All the vulnerabilites related to JFrog - Artifactory
cve-2024-2248
Vulnerability from cvelistv5
Published
2024-05-15 13:13
Modified
2024-08-01 19:03
Severity ?
EPSS score ?
Summary
JFrog Artifactory Header Injection
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "artifactory", "vendor": "jfrog", "versions": [ { "lessThan": "7.85.0(\\SaaS\\)", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.84.7\\(Selff-Hosted\\)", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-2248", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-10T19:29:25.930609Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-29T13:17:15.300Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:03:39.335Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.85.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.84.7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA Header Injection vulnerability in the JFrog platform in versions below 7.85.0 (SaaS) and 7.84.7 (Self-Hosted) may allow threat actors to take over the end user\u0027s account when clicking on a specially crafted URL sent to the victim\u2019s user email.\u003c/p\u003e\u003cp\u003e\u003c/p\u003e" } ], "value": "A Header Injection vulnerability in the JFrog platform in versions below 7.85.0 (SaaS) and 7.84.7 (Self-Hosted) may allow threat actors to take over the end user\u0027s account when clicking on a specially crafted URL sent to the victim\u2019s user email." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T13:13:29.213Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "source": { "discovery": "UNKNOWN" }, "title": "JFrog Artifactory Header Injection", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2024-2248", "datePublished": "2024-05-15T13:13:29.213Z", "dateReserved": "2024-03-07T08:50:11.919Z", "dateUpdated": "2024-08-01T19:03:39.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19937
Vulnerability from cvelistv5
Published
2020-03-16 19:45
Modified
2024-08-05 02:32
Severity ?
EPSS score ?
Summary
In JFrog Artifactory before 6.18, it is not possible to restrict either system or repository imports by any admin user in the enterprise, which can lead to "undesirable results."
References
▼ | URL | Tags |
---|---|---|
https://www.secureworks.com/research/subject/advisories | x_refsource_MISC | |
https://www.jfrog.com/confluence/display/RTF6X/Release+Notes#ReleaseNotes-Artifactory6.18 | x_refsource_MISC | |
https://www.jfrog.com/confluence/display/RTF6X/Importing+and+Exporting | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:32:10.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.secureworks.com/research/subject/advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/RTF6X/Release+Notes#ReleaseNotes-Artifactory6.18" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/RTF6X/Importing+and+Exporting" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In JFrog Artifactory before 6.18, it is not possible to restrict either system or repository imports by any admin user in the enterprise, which can lead to \"undesirable results.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-16T19:45:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.secureworks.com/research/subject/advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/RTF6X/Release+Notes#ReleaseNotes-Artifactory6.18" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/RTF6X/Importing+and+Exporting" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JFrog Artifactory before 6.18, it is not possible to restrict either system or repository imports by any admin user in the enterprise, which can lead to \"undesirable results.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.secureworks.com/research/subject/advisories", "refsource": "MISC", "url": "https://www.secureworks.com/research/subject/advisories" }, { "name": "https://www.jfrog.com/confluence/display/RTF6X/Release+Notes#ReleaseNotes-Artifactory6.18", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/RTF6X/Release+Notes#ReleaseNotes-Artifactory6.18" }, { "name": "https://www.jfrog.com/confluence/display/RTF6X/Importing+and+Exporting", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/RTF6X/Importing+and+Exporting" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19937", "datePublished": "2020-03-16T19:45:36", "dateReserved": "2019-12-23T00:00:00", "dateUpdated": "2024-08-05T02:32:10.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6501
Vulnerability from cvelistv5
Published
2016-12-09 22:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
JFrog Artifactory before 4.11 allows remote attackers to execute arbitrary code via an LDAP attribute with a crafted serialized Java object, aka LDAP entry poisoning.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/94855 | vdb-entry, x_refsource_BID | |
https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf | x_refsource_MISC | |
https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-MainUpdates.7 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:20.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94855", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94855" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-MainUpdates.7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-31T00:00:00", "descriptions": [ { "lang": "en", "value": "JFrog Artifactory before 4.11 allows remote attackers to execute arbitrary code via an LDAP attribute with a crafted serialized Java object, aka LDAP entry poisoning." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-14T10:57:01", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "name": "94855", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94855" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-MainUpdates.7" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2016-6501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory before 4.11 allows remote attackers to execute arbitrary code via an LDAP attribute with a crafted serialized Java object, aka LDAP entry poisoning." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "94855", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94855" }, { "name": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf", "refsource": "MISC", "url": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf" }, { "name": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-MainUpdates.7", "refsource": "CONFIRM", "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-MainUpdates.7" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2016-6501", "datePublished": "2016-12-09T22:00:00", "dateReserved": "2016-08-01T00:00:00", "dateUpdated": "2024-08-06T01:29:20.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1000623
Vulnerability from cvelistv5
Published
2018-07-09 20:00
Modified
2024-09-16 21:56
Severity ?
EPSS score ?
Summary
JFrog JFrog Artifactory version Prior to version 6.0.3, since version 4.0.0 contains a Directory Traversal vulnerability in The "Import Repository from Zip" feature, available through the Admin menu -> Import & Export -> Repositories, triggers a vulnerable UI REST endpoint (/ui/artifactimport/upload) that can result in Directory traversal / file overwrite and remote code execution. This attack appear to be exploitable via An attacker with Admin privileges may use the aforementioned UI endpoint and exploit the publicly known "Zip Slip" vulnerability, to add/overwrite files outside the target directory. This vulnerability appears to have been fixed in 6.0.3.
References
▼ | URL | Tags |
---|---|---|
https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.0.3 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:40:47.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.0.3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2018-07-08T00:00:00", "descriptions": [ { "lang": "en", "value": "JFrog JFrog Artifactory version Prior to version 6.0.3, since version 4.0.0 contains a Directory Traversal vulnerability in The \"Import Repository from Zip\" feature, available through the Admin menu -\u003e Import \u0026 Export -\u003e Repositories, triggers a vulnerable UI REST endpoint (/ui/artifactimport/upload) that can result in Directory traversal / file overwrite and remote code execution. This attack appear to be exploitable via An attacker with Admin privileges may use the aforementioned UI endpoint and exploit the publicly known \"Zip Slip\" vulnerability, to add/overwrite files outside the target directory. This vulnerability appears to have been fixed in 6.0.3." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-09T20:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.0.3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2018-07-08T15:52:41.204371", "DATE_REQUESTED": "2018-06-26T14:19:44", "ID": "CVE-2018-1000623", "REQUESTER": "uriahl@jfrog.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog JFrog Artifactory version Prior to version 6.0.3, since version 4.0.0 contains a Directory Traversal vulnerability in The \"Import Repository from Zip\" feature, available through the Admin menu -\u003e Import \u0026 Export -\u003e Repositories, triggers a vulnerable UI REST endpoint (/ui/artifactimport/upload) that can result in Directory traversal / file overwrite and remote code execution. This attack appear to be exploitable via An attacker with Admin privileges may use the aforementioned UI endpoint and exploit the publicly known \"Zip Slip\" vulnerability, to add/overwrite files outside the target directory. This vulnerability appears to have been fixed in 6.0.3." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.0.3", "refsource": "CONFIRM", "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.0.3" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-1000623", "datePublished": "2018-07-09T20:00:00Z", "dateReserved": "2018-07-09T00:00:00Z", "dateUpdated": "2024-09-16T21:56:30.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42508
Vulnerability from cvelistv5
Published
2023-10-03 12:28
Modified
2024-09-19 19:50
Severity ?
EPSS score ?
Summary
JFrog Artifactory Improper header input validation leads to email manipulation sent from the platform
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:23:39.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-42508", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T19:50:35.571973Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T19:50:49.713Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.66.0", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "JFrog Artifactory prior to version 7.66.0 is vulnerable to specific endpoint abuse with a specially crafted payload, which can lead to unauthenticated users being able to send emails with manipulated email body." } ], "value": "JFrog Artifactory prior to version 7.66.0 is vulnerable to specific endpoint abuse with a specially crafted payload, which can lead to unauthenticated users being able to send emails with manipulated email body." } ], "impacts": [ { "capecId": "CAPEC-134", "descriptions": [ { "lang": "en", "value": "CAPEC-134 Email Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-03T12:28:26.154Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "source": { "discovery": "UNKNOWN" }, "title": "JFrog Artifactory Improper header input validation leads to email manipulation sent from the platform", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2023-42508", "datePublished": "2023-10-03T12:28:26.154Z", "dateReserved": "2023-09-11T13:05:09.112Z", "dateUpdated": "2024-09-19T19:50:49.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6915
Vulnerability from cvelistv5
Published
2024-08-05 19:34
Modified
2024-08-06 14:01
Severity ?
EPSS score ?
Summary
JFrog Artifactory Cache Poisoning
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*" ], "defaultStatus": "unknown", "product": "artifactory", "vendor": "jfrog", "versions": [ { "lessThanOrEqual": "7.90.6", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.84.20", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.77.14", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.71.23", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.68.22", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.63.22", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.59.23", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.55.18", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6915", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-06T13:54:56.350517Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T14:01:18.510Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.90.6", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.84.20", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.77.14", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.71.23", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.68.22", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.63.22", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.59.23", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.55.18", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Michael Stepankin (artsploit) from GitHub Security Lab" } ], "datePublic": "2024-08-05T18:24:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eJFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning.\u003c/p\u003e" } ], "value": "JFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to cache poisoning." } ], "impacts": [ { "capecId": "CAPEC-141", "descriptions": [ { "lang": "en", "value": "CAPEC-141 Cache Poisoning" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-05T19:34:31.571Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "source": { "discovery": "EXTERNAL" }, "title": "JFrog Artifactory Cache Poisoning", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2024-6915", "datePublished": "2024-08-05T19:34:31.571Z", "dateReserved": "2024-07-19T10:25:52.696Z", "dateUpdated": "2024-08-06T14:01:18.510Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2165
Vulnerability from cvelistv5
Published
2020-03-25 16:05
Modified
2024-08-04 07:01
Severity ?
EPSS score ?
Summary
Jenkins Artifactory Plugin 3.6.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20%282%29 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2020/03/25/2 | mailing-list, x_refsource_MLIST |
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins project | Jenkins Artifactory Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:01:40.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20%282%29" }, { "name": "[oss-security] 20200325 Multiple vulnerabilities in Jenkins and Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/03/25/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Artifactory Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "3.6.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Jenkins Artifactory Plugin 3.6.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:06:11.015Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20%282%29" }, { "name": "[oss-security] 20200325 Multiple vulnerabilities in Jenkins and Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/03/25/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2020-2165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Artifactory Plugin", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.6.0" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jenkins Artifactory Plugin 3.6.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319: Cleartext Transmission of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(2)", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(2)" }, { "name": "[oss-security] 20200325 Multiple vulnerabilities in Jenkins and Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/03/25/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2020-2165", "datePublished": "2020-03-25T16:05:36", "dateReserved": "2019-12-05T00:00:00", "dateUpdated": "2024-08-04T07:01:40.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45074
Vulnerability from cvelistv5
Published
2022-03-02 21:20
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
Summary
JFrog Artifactory before 7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users OAuth token, which will force a reauthentication on an active session or in the next UI session.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | JFrog Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45074%3A+Artifactory+Broken+Access+Control+on+Delete+OAuth+Tokens" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.29.3", "status": "affected", "version": "JFrog Artifactory versions before 7.29.3", "versionType": "custom" }, { "lessThan": "6.23.38", "status": "affected", "version": "JFrog Artifactory versions before 6.23.38", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory before 7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users OAuth token, which will force a reauthentication on an active session or in the next UI session." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-02T21:20:11", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45074%3A+Artifactory+Broken+Access+Control+on+Delete+OAuth+Tokens" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-45074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.29.3", "version_value": "7.29.3" }, { "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 6.23.38", "version_value": "6.23.38" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory before 7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users OAuth token, which will force a reauthentication on an active session or in the next UI session." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45074%3A+Artifactory+Broken+Access+Control+on+Delete+OAuth+Tokens", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45074%3A+Artifactory+Broken+Access+Control+on+Delete+OAuth+Tokens" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-45074", "datePublished": "2022-03-02T21:20:11", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-04T04:32:13.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41834
Vulnerability from cvelistv5
Published
2022-05-23 07:05
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
JFrog Artifactory prior to version 7.28.0 and 6.23.38, is vulnerable to Broken Access Control, the copy functionality can be used by a low-privileged user to read and copy any artifact that exists in the Artifactory deployment due to improper permissions validation.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:24.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-41834%3A+Artifactory+Broken+Access+Control+on+Copy+Artifact" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.28.0", "status": "affected", "version": "7.x", "versionType": "custom" }, { "lessThan": "6.23.38", "status": "affected", "version": "6.x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory prior to version 7.28.0 and 6.23.38, is vulnerable to Broken Access Control, the copy functionality can be used by a low-privileged user to read and copy any artifact that exists in the Artifactory deployment due to improper permissions validation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-23T07:05:09", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-41834%3A+Artifactory+Broken+Access+Control+on+Copy+Artifact" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-41834", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Artifactory", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.x", "version_value": "7.28.0" }, { "version_affected": "\u003c", "version_name": "6.x", "version_value": "6.23.38" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory prior to version 7.28.0 and 6.23.38, is vulnerable to Broken Access Control, the copy functionality can be used by a low-privileged user to read and copy any artifact that exists in the Artifactory deployment due to improper permissions validation." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-41834%3A+Artifactory+Broken+Access+Control+on+Copy+Artifact", "refsource": "CONFIRM", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-41834%3A+Artifactory+Broken+Access+Control+on+Copy+Artifact" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-41834", "datePublished": "2022-05-23T07:05:10", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-04T03:22:24.943Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45721
Vulnerability from cvelistv5
Published
2022-07-06 09:15
Modified
2024-08-04 04:47
Severity ?
