René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

248 lines
9.9 KiB
JSON

{
"id": "CVE-2021-34762",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2021-10-27T19:15:08.060",
"lastModified": "2021-11-03T19:55:56.680",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The attacker would require valid device credentials. The vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTPS request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the device."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en la web del software Cisco Firepower Management Center (FMC) podr\u00eda permitir a un atacante remoto autenticado llevar a cabo un ataque de salto de directorio en un dispositivo afectado. El atacante necesitar\u00eda credenciales v\u00e1lidas del dispositivo. La vulnerabilidad es debido a una insuficiente comprobaci\u00f3n de entrada de la URL HTTPS por parte de la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n HTTPS dise\u00f1ada que contenga secuencias de caracteres de salto de directorio a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante leer o escribir archivos arbitrarios en el dispositivo"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV30": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-26"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F75D9CB4-406B-4FBF-BC7A-35C2CCEFD8B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C0FC62F-65AD-4855-953A-DA5BBFC1B2E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28629BA3-B1ED-409B-9FB1-E2159D95D975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B11AE299-AE40-42EB-9C0B-3865C932E766"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C001C143-323E-4820-B5FC-4841E85B5EB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CABDCBEE-439D-448C-B836-D216A74C4C7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2F42A059-CCCC-4629-AC03-6E90E7731C48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:6.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA792E5D-7270-4C23-A8D6-22EB00CB21A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB38685-4255-4565-98AA-234B9DEEADE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center_virtual_appliance:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7CF689E1-22FF-467F-B5A7-59833D77971E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4.0.13",
"matchCriteriaId": "5429F29E-BEE8-4989-B5F3-A9BABBF64D31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5.0",
"versionEndExcluding": "6.6.5",
"matchCriteriaId": "18589C74-19D2-44F0-AF26-68910E26655D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.0.3",
"matchCriteriaId": "98DEDDAB-B8C5-4753-A208-94638E694FC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.1",
"matchCriteriaId": "7B2F537A-A488-45B6-AD4B-48B7064AE84C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sourcefire_defense_center:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4A3574-53DC-4328-A229-87795AE4F7AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sourcefire_defense_center:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2EBC6544-6ADF-4F95-A969-A8D953D11B3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sourcefire_defense_center:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "04DF03B7-9C70-4BEE-8AE4-6AA134322C0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sourcefire_defense_center:6.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B02800C-6420-4758-89CF-66F47B4FCA19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sourcefire_defense_center:6.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0B44F266-3C0C-4411-B0B1-B7614DB5BDEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sourcefire_defense_center:6.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B52CA450-676D-404C-AE02-4DDD1A1ED759"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sourcefire_defense_center:6.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "923193EF-083C-4CB7-920E-1B2163783CCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sourcefire_defense_center:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52ED507A-5075-4444-A2D1-F5657453AD3F"
}
]
}
]
}
],
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dir-traversal-95UyW5tk",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}