René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

134 lines
4.0 KiB
JSON

{
"id": "CVE-2021-33318",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-16T16:15:07.810",
"lastModified": "2022-05-25T14:03:53.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An Input Validation Vulnerability exists in Joel Christner .NET C# packages WatsonWebserver, IpMatcher 1.0.4.1 and below (IpMatcher) and 4.1.3 and below (WatsonWebserver) due to insufficient validation of input IP addresses and netmasks against the internal Matcher list of IP addresses and subnets."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de comprobaci\u00f3n de entrada en los paquetes C# de Joel Christner .NET WatsonWebserver, IpMatcher 1.0.4.1 y anteriores (IpMatcher) y 4.1.3 y anteriores (WatsonWebserver) debido a la insuficiente comprobaci\u00f3n de las direcciones IP y m\u00e1scaras de red de entrada con respecto a la lista interna de direcciones IP y subredes de Matcher"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipmatcher_project:ipmatcher:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.4.1",
"matchCriteriaId": "118A5A14-11EB-4C37-ABCC-857404717695"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:watsonwebserver_project:watsonwebserver:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.1.3",
"matchCriteriaId": "6C057037-0EC7-44C9-B614-0D5FD3256277"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jchristn/IpMatcher",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/jchristn/IpMatcher/commit/81d77c2f33aa912dbd032b34b9e184fc6e041d89",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/jchristn/WatsonWebserver",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/kaoudis/advisories/blob/main/0-2021.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}