EPSS score ?
Summary
JFrog Artifactory prior to version 7.29.8 and 6.23.38 is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in Users REST API endpoint. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.36.1 versions prior to 7.29.8; JFrog Artifactory versions before 6.23.41 versions prior to 6.23.38.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | JFrog Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:47:02.005Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45721%3A+Cross-Site+Script+%28XSS%29+on+User+REST+API" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.29.8", "status": "affected", "version": "JFrog Artifactory versions before 7.36.1", "versionType": "custom" }, { "lessThan": "6.23.38", "status": "affected", "version": "JFrog Artifactory versions before 6.23.41", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory prior to version 7.29.8 and 6.23.38 is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in Users REST API endpoint. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.36.1 versions prior to 7.29.8; JFrog Artifactory versions before 6.23.41 versions prior to 6.23.38." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T09:15:11", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45721%3A+Cross-Site+Script+%28XSS%29+on+User+REST+API" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-45721", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.36.1", "version_value": "7.29.8" }, { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 6.23.41", "version_value": "6.23.38" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory prior to version 7.29.8 and 6.23.38 is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in Users REST API endpoint. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.36.1 versions prior to 7.29.8; JFrog Artifactory versions before 6.23.41 versions prior to 6.23.38." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45721%3A+Cross-Site+Script+%28XSS%29+on+User+REST+API", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45721%3A+Cross-Site+Script+%28XSS%29+on+User+REST+API" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-45721", "datePublished": "2022-07-06T09:15:11", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-04T04:47:02.005Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10322
Vulnerability from cvelistv5
Published
2019-05-31 14:20
Modified
2024-08-04 22:17
Severity ?
EPSS score ?
Summary
A missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/05/31/2 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/108540 | vdb-entry, x_refsource_BID | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787 | x_refsource_MISC | |
https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins project | Jenkins Artifactory Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:20.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108540" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Artifactory Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "3.2.2 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:47:21.595Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108540" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Artifactory Plugin", "version": { "version_data": [ { "version_value": "3.2.2 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108540" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787" }, { "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10322", "datePublished": "2019-05-31T14:20:19", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:17:20.464Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3505
Vulnerability from cvelistv5
Published
2024-04-15 07:42
Modified
2024-08-01 20:12
Severity ?
EPSS score ?
Summary
JFrog Self-Hosted Artifactory Proxy configuration accessible to low-privilege users
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory Self-Hosted |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3505", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T18:06:51.780796Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T18:27:22.109Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:12:07.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Artifactory Self-Hosted", "vendor": "JFrog", "versions": [ { "lessThan": "7.77.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "JFrog Artifactory Self-Hosted versions below 7.77.3, are vulnerable to sensitive information disclosure whereby a low-privileged authenticated user can read the proxy configuration.\u003cbr\u003eThis does not affect JFrog cloud deployments." } ], "value": "JFrog Artifactory Self-Hosted versions below 7.77.3, are vulnerable to sensitive information disclosure whereby a low-privileged authenticated user can read the proxy configuration.\nThis does not affect JFrog cloud deployments." } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-15T07:42:27.975Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "source": { "discovery": "UNKNOWN" }, "title": "JFrog Self-Hosted Artifactory Proxy configuration accessible to low-privilege users", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2024-3505", "datePublished": "2024-04-15T07:42:27.975Z", "dateReserved": "2024-04-09T07:01:10.205Z", "dateUpdated": "2024-08-01T20:12:07.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1000424
Vulnerability from cvelistv5
Published
2019-01-09 23:00
Modified
2024-08-05 12:40
Severity ?
EPSS score ?
Summary
An insufficiently protected credentials vulnerability exists in Jenkins Artifactory Plugin 2.16.1 and earlier in ArtifactoryBuilder.java, CredentialsConfig.java that allows attackers with local file system access to obtain old credentials configured for the plugin before it integrated with Credentials Plugin.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106532 | vdb-entry, x_refsource_BID | |
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-265 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:40:46.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106532", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106532" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-265" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2018-12-28T00:00:00", "datePublic": "2018-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "An insufficiently protected credentials vulnerability exists in Jenkins Artifactory Plugin 2.16.1 and earlier in ArtifactoryBuilder.java, CredentialsConfig.java that allows attackers with local file system access to obtain old credentials configured for the plugin before it integrated with Credentials Plugin." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-14T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "106532", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106532" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-265" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2018-12-28T04:34:37.685776", "ID": "CVE-2018-1000424", "REQUESTER": "ml@beckweb.net", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An insufficiently protected credentials vulnerability exists in Jenkins Artifactory Plugin 2.16.1 and earlier in ArtifactoryBuilder.java, CredentialsConfig.java that allows attackers with local file system access to obtain old credentials configured for the plugin before it integrated with Credentials Plugin." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "106532", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106532" }, { "name": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-265", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-265" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-1000424", "datePublished": "2019-01-09T23:00:00", "dateReserved": "2019-01-09T00:00:00", "dateUpdated": "2024-08-05T12:40:46.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0573
Vulnerability from cvelistv5
Published
2022-05-16 14:32
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | JFrog Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0573%3A+Artifactory+Vulnerable+to+Deserialization+of+Untrusted+Data" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.36.1", "status": "affected", "version": "JFrog Artifactory versions before 7.36.1", "versionType": "custom" }, { "lessThan": "6.23.41", "status": "affected", "version": "JFrog Artifactory versions before 6.23.41", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-16T14:32:04", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0573%3A+Artifactory+Vulnerable+to+Deserialization+of+Untrusted+Data" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2022-0573", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.36.1", "version_value": "7.36.1" }, { "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 6.23.41", "version_value": "6.23.41" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0573%3A+Artifactory+Vulnerable+to+Deserialization+of+Untrusted+Data", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0573%3A+Artifactory+Vulnerable+to+Deserialization+of+Untrusted+Data" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2022-0573", "datePublished": "2022-05-16T14:32:04", "dateReserved": "2022-02-12T00:00:00", "dateUpdated": "2024-08-02T23:32:46.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42662
Vulnerability from cvelistv5
Published
2024-03-07 08:29
Modified
2024-08-02 20:00
Severity ?
EPSS score ?
Summary
JFrog Artifactory Improper SSO Mechanism may lead to Exposure of Access Tokens
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:23:40.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "artifactory", "vendor": "jfrog", "versions": [ { "lessThan": "7.59.18", "status": "affected", "version": "7.59", "versionType": "custom" }, { "lessThan": "7.63.18", "status": "affected", "version": "7.59", "versionType": "custom" }, { "lessThan": "7.68.19", "status": "affected", "version": "7.59", "versionType": "custom" }, { "lessThan": "7.71.8", "status": "affected", "version": "7.59", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-42662", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-02T19:58:18.611412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-02T20:00:35.991Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.59.18", "status": "affected", "version": "7.59", "versionType": "custom" }, { "lessThan": "7.63.18", "status": "affected", "version": "7.59", "versionType": "custom" }, { "lessThan": "7.68.19", "status": "affected", "version": "7.59", "versionType": "custom" }, { "lessThan": "7.71.8", "status": "affected", "version": "7.59", "versionType": "custom" } ] } ], "datePublic": "2024-03-06T10:39:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eJFrog Artifactory versions 7.59 and above, but below 7.59.18, 7.63.18, 7.68.19, 7.71.8 are vulnerable to an issue whereby user interaction with specially crafted URLs could lead to exposure of user access tokens due to improper handling of the CLI / IDE browser based SSO integration.\u003c/span\u003e\u003cbr\u003e" } ], "value": "JFrog Artifactory versions 7.59 and above, but below 7.59.18, 7.63.18, 7.68.19, 7.71.8 are vulnerable to an issue whereby user interaction with specially crafted URLs could lead to exposure of user access tokens due to improper handling of the CLI / IDE browser based SSO integration.\n" } ], "impacts": [ { "capecId": "CAPEC-114", "descriptions": [ { "lang": "en", "value": "CAPEC-114 Authentication Abuse" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-07T08:29:03.112Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "source": { "discovery": "UNKNOWN" }, "title": "JFrog Artifactory Improper SSO Mechanism may lead to Exposure of Access Tokens", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2023-42662", "datePublished": "2024-03-07T08:29:03.112Z", "dateReserved": "2023-09-12T13:51:39.870Z", "dateUpdated": "2024-08-02T20:00:35.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9733
Vulnerability from cvelistv5
Published
2019-04-11 18:59
Modified
2024-08-04 22:01
Severity ?
EPSS score ?
Summary
An issue was discovered in JFrog Artifactory 6.7.3. By default, the access-admin account is used to reset the password of the admin account in case an administrator gets locked out from the Artifactory console. This is only allowable from a connection directly from localhost, but providing a X-Forwarded-For HTTP header to the request allows an unauthenticated user to login with the default credentials of the access-admin account while bypassing the whitelist of allowed IP addresses. The access-admin account can use Artifactory's API to request authentication tokens for all users including the admin account and, in turn, assume full control of all artifacts and repositories managed by Artifactory.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/152172/JFrog-Artifactory-Administrator-Authentication-Bypass.html | x_refsource_MISC | |
https://www.ciphertechs.com/jfrog-artifactory-advisory/ | x_refsource_CONFIRM | |
https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.8.6 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:54.047Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152172/JFrog-Artifactory-Administrator-Authentication-Bypass.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ciphertechs.com/jfrog-artifactory-advisory/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.8.6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-03-20T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in JFrog Artifactory 6.7.3. By default, the access-admin account is used to reset the password of the admin account in case an administrator gets locked out from the Artifactory console. This is only allowable from a connection directly from localhost, but providing a X-Forwarded-For HTTP header to the request allows an unauthenticated user to login with the default credentials of the access-admin account while bypassing the whitelist of allowed IP addresses. The access-admin account can use Artifactory\u0027s API to request authentication tokens for all users including the admin account and, in turn, assume full control of all artifacts and repositories managed by Artifactory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-11T19:00:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152172/JFrog-Artifactory-Administrator-Authentication-Bypass.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ciphertechs.com/jfrog-artifactory-advisory/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.8.6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9733", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in JFrog Artifactory 6.7.3. By default, the access-admin account is used to reset the password of the admin account in case an administrator gets locked out from the Artifactory console. This is only allowable from a connection directly from localhost, but providing a X-Forwarded-For HTTP header to the request allows an unauthenticated user to login with the default credentials of the access-admin account while bypassing the whitelist of allowed IP addresses. The access-admin account can use Artifactory\u0027s API to request authentication tokens for all users including the admin account and, in turn, assume full control of all artifacts and repositories managed by Artifactory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/152172/JFrog-Artifactory-Administrator-Authentication-Bypass.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152172/JFrog-Artifactory-Administrator-Authentication-Bypass.html" }, { "name": "https://www.ciphertechs.com/jfrog-artifactory-advisory/", "refsource": "CONFIRM", "url": "https://www.ciphertechs.com/jfrog-artifactory-advisory/" }, { "name": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.8.6", "refsource": "CONFIRM", "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.8.6" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-9733", "datePublished": "2019-04-11T18:59:36", "dateReserved": "2019-03-12T00:00:00", "dateUpdated": "2024-08-04T22:01:54.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-10036
Vulnerability from cvelistv5
Published
2018-05-01 19:00
Modified
2024-08-06 03:07
Severity ?
EPSS score ?
Summary
Unrestricted file upload vulnerability in ui/artifact/upload in JFrog Artifactory before 4.16 allows remote attackers to (1) deploy an arbitrary servlet application and execute arbitrary code by uploading a war file or (2) possibly write to arbitrary files and cause a denial of service by uploading an HTML file.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/44543/ | exploit, x_refsource_EXPLOIT-DB | |
http://packetstormsecurity.com/files/147378/Jfrog-Artifactory-Code-Execution-Shell-Upload.html | x_refsource_MISC | |
https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory4.16 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:07:32.049Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "44543", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/44543/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/147378/Jfrog-Artifactory-Code-Execution-Shell-Upload.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory4.16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Unrestricted file upload vulnerability in ui/artifact/upload in JFrog Artifactory before 4.16 allows remote attackers to (1) deploy an arbitrary servlet application and execute arbitrary code by uploading a war file or (2) possibly write to arbitrary files and cause a denial of service by uploading an HTML file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-01T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "44543", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/44543/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/147378/Jfrog-Artifactory-Code-Execution-Shell-Upload.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory4.16" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-10036", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unrestricted file upload vulnerability in ui/artifact/upload in JFrog Artifactory before 4.16 allows remote attackers to (1) deploy an arbitrary servlet application and execute arbitrary code by uploading a war file or (2) possibly write to arbitrary files and cause a denial of service by uploading an HTML file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "44543", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44543/" }, { "name": "http://packetstormsecurity.com/files/147378/Jfrog-Artifactory-Code-Execution-Shell-Upload.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/147378/Jfrog-Artifactory-Code-Execution-Shell-Upload.html" }, { "name": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory4.16", "refsource": "CONFIRM", "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory4.16" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-10036", "datePublished": "2018-05-01T19:00:00", "dateReserved": "2016-12-23T00:00:00", "dateUpdated": "2024-08-06T03:07:32.049Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10321
Vulnerability from cvelistv5
Published
2019-05-31 14:20
Modified
2024-08-04 22:17
Severity ?
EPSS score ?
Summary
A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/05/31/2 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/108540 | vdb-entry, x_refsource_BID | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787 | x_refsource_MISC | |
https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins project | Jenkins Artifactory Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:20.507Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108540" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Artifactory Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "3.2.2 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:47:20.440Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108540" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10321", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Artifactory Plugin", "version": { "version_data": [ { "version_value": "3.2.2 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108540" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787" }, { "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10321", "datePublished": "2019-05-31T14:20:19", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:17:20.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2164
Vulnerability from cvelistv5
Published
2020-03-25 16:05
Modified
2024-08-04 07:01
Severity ?
EPSS score ?
Summary
Jenkins Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20%281%29 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2020/03/25/2 | mailing-list, x_refsource_MLIST |
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins project | Jenkins Artifactory Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:01:40.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20%281%29" }, { "name": "[oss-security] 20200325 Multiple vulnerabilities in Jenkins and Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/03/25/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Artifactory Plugin", "vendor": "Jenkins project", "versions": [ { "lessThanOrEqual": "3.5.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Jenkins Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:06:09.824Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20%281%29" }, { "name": "[oss-security] 20200325 Multiple vulnerabilities in Jenkins and Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/03/25/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2020-2164", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Artifactory Plugin", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "3.5.0" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jenkins Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-312: Cleartext Storage of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(1)", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(1)" }, { "name": "[oss-security] 20200325 Multiple vulnerabilities in Jenkins and Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/03/25/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2020-2164", "datePublished": "2020-03-25T16:05:36", "dateReserved": "2019-12-05T00:00:00", "dateUpdated": "2024-08-04T07:01:40.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42661
Vulnerability from cvelistv5
Published
2024-03-07 13:56
Modified
2024-08-16 20:05
Severity ?
EPSS score ?
Summary
JFrog Artifactory Improper input validation leads to arbitrary file write
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:23:40.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "artifactory", "vendor": "jfrog", "versions": [ { "lessThan": "7.76.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-42661", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-07T20:05:33.529932Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T20:05:40.307Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.76.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgba(232, 232, 232, 0.04);\"\u003eJFrog Artifactory prior to version 7.76.2 is vulnerable to Arbitrary File Write of untrusted data, which may lead to DoS or Remote Code Execution when a specially crafted series of requests is sent by an authenticated user. This is due to insufficient validation of artifacts.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "JFrog Artifactory prior to version 7.76.2 is vulnerable to Arbitrary File Write of untrusted data, which may lead to DoS or Remote Code Execution when a specially crafted series of requests is sent by an authenticated user. This is due to insufficient validation of artifacts.\n" } ], "impacts": [ { "capecId": "CAPEC-126", "descriptions": [ { "lang": "en", "value": "CAPEC-126 Path Traversal" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-07T13:56:38.162Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "source": { "discovery": "UNKNOWN" }, "title": "JFrog Artifactory Improper input validation leads to arbitrary file write", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2023-42661", "datePublished": "2024-03-07T13:56:38.162Z", "dateReserved": "2023-09-12T13:51:39.870Z", "dateUpdated": "2024-08-16T20:05:40.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0668
Vulnerability from cvelistv5
Published
2023-01-08 00:00
Modified
2025-04-09 13:44
Severity ?
EPSS score ?
Summary
JFrog Artifactory prior to 7.37.13 is vulnerable to Authentication Bypass, which can lead to Privilege Escalation when a specially crafted request is sent by an unauthenticated user.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | JFrog Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0668%3A+Artifactory+Authentication+Bypass" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-0668", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T13:43:53.898081Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T13:44:13.635Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.37.13", "status": "affected", "version": "JFrog Artifactory versions before 7.x", "versionType": "custom" }, { "lessThan": "6.23.41", "status": "affected", "version": "JFrog Artifactory versions before 6.x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory prior to 7.37.13 is vulnerable to Authentication Bypass, which can lead to Privilege Escalation when a specially crafted request is sent by an unauthenticated user." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-274", "description": "CWE-274 Improper Handling of Insufficient Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-08T00:00:00.000Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0668%3A+Artifactory+Authentication+Bypass" } ] } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2022-0668", "datePublished": "2023-01-08T00:00:00.000Z", "dateReserved": "2022-02-17T00:00:00.000Z", "dateUpdated": "2025-04-09T13:44:13.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46270
Vulnerability from cvelistv5
Published
2022-03-02 21:20
Modified
2024-08-04 05:02
Severity ?
EPSS score ?
Summary
JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | JFrog Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:02:10.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46270%3A+Artifactory+Project+Admin+Repository+Name+Disclosure" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.31.10", "status": "affected", "version": "JFrog Artifactory versions before 7.31.10", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-02T21:20:12", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46270%3A+Artifactory+Project+Admin+Repository+Name+Disclosure" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-46270", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.31.10", "version_value": "7.31.10" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46270%3A+Artifactory+Project+Admin+Repository+Name+Disclosure", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46270%3A+Artifactory+Project+Admin+Repository+Name+Disclosure" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-46270", "datePublished": "2022-03-02T21:20:12", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-04T05:02:10.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-19971
Vulnerability from cvelistv5
Published
2019-04-16 18:12
Modified
2024-08-05 11:51
Severity ?
