mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
223 lines
8.5 KiB
JSON
223 lines
8.5 KiB
JSON
{
|
|
"id": "CVE-2021-20838",
|
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
|
"published": "2021-11-01T02:15:06.867",
|
|
"lastModified": "2021-11-08T19:04:42.707",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Office Server Document Converter V7.2MR4 and earlier and V7.1MR7 and earlier allows a remote unauthenticated attacker to conduct an XML External Entity (XXE) attack to cause a denial of service (DoS) condition by processing a specially crafted XML document."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Office Server Document Converter versiones V7.2MR4 y anteriores y versiones V7.1MR7 y anteriores, permiten a un atacante remoto no autenticado realizar un ataque de tipo XML External Entity (XXE) para causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) al procesar un documento XML especialmente dise\u00f1ado"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-611"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "5.2",
|
|
"matchCriteriaId": "FF62D2B8-0DCD-4D30-93AB-CCFEB39C9DC1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:5.2:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "486AA55C-7248-4D9D-B53C-A7DB985B3E79"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:6.0:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB47E5A7-E19D-407E-9DBD-10617D466EA2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:6.0:mr1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8622DA10-5F38-42AF-B9E3-9CDFA91DFD9B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:6.0:mr2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE9FDA3D-33D5-475B-906C-190EE0EAB840"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:6.1:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "412352E3-AE12-4AF4-9873-CBB5B5322569"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:6.1:mr2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10820C5D-8E17-4A3C-AACF-BA9FFA548575"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:6.1:mr2:*:*:pro:*:*:*",
|
|
"matchCriteriaId": "15CD6C7B-B6F9-4B99-AC5C-932B8A671046"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:6.1:mr3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B65E86E1-0D2A-4ADB-A04A-A8128A5A5340"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:6.1:mr4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0414FF1-6059-484E-8818-C9731D85531C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97AC1C70-42A5-4756-A83A-70A4B6D674AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.0:mr1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8D11B1F-7C77-410A-8050-831881D5DE0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.0:mr2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E83BC353-8D05-4A84-A501-B04B08B9185E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.0:mr3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71CE8429-A15B-45FF-9B48-6E36E2E814C5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.1:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20A576B4-211C-4CBC-BDBD-9D70F22E9938"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.1:mr1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9741D57E-E15F-43FF-A379-B9CF7AD2624B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.1:mr2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FCD1886D-E2DD-4370-8658-63BE4B9F5392"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.1:mr3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4742953-34BA-4B9A-86D6-09A8F78E929F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2DB44596-4AD8-4D62-880D-DFB251276EF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.2:mr1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2D906F0-6C85-451A-9865-8104A918AFCA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.2:mr2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0791488F-2B26-4C30-B32A-BF27C4A34B95"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.2:mr3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7D5E9B5B-7DEB-4E1C-AA72-B3BEC5ACE35F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:antennahouse:office_server_document_converter:7.2:mr4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33DA74A3-2703-449E-9BF4-E1945D5DA03F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://jvn.jp/en/jp/JVN33453839/index.html",
|
|
"source": "vultures@jpcert.or.jp",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.antenna.co.jp/news/2021/osdc72-20211027.html",
|
|
"source": "vultures@jpcert.or.jp",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |