2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-39042" ,
"sourceIdentifier" : "twcert@cert.org.tw" ,
"published" : "2023-01-03T03:15:09.877" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:17:26.100" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "aEnrich a+HRD has improper validation for login function. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and access API function to perform arbitrary system command or disrupt service."
2024-09-15 02:03:16 +00:00
} ,
{
"lang" : "es" ,
"value" : "aEnrich a+HRD tiene una validaci\u00f3n incorrecta para la funci\u00f3n de inicio de sesi\u00f3n. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad para evitar la autenticaci\u00f3n y acceder a la funci\u00f3n API para ejecutar comandos arbitrarios del sistema o interrumpir el servicio."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "twcert@cert.org.tw" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
2024-12-08 03:06:42 +00:00
"source" : "twcert@cert.org.tw" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-287"
}
]
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-287"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:aenrich:a\\+hrd:6.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFF0E4AE-57D2-4778-8E19-77F585F85EE2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:aenrich:a\\+hrd:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E60AA81B-7D96-4771-902A-FACF58130D97"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://www.twcert.org.tw/tw/cp-132-6795-f7fe6-1.html" ,
"source" : "twcert@cert.org.tw" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.twcert.org.tw/tw/cp-132-6795-f7fe6-1.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
}
]
}