EPSS score ?
Summary
JFrog Artifactory Pro 6.5.9 has Incorrect Access Control.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2019/Mar/34 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/152137/JFrog-Artifactory-Pro-6.5.9-Signature-Validation.html | x_refsource_MISC | |
https://lists.openwall.net/full-disclosure/2019/03/19/3 | x_refsource_MISC | |
https://bintray.com/jfrog/artifactory-pro/jfrog-artifactory-pro-zip/6.5.13#release | x_refsource_MISC | |
http://www.securityfocus.com/bid/107518 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:51:17.766Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190319 CVE-2018-19971: JFrog Artifactory Pro SAML SSO signature validation error", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/34" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152137/JFrog-Artifactory-Pro-6.5.9-Signature-Validation.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.openwall.net/full-disclosure/2019/03/19/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bintray.com/jfrog/artifactory-pro/jfrog-artifactory-pro-zip/6.5.13#release" }, { "name": "107518", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107518" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "JFrog Artifactory Pro 6.5.9 has Incorrect Access Control." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-16T18:12:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20190319 CVE-2018-19971: JFrog Artifactory Pro SAML SSO signature validation error", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/34" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152137/JFrog-Artifactory-Pro-6.5.9-Signature-Validation.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.openwall.net/full-disclosure/2019/03/19/3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bintray.com/jfrog/artifactory-pro/jfrog-artifactory-pro-zip/6.5.13#release" }, { "name": "107518", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107518" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19971", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory Pro 6.5.9 has Incorrect Access Control." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20190319 CVE-2018-19971: JFrog Artifactory Pro SAML SSO signature validation error", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Mar/34" }, { "name": "http://packetstormsecurity.com/files/152137/JFrog-Artifactory-Pro-6.5.9-Signature-Validation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152137/JFrog-Artifactory-Pro-6.5.9-Signature-Validation.html" }, { "name": "https://lists.openwall.net/full-disclosure/2019/03/19/3", "refsource": "MISC", "url": "https://lists.openwall.net/full-disclosure/2019/03/19/3" }, { "name": "https://bintray.com/jfrog/artifactory-pro/jfrog-artifactory-pro-zip/6.5.13#release", "refsource": "MISC", "url": "https://bintray.com/jfrog/artifactory-pro/jfrog-artifactory-pro-zip/6.5.13#release" }, { "name": "107518", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107518" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-19971", "datePublished": "2019-04-16T18:12:15", "dateReserved": "2018-12-08T00:00:00", "dateUpdated": "2024-08-05T11:51:17.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10323
Vulnerability from cvelistv5
Published
2019-05-31 14:20
Modified
2024-08-04 22:17
Severity ?
EPSS score ?
Summary
A missing permission check in Jenkins Artifactory Plugin 3.2.3 and earlier in various 'fillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/05/31/2 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/108540 | vdb-entry, x_refsource_BID | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846 | x_refsource_MISC | |
https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%282%29 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins project | Jenkins Artifactory Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:20.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108540" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%282%29" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Artifactory Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "3.2.3 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A missing permission check in Jenkins Artifactory Plugin 3.2.3 and earlier in various \u0027fillCredentialsIdItems\u0027 methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:47:22.778Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108540" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%282%29" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10323", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Artifactory Plugin", "version": { "version_data": [ { "version_value": "3.2.3 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A missing permission check in Jenkins Artifactory Plugin 3.2.3 and earlier in various \u0027fillCredentialsIdItems\u0027 methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108540" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846" }, { "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10323", "datePublished": "2019-05-31T14:20:19", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:17:20.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1000206
Vulnerability from cvelistv5
Published
2018-07-13 18:00
Modified
2024-09-16 17:32
Severity ?
EPSS score ?
Summary
JFrog Artifactory version since 5.11 contains a Cross ite Request Forgery (CSRF) vulnerability in UI rest endpoints that can result in Classic CSRF attack allowing an attacker to perform actions as logged in user. This attack appear to be exploitable via The victim must run maliciously crafted flash component. This vulnerability appears to have been fixed in 6.1.
References
▼ | URL | Tags |
---|---|---|
https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/ | x_refsource_MISC | |
https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070&version=19581 | x_refsource_CONFIRM | |
https://www.jfrog.com/jira/browse/RTFACT-17004 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:40:46.678Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070\u0026version=19581" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jfrog.com/jira/browse/RTFACT-17004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "JFrog Artifactory version since 5.11 contains a Cross ite Request Forgery (CSRF) vulnerability in UI rest endpoints that can result in Classic CSRF attack allowing an attacker to perform actions as logged in user. This attack appear to be exploitable via The victim must run maliciously crafted flash component. This vulnerability appears to have been fixed in 6.1." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-13T18:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070\u0026version=19581" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jfrog.com/jira/browse/RTFACT-17004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2018-07-10T20:50:24.880837", "DATE_REQUESTED": "2018-07-08T15:34:56", "ID": "CVE-2018-1000206", "REQUESTER": "art-dev@jfrog.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory version since 5.11 contains a Cross ite Request Forgery (CSRF) vulnerability in UI rest endpoints that can result in Classic CSRF attack allowing an attacker to perform actions as logged in user. This attack appear to be exploitable via The victim must run maliciously crafted flash component. This vulnerability appears to have been fixed in 6.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/", "refsource": "MISC", "url": "https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/" }, { "name": "https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070\u0026version=19581", "refsource": "CONFIRM", "url": "https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070\u0026version=19581" }, { "name": "https://www.jfrog.com/jira/browse/RTFACT-17004", "refsource": "CONFIRM", "url": "https://www.jfrog.com/jira/browse/RTFACT-17004" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-1000206", "datePublished": "2018-07-13T18:00:00Z", "dateReserved": "2018-07-13T00:00:00Z", "dateUpdated": "2024-09-16T17:32:45.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10324
Vulnerability from cvelistv5
Published
2019-05-31 14:20
Modified
2024-08-04 22:17
Severity ?
EPSS score ?
