mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
72 lines
2.4 KiB
JSON
72 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2023-35794",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.cassianetworks.com/products/iot-access-controller/",
|
|
"refsource": "MISC",
|
|
"name": "https://www.cassianetworks.com/products/iot-access-controller/"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking",
|
|
"url": "https://github.com/Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://blog.kscsc.online/cves/202335794/md.html",
|
|
"url": "https://blog.kscsc.online/cves/202335794/md.html"
|
|
}
|
|
]
|
|
}
|
|
} |