René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

120 lines
3.9 KiB
JSON

{
"id": "CVE-2017-1000003",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-07-17T13:18:16.000",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ATutor versions 2.2.1 and earlier are vulnerable to an incorrect access control check vulnerability in the Social Application component resulting in privilege escalation. ATutor versions 2.2.1 and earlier are vulnerable to an incorrect access control check vulnerability in the Module component resulting in privilege escalation. ATutor versions 2.2.1 and earlier are vulnerable to a incorrect access control check vulnerability in the Alternative Content component resulting in privilege escalation."
},
{
"lang": "es",
"value": "ATutor en sus versiones 2.2.1 y anteriores es vulnerable a una verificaci\u00f3n de control de acceso incorrecta en el componente Social Application, lo que da como resultado un escalado de privilegios. ATutor en sus versiones 2.2.1 y anteriores es vulnerable a una verificaci\u00f3n de control de acceso incorrecta en el componente Module, lo que da como resultado un escalado de privilegios. ATutor en sus versiones 2.2.1 y anteriores es vulnerable a una verificaci\u00f3n de control de acceso incorrecta en el componente Alternative Content, lo que da como resultado un escalado de privilegios."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atutor:atutor:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.2.1",
"matchCriteriaId": "477E8516-CADE-4D79-85C3-E64736C03CA7"
}
]
}
]
}
],
"references": [
{
"url": "http://www.atutor.ca/atutor/mantis/changelog_page.php?version_id=55",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.atutor.ca/atutor/mantis/view.php?id=5681",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/99599",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}