90 lines
2.4 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-37772",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-23T02:15:09.817",
"lastModified": "2022-11-27T04:30:39.037",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Maarch RM 2.8.3 solution contains an improper restriction of excessive authentication attempts due to excessive verbose responses from the application. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to compromised accounts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:maarch:maarch_rm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.8",
"versionEndExcluding": "2.8.6",
"matchCriteriaId": "6ACE6E8F-5A5F-4B93-B0C9-3EBEAFC10EED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:maarch:maarch_rm:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C30EE5-5C2B-4501-92F9-7DA89B362B1D"
}
]
}
]
}
],
"references": [
{
"url": "http://maarch.com",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/frame84/vulns/blob/main/MaarchRM/CVE-2022-37772/README.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}