140 lines
5.2 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-22152",
"sourceIdentifier": "sirt@juniper.net",
"published": "2022-01-19T01:15:08.133",
"lastModified": "2022-01-24T21:20:18.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant's firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Fallo del Mecanismo de Protecci\u00f3n en la API REST de Juniper Networks Contrail Service Orchestration permite a un arrendatario del sistema visualizar detalles de configuraci\u00f3n confidenciales de otro arrendatario del mismo sistema. Al usar la API REST, un inquilino puede obtener informaci\u00f3n sobre la configuraci\u00f3n del firewall y las pol\u00edticas de control de acceso de otro inquilino, as\u00ed como otra informaci\u00f3n confidencial, exponiendo al inquilino a una defensa reducida contra ataques maliciosos o a la explotaci\u00f3n por medio de vulnerabilidades adicionales no determinadas. Este problema afecta a versiones de Juniper Networks Contrail Service Orchestration anteriores a 6.1.0 Patch 3"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "sirt@juniper.net",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:juniper:contrail_service_orchestration:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.0.0",
"matchCriteriaId": "1F69DEF1-CFB2-4FDD-9729-965DAA400F9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "9DD57602-86B0-4FAD-837A-1B47835E15CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:patch1:*:*:*:*:*:*",
"matchCriteriaId": "23D03743-51A8-4D38-BFAF-A5348F5F8C81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:patch2:*:*:*:*:*:*",
"matchCriteriaId": "90A465C5-9FFA-4FDE-BD98-B95611F4ED1F"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.juniper.net/JSA11260",
"source": "sirt@juniper.net",
"tags": [
"Vendor Advisory"
]
}
]
}