René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
4.0 KiB
JSON

{
"id": "CVE-2021-43437",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-20T20:15:07.660",
"lastModified": "2022-01-03T18:32:02.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In sourcecodetester Engineers Online Portal as of 10-21-21, an attacker can manipulate the Host header as seen by the web application and cause the application to behave in unexpected ways. Very often multiple websites are hosted on the same IP address. This is where the Host Header comes in. This header specifies which website should process the HTTP request. The web server uses the value of this header to dispatch the request to the specified website. Each website hosted on the same IP address is called a virtual host. And It's possible to send requests with arbitrary Host Headers to the first virtual host."
},
{
"lang": "es",
"value": "En el portal online de sourcecodetester Engineers a partir del 21-10-21, un atacante puede manipular el encabezado Host visualizada por la aplicaci\u00f3n web y causar que la aplicaci\u00f3n se comporte de forma inesperada. Muy a menudo varios sitios web est\u00e1n alojados en la misma direcci\u00f3n IP. Aqu\u00ed es donde entra en juego el encabezado Host. Este encabezado especifica qu\u00e9 sitio web debe procesar la petici\u00f3n HTTP. El servidor web usa el valor de este encabezado para enviar la petici\u00f3n al sitio web especifico. Cada sitio web alojado en la misma direcci\u00f3n IP es denominado host virtual. Y es posible enviar peticiones con encabezados de host arbitrarias al primer host virtual"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:engineers_online_portal_project:engineers_online_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE2C0236-1BC6-45DD-B5A5-1FE81BD75296"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/@mayhem7999/cve-2021-43437-5c5e3b977e84",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://portswigger.net/web-security/host-header",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}