René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

149 lines
4.8 KiB
JSON

{
"id": "CVE-2020-12145",
"sourceIdentifier": "sirt@silver-peak.com",
"published": "2020-11-05T19:15:12.430",
"lastModified": "2020-11-12T17:11:55.910",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+ uses HTTP headers to authenticate REST API calls from localhost. This makes it possible to log in to Orchestrator by introducing an HTTP HOST header set to 127.0.0.1 or localhost. Orchestrator instances that are hosted by customers \u2013on-premise or in a public cloud provider \u2013are affected by this vulnerability."
},
{
"lang": "es",
"value": "Silver Peak Unity Orchestrator versiones anteriores a 8.9.11+, 8.10.11+, o 9.0.1+ usan encabezados HTTP para autentificar unas llamadas a la API REST desde el host local. Esto hace posible acceder a Orchestrator al introducir un ajuste del encabezado HTTP HOST en la versi\u00f3n 127.0.0.1 o localhost. Unas instancias de Orchestrator que son alojadas por clientes -en sitio o en un proveedor de nube p\u00fablica- est\u00e1n afectadas por esta vulnerabilidad"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "sirt@silver-peak.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "sirt@silver-peak.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.9.11\\+",
"matchCriteriaId": "F57E088F-B275-47E0-87E9-D392F5E78CA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.10",
"versionEndExcluding": "8.10.11\\+",
"matchCriteriaId": "06BDDCC0-D63B-4729-9FB7-95B89A54389A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.1\\+",
"matchCriteriaId": "5302B8F8-6B84-48F0-BD59-8FF7368AB888"
}
]
}
]
}
],
"references": [
{
"url": "https://www.silver-peak.com/support/user-documentation/security-advisories",
"source": "sirt@silver-peak.com",
"tags": [
"Vendor Advisory"
]
}
]
}