cvelist/2021/3xxx/CVE-2021-3698.json

62 lines
2.0 KiB
JSON
Raw Normal View History

2021-08-10 17:00:53 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3698",
2022-03-10 17:25:56 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "cockpit",
"version": {
"version_data": [
{
"version_value": "cockpit versions prior to 260"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-295"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1992149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992149"
}
]
2021-08-10 17:00:53 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-03-10 17:25:56 +00:00
"value": "A flaw was found in Cockpit in versions prior to 260 in the way it handles the certificate verification performed by the System Security Services Daemon (SSSD). This flaw allows client certificates to authenticate successfully, regardless of the Certificate Revocation List (CRL) configuration or the certificate status. The highest threat from this vulnerability is to confidentiality."
2021-08-10 17:00:53 +00:00
}
]
}
}