2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-29578" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2020-12-08T15:15:11.333" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T05:24:14.883" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The official piwik Docker images before fpm-alpine (Alpine specific) contain a blank password for a root user. Systems using the Piwik Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access."
} ,
{
"lang" : "es" ,
"value" : "Las im\u00e1genes oficiales de piwik Docker anteriores a fpm-alpine (espec\u00edficas de Alpine) contienen una contrase\u00f1a en blanco para un usuario root. Los sistemas que usan el contenedor Piwik Docker implementado por las versiones afectadas de la imagen de Docker pueden permitir a un atacante remoto lograr un acceso root"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 10.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:matomo:piwik_fpm-alpine_docker_image:3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4A13A0DF-0897-4D86-8FBA-DE0B0CC63B42"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:matomo:piwik_fpm-alpine_docker_image:3.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "34FD2DDA-6B08-429F-A1DE-CFF7B9174FEC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:matomo:piwik_fpm-alpine_docker_image:3.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3BC64757-1C9F-4627-A7E1-44864359511D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:matomo:piwik_fpm-alpine_docker_image:3.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2DA5ADB-8024-43D4-A042-13E8D25D6EE9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:matomo:piwik_fpm-alpine_docker_image:3.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E245FC58-2E42-40BD-9D70-DF7A96CB5F5A"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://github.com/koharin/koharin2/blob/main/CVE-2020-29578" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "https://github.com/koharin/koharin2/blob/main/CVE-2020-29578" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}