René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

96 lines
3.7 KiB
JSON

{
"id": "CVE-2022-36115",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-25T23:15:08.257",
"lastModified": "2022-09-02T17:39:23.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for unintended functionality. An attacker can abuse the CreateProcessAutosave() method to inject their own functionality into a development process. If (upon a warning) a user decides to recover unsaved work by using the last saved version, the malicious code could enter the workflow. Should the process action stages not be fully reviewed before publishing, this could result in the malicious code being run in a production environment."
},
{
"lang": "es",
"value": "Se ha detectado un problema en Blue Prism Enterprise versiones 6.0 hasta 7.01. En un entorno configurado inapropiadamente que exponga el servidor de aplicaciones de Blue Prism, es posible que un usuario autenticado realice ingenier\u00eda inversa del software de Blue Prism y omita los controles de acceso para conseguir una funcionalidad no deseada. Un atacante puede abusar del m\u00e9todo CreateProcessAutosave() para inyectar su propia funcionalidad en un proceso de desarrollo. Si (tras una advertencia) un usuario decide recuperar el trabajo no guardado usando la \u00faltima versi\u00f3n guardada, el c\u00f3digo malicioso podr\u00eda entrar en el flujo de trabajo. Si las etapas de acci\u00f3n del proceso no son revisadas completamente antes de su publicaci\u00f3n, esto podr\u00eda resultar en que el c\u00f3digo malicioso sea ejecutado en un entorno de producci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ssctech:blue_prism:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "7.1",
"matchCriteriaId": "1951FC8C-05E1-4483-B627-8D255F87F9C2"
}
]
}
]
}
],
"references": [
{
"url": "https://blueprism.com",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://portal.blueprism.com/security-vulnerabilities-august-2022",
"source": "cve@mitre.org",
"tags": [
"Permissions Required",
"Vendor Advisory"
]
}
]
}