mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
251 lines
12 KiB
JSON
251 lines
12 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-20417",
|
|
"ASSIGNER": "psirt@cisco.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple vulnerabilities in the REST API of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct blind SQL injection attacks.\r\n\r\nThese vulnerabilities are due to insufficient validation of user-supplied input in REST API calls. An attacker could exploit these vulnerabilities by sending crafted input to an affected device. A successful exploit could allow the attacker to view or modify data on the affected device."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
|
|
"cweId": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Cisco",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Cisco Identity Services Engine Software",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0 p1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0 p2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.0.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.0.0 p1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0 p3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.0.0 p2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0 p4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.0.0 p3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0 p5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.0.0 p4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0 p6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.1.0 p1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.0.0 p5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0 p7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.1.0 p3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.1.0 p2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.0.0 p6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.1.0 p4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0 p8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.1.0 p5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.0 p1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0 p9"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.0.0 p7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.1.0 p6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.0 p2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.1.0 p7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.0 p3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.0.0 p8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7.0 p10"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.0 p4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.1.0 p8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.0 p5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.0 p6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.1.0 p9"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3 Patch 2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3 Patch 1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rest-5bPKrNtZ",
|
|
"refsource": "MISC",
|
|
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rest-5bPKrNtZ"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "cisco-sa-ise-rest-5bPKrNtZ",
|
|
"discovery": "EXTERNAL",
|
|
"defects": [
|
|
"CSCwj94294"
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE"
|
|
}
|
|
]
|
|
}
|
|
} |