue #9250: Protobuf version used in broker and client affected by vulnerability CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r1d274d647b3c2060df9be21eade4ce56d3a59998cf19ac72662dd994%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[spark-issues] 20210624 [jira] [Assigned] (SPARK-35877) Spark Protobuf jar has CVE issue CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rb40dc9d63a5331bce8e80865b7fa3af9dd31e16555affd697b6f3526%40%3Cissues.spark.apache.org%3E" }, { "name": "[spark-issues] 20210624 [jira] [Commented] (SPARK-35877) Spark Protobuf jar has CVE issue CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r4886108206d4c535db9b20c813fe4723d4fe6a91b9278382af8b9d08%40%3Cissues.spark.apache.org%3E" }, { "name": "[spark-issues] 20210624 [jira] [Created] (SPARK-35877) Spark Protobuf jar has CVE issue CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r5741f4dbdd129dbb9885f5fb170dc1b24a06b9313bedef5e67fded94%40%3Cissues.spark.apache.org%3E" }, { "name": "[spark-issues] 20210720 [jira] [Resolved] (SPARK-35877) Spark Protobuf jar has CVE issue CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r14fa8d38d5757254f1a2e112270c996711d514de2e3b01c93d397ab4%40%3Cissues.spark.apache.org%3E" }, { "name": "[hadoop-common-dev] 20210823 [jira] [Created] (HADOOP-17860) Upgrade third party protobuf-java-2.5.0.jar to address vulnerabilities CVEs #CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r00d9ab1fc0f1daf14cd4386564dd84f7889404438d81462c86dfa836%40%3Ccommon-dev.hadoop.apache.org%3E" }, { "name": "[hadoop-common-issues] 20210823 [jira] [Updated] (HADOOP-17860) Upgrade third party protobuf-java-2.5.0.jar to address vulnerabilities #CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r764fc66435ee4d185d359c28c0887d3e5866d7292a8d5598d9e7cbc4%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "name": "[hadoop-common-issues] 20210823 [jira] [Created] (HADOOP-17860) Upgrade third party protobuf-java-2.5.0.jar to address vulnerabilities CVEs #CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r2ea33ce5591a9cb9ed52750b6ab42ab658f529a7028c3166ba93c7d5%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "name": "[hadoop-common-issues] 20210823 [jira] [Commented] (HADOOP-17860) Upgrade third party protobuf-java-2.5.0.jar to address vulnerabilities #CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r0ca83171c4898dc92b86fa6f484a7be1dc96206765f4d01dce0f1b28%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "name": "[hbase-issues] 20210828 [jira] [Commented] (HBASE-26234) Protobuf-java-2.5.0.jar Has Several Security Vulnerabilities,CVE-2015-5237,CVE-2019-15544", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r4ef574a5621b0e670a3ce641e9922543e34f22bf4c9ee9584aa67fcf%40%3Cissues.hbase.apache.org%3E" }, { "name": "[hbase-dev] 20210828 [jira] [Created] (HBASE-26234) Protobuf-java-2.5.0.jar Has Several Security Vulnerabilities,CVE-2015-5237,CVE-2019-15544", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r00097d0b5b6164ea428554007121d5dc1f88ba2af7b9e977a10572cd%40%3Cdev.hbase.apache.org%3E" }, { "name": "[hbase-issues] 20210828 [jira] [Created] (HBASE-26234) Protobuf-java-2.5.0.jar Has Several Security Vulnerabilities,CVE-2015-5237,CVE-2019-15544", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd64381fb8f92d640c1975dc50dcdf1b8512e02a2a7b20292d3565cae%40%3Cissues.hbase.apache.org%3E" }, { "name": "[hadoop-common-issues] 20210902 [jira] [Updated] (HADOOP-17860) Upgrade third party protobuf-java-2.5.0.jar to address vulnerabilities #CVE-2015-5237, CVE-2019-15544", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r7fed8dd9bee494094e7011cf3c2ab75bd8754ea314c6734688c42932%40%3Ccommon-issues.hadoop.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "protobuf allows remote authenticated attackers to cause a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-02T14:06:08", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/protobuf/issues/760" }, { "name": "[oss-security] 20150827 CVE-2015-5237: Integer overflow in protobuf serialization (currently minor)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256426" }, { "name": "[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "name": "[pulsar-commits] 20200425 [GitHub] [pulsar] guyv opened a new issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ra28fed69eef3a71e5fe5daea001d0456b05b102044237330ec5c7c82%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200428 [GitHub] [pulsar] gaoran10 edited a comment on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r17dc6f394429f6bffb5e4c66555d93c2e9923cbbdc5a93db9a56c1c7%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200428 [GitHub] [pulsar] gaoran10 commented on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r42e47994734cd1980ef3e204a40555336e10cc80096927aca2f37d90%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200428 [GitHub] [pulsar] guyv commented on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/re6d04a214424a97ea59c62190d79316edf311a0a6346524dfef3b940%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200428 [GitHub] [pulsar] guyv edited a comment on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r1263fa5b51e4ec3cb8f09ff40e4747428c71198e9bee93349ec96a3c%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200430 [GitHub] [pulsar] sijie commented