2024-12-08 03:06:42 +00:00

137 lines
4.1 KiB
JSON

{
"id": "CVE-2021-27402",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-13T16:15:07.243",
"lastModified": "2024-11-21T05:57:55.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SAS Admin portal of Mitel MiCollab before 9.2 FP2 could allow an unauthenticated attacker to access (view and modify) user data by injecting arbitrary directory paths due to improper URL validation, aka Directory Traversal."
},
{
"lang": "es",
"value": "El portal SAS Admin de Mitel MiCollab versiones anteriores a 9.2 FP2, podr\u00eda permitir a un atacante no autenticado acceder (visualizar y modificar) los datos de los usuarios inyectando rutas de directorio arbitrarias debido a una comprobaci\u00f3n inapropiada de la URL, tambi\u00e9n se conoce como Salto de Directorio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"baseScore": 6.4,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*",
"versionEndExcluding": "9.2",
"matchCriteriaId": "200AECAB-6B5A-4881-852F-F9ABFB241E3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micollab:9.2:-:*:*:*:-:*:*",
"matchCriteriaId": "7F557ADB-202D-4A6C-869E-38629240CC9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micollab:9.2:fp1:*:*:*:-:*:*",
"matchCriteriaId": "61A8FD1A-8F20-47CE-80E1-5E59B70507A8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0004",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0004",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}