Vulnerabilites related to JFrog - JFrog Artifactory
CVE-2021-23163 (GCVE-0-2021-23163)
Vulnerability from cvelistv5
Published
2022-07-06 09:45
Modified
2024-08-03 19:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
JFrog Artifactory prior to version 7.33.6 and 6.23.38, is vulnerable to CSRF ( Cross-Site Request Forgery) for specific endpoints. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.33.6 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
JFrog | JFrog Artifactory |
Version: JFrog Artifactory versions before 7.33.6 < 7.x Version: JFrog Artifactory versions before 6.23.38 < 6.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:05:54.566Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-23163%3A++Cross-Site+Request+Forgery+on+REST+using+Basic+Auth" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.x", "status": "affected", "version": "JFrog Artifactory versions before 7.33.6", "versionType": "custom" }, { "lessThan": "6.x", "status": "affected", "version": "JFrog Artifactory versions before 6.23.38", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory prior to version 7.33.6 and 6.23.38, is vulnerable to CSRF ( Cross-Site Request Forgery) for specific endpoints. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.33.6 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T09:45:12", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-23163%3A++Cross-Site+Request+Forgery+on+REST+using+Basic+Auth" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-23163", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.33.6", "version_value": "7.x" }, { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 6.23.38", "version_value": "6.x" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory prior to version 7.33.6 and 6.23.38, is vulnerable to CSRF ( Cross-Site Request Forgery) for specific endpoints. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.33.6 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-23163%3A++Cross-Site+Request+Forgery+on+REST+using+Basic+Auth", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-23163%3A++Cross-Site+Request+Forgery+on+REST+using+Basic+Auth" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-23163", "datePublished": "2022-07-06T09:45:12", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-03T19:05:54.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-3860 (GCVE-0-2021-3860)
Vulnerability from cvelistv5
Published
2021-12-20 00:00
Modified
2024-11-18 19:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - SQL Injection
Summary
JFrog Artifactory before 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
JFrog | JFrog Artifactory |
Version: JFrog Artifactory versions before 7.25.4 with E+ license < 7.25.4 Version: JFrog Artifactory versions before 6.23.30 with E+ license < 6.23.30 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:09.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-3860", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T19:58:16.443180Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T19:58:54.966Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.25.4", "status": "affected", "version": "JFrog Artifactory versions before 7.25.4 with E+ license", "versionType": "custom" }, { "lessThan": "6.23.30", "status": "affected", "version": "JFrog Artifactory versions before 6.23.30 with E+ license", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory before 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-19T17:05:56.583648", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection" }, { "url": "http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html" } ] } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-3860", "datePublished": "2021-12-20T00:00:00", "dateReserved": "2021-10-05T00:00:00", "dateUpdated": "2024-11-18T19:58:54.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-45074 (GCVE-0-2021-45074)
Vulnerability from cvelistv5
Published
2022-03-02 21:20
Modified
2024-08-04 04:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
JFrog Artifactory before 7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users OAuth token, which will force a reauthentication on an active session or in the next UI session.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
JFrog | JFrog Artifactory |
Version: JFrog Artifactory versions before 7.29.3 < 7.29.3 Version: JFrog Artifactory versions before 6.23.38 < 6.23.38 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45074%3A+Artifactory+Broken+Access+Control+on+Delete+OAuth+Tokens" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.29.3", "status": "affected", "version": "JFrog Artifactory versions before 7.29.3", "versionType": "custom" }, { "lessThan": "6.23.38", "status": "affected", "version": "JFrog Artifactory versions before 6.23.38", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory before 7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users OAuth token, which will force a reauthentication on an active session or in the next UI session." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-02T21:20:11", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45074%3A+Artifactory+Broken+Access+Control+on+Delete+OAuth+Tokens" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-45074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.29.3", "version_value": "7.29.3" }, { "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 6.23.38", "version_value": "6.23.38" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory before 7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users OAuth token, which will force a reauthentication on an active session or in the next UI session." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45074%3A+Artifactory+Broken+Access+Control+on+Delete+OAuth+Tokens", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45074%3A+Artifactory+Broken+Access+Control+on+Delete+OAuth+Tokens" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-45074", "datePublished": "2022-03-02T21:20:11", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-04T04:32:13.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-0668 (GCVE-0-2022-0668)
Vulnerability from cvelistv5
Published
2023-01-08 00:00
Modified
2025-04-09 13:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-274 - Improper Handling of Insufficient Privileges
Summary
JFrog Artifactory prior to 7.37.13 is vulnerable to Authentication Bypass, which can lead to Privilege Escalation when a specially crafted request is sent by an unauthenticated user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
JFrog | JFrog Artifactory |
Version: JFrog Artifactory versions before 7.x < 7.37.13 Version: JFrog Artifactory versions before 6.x < 6.23.41 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0668%3A+Artifactory+Authentication+Bypass" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-0668", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T13:43:53.898081Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T13:44:13.635Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.37.13", "status": "affected", "version": "JFrog Artifactory versions before 7.x", "versionType": "custom" }, { "lessThan": "6.23.41", "status": "affected", "version": "JFrog Artifactory versions before 6.x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory prior to 7.37.13 is vulnerable to Authentication Bypass, which can lead to Privilege Escalation when a specially crafted request is sent by an unauthenticated user." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-274", "description": "CWE-274 Improper Handling of Insufficient Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-08T00:00:00.000Z", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0668%3A+Artifactory+Authentication+Bypass" } ] } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2022-0668", "datePublished": "2023-01-08T00:00:00.000Z", "dateReserved": "2022-02-17T00:00:00.000Z", "dateUpdated": "2025-04-09T13:44:13.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-45721 (GCVE-0-2021-45721)
Vulnerability from cvelistv5
