{ "id": "CVE-2020-16943", "sourceIdentifier": "secure@microsoft.com", "published": "2020-10-16T23:15:15.867", "lastModified": "2024-11-21T05:07:28.740", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "
An elevation of privilege vulnerability exists in Microsoft Dynamics 365 Commerce. An unauthenticated attacker who successfully exploited this vulnerability could update data without proper authorization.
\nTo exploit the vulnerability, an attacker would need to send a specially crafted request to an affected server.
\nThe security update addresses the vulnerability by correcting how Microsoft Dynamics 365 Commerce performs authorization checks.
\n" }, { "lang": "es", "value": "Se presenta una vulnerabilidad de escalada de privilegios en Microsoft Dynamics 365 Commerce, tambi\u00e9n se conoce como \"Dynamics 365 Commerce Elevation of Privilege Vulnerability\"" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 }, { "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:dynamics_365:-:*:*:*:commerce:*:*:*", "matchCriteriaId": "A5722DCA-9436-4E17-9F9A-D8608B050540" } ] } ] } ], "references": [ { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16943", "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16943", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] } ] }