René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

260 lines
7.6 KiB
JSON

{
"id": "CVE-2020-22002",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-04-29T15:15:10.537",
"lastModified": "2021-05-05T17:56:20.190",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An Unauthenticated Server-Side Request Forgery (SSRF) vulnerability exists in Inim Electronics Smartliving SmartLAN/G/SI <=6.x within the GetImage functionality. The application parses user supplied data in the GET parameter 'host' to construct an image request to the service through onvif.cgi. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de Server-Side Request Forgery (SSRF) no autenticado en Inim Electronics Smartliving SmartLAN /G/SI versiones anteriores a incluy\u00e9ndola 6.x dentro de la funcionalidad GetImage.&#xa0;La aplicaci\u00f3n analiza los datos proporcionados por el usuario en el par\u00e1metro GET \"host\" para construir una petici\u00f3n de imagen al servicio por medio del archivo onvif.cgi.&#xa0;Dado que no se lleva a cabo ninguna comprobaci\u00f3n en el par\u00e1metro, un atacante puede especificar un dominio externo y obligar a la aplicaci\u00f3n a realizar una petici\u00f3n HTTP a un host de destino arbitrario"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:inim:smartliving_505_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D350C754-F555-46A0-BB06-383C3C201E30"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:inim:smartliving_505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30FE3762-2144-4DF6-89C1-2181E15ACCF4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:inim:smartliving_515_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F96A2F0-E829-416E-9D19-C2820F16A954"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:inim:smartliving_515:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBA5461-77FB-46E5-BFDC-F470A9A97492"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:inim:smartliving_1050_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "467D8264-AD90-4AFE-BB6E-D1D62279E481"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:inim:smartliving_1050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BB1029D-DC9C-444A-BCE3-AF1BE074A068"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:inim:smartliving_1050g3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BB20EF9-386F-4C5E-A4F7-B6E03E71E809"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:inim:smartliving_1050g3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BF688BA-60F1-4F19-8CFA-6C1EFB4D4128"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:inim:smartliving_10100l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12BD7C5C-3A1F-4900-B516-F72FD46F5B18"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:inim:smartliving_10100l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5537E090-43C2-42B1-A793-23E765A82D6E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:inim:smartliving_10100lg3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57A3F264-9B28-4B14-AC5A-A7DA010CA991"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:inim:smartliving_10100lg3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "108A7416-7196-49E8-9181-CE27C9F1ED11"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172839",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5545.php",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}