René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

107 lines
3.7 KiB
JSON

{
"id": "CVE-2015-2863",
"sourceIdentifier": "cret@cert.org",
"published": "2015-07-20T23:59:01.940",
"lastModified": "2019-02-05T19:26:26.427",
"vulnStatus": "Analyzed",
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/601.html\" rel=\"nofollow\">CWE-601: URL Redirection to Untrusted Site ('Open Redirect')</a>",
"descriptions": [
{
"lang": "en",
"value": "Open redirect vulnerability in Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de Open Redirect en Kaseya Virtual System Administrator (VSA) en sus versiones 7.x anteriores a 7.0.0.29, 8.x anteriores a 8.0.0.18, 9.0 anteriores a 9.0.0.14 y 9.1 anteriores a 9.1.0.4 permite a atacantes remotos la redirecci\u00f3n arbitraria de usuarios a sitios web con el fin de realizar ataques de phishing a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.0.0.29",
"matchCriteriaId": "4AA1470C-1E15-43BB-9447-41627FB2B8EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0",
"versionEndExcluding": "8.0.0.18",
"matchCriteriaId": "277D34F2-773B-4EBA-8411-02817A262D8F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.14",
"matchCriteriaId": "60B11D10-7294-4791-8501-0EF6E76CDD12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1",
"versionEndExcluding": "9.1.0.4",
"matchCriteriaId": "EE4A4D5F-CC10-44F7-BA0A-2D3E6A9F35D7"
}
]
}
]
}
],
"references": [
{
"url": "http://www.kb.cert.org/vuls/id/919604",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}