René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

120 lines
3.9 KiB
JSON

{
"id": "CVE-2018-9102",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-04-25T20:29:00.633",
"lastModified": "2018-05-25T12:48:00.973",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the conferencing component of Mitel MiVoice Connect, versions R1707-PREM SP1 (21.84.5535.0) and earlier, and Mitel ST 14.2, versions GA27 (19.49.5200.0) and earlier, could allow an unauthenticated attacker to conduct an SQL injection attack due to insufficient input validation for the signin interface. A successful exploit could allow an attacker to extract sensitive information from the database."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el componente conferencing de Mitel MiVoice Connect, en versiones R1707-PREM SP1 (21.84.5535.0) y anteriores y Mitel ST 14.2, en versiones GA27 (19.49.5200.0) y anteriores, podr\u00eda permitir que un atacante no autenticado lleve a cabo un ataque de inyecci\u00f3n SQL debido a la validaci\u00f3n insuficiente de entradas de la interfaz signin. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante extraiga informaci\u00f3n sensible de la base de datos."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:mivoice_connect:*:*:*:*:*:*:*:*",
"versionEndIncluding": "21.84.5535.0",
"matchCriteriaId": "96195CB8-FB3D-4877-BAAE-C4D3E9FA8ACF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:st_14.2:*:*:*:*:*:*:*:*",
"versionEndIncluding": "19.49.5200.0",
"matchCriteriaId": "11D3C31F-DA38-48D6-ADEC-1E65C08F6157"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/mitel-product-security-advisory-18-0003",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "https://www.mitel.com/sites/default/files/2018-Security-Bulletin-18-0003-001.pdf",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
}
]
}