René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

151 lines
4.9 KiB
JSON

{
"id": "CVE-2021-39173",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-08-27T23:15:06.957",
"lastModified": "2022-12-20T21:52:30.643",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cachet is an open source status page system. Prior to version 2.5.1 authenticated users, regardless of their privileges (User or Admin), can trick Cachet and install the instance again, leading to arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name. As a workaround, only allow trusted source IP addresses to access to the administration dashboard."
},
{
"lang": "es",
"value": "Cachet es un sistema de p\u00e1ginas de estado de c\u00f3digo abierto. versiones anteriores a 2.5.1 unos usuarios autenticados, independientemente de sus privilegios (Usuario o Administrador), pueden enga\u00f1ar a Cachet e instalar la instancia de nuevo, conllevando a una ejecuci\u00f3n de c\u00f3digo arbitrario en el servidor. Este problema fue solucionado en versi\u00f3n 2.5.1, al mejorar el middleware \"ReadyForUse\", que ahora lleva a cabo una comprobaci\u00f3n m\u00e1s estricta del nombre de la instancia. Como soluci\u00f3n, s\u00f3lo permita que direcciones IP de origen confiable accedan al panel de administraci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-704"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-704"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:catchethq:catchet:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.5.1",
"matchCriteriaId": "E6F15FBF-A3DE-4A7F-BAD5-D2C410CAF357"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1",
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}