cvelist/2023/36xxx/CVE-2023-36002.json

89 lines
2.9 KiB
JSON
Raw Normal View History

2023-06-20 21:00:41 +00:00
{
2023-06-27 15:00:44 +00:00
"data_version": "4.0",
2023-06-20 21:00:41 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-36002",
2023-06-27 15:00:44 +00:00
"ASSIGNER": "security@proofpoint.com",
"STATE": "PUBLIC"
2023-06-20 21:00:41 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-06-27 15:00:44 +00:00
"value": "A missing authorization check in multiple URL validation endpoints of the Insider Threat Management Server enables an anonymous attacker on an adjacent network to smuggle content via DNS lookups. All versions before 7.14.3 are affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Proofpoint",
"product": {
"product_data": [
{
"product_name": "Insider Threat Management",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "7.14.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005",
"refsource": "MISC",
"name": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
2023-06-20 21:00:41 +00:00
}
]
}
}