2024-12-08 03:06:42 +00:00

150 lines
4.8 KiB
JSON

{
"id": "CVE-2015-9232",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-09-20T22:29:00.197",
"lastModified": "2024-11-21T02:40:06.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Good for Enterprise application 3.0.0.415 for Android does not use signature protection for its Authentication Delegation API intent. Also, the Good Dynamic application activation process does not attempt to detect malicious activation attempts involving modified names beginning with a com.good.gdgma substring. Consequently, an attacker could obtain access to intranet data. This issue is only relevant in cases where the user has already downloaded a malicious Android application."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n Good for Enterprise 3.0.0.415 para Android no emplea protecci\u00f3n de firmas para su intent API Authentication Delegation. Adem\u00e1s, el proceso de activaci\u00f3n de la aplicaci\u00f3n Good Dynamic no intenta detectar intentos de activaci\u00f3n maliciosa relacionados con los nombres modificados que comienzan con una substring com.good.gdgma. Por lo tanto, un atacante podr\u00eda obtener acceso a los datos de la Intranet. Este problema s\u00f3lo es relevante en los casos en los que el usuario ya ha descargado una aplicaci\u00f3n Android maliciosa."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:good:good_for_enterprise:3.0.0.415:*:*:*:*:android:*:*",
"matchCriteriaId": "E9AF057E-517E-4440-815C-3A9BF0510CCA"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/536543",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://community.blackberry.com/community/blogs/blog/2015/10/02/what-you-need-to-know-modzero-insecure-application-coupling",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.modzero.ch/advisories/MZ-15-03-GOOD-Auth-Delegation.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/536543",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://community.blackberry.com/community/blogs/blog/2015/10/02/what-you-need-to-know-modzero-insecure-application-coupling",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.modzero.ch/advisories/MZ-15-03-GOOD-Auth-Delegation.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}