2019-04-18 12:00:53 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
2019-09-20 10:00:10 -07:00
"ASSIGNER" : "security@pivotal.io" ,
"DATE_PUBLIC" : "2019-09-20T01:05:51.000Z" ,
2019-04-18 12:00:53 +00:00
"ID" : "CVE-2019-11280" ,
2019-09-20 10:00:10 -07:00
"STATE" : "PUBLIC" ,
"TITLE" : "Privilege escalation through the invitations service"
} ,
"source" : {
"discovery" : "UNKNOWN"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
2019-09-20 19:00:59 +00:00
"vendor_name" : "Pivotal" ,
2019-09-20 10:00:10 -07:00
"product" : {
"product_data" : [
{
"product_name" : "Pivotal Application Service (PAS)" ,
"version" : {
"version_data" : [
{
2019-09-20 19:00:59 +00:00
"version_value" : "2.3.x prior to 2.3.18"
2019-09-20 10:00:10 -07:00
} ,
{
2019-09-20 19:00:59 +00:00
"version_value" : "2.4.x prior to 2.4.14"
2019-09-20 10:00:10 -07:00
} ,
{
2019-09-20 19:00:59 +00:00
"version_value" : "2.5.x prior to 2.5.10"
2019-09-20 10:00:10 -07:00
} ,
{
2019-09-20 19:00:59 +00:00
"version_value" : "2.6.x prior to 2.6.5"
2019-09-20 10:00:10 -07:00
}
]
}
}
]
2019-09-20 19:00:59 +00:00
}
2019-09-20 10:00:10 -07:00
}
]
}
2019-04-18 12:00:53 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2019-09-20 10:00:10 -07:00
"value" : "Pivotal Apps Manager, included in Pivotal Application Service versions 2.3.x prior to 2.3.18, 2.4.x prior to 2.4.14, 2.5.x prior to 2.5.10, and 2.6.x prior to 2.6.5, contains an invitations microservice which allows users to invite others to their organizations. A remote authenticated user can gain additional privileges by inviting themselves to spaces that they should not have access to."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-269: Improper Privilege Management"
}
]
2019-04-18 12:00:53 +00:00
}
]
2019-09-20 10:00:10 -07:00
} ,
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM" ,
"url" : "https://pivotal.io/security/cve-2019-11280" ,
"name" : "https://pivotal.io/security/cve-2019-11280"
}
]
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "LOW" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"version" : "3.0"
}
2019-04-18 12:00:53 +00:00
}
}