mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
120 lines
3.9 KiB
JSON
120 lines
3.9 KiB
JSON
{
|
|
"id": "CVE-2021-27900",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2021-04-06T22:15:12.890",
|
|
"lastModified": "2021-04-12T16:01:58.577",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is missing an authorization check on several pages in the Web Console. This enables a view-only user to change any configuration setting and delete any registered agents. All versions before 7.11.1 are affected."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El Servidor Proofpoint Insider Threat Management (anteriormente ObserveIT Server) presenta una falta de verificaci\u00f3n de autorizaci\u00f3n en varias p\u00e1ginas de la consola web. Esto permite que un usuario de solo lectura cambie cualquier ajuste de configuraci\u00f3n y elimine cualquier agente registrado. Todas las versiones anteriores a 7.11.1 est\u00e1n afectadas"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.1,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.2
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.5
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-862"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.9.0",
|
|
"versionEndExcluding": "7.9.3",
|
|
"matchCriteriaId": "49735308-48A4-4ED9-A146-B0EEA9261271"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.10.0",
|
|
"versionEndExcluding": "7.10.3",
|
|
"matchCriteriaId": "8BB71780-DB7A-499B-B926-7991841A7A17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.11.0",
|
|
"versionEndExcluding": "7.11.1",
|
|
"matchCriteriaId": "576B99C8-93B5-43E5-BEFD-5225FB5FA2EE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2021-0005",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |