René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
4.1 KiB
JSON

{
"id": "CVE-2021-37381",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-06T13:15:07.307",
"lastModified": "2021-08-13T18:42:59.763",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Southsoft GMIS 5.0 is vulnerable to CSRF attacks. Attackers can access other users' private information such as photos through CSRF. For example: any student's photo information can be accessed through /gmis/(S([1]))/student/grgl/PotoImageShow/?bh=[2]. Among them, the code in [1] is a random string generated according to the user's login related information. It can protect the user's identity, but it can not effectively prevent unauthorized access. The code in [2] is the student number of any student. The attacker can carry out CSRF attack on the system by modifying [2] without modifying [1]."
},
{
"lang": "es",
"value": "Southsoft GMIS versi\u00f3n 5.0, es vulnerable a ataques de tipo CSRF. Unos atacantes pueden acceder a la informaci\u00f3n privada de otros usuarios, como las fotos, mediante un ataque de tipo CSRF. Por ejemplo: puede ser accedido a la informaci\u00f3n de las fotos de cualquier estudiante mediante /gmis/(S([1]))/student/grgl/PotoImageShow/?bh=[2]. Entre ellos, el c\u00f3digo de [1] es una cadena aleatoria generada seg\u00fan la informaci\u00f3n relacionada con el inicio de sesi\u00f3n del usuario. Puede proteger la identidad del usuario, pero no puede prevenir eficazmente el acceso no autorizado. El c\u00f3digo en [2] es el n\u00famero de estudiante de cualquier estudiante. El atacante puede llevar a cabo un ataque de tipo CSRF en el sistema al modificar [2] sin modificar [1]"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:southsoft:graduate_management_information_system:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76CB8B8B-D4BE-4770-80EC-1F7F018BAA60"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/caiteli/poc_information/blob/main/southsoft_GMIS.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/caiteli/poc_information/issues/1",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}