René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

118 lines
4.3 KiB
JSON

{
"id": "CVE-2020-26877",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-29T14:15:07.960",
"lastModified": "2022-07-08T16:21:19.510",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ApiFest OAuth 2.0 Server 0.3.1 does not validate the redirect URI in accordance with RFC 6749 and is susceptible to an open redirector attack. Specifically, it directly sends an authorization code to the redirect URI submitted with the authorization request, without checking whether the redirect URI is registered by the client who initiated the request. This allows an attacker to craft a request with a manipulated redirect URI (redirect_uri parameter), which is under the attacker's control, and consequently obtain the leaked authorization code when the server redirects the client to the manipulated redirect URI with an authorization code. NOTE: this is similar to CVE-2019-3778."
},
{
"lang": "es",
"value": "ApiFest OAuth versiones 2.0 Server 0.3.1, no comprueba el URI de redireccionamiento de acuerdo con el RFC 6749 y es susceptible de un ataque de redireccionamiento abierto. En concreto, env\u00eda directamente un c\u00f3digo de autorizaci\u00f3n al URI de redireccionamiento enviado con la petici\u00f3n de autorizaci\u00f3n, sin comprobar si el URI de redireccionamiento est\u00e1 registrado por el cliente que inici\u00f3 la petici\u00f3n. Esto permite a un atacante dise\u00f1ar una petici\u00f3n con un URI de redireccionamiento manipulado (par\u00e1metro redirect_uri), que est\u00e1 bajo el control del atacante, y en consecuencia obtener el c\u00f3digo de autorizaci\u00f3n filtrado cuando el servidor redirige al cliente al URI de redireccionamiento manipulado con un c\u00f3digo de autorizaci\u00f3n. NOTA: esto es similar a CVE-2019-3778"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apifest:oauth_2.0_server:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D2DA47-EA90-4A68-BE74-29E50FDD726F"
}
]
}
]
}
],
"references": [
{
"url": "http://www.apifest.org/index.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/apifest/apifest-oauth20",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.ietf.org/html/rfc6749#section-3.1.2.3",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}