René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

151 lines
5.2 KiB
JSON

{
"id": "CVE-2018-10232",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-07-11T17:29:00.257",
"lastModified": "2020-07-20T20:20:55.657",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in TOPdesk before 8.05.017 (June 2018 version) and before 5.7.SR9 allows remote attackers to hijack the authentication of authenticated users for requests that can obtain sensitive information via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en TOPdesk en versiones anteriores a la 8.05.017 (versi\u00f3n de junio de 2018) y versiones anteriores a la 5.7.SR9 permite que atacantes remotos secuestren la autenticaci\u00f3n de usuarios autenticados para las peticiones que pueden obtener informaci\u00f3n sensible mediante vectores sin especificar."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdesk:topdesk:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.05.001",
"versionEndExcluding": "8.05.017",
"matchCriteriaId": "A2059545-53A1-42E0-A60F-DB188C77A01D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdesk:topdesk:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "56CB5F6B-9B25-47DA-82D1-44CEBAF7F8CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdesk:topdesk:5.7:service_release1:*:*:*:*:*:*",
"matchCriteriaId": "ABA02FCA-FEA0-4B7D-9D1C-248C6CCD6BE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdesk:topdesk:5.7:service_release2:*:*:*:*:*:*",
"matchCriteriaId": "3F815228-4F86-42C1-86BB-E26B1B2D11D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdesk:topdesk:5.7:service_release3:*:*:*:*:*:*",
"matchCriteriaId": "8775D1B0-B213-45EE-BD24-97E55CCF7805"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdesk:topdesk:5.7:service_release4:*:*:*:*:*:*",
"matchCriteriaId": "F1333AAE-4C77-414D-A124-DCDF8C770CED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdesk:topdesk:5.7:service_release5:*:*:*:*:*:*",
"matchCriteriaId": "E476D386-26AB-4092-9094-A2DBB59022F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdesk:topdesk:5.7:service_release6:*:*:*:*:*:*",
"matchCriteriaId": "223F7759-F511-4425-A9F3-AF5114AF83C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdesk:topdesk:5.7:service_release7:*:*:*:*:*:*",
"matchCriteriaId": "884A19F5-28AE-4F1E-90E5-0D68592FBBD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdesk:topdesk:5.7:service_release8:*:*:*:*:*:*",
"matchCriteriaId": "B46DE353-C151-4F42-971D-885AE15379E3"
}
]
}
]
}
],
"references": [
{
"url": "https://page.topdesk.com/cve-2018-10231-and-cve-2018-10232?hs_preview=slNSCcfI-5931819551",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}