CVE-2022-0550 & CVE-2022-0551

This commit is contained in:
Natalino Picone 2022-03-24 15:12:22 +01:00
parent b075d42431
commit de3940ecad
No known key found for this signature in database
GPG Key ID: 832E0A4E5D10525E
2 changed files with 210 additions and 14 deletions

View File

@ -1,18 +1,116 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "prodsec@nozominetworks.com",
"ID": "CVE-2022-0550",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Guardian",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "22.0.0"
}
]
}
},
{
"product_name": "CMC",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "22.0.0"
}
]
}
}
]
},
"vendor_name": "Nozomi Networks"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "SECURA B.V. found this bug during a scheduled VAPT testing session."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Improper Input Validation vulnerability in custom report logo upload in Nozomi Networks Guardian, and CMC allows an authenticated attacker with admin or report manager roles to execute unattended commands on the appliance using web server user privileges. \n\nThis issue affects:\nNozomi Networks Guardian versions prior to 22.0.0.\nNozomi Networks CMC versions prior to 22.0.0."
}
]
}
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security.nozominetworks.com/NN-2022:2-01",
"refsource": "CONFIRM",
"url": "https://security.nozominetworks.com/NN-2022:2-01"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Upgrade to v22.0.0."
}
],
"source": {
"advisory": "https://security.nozominetworks.com/NN-2022:2-01",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "eng",
"value": "Use internal firewall features to limit management interface access and review users allowed to manage reports."
}
]
}

View File

@ -1,18 +1,116 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "prodsec@nozominetworks.com",
"ID": "CVE-2022-0551",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Guardian",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "22.0.0"
}
]
}
},
{
"product_name": "CMC",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "22.0.0"
}
]
}
}
]
},
"vendor_name": "Nozomi Networks"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "SECURA B.V. found this bug during a scheduled VAPT testing session."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Improper Input Validation vulnerability in project file upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or import manager roles to execute unattended commands on the appliance using web server user privileges. \n\nThis issue affects:\nNozomi Networks Guardian versions prior to 22.0.0.\nNozomi Networks CMC versions prior to 22.0.0."
}
]
}
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security.nozominetworks.com/NN-2022:2-02",
"refsource": "CONFIRM",
"url": "https://security.nozominetworks.com/NN-2022:2-02"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Upgrade to v22.0.0."
}
],
"source": {
"advisory": "https://security.nozominetworks.com/NN-2022:2-02",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "eng",
"value": "Use internal firewall features to limit management interface access and review users allowed to import project data files.\n"
}
]
}