René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
3.7 KiB
JSON

{
"id": "CVE-2022-26310",
"sourceIdentifier": "security@pandorafms.com",
"published": "2022-08-01T13:15:10.390",
"lastModified": "2022-08-05T18:54:53.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Pandora FMS v7.0NG.760 and below allows an improper authorization in User Management where any authenticated user with access to the User Management module could create, modify or delete any user with full admin privilege. The impact could lead to a vertical privilege escalation to access the privileges of a higher-level user or typically an admin user."
},
{
"lang": "es",
"value": "Pandora FMS versi\u00f3n v7.0NG.760 y anteriores, permite una autorizaci\u00f3n inapropiada en la administraci\u00f3n de usuarios donde cualquier usuario autenticado con acceso al m\u00f3dulo de administraci\u00f3n de usuarios podr\u00eda crear, modificar o eliminar cualquier usuario con privilegio de administrador completo. El impacto podr\u00eda conllevar a una escalada vertical de privilegios para acceder a los privilegios de un usuario de nivel superior o t\u00edpicamente un usuario administrador"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@pandorafms.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security@pandorafms.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.0_ng_760",
"matchCriteriaId": "F9ACE0CF-C204-470A-B706-969837339CDC"
}
]
}
]
}
],
"references": [
{
"url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",
"source": "security@pandorafms.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.incibe.es/en/cve-assignment-publication/coordinated-cves",
"source": "security@pandorafms.com",
"tags": [
"Third Party Advisory"
]
}
]
}