Skip to content

Commit 6d630c0

Browse files
authored
Updated 4 and added 3 SRC:CLR advisories with CVE values from issue #238 (#616)
1 parent 56d950e commit 6d630c0

File tree

6 files changed

+86
-0
lines changed

6 files changed

+86
-0
lines changed

gems/facter/CVE-2015-1426.yml

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
gem: facter
3+
cve: 2015-1426
4+
ghsa: j436-h7hm-rx46
5+
url: https://www.puppet.com/security/cve/cve-2015-1426-potential-sensitive-information-leakage-facters-amazon-ec2-metadata
6+
title: Puppet Labs Facter allows local users to obtains sensitive Amazon
7+
EC2 IAM instance metadata by reading a fact for an Amazon EC2 node.
8+
date: 2015-02-10
9+
description: |
10+
Puppet Labs Facter 1.6.0 through 2.4.0 allows local users to
11+
obtains sensitive Amazon EC2 IAM instance metadata by reading
12+
a fact for an Amazon EC2 node.
13+
cvss_v2: 2.1
14+
cvss_v3: 1.3
15+
unaffected_versions:
16+
- "< 1.6.0"
17+
patched_versions:
18+
- ">= 2.4.1"
19+
related:
20+
url:
21+
- https://nvd.nist.gov/vuln/detail/CVE-2015-1426
22+
- https://www.puppet.com/security/cve/cve-2015-1426-potential-sensitive-information-leakage-facters-amazon-ec2-metadata
23+
- https://sca.analysiscenter.veracode.com/vulnerability-database/security/disclosure-amazon-ec2-iam-instance/ruby/sid-1508/summary
24+
- https://srcclr.com/security/disclosure-amazon-ec2-iam-instance/ruby/s-1508
25+
- https://github.com/rubysec/ruby-advisory-db/issues/238
26+
- https://github.com/advisories/GHSA-j436-h7hm-rx46

gems/kafo/CVE-2014-0135.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,3 +15,7 @@ cvss_v2: 1.9
1515
patched_versions:
1616
- "~> 0.3.17"
1717
- ">= 0.5.2"
18+
related:
19+
url:
20+
- https://github.com/rubysec/ruby-advisory-db/issues/238
21+
- https://sca.analysiscenter.veracode.com/vulnerability-database/security/world-readable-permissions-as-default/ruby/sid-740/summary

gems/logstash-core/CVE-2015-5378.yml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
gem: logstash-core
3+
cve: 2015-5378
4+
ghsa: g6rc-3fpq-w2gr
5+
url: https://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html
6+
title: "Logstash: SSL/TLS FREAK Attack"
7+
date: 2015-07-21
8+
description: |
9+
Logstash: SSL/TLS FREAK Attack: Logstash 1.5.x before 1.5.3 and
10+
1.4.x before 1.4.4 allows remote attackers to read communications
11+
between Logstash Forwarder agent and Logstash server.
12+
cvss_v2: 5.0
13+
cvss_v3: 7.5
14+
patched_versions:
15+
- "~> 1.4.4"
16+
- ">= 1.5.3"
17+
related:
18+
url:
19+
- https://nvd.nist.gov/vuln/detail/CVE-2015-5378
20+
- https://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html
21+
- https://sca.analysiscenter.veracode.com/vulnerability-database/security/factoring-attack-rsa-export-keys-freak/ruby/sid-1745/summary
22+
- https://github.com/rubysec/ruby-advisory-db/issues/238
23+
- https://www.elastic.co/community/security
24+
- https://github.com/advisories/GHSA-g6rc-3fpq-w2gr
25+
- https://web.archive.org/web/20181211080524/http://www.securityfocus.com/bid/76015

gems/logstash-core/CVE-2015-5619.yml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
gem: logstash-core
3+
cve: 2015-5619
4+
ghsa: 68pf-743m-hv2w
5+
url: https://www.elastic.co/blog/logstash-1-5-4-and-1-4-5-released
6+
title: "Logstash: Man-In-The Middle attack"
7+
date: 2015-08-20
8+
description: |
9+
Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack
10+
output or the Logstash forwarder does not validate SSL/TLS certificates
11+
from the Logstash server, which might allow attackers to obtain
12+
sensitive information via a man-in-the-middle attack.
13+
cvss_v2: 4.3
14+
cvss_v3: 5.9
15+
patched_versions:
16+
- "~> 1.4.5"
17+
- ">= 1.5.4"
18+
related:
19+
url:
20+
- https://nvd.nist.gov/vuln/detail/CVE-2015-5619
21+
- https://www.elastic.co/blog/logstash-1-5-4-and-1-4-5-released
22+
- https://www.elastic.co/community/security
23+
- https://packetstormsecurity.com/files/133269/Logstash-1.5.3-Man-In-The-Middle.html
24+
- https://sca.analysiscenter.veracode.com/vulnerability-database/security/man-middle-mitm-attacks/ruby/sid-1798/summary
25+
- https://github.com/advisories/GHSA-68pf-743m-hv2w

gems/puppet/CVE-2014-3248.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,3 +26,5 @@ related:
2626
- http://secunia.com/advisories/59197
2727
- http://secunia.com/advisories/59200
2828
- http://www.securityfocus.com/bid/68035
29+
- https://github.com/rubysec/ruby-advisory-db/issues/238
30+
- https://sca.analysiscenter.veracode.com/vulnerability-database/security/elevation-privileges-untrusted-search/ruby/sid-1586/summary

gems/spina/CVE-2015-4619.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,3 +12,7 @@ description: |
1212
cvss_v3: 8.8
1313
patched_versions:
1414
- ">= 0.6.29"
15+
related:
16+
url:
17+
- https://sca.analysiscenter.veracode.com/vulnerability-database/security/cross-site-request-forgery-csrf/ruby/sid-1686/summary
18+
- https://github.com/rubysec/ruby-advisory-db/issues/238

0 commit comments

Comments
 (0)