mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
167 lines
6.0 KiB
JSON
167 lines
6.0 KiB
JSON
{
|
|
"id": "CVE-2014-0842",
|
|
"sourceIdentifier": "psirt@us.ibm.com",
|
|
"published": "2014-02-26T01:29:36.717",
|
|
"lastModified": "2017-08-29T01:34:16.717",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The account-creation functionality in IBM Rational Focal Point 6.4.x and 6.5.x before 6.5.2.3 and 6.6.x before 6.6.1 places the new user's default password within the creation page, which allows remote attackers to obtain sensitive information by reading the HTML source code."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La funcionalidad account-creation en IBM Rational Focal Point 6.4.x y 6.5.x anterior a 6.5.2.3 y 6.6.x anterior a 6.6.1 coloca la contrase\u00f1a nueva por defecto del usuario dentro de la p\u00e1gina de creaci\u00f3n, lo que permite a atacantes remotos obtener informaci\u00f3n sensible mediante la lectura del c\u00f3digo fuente HTML."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-255"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "46577E1B-77E6-4FE6-8B1F-F2A61FB0C15F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "30870B43-5757-43FC-BB10-DC0FD6996DFE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44678DC6-2D43-412D-89E0-F92B89BE1FD5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "253B6795-4B4B-4CD0-97EB-ACD1587C497A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7A94966-DD5E-490F-BDEE-2AEA9EECBFA5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.4.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B52DB62D-5D12-4AE4-8A14-EA2782A92CA2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55D71481-7552-4BE7-9BD0-C45BC5AAC3D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12B184B3-679B-4F27-9168-142090F99333"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1C89D96-8E49-4B4D-8D63-C240F5E9B439"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5BF5FBBF-750D-49FF-97E8-91E9D29D53DA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08F0C674-068D-43F9-BADE-0707008FF47F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD4F5963-909C-404E-AF58-885DBBC78FB2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F7B0657-4C0D-4CE7-8AB9-996EFF1DE4E2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C3CD52F-48BB-49AD-BF77-DC5762051950"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.5.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A872F738-296B-443F-B6E1-5B8200A05270"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDD57F9E-5569-4F38-8C1B-BF033498639E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:rational_focal_point:6.6.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "794382A6-042F-4036-B7DA-702135B1BE51"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21665005",
|
|
"source": "psirt@us.ibm.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90706",
|
|
"source": "psirt@us.ibm.com"
|
|
}
|
|
]
|
|
} |