diff --git a/advisories/unreviewed/2024/12/GHSA-qjp7-gvrw-vxmf/GHSA-qjp7-gvrw-vxmf.json b/advisories/unreviewed/2024/12/GHSA-qjp7-gvrw-vxmf/GHSA-qjp7-gvrw-vxmf.json index 973dcfe08968b..54a91a659d566 100644 --- a/advisories/unreviewed/2024/12/GHSA-qjp7-gvrw-vxmf/GHSA-qjp7-gvrw-vxmf.json +++ b/advisories/unreviewed/2024/12/GHSA-qjp7-gvrw-vxmf/GHSA-qjp7-gvrw-vxmf.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-qjp7-gvrw-vxmf", - "modified": "2024-12-10T03:31:45Z", + "modified": "2024-12-10T03:31:56Z", "published": "2024-12-10T03:31:45Z", "aliases": [ "CVE-2024-47580" ], + "summary": "Add the Source code url/ package url", "details": "An attacker authenticated as an administrator can use an exposed webservice to create a PDF with an embedded attachment. By specifying the file to be an internal server file and subsequently downloading the generated PDF, the attacker can read any file on the server with no effect on integrity or availability.", "severity": [ { @@ -13,12 +14,33 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47580" }, + { + "type": "PACKAGE", + "url": "https://github.com/SAP/scimono" + }, { "type": "WEB", "url": "https://me.sap.com/notes/3536965"