"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-09-02 13:00:59 +00:00
parent 53cd593b92
commit 7e4fbb5b62
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
4 changed files with 13 additions and 22 deletions

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.ultimum.nl/updates/",
"refsource": "MISC",
"name": "https://www.ultimum.nl/updates/"
},
{
"refsource": "MISC",
"name": "https://websec.nl/blog/",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.ultimum.nl/updates/",
"refsource": "MISC",
"name": "https://www.ultimum.nl/updates/"
},
{
"refsource": "MISC",
"name": "https://websec.nl/blog/",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "psirt@solarwinds.com",
"DATE_PUBLIC": "2021-08-20T14:12:00.000Z",
"ID": "CVE-2021-32076",
"STATE": "PUBLIC",
@ -13,18 +13,19 @@
"product": {
"product_data": [
{
"product_name": "n/a",
"product_name": "Web Help Desk",
"version": {
"version_data": [
{
"version_value": "n/a"
"version_affected": "<=",
"version_value": "12.7.5"
}
]
}
}
]
},
"vendor_name": "n/a"
"vendor_name": "SolarWinds"
}
]
}
@ -42,7 +43,7 @@
"description_data": [
{
"lang": "eng",
"value": "Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the \u201cWeb Help Desk Getting Started Wizard\u201d, especially the admin account creationpage, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback."
"value": "Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the \u2018Web Help Desk Getting Started Wizard\u2019, especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback."
}
]
},
@ -71,7 +72,7 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "CWE-290 Authentication Bypass by Spoofing"
}
]
}

View File

@ -70,15 +70,15 @@
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa"
},
{
"name": "https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237",
"refsource": "MISC",
"url": "https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237"
},
{
"name": "https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa"
}
]
},
@ -86,4 +86,4 @@
"advisory": "23d38099-71cd-42ed-a77a-71e68094adfa",
"discovery": "EXTERNAL"
}
}
}