René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

106 lines
3.2 KiB
JSON

{
"id": "CVE-2020-23776",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-26T22:15:11.950",
"lastModified": "2021-02-03T14:49:06.597",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A SSRF vulnerability exists in Winmail 6.5 in app.php in the key parameter when HTTPS is on. An attacker can use this vulnerability to cause the server to send a request to a specific URL. An attacker can modify the request header 'HOST' value to cause the server to send the request."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de tipo SSRF en Winmail versi\u00f3n 6.5, en el archivo app.php en el par\u00e1metro key cuando HTTPS est\u00e1 activado. Un atacante puede usar esta vulnerabilidad para causar que el servidor env\u00ede una petici\u00f3n hacia una URL espec\u00edfica. Un atacante puede modificar el valor \"HOST\" del encabezado de la petici\u00f3n para causar que el servidor env\u00ede la petici\u00f3n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:winmail_project:winmail:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AAEB4B7E-9C6C-4319-9A6D-A6E60594E96A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zhonghaozhao/winmail/issues/3",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}