2024-12-08 03:06:42 +00:00

168 lines
5.6 KiB
JSON

{
"id": "CVE-2020-17500",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-07T21:15:12.430",
"lastModified": "2024-11-21T05:08:14.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Barco TransForm NDN-210 Lite, NDN-210 Pro, NDN-211 Lite, and NDN-211 Pro before 3.8 allows Command Injection (issue 1 of 4). The NDN-210 has a web administration panel which is made available over https. The logon method is basic authentication. There is a command injection issue that will result in unauthenticated remote code execution in the username and password fields of the logon prompt. The NDN-210 is part of Barco TransForm N solution and includes the patch from TransForm N version 3.8 onwards."
},
{
"lang": "es",
"value": "Barco TransForm NDN-210 Lite, NDN-210 Pro, NDN-211 Lite y NDN-211 Pro versiones anteriores a 3.8, permiten una Inyecci\u00f3n de Comandos (problema 1 de 4). El NDN-210, presenta un panel de administraci\u00f3n web que est\u00e1 disponible por medio de https. El m\u00e9todo de inicio de sesi\u00f3n es la autenticaci\u00f3n b\u00e1sica. Se presenta un problema de inyecci\u00f3n de comando que resultar\u00e1 en una ejecuci\u00f3n de c\u00f3digo remoto no autenticado en los campos username y password del indicador de inicio de sesi\u00f3n. El NDN-210 es parte de la soluci\u00f3n Barco TransForm N e incluye el parche de TransForm N versi\u00f3n 3.8 en adelante"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:barco:transform_n:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.8",
"matchCriteriaId": "A81666C1-E5CE-4206-AD3A-081E0E3328E8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:barco:transform_ndn-210_lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD8D359-AD98-4C2E-BBB6-16E4D00C9FA8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:barco:transform_ndn-210_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44DD99C7-46AC-43FF-86AB-0B4CC222C902"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:barco:transform_ndn-211_lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8BF9D72-7D56-4E72-A66C-62D4232C57B6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:barco:transform_ndn-211_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F7E77D-CCD3-4FF6-8D5E-0F745136B339"
}
]
}
]
}
],
"references": [
{
"url": "https://www.barco.com/en/support/cms",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.barco.com/en/support/knowledge-base/kb11588",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.barco.com/en/support/transform-n-management-server",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.barco.com/en/support/cms",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.barco.com/en/support/knowledge-base/kb11588",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.barco.com/en/support/transform-n-management-server",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}