2021-10-08 22:01:03 +00:00
{
"CVE_data_meta" : {
Added the following cves for topease: CVE-2021-42115, CVE-2021-42116, CVE-2021-42117, CVE-2021-42118, CVE-2021-42119, CVE-2021-42120, CVE-2021-42121, CVE-2021-42122, CVE-2021-42123, CVE-2021-42544, CVE-2021-42545
2021-11-30 09:51:52 +01:00
"ASSIGNER" : "vulnerability@ncsc.ch" ,
2021-10-08 22:01:03 +00:00
"ID" : "CVE-2021-42121" ,
Added the following cves for topease: CVE-2021-42115, CVE-2021-42116, CVE-2021-42117, CVE-2021-42118, CVE-2021-42119, CVE-2021-42120, CVE-2021-42121, CVE-2021-42122, CVE-2021-42123, CVE-2021-42544, CVE-2021-42545
2021-11-30 09:51:52 +01:00
"STATE" : "PUBLIC" ,
"TITLE" : "Denial of Service via Invalid Date Format in TopEase"
2021-10-08 22:01:03 +00:00
} ,
Added the following cves for topease: CVE-2021-42115, CVE-2021-42116, CVE-2021-42117, CVE-2021-42118, CVE-2021-42119, CVE-2021-42120, CVE-2021-42121, CVE-2021-42122, CVE-2021-42123, CVE-2021-42544, CVE-2021-42545
2021-11-30 09:51:52 +01:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "TopEase" ,
"version" : {
"version_data" : [
{
"version_affected" : "<=" ,
"version_value" : "7.1.27"
}
]
}
}
]
} ,
"vendor_name" : "Business-DNA Solutions GmbH"
}
]
}
} ,
"credit" : [
{
"lang" : "eng" ,
"value" : "SIX Group Services AG, Cyber Controls"
}
] ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2021-10-08 22:01:03 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
Added the following cves for topease: CVE-2021-42115, CVE-2021-42116, CVE-2021-42117, CVE-2021-42118, CVE-2021-42119, CVE-2021-42120, CVE-2021-42121, CVE-2021-42122, CVE-2021-42123, CVE-2021-42544, CVE-2021-42545
2021-11-30 09:51:52 +01:00
"value" : "Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’ s TopEase® Platform Version <= 7.1.27 on an object’ s date attribute(s) allows an authenticated remote attacker with Object Modification privileges to insert an unexpected format into date fields, which leads to breaking the object page that the date field is present."
}
]
} ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "LOW" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 4.3 ,
"baseSeverity" : "MEDIUM" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"privilegesRequired" : "LOW" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" ,
"version" : "3.1"
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-20 Improper Input Validation"
}
]
2021-10-08 22:01:03 +00:00
}
]
Added the following cves for topease: CVE-2021-42115, CVE-2021-42116, CVE-2021-42117, CVE-2021-42118, CVE-2021-42119, CVE-2021-42120, CVE-2021-42121, CVE-2021-42122, CVE-2021-42123, CVE-2021-42544, CVE-2021-42545
2021-11-30 09:51:52 +01:00
} ,
"references" : {
"reference_data" : [
{
"name" : "https://confluence.topease.ch/confluence/display/DOC/Release+Notes" ,
"refsource" : "CONFIRM" ,
"url" : "https://confluence.topease.ch/confluence/display/DOC/Release+Notes"
}
]
} ,
"source" : {
"discovery" : "EXTERNAL"
2021-10-08 22:01:03 +00:00
}
}