cvelist/2020/9xxx/CVE-2020-9384.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2020-02-24 23:01:17 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-04-14 20:01:24 +00:00
"ID": "CVE-2020-9384",
"STATE": "PUBLIC"
2020-02-24 23:01:17 +00:00
},
2020-04-14 20:01:24 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-02-24 23:01:17 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-04-23 15:01:23 +00:00
"value": "** DISPUTED ** An Insecure Direct Object Reference (IDOR) vulnerability in the Change Password feature of Subex ROC Partner Settlement 10.5 allows remote authenticated users to achieve account takeover via manipulation of POST parameters. NOTE: This vulnerability may only affect a testing version of the application."
2020-04-14 20:01:24 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.subex.com/partner-settlement/",
"refsource": "MISC",
"name": "https://www.subex.com/partner-settlement/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/157197/Subex-ROC-Partner-Settlement-10.5-Insecure-Direct-Object-Reference.html",
"url": "http://packetstormsecurity.com/files/157197/Subex-ROC-Partner-Settlement-10.5-Insecure-Direct-Object-Reference.html"
2020-02-24 23:01:17 +00:00
}
]
}
}