on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r42ef6acfb0d86a2df0c2390702ecbe97d2104a331560f2790d17ca69%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200506 [GitHub] [pulsar] gaoran10 commented on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rb71dac1d9dd4e8a8ae3dbc033aeae514eda9be1263c1df3b42a530a2%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200506 [GitHub] [pulsar] gaoran10 edited a comment on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r320dc858da88846ba00bb077bcca2cdf75b7dde0f6eb3a3d60dba6a1%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20200506 [GitHub] [pulsar] sijie commented on issue #6818: pulsar-client vulnerability CVE-2015-5237 (shaded protobuf-java:2.4.1)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r85c9a764b573c786224688cc906c27e28343e18f5b33387f94cae90f%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[flink-dev] 20200806 Dependency vulnerabilities with Apache Flink 1.10.1 version", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb%40%3Cdev.flink.apache.org%3E" }, { "name": "[flink-user] 20200806 Dependency vulnerabilities with Apache Flink 1.10.1 version", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb%40%3Cuser.flink.apache.org%3E" }, { "name": "[pulsar-commits] 20210120 [GitHub] [pulsar] fmiguelez opened a new issue #9250: Protobuf version used in broker and client affected by vulnerability CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r5e52caf41dc49df55b4ee80758356fe1ff2a88179ff24c685de7c28d%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20210120 [GitHub] [pulsar] merlimat commented on issue #9250: Protobuf version used in broker and client affected by vulnerability CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf7539287c90be979bac94af9aaba34118fbf968864944b4871af48dd%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[pulsar-commits] 20210128 [GitHub] [pulsar] codelipenghui closed issue #9250: Protobuf version used in broker and client affected by vulnerability CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r1d274d647b3c2060df9be21eade4ce56d3a59998cf19ac72662dd994%40%3Ccommits.pulsar.apache.org%3E" }, { "name": "[spark-issues] 20210624 [jira] [Assigned] (SPARK-35877) Spark Protobuf jar has CVE issue CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rb40dc9d63a5331bce8e80865b7fa3af9dd31e16555affd697b6f3526%40%3Cissues.spark.apache.org%3E" }, { "name": "[spark-issues] 20210624 [jira] [Commented] (SPARK-35877) Spark Protobuf jar has CVE issue CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r4886108206d4c535db9b20c813fe4723d4fe6a91b9278382af8b9d08%40%3Cissues.spark.apache.org%3E" }, { "name": "[spark-issues] 20210624 [jira] [Created] (SPARK-35877) Spark Protobuf jar has CVE issue CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r5741f4dbdd129dbb9885f5fb170dc1b24a06b9313bedef5e67fded94%40%3Cissues.spark.apache.org%3E" }, { "name": "[spark-issues] 20210720 [jira] [Resolved] (SPARK-35877) Spark Protobuf jar has CVE issue CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r14fa8d38d5757254f1a2e112270c996711d514de2e3b01c93d397ab4%40%3Cissues.spark.apache.org%3E" }, { "name": "[hadoop-common-dev] 20210823 [jira] [Created] (HADOOP-17860) Upgrade third party protobuf-java-2.5.0.jar to address vulnerabilities CVEs #CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r00d9ab1fc0f1daf14cd4386564dd84f7889404438d81462c86dfa836%40%3Ccommon-dev.hadoop.apache.org%3E" }, { "name": "[hadoop-common-issues] 20210823 [jira] [Updated] (HADOOP-17860) Upgrade third party protobuf-java-2.5.0.jar to address vulnerabilities #CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r764fc66435ee4d185d359c28c0887d3e5866d7292a8d5598d9e7cbc4%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "name": "[hadoop-common-issues] 20210823 [jira] [Created] (HADOOP-17860) Upgrade third party protobuf-java-2.5.0.jar to address vulnerabilities CVEs #CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r2ea33ce5591a9cb9ed52750b6ab42ab658f529a7028c3166ba93c7d5%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "name": "[hadoop-common-issues] 20210823 [jira] [Commented] (HADOOP-17860) Upgrade third party protobuf-java-2.5.0.jar to address vulnerabilities #CVE-2015-5237", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r0ca83171c4898dc92b86fa6f484a7be1dc96206765f4d01dce0f1b28%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "name": "[hbase-issues] 20210828 [jira] [Commented] (HBASE-26234) Protobuf-java-2.5.0.jar Has Several Security Vulnerabilities,CVE-2015-5237,CVE-2019-15544", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r4ef574a5621b0e670a3ce641e9922543e34f22bf4c9ee9584aa67fcf%40%3Cissues.hbase.apache.org%3E" }, { "name": "[hbase-dev] 20210828 [jira] [Created] (HBASE-26234) Protobuf-java-2.5.0.jar Has Several Security Vulnerabilities,CVE-2015-5237,CVE-2019-15544", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r00097d0b5b6164ea428554007121d5dc1f88ba2af7b9e977a10572cd%40%3Cdev.hbase.apache.org%3E" }, { "name": "[hbase-issues] 20210828 [jira] [Created] (HBASE-26234) Protobuf-java-2.5.0.jar Has Several Security Vulnerabilities,CVE-2015-5237,CVE-2019-15544", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd64381fb8f92d640c1975dc50dcdf1b8512e02a2a7b20292d3565cae%40%3Cissues.hbase.apache.org%3E" }, { "name": "[hadoop-common-issues] 20210902 [jira] [Updated] (HADOOP-17860) Upgrade third party protobuf-java-2.5.0.jar to address vulnerabilities #CVE-2015-5237, CVE-2019-15544", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r7fed8dd9bee494094e7011cf3c2ab75bd8754ea314c6734688c42932%40%3Ccommon-issues.hadoop.apache.org%3E" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5237", "datePublished": "2017-09-25T17:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:08.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20371 (GCVE-0-2025-20371)
