René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

137 lines
4.4 KiB
JSON

{
"id": "CVE-2021-25979",
"sourceIdentifier": "vulnerabilitylab@mend.io",
"published": "2021-11-08T15:15:07.743",
"lastModified": "2022-08-10T14:25:05.493",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session."
},
{
"lang": "es",
"value": "Las versiones de Apostrophe CMS anteriores a la 3.3.1 no invalidaban las sesiones de inicio de sesi\u00f3n existentes cuando se deshabilitaba una cuenta de usuario o se cambiaba la contrase\u00f1a, creando una situaci\u00f3n en la que un dispositivo comprometido por un tercero no pod\u00eda ser bloqueado por esos medios. Como mitigaci\u00f3n para las versiones anteriores, la cuenta de usuario en cuesti\u00f3n puede ser archivada (3.x) o movida a la papelera (2.x y anteriores), lo que desactiva la sesi\u00f3n existente"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnerabilitylab@mend.io",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "vulnerabilitylab@mend.io",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apostrophecms:apostrophecms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.63.0",
"versionEndExcluding": "3.3.1",
"matchCriteriaId": "4D9E1B8A-61D7-4910-AB6C-3B9629EDB1C4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c",
"source": "vulnerabilitylab@mend.io",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}