2024-12-08 03:06:42 +00:00

115 lines
3.9 KiB
JSON

{
"id": "CVE-2021-37933",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-10-14T16:15:09.123",
"lastModified": "2024-11-21T06:16:05.737",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An LDAP injection vulnerability in /account/login in Huntflow Enterprise before 3.10.6 could allow an unauthenticated, remote user to modify the logic of an LDAP query and bypass authentication. The vulnerability is due to insufficient server-side validation of the email parameter before using it to construct LDAP queries. An attacker could bypass authentication exploiting this vulnerability by sending login attempts in which there is a valid password but a wildcard character in email parameter."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n LDAP en /account/login en Huntflow Enterprise versiones anteriores a 3.10.6, podr\u00eda permitir a un usuario remoto no autenticado modificar la l\u00f3gica de una consulta LDAP y omitir la autenticaci\u00f3n. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente en el lado del servidor del par\u00e1metro email antes de usarlo para construir consultas LDAP. Un atacante podr\u00eda omitir la autenticaci\u00f3n explotando esta vulnerabilidad mediante el env\u00edo de intentos de inicio de sesi\u00f3n en los que se presenta una contrase\u00f1a v\u00e1lida pero un car\u00e1cter comod\u00edn en el par\u00e1metro email"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:huntflow:huntflow_enterprise:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.10.6",
"matchCriteriaId": "4BAFA4A0-B791-413F-A603-E7F9E2F59F0E"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/andrey-lomtev/cbf12bc8d8763996cf8d6d1641a0b049",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/andrey-lomtev/cbf12bc8d8763996cf8d6d1641a0b049",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}