René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

100 lines
3.4 KiB
JSON

{
"id": "CVE-2022-34771",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2022-08-22T15:15:16.140",
"lastModified": "2023-03-28T18:11:19.517",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Tabit - arbitrary SMS send on Tabits behalf. The resend OTP API of tabit allows an adversary to send messages on tabits behalf to anyone registered on the system - the API receives the parameters: phone number, and CustomMessage, We can use that API to craft malicious messages to any user of the system. In addition, the API probably has some kind of template injection potential. When entering {{OTP}} in the custom message field it is formatted into an OTP."
},
{
"lang": "es",
"value": "Tabit - env\u00edo arbitrario de SMS en nombre de Tabits. La API de reenv\u00edo de OTP de tabit permite a un adversario enviar mensajes en nombre de tabit a cualquier persona registrada en el sistema - la API recibe los par\u00e1metros: n\u00famero de tel\u00e9fono, y CustomMessage, Podemos usar esa API para dise\u00f1ar mensajes maliciosos a cualquier usuario del sistema. Adem\u00e1s, la API probablemente presenta alg\u00fan tipo de potencial de inyecci\u00f3n de plantillas. Cuando es introducido {{OTP}} en el campo de mensaje personalizado es formateado en una OTP."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tabit:tabit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.27.0",
"matchCriteriaId": "1D2DB843-28A9-4524-B84D-F714BF3DB9F6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/departments/faq/cve_advisories",
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}