mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
132 lines
4.4 KiB
JSON
132 lines
4.4 KiB
JSON
{
|
|
"id": "CVE-2017-1000086",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2017-10-05T01:29:03.570",
|
|
"lastModified": "2020-08-24T17:37:01.140",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Periodic Backup Plugin did not perform any permission checks, allowing any user with Overall/Read access to change its settings, trigger backups, restore backups, download backups, and also delete all previous backups via log rotation. Additionally, the plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El plugin Period Backup no realiza ning\u00fan chequeo de permisos, lo que permite que cualquier usuario con acceso Overall/Read cambie su configuraci\u00f3n, haga copias de seguridad, recupere o descargue copias de seguridad y tambi\u00e9n borre todas las copias de seguridad anteriores mediante la rotaci\u00f3n de logs. Adem\u00e1s, el plugin no necesita que se env\u00eden peticiones a su API mediante POST, exponi\u00e9ndose, en consecuencia, a ataques de tipo Cross-Site Request Forgery (CSRF)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.0,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.1,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-862"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jenkins:periodic_backup:1.0:*:*:*:*:jenkins:*:*",
|
|
"matchCriteriaId": "E0FAA343-6C7F-4F8B-9258-2580F7FE43E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jenkins:periodic_backup:1.1:*:*:*:*:jenkins:*:*",
|
|
"matchCriteriaId": "D2A325BD-75E3-48AC-980C-A520C586C3BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jenkins:periodic_backup:1.2:*:*:*:*:jenkins:*:*",
|
|
"matchCriteriaId": "D59D73CB-D25A-4DAC-BFCB-638EC21AB171"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jenkins:periodic_backup:1.3:*:*:*:*:jenkins:*:*",
|
|
"matchCriteriaId": "FB8D6B9A-BC01-47AF-8DC8-88BBA93A04DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jenkins:periodic_backup:1.4:*:*:*:*:jenkins:*:*",
|
|
"matchCriteriaId": "53976206-EA0F-4CA6-9781-E50D0DC2BDFE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/100437",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://jenkins.io/security/advisory/2017-07-10/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |