René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

174 lines
6.3 KiB
JSON

{
"id": "CVE-2020-4127",
"sourceIdentifier": "psirt@hcl.com",
"published": "2020-11-30T22:15:11.167",
"lastModified": "2020-12-04T18:14:17.003",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "HCL Domino is susceptible to a Login CSRF vulnerability. With a valid credential, an attacker could trick a user into accessing a system under another ID or use an intranet user's system to access internal systems from the internet. Fixes are available in HCL Domino versions 9.0.1 FP10 IF6, 10.0.1 FP6 and 11.0.1 FP1 and later."
},
{
"lang": "es",
"value": "HCL Domino es susceptible a una vulnerabilidad CSRF de inicio de sesi\u00f3n. Con una credencial v\u00e1lida, un atacante podr\u00eda enga\u00f1ar a un usuario para que acceda a un sistema con otra identificaci\u00f3n o utilice el sistema de un usuario de la intranet para acceder a los sistemas internos desde la Internet. Las correcciones est\u00e1n disponibles en HCL Domino versiones 9.0.1 FP10 IF6, 10.0.1 FP6 y 11.0.1 FP1 y posteriores"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.0.1",
"matchCriteriaId": "EF002666-622E-44FA-A987-7428967ACC6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.1",
"matchCriteriaId": "D0B08786-69E1-42C4-BED1-821D49585827"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.0.1",
"matchCriteriaId": "EE147897-9644-4ACE-B984-6EBB5ECE110F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:9.0.1:-:*:*:*:*:*:*",
"matchCriteriaId": "3B6AF5AE-702A-476F-80D5-1EACC8D4A9D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:9.0.1:feature_pack_10_interim_fix_2:*:*:*:*:*:*",
"matchCriteriaId": "FD1AA146-F06D-45F1-91AF-E7AF00D7EBCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:9.0.1:feature_pack_10_interim_fix_3:*:*:*:*:*:*",
"matchCriteriaId": "52E2DEA6-DCF9-42CE-97F5-7585578F8BB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:9.0.1:feature_pack_10_interim_fix_4:*:*:*:*:*:*",
"matchCriteriaId": "7F35BA12-D165-44EF-9050-68DF0FCA75A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:9.0.1:feature_pack_10_interim_fix_5:*:*:*:*:*:*",
"matchCriteriaId": "037371DC-B952-4956-BD9B-B2931C3879AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:10.0.1:-:*:*:*:*:*:*",
"matchCriteriaId": "48B47289-6DE0-488D-8B74-D0596E38B3EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:10.0.1:fixpack1:*:*:*:*:*:*",
"matchCriteriaId": "C53F4B12-6693-47BE-90DD-7357D6873926"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:10.0.1:fixpack2:*:*:*:*:*:*",
"matchCriteriaId": "EFB8DCB2-2369-4E23-A1E6-E9567924439C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:10.0.1:fixpack3:*:*:*:*:*:*",
"matchCriteriaId": "85AEAD6F-6408-416A-9F20-3B01C940B991"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:10.0.1:fixpack4:*:*:*:*:*:*",
"matchCriteriaId": "C5C0517A-051A-4B3B-A112-8E4382A1B009"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:hcl_domino:10.0.1:fixpack5:*:*:*:*:*:*",
"matchCriteriaId": "B53C9F61-BDC9-40AA-92B0-07FAEB7BBFFA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085409",
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
}
]
}