Summary
A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ReleaseAction#doSubmit, GradleReleaseApiAction#doStaging, MavenReleaseApiAction#doStaging, and UnifiedPromoteBuildAction#doSubmit allowed attackers to schedule a release build, perform release staging for Gradle and Maven projects, and promote previously staged builds, respectively.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/05/31/2 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/108540 | vdb-entry, x_refsource_BID | |
https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins project | Jenkins Artifactory Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:20.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108540" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Artifactory Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "3.2.2 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ReleaseAction#doSubmit, GradleReleaseApiAction#doStaging, MavenReleaseApiAction#doStaging, and UnifiedPromoteBuildAction#doSubmit allowed attackers to schedule a release build, perform release staging for Gradle and Maven projects, and promote previously staged builds, respectively." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:47:23.989Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108540" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10324", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Artifactory Plugin", "version": { "version_data": [ { "version_value": "3.2.2 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ReleaseAction#doSubmit, GradleReleaseApiAction#doStaging, MavenReleaseApiAction#doStaging, and UnifiedPromoteBuildAction#doSubmit allowed attackers to schedule a release build, perform release staging for Gradle and Maven projects, and promote previously staged builds, respectively." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/05/31/2" }, { "name": "108540", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108540" }, { "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10324", "datePublished": "2019-05-31T14:20:19", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:17:20.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-23163
Vulnerability from cvelistv5
Published
2022-07-06 09:45
Modified
2024-08-03 19:05
Severity ?
EPSS score ?
Summary
JFrog Artifactory prior to version 7.33.6 and 6.23.38, is vulnerable to CSRF ( Cross-Site Request Forgery) for specific endpoints. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.33.6 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | JFrog Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:05:54.566Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-23163%3A++Cross-Site+Request+Forgery+on+REST+using+Basic+Auth" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.x", "status": "affected", "version": "JFrog Artifactory versions before 7.33.6", "versionType": "custom" }, { "lessThan": "6.x", "status": "affected", "version": "JFrog Artifactory versions before 6.23.38", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory prior to version 7.33.6 and 6.23.38, is vulnerable to CSRF ( Cross-Site Request Forgery) for specific endpoints. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.33.6 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T09:45:12", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-23163%3A++Cross-Site+Request+Forgery+on+REST+using+Basic+Auth" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-23163", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.33.6", "version_value": "7.x" }, { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 6.23.38", "version_value": "6.x" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory prior to version 7.33.6 and 6.23.38, is vulnerable to CSRF ( Cross-Site Request Forgery) for specific endpoints. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.33.6 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-23163%3A++Cross-Site+Request+Forgery+on+REST+using+Basic+Auth", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-23163%3A++Cross-Site+Request+Forgery+on+REST+using+Basic+Auth" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-23163", "datePublished": "2022-07-06T09:45:12", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-03T19:05:54.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45730
Vulnerability from cvelistv5
Published
2022-05-19 14:30
Modified
2024-08-04 04:47
Severity ?
EPSS score ?
Summary
JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a Project Admin is able to create, edit and delete Repository Layouts while Repository Layouts configuration should only be available for Platform Administrators.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:47:02.171Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45730%3A+Artifactory+Broken+Access+Control+on+Repository+Layouts+Configuration" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.31.10", "status": "affected", "version": "7.x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a Project Admin is able to create, edit and delete Repository Layouts while Repository Layouts configuration should only be available for Platform Administrators." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-19T14:30:10", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45730%3A+Artifactory+Broken+Access+Control+on+Repository+Layouts+Configuration" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-45730", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Artifactory", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "7.x", "version_value": "7.31.10" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a Project Admin is able to create, edit and delete Repository Layouts while Repository Layouts configuration should only be available for Platform Administrators." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45730%3A+Artifactory+Broken+Access+Control+on+Repository+Layouts+Configuration", "refsource": "CONFIRM", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45730%3A+Artifactory+Broken+Access+Control+on+Repository+Layouts+Configuration" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-45730", "datePublished": "2022-05-19T14:30:10", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-04T04:47:02.171Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46687
Vulnerability from cvelistv5
Published
2022-07-06 09:35
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.31.10 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | JFrog Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:41.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46687%3A+Sensitive+data+exposure+on+proxy+endpoint+for+Project+Admin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.x", "status": "affected", "version": "JFrog Artifactory versions before 7.31.10", "versionType": "custom" }, { "lessThan": "6.x", "status": "affected", "version": "JFrog Artifactory versions before 6.23.38", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.31.10 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359 Exposure of Private Information (\u0027Privacy Violation\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T09:35:11", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46687%3A+Sensitive+data+exposure+on+proxy+endpoint+for+Project+Admin" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-46687", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.31.10", "version_value": "7.x" }, { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 6.23.38", "version_value": "6.x" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.31.10 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-359 Exposure of Private Information (\u0027Privacy Violation\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46687%3A+Sensitive+data+exposure+on+proxy+endpoint+for+Project+Admin", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46687%3A+Sensitive+data+exposure+on+proxy+endpoint+for+Project+Admin" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-46687", "datePublished": "2022-07-06T09:35:11", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-04T05:17:41.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-2247
Vulnerability from cvelistv5
Published
2024-03-13 14:06
Modified
2024-08-01 19:03
Severity ?
EPSS score ?
Summary
JFrog Artifactory Cross-Site Scripting
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-2247", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-15T15:24:09.707605Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:29:05.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:03:39.114Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.77.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.82.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2024-03-13T14:01:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eJFrog Artifactory versions below 7.77.7, 7.82.1, are vulnerable to DOM-based cross-site scripting due to improper handling of the import override mechanism.\u003c/span\u003e" } ], "value": "JFrog Artifactory versions below 7.77.7, 7.82.1, are vulnerable to DOM-based cross-site scripting due to improper handling of the import override mechanism." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-14T09:24:04.507Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "source": { "discovery": "EXTERNAL" }, "title": "JFrog Artifactory Cross-Site Scripting", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2024-2247", "datePublished": "2024-03-13T14:06:57.151Z", "dateReserved": "2024-03-07T08:49:46.693Z", "dateUpdated": "2024-08-01T19:03:39.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-4142
Vulnerability from cvelistv5
Published
2024-05-01 20:18
Modified
2024-08-01 20:33
Severity ?
EPSS score ?
