101 lines
3.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-47020",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T16:15:46.377",
"lastModified": "2024-11-21T08:29:37.683",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple Cross-Site Request Forgery (CSRF) chaining in NCR Terminal Handler v.1.5.1 allows privileges to be escalated by an attacker through a crafted request involving user account creation and adding the user to an administrator group. This is exploited by an undisclosed function in the WSDL that lacks security controls and can accept custom content types."
},
{
"lang": "es",
"value": "El encadenamiento de Multiple Cross-Site Request Forgery (CSRF) en NCR Terminal Handler v.1.5.1 permite que un atacante aumente los privilegios a trav\u00e9s de una solicitud manipulada que implica la creaci\u00f3n de una cuenta de usuario y la adici\u00f3n del usuario a un grupo de administradores. Esto es aprovechado por una funci\u00f3n no revelada en el WSDL que carece de controles de seguridad y puede aceptar tipos de contenido personalizados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncratleos:terminal_handler:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CBF0BA-23C2-4A14-9D14-2CF59375C880"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Patrick0x41/Security-Advisories/tree/main/CVE-2023-47020",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://youtu.be/pGB3LKdf64w",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/Patrick0x41/Security-Advisories/tree/main/CVE-2023-47020",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://youtu.be/pGB3LKdf64w",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}