mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
179 lines
5.9 KiB
JSON
179 lines
5.9 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2020-25848",
|
||
|
"sourceIdentifier": "twcert@cert.org.tw",
|
||
|
"published": "2020-12-31T08:15:13.410",
|
||
|
"lastModified": "2021-07-21T11:39:23.747",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "HGiga MailSherlock contains weak authentication flaw that attackers grant privilege remotely with default password generation mechanism."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "HGiga MailSherlock contiene un fallo de autenticaci\u00f3n d\u00e9bil que hace que atacantes otorguen privilegios remotamente con un mecanismo de generaci\u00f3n de contrase\u00f1a predeterminado."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 9.8,
|
||
|
"baseSeverity": "CRITICAL"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 5.9
|
||
|
},
|
||
|
{
|
||
|
"source": "twcert@cert.org.tw",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 9.8,
|
||
|
"baseSeverity": "CRITICAL"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 5.9
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "COMPLETE",
|
||
|
"integrityImpact": "COMPLETE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 10.0
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 10.0,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-287"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hgiga:msr45_isherlock-antispam:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.5-130",
|
||
|
"matchCriteriaId": "D021936B-7017-4334-B287-1FF8B36A3856"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hgiga:msr45_isherlock-audit:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.5-143",
|
||
|
"matchCriteriaId": "9422FF8B-F11E-43F1-924F-ED255FEA5D5D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hgiga:msr45_isherlock-base:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.5-243",
|
||
|
"matchCriteriaId": "0318B74D-4EB8-4BF3-8A2C-2C228DFA8D78"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hgiga:msr45_isherlock-user:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.5-114",
|
||
|
"matchCriteriaId": "546B94BC-0169-470A-B7E4-583B75D353CA"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hgiga:msr45_isherlock-useradmin:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.5-122",
|
||
|
"matchCriteriaId": "A3149F56-8D50-4DBE-A399-8953FAEC801A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hgiga:ssr45_isherlock-antispam:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.5-130",
|
||
|
"matchCriteriaId": "ADD956BC-95E7-4153-8422-24EC09B98B3F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hgiga:ssr45_isherlock-audit:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.5-143",
|
||
|
"matchCriteriaId": "D408B4EA-99EC-4DCF-868A-D543A9B99690"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hgiga:ssr45_isherlock-base:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.5-243",
|
||
|
"matchCriteriaId": "9AB6EBE0-2D29-400A-B531-1BA980A0A4E0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hgiga:ssr45_isherlock-user:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.5-114",
|
||
|
"matchCriteriaId": "52B8273D-6475-47CF-AF48-B9121C8D1B64"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:hgiga:ssr45_isherlock-useradmin:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.5-112",
|
||
|
"matchCriteriaId": "7954F87A-9249-4111-B720-9789EEE86D00"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.twcert.org.tw/tw/cp-132-4256-cfc5a-1.html",
|
||
|
"source": "twcert@cert.org.tw",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|