mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
105 lines
4.2 KiB
JSON
105 lines
4.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "sirt@juniper.net",
|
|
"DATE_PUBLIC": "2017-10-11T09:00",
|
|
"ID": "CVE-2017-10617",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Contrail: XML External Entity (XXE) vulnerability"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Contrail",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"platform": "",
|
|
"version_value": "2.2 prior to 2.21.4"
|
|
},
|
|
{
|
|
"platform": "",
|
|
"version_value": "3.0 prior to 3.0.3.4"
|
|
},
|
|
{
|
|
"platform": "",
|
|
"version_value": "3.1 prior to 3.1.4.0"
|
|
},
|
|
{
|
|
"platform": "",
|
|
"version_value": "3.2 prior to 3.2.5.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Juniper Networks"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"configuration": [],
|
|
"credit": [
|
|
"Guillaume TEISSIER / Orange for responsibly reporting this vulnerability."
|
|
],
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The ifmap service that comes bundled with Contrail has an XML External Entity (XXE) vulnerability that may allow an attacker to retrieve sensitive system files. Affected releases are Juniper Networks Contrail 2.2 prior to 2.21.4; 3.0 prior to 3.0.3.4; 3.1 prior to 3.1.4.0; 3.2 prior to 3.2.5.0. CVE-2017-10616 and CVE-2017-10617 can be chained together and have a combined CVSSv3 score of 5.8 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)."
|
|
}
|
|
]
|
|
},
|
|
"exploit": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
|
"version": "3.0"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "XML External Entity (XXE) vulnerability "
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://kb.juniper.net/JSA10819",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://kb.juniper.net/JSA10819"
|
|
}
|
|
]
|
|
},
|
|
"solution": "The following software releases have been updated to resolve these specific issues: Contrail 2.21.4, 3.0.3.4, 3.1.4.0, 3.2.5.0 and all subsequent releases.\n",
|
|
"work_around": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "There are no viable workarounds.\nIt is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access only from trusted, administrative networks or hosts.\n"
|
|
}
|
|
]
|
|
} |