mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
189 lines
6.9 KiB
JSON
189 lines
6.9 KiB
JSON
{
|
|
"id": "CVE-2020-29576",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2020-12-08T16:15:12.010",
|
|
"lastModified": "2020-12-22T14:30:33.073",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The official eggdrop Docker images before 1.8.4rc2 contain a blank password for a root user. Systems using the Eggdrop Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Las im\u00e1genes oficiales de Docker eggdrop versiones anteriores a 1.8.4rc2, contienen una contrase\u00f1a en blanco para un usuario root. Los sistemas que utilizan el contenedor de Docker Eggdrop implementado por las versiones afectadas de la imagen de Docker pueden permitir a un atacante remoto conseguir acceso root con una contrase\u00f1a en blanco"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1DD2D14-8F6A-4FA8-97D2-7841C07B0156"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.6.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F90B9F15-A11E-45FA-8FB6-B7409D320E94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D13F027A-FBE4-4D3F-A9F2-72486ACCF120"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "19C88044-064F-4432-A8BF-6C39FEE77892"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "21C8A0A0-80E2-4024-A749-11CCDC6FAAA9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1BF19C86-3C35-4B0B-B714-1A90170DA586"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.0:rc4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1538F8EA-D12E-4F8A-8D09-B0C036126D94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "14F7BA15-EA62-441B-8524-E8D812D5DC84"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.1:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D2CF7FCE-84B5-4342-A7AB-2084DEC8CD85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "749E4F45-02E3-4D8A-9060-3802FD41FFBD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.2:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36F868B7-4201-4A2B-A8DE-7EA40CD193B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.2:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D75DC55-517F-4D24-AC2C-BA71AED5974A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6544B57-47AA-4C23-A498-9DE0548BB232"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.3:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E14FC0B-F1A2-405A-8A7F-0EFD3A4D31E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD0ECBF2-8481-4154-B714-72ED3BAEB6E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.4:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5190BA8E-BBE3-4DE1-884B-959096DD3314"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.4:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "23AD2EC4-F7FD-41AB-A966-27A3B9ECA199"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eggheads:eggdrop_docker_image:1.8.4:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3030B27D-7741-4E9B-B153-C8277C19E2A7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/koharin/koharin2/blob/main/CVE-2020-29576",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |