mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-31 10:41:19 +00:00
159 lines
6.9 KiB
JSON
159 lines
6.9 KiB
JSON
{
|
|
"id": "CVE-2021-43271",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-06-03T20:15:07.927",
|
|
"lastModified": "2022-06-15T13:46:11.307",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Riverbed AppResponse 11.8.0, 11.8.5, 11.8.5a, 11.9.0, 11.9.0a, 11.10.0, 11.11.0, 11.11.0a, 11.11.1, 11.11.1a, 11.11.5, and 11.11.5a (when configured to use local, RADIUS, or TACACS authentication) logs usernames and passwords if either is entered incorrectly. If a user enters an incorrect username and/or password when logging into the WebUI, these attempted credentials are included in an error message that is logged in the WebUI log file. A log entry does not appear if the username and password provided correctly match a valid set of credentials. This also does not happen if AppResponse is configured to use SAML authentication. The WebUI log file is included in subsequent diagnostic system dumps that are generated. (Only users with Full Control access to the System Configuration permission can generate system dumps. By default, only System Administrators have Full Control access to the System Configuration permission.)"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Riverbed AppResponse versiones 11.8.0, 11.8.5, 11.8.5a, 11.9.0, 11.9.0a, 11.10.0, 11.11.0, 11.11.0a, 11.11.1, 11.11.1a, 11.11.5 y 11.11.5a (cuando est\u00e1n configurados para usar autenticaci\u00f3n local, RADIUS o TACACS) registra los nombres de usuario y las contrase\u00f1as si son introducidos incorrectamente. Si un usuario introduce un nombre de usuario y/o una contrase\u00f1a incorrectos cuando es conectado a la WebUI, estas credenciales intentadas son incluidas en un mensaje de error que es registrado en el archivo de registro de la WebUI. No aparece una entrada en el registro si el nombre de usuario y la contrase\u00f1a proporcionados coinciden correctamente con un conjunto v\u00e1lido de credenciales. Esto tampoco ocurre si AppResponse est\u00e1 configurado para usar autenticaci\u00f3n SAML. El archivo de registro de WebUI es incluido en posteriores volcados de diagn\u00f3stico del sistema que son generados. (S\u00f3lo los usuarios con acceso de Control Total al permiso de Configuraci\u00f3n del Sistema pueden generar volcados del sistema. Por defecto, s\u00f3lo los administradores del sistema presentan acceso de control total al permiso de configuraci\u00f3n del sistema)"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.8,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 0.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.1
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-532"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB80D9D8-8B80-4DD3-AAB2-C9DC3EE5E9CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.8.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F548E09-F16F-4B71-957A-E6B3F2A7833E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.8.5a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "696D3993-A775-44D8-B8EC-96DF77519033"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9112037-727C-40DF-8233-BDC92F0EC50C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.9.0a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0169E02-990C-4013-8306-84F78E41EF94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.10.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78DFCF3C-4704-41AD-AAE6-6902BBEBFAFA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.11.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "42EF849B-E3EC-467B-BAD6-DBCE3BF40A91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.11.0a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F54E3343-317E-4538-90EF-78E98A9979D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B13A15D-8AA1-42A3-B7E6-51E705BC2B44"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.11.1a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B1E083F-9DBE-48A3-A4FE-2062D53D2AFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.11.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5894DB2D-C675-4C06-BF55-256C0D63036B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:riverbed:appresponse:11.11.5a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "180FA3E1-AF81-48E3-AE02-43C0F57412F2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://supportkb.riverbed.com/support/index?page=content&id=S35806",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |