mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
307 lines
11 KiB
JSON
307 lines
11 KiB
JSON
{
|
|
"id": "CVE-2021-42237",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2021-11-05T10:15:08.240",
|
|
"lastModified": "2025-02-03T16:15:31.637",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Sitecore XP Versi\u00f3n Inicial 7.5 a Sitecore XP 8.2 Update-7, es vulnerable a un ataque de deserializaci\u00f3n no segura donde es posible lograr una ejecuci\u00f3n de comandos remotos en la m\u00e1quina. No es requerida ninguna autenticaci\u00f3n ni configuraci\u00f3n especial para explotar esta vulnerabilidad"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 10.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"cisaExploitAdd": "2022-03-25",
|
|
"cisaActionDue": "2022-04-15",
|
|
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
|
"cisaVulnerabilityName": "Sitecore XP Remote Command Execution Vulnerability",
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-502"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-502"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:7.5:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7DA5CB16-F850-41CC-9629-22A27A7D116B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:7.5:update1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ADC6C446-A985-465A-9FBE-5FCEE9C6CBD6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:7.5:update2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB23F608-4B01-4D54-8A1E-E15BEE609FA2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE208FB9-A66E-4073-AD2F-DC56FDBDE127"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6454C19-10B4-48C3-A263-9334E594164B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E192728C-7ED3-4A49-953E-E123160965F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B59B52C9-788F-4F31-9426-001AEFAEB8F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4D47317-4E1F-4C2E-BD56-960BFD6947BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D36C9AB3-B22F-4C47-B92D-03D95E3C8137"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2DC3A72-1BAE-44C6-877A-8AC4398425A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB53F79E-FA06-423C-B9BC-96AF052726B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08DD78DD-3686-48C9-A896-CF1CFDD2FCBC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.1:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9362ED8-9012-4771-BED2-501921784E5F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.1:update1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47CB90D7-CC2C-4A5C-99DC-5C52A4A3E188"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.1:update2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17E8CD1F-2D60-4E4A-BAA4-80165910058B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.1:update3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2B4B37E-265B-40BB-ADD9-856F751322C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65E69221-68EE-4D8F-829B-12C96C197C0C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "218E38E2-FBF3-4E75-8507-5BD425FA4F81"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C754113-6D8E-4B0D-872C-266088B27362"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA0A84E9-0B8D-4755-AF70-59207CEDCC08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F73BF18-6D89-4663-AA37-56FC976A0EE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7CDCFB0-9C38-46CA-A2C3-6A18F4B9A224"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "496F293C-F7ED-411A-8498-9B93FDC350C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "402BC64F-A66E-426B-ACB9-F65AB857006B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sitecore.com",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://blog.assetnote.io/2021/11/02/sitecore-rce/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sitecore.com",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://blog.assetnote.io/2021/11/02/sitecore-rce/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |