mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
188 lines
7.1 KiB
JSON
188 lines
7.1 KiB
JSON
{
|
|
"id": "CVE-2006-6641",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-12-20T00:28:00.000",
|
|
"lastModified": "2021-04-07T18:57:23.213",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en CA CleverPath Portal anterior a la versi\u00f3n de mantenimiento 4.71.001_179_060830, usado en m\u00faltiples productos incluyendo BrightStor Portal r11.1, CleverPath Aion BPM r10 hasta r10.2, eTrust Security Command Center r1 y r8, y Unicenter, no act\u00faa adecuadamente cuando m\u00faltiples servidores Portal son iniciados al mismo tiempo y comparten el mismo almac\u00e9n de informaci\u00f3n, lo cual puede provocar que un usuario de Portal herede la sesi\u00f3n y credenciales de un usuario que est\u00e1 en otro servidor Portal."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:arcserve:brightstor:11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6825A6CF-F540-4516-8982-E32B22D477DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:broadcom:cleverpath_portal:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.71",
|
|
"matchCriteriaId": "78D7CC0F-3AAF-40F0-B178-B964AF04BFC7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cleverpath:aion_bpm:r10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1398293A-8C8D-405B-A13B-7202D8A2A12B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cleverpath:aion_bpm:r10.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8DC0166-B40B-4FE9-A5FE-4674C184EE68"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cleverpath:aion_bpm:r10.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01482330-54BA-40E1-908C-884CF2C0B139"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cleverpath:portal:r4.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8D75B44-E386-4BE7-95F6-23804FBFBC87"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cleverpath:portal:r4.51:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD878559-D8DF-4043-9F78-2780F95D103A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cleverpath:portal:r4.71:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5046BE4F-2445-4CB1-93F1-5BFFA7AD5578"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etrust:security_command_center:r1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DDBDB112-8526-4DD5-BE23-45D1E15FDBED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etrust:security_command_center:r8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CEE3CEFA-F003-408D-A066-39C91E958C75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:asset_and_portfolio_management:r11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6DEA53F1-A4D0-4F12-A0FD-3D726072A063"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:database_command_center:r11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "056B5064-4FB7-4196-A975-E6661F0C589C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:database_management_portal:r11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B0FDF01-4D34-4F2E-9A8E-7A1EB95BC83D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:enterprise_job_manager:r1_sp3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6E3CFF24-EA58-4B45-8BA7-B6CF02650CAF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:management_portal:r2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84ABEA0B-9388-4942-AC12-40AE37C87D99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:management_portal:r3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE826A5B-B5D1-46CF-9FA9-81041D9C9187"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:management_portal:r11.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "05619FF7-BB58-434D-8177-16B8D4BC792B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:workload_control_center:r1_sp4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "017280EE-8C88-43FC-BA76-A1EEF4607036"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securitytracker.com/id?1017429",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/21681",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/5091",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |