René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
3.5 KiB
JSON

{
"id": "CVE-2020-27199",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-17T05:15:10.407",
"lastModified": "2020-12-22T17:22:15.853",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Magic Home Pro application 1.5.1 for Android allows Authentication Bypass. The security control that the application currently has in place is a simple Username and Password authentication function. Using enumeration, an attacker is able to forge a User specific token without the need for correct password to gain access to the mobile application as that victim user."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n Magic Home Pro versi\u00f3n 1.5.1 para Android, permite una Omisi\u00f3n de Autenticaci\u00f3n. El control de seguridad que la aplicaci\u00f3n presenta actualmente en el lugar una simple autenticaci\u00f3n de nombre de usuario y contrase\u00f1a. Usando una enumeraci\u00f3n, un atacante puede ser capaz de falsificar un token espec\u00edfico de User sin la necesidad de una contrase\u00f1a correcta para conseguir acceso a la aplicaci\u00f3n m\u00f3vil como usuario v\u00edctima"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magic_home_pro_project:magic_home_pro:1.5.1:*:*:*:*:android:*:*",
"matchCriteriaId": "9E654107-9BF5-440B-A7B6-465B440562A8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/magic-home-pro-mobile-application-authentication-bypass-cve-2020-27199/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}