vuln-list-alt/oval/c10f2/ALT-PU-2024-4549/definitions.json
2024-04-17 03:02:38 +00:00

693 lines
37 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20244549",
"Version": "oval:org.altlinux.errata:def:20244549",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-4549: package `itop` update to version 3.1.1.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f2"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-4549",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-4549",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-03877",
"RefURL": "https://bdu.fstec.ru/vul/2022-03877",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05425",
"RefURL": "https://bdu.fstec.ru/vul/2022-05425",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01072",
"RefURL": "https://bdu.fstec.ru/vul/2023-01072",
"Source": "BDU"
},
{
"RefID": "BDU:2023-08237",
"RefURL": "https://bdu.fstec.ru/vul/2023-08237",
"Source": "BDU"
},
{
"RefID": "CVE-2019-19821",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19821",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11696",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11696",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11697",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11697",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12777",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12777",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12778",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12778",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12779",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12779",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12780",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12780",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12781",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12781",
"Source": "CVE"
},
{
"RefID": "CVE-2020-15218",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-15218",
"Source": "CVE"
},
{
"RefID": "CVE-2020-15219",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-15219",
"Source": "CVE"
},
{
"RefID": "CVE-2020-15220",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-15220",
"Source": "CVE"
},
{
"RefID": "CVE-2020-15221",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-15221",
"Source": "CVE"
},
{
"RefID": "CVE-2020-16842",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-16842",
"Source": "CVE"
},
{
"RefID": "CVE-2020-4079",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-4079",
"Source": "CVE"
},
{
"RefID": "CVE-2021-21406",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-21406",
"Source": "CVE"
},
{
"RefID": "CVE-2021-21407",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-21407",
"Source": "CVE"
},
{
"RefID": "CVE-2021-32663",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-32663",
"Source": "CVE"
},
{
"RefID": "CVE-2021-32664",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-32664",
"Source": "CVE"
},
{
"RefID": "CVE-2021-32775",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-32775",
"Source": "CVE"
},
{
"RefID": "CVE-2021-32776",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-32776",
"Source": "CVE"
},
{
"RefID": "CVE-2021-41161",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41161",
"Source": "CVE"
},
{
"RefID": "CVE-2021-41162",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41162",
"Source": "CVE"
},
{
"RefID": "CVE-2021-41245",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41245",
"Source": "CVE"
},
{
"RefID": "CVE-2021-46743",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-46743",
"Source": "CVE"
},
{
"RefID": "CVE-2022-24780",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24780",
"Source": "CVE"
},
{
"RefID": "CVE-2022-24811",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24811",
"Source": "CVE"
},
{
"RefID": "CVE-2022-24894",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24894",
"Source": "CVE"
},
{
"RefID": "CVE-2022-31402",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31402",
"Source": "CVE"
},
{
"RefID": "CVE-2022-31403",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31403",
"Source": "CVE"
},
{
"RefID": "CVE-2022-39214",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39214",
"Source": "CVE"
},
{
"RefID": "CVE-2022-39216",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39216",
"Source": "CVE"
},
{
"RefID": "CVE-2022-39261",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39261",
"Source": "CVE"
},
{
"RefID": "CVE-2023-34447",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34447",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38511",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38511",
"Source": "CVE"
},
{
"RefID": "CVE-2023-43790",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-43790",
"Source": "CVE"
},
{
"RefID": "CVE-2023-44396",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-44396",
"Source": "CVE"
},
{
"RefID": "CVE-2023-45808",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45808",
"Source": "CVE"
},
{
"RefID": "CVE-2023-46734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-46734",
"Source": "CVE"
},
{
"RefID": "CVE-2023-47123",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-47123",
"Source": "CVE"
},
{
"RefID": "CVE-2023-47622",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-47622",
"Source": "CVE"
},
{
"RefID": "CVE-2023-47626",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-47626",
"Source": "CVE"
},
{
"RefID": "CVE-2023-48709",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48709",
"Source": "CVE"
},
{
"RefID": "CVE-2023-48710",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48710",
"Source": "CVE"
}
],
"Description": "This update upgrades itop to version 3.1.1.1-alt1. \nSecurity Fix(es):\n\n * BDU:2022-03877: Уязвимость веб-инструмента управления ИТ-услугами iTop, связанная с повторным использованием CSRF-токенов, позволяющая нарушителю осуществить CSRF-атаку\n\n * BDU:2022-05425: Уязвимость веб-инструмента управления ИТ-услугами iTop, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01072: Уязвимость компонента AbstractSessionListener программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к сеансу пользователя\n\n * BDU:2023-08237: Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю раскрыть защищаемую информацию, выполнить фишинговые атаки и атаки с диск-загрузкой\n\n * CVE-2019-19821: A post-authentication privilege escalation in the web application of Combodo iTop allows regular authenticated users to access information and modify information with administrative privileges by not following the HTTP Location header in server responses. This is fixed in all iTop packages (community, essential, professional) in versions : 2.5.4, 2.6.3, 2.7.0\n\n * CVE-2020-11696: In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.\n\n * CVE-2020-11697: In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.\n\n * CVE-2020-12777: A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.\n\n * CVE-2020-12778: Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.\n\n * CVE-2020-12779: Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.\n\n * CVE-2020-12780: A security misconfiguration exists in Combodo iTop, which can expose sensitive information.\n\n * CVE-2020-12781: Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.\n\n * CVE-2020-15218: Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, admin pages are cached, so that their content is visible after deconnection by using the browser back button. This is fixed in versions 2.7.2 and 3.0.0.\n\n * CVE-2020-15219: Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, when a download error is triggered in the user portal, an SQL query is displayed to the user. This is fixed in versions 2.7.2 and 3.0.0.\n\n * CVE-2020-15220: Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, two cookies are created for the same session, which leads to a possibility to steal user session. This is fixed in versions 2.7.2 and 3.0.0.\n\n * CVE-2020-15221: Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, by modifying target browser local storage, an XSS can be generated in the iTop console breadcrumb. This is fixed in versions 2.7.2 and 3.0.0.\n\n * CVE-2020-16842: description unavailable\n\n * CVE-2020-4079: Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 2.8.0, when the ajax endpoint for the \"excel export\" portal functionality is called directly it allows getting data without scope filtering. This allows a user to access data they which they should not have access to. This is fixed in versions 2.7.2 and 3.0.0.\n\n * CVE-2021-21406: Combodo iTop is an open source, web based IT Service Management tool. In versions prior to 2.7.4, there is a command injection vulnerability in the Setup Wizard when providing Graphviz executable path. The vulnerability is patched in version 2.7.4 and 3.0.0.\n\n * CVE-2021-21407: Combodo iTop is an open source, web based IT Service Management tool. Prior to version 2.7.4, the CSRF token validation can be bypassed through iTop portal via a tricky browser procedure. The vulnerability is patched in version 2.7.4 and 3.0.0.\n\n * CVE-2021-32663: iTop is an open source web based IT Service Management tool. In affected versions an attacker can call the system setup without authentication. Given specific parameters this can lead to SSRF. This issue has been resolved in versions 2.6.5 and 2.7.5 and later\n\n * CVE-2021-32664: Combodo iTop is an open source web based IT Service Management tool. In affected versions there is a XSS vulnerability on \"run query\" page when logged as administrator. This has been resolved in versions 2.6.5 and 2.7.5.\n\n * CVE-2021-32775: Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.4, a non admin user can get access to many class/field values through GroupBy Dashlet error message. This issue is fixed in versions 2.7.4 and 3.0.0.\n\n * CVE-2021-32776: Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.4, CSRF tokens can be reused by a malicious user, as on Windows servers no cleanup is done on CSRF tokens. This issue is fixed in versions 2.7.4 and 3.0.0.\n\n * CVE-2021-41161: Combodo iTop is a web based IT Service Management tool. In versions prior to 3.0.0-beta6 the export CSV page don't properly escape the user supplied parameters, allowing for javascript injection into rendered csv files. Users are advised to upgrade. There are no known workarounds for this issue.\n\n * CVE-2021-41162: Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to beta6 the `ajax.render.php?operation=wizard_helper` page did not properly escape the user supplied parameters, allowing for a cross site scripting attack vector. Users are advised to upgrade. There are no known workarounds for this issue.\n\n * CVE-2021-41245: Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, CSRF tokens generated by `privUITransactionFile` aren't properly checked. Versions 2.7.6 and 3.0.0 contain a patch for this issue. As a workaround, use the session implementation by adding in the iTop config file.\n\n * CVE-2021-46743: In Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT library unsafely, but might not be considered a vulnerability in the library itself.\n\n * CVE-2022-24780: Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.\n\n * CVE-2022-24811: Combodi iTop is a web based IT Service Management tool. Prior to versions 2.7.6 and 3.0.0, cross-site scripting is possible for scripts outside of script tags when displaying HTML attachments. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.