Vulnerability from cvelistv5
Published
2025-10-01 16:08
Modified
2025-10-02 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-918 - The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Summary
In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, an unauthenticated attacker could trigger a blind server-side request forgery (SSRF) potentially letting an attacker perform REST API calls on behalf of an authenticated high-privileged user.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 10.0 < 10.0.1 Version: 9.4 < 9.4.4 Version: 9.3 < 9.3.6 Version: 9.2 < 9.2.8 |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20371", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-01T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-02T03:55:47.543Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "10.0.1", "status": "affected", "version": "10.0", "versionType": "custom" }, { "lessThan": "9.4.4", "status": "affected", "version": "9.4", "versionType": "custom" }, { "lessThan": "9.3.6", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.8", "status": "affected", "version": "9.2", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.2411.109", "status": "affected", "version": "9.3.2411", "versionType": "custom" }, { "lessThan": "9.3.2408.119", "status": "affected", "version": "9.3.2408", "versionType": "custom" }, { "lessThan": "9.2.2406.122", "status": "affected", "version": "9.2.2406", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Alex Hordijk (hordalex)" } ], "datePublic": "2025-10-01T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, an unauthenticated attacker could trigger a blind server-side request forgery (SSRF) potentially letting an attacker perform REST API calls on behalf of an authenticated high-privileged user." } ], "value": "In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, an unauthenticated attacker could trigger a blind server-side request forgery (SSRF) potentially letting an attacker perform REST API calls on behalf of an authenticated high-privileged user." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-01T16:08:02.891Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2025-1006" } ], "source": { "advisory": "SVD-2025-1006" }, "title": "Unauthenticated Blind Server Side Request Forgery (SSRF) in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20371", "datePublished": "2025-10-01T16:08:02.891Z", "dateReserved": "2024-10-10T19:15:13.262Z", "dateUpdated": "2025-10-02T03:55:47.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20368 (GCVE-0-2025-20368)
Vulnerability from cvelistv5
Published
2025-10-01 16:08
Modified
2025-10-01 17:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Summary
In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through the error messages and job inspection details of a saved search. This could result in execution of unauthorized JavaScript code in the browser of a user.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 10.0 < 10.0.0 Version: 9.4 < 9.4.4 Version: 9.3 < 9.3.6 Version: 9.2 < 9.2.8 |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20368", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-10-01T17:22:31.984073Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-01T17:35:52.651Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "10.0.0", "status": "affected", "version": "10.0", "versionType": "custom" }, { "lessThan": "9.4.4", "status": "affected", "version": "9.4", "versionType": "custom" }, { "lessThan": "9.3.6", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.8", "status": "affected", "version": "9.2", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.2411.108", "status": "affected", "version": "9.3.2411", "versionType": "custom" }, { "lessThan": "9.3.2408.118", "status": "affected", "version": "9.3.2408", "versionType": "custom" }, { "lessThan": "9.2.2406.123", "status": "affected", "version": "9.2.2406", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2025-10-01T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through the error messages and job inspection details of a saved search. This could result in execution of unauthorized JavaScript code in the browser of a user." } ], "value": "In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through the error messages and job inspection details of a saved search. This could result in execution of unauthorized JavaScript code in the browser of a user." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-01T16:08:04.403Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2025-1003" } ], "source": { "advisory": "SVD-2025-1003" }, "title": "Stored Cross-Site Scripting (XSS) through missing field warning messages in Saved Search and Job Inspector on Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20368", "datePublished": "2025-10-01T16:08:04.403Z", "dateReserved": "2024-10-10T19:15:13.261Z", "dateUpdated": "2025-10-01T17:35:52.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…