René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.7 KiB
JSON

{
"id": "CVE-2021-40375",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-06T02:15:08.390",
"lastModified": "2022-04-13T15:02:12.513",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Apperta Foundation OpenEyes 3.5.1 allows remote attackers to view the sensitive information of patients without having the intended level of privilege. Despite OpenEyes returning a Forbidden error message, the contents of a patient's profile are still returned in the server response. This response can be read in an intercepting proxy or by viewing the page source. Sensitive information returned in responses includes patient PII and medication records or history."
},
{
"lang": "es",
"value": "Apperta Foundation OpenEyes versi\u00f3n 3.5.1, permite a atacantes remotos visualizar la informaci\u00f3n confidencial de los pacientes sin tener el nivel de privilegio previsto. A pesar de que OpenEyes devuelve un mensaje de error Prohibido, el contenido del perfil de un paciente sigue siendo devuelto en la respuesta del servidor. Esta respuesta puede ser le\u00edda en un proxy de intercepci\u00f3n o viendo la fuente de la p\u00e1gina. La informaci\u00f3n confidencial que es devuelta en las respuestas incluye la PII del paciente y los registros o el historial de medicaci\u00f3n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apperta:openeyes:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "239D1BBC-1E7D-4B22-ACD8-399893ADD347"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DCKento/CVE-2021-40375",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://openeyes.apperta.org/",
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
]
}
]
}