René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

145 lines
4.0 KiB
JSON

{
"id": "CVE-2021-36370",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-30T19:15:08.917",
"lastModified": "2021-09-08T13:41:03.360",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity."
},
{
"lang": "es",
"value": "Se ha detectado un problema en Midnight Commander versiones hasta 4.8.26. Cuando se establece una conexi\u00f3n SFTP, la huella digital del servidor no se comprueba ni se muestra. Como resultado, un usuario se conecta al servidor sin poder verificar su autenticidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight-commander:midnight_commander:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.8.26",
"matchCriteriaId": "B221D81C-B7C6-4BE6-AEC6-CD700C406BB2"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.ssh-mitm.at/CVE-2021-36370.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MidnightCommander/mc/blob/5c1d3c55dd15356ec7d079084d904b7b0fd58d3e/src/vfs/sftpfs/connection.c#L484",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MidnightCommander/mc/blob/master/src/vfs/sftpfs/connection.c",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://mail.gnome.org/archives/mc-devel/2021-August/msg00008.html",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "https://midnight-commander.org/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sourceforge.net/projects/mcwin32/files/",
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
]
}
]
}