{ "id": "CVE-2017-5592", "sourceIdentifier": "cve@mitre.org", "published": "2017-02-09T20:59:00.293", "lastModified": "2020-01-23T18:29:56.687", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An incorrect implementation of \"XEP-0280: Message Carbons\" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for profanity (0.4.7 - 0.5.0)." }, { "lang": "es", "value": "Una implementaci\u00f3n incorrecta de \"XEP-0280: Message Carbons\" en m\u00faltiples clientes XMPP permite a un atacante remoto personificar cualquier usuario, incluidos los contactos, en la pantalla de la aplicaci\u00f3n vulnerable. Esto permite varios tipos de ataques de ingenier\u00eda social. Esta CVE es para profanity (0.4.7 - 0.5.0)." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-346" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:profanity_project:profanity:0.4.7:-:*:*:*:*:*:*", "matchCriteriaId": "F4C9F9D7-C8EC-44E4-A55B-06A4AD0F03F0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:profanity_project:profanity:0.4.7:cyg1:*:*:*:*:*:*", "matchCriteriaId": "B3D0DE23-B7EE-4644-A9E8-7A97385132A1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:profanity_project:profanity:0.4.7:cyg2:*:*:*:*:*:*", "matchCriteriaId": "7610BDB4-D5C8-4333-BD4B-6ADF4EC7B421" }, { "vulnerable": true, "criteria": "cpe:2.3:a:profanity_project:profanity:0.4.7:cyg3:*:*:*:*:*:*", "matchCriteriaId": "4F7A6765-DBEC-4984-B702-B798D72A665C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:profanity_project:profanity:0.4.7:patch1:*:*:*:*:*:*", "matchCriteriaId": "0945DFD2-C235-4E44-BD50-1C1F9D1C15D8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:profanity_project:profanity:0.5.0:-:*:*:*:*:*:*", "matchCriteriaId": "6639BA25-1467-462A-82DD-9E62103CC42E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:profanity_project:profanity:0.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CF8A3688-A998-4619-B1BC-828DD5871A28" } ] } ] } ], "references": [ { "url": "http://openwall.com/lists/oss-security/2017/02/09/29", "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.securityfocus.com/bid/96173", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://github.com/boothj5/profanity/commit/8e75437a7e43d4c55e861691f74892e666e29b0b", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "https://rt-solutions.de/en/2017/02/CVE-2017-5589_xmpp_carbons/", "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ] }, { "url": "https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf", "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ] } ] }