128 lines
3.9 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-1928",
"sourceIdentifier": "security@apache.org",
"published": "2020-01-28T01:15:12.410",
"lastModified": "2022-01-01T20:03:34.143",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present."
},
{
"lang": "es",
"value": "Se detect\u00f3 una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en Apache NiFi versi\u00f3n 1.10.0. El analizador de par\u00e1metros confidenciales registrar\u00eda los valores analizados para fines de depuraci\u00f3n. Esto expondr\u00eda los valores literales ingresados ??en una propiedad confidencial cuando no estaba ning\u00fan par\u00e1metro presente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:nifi:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E23A23E-7CC0-41C3-ACB7-40B7DFF7808E"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E",
"source": "security@apache.org",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E",
"source": "security@apache.org",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E",
"source": "security@apache.org",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://nifi.apache.org/security.html#CVE-2020-1928",
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
}
]
}