2024-12-08 03:06:42 +00:00

346 lines
11 KiB
JSON

{
"id": "CVE-2017-4952",
"sourceIdentifier": "security@vmware.com",
"published": "2018-05-02T14:29:00.380",
"lastModified": "2024-11-21T03:26:45.067",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure."
},
{
"lang": "es",
"value": "VMware Xenon en versiones 1.x anteriores a la 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1 y 1.5.4_8, contiene una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n debido a los controles de acceso insuficiente para los endpoints de la utilidad. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda resultar en un escalado de privilegios."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndIncluding": "1.5.3",
"matchCriteriaId": "41FE1566-9CF4-4A2C-8B96-DC477B453732"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.1.0:cr0-3:*:*:*:*:*:*",
"matchCriteriaId": "393C8F1B-3E97-475C-ACE0-AD60A40A3480"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.1.0:cr3_1:*:*:*:*:*:*",
"matchCriteriaId": "908287BA-7E5D-4338-A3D4-39353F90B4EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.3.7:cr1_2:*:*:*:*:*:*",
"matchCriteriaId": "256FB7C5-FAE1-4844-8BD1-63346EF86E59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.4.2:cr4_1:*:*:*:*:*:*",
"matchCriteriaId": "FAA29AB6-196C-4894-AF9B-4AC802346227"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.5.4:cr2:*:*:*:*:*:*",
"matchCriteriaId": "718A5001-9D4B-40F2-A8DD-5B6271252F04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.5.4:cr3:*:*:*:*:*:*",
"matchCriteriaId": "14B90D4B-5381-460E-86EC-4A0245DFD29C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.5.4:cr4:*:*:*:*:*:*",
"matchCriteriaId": "A46B85FE-C297-45F1-BE2D-E2E55BE5552F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.5.4:cr5:*:*:*:*:*:*",
"matchCriteriaId": "14521FD5-177A-4C62-B3AB-6C2396A4609D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.5.4:cr6:*:*:*:*:*:*",
"matchCriteriaId": "178168B2-DF60-45B8-BB94-82151B4A10D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.5.4:cr6_1:*:*:*:*:*:*",
"matchCriteriaId": "0DB5E354-E700-47A8-A2A3-553EEC9BDAA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.5.4:cr6_2:*:*:*:*:*:*",
"matchCriteriaId": "6694BADF-CD2E-4ADD-B867-2DC0146FA901"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.5.4:cr7:*:*:*:*:*:*",
"matchCriteriaId": "AF7B077C-ADC1-4A3A-B1E6-FAB98A5EFB35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.5.4_8:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A47F10-AFF8-41B5-8BE6-9F6C2524D849"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:xenon:1.5.7_7:*:*:*:*:*:*:*",
"matchCriteriaId": "E14AA307-523D-4694-B50E-DB897AEA61E9"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/oss-sec/2018/q1/153",
"source": "security@vmware.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/103093",
"source": "security@vmware.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1",
"source": "security@vmware.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592",
"source": "security@vmware.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/30ae41bccf418d88b52b35a81efb3c1304b798f8",
"source": "security@vmware.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/5682ef8d40569afd00fb9a5933e7706bb5b66713",
"source": "security@vmware.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/756d893573414eec8635c2aba2345c4dcf10b21c",
"source": "security@vmware.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/7a747d82b80cd38d2c11a0d9cdedb71c722a2c75",
"source": "security@vmware.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/b1fd306047ecdac82661d636ebee801a7f2b3a0a",
"source": "security@vmware.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/c23964eb57e846126daef98ef7ed15400313e977",
"source": "security@vmware.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/ec30db9afada9cb52852082ce4d7d0095524f3b3",
"source": "security@vmware.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/oss-sec/2018/q1/153",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/103093",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/30ae41bccf418d88b52b35a81efb3c1304b798f8",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/5682ef8d40569afd00fb9a5933e7706bb5b66713",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/756d893573414eec8635c2aba2345c4dcf10b21c",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/7a747d82b80cd38d2c11a0d9cdedb71c722a2c75",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/b1fd306047ecdac82661d636ebee801a7f2b3a0a",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/c23964eb57e846126daef98ef7ed15400313e977",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vmware/xenon/commit/ec30db9afada9cb52852082ce4d7d0095524f3b3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}