mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
134 lines
4.8 KiB
JSON
134 lines
4.8 KiB
JSON
{
|
|
"id": "CVE-2021-27099",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2021-03-05T18:15:13.067",
|
|
"lastModified": "2021-03-16T18:47:17.367",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In SPIRE before versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1, the \"aws_iid\" Node Attestor improperly normalizes the path provided through the agent ID templating feature, which may allow the issuance of an arbitrary SPIFFE ID within the same trust domain, if the attacker controls the value of an EC2 tag prior to attestation, and the attestor is configured for agent ID templating where the tag value is the last element in the path. This issue has been fixed in SPIRE versions 0.11.3 and 0.12.1"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En SPIRE versiones anteriores a 0.8.5, 0.9.4, 0.10.2, 0.11.3 y 0.12.1, el Node Attestor \"aws_iid\" normaliza inapropiadamente la ruta proporcionada por medio de la funcionalidad agent ID templating, lo que puede permitir la emisi\u00f3n de un ID de SPIFFE dentro del mismo dominio confiable, si el atacante controla el valor de una etiqueta EC2 antes de una certificaci\u00f3n, y el certificador est\u00e1 configurado para plantillas de ID de agente donde el valor de la etiqueta es el \u00faltimo elemento de la ruta. Este problema ha sido corregido en versiones 0.11.3 y 0.12.1 de SPIRE"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.8,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.6,
|
|
"impactScore": 5.2
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.9
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-863"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cncf:spire:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "0.8.5",
|
|
"matchCriteriaId": "0CFBEF70-490C-49D7-B601-CE2C8ED7AC99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cncf:spire:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "0.9.0",
|
|
"versionEndExcluding": "0.9.4",
|
|
"matchCriteriaId": "E7436751-C627-4143-A890-8B04D9C6642D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cncf:spire:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "0.10.0",
|
|
"versionEndExcluding": "0.10.2",
|
|
"matchCriteriaId": "E330A728-6B22-4C71-B37A-119BD2D3EADB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cncf:spire:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "0.11.0",
|
|
"versionEndExcluding": "0.11.3",
|
|
"matchCriteriaId": "EA57458D-53C5-4E8D-AFC2-D56826904304"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cncf:spire:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "0.12.0",
|
|
"versionEndExcluding": "0.12.1",
|
|
"matchCriteriaId": "F05F1090-6FFC-4C74-B9D3-D63B3259A46A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/spiffe/spire/security/advisories/GHSA-q7gm-mjrg-44h9",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |