René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

118 lines
3.7 KiB
JSON

{
"id": "CVE-2020-10211",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-04-17T13:15:12.283",
"lastModified": "2020-04-23T13:47:45.917",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A remote code execution vulnerability in UCB component of Mitel MiVoice Connect before 19.1 SP1 could allow an unauthenticated remote attacker to execute arbitrary scripts due to insufficient validation of URL parameters. A successful exploit could allow an attacker to gain access to sensitive information."
},
{
"lang": "es",
"value": "Una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota en el componente UCB de Mitel MiVoice Connect versiones anteriores a 19.1, SP1, podr\u00eda permitir a un atacante no autenticado remoto ejecutar scripts arbitrarios debido a una comprobaci\u00f3n no suficiente de los par\u00e1metros de la URL. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante acceder a informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:mivoice_connect:*:*:*:*:*:*:*:*",
"versionEndIncluding": "19.1",
"matchCriteriaId": "40AD35AC-A860-4870-9B4B-851E00A5C6D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:mivoice_connect_client:*:*:*:*:*:*:*:*",
"versionEndIncluding": "214.100.1213.0",
"matchCriteriaId": "06D39D86-749D-499F-B29B-14BD85B0FFFE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0004",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}