2024-12-08 03:06:42 +00:00

159 lines
5.7 KiB
JSON

{
"id": "CVE-2020-15132",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-08-05T21:15:12.427",
"lastModified": "2024-11-21T05:04:54.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the \"Forget password\" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist. This enables attackers to retrieve valid usernames. Also, the response of the \"Forgot Password\" request returns the email address to which the email was sent, if the operation was successful. This information should not be exposed, as it can be used to gather email addresses. This problem was fixed in versions 1.6.35, 2.0.10 and 2.1.1."
},
{
"lang": "es",
"value": "En Sulu anterior a las versiones 1.6.35, 2.0.10 y 2.1.1, cuando se usa la funcionalidad \"Forget password\" en la pantalla de inicio de sesi\u00f3n, Sulu le pregunta al usuario un nombre de usuario o direcci\u00f3n de correo electr\u00f3nico. Si no se encuentra la cadena dada, una respuesta es devuelta con un c\u00f3digo de error \"400\", junto con un mensaje de error que dice que este nombre de usuario no existe. Esto permite a atacantes recuperar nombres de usuario v\u00e1lidos. Adem\u00e1s, la respuesta de la petici\u00f3n \"Forgot Password\" devuelve la direcci\u00f3n de correo electr\u00f3nico a la que se envi\u00f3 el correo electr\u00f3nico, si la operaci\u00f3n tuvo \u00e9xito. Esta informaci\u00f3n no debe ser expuesta, ya que puede ser usada para recopilar direcciones de correo electr\u00f3nico. Este problema se corrigi\u00f3 en las versiones 1.6.35, 2.0.10 y 2.1.1"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.6.35",
"matchCriteriaId": "6BFA30C2-2006-43C3-A87F-5880590273F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.0.10",
"matchCriteriaId": "7CC1F6FD-C1DB-4EC3-A92F-F17107FD3A6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.1.0",
"versionEndExcluding": "2.1.1",
"matchCriteriaId": "4211DB54-B6D2-4445-88A1-D8759252FCA9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/sulu/sulu/security/advisories/GHSA-wfm4-pq59-wg6r",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/sulu/sulu/security/advisories/GHSA-wfm4-pq59-wg6r",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}