René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

131 lines
4.1 KiB
JSON

{
"id": "CVE-2015-9236",
"sourceIdentifier": "support@hackerone.com",
"published": "2018-05-31T20:29:00.360",
"lastModified": "2019-10-09T23:15:57.883",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Hapi versions less than 11.0.0 implement CORS incorrectly and allowed for configurations that at best returned inconsistent headers and at worst allowed cross-origin activities that were expected to be forbidden. If the connection has CORS enabled but one route has it off, and the route is not GET, the OPTIONS prefetch request will return the default CORS headers and then the actual request will go through and return no CORS headers. This defeats the purpose of turning CORS on the route."
},
{
"lang": "es",
"value": "Hapi, en versiones anteriores a la 11.0.0, implementa CORS incorrectamente y permite configuraciones que devuelven cabeceras inconsistentes y, en el peor de los casos, permite actividades Cross-Origin que se espera que est\u00e9n prohibidas. Si la conexi\u00f3n tiene CORS habilitado pero una ruta no la tiene (y, adem\u00e1s, la ruta no es GET), la petici\u00f3n prefetch OPTIONS devolver\u00e1 las cabeceras CORS por defecto y, despu\u00e9s, la petici\u00f3n real pasar\u00e1 y no devolver\u00e1 cabeceras CORS. Esto contradice la finalidad de habilitar CORS en la ruta."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "support@hackerone.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hapijs:hapi:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "11.0.0",
"matchCriteriaId": "1A8F75AB-20F3-46E7-AB01-F771B607E8A0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hapijs/hapi/issues/2840",
"source": "support@hackerone.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/hapijs/hapi/issues/2850",
"source": "support@hackerone.com",
"tags": [
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "https://nodesecurity.io/advisories/45",
"source": "support@hackerone.com",
"tags": [
"Third Party Advisory"
]
}
]
}