Skip to content

Commit

Permalink
5 changes (0 new | 5 updated):
Browse files Browse the repository at this point in the history
  • Loading branch information
cvelistV5 Github Action committed Jan 4, 2025
1 parent 80f0ec4 commit ca0df9a
Show file tree
Hide file tree
Showing 7 changed files with 167 additions and 127 deletions.
44 changes: 24 additions & 20 deletions cves/2025/22xxx/CVE-2025-22386.json
Original file line number Diff line number Diff line change
Expand Up @@ -5,51 +5,55 @@
"cveId": "CVE-2025-22386",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2025-01-04T01:46:52.528994",
"dateUpdated": "2025-01-04T02:04:58.516Z",
"dateReserved": "2025-01-04T00:00:00",
"datePublished": "2025-01-04T00:00:00"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-04T01:46:52.528994"
},
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity session issue exists in the Commerce B2B application, affecting the longevity of active sessions in the storefront. This allows session tokens tied to logged-out sessions to still be active and usable."
}
],
"affected": [
{
"vendor": "n/a",
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"version": "n/a",
"status": "affected"
"status": "affected",
"version": "n/a"
}
]
}
],
"references": [
"descriptions": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/32695284701069-Configured-Commerce-Security-Advisory-COM-2024-04"
"lang": "en",
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity session issue exists in the Commerce B2B application, affecting the longevity of active sessions in the storefront. This allows session tokens tied to logged-out sessions to still be active and usable."
}
],
"problemTypes": [
{
"descriptions": [
{
"type": "text",
"cweId": "CWE-613",
"description": "CWE-613 Insufficient Session Expiration",
"lang": "en",
"description": "n/a"
"type": "CWE"
}
]
}
]
],
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-04T02:04:58.516Z"
},
"references": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/32695284701069-Configured-Commerce-Security-Advisory-COM-2024-04"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"dataVersion": "5.1"
Expand Down
44 changes: 24 additions & 20 deletions cves/2025/22xxx/CVE-2025-22387.json
Original file line number Diff line number Diff line change
Expand Up @@ -5,51 +5,55 @@
"cveId": "CVE-2025-22387",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2025-01-04T01:46:42.749365",
"dateUpdated": "2025-01-04T02:06:18.617Z",
"dateReserved": "2025-01-04T00:00:00",
"datePublished": "2025-01-04T00:00:00"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-04T01:46:42.749365"
},
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking."
}
],
"affected": [
{
"vendor": "n/a",
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"version": "n/a",
"status": "affected"
"status": "affected",
"version": "n/a"
}
]
}
],
"references": [
"descriptions": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/32695551034893-Configured-Commerce-Security-Advisory-COM-2024-06"
"lang": "en",
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking."
}
],
"problemTypes": [
{
"descriptions": [
{
"type": "text",
"cweId": "CWE-598",
"description": "CWE-598 Use of GET Request Method With Sensitive Query Strings",
"lang": "en",
"description": "n/a"
"type": "CWE"
}
]
}
]
],
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-04T02:06:18.617Z"
},
"references": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/32695551034893-Configured-Commerce-Security-Advisory-COM-2024-06"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"dataVersion": "5.1"
Expand Down
44 changes: 24 additions & 20 deletions cves/2025/22xxx/CVE-2025-22388.json
Original file line number Diff line number Diff line change
Expand Up @@ -5,51 +5,55 @@
"cveId": "CVE-2025-22388",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2025-01-04T01:46:34.387692",
"dateUpdated": "2025-01-04T02:06:49.019Z",
"dateReserved": "2025-01-04T00:00:00",
"datePublished": "2025-01-04T00:00:00"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-04T01:46:34.387692"
},
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads."
}
],
"affected": [
{
"vendor": "n/a",
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"version": "n/a",
"status": "affected"
"status": "affected",
"version": "n/a"
}
]
}
],
"references": [
"descriptions": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/33182047260557-Content-Management-System-CMS-Security-Advisory-CMS-2025-01"
"lang": "en",
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads."
}
],
"problemTypes": [
{
"descriptions": [
{
"type": "text",
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')",
"lang": "en",
"description": "n/a"
"type": "CWE"
}
]
}
]
],
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-04T02:06:49.019Z"
},
"references": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/33182047260557-Content-Management-System-CMS-Security-Advisory-CMS-2025-01"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"dataVersion": "5.1"
Expand Down
44 changes: 24 additions & 20 deletions cves/2025/22xxx/CVE-2025-22389.json
Original file line number Diff line number Diff line change
Expand Up @@ -5,51 +5,55 @@
"cveId": "CVE-2025-22389",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2025-01-04T01:46:25.289704",
"dateUpdated": "2025-01-04T02:09:16.461Z",
"dateReserved": "2025-01-04T00:00:00",
"datePublished": "2025-01-04T00:00:00"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-04T01:46:25.289704"
},
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems."
}
],
"affected": [
{
"vendor": "n/a",
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"version": "n/a",
"status": "affected"
"status": "affected",
"version": "n/a"
}
]
}
],
"references": [
"descriptions": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/33182404079629-Content-Management-System-CMS-Security-Advisory-CMS-2025-03"
"lang": "en",
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems."
}
],
"problemTypes": [
{
"descriptions": [
{
"type": "text",
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"description": "n/a"
"type": "CWE"
}
]
}
]
],
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-04T02:09:16.461Z"
},
"references": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/33182404079629-Content-Management-System-CMS-Security-Advisory-CMS-2025-03"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"dataVersion": "5.1"
Expand Down
44 changes: 24 additions & 20 deletions cves/2025/22xxx/CVE-2025-22390.json
Original file line number Diff line number Diff line change
Expand Up @@ -5,51 +5,55 @@
"cveId": "CVE-2025-22390",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2025-01-04T01:46:15.654346",
"dateUpdated": "2025-01-04T02:11:01.919Z",
"dateReserved": "2025-01-04T00:00:00",
"datePublished": "2025-01-04T00:00:00"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-04T01:46:15.654346"
},
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS due to insufficient enforcement of password complexity requirements. The application permits users to set passwords with a minimum length of 6 characters, lacking adequate complexity to resist modern attack techniques such as password spraying or offline password cracking."
}
],
"affected": [
{
"vendor": "n/a",
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"version": "n/a",
"status": "affected"
"status": "affected",
"version": "n/a"
}
]
}
],
"references": [
"descriptions": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/33182255281293-Content-Management-System-CMS-Security-Advisory-CMS-2025-02"
"lang": "en",
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS due to insufficient enforcement of password complexity requirements. The application permits users to set passwords with a minimum length of 6 characters, lacking adequate complexity to resist modern attack techniques such as password spraying or offline password cracking."
}
],
"problemTypes": [
{
"descriptions": [
{
"type": "text",
"cweId": "CWE-521",
"description": "CWE-521 Weak Password Requirements",
"lang": "en",
"description": "n/a"
"type": "CWE"
}
]
}
]
],
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-04T02:11:01.919Z"
},
"references": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/33182255281293-Content-Management-System-CMS-Security-Advisory-CMS-2025-02"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"dataVersion": "5.1"
Expand Down
Loading

0 comments on commit ca0df9a

Please sign in to comment.