René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
4.3 KiB
JSON

{
"id": "CVE-2021-33484",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-09-07T05:15:06.853",
"lastModified": "2021-09-13T15:14:34.787",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in CommentsService.ashx in OnyakTech Comments Pro 3.8. An attacker can download a copy of the installer, decompile it, and discover a hardcoded IV used to encrypt the username and userid in the comment POST request. Additionally, the attacker can decrypt the encrypted encryption key (sent as a parameter in the comment form request) by setting this encrypted value as the username, which will appear on the comment page in its decrypted form. Using these two values (combined with the encryption functionality discovered in the decompiled installer), the attacker can encrypt another user's ID and username. These values can be used as part of the comment posting request in order to spoof the user."
},
{
"lang": "es",
"value": "Se ha detectado un problema en el archivo CommentsService.ashx en OnyakTech Comments Pro versi\u00f3n 3.8. Un atacante puede descargar una copia del instalador, descompilarlo y detectar un IV embebido usado para cifrar el nombre de usuario y el userid en la petici\u00f3n POST de comentarios. Adem\u00e1s, el atacante puede descifrar la clave de cifrado (enviada como par\u00e1metro en la petici\u00f3n del formulario de comentarios) al establecer este valor cifrado como nombre de usuario, que aparecer\u00e1 en la p\u00e1gina de comentarios en su forma descifrada. Usando estos dos valores (combinados con la funcionalidad de cifrado descubierta en el instalador descompilado), el atacante puede cifrar el ID y el nombre de usuario de otro usuario. Estos valores pueden ser usados como parte de la petici\u00f3n de publicaci\u00f3n de comentarios para suplantar al usuario"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:onyaktech_comments_pro_project:onyaktech_comments_pro:3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79C55DC5-EC59-4DD0-A331-7D4D9510AA7E"
}
]
}
]
}
],
"references": [
{
"url": "https://burninatorsec.blogspot.com/2021/07/onyaktech-comments-pro-broken.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://twitter.com/onyaktech",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}