René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

171 lines
6.2 KiB
JSON

{
"id": "CVE-2021-32697",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-06-21T19:15:08.073",
"lastModified": "2021-06-29T14:53:56.007",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "neos/forms is an open source framework to build web forms. By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. Form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. Alternatively a custom Finisher can be added as first finisher. This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567"
},
{
"lang": "es",
"value": "neos/forms es un framework de c\u00f3digo abierto para construir formularios web. Al dise\u00f1ar una petici\u00f3n especial \"GET\" que contenga un estado de formulario v\u00e1lido, un formulario puede ser enviado sin invocar ning\u00fan validador. El estado del formulario est\u00e1 asegurado con un HMAC que sigue siendo comprobado. Esto significa que este problema s\u00f3lo puede ser explotado si los Form Finishers causan efectos secundarios incluso si no se han enviado valores de formulario. Los finalizadores de formularios pueden ajustarse de manera que s\u00f3lo ejecuten una acci\u00f3n si el formulario enviado contiene algunos datos esperados. Alternativamente se puede a\u00f1adir un finalizador personalizado como primer finalizador. Esta regresi\u00f3n se introdujo con https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:neos:form:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.0",
"versionEndExcluding": "4.3.3",
"matchCriteriaId": "B2F4EB15-C82B-4C52-89D3-8230FE945E74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:neos:form:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.9",
"matchCriteriaId": "11B52CB3-C5EC-4D14-B7EF-D19137425459"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:neos:form:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1.0",
"versionEndExcluding": "5.1.3",
"matchCriteriaId": "73FD3D5A-F8E8-4241-BB47-785226A371D8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1",
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/neos/form/releases/tag/5.1.3",
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}