mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
120 lines
4.2 KiB
JSON
120 lines
4.2 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2020-14878",
|
||
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||
|
"published": "2020-10-21T15:15:25.063",
|
||
|
"lastModified": "2022-01-04T17:54:57.830",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 8.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Security: LDAP Auth). Las versiones compatibles que est\u00e1n afectadas son 8.0.21 y anteriores. Una vulnerabilidad explotable f\u00e1cilmente permite a un atacante con pocos privilegios acceder al segmento de comunicaci\u00f3n f\u00edsica conectado al hardware donde se ejecuta MySQL Server para comprometer a MySQL Server. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en la toma de control de MySQL Server. CVSS 3.1 Puntuaci\u00f3n Base 8.0 (Impactos de la Confidencialidad, Integridad y Disponibilidad). Vector CVSS: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "secalert_us@oracle.com",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
|
"attackVector": "ADJACENT_NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "LOW",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 8.0,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 2.1,
|
||
|
"impactScore": 5.9
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
|
||
|
"accessVector": "ADJACENT_NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "SINGLE",
|
||
|
"confidentialityImpact": "COMPLETE",
|
||
|
"integrityImpact": "COMPLETE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 7.7
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 5.1,
|
||
|
"impactScore": 10.0,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-noinfo"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "8.0.0",
|
||
|
"versionEndIncluding": "8.0.21",
|
||
|
"matchCriteriaId": "7A885799-F19A-41B5-B015-B318ED959755"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://security.gentoo.org/glsa/202105-27",
|
||
|
"source": "secalert_us@oracle.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://security.netapp.com/advisory/ntap-20201023-0003/",
|
||
|
"source": "secalert_us@oracle.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
|
||
|
"source": "secalert_us@oracle.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|