{ "id": "CVE-2020-7035", "sourceIdentifier": "securityalerts@avaya.com", "published": "2021-04-23T21:15:08.057", "lastModified": "2024-11-21T05:36:31.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XML External Entities (XXE)vulnerability in the web-based user interface of Avaya Aura Orchestration Designer could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system. The affected versions of Orchestration Designer includes all 7.x versions before 7.2.3." }, { "lang": "es", "value": "Una vulnerabilidad de XML External Entities (XXE) en la interfaz de usuario basada en web de Avaya Aura Orchestration Designer, podr\u00eda permitir a un atacante remoto autenticado conseguir acceso de lectura a informaci\u00f3n almacenada en un sistema afectado. Las versiones afectadas de Orchestration Designer incluyen todas las versiones 7.x anteriores a 7.2.3" } ], "metrics": { "cvssMetricV31": [ { "source": "securityalerts@avaya.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.2 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "securityalerts@avaya.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-611" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-611" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:avaya:aura_orchestration_designer:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.0", "versionEndIncluding": "7.2.2", "matchCriteriaId": "C84A5ADB-7668-4CA1-8C6F-BADB47A7593A" } ] } ] } ], "references": [ { "url": "https://downloads.avaya.com/css/P8/documents/101075450", "source": "securityalerts@avaya.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://downloads.avaya.com/css/P8/documents/101075450", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }