René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

118 lines
3.5 KiB
JSON

{
"id": "CVE-2021-35962",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2021-07-16T16:15:11.023",
"lastModified": "2021-08-02T17:33:23.063",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Specific page parameters in Dr. ID Door Access Control and Personnel Attendance Management system does not filter special characters. Remote attackers can apply Path Traversal means to download credential files from the system without permission."
},
{
"lang": "es",
"value": "Unos par\u00e1metros espec\u00edficos de la p\u00e1gina en el sistema Dr. ID Door Access Control and Personnel Attendance Management no filtran los caracteres especiales. Unos atacantes remotos pueden aplicar medios de Salto de Ruta para descargar archivos de credenciales del sistema sin permiso"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:secom:door_access_control:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.3.2",
"matchCriteriaId": "0364F401-A33B-4291-84E9-7F4A47343077"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:secom:personnel_attendance_system:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.4.0.0.3.12_20210525",
"matchCriteriaId": "D70B460F-FDEF-47FC-A9D1-B2B37C376A80"
}
]
}
]
}
],
"references": [
{
"url": "https://www.chtsecurity.com/news/d7ec2db9-12dd-439f-b014-b956ce231054",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-4906-89381-1.html",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}