René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

175 lines
6.0 KiB
JSON

{
"id": "CVE-2021-22934",
"sourceIdentifier": "support@hackerone.com",
"published": "2021-08-16T19:15:13.447",
"lastModified": "2021-08-24T12:57:31.480",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator or compromised Pulse Connect Secure device in a load-balanced configuration to perform a buffer overflow via a malicious crafted web request."
},
{
"lang": "es",
"value": "Una vulnerabilidad en Pulse Connect Secure, versiones anteriores a 9.1R12, podr\u00eda permitir a un administrador autenticado o a un dispositivo Pulse Connect Secure comprometido en una configuraci\u00f3n de carga equilibrada llevar a cabo un desbordamiento del b\u00fafer por medio de una petici\u00f3n web maliciosa dise\u00f1ada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "support@hackerone.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.1",
"matchCriteriaId": "43AF1D62-D827-4495-A4B0-CCA0C2BEE68F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "8E84076A-C4AB-4C41-B325-F9557080E95A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r1.0:*:*:*:*:*:*",
"matchCriteriaId": "271D0BBE-0129-4F40-A19C-0BF9E248A44D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r10.0:*:*:*:*:*:*",
"matchCriteriaId": "A7198897-DA21-4E8C-B32F-0036300B2C66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r11.0:*:*:*:*:*:*",
"matchCriteriaId": "575E6DC1-9EEF-40A7-8B78-E88AA9536340"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r2.0:*:*:*:*:*:*",
"matchCriteriaId": "2E9ED39C-A76A-4D7E-B4DC-516FF411FE79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r3.0:*:*:*:*:*:*",
"matchCriteriaId": "20B061C7-AB19-4EA0-BB87-59E897516327"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r4.0:*:*:*:*:*:*",
"matchCriteriaId": "2A2338A6-CFEB-40D8-BA96-F7CE37B862FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r5.0:*:*:*:*:*:*",
"matchCriteriaId": "3F445B6E-0EF4-423A-A7FF-E1916DEED24F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r6.0:*:*:*:*:*:*",
"matchCriteriaId": "1C86C96D-F82C-4A6F-B90F-A00DE7B1448D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r7.0:*:*:*:*:*:*",
"matchCriteriaId": "C2664F97-0BC2-4DA2-A1FE-14A47634553B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r8.0:*:*:*:*:*:*",
"matchCriteriaId": "29AC3CD5-E7D7-48D1-A87E-AF53DDB1E720"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r9.0:*:*:*:*:*:*",
"matchCriteriaId": "4AF247A2-8E43-4D16-AC14-8B0BE67687DB"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44858/?kA23Z000000L6oySAC",
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
]
}
]
}