\n\n * CVE-2022-24894: Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony HTTP cache system, acts as a reverse proxy: It caches entire responses (including headers) and returns them to the clients. In a recent change in the `AbstractSessionListener`, the response might contain a `Set-Cookie` header. If the Symfony HTTP cache system is enabled, this response might bill stored and return to the next clients. An attacker can use this vulnerability to retrieve the victim's session. This issue has been patched and is available for branch 4.4.\n\n\n * CVE-2022-31402: ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/webservices/export-v2.php.\n\n * CVE-2022-31403: ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/pages/ajax.render.php.\n\n * CVE-2022-39214: Combodo iTop is an open source, web-based IT service management platform. Prior to versions 2.7.8 and 3.0.2-1, a user who can log in on iTop is able to take over any account just by knowing the account's username. This issue is fixed in versions 2.7.8 and 3.0.2-1.\n\n * CVE-2022-39216: Combodo iTop is an open source, web-based IT service management platform. Prior to versions 2.7.8 and 3.0.2-1, the reset password token is generated without any randomness parameter. This may lead to account takeover. The issue is fixed in versions 2.7.8 and 3.0.2-1.\n\n * CVE-2022-39261: Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.\n\n * CVE-2023-34447: iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, on `pages/UI.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0.\n\n * CVE-2023-38511: iTop is an IT service management platform. Dashboard editor : can load multiple files and URL, and full path disclosure on dashboard config file. This vulnerability is fixed in 3.0.4 and 3.1.1.\n\n\n * CVE-2023-43790: iTop is an IT service management platform. By manipulating HTTP queries, a user can inject malicious content in the fields used for the object friendlyname value. This vulnerability is fixed in 3.1.1 and 3.2.0.\n\n\n * CVE-2023-44396: iTop is an IT service management platform. Dashlet edits ajax endpoints can be used to produce XSS. Fixed in iTop 2.7.10, 3.0.4, and 3.1.1.\n\n\n * CVE-2023-45808: iTop is an IT service management platform. When creating or updating an object, extkey values aren't checked to be in the current user silo. In other words, by forging an http request, the user can create objects pointing to out of silo objects (for example a UserRequest in an out of scope Organization). Fixed in iTop 2.7.10, 3.0.4, 3.1.1, and 3.2.0.\n\n * CVE-2023-46734: Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 2.0.0, 5.0.0, and 6.0.0 and prior to versions 4.4.51, 5.4.31, and 6.3.8, some Twig filters in CodeExtension use `is_safe=html` but don't actually ensure their input is safe. As of versions 4.4.51, 5.4.31, and 6.3.8, Symfony now escapes the output of the affected filters.\n\n * CVE-2023-47123: iTop is an IT service management platform. By filling malicious code in an object friendlyname / complementary name, an XSS attack can be performed when this object will displayed as an n:n relation item in another object. This vulnerability is fixed in 3.1.1 and 3.2.0.\n\n * CVE-2023-47622: iTop is an IT service management platform. When dashlet are refreshed, XSS attacks are possible. This vulnerability is fixed in 3.0.4 and 3.1.1.\n\n * CVE-2023-47626: iTop is an IT service management platform. When displaying/editing the user's personal tokens, XSS attacks are possible. This vulnerability is fixed in 3.1.1.\n\n * CVE-2023-48709: iTop is an IT service management platform. When exporting data from backoffice or portal in CSV or Excel files, users' inputs may include malicious formulas that may be imported into Excel. As Excel 2016 does **not** prevent Remote Code Execution by default, uninformed users may become victims. This vulnerability is fixed in 2.7.9, 3.0.4, 3.1.1, and 3.2.0.\n\n * CVE-2023-48710: iTop is an IT service management platform. Files from the `env-production` folder can be retrieved even though they should have restricted access. Hopefully, there is no sensitive files stored in that folder natively, but there could be from a third-party module. \n The `pages/exec.php` script as been fixed to limit execution of PHP files only. Other file types won't be retrieved and exposed. The vulnerability is fixed in 2.7.10, 3.0.4, 3.1.1, and 3.2.0.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-04-02"
},
"Updated": {
"Date": "2024-04-02"
},
"BDUs": [
{
"ID": "BDU:2022-03877",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-352",
"Href": "https://bdu.fstec.ru/vul/2022-03877",
"Impact": "Low",
"Public": "20210621"
},
{
"ID": "BDU:2022-05425",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://bdu.fstec.ru/vul/2022-05425",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "BDU:2023-01072",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-285",
"Href": "https://bdu.fstec.ru/vul/2023-01072",
"Impact": "Critical",
"Public": "20230202"
},
{
"ID": "BDU:2023-08237",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2023-08237",
"Impact": "Low",
"Public": "20231110"
}
],
"CVEs": [
{
"ID": "CVE-2019-19821",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19821",
"Impact": "High",
"Public": "20200316"
},
{
"ID": "CVE-2020-11696",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11696",
"Impact": "Low",
"Public": "20200605"
},
{
"ID": "CVE-2020-11697",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11697",
"Impact": "Low",
"Public": "20200605"
},
{
"ID": "CVE-2020-12777",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12777",
"Impact": "High",
"Public": "20200810"
},
{
"ID": "CVE-2020-12778",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12778",
"Impact": "Low",
"Public": "20200810"
},
{
"ID": "CVE-2020-12779",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12779",
"Impact": "Low",
"Public": "20200810"
},
{
"ID": "CVE-2020-12780",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12780",
"Impact": "High",
"Public": "20200810"
},
{
"ID": "CVE-2020-12781",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-352",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12781",
"Impact": "High",
"Public": "20200810"
},
{
"ID": "CVE-2020-15218",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-613",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-15218",
"Impact": "Low",
"Public": "20210113"
},
{
"ID": "CVE-2020-15219",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-209",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-15219",
"Impact": "Low",
"Public": "20210113"
},
{
"ID": "CVE-2020-15220",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-613",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-15220",
"Impact": "Low",
"Public": "20210113"
},
{
"ID": "CVE-2020-15221",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-15221",
"Impact": "Low",
"Public": "20210113"
},
{
"ID": "CVE-2020-4079",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-4079",
"Impact": "High",
"Public": "20210112"
},
{
"ID": "CVE-2021-21406",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-77",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-21406",
"Impact": "High",
"Public": "20210721"
},
{
"ID": "CVE-2021-21407",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-352",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-21407",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-32663",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-918",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-32663",
"Impact": "High",
"Public": "20211019"
},
{
"ID": "CVE-2021-32664",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-32664",
"Impact": "Low",
"Public": "20211019"
},
{
"ID": "CVE-2021-32775",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-209",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-32775",
"Impact": "Low",
"Public": "20210721"
},
{
"ID": "CVE-2021-32776",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-352",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-32776",
"Impact": "High",
"Public": "20210721"
},
{
"ID": "CVE-2021-41161",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41161",
"Impact": "Low",
"Public": "20220421"
},
{
"ID": "CVE-2021-41162",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41162",
"Impact": "Low",
"Public": "20220421"
},
{
"ID": "CVE-2021-41245",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"CWE": "CWE-352",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41245",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2021-46743",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-46743",
"Impact": "Critical",
"Public": "20220329"
},
{
"ID": "CVE-2022-24780",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24780",
"Impact": "High",
"Public": "20220405"
},
{
"ID": "CVE-2022-24811",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24811",
"Impact": "Low",
"Public": "20220405"
},
{
"ID": "CVE-2022-24894",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-285",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24894",
"Impact": "High",
"Public": "20230203"
},
{
"ID": "CVE-2022-31402",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31402",
"Impact": "Low",
"Public": "20220610"
},
{
"ID": "CVE-2022-31403",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31403",
"Impact": "Low",
"Public": "20220614"
},
{
"ID": "CVE-2022-39214",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39214",
"Impact": "High",
"Public": "20230314"
},
{
"ID": "CVE-2022-39216",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39216",
"Impact": "Critical",
"Public": "20230314"
},
{
"ID": "CVE-2022-39261",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39261",
"Impact": "High",
"Public": "20220928"
},
{
"ID": "CVE-2023-34447",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34447",
"Impact": "Low",
"Public": "20231025"
},
{
"ID": "CVE-2023-38511",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38511",
"Impact": "None",
"Public": "20240415"
},
{
"ID": "CVE-2023-43790",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-43790",
"Impact": "None",
"Public": "20240415"
},
{
"ID": "CVE-2023-44396",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-44396",
"Impact": "None",
"Public": "20240415"
},
{
"ID": "CVE-2023-45808",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45808",
"Impact": "None",
"Public": "20240415"
},
{
"ID": "CVE-2023-46734",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-46734",
"Impact": "Low",
"Public": "20231110"
},
{
"ID": "CVE-2023-47123",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-47123",
"Impact": "None",
"Public": "20240415"
},
{
"ID": "CVE-2023-47622",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-47622",
"Impact": "None",
"Public": "20240415"
},
{
"ID": "CVE-2023-47626",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-47626",
"Impact": "None",
"Public": "20240415"
},
{
"ID": "CVE-2023-48709",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48709",
"Impact": "None",
"Public": "20240415"
},
{
"ID": "CVE-2023-48710",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48710",
"Impact": "None",
"Public": "20240415"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20244549001",
"Comment": "itop is earlier than 0:3.1.1.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20244549002",
"Comment": "itop-apache2 is earlier than 0:3.1.1.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20244549003",
"Comment": "itop-php8.1 is earlier than 0:3.1.1.1-alt1"
}
]
}
]
}
}
]
}