2024-07-14 02:06:08 +00:00

97 lines
3.0 KiB
JSON

{
"id": "CVE-2023-23595",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-15T07:15:08.017",
"lastModified": "2023-01-24T16:35:54.763",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BlueCat Device Registration Portal 2.2 allows XXE attacks that exfiltrate single-line files. A single-line file might contain credentials, such as \"machine example.com login daniel password qwerty\" in the documentation example for the .netrc file format. NOTE: 2.x versions are no longer supported. There is no available information about whether any later version is affected."
},
{
"lang": "es",
"value": "BlueCat Device Registration Portal 2.2 permite ataques XXE que filtran archivos de una sola l\u00ednea. Un archivo de una sola l\u00ednea puede contener credenciales, como \"machine example.com login daniel password qwerty\" en el ejemplo de documentaci\u00f3n para el formato de archivo .netrc. NOTA: Las versiones 2.x ya no son compatibles. No hay informaci\u00f3n disponible sobre si alguna versi\u00f3n posterior se ve afectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bluecatnetworks:device_registration_portal:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF20D9B-FE3D-441B-8C5F-1A479F10399D"
}
]
}
]
}
],
"references": [
{
"url": "https://bluecatnetworks.com/integrations/adaptive-application/device-registration-portal-drp/",
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
]
},
{
"url": "https://everything.curl.dev/usingcurl/netrc",
"source": "cve@mitre.org",
"tags": [
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://github.com/colemanjp/XXE-Vulnerability-in-Bluecat-Device-Registration-Portal-DRP",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}