René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

116 lines
4.4 KiB
JSON

{
"id": "CVE-2018-20840",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-30T16:29:01.323",
"lastModified": "2019-05-31T16:04:32.797",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An unhandled exception vulnerability exists during Google Sign-In with Google API C++ Client before 2019-04-10. It potentially causes an outage of third-party services that were not designed to recover from exceptions. On the client, ID token handling can cause an unhandled exception because of misinterpretation of an integer as a string, resulting in denial-of-service and then other users can no longer login/sign-in to the affected third-party service. Once this third-party service uses Google Sign-In with google-api-cpp-client, a malicious user can trigger this client/auth/oauth2_authorization.cc vulnerability by requesting the client to receive the ID token from a Google authentication server."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de excepci\u00f3n no controlada durante el Registro (Sign-In) de Google con Google API C++ Client anterior a la 10-04-2019. Es posible que genere una interrupci\u00f3n de los servicios de terceros que no fueron creados para recuperarse de las excepciones. En el cliente, el manejo del token ID puede producir una excepci\u00f3n no controlada debido a una inapropiada interpretaci\u00f3n de un entero como una cadena, lo que conlleva una Denegaci\u00f3n de Servicio y entonces otros usuarios ya no pueden iniciar sesi\u00f3n (login) o registrarse (sign-in) en el servicio de terceros impactado. Una vez que este servicio de terceros utiliza el registro (sign-in) de Google con google-api-cpp-client, un usuario malicioso puede activar la vulnerabilidad de client/auth/oauth2_authorization.cc mediante una petici\u00f3n al cliente que reciba el token de ID desde un servidor de autenticaci\u00f3n de Google."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:api_c\\+\\+_client:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2019-04-10",
"matchCriteriaId": "7FC7B0D8-5460-4105-BE2B-FD5AF56BE847"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/google/google-api-cpp-client/issues/57",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/google/google-api-cpp-client/pull/58",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}