From 7d5278ec759fc4527c06329964dfbc9ea4ce952c Mon Sep 17 00:00:00 2001 From: santosomar Date: Thu, 8 Apr 2021 03:53:32 +0000 Subject: [PATCH] Adding Cisco CVE-2021-1399 --- 2021/1xxx/CVE-2021-1399.json | 82 +++++++++++++++++++++++++++++++++--- 1 file changed, 75 insertions(+), 7 deletions(-) diff --git a/2021/1xxx/CVE-2021-1399.json b/2021/1xxx/CVE-2021-1399.json index bd56b47e6c8..b2677397c56 100644 --- a/2021/1xxx/CVE-2021-1399.json +++ b/2021/1xxx/CVE-2021-1399.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-04-07T16:00:00", "ID": "CVE-2021-1399", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco Unified Communications Manager Self Care Portal Authorization Bypass Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Unified Communications Manager ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "\r A vulnerability in the Self Care Portal of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to modify data on an affected system without proper authorization.\r The vulnerability is due to insufficient validation of user-supplied data to the Self Care Portal. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to modify information without proper authorization.\r " } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-302" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20210407 Cisco Unified Communications Manager Self Care Portal Authorization Bypass Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-selfcare-VRWWWHgE" + } + ] + }, + "source": { + "advisory": "cisco-sa-cucm-selfcare-VRWWWHgE", + "defect": [ + [ + "CSCvw88205" + ] + ], + "discovery": "INTERNAL" } -} \ No newline at end of file +}