forked from CVEProject/cvelistV5
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- 2 new CVEs: CVE-2024-56195, CVE-2024-56196 - 0 updated CVEs:
- Loading branch information
cvelistV5 Github Action
committed
Mar 6, 2025
1 parent
bc245d9
commit 6a4ee32
Showing
2 changed files
with
194 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,100 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-56195", | ||
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "apache", | ||
"dateReserved": "2024-12-18T17:56:13.320Z", | ||
"datePublished": "2025-03-06T11:23:37.067Z", | ||
"dateUpdated": "2025-03-06T11:23:37.067Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"defaultStatus": "unaffected", | ||
"product": "Apache Traffic Server", | ||
"vendor": "Apache Software Foundation", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "9.2.8", | ||
"status": "affected", | ||
"version": "9.2.0", | ||
"versionType": "semver" | ||
}, | ||
{ | ||
"lessThanOrEqual": "10.0.3", | ||
"status": "affected", | ||
"version": "10.0.0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "reporter", | ||
"value": "Masaori Koshiba" | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "<p>Improper Access Control vulnerability in Apache Traffic Server.</p><p>This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3.</p><p>Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.</p>" | ||
} | ||
], | ||
"value": "Improper Access Control vulnerability in Apache Traffic Server.\n\nThis issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3.\n\nUsers are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue." | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"other": { | ||
"content": { | ||
"text": "important" | ||
}, | ||
"type": "Textual description of severity" | ||
} | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-284", | ||
"description": "CWE-284 Improper Access Control", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", | ||
"shortName": "apache", | ||
"dateUpdated": "2025-03-06T11:23:37.067Z" | ||
}, | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"vendor-advisory" | ||
], | ||
"url": "https://lists.apache.org/thread/btofzws2yqskk2n7f01r3l1819x01023" | ||
} | ||
], | ||
"source": { | ||
"discovery": "UNKNOWN" | ||
}, | ||
"title": "Apache Traffic Server: Intercept plugins are not access controlled", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,94 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-56196", | ||
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "apache", | ||
"dateReserved": "2024-12-18T18:11:39.803Z", | ||
"datePublished": "2025-03-06T11:21:49.763Z", | ||
"dateUpdated": "2025-03-06T11:21:49.763Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"defaultStatus": "unaffected", | ||
"product": "Apache Traffic Server", | ||
"vendor": "Apache Software Foundation", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "10.0.3", | ||
"status": "affected", | ||
"version": "10.0.0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "reporter", | ||
"value": "Chris McFarlen" | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "<p>Improper Access Control vulnerability in Apache Traffic Server.</p><p>This issue affects Apache Traffic Server: from 10.0.0 through 10.0.3.</p><p>Users are recommended to upgrade to version 10.0.4, which fixes the issue.</p>" | ||
} | ||
], | ||
"value": "Improper Access Control vulnerability in Apache Traffic Server.\n\nThis issue affects Apache Traffic Server: from 10.0.0 through 10.0.3.\n\nUsers are recommended to upgrade to version 10.0.4, which fixes the issue." | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"other": { | ||
"content": { | ||
"text": "important" | ||
}, | ||
"type": "Textual description of severity" | ||
} | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-284", | ||
"description": "CWE-284 Improper Access Control", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", | ||
"shortName": "apache", | ||
"dateUpdated": "2025-03-06T11:21:49.763Z" | ||
}, | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"vendor-advisory" | ||
], | ||
"url": "https://lists.apache.org/thread/btofzws2yqskk2n7f01r3l1819x01023" | ||
} | ||
], | ||
"source": { | ||
"discovery": "UNKNOWN" | ||
}, | ||
"title": "Apache Traffic Server: ACL is not fully compatible with older versions", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |