René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
4.3 KiB
JSON

{
"id": "CVE-2020-15849",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-09-30T19:15:13.180",
"lastModified": "2020-10-16T13:47:49.180",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's database, allowing for authorization bypass and taking over additional accounts by means of modifying password-reset tokens stored in the database. Remote command execution is also possible by leveraging this to abuse the Yii framework's bizRule functionality, allowing for arbitrary PHP code to be executed by the application. Remote command execution is also possible by using this together with a separate insecure file upload vulnerability (CVE-2020-15488)."
},
{
"lang": "es",
"value": "Re:Desk versi\u00f3n 2.3, presenta una vulnerabilidad de inyecci\u00f3n SQL autenticada ciega en la clase SettingsController, en el m\u00e9todo actionEmailTemplates(). Un actor malicioso con acceso a una cuenta administrativa podr\u00eda abusar de esta vulnerabilidad para recuperar datos confidenciales de la base de datos de la aplicaci\u00f3n, permitiendo omitir la autorizaci\u00f3n y hacerse cargo de cuentas adicionales mediante la modificaci\u00f3n de tokens de restablecimiento de contrase\u00f1a almacenados en la base de datos. Una ejecuci\u00f3n de comandos remota tambi\u00e9n es posible al aprovechar esto para abusar de la funcionalidad bizRule del framework Yii, permitiendo que un c\u00f3digo PHP arbitrario sea ejecutado por la aplicaci\u00f3n. Una ejecuci\u00f3n de comandos remota tambi\u00e9n es posible al usar esto junto con una vulnerabilidad de carga de archivos no segura separada (CVE-2020-15488)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:re-desk:re\\:desk:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "34C4228B-7583-4BC3-A0D1-A5E60AF4E874"
}
]
}
]
}
],
"references": [
{
"url": "https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.re-desk.com/download-help-desk-software.html",
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
]
}
]
}