René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

143 lines
4.0 KiB
JSON

{
"id": "CVE-2021-3825",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2021-10-01T15:15:07.883",
"lastModified": "2021-10-08T12:16:53.787",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials."
},
{
"lang": "es",
"value": "En la versi\u00f3n 2.1.15 y por debajo del m\u00f3dulo Lider del software LiderAhenk son filtradas sus configuraciones por medio de una API no segura. Un atacante con acceso a la API de configuraciones podr\u00eda conseguir credenciales LDAP v\u00e1lidas"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
},
{
"source": "cve@usom.gov.tr",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pardus:liderahenk:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1.15",
"matchCriteriaId": "86A4CE56-CF14-4247-B7B6-26582A6E5BC8"
}
]
}
]
}
],
"references": [
{
"url": "https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/",
"source": "cve@usom.gov.tr",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.usom.gov.tr/bildirim/tr-21-0795",
"source": "cve@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
}
]
}