René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

134 lines
4.6 KiB
JSON

{
"id": "CVE-2018-1268",
"sourceIdentifier": "security_alert@emc.com",
"published": "2018-06-06T20:29:00.503",
"lastModified": "2020-05-04T21:26:42.900",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cloud Foundry Loggregator, versions 89.x prior to 89.5 or 96.x prior to 96.1 or 99.x prior to 99.1 or 101.x prior to 101.9 or 102.x prior to 102.2, does not validate app GUID structure in requests. A remote authenticated malicious user knowing the GUID of an app may construct malicious requests to read from or write to the logs of that app."
},
{
"lang": "es",
"value": "Cloud Foundry Loggregator, en versiones 89.x anteriores a la 89.5, versiones 96.x anteriores a la 96.1, versiones 99.x anteriores a la 99.1, versiones 101.x anteriores a la 101.9 o versiones 102.x anteriores a la 102.2, no valida la estructura GUID de la aplicaci\u00f3n en las peticiones. Un usuario autenticado remoto malicioso que conozca la GUID de una aplicaci\u00f3n podr\u00eda construir peticiones maliciosas para leer o escribir en los logs de dicha aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.9
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "89",
"versionEndExcluding": "89.5",
"matchCriteriaId": "3A0DC6EA-38C5-4401-9696-035B821D538C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "96",
"versionEndExcluding": "96.1",
"matchCriteriaId": "DD35ED5D-74D8-45ED-B0A3-21E2A1A7ABDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "99",
"versionEndExcluding": "99.1",
"matchCriteriaId": "1E20F6DA-281F-42F9-B50E-4ACD4EBAF4A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "101",
"versionEndExcluding": "101.9",
"matchCriteriaId": "F9DECBA2-12CD-4705-914A-2A59B823B096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "102",
"versionEndExcluding": "102.2",
"matchCriteriaId": "17830EE4-E342-453F-9ABC-D0E60BDBEB76"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cloudfoundry.org/blog/cve-2018-1268",
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}