René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
3.4 KiB
JSON

{
"id": "CVE-2021-22113",
"sourceIdentifier": "security@vmware.com",
"published": "2021-02-23T17:15:13.833",
"lastModified": "2021-03-02T15:44:14.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Applications using the \u201cSensitive Headers\u201d functionality in Spring Cloud Netflix Zuul 2.2.6.RELEASE and below may be vulnerable to bypassing the \u201cSensitive Headers\u201d restriction when executing requests with specially constructed URLs. Applications that use Spring Security's StrictHttpFirewall (enabled by default for all URLs) are not affected by the vulnerability, as they reject requests that allow bypassing."
},
{
"lang": "es",
"value": "Unas aplicaciones que usan la funcionalidad de \"Sensitive Headers\" en Spring Cloud Netflix Zuul versiones 2.2.6.RELEASE y anteriores, pueden ser vulnerables al omitir la restricci\u00f3n \"Sensitive Headers\" cuando se ejecutan peticiones con URL especialmente construidas. Unas aplicaciones que usan StrictHttpFirewall de Spring Security (habilitado por defecto para todas las URL) no est\u00e1n afectadas por la vulnerabilidad, ya que rechazan unas peticiones que permiten la omisi\u00f3n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:spring_cloud_netflix_zuul:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.2.6",
"matchCriteriaId": "F2CDA0AD-BEFC-446E-A2E1-918A75AA47E2"
}
]
}
]
}
],
"references": [
{
"url": "https://tanzu.vmware.com/security/cve-2021-22113",
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
}
]
}