Published
2022-07-06 09:15
Modified
2024-08-04 04:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
JFrog Artifactory prior to version 7.29.8 and 6.23.38 is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in Users REST API endpoint. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.36.1 versions prior to 7.29.8; JFrog Artifactory versions before 6.23.41 versions prior to 6.23.38.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
JFrog | JFrog Artifactory |
Version: JFrog Artifactory versions before 7.36.1 < 7.29.8 Version: JFrog Artifactory versions before 6.23.41 < 6.23.38 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:47:02.005Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45721%3A+Cross-Site+Script+%28XSS%29+on+User+REST+API" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.29.8", "status": "affected", "version": "JFrog Artifactory versions before 7.36.1", "versionType": "custom" }, { "lessThan": "6.23.38", "status": "affected", "version": "JFrog Artifactory versions before 6.23.41", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory prior to version 7.29.8 and 6.23.38 is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in Users REST API endpoint. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.36.1 versions prior to 7.29.8; JFrog Artifactory versions before 6.23.41 versions prior to 6.23.38." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T09:15:11", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45721%3A+Cross-Site+Script+%28XSS%29+on+User+REST+API" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-45721", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.36.1", "version_value": "7.29.8" }, { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 6.23.41", "version_value": "6.23.38" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory prior to version 7.29.8 and 6.23.38 is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in Users REST API endpoint. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.36.1 versions prior to 7.29.8; JFrog Artifactory versions before 6.23.41 versions prior to 6.23.38." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45721%3A+Cross-Site+Script+%28XSS%29+on+User+REST+API", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-45721%3A+Cross-Site+Script+%28XSS%29+on+User+REST+API" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-45721", "datePublished": "2022-07-06T09:15:11", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-04T04:47:02.005Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46687 (GCVE-0-2021-46687)
Vulnerability from cvelistv5
Published
2022-07-06 09:35
Modified
2024-08-04 05:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-359 - Exposure of Private Information ('Privacy Violation')
Summary
JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.31.10 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
JFrog | JFrog Artifactory |
Version: JFrog Artifactory versions before 7.31.10 < 7.x Version: JFrog Artifactory versions before 6.23.38 < 6.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:41.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46687%3A+Sensitive+data+exposure+on+proxy+endpoint+for+Project+Admin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.x", "status": "affected", "version": "JFrog Artifactory versions before 7.31.10", "versionType": "custom" }, { "lessThan": "6.x", "status": "affected", "version": "JFrog Artifactory versions before 6.23.38", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.31.10 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359 Exposure of Private Information (\u0027Privacy Violation\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T09:35:11", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46687%3A+Sensitive+data+exposure+on+proxy+endpoint+for+Project+Admin" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-46687", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.31.10", "version_value": "7.x" }, { "platform": "", "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 6.23.38", "version_value": "6.x" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.31.10 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-359 Exposure of Private Information (\u0027Privacy Violation\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46687%3A+Sensitive+data+exposure+on+proxy+endpoint+for+Project+Admin", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46687%3A+Sensitive+data+exposure+on+proxy+endpoint+for+Project+Admin" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-46687", "datePublished": "2022-07-06T09:35:11", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-04T05:17:41.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-0573 (GCVE-0-2022-0573)
Vulnerability from cvelistv5
Published
2022-05-16 14:32
Modified
2024-08-02 23:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Summary
JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
JFrog | JFrog Artifactory |
Version: JFrog Artifactory versions before 7.36.1 < 7.36.1 Version: JFrog Artifactory versions before 6.23.41 < 6.23.41 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0573%3A+Artifactory+Vulnerable+to+Deserialization+of+Untrusted+Data" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.36.1", "status": "affected", "version": "JFrog Artifactory versions before 7.36.1", "versionType": "custom" }, { "lessThan": "6.23.41", "status": "affected", "version": "JFrog Artifactory versions before 6.23.41", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-16T14:32:04", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0573%3A+Artifactory+Vulnerable+to+Deserialization+of+Untrusted+Data" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2022-0573", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.36.1", "version_value": "7.36.1" }, { "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 6.23.41", "version_value": "6.23.41" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0573%3A+Artifactory+Vulnerable+to+Deserialization+of+Untrusted+Data", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0573%3A+Artifactory+Vulnerable+to+Deserialization+of+Untrusted+Data" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2022-0573", "datePublished": "2022-05-16T14:32:04", "dateReserved": "2022-02-12T00:00:00", "dateUpdated": "2024-08-02T23:32:46.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46270 (GCVE-0-2021-46270)
Vulnerability from cvelistv5
Published
2022-03-02 21:20
Modified
2024-08-04 05:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
JFrog | JFrog Artifactory |
Version: JFrog Artifactory versions before 7.31.10 < 7.31.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:02:10.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46270%3A+Artifactory+Project+Admin+Repository+Name+Disclosure" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "JFrog Artifactory", "vendor": "JFrog", "versions": [ { "lessThan": "7.31.10", "status": "affected", "version": "JFrog Artifactory versions before 7.31.10", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-02T21:20:12", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46270%3A+Artifactory+Project+Admin+Repository+Name+Disclosure" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-46270", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "JFrog Artifactory", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "JFrog Artifactory versions before 7.31.10", "version_value": "7.31.10" } ] } } ] }, "vendor_name": "JFrog" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/JFrog+Security+Advisories" }, { "name": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46270%3A+Artifactory+Project+Admin+Repository+Name+Disclosure", "refsource": "MISC", "url": "https://www.jfrog.com/confluence/display/JFROG/CVE-2021-46270%3A+Artifactory+Project+Admin+Repository+Name+Disclosure" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-46270", "datePublished": "2022-03-02T21:20:12", "dateReserved": "2022-02-14T00:00:00", "dateUpdated": "2024-08-04T05:02:10.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }