mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
134 lines
5.1 KiB
JSON
134 lines
5.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@paloaltonetworks.com",
|
|
"DATE_PUBLIC": "2020-05-13T16:00:00.000Z",
|
|
"ID": "CVE-2020-1997",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "PAN-OS: GlobalProtect registration open redirect"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "PAN-OS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "7.1",
|
|
"version_value": "7.1.26"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "8.0",
|
|
"version_value": "8.0.14"
|
|
},
|
|
{
|
|
"version_affected": "!>=",
|
|
"version_name": "7.1",
|
|
"version_value": "7.1.26"
|
|
},
|
|
{
|
|
"version_affected": "!>=",
|
|
"version_name": "8.0",
|
|
"version_value": "8.0.14"
|
|
},
|
|
{
|
|
"version_affected": "!",
|
|
"version_name": "8.1",
|
|
"version_value": "8.1.*"
|
|
},
|
|
{
|
|
"version_affected": "!",
|
|
"version_name": "9.0",
|
|
"version_value": "9.0.*"
|
|
},
|
|
{
|
|
"version_affected": "!",
|
|
"version_name": "9.1",
|
|
"version_value": "9.1.*"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Palo Alto Networks"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An open redirection vulnerability in the GlobalProtect component of Palo Alto Networks PAN-OS allows an attacker to specify an arbitrary redirection target away from the trusted GlobalProtect gateway. If the user then successfully authenticates it will cause them to access an unexpected and potentially malicious website. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.0 versions earlier than 8.0.14."
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-601 URL Redirection to Untrusted Site ('Open Redirect')"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://security.paloaltonetworks.com/CVE-2020-1997",
|
|
"name": "https://security.paloaltonetworks.com/CVE-2020-1997"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.0.14, and all later PAN-OS versions."
|
|
}
|
|
],
|
|
"source": {
|
|
"defect": [
|
|
"PAN-82052"
|
|
],
|
|
"discovery": "INTERNAL"
|
|
},
|
|
"timeline": [
|
|
{
|
|
"lang": "eng",
|
|
"time": "2020-05-13T16:00:00.000Z",
|
|
"value": "Initial publication"
|
|
}
|
|
]
|
|
} |