object(app\admin\model\bug\Bug)#19 (37) { ["name":protected]=> string(3) "bug" ["autoWriteTimestamp":protected]=> string(7) "integer" ["createTime":protected]=> string(10) "createtime" ["updateTime":protected]=> string(10) "updatetime" ["deleteTime":protected]=> string(10) "deletetime" ["append":protected]=> array(0) { } ["connection":protected]=> array(0) { } ["parent":protected]=> NULL ["query":protected]=> NULL ["table":protected]=> NULL ["class":protected]=> string(23) "app\admin\model\bug\Bug" ["error":protected]=> NULL ["validate":protected]=> NULL ["pk":protected]=> NULL ["field":protected]=> array(0) { } ["except":protected]=> array(0) { } ["disuse":protected]=> array(0) { } ["readonly":protected]=> array(0) { } ["visible":protected]=> array(0) { } ["hidden":protected]=> array(0) { } ["data":protected]=> array(24) { ["id"]=> int(11823) ["cve_code"]=> string(13) "CVE-2020-1739" ["cnnvd"]=> string(16) "CNNVD-202002-913" ["cncve"]=> string(1) "/" ["cvss_score"]=> float(3.9) ["system"]=> string(37) "红旗Asianux服务器操作系统 V8" ["desc"]=> string(338) "Ansible 2.7.16 及之前版本、2.8.8 及之前版本和 2.9.5 及之前版本中发现一个漏洞,当使用 svn 模块的参数“password”设置密码时,该密码会用于 svn 命令行,从而向同一节点内的其他用户泄露。攻击者可以通过从 procfs 上的特定 PID 读取 cmdline 文件来利用该漏洞。" ["date"]=> string(10) "2024-11-11" ["level"]=> string(6) "低危" ["package"]=> string(8) "ansible;" ["repair_version"]=> NULL ["repair"]=> string(35) "软件包升级 dnf update ansible " ["prove"]=> NULL ["patch"]=> NULL ["references"]=> array(7) { [0]=> string(57) "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739" [1]=> string(47) "https://github.com/ansible/ansible/issues/67797" [2]=> string(66) "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html" [3]=> string(45) "https://www.debian.org/security/2021/dsa-4950" [4]=> string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/" [5]=> string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/" [6]=> string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/" } ["createtime"]=> int(1733118388) ["updatetime"]=> int(1733118388) ["deletetime"]=> NULL ["visible"]=> int(1) ["name"]=> NULL ["cvss_info"]=> NULL ["sys_type"]=> string(21) "服务器操作系统" ["repair_date"]=> string(10) "2024-11-11" ["cve_name"]=> string(26) "Ansible 信息泄露漏洞" } ["origin":protected]=> array(24) { ["id"]=> int(11823) ["cve_code"]=> string(13) "CVE-2020-1739" ["cnnvd"]=> string(16) "CNNVD-202002-913" ["cncve"]=> string(1) "/" ["cvss_score"]=> float(3.9) ["system"]=> string(37) "红旗Asianux服务器操作系统 V8" ["desc"]=> string(338) "Ansible 2.7.16 及之前版本、2.8.8 及之前版本和 2.9.5 及之前版本中发现一个漏洞,当使用 svn 模块的参数“password”设置密码时,该密码会用于 svn 命令行,从而向同一节点内的其他用户泄露。攻击者可以通过从 procfs 上的特定 PID 读取 cmdline 文件来利用该漏洞。" ["date"]=> string(10) "2024-11-11" ["level"]=> string(6) "低危" ["package"]=> string(8) "ansible;" ["repair_version"]=> NULL ["repair"]=> string(35) "软件包升级 dnf update ansible " ["prove"]=> NULL ["patch"]=> NULL ["references"]=> string(611) "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739;https://github.com/ansible/ansible/issues/67797;https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html;https://www.debian.org/security/2021/dsa-4950;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/" ["createtime"]=> int(1733118388) ["updatetime"]=> int(1733118388) ["deletetime"]=> NULL ["visible"]=> int(1) ["name"]=> NULL ["cvss_info"]=> NULL ["sys_type"]=> string(21) "服务器操作系统" ["repair_date"]=> string(10) "2024-11-11" ["cve_name"]=> string(26) "Ansible 信息泄露漏洞" } ["relation":protected]=> array(0) { } ["auto":protected]=> array(0) { } ["insert":protected]=> array(0) { } ["update":protected]=> array(0) { } ["dateFormat":protected]=> bool(false) ["type":protected]=> array(0) { } ["isUpdate":protected]=> bool(true) ["replace":protected]=> bool(false) ["force":protected]=> bool(false) ["updateWhere":protected]=> array(1) { ["id"]=> array(2) { [0]=> string(2) "eq" [1]=> string(5) "11823" } } ["failException":protected]=> bool(false) ["useGlobalScope":protected]=> bool(true) ["batchValidate":protected]=> bool(false) ["resultSetType":protected]=> string(5) "array" ["relationWrite":protected]=> NULL }