mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
192 lines
6.6 KiB
JSON
192 lines
6.6 KiB
JSON
{
|
|
"id": "CVE-2016-3978",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2016-04-08T14:59:07.913",
|
|
"lastModified": "2016-04-14T14:22:02.307",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting (XSS) attacks via the \"redirect\" parameter to \"login.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La Web User Interface (WebUI) en FortiOS 5.0.x en versiones anteriores a 5.0.13, 5.2.x en versiones anteriores a 5.2.3 y 5.4.x en versiones anteriores a 5.4.0 permite a atacantes remotos redirigir a usuarios a sitios web arbitrarios y llevar a cabo ataques de phishing o ataques de XSS a trav\u00e9s del par\u00e1metro \"redirect\" en \"login\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E542BE2-14FC-4BA8-890C-7DA81F33F032"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D8A5EC4-CE2C-4174-9F09-361B8D153AD9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3BABC91-F9BF-4B52-BDBF-F9617ABCAC9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C172379-F6BA-4343-831A-62004E742C6D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "516597D9-086E-4668-A40B-473F38125F92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D62F480B-D8CA-4F5C-8034-C0AE73F26B67"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F435F408-EC5B-42A0-9E3C-4DE5D702ACAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "823C8357-E638-4EAE-B231-3B60263FFE52"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C6615C7-C6F8-4E42-BA09-5A29A0B68E09"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B24C5917-BBC0-4924-9FB0-49E141DC9D54"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "513A1CAA-9B87-4CF5-9513-396E2E686CDF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "62CD94B3-C430-4672-BBEA-B8A542944F66"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91AA2061-5D28-4DCF-9126-8D5CE57D96F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E627C59-7C16-44F0-800D-A2E8A766B26D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "233236FA-BB13-4261-BE2E-3E617406DC53"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "27844CC9-498B-4A65-91AC-AC130222EE5F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0E953F20-9598-4074-BC65-2FEA3ED2ECF1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2016/Mar/68",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.fortiguard.com/advisory/fortios-open-redirect-vulnerability",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1035332",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |