mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
183 lines
6.4 KiB
JSON
183 lines
6.4 KiB
JSON
{
|
|
"id": "CVE-2014-2034",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2014-04-01T03:25:11.347",
|
|
"lastModified": "2014-04-01T12:55:00.310",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in Sonatype Nexus OSS and Pro 2.4.0 through 2.7.1 allows attackers to create arbitrary user accounts via unknown vectors related to \"an unauthenticated execution path.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en Sonatype Nexus OSS y Pro 2.4.0 hasta 2.7.1 permite a atacantes crear cuentas de usuarios arbitrarios a trav\u00e9s de vectores desconocidos relacionados con una ruta de ejecuci\u00f3n no autenticada."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.4.0:*:*:*:open_source:*:*:*",
|
|
"matchCriteriaId": "43AB890E-0BFD-4446-99BF-2BD9CC55C173"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.4.0:*:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "DD3FD4FC-12AD-4286-843D-D2F3BCC9A441"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.5.0:*:*:*:open_source:*:*:*",
|
|
"matchCriteriaId": "8E084D92-BB5B-4872-AF70-7F8681C93B6E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.5.0:*:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "EF20924E-743B-4376-A35A-9ACB6E8B4080"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.0:*:*:*:open_source:*:*:*",
|
|
"matchCriteriaId": "BBD83307-04AE-47E3-949B-E951ECAB9EA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.0:*:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "FC3862B9-18B3-4C94-B34A-40F08E151334"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.1:*:*:*:open_source:*:*:*",
|
|
"matchCriteriaId": "CF46E050-3F9D-4F9F-AF74-6C924DB6804E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.1:*:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "949F08F2-66EE-4DDC-9483-2EE7DB2952D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.2:*:*:*:open_source:*:*:*",
|
|
"matchCriteriaId": "A47D7B7F-A919-4BC2-ACD3-CF2D035CC36E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.2:*:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "4D0C69E3-EBB3-4214-A901-1E29771B373C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.3:*:*:*:open_source:*:*:*",
|
|
"matchCriteriaId": "53753B80-50F0-45A9-ACA9-3F5D86C93DEE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.3:*:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "A232DDC9-14A3-4A88-BFCA-4053AB7A3B98"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.4:*:*:*:open_source:*:*:*",
|
|
"matchCriteriaId": "5ADB7A5C-F8AC-429A-8186-534D93D6424D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.4:*:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "5F5E0C4C-D34C-42EF-9EB4-2826E8BCC248"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.6.5:*:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "6D94878B-E92C-4DD1-8C57-40472C0BD62A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.7.0:*:*:*:open_source:*:*:*",
|
|
"matchCriteriaId": "2008F19D-A078-4339-BAF4-B131415A41AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.7.0:*:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "EB3A0F5B-A158-42C9-B14B-84EB92535F78"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.7.1:*:*:*:open_source:*:*:*",
|
|
"matchCriteriaId": "393A5265-673A-4000-846F-F02AE11A65AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sonatype:nexus:2.7.1:*:*:*:professional:*:*:*",
|
|
"matchCriteriaId": "C231775B-12AE-40C6-A8DB-E3118DF37117"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/65956",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.sonatype.org/advisories/archive/2014-03-03-Nexus",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.sonatype.com/entries/42374566-CVE-2014-2034-Nexus-Security-Advisory-REST-API",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |