118 lines
3.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2021-35962",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2021-07-16T16:15:11.023",
"lastModified": "2021-08-02T17:33:23.063",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Specific page parameters in Dr. ID Door Access Control and Personnel Attendance Management system does not filter special characters. Remote attackers can apply Path Traversal means to download credential files from the system without permission."
},
{
"lang": "es",
"value": "Unos par\u00e1metros espec\u00edficos de la p\u00e1gina en el sistema Dr. ID Door Access Control and Personnel Attendance Management no filtran los caracteres especiales. Unos atacantes remotos pueden aplicar medios de Salto de Ruta para descargar archivos de credenciales del sistema sin permiso"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:secom:door_access_control:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.3.2",
"matchCriteriaId": "0364F401-A33B-4291-84E9-7F4A47343077"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:secom:personnel_attendance_system:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.4.0.0.3.12_20210525",
"matchCriteriaId": "D70B460F-FDEF-47FC-A9D1-B2B37C376A80"
}
]
}
]
}
],
"references": [
{
"url": "https://www.chtsecurity.com/news/d7ec2db9-12dd-439f-b014-b956ce231054",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-4906-89381-1.html",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}