René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

109 lines
4.0 KiB
JSON

{
"id": "CVE-2018-17791",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-21T20:15:11.710",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Newgen OmniFlow Intelligent Business Process Suite (iBPS) 7.0 has an \"improper server side validation\" vulnerability where client-side validations are tampered, and inappropriate information is stored on the server side and fetched from the server every time the user visits the D, creating business confusion. In the worst case, all available resources are consumed while processing the data, resulting in unavailability of the service to legitimate users. This occurs because non-editable parameters can be modified by manually editing a disabled form field within the developer options."
},
{
"lang": "es",
"value": "Newgen OmniFlow Intelligent Business Process Suite (iBPS) 7.0 tiene una vulnerabilidad de \"validaci\u00f3n incorrecta del lado del servidor\" donde las validaciones del lado del cliente se alteran, y la informaci\u00f3n inapropiada se almacena en el lado del servidor y se obtiene del servidor cada vez que el usuario visita la D, creando confusi\u00f3n empresarial. En el peor de los casos, todos los recursos disponibles se consumen mientras se procesan los datos, lo que resulta en la falta de disponibilidad del servicio para usuarios leg\u00edtimos. Esto ocurre porque los par\u00e1metros no editables pueden modificarse editando manualmente un campo de formulario deshabilitado dentro de las opciones del desarrollador."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-669"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:newgensoft:omniflow_intelligent_business_process_suite:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EF03D-85CD-4EC0-841B-21DC0A5E648E"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/154061/OmniDoc-7.0-Input-Validation.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://packetstormsecurity.com/files/cve/CVE-2018-17791",
"source": "cve@mitre.org"
}
]
}