René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

175 lines
6.6 KiB
JSON

{
"id": "CVE-2014-0732",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-02-20T05:18:04.140",
"lastModified": "2014-02-21T00:26:40.500",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Real Time Monitoring Tool (RTMT) web application in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier does not properly enforce authentication requirements, which allows remote attackers to read application files via a direct request to a URL, aka Bug ID CSCum46495."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n web Real Time Monitoring Tool (RTMT) en Cisco Unified Communications Manager (Unified CM) 10.0(1) y anteriores no fuerza los requisitos de autenticaci\u00f3n, lo que permite a atacantes remotos leer archivos de aplicaciones a trav\u00e9s de una solicitud directa a una URL, tambi\u00e9n conocido como Bug ID CSCum46495."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.0\\(1\\)",
"matchCriteriaId": "0F66EDBF-F735-4E44-B650-39FCE806535A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B9DA1F8-FA05-4380-8EFF-AF9FEF18FF2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "65BB9155-89E5-4D54-AF1B-D5CA38392D5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*",
"matchCriteriaId": "2A76CD6B-0C24-4F5F-B4BB-BA114150A7F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F9BD08CD-9169-4B1E-A6DE-B138E6AB533C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "DFFD96E3-B19F-41B7-86FD-DBFD41382C28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*",
"matchCriteriaId": "0E9BF838-87A2-43B8-975B-524D7F954BF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*",
"matchCriteriaId": "9600EA23-5428-4312-A38E-480E3C3228BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*",
"matchCriteriaId": "57F5547E-F9C8-4F9C-96A1-563A66EE8D48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C20851-DC17-4E89-A6C1-D1B52D47608F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC830649-C0D4-4FFC-8701-80FB4A706F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "935D2815-7146-4125-BDBE-BFAA62A88EC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6BF54827-75E6-4BA0-84F0-0EC0E24A4A73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8628E7-D3C8-4212-B0A5-6B5AC14D6101"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*",
"matchCriteriaId": "19432E5E-EA68-4B7A-8B99-DEBACBC3F160"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE4CD8E-F27C-4F96-B955-FC1E71B5D55B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "577571D6-AC59-4A43-B9A5-7B6FC6D2046C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "725D3E7D-6EF9-4C13-8B30-39ED49BBC8E3"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0732",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32913",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}