cvelist/2021/31xxx/CVE-2021-31601.json

81 lines
2.8 KiB
JSON
Raw Normal View History

2021-04-23 05:00:41 +00:00
{
"CVE_data_meta": {
2021-11-09 16:46:54 -08:00
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-31601",
"STATE": "PUBLIC"
2021-11-08 04:00:56 +00:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-04-23 05:00:41 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. They implement a series of web services using the SOAP protocol to allow scripting interaction with the backend server. An authenticated user (regardless of privileges) can list all databases connection details and credentials."
2021-04-23 05:00:41 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.hitachi.com/hirt/security/index.html",
"refsource": "MISC",
"name": "https://www.hitachi.com/hirt/security/index.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164779/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Insufficient-Access-Control.html",
"url": "http://packetstormsecurity.com/files/164779/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Insufficient-Access-Control.html"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:L/AV:N/A:N/C:H/I:L/PR:L/S:U/UI:N",
"version": "3.1"
}
2021-04-23 05:00:41 +00:00
}
}