René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

154 lines
7.2 KiB
JSON

{
"id": "CVE-2021-41187",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-11-01T22:15:07.970",
"lastModified": "2021-11-02T19:59:59.007",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL injection security vulnerability has been found in specific versions of DHIS2. This vulnerability affects the API endpoints for /api/trackedEntityInstances and api/events in DHIS2. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. However, we strongly recommend that all DHIS2 implementations using versions 2.32, 2.33, 2.34, 2.35 and 2.36 install these patches as soon as possible. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the /api/trackedEntityInstance and /api/events endpoints as a temporary workaround while waiting to upgrade."
},
{
"lang": "es",
"value": "DHIS 2 es un sistema de informaci\u00f3n para la captura, administraci\u00f3n, comprobaci\u00f3n, an\u00e1lisis y visualizaci\u00f3n de datos. Se ha encontrado una vulnerabilidad de seguridad de inyecci\u00f3n SQL en versiones espec\u00edficas de DHIS2. Esta vulnerabilidad afecta a los endpoints de la API para /api/trackedEntityInstances y api/events en DHIS2. El sistema es vulnerable a ataques s\u00f3lo de usuarios que han iniciado sesi\u00f3n en DHIS2, y no se presenta forma conocida de explotar la vulnerabilidad sin haber iniciado sesi\u00f3n como usuario de DHIS2. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad podr\u00eda permitir al usuario malicioso leer, editar y borrar datos en la instancia de DHIS2. No se conocen explotaciones de las vulnerabilidades de seguridad abordadas por estos parches. Sin embargo, recomendamos encarecidamente que todas las implementaciones de DHIS2 que usen las versiones 2.32, 2.33, 2.34, 2.35 y 2.36 instalen estos parches lo antes posible. No se presenta una soluci\u00f3n directa conocida para las instancias de DHIS2 que usan la funcionalidad de Tracker, aparte de actualizar el servidor DHIS2 afectado a uno de los parches en los que ha sido corregida esta vulnerabilidad. Para las implementaciones que NO usan la funcionalidad Tracker, puede ser posible bloquear todo el acceso de red a POST a los endpoints /api/trackedEntityInstance y /api/events como una soluci\u00f3n temporal mientras se espera la actualizaci\u00f3n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.32.0",
"versionEndIncluding": "2.32.7",
"matchCriteriaId": "6C69E468-A816-400F-8C40-69E776489B03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.33.0",
"versionEndIncluding": "2.33.9",
"matchCriteriaId": "F1742533-D56B-4B5A-AA9F-A0F32FE93B44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.34.0",
"versionEndIncluding": "2.34.6",
"matchCriteriaId": "70BAC428-459D-4336-A317-E204B77B6A86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.35.0",
"versionEndIncluding": "2.35.7",
"matchCriteriaId": "85B76519-01AA-4568-8CA6-14787775C048"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.36.0",
"versionEndIncluding": "2.36.3",
"matchCriteriaId": "2FB9F269-A576-47C4-9A64-7B5F58E191B8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dhis2/dhis2-core/security/advisories/GHSA-fvm5-gp3j-c7c6",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}