mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
126 lines
4.2 KiB
JSON
126 lines
4.2 KiB
JSON
{
|
|
"id": "CVE-2022-24980",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-02-19T04:15:07.037",
|
|
"lastModified": "2022-03-04T14:19:12.377",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An issue was discovered in the Kitodo.Presentation (aka dif) extension before 2.3.2, 3.x before 3.2.3, and 3.3.x before 3.3.4 for TYPO3. A missing access check in an eID script allows an unauthenticated user to submit arbitrary URLs to this component. This results in SSRF, allowing attackers to view the content of any file or webpage the webserver has access to."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se ha detectado un problema en la extensi\u00f3n Kitodo.Presentation (tambi\u00e9n se conoce como dif) versiones anteriores a 2.3.2, versiones 3.x anteriores a 3.2.3 y versiones 3.3.x anteriores a 3.3.4 para TYPO3. Una comprobaci\u00f3n de acceso faltante en un script de eID permite a un usuario no autenticado enviar URLs arbitrarias a este componente. Esto resulta en un ataque de tipo SSRF, permitiendo a atacantes visualizar el contenido de cualquier archivo o p\u00e1gina web a la que el servidor web tenga acceso"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-918"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kitodo:kitodo.presentation:*:*:*:*:*:typo3:*:*",
|
|
"versionEndExcluding": "2.3.2",
|
|
"matchCriteriaId": "C3B11775-C054-41D1-AF8F-EE1B363B1A99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kitodo:kitodo.presentation:*:*:*:*:*:typo3:*:*",
|
|
"versionStartIncluding": "3.0.0",
|
|
"versionEndExcluding": "3.2.3",
|
|
"matchCriteriaId": "1A58C81D-6936-4C5C-B53A-76DD4A427E26"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kitodo:kitodo.presentation:*:*:*:*:*:typo3:*:*",
|
|
"versionStartIncluding": "3.3.0",
|
|
"versionEndExcluding": "3.3.4",
|
|
"matchCriteriaId": "0D911D0F-543E-4D75-98F6-75201E7B7265"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://typo3.org/help/security-advisories",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://typo3.org/security/advisory/typo3-ext-sa-2022-001",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |