René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

114 lines
3.5 KiB
JSON

{
"id": "CVE-2021-28293",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-08T18:15:08.277",
"lastModified": "2022-04-19T03:44:11.683",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Seceon aiSIEM before 6.3.2 (build 585) is prone to an unauthenticated account takeover vulnerability in the Forgot Password feature. The lack of correct configuration leads to recovery of the password reset link generated via the password reset functionality, and thus an unauthenticated attacker can set an arbitrary password for any user."
},
{
"lang": "es",
"value": "Seceon aiSIEM versiones anteriores a 6.3.2 (build 585) es propenso a una vulnerabilidad de toma de control de cuenta no autenticada en la funcionalidad Forgot Password. La falta de una configuraci\u00f3n correcta conlleva a una recuperaci\u00f3n del enlace de restablecimiento de la contrase\u00f1a generado por medio de la funcionalidad password reset, por lo tanto, un atacante no autenticado puede ajustar una contrase\u00f1a arbitraria para cualquier usuario"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seceon:aisiem:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.2",
"matchCriteriaId": "1E77D899-1D63-41B3-9973-E3CEBEF80B0B"
}
]
}
]
}
],
"references": [
{
"url": "https://0xdb9.in/2021/06/07/cve-2021-28293.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.seceon.com/advanced-siem-aisiem",
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
]
}
]
}