cvelist/2023/6xxx/CVE-2023-6070.json

98 lines
3.1 KiB
JSON
Raw Normal View History

2023-11-10 06:00:35 +00:00
{
2023-11-29 09:00:31 +00:00
"data_version": "4.0",
2023-11-10 06:00:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6070",
2023-11-29 09:00:31 +00:00
"ASSIGNER": "trellixpsirt@trellix.com",
"STATE": "PUBLIC"
2023-11-10 06:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-11-29 09:00:31 +00:00
"value": "\nA server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-918 Server-Side Request Forgery (SSRF)",
"cweId": "CWE-918"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Trellix",
"product": {
"product_data": [
{
"product_name": "Trellix Enterprise Security Manager (ESM)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "11.6.8"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://kcm.trellix.com/corporate/index?page=content&id=SB10413",
"refsource": "MISC",
"name": "https://kcm.trellix.com/corporate/index?page=content&id=SB10413"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Andre Waldhoff (condignum GmbH)"
},
{
"lang": "en",
"value": "Johannes B\u00e4r (condignum GmbH)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
2023-11-10 06:00:35 +00:00
}
]
}
}