René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

155 lines
4.7 KiB
JSON

{
"id": "CVE-2018-1250",
"sourceIdentifier": "security_alert@emc.com",
"published": "2018-09-28T18:29:00.973",
"lastModified": "2019-10-09T23:38:17.177",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Dell EMC Unity and UnityVSA versions prior to 4.3.1.1525703027 contains an Authorization Bypass vulnerability. A remote authenticated user could potentially exploit this vulnerability to read files in NAS server by directly interacting with certain APIs of Unity OE, bypassing Role-Based Authorization control implemented only in Unisphere GUI."
},
{
"lang": "es",
"value": "Dell EMC Unity y UnityVSA en versiones anteriores a la 4.3.1.1525703027 contiene una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n. Un usuario autenticado remoto podr\u00eda explotar esta vulnerabilidad para leer archivos en el servidor NAS interactuando directamente con ciertas API de Unity OE, omitiendo el control de autorizaci\u00f3n basado en roles implementado solo en la interfaz gr\u00e1fica de usuario de Unisphere."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:emc_unity_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.1.1525703027",
"matchCriteriaId": "CE80D21A-B8AA-4429-9FE7-01522F9595A5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:emc_unity:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08D30CDA-12CB-4071-94EC-6186ED329072"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:emc_unityvsa:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.1.1525703027",
"matchCriteriaId": "FCAA53DD-EEFF-440F-9979-09B8521FDB64"
}
]
}
]
}
],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2018/Sep/30",
"source": "security_alert@emc.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}