cvelist/2020/1xxx/CVE-2020-1977.json
2020-02-19 19:01:15 +00:00

119 lines
4.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "psirt@paloaltonetworks.com",
"DATE_PUBLIC": "2020-02-12T17:00:00.000Z",
"ID": "CVE-2020-1977",
"STATE": "PUBLIC",
"TITLE": "Expedition Migration Tool: Insufficient Cross Site Request Forgery protection."
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Expedition",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "1.1",
"version_value": "1.1.51"
},
{
"version_affected": "!>=",
"version_name": "1.1",
"version_value": "1.1.52"
}
]
}
}
]
},
"vendor_name": "Palo Alto Networks"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Palo Alto Networks thanks Jimi Sebree of Tenable Research for discovering and responsibly reporting this issue."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient Cross-Site Request Forgery (XSRF) protection on Expedition Migration Tool allows remote unauthenticated attackers to hijack the authentication of administrators and to perform actions on the Expedition Migration Tool. This issue affects Expedition Migration Tool 1.1.51 and earlier versions."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://security.paloaltonetworks.com/CVE-2020-1977",
"name": "https://security.paloaltonetworks.com/CVE-2020-1977"
},
{
"refsource": "MISC",
"name": "https://www.tenable.com/security/research/tra-2020-11",
"url": "https://www.tenable.com/security/research/tra-2020-11"
}
]
},
"solution": [
{
"lang": "eng",
"value": "This issue is fixed in Expedition Migration Tool 1.1.52 and later versions."
}
],
"source": {
"defect": [
"MT-1593"
],
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "eng",
"value": "To prevent the chance of malicious websites making forged requests to Expedition Migration Tool, you should access the tool exclusively from a web browser and log out after each use."
}
]
}