2024-12-08 03:06:42 +00:00

141 lines
4.1 KiB
JSON

{
"id": "CVE-2015-9243",
"sourceIdentifier": "support@hackerone.com",
"published": "2018-05-29T20:29:00.547",
"lastModified": "2024-11-21T02:40:07.943",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When server level, connection level or route level CORS configurations in hapi node module before 11.1.4 are combined and when a higher level config included security restrictions (like origin), a higher level config that included security restrictions (like origin) would have those restrictions overridden by less restrictive defaults (e.g. origin defaults to all origins `*`)."
},
{
"lang": "es",
"value": "Cuando las configuraciones de CORS a nivel de servidor, conexi\u00f3n o ruta en el m\u00f3dulo hapi node, en versiones anteriores a la 11.1.4, se combinan y cuando una configuraci\u00f3n de nivel mayor incluye restricciones de seguridad (como origin), una configuraci\u00f3n de nivel mayor tendr\u00eda estas restricciones sobrescritas por configuraciones por defecto menos restrictivas (por ejemplo, origin se revierte por defecto a all origins `*`)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-254"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hapijs:hapi:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "11.1.4",
"matchCriteriaId": "AC489DBB-5081-4268-9636-9A019B9B1AD4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hapijs/hapi/issues/2980",
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://nodesecurity.io/advisories/65",
"source": "support@hackerone.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/hapijs/hapi/issues/2980",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://nodesecurity.io/advisories/65",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}