2024-12-08 03:06:42 +00:00

112 lines
3.5 KiB
JSON

{
"id": "CVE-2020-11826",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-04-16T19:15:27.680",
"lastModified": "2024-11-21T04:58:42.703",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Users can lock their notes with a password in Memono version 3.8. Thus, users needs to know a password to read notes. However, these notes are stored in a database without encryption and an attacker can read the password-protected notes without having the password. Notes are stored in the ZENTITY table in the memono.sqlite database."
},
{
"lang": "es",
"value": "Los usuarios pueden bloquear sus notas con una contrase\u00f1a en Memono versi\u00f3n 3.8. Por lo tanto, los usuarios necesitan saber una contrase\u00f1a para leer notas. Sin embargo, estas notas son almacenadas en una base de datos sin cifrado y un atacante puede leer las notas protegidas por contrase\u00f1a sin tener la contrase\u00f1a. Las notas son almacenadas en la tabla ZENTITY en la base de datos memono.sqlite."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:appinghouse:memono:3.8:*:*:*:*:iphone_os:*:*",
"matchCriteriaId": "5965B64E-39F8-4119-A234-A86E6E7433B4"
}
]
}
]
}
],
"references": [
{
"url": "https://fatihhcelik.blogspot.com/2020/02/memono-insecure-data-storage-ios.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://fatihhcelik.blogspot.com/2020/02/memono-insecure-data-storage-ios.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}