René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

106 lines
3.9 KiB
JSON

{
"id": "CVE-2020-15526",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-07-09T17:15:12.310",
"lastModified": "2021-07-21T11:39:23.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In Redgate SQL Monitor 7.1.4 through 10.1.6 (inclusive), the scope for disabling some TLS security certificate checks can extend beyond that defined by various options on the Configuration > Notifications pages to disable certificate checking for alert notifications. These TLS security checks are also ignored during monitoring of VMware machines. This would make SQL Monitor vulnerable to potential man-in-the-middle attacks when sending alert notification emails, posting to Slack or posting to webhooks. The vulnerability is fixed in version 10.1.7."
},
{
"lang": "es",
"value": "En Redgate SQL Monitor versiones 7.1.4 hasta 10.1.6 (incluso), el alcance para deshabilitar algunas comprobaciones de certificados de seguridad TLS puede extenderse m\u00e1s all\u00e1 de lo definido por varias opciones en las p\u00e1ginas Configuration ) Notifications para deshabilitar la comprobaci\u00f3n de certificado para notificaciones de alerta. Estas comprobaciones de seguridad TLS son tambi\u00e9n ignoradas durante la supervisi\u00f3n de m\u00e1quinas VMware. Esto har\u00eda que SQL Monitor sea vulnerable a potenciales ataques de tipo man-in-the-middle al enviar correos electr\u00f3nicos de notificaci\u00f3n de alertas, publicar en Slack o publicar en webhooks. La vulnerabilidad es corregida en la versi\u00f3n 10.1.7"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:red-gate:sql_monitor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.1.4",
"versionEndIncluding": "10.1.6",
"matchCriteriaId": "458CFF25-BE35-439B-B1AE-350F7BE6229D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.red-gate.com/privacy-and-security/vulnerabilities/2020-07-08-sql-monitor",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}