René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

102 lines
3.4 KiB
JSON

{
"id": "CVE-2022-1881",
"sourceIdentifier": "security@octopus.com",
"published": "2022-07-15T08:15:07.130",
"lastModified": "2022-07-27T18:21:16.887",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In affected versions of Octopus Server an Insecure Direct Object Reference vulnerability exists where it is possible for a user to download Project Exports from a Project they do not have permissions to access. This vulnerability only impacts projects within the same Space."
},
{
"lang": "es",
"value": "En las versiones afectadas de Octopus Server se presenta una vulnerabilidad de Referencia Directa de Objetos Insegura donde es posible que un usuario descargue Exportaciones de Proyectos desde un Proyecto al que no presenta permisos para acceder. Esta vulnerabilidad s\u00f3lo afecta a proyectos dentro del mismo espacio"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021.1.6959",
"versionEndExcluding": "2021.3.13021",
"matchCriteriaId": "3CB7AF7F-0376-45A0-A583-6875D741D5ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022.1.2121",
"versionEndExcluding": "2022.1.2894",
"matchCriteriaId": "6D60FEF9-B28B-451B-860D-8C360CBC51F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022.2.6729",
"versionEndExcluding": "2022.2.6971",
"matchCriteriaId": "61CF70DB-340C-480F-A848-38A61DBF87B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022.3.348",
"versionEndExcluding": "2022.3.2616",
"matchCriteriaId": "7D8CAF0C-9FB7-45E9-8ECA-5EBAAD34079D"
}
]
}
]
}
],
"references": [
{
"url": "https://advisories.octopus.com/post/2022/sa2022-06/",
"source": "security@octopus.com",
"tags": [
"Vendor Advisory"
]
}
]
}