2024-12-08 03:06:42 +00:00

162 lines
5.0 KiB
JSON

{
"id": "CVE-2019-6481",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-03-29T14:29:00.640",
"lastModified": "2024-11-21T04:46:31.763",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Abine Blur 7.8.2431 allows remote attackers to conduct \"Second-Factor Auth Bypass\" attacks by using the \"Perform a right-click operation to access a forgotten dev menu to insert user passwords that otherwise would require the user to accept a second-factor request in a mobile app.\" approach, related to a \"Multifactor Auth Bypass, Full Disk Encryption Bypass\" issue affecting the Affected Chrome Plugin component."
},
{
"lang": "es",
"value": "Abine Blur, en su versi\u00f3n 7.8.2431, permite a los atacantes remotos realizar ataques de \"omisi\u00f3n de autenticaci\u00f3n de doble factor\" mediante el uso de la operaci\u00f3n \"Ejecute una operaci\u00f3n de clic derecho para acceder a un men\u00fa dev olvidado para insertar contrase\u00f1as del usuario que, de lo contrario, requerir\u00edan que este aceptase una petici\u00f3n de doble factor en una aplicaci\u00f3n m\u00f3vil\". Este enfoque est\u00e1 relacionado con un fallo de \"omisi\u00f3n de autenticaci\u00f3n multifactor, omisi\u00f3n de cifrado de disco entero\" que implica el componente del plugin de Chrome afectado."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abine:blur:7.8.2431:*:*:*:*:*:*:*",
"matchCriteriaId": "F50DF56E-D17D-4934-9E92-14CC0A1F9B4E"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/152139/Abine-Blur-7.8.24x-Authentication-Bypass.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2019/Mar/33",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://redcoded.com/cve/2018/03/10/CVE.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://redcoded.com/cve/2019/03/18/CVE.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://packetstormsecurity.com/files/152139/Abine-Blur-7.8.24x-Authentication-Bypass.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2019/Mar/33",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://redcoded.com/cve/2018/03/10/CVE.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://redcoded.com/cve/2019/03/18/CVE.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}