René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

125 lines
4.1 KiB
JSON

{
"id": "CVE-2019-6972",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-06-19T15:15:11.093",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on TP-Link TL-WR1043ND V2 devices. The credentials can be easily decoded and cracked by brute-force, WordList, or Rainbow Table attacks. Specifically, credentials in the \"Authorization\" cookie are encoded with URL encoding and base64, leading to easy decoding. Also, the username is cleartext, and the password is hashed with the MD5 algorithm (after decoding of the URL encoded string with base64)."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en los dispositivos TP-Link TL-WR1043ND V2. Las credenciales se pueden descodificar y descifrar f\u00e1cilmente mediante ataques de fuerza bruta, WordList o Rainbow Table. Espec\u00edficamente, las credenciales en la cookie de \"Autorizaci\u00f3n\" est\u00e1n codificadas con codificaci\u00f3n de URL y base64, lo que lleva a una f\u00e1cil descodificaci\u00f3n. Adem\u00e1s, el nombre de usuario es texto claro y la contrase\u00f1a se revisa con el algoritmo MD5 (despu\u00e9s de descodificar la cadena codificada en URL con base64)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:tl-wr1043nd_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBD68B5-8E02-4101-AE6E-463D39FC451F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:tl-wr1043nd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F7282DA-0974-4E83-9906-0BDC5956896D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://twitter.com/MalFuzzer/status/1141269335685652480?s=19",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}