René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.6 KiB
JSON

{
"id": "CVE-2021-35487",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-25T14:15:08.583",
"lastModified": "2022-06-07T19:40:39.280",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Nokia Broadcast Message Center through 11.1.0 allows an authenticated user to perform a Boolean Blind SQL Injection attack on the endpoint /owui/block/send-receive-updates (for the Manage Alerts page) via the extIdentifier HTTP POST parameter. This allows an attacker to obtain the database user, database name, and database version information, and potentially database data."
},
{
"lang": "es",
"value": "Nokia Broadcast Message Center versiones hasta 11.1.0 permite a un usuario autenticado llevar a cabo un ataque de inyecci\u00f3n SQL ciega booleana en el endpoint /owui/block/send-receive-updates (para la p\u00e1gina Manage Alerts) por medio del par\u00e1metro extIdentifier HTTP POST. Esto permite a un atacante obtener el usuario de la base de datos, el nombre de la base de datos y la informaci\u00f3n de la versi\u00f3n de la base de datos, y potencialmente los datos de la base de datos"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nokia:broadcast_message_center:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.1.0",
"matchCriteriaId": "D1AFF6D1-FFDB-450A-92FE-876907519565"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.nokia.com/notices/responsible-disclosure/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}