mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
222 lines
8.2 KiB
JSON
222 lines
8.2 KiB
JSON
{
|
|
"id": "CVE-2021-44525",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2021-12-20T16:15:11.327",
|
|
"lastModified": "2024-11-21T06:31:09.590",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Zoho ManageEngine PAM360 before build 5303 allows attackers to modify a few aspects of application state because of a filter bypass in which authentication is not required."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Zoho ManageEngine PAM360 versiones anteriores a la compilaci\u00f3n 5303, permite a atacantes modificar algunos aspectos del estado de la aplicaci\u00f3n debido a una omisi\u00f3n de filtro en la autenticaci\u00f3n no es requerida"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 7.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-287"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB937707-FD53-491F-A9F6-BD4C53561921"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4001:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3EE9114D-B6D8-430F-855C-CF1D3AB3157D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4002:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BA3B9724-2C69-49CD-9916-F43B22CB194E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D434061A-4282-49CE-AC4C-01C3784E1BE9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4100:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0384D4E-26C7-447B-84D3-9E38E7FC7F66"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4101:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8CDCC599-19C7-4AA7-84BB-2120EDC9FCBA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C4AD81D8-8F30-48CC-A859-15EC143BACE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4500:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1545BCA4-88C9-4D0D-82E5-DB3D9F21601F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4501:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02A19736-57EC-454C-8838-E0A9752DD468"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "77A7FA46-518F-4519-81FE-00FDE3C257F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5000:*:*:*:*:*:*",
|
|
"matchCriteriaId": "22E8183E-8ACC-40C6-8EF3-253E4A2E63FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5001:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C4532F06-14BF-4EC5-9A7E-AD934FE69ABF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5002:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D951BC8D-AF9A-4F2A-A801-3A5EDAB1A5E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5003:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3AE0A2E4-71A2-447F-9496-D1B9D1D748A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5004:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BADE0425-A94E-4621-BF9D-F3A1219C4D57"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "67B092E1-F298-4ED1-BEC3-7F9ABC6D10B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.1:build5100:*:*:*:*:*:*",
|
|
"matchCriteriaId": "331DB356-27EA-4DF8-8A29-C9C8E75E4EDA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B1202736-A94B-4046-ABC9-BBC89CCD1F09"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.2:build5200:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C655F9A-C769-413E-9211-E89BADE1A509"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "328C12F2-B818-46E5-A273-C043B54D200D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5300:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11523C00-D2EE-4E2D-AFF9-546C77A29CE5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5301:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F72FB8EA-A643-4295-92F3-4F64C31820D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5302:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A20B1E4-F212-4771-8774-DA8085B35829"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://pitstop.manageengine.com/portal/en/community/topic/title-security-advisory-for-cve-2021-44525-authentication-bypass-vulnerability-in-manageengine-pam360",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://pitstop.manageengine.com/portal/en/community/topic/title-security-advisory-for-cve-2021-44525-authentication-bypass-vulnerability-in-manageengine-pam360",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |