cvelist/2023/6xxx/CVE-2023-6105.json

118 lines
4.4 KiB
JSON
Raw Normal View History

2023-11-13 16:00:32 +00:00
{
2023-11-15 21:00:33 +00:00
"data_version": "4.0",
2023-11-13 16:00:32 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6105",
2023-11-15 21:00:33 +00:00
"ASSIGNER": "vulnreport@tenable.com",
"STATE": "PUBLIC"
2023-11-13 16:00:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-11-15 21:00:33 +00:00
"value": "An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ManageEngine",
"product": {
"product_data": [
{
"product_name": "Service Desk Plus",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "14304"
}
]
}
},
{
"product_name": "Asset Explorer",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "7004"
}
]
}
},
{
"product_name": "Access Manager Plus",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "14304"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.tenable.com/security/research/tra-2023-35",
"refsource": "MISC",
"name": "https://www.tenable.com/security/research/tra-2023-35"
2024-06-26 20:00:35 +00:00
},
{
"url": "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html",
"refsource": "MISC",
"name": "https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html"
2023-11-15 21:00:33 +00:00
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
2023-11-13 16:00:32 +00:00
}
]
}
}