mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
183 lines
6.3 KiB
JSON
183 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2020-26516",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2021-06-08T13:15:07.493",
|
|
"lastModified": "2024-11-21T05:19:58.237",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A CSRF issue was discovered in Intland codeBeamer ALM 10.x through 10.1.SP4. Requests sent to the server that trigger actions do not contain a CSRF token and can therefore be entirely predicted allowing attackers to cause the victim's browser to execute undesired actions in the web application through crafted requests."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se ha detectado un problema de tipo CSRF en Intland codeBeamer ALM versiones 10.x hasta 10.1.SP4. Las peticiones enviadas al servidor que desencadenan acciones no contienen un token de tipo CSRF y, por lo tanto, pueden predecirse por completo, lo que permite a atacantes causar que el navegador de la v\u00edctima ejecute acciones no deseadas en la aplicaci\u00f3n web mediante peticiones manipuladas"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 6.8,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-352"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE5B0480-89AF-44AE-A9C1-0656627FA777"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:prerelease4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E3C0AE05-0E16-498D-B38D-4104C764CDAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "83F33C62-2D1B-462D-B3D6-FA0BB3EF4BE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9DC14C6-92A8-4388-9D8F-AD2C3201AD5C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1D61084-CBE7-464D-BA6A-485627BCB2B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.1:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "568A8794-36C0-40BE-9867-7D29D77DBC6A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0128D1A-DA5B-49EE-ABC2-DA75EF2B5594"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35461BDC-7A06-49AE-A528-DB6A986C9F14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B32DF425-549F-4BEC-A7B6-F66CE063C878"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8166F01E-B271-4491-B932-00BF843D2146"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "504110BC-FC0C-4A3F-824C-5BF4C573A792"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:intland:codebeamer:21.04:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3B7C6A7-5FA8-42B8-B83B-0BF908A72E44"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://intland.com/codebeamer/application-lifecycle-management/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2021-08_CSNC-2020-009-codebeamer_ALM_Missing-CSRF.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://intland.com/codebeamer/application-lifecycle-management/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2021-08_CSNC-2020-009-codebeamer_ALM_Missing-CSRF.txt",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |