mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
88 lines
2.8 KiB
JSON
88 lines
2.8 KiB
JSON
{
|
|
"id": "CVE-2015-2814",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2015-04-01T14:59:12.803",
|
|
"lastModified": "2018-12-10T19:29:07.733",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "SAP EMR Unwired (com.sap.mobile.healthcare.emr.v2) and Clinical Task Tracker (com.sap.mobile.healthcare.ctt) does not properly restrict access, which allows remote attackers to change the backendurl, clientid, ssourl, and infopageurl settings via unspecified vectors, aka SAP Security Note 2117079."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "SAP EMR Unwired (com.sap.mobile.healthcare.emr.v2) y Clinical Task Tracker (com.sap.mobile.healthcare.ctt) no restringe correctamente el acceso, lo que permite a atacantes remotos cambiar las configuraciones backendurl, clientid, ssourl, y infopageurl a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como la nota de seguridad de SAP 2117079."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.4
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:clinical_task_tracker:*:*:*:*:*:iphone_os:*:*",
|
|
"matchCriteriaId": "0F6F8FF3-8898-4962-88B4-B2211B27384F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:emr_unwired:*:*:*:*:*:iphone_os:*:*",
|
|
"matchCriteriaId": "DB7C29AB-1650-484B-9DCA-7A2BE1147B76"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/73701",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://erpscan.io/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |