2023-11-07 21:03:21 +00:00

113 lines
3.7 KiB
JSON

{
"id": "CVE-2020-25966",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-10-28T18:15:13.413",
"lastModified": "2023-11-07T03:20:28.450",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Sectona Spectra before 3.4.0 has a vulnerable SOAP API endpoint that leaks sensitive information about the configured assets without proper authentication. This could be used by unauthorized parties to get configured login credentials of the assets via a modified pAccountID value. NOTE: The vendor has indicated this is not a vulnerability and states \"This vulnerability occurred due to wrong configuration of system."
},
{
"lang": "es",
"value": "** EN DISPUTA ** Sectona Spectra versiones anteriores a 3.4.0, presenta un endpoint de la API SOAP vulnerable que filtra informaci\u00f3n confidencial sobre los activos configurados sin la autenticaci\u00f3n apropiada. Esto podr\u00eda ser usado por partes no autorizadas para obtener credenciales de inicio de sesi\u00f3n configuradas de los activos por medio de un valor de pAccountID modificado. NOTA: El proveedor ha indicado que esto no es una vulnerabilidad y afirma \"Esta vulnerabilidad se produjo debido a una configuraci\u00f3n err\u00f3nea del sistema\""
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sectona:spectra:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.4.0",
"matchCriteriaId": "026F3F29-2933-49AB-AFA3-9081F0470406"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/Gazzaz/Spectra_API_Issue/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://sectona.com/products/spectra-privileged-access-management/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}