90 lines
2.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-32170",
"sourceIdentifier": "vulnerabilitylab@mend.io",
"published": "2022-09-28T10:15:09.740",
"lastModified": "2022-10-03T18:41:24.003",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The \u201cBytebase\u201d application does not restrict low privilege user to access admin \u201cprojects\u201c for which an unauthorized user can view the \u201cprojects\u201c created by \u201cAdmin\u201d and the affected endpoint is \u201c/api/project?user=${userId}\u201d."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n \"Bytebase\" no restringe a usuarios poco privilegiados el acceso a \"projects\" del administrador, por lo que un usuario no autorizado puede visualizar \"projects\" creados por \"Admin\" y el endpoint afectado es \"/api/project?user=${userId}\""
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnerabilitylab@mend.io",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "vulnerabilitylab@mend.io",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bytebase:bytebase:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.1.0",
"versionEndIncluding": "1.0.4",
"matchCriteriaId": "58D2B448-3301-48A8-8796-C8FDA52268A6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/bytebase/bytebase/blob/1.0.4/frontend/src/store/modules/project.ts#L166-#L197",
"source": "vulnerabilitylab@mend.io",
"tags": [
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "https://www.mend.io/vulnerability-database/CVE-2022-32170",
"source": "vulnerabilitylab@mend.io",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}