Summary
JFrog Artifactory Improper input validation within token creation flow
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*" ], "defaultStatus": "unknown", "product": "artifactory", "vendor": "jfrog", "versions": [ { "status": "affected", "version": "0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-4142", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-02T15:24:56.754799Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:55:28.563Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:33:52.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.84.6", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.77.11", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.71.21", "status": "affected", "version": "0 ", "versionType": "custom" }, { "lessThan": "7.68.21", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.63.21", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.59.22", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.55.17", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cspan style=\"background-color: var(--wht);\"\u003eAn Improper input validation vulnerability that could potentially lead to \u003c/span\u003e\u003cspan style=\"background-color: var(--wht);\"\u003eprivilege escalation\u003c/span\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;was discovered in \u003c/span\u003eJFrog Artifactory.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eDue to this vulnerability, users with low privileges may gain administrative access to the system.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eThis issue can also be exploited in Artifactory platforms with anonymous access enabled.\u003c/p\u003e" } ], "value": "An Improper input validation vulnerability that could potentially lead to privilege escalation\u00a0was discovered in JFrog Artifactory.\n\nDue to this vulnerability, users with low privileges may gain administrative access to the system.\n\nThis issue can also be exploited in Artifactory platforms with anonymous access enabled.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T20:21:40.250Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "source": { "discovery": "EXTERNAL" }, "title": "JFrog Artifactory Improper input validation within token creation flow", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2024-4142", "datePublished": "2024-05-01T20:18:23.916Z", "dateReserved": "2024-04-24T18:42:54.505Z", "dateUpdated": "2024-08-01T20:33:52.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17444
Vulnerability from cvelistv5
Published
2020-10-12 21:55
Modified
2024-09-16 19:51
Severity ?
EPSS score ?
Summary
JFrog Artifactory does not enforce default admin password change
References
▼ | URL | Tags |
---|---|---|
https://www.jfrog.com/confluence/display/JFROG/JFrog+Artifactory | x_refsource_MISC | |
https://www.jfrog.com/confluence/display/JFROG/Artifactory+Release+Notes | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Jfrog | Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:40:15.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Artifactory" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/Artifactory+Release+Notes" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Artifactory", "vendor": "Jfrog", "versions": [ { "status": "unaffected", "version": "7.x" }, { "lessThan": "6.17.0", "status": "affected", "version": "all", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This issue affects default configuration." } ], "credits": [ { "lang": "en", "value": "This issue was discovered by Daniel Shapira of Palo Alto Networks." } ], "datePublic": "2020-10-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Jfrog Artifactory uses default passwords (such as \"password\") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "CWE-521: Weak Password Requirements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-12T21:55:55", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Artifactory" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/Artifactory+Release+Notes" } ], "solutions": [ { "lang": "en", "value": "This is fixed in 6.17, and 7.x and later releases." } ], "source": { "discovery": "EXTERNAL" }, "title": "JFrog Artifactory does not enforce default admin password change", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-10-12T21:16:00.000Z", "ID": "CVE-2019-17444", "STATE": "PUBLIC", "TITLE": "JFrog Artifactory does not enforce default admin password change" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Artifactory", "version": { "version_data": [ { "version_affected": "!", "version_value": "7.x" }, { "version_affected": "\u003c", "version_name": "all", "version_value": "6.17.0" } ] } } ] }, "vendor_name": "Jfrog" } ] } }, "configuration": [ { "lang": "en", "value": "This issue affects default configuration." } ], "credit": [ { "lang": "eng", "value": "This issue was discovered by Daniel Shapira of Palo Alto Networks." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jfrog Artifactory uses default passwords (such as \"password\") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-521: Weak Password Requirements" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Artifactory", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Artifactory" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/Artifactory+Release+Notes", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/Artifactory+Release+Notes" } ] }, "solution": [ { "lang": "en", "value": "This is fixed in 6.17, and 7.x and later releases." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2019-17444", "datePublished": "2020-10-12T21:55:55.271295Z", "dateReserved": "2019-10-10T00:00:00", "dateUpdated": "2024-09-16T19:51:55.985Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42509
Vulnerability from cvelistv5
Published
2024-03-07 14:07
Modified
2024-08-02 19:57
Severity ?
EPSS score ?
Summary
JFrog Artifactory Sensitive Data Leakage in Repository configuration process
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:23:39.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "artifactory", "vendor": "jfrog", "versions": [ { "lessThan": "7.77.0", "status": "affected", "version": "7.17.4", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-42509", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-02T19:56:32.949556Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-02T19:57:43.236Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.77.0", "status": "affected", "version": "7.17.4", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "JFrog Artifactory later than version 7.17.4 but prior to version 7.77.0 is vulnerable to an issue whereby a sequence of improperly handled exceptions in repository configuration initialization steps may lead to exposure of sensitive data.\u003cbr\u003e\u003cbr\u003e" } ], "value": "JFrog Artifactory later than version 7.17.4 but prior to version 7.77.0 is vulnerable to an issue whereby a sequence of improperly handled exceptions in repository configuration initialization steps may lead to exposure of sensitive data.\n\n" } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-07T14:07:09.944Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories" } ], "source": { "discovery": "EXTERNAL" }, "title": "JFrog Artifactory Sensitive Data Leakage in Repository configuration process", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2023-42509", "datePublished": "2024-03-07T14:07:09.944Z", "dateReserved": "2023-09-11T13:05:09.112Z", "dateUpdated": "2024-08-02T19:57:43.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3860
Vulnerability from cvelistv5
Published
2021-12-20 00:00
Modified
2024-11-18 19:58
Severity ?
EPSS score ?
Summary
JFrog Artifactory before 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
JFrog | JFrog Artifactory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:09.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-3860", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T19:58:16.443180Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T19:58:54.966Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.25.4", "status": "affected", "version": "JFrog Artifactory versions before 7.25.4 with E+ license", "versionType": "custom" }, { "lessThan": "6.23.30", "status": "affected", "version": "JFrog Artifactory versions before 6.23.30 with E+ license", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory before 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-19T17:05:56.583648", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection" }, { "url": "http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html" } ] } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-3860", "datePublished": "2021-12-20T00:00:00", "dateReserved": "2021-10-05T00:00:00", "dateUpdated": "2024-11-18T19:58:54.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-7931
Vulnerability from cvelistv5
Published
2020-01-23 14:27
Modified
2024-08-04 09:48
Severity ?
EPSS score ?
Summary
In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template.
References
▼ | URL | Tags |
---|---|---|
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md | x_refsource_MISC | |
https://www.jfrog.com/confluence/display/RTF/Release+Notes | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:48:24.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-23T14:32:50", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-7931", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md", "refsource": "MISC", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md" }, { "name": "https://www.jfrog.com/confluence/display/RTF/Release+Notes", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-7931", "datePublished": "2020-01-23T14:27:25", "dateReserved": "2020-01-23T00:00:00", "dateUpdated": "2024-08-04T09:48:24.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }