diff --git a/review_set/2021/26xxx/CVE-2021-26471.json b/review_set/2021/26xxx/CVE-2021-26471.json
index 295be2075b24..955cdbf3421d 100644
--- a/review_set/2021/26xxx/CVE-2021-26471.json
+++ b/review_set/2021/26xxx/CVE-2021-26471.json
@@ -1,225 +1,195 @@
{
- "containers": {
- "cna": {
- "affected": [
- {
- "product": "n/a",
- "vendor": "n/a",
- "versions": [
- {
- "status": "affected",
- "version": "n/a"
- }
- ]
- }
- ],
- "credits": [
- {
- "lang": "en",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "en",
- "value": "Addional research by Frank Breedijk"
- }
- ],
- "datePublic": "2021-07-07T00:00:00",
- "descriptions": [
- {
- "lang": "en",
- "value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1, the http API located at /sgwebservice_o.php accepts a command argument. Using this command argument an unauthenticated attacker can execute arbitrary shell commands."
- }
- ],
- "metrics": [
- {
- "cvssV3_1": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "UNCHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "version": "3.1"
- }
- }
- ],
- "problemTypes": [
- {
- "descriptions": [
- {
- "description": "n/a",
- "lang": "en",
- "type": "text"
- }
- ]
- }
- ],
- "providerMetadata": {
- "dateUpdated": "2022-03-15T00:00:00",
- "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "shortName": "mitre"
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0",
+ "cveMetadata": {
+ "cveId": "CVE-2021-26471",
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000"
+ },
+ "title": "Unauthenticated remote command execution in Vembu products",
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "lang": "en",
+ "cweId": "CWE-78",
+ "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
+ "type": "CWE"
+ }
+ ]
+ }
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-88",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-88 OS Command Injection"
+ }
+ ]
+ }
+ ],
+ "affected": [
+ {
+ "vendor": "Vembu",
+ "product": "VembuBDR",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "3.5.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.7.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.8.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.0 update 1"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.1 update 1"
+ },
+ {
+ "status": "affected",
+ "version": "4.0.0"
},
- "references": [
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/cves/CVE-2021-26471/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://www.wbsec.nl/vembu"
- }
- ],
- "source": {
- "advisory": "DIVD-2020-00011",
- "discovery": "EXTERNAL"
+ {
+ "status": "affected",
+ "version": "4.0.1"
},
- "title": "Unauthenticated remote command execution in Vembu products",
- "x_generator": {
- "engine": "Vulnogram 0.0.9"
+ {
+ "status": "affected",
+ "version": "4.0.2"
},
- "x_legacyV4Record": {
- "CVE_data_meta": {
- "ASSIGNER": "cve@mitre.org",
- "DATE_PUBLIC": "2021-07-07T10:49:00.000Z",
- "ID": "CVE-2021-26471",
- "STATE": "PUBLIC",
- "TITLE": "Unauthenticated remote command execution in Vembu products"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "credit": [
- {
- "lang": "eng",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "eng",
- "value": "Addional research by Frank Breedijk"
- }
- ],
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
- "description": {
- "description_data": [
- {
- "lang": "eng",
- "value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1, the http API located at /sgwebservice_o.php accepts a command argument. Using this command argument an unauthenticated attacker can execute arbitrary shell commands."
- }
- ]
- },
- "generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "impact": {
- "cvss": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "UNCHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "version": "3.1"
- }
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "name": "https://csirt.divd.nl/cves/CVE-2021-26471/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/cves/CVE-2021-26471/"
- },
- {
- "name": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/"
- },
- {
- "name": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/"
- },
- {
- "name": "https://www.wbsec.nl/vembu",
- "refsource": "CONFIRM",
- "url": "https://www.wbsec.nl/vembu"
- }
- ]
- },
- "source": {
- "advisory": "DIVD-2020-00011",
- "discovery": "EXTERNAL"
- }
+ {
+ "status": "affected",
+ "version": "4.1.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0.1"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "VembuOffsiteDR",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.2.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0.1"
+ }
+ ],
+ "defaultStatus": "unknown"
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\nIn VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1, the http API located at /sgwebservice_o.php accepts a command argument. Using this command argument an unauthenticated attacker can execute arbitrary shell commands.\n\n\n\n\n",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "\n\n\n\nIn VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1, the http API located at /sgwebservice_o.php accepts a command argument. Using this command argument an unauthenticated attacker can execute arbitrary shell commands.\n\n
\n\n"
}
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://csirt.divd.nl/cves/CVE-2021-26471/",
+ "tags": [
+ "technical-description"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://www.wbsec.nl/vembu",
+ "tags": [
+ "product"
+ ]
+ }
+ ],
+ "metrics": [
+ {
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ],
+ "cvssV3_1": {
+ "version": "3.1",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
+ }
+ }
+ ],
+ "source": {
+ "discovery": "INTERNAL"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ },
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Discovered by Wietse Boonstra of DIVD",
+ "type": "finder"
+ },
+ {
+ "lang": "en",
+ "value": "Additional research by Frank Breedijk of DIVD",
+ "type": "analyst"
}
- },
- "cveMetadata": {
- "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "assignerShortName": "mitre",
- "cveId": "CVE-2021-26471",
- "datePublished": "2021-07-07T00:00:00",
- "dateUpdated": "2022-03-15T00:00:00",
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ ]
+ }
+ }
}
\ No newline at end of file
diff --git a/review_set/2021/26xxx/CVE-2021-26472.json b/review_set/2021/26xxx/CVE-2021-26472.json
index 0cd809415567..e0341366b152 100644
--- a/review_set/2021/26xxx/CVE-2021-26472.json
+++ b/review_set/2021/26xxx/CVE-2021-26472.json
@@ -1,225 +1,198 @@
{
- "containers": {
- "cna": {
- "affected": [
- {
- "product": "n/a",
- "vendor": "n/a",
- "versions": [
- {
- "status": "affected",
- "version": "n/a"
- }
- ]
- }
- ],
- "credits": [
- {
- "lang": "en",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "en",
- "value": "Addional research by Frank Breedijk"
- }
- ],
- "datePublic": "2021-07-07T00:00:00",
- "descriptions": [
- {
- "lang": "en",
- "value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 installed on Windows, the http API located at /consumerweb/secure/download.php. Using this command argument an unauthenticated attacker can execute arbitrary OS commands with SYSTEM privileges."
- }
- ],
- "metrics": [
- {
- "cvssV3_1": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 10.0,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "CHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
- "version": "3.1"
- }
- }
- ],
- "problemTypes": [
- {
- "descriptions": [
- {
- "description": "n/a",
- "lang": "en",
- "type": "text"
- }
- ]
- }
- ],
- "providerMetadata": {
- "dateUpdated": "2022-03-15T00:00:00",
- "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "shortName": "mitre"
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0",
+ "cveMetadata": {
+ "cveId": "CVE-2021-26472",
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000"
+ },
+ "title": "Unauthenticated remote command execution with SYSTEM privileges in Vembu products",
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "lang": "en",
+ "cweId": "CWE-78",
+ "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
+ "type": "CWE"
+ }
+ ]
+ }
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-88",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-88 OS Command Injection"
+ }
+ ]
+ }
+ ],
+ "affected": [
+ {
+ "vendor": "Vembu",
+ "product": "VembuBDR",
+ "platforms": [
+ "Windows"
+ ],
+ "versions": [
+ {
+ "status": "affected",
+ "version": "3.5.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.7.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.8.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.0 update 1"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.1 update 1"
+ },
+ {
+ "status": "affected",
+ "version": "4.0.0"
},
- "references": [
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://www.wbsec.nl/vembu"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/cves/CVE-2021-26472/"
- }
- ],
- "source": {
- "advisory": "DIVD-2020-00011",
- "discovery": "EXTERNAL"
+ {
+ "status": "affected",
+ "version": "4.0.1"
},
- "title": "Unauthenticated remote command execution with SYSTEM privileges in Vembu products",
- "x_generator": {
- "engine": "Vulnogram 0.0.9"
+ {
+ "status": "affected",
+ "version": "4.0.2"
},
- "x_legacyV4Record": {
- "CVE_data_meta": {
- "ASSIGNER": "cve@mitre.org",
- "DATE_PUBLIC": "2021-07-07T10:49:00.000Z",
- "ID": "CVE-2021-26472",
- "STATE": "PUBLIC",
- "TITLE": "Unauthenticated remote command execution with SYSTEM privileges in Vembu products"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "credit": [
- {
- "lang": "eng",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "eng",
- "value": "Addional research by Frank Breedijk"
- }
- ],
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
- "description": {
- "description_data": [
- {
- "lang": "eng",
- "value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 installed on Windows, the http API located at /consumerweb/secure/download.php. Using this command argument an unauthenticated attacker can execute arbitrary OS commands with SYSTEM privileges."
- }
- ]
- },
- "generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "impact": {
- "cvss": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 10,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "CHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
- "version": "3.1"
- }
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "name": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/"
- },
- {
- "name": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/"
- },
- {
- "name": "https://www.wbsec.nl/vembu",
- "refsource": "CONFIRM",
- "url": "https://www.wbsec.nl/vembu"
- },
- {
- "name": "https://csirt.divd.nl/cves/CVE-2021-26472/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/cves/CVE-2021-26472/"
- }
- ]
- },
- "source": {
- "advisory": "DIVD-2020-00011",
- "discovery": "EXTERNAL"
- }
+ {
+ "status": "affected",
+ "version": "4.1.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0.1"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "VembuOffsiteDR",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.2.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0.1"
+ }
+ ],
+ "defaultStatus": "unknown"
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nIn VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 installed on Windows, the http API located at /consumerweb/secure/download.php. Using this command argument an unauthenticated attacker can execute arbitrary OS commands with SYSTEM privileges.\n\n",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "\n\nIn VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 installed on Windows, the http API located at /consumerweb/secure/download.php. Using this command argument an unauthenticated attacker can execute arbitrary OS commands with SYSTEM privileges.\n\n"
}
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://csirt.divd.nl/cves/CVE-2021-26472/",
+ "tags": [
+ "technical-description"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://www.wbsec.nl/vembu",
+ "tags": [
+ "product"
+ ]
+ }
+ ],
+ "metrics": [
+ {
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ],
+ "cvssV3_1": {
+ "version": "3.1",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 10,
+ "baseSeverity": "CRITICAL",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
+ }
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Discovered by Wietse Boonstra of DIVD",
+ "type": "finder"
+ },
+ {
+ "lang": "en",
+ "value": "Additional research by Frank Breedijk of DIVD",
+ "type": "analyst"
}
- },
- "cveMetadata": {
- "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "assignerShortName": "mitre",
- "cveId": "CVE-2021-26472",
- "datePublished": "2021-07-07T00:00:00",
- "dateUpdated": "2022-03-15T00:00:00",
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ ],
+ "source": {
+ "discovery": "INTERNAL"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ }
+ }
+ }
}
\ No newline at end of file
diff --git a/review_set/2021/26xxx/CVE-2021-26473.json b/review_set/2021/26xxx/CVE-2021-26473.json
index fc6f173ca100..e09da02e0188 100644
--- a/review_set/2021/26xxx/CVE-2021-26473.json
+++ b/review_set/2021/26xxx/CVE-2021-26473.json
@@ -1,225 +1,195 @@
{
- "containers": {
- "cna": {
- "affected": [
- {
- "product": "n/a",
- "vendor": "n/a",
- "versions": [
- {
- "status": "affected",
- "version": "n/a"
- }
- ]
- }
- ],
- "credits": [
- {
- "lang": "en",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "en",
- "value": "Addional research by Frank Breedijk"
- }
- ],
- "datePublic": "2021-07-07T00:00:00",
- "descriptions": [
- {
- "lang": "en",
- "value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 the http API located at /sgwebservice_o.php action logFilePath allows an attacker to write arbitrary files in the context of the web server process. These files can then be executed remotely by calling the file via the web server."
- }
- ],
- "metrics": [
- {
- "cvssV3_1": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "UNCHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "version": "3.1"
- }
- }
- ],
- "problemTypes": [
- {
- "descriptions": [
- {
- "description": "n/a",
- "lang": "en",
- "type": "text"
- }
- ]
- }
- ],
- "providerMetadata": {
- "dateUpdated": "2022-03-15T00:00:00",
- "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "shortName": "mitre"
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0",
+ "cveMetadata": {
+ "cveId": "CVE-2021-26473",
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000"
+ },
+ "title": "Unauthenticated arbitrary file upload and command execution in Vembu products",
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "lang": "en",
+ "cweId": "CWE-434",
+ "description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
+ "type": "CWE"
+ }
+ ]
+ }
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-253",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-253 Remote Code Inclusion"
+ }
+ ]
+ }
+ ],
+ "affected": [
+ {
+ "vendor": "Vembu",
+ "product": "VembuBDR",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "3.5.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.7.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.8.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.0 update 1"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.1 update 1"
+ },
+ {
+ "status": "affected",
+ "version": "4.0.0"
},
- "references": [
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://www.wbsec.nl/vembu"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/cves/CVE-2021-26473/"
- }
- ],
- "source": {
- "advisory": "DIVD-2020-00011",
- "discovery": "EXTERNAL"
+ {
+ "status": "affected",
+ "version": "4.0.1"
},
- "title": "Unauthenticated arbitrary file upload and command execution in Vembu products",
- "x_generator": {
- "engine": "Vulnogram 0.0.9"
+ {
+ "status": "affected",
+ "version": "4.0.2"
},
- "x_legacyV4Record": {
- "CVE_data_meta": {
- "ASSIGNER": "cve@mitre.org",
- "DATE_PUBLIC": "2021-07-07T10:49:00.000Z",
- "ID": "CVE-2021-26473",
- "STATE": "PUBLIC",
- "TITLE": "Unauthenticated arbitrary file upload and command execution in Vembu products"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "credit": [
- {
- "lang": "eng",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "eng",
- "value": "Addional research by Frank Breedijk"
- }
- ],
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
- "description": {
- "description_data": [
- {
- "lang": "eng",
- "value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 the http API located at /sgwebservice_o.php action logFilePath allows an attacker to write arbitrary files in the context of the web server process. These files can then be executed remotely by calling the file via the web server."
- }
- ]
- },
- "generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "impact": {
- "cvss": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "UNCHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "version": "3.1"
- }
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "name": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/"
- },
- {
- "name": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/"
- },
- {
- "name": "https://www.wbsec.nl/vembu",
- "refsource": "CONFIRM",
- "url": "https://www.wbsec.nl/vembu"
- },
- {
- "name": "https://csirt.divd.nl/cves/CVE-2021-26473/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/cves/CVE-2021-26473/"
- }
- ]
- },
- "source": {
- "advisory": "DIVD-2020-00011",
- "discovery": "EXTERNAL"
- }
+ {
+ "status": "affected",
+ "version": "4.1.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0.1"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "VembuOffsiteDR",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.2.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0.1"
+ }
+ ],
+ "defaultStatus": "unknown"
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 the http API located at /sgwebservice_o.php action logFilePath allows an attacker to write arbitrary files in the context of the web server process. These files can then be executed remotely by calling the file via the web server.",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 the http API located at /sgwebservice_o.php action logFilePath allows an attacker to write arbitrary files in the context of the web server process. These files can then be executed remotely by calling the file via the web server."
}
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://csirt.divd.nl/cves/CVE-2021-26473/",
+ "tags": [
+ "technical-description"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://www.wbsec.nl/vembu",
+ "tags": [
+ "product"
+ ]
+ }
+ ],
+ "metrics": [
+ {
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ],
+ "cvssV3_1": {
+ "version": "3.1",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 10,
+ "baseSeverity": "CRITICAL",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
+ }
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Discovered by Wietse Boonstra of DIVD",
+ "type": "finder"
+ },
+ {
+ "lang": "en",
+ "value": "Additional research by Frank Breedijk of DIVD",
+ "type": "analyst"
}
- },
- "cveMetadata": {
- "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "assignerShortName": "mitre",
- "cveId": "CVE-2021-26473",
- "datePublished": "2021-07-07T00:00:00",
- "dateUpdated": "2022-03-15T00:00:00",
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ ],
+ "source": {
+ "discovery": "INTERNAL"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ }
+ }
+ }
}
\ No newline at end of file
diff --git a/review_set/2021/26xxx/CVE-2021-26474.json b/review_set/2021/26xxx/CVE-2021-26474.json
index a83192527b11..6858dc106338 100644
--- a/review_set/2021/26xxx/CVE-2021-26474.json
+++ b/review_set/2021/26xxx/CVE-2021-26474.json
@@ -1,225 +1,878 @@
{
- "containers": {
- "cna": {
- "affected": [
- {
- "product": "n/a",
- "vendor": "n/a",
- "versions": [
- {
- "status": "affected",
- "version": "n/a"
- }
- ]
- }
- ],
- "credits": [
- {
- "lang": "en",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "en",
- "value": "Addional research by Frank Breedijk"
- }
- ],
- "datePublic": "2021-07-07T00:00:00",
- "descriptions": [
- {
- "lang": "en",
- "value": "Various Vembu products allow an attacker to execute a (non-blind) http-only Cross Site Request Forgery (Other products or versions of products in this family may be affected too.)"
- }
- ],
- "metrics": [
- {
- "cvssV3_1": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "NONE",
- "baseScore": 8.6,
- "baseSeverity": "HIGH",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "NONE",
- "privilegesRequired": "NONE",
- "scope": "CHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
- "version": "3.1"
- }
- }
- ],
- "problemTypes": [
- {
- "descriptions": [
- {
- "description": "n/a",
- "lang": "en",
- "type": "text"
- }
- ]
- }
- ],
- "providerMetadata": {
- "dateUpdated": "2022-03-15T00:00:00",
- "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "shortName": "mitre"
- },
- "references": [
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://www.wbsec.nl/vembu"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/cves/CVE-2021-26474/"
- }
- ],
- "source": {
- "advisory": "DIVD-2020-00011",
- "discovery": "EXTERNAL"
- },
- "title": "UNAUTHENTICATED SERVER SIDE REQUEST FORGERY IN VEMBU PRODUCTS",
- "x_generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "x_legacyV4Record": {
- "CVE_data_meta": {
- "ASSIGNER": "cve@mitre.org",
- "DATE_PUBLIC": "2021-07-07T10:49:00.000Z",
- "ID": "CVE-2021-26474",
- "STATE": "PUBLIC",
- "TITLE": "UNAUTHENTICATED SERVER SIDE REQUEST FORGERY IN VEMBU PRODUCTS"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "credit": [
- {
- "lang": "eng",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "eng",
- "value": "Addional research by Frank Breedijk"
- }
- ],
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
- "description": {
- "description_data": [
- {
- "lang": "eng",
- "value": "Various Vembu products allow an attacker to execute a (non-blind) http-only Cross Site Request Forgery (Other products or versions of products in this family may be affected too.)"
- }
- ]
- },
- "generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "impact": {
- "cvss": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "NONE",
- "baseScore": 8.6,
- "baseSeverity": "HIGH",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "NONE",
- "privilegesRequired": "NONE",
- "scope": "CHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
- "version": "3.1"
- }
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "name": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/"
- },
- {
- "name": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/"
- },
- {
- "name": "https://www.wbsec.nl/vembu",
- "refsource": "CONFIRM",
- "url": "https://www.wbsec.nl/vembu"
- },
- {
- "name": "https://csirt.divd.nl/cves/CVE-2021-26474/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/cves/CVE-2021-26474/"
- }
- ]
- },
- "source": {
- "advisory": "DIVD-2020-00011",
- "discovery": "EXTERNAL"
- }
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0",
+ "cveMetadata": {
+ "cveId": "CVE-2021-26474",
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000"
+ },
+ "title": "Unauthenticated server side request forgery in Vembu Products",
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "lang": "en",
+ "cweId": "CWE-918",
+ "description": "CWE-918 Server-Side Request Forgery (SSRF)",
+ "type": "CWE"
}
+ ]
}
- },
- "cveMetadata": {
- "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "assignerShortName": "mitre",
- "cveId": "CVE-2021-26474",
- "datePublished": "2021-07-07T00:00:00",
- "dateUpdated": "2022-03-15T00:00:00",
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-664",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-664 Server Side Request Forgery"
+ }
+ ]
+ }
+ ],
+ "affected": [
+ {
+ "vendor": "Vembu",
+ "product": "VembuBDR",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "3.5.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.7.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.8.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.0 update 1"
+ },
+ {
+ "status": "affected",
+ "version": "3.9.1 update 1"
+ },
+ {
+ "status": "affected",
+ "version": "4.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.0.1"
+ },
+ {
+ "status": "affected",
+ "version": "4.0.2"
+ },
+ {
+ "status": "affected",
+ "version": "4.1.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0.1"
+ },
+ {
+ "status": "affected",
+ "version": "6.1.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "360DR",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "BackSpace",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "BackupService",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "5.2.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "BackupSolution",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "BaltnetaOnlineBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.1.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "ClearPointBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "CloudStor",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "CloudStore",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "CtrlSDataAssurance",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "3.5.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.4.2"
+ },
+ {
+ "status": "affected",
+ "version": "4.5.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "DataAddicts",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "DataBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.3.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "DataCrib",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "5.2.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "DataVault",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "5.1.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "DBS",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "EclipseBaaS",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "EnklareBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "5.1.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "FastBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "Guardian",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "5.1.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "HotlinkBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "IronVault",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "iwksbackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "5.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "Level365OnlineBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "LocalTel_RDS",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "MBCBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "Netbackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "5.2.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "NetrepidHostedBackups",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.1"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "OffsiteVAULT",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "OnlineBackup_Client",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "5.1.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "OnyxSync",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "Opusbackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "P2VOnlineBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "ProdigyBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "QloudwiseBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.2"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "RAKVault",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "ReflexBackups",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "RemoteDataRecovery",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "5.1.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "saf-gate",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "SamcoStore",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "StoreGrid",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "3.1.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.5.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.0.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.1"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.1.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.4.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.4.1"
+ },
+ {
+ "status": "affected",
+ "version": "4.4.1.0"
+ },
+ {
+ "status": "affected",
+ "version": "4.5.0"
+ },
+ {
+ "status": "affected",
+ "version": "5.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "5.1.0"
+ },
+ {
+ "status": "affected",
+ "version": "5.2.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "StoreSafeDC",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "StorNet",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0"
+ },
+ {
+ "status": "affected",
+ "version": "5.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "STPOffsite",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "Syntax",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "TBITBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "5.1.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "TechNetBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "TheDataVault",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.5.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "TitanBackup",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "5.1.0"
+ },
+ {
+ "status": "affected",
+ "version": "5.2.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "TruStor",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ },
+ {
+ "status": "affected",
+ "version": "3.5.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "UndergroundBackups",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "VELOCIsecure",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "VembuOffsiteDR",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.2.0.1"
+ },
+ {
+ "status": "affected",
+ "version": "4.2.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "WrightOnline",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "XpressSTOR",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ },
+ {
+ "vendor": "Vembu",
+ "product": "ZipData",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "4.4.0.0"
+ }
+ ],
+ "defaultStatus": "unknown"
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Various Vembu products allow an attacker to execute a (non-blind) http-only Cross Site Request Forgery\\n\\n(Other products or versions of products in this family may be affected too.",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "Various Vembu products allow an attacker to execute a (non-blind) http-only Cross Site Request Forgery\\n\\n(Other products or versions of products in this family may be affected too."
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://csirt.divd.nl/cves/CVE-2021-26474/",
+ "tags": [
+ "technical-description"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://www.wbsec.nl/vembu",
+ "tags": [
+ "product"
+ ]
+ }
+ ],
+ "metrics": [
+ {
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ],
+ "cvssV3_1": {
+ "version": "3.1",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.6,
+ "baseSeverity": "HIGH",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
+ }
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Discovered by Wietse Boonstra of DIVD",
+ "type": "finder"
+ },
+ {
+ "lang": "en",
+ "value": "Additional research by Frank Breedijk of DIVD",
+ "type": "analyst"
+ }
+ ],
+ "source": {
+ "discovery": "INTERNAL"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ }
+ }
+ }
}
\ No newline at end of file
diff --git a/review_set/2021/30xxx/CVE-2021-30116.json b/review_set/2021/30xxx/CVE-2021-30116.json
index 67b24c581446..4100c754b42a 100644
--- a/review_set/2021/30xxx/CVE-2021-30116.json
+++ b/review_set/2021/30xxx/CVE-2021-30116.json
@@ -1,211 +1,162 @@
{
- "containers": {
- "cna": {
- "affected": [
- {
- "product": "n/a",
- "vendor": "n/a",
- "versions": [
- {
- "status": "affected",
- "version": "n/a"
- }
- ]
- }
- ],
- "credits": [
- {
- "lang": "en",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "en",
- "value": "Additional research by Frank Breedijk"
- }
- ],
- "descriptions": [
- {
- "lang": "en",
- "value": "Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021."
- }
- ],
- "metrics": [
- {
- "cvssV3_1": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 10.0,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "CHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
- "version": "3.1"
- }
- }
- ],
- "problemTypes": [
- {
- "descriptions": [
- {
- "description": "n/a",
- "lang": "en",
- "type": "text"
- }
- ]
- }
- ],
- "providerMetadata": {
- "dateUpdated": "2022-03-15T00:00:00",
- "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "shortName": "mitre"
- },
- "references": [
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/2021/07/04/Kaseya-Case-Update-2/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689-Important-Notice-July-2nd-2021"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- }
- ],
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "EXTERNAL"
- },
- "title": "Unauthenticated credential leak and business logic flaw in Kaseya VSA <= v9.5.6",
- "x_generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "x_legacyV4Record": {
- "CVE_data_meta": {
- "ASSIGNER": "cve@mitre.org",
- "ID": "CVE-2021-30116",
- "STATE": "PUBLIC",
- "TITLE": "Unauthenticated credential leak and business logic flaw in Kaseya VSA <= v9.5.6"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "credit": [
- {
- "lang": "eng",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "eng",
- "value": "Additional research by Frank Breedijk"
- }
- ],
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
- "description": {
- "description_data": [
- {
- "lang": "eng",
- "value": "Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021."
- }
- ]
- },
- "generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "impact": {
- "cvss": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 10,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "CHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
- "version": "3.1"
- }
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "name": "https://csirt.divd.nl/2021/07/04/Kaseya-Case-Update-2/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/2021/07/04/Kaseya-Case-Update-2/"
- },
- {
- "name": "https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689-Important-Notice-July-2nd-2021",
- "refsource": "CONFIRM",
- "url": "https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689-Important-Notice-July-2nd-2021"
- },
- {
- "name": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- }
- ]
- },
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "EXTERNAL"
- }
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0",
+ "cveMetadata": {
+ "cveId": "CVE-2021-30116",
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "assignerShortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000",
+ "shortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z"
+ },
+ "title": "Unauthenticated credential leak and business logic flaw in Kaseya VSA <= v9.5.6",
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "lang": "en",
+ "cweId": "CWE-522",
+ "description": "CWE-522 Insufficiently Protected Credentials",
+ "type": "text"
}
+ ]
}
- },
- "cveMetadata": {
- "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "assignerShortName": "mitre",
- "cveId": "CVE-2021-30116",
- "dateUpdated": "2022-03-15T00:00:00",
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-115",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-115 Authentication Bypass"
+ }
+ ]
+ }
+ ],
+ "affected": [
+ {
+ "vendor": "Kaseya",
+ "product": "Kaseya VSA on premise",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "v9.0",
+ "lessThanOrEqual": "v9.5.6"
+ }
+ ],
+ "defaultStatus": "unaffected"
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021.\n",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021.
"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://csirt.divd.nl/2021/07/04/Kaseya-Case-Update-2/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689-Important-Notice-July-2nd-2021",
+ "tags": [
+ "vendor-advisory"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ }
+ ],
+ "metrics": [
+ {
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ],
+ "cvssV3_1": {
+ "version": "3.1",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
+ }
+ }
+ ],
+ "configurations": [
+ {
+ "lang": "en",
+ "value": "On premise version only",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "On premise version only"
+ }
+ ]
+ }
+ ],
+ "exploits": [
+ {
+ "lang": "en",
+ "value": "Exploited in the wild",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "Exploited in the wild"
+ }
+ ]
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Discovered by Wietse Boonstra of DIVD",
+ "type": "finder"
+ },
+ {
+ "lang": "en",
+ "value": "Additional research by Frank Breedijk of DIVD",
+ "type": "analyst"
+ }
+ ],
+ "source": {
+ "advisory": "DIVD-2021-00011",
+ "discovery": "INTERNAL"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.0.9"
+ }
+ }
+ }
}
\ No newline at end of file
diff --git a/review_set/2021/30xxx/CVE-2021-30117.json b/review_set/2021/30xxx/CVE-2021-30117.json
index 72314a9d05b3..461505f009d8 100644
--- a/review_set/2021/30xxx/CVE-2021-30117.json
+++ b/review_set/2021/30xxx/CVE-2021-30117.json
@@ -1,207 +1,166 @@
{
- "containers": {
- "cna": {
- "affected": [
- {
- "product": "n/a",
- "vendor": "n/a",
- "versions": [
- {
- "status": "affected",
- "version": "n/a"
- }
- ]
- }
- ],
- "credits": [
- {
- "lang": "en",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "en",
- "value": "Additional research by Frank Breedijk"
- }
- ],
- "descriptions": [
- {
- "lang": "en",
- "value": "SQL injection exists in Kaseya VSA before 9.5.6."
- }
- ],
- "metrics": [
- {
- "cvssV3_1": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "UNCHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "version": "3.1"
- }
- }
- ],
- "problemTypes": [
- {
- "descriptions": [
- {
- "description": "n/a",
- "lang": "en",
- "type": "text"
- }
- ]
- }
- ],
- "providerMetadata": {
- "dateUpdated": "2022-03-15T00:00:00",
- "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "shortName": "mitre"
- },
- "references": [
- {
- "tags": [
- "x_refsource_MISC"
- ],
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021"
- }
- ],
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "UNKNOWN"
- },
- "title": "Authenticated SQL injection in Kaseya VSA < v9.5.6",
- "x_generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "x_legacyV4Record": {
- "CVE_data_meta": {
- "AKA": "",
- "ASSIGNER": "cve@mitre.org",
- "DATE_PUBLIC": "",
- "ID": "CVE-2021-30117",
- "STATE": "PUBLIC",
- "TITLE": "Authenticated SQL injection in Kaseya VSA < v9.5.6"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "configuration": [],
- "credit": [
- {
- "lang": "eng",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "eng",
- "value": "Additional research by Frank Breedijk"
- }
- ],
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
- "description": {
- "description_data": [
- {
- "lang": "eng",
- "value": "SQL injection exists in Kaseya VSA before 9.5.6."
- }
- ]
- },
- "exploit": [],
- "generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "impact": {
- "cvss": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "UNCHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "version": "3.1"
- }
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "name": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
- "refsource": "MISC",
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- },
- {
- "name": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021",
- "refsource": "CONFIRM",
- "url": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021"
- }
- ]
- },
- "solution": [],
- "source": {
- "advisory": "DIVD-2021-00011",
- "defect": [],
- "discovery": "UNKNOWN"
- },
- "work_around": []
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0",
+ "cveMetadata": {
+ "cveId": "CVE-2021-30117",
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "assignerShortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000",
+ "shortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z"
+ },
+ "title": "Authenticated SQL injection in Kaseya VSA < v9.5.6",
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "lang": "en",
+ "cweId": "CWE-89",
+ "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
+ "type": "text"
}
+ ]
}
- },
- "cveMetadata": {
- "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "assignerShortName": "mitre",
- "cveId": "CVE-2021-30117",
- "dateUpdated": "2022-03-15T00:00:00",
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-66",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-66 SQL Injection"
+ }
+ ]
+ }
+ ],
+ "affected": [
+ {
+ "vendor": "Kaseya",
+ "product": "Kaseya VSA",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "v9.0",
+ "lessThan": "v9.5.6"
+ }
+ ],
+ "defaultStatus": "unaffected"
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Authenticated SQL injection exists in Kaseya VSA before 9.5.6.\n",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "Authenticated SQL injection exists in Kaseya VSA before 9.5.6.
"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021",
+ "tags": [
+ "vendor-advisory"
+ ]
+ }
+ ],
+ "metrics": [
+ {
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ],
+ "cvssV3_1": {
+ "version": "3.1",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
+ }
+ },
+ {
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "In combination with CVE-2021-30116"
+ }
+ ],
+ "cvssV3_1": {
+ "version": "3.1",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
+ }
+ }
+ ],
+ "configurations": [
+ {
+ "lang": "en",
+ "value": "Both the SaaS and on Premise version are vulnerable",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "Both the SaaS and on Premise version are vulnerable"
+ }
+ ]
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Discovered by Wietse Boonstra of DIVD",
+ "type": "finder"
+ },
+ {
+ "lang": "en",
+ "value": "Additional research by Frank Breedijk of DIVD",
+ "type": "analyst"
+ }
+ ],
+ "source": {
+ "advisory": "DIVD-2021-00011",
+ "discovery": "INTERNAL"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.0.9"
+ }
+ }
+ }
}
\ No newline at end of file
diff --git a/review_set/2021/30xxx/CVE-2021-30118.json b/review_set/2021/30xxx/CVE-2021-30118.json
index ae66944fdf68..c7495f3781de 100644
--- a/review_set/2021/30xxx/CVE-2021-30118.json
+++ b/review_set/2021/30xxx/CVE-2021-30118.json
@@ -1,222 +1,140 @@
{
- "containers": {
- "cna": {
- "affected": [
- {
- "product": "n/a",
- "vendor": "n/a",
- "versions": [
- {
- "status": "affected",
- "version": "n/a"
- }
- ]
- }
- ],
- "credits": [
- {
- "lang": "en",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "en",
- "value": "Additional research by Frank Breedijk"
- }
- ],
- "descriptions": [
- {
- "lang": "en",
- "value": "Kaseya VSA before 9.5.5 allows remote code execution."
- }
- ],
- "metrics": [
- {
- "cvssV3_1": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "UNCHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "version": "3.1"
- }
- }
- ],
- "problemTypes": [
- {
- "descriptions": [
- {
- "description": "n/a",
- "lang": "en",
- "type": "text"
- }
- ]
- }
- ],
- "providerMetadata": {
- "dateUpdated": "2022-03-15T00:00:00",
- "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "shortName": "mitre"
- },
- "references": [
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/CVE-2021-30118"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/DIVD-2021-00011"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019054377-9-5-5-Feature-Release-10-April-2021"
- }
- ],
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "UNKNOWN"
- },
- "title": "Unauthenticated Remote Code Execution in Kaseya VSA < v9.5.5",
- "x_generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "x_legacyV4Record": {
- "CVE_data_meta": {
- "ASSIGNER": "cve@mitre.org",
- "ID": "CVE-2021-30118",
- "STATE": "PUBLIC",
- "TITLE": "Unauthenticated Remote Code Execution in Kaseya VSA < v9.5.5"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "credit": [
- {
- "lang": "eng",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "eng",
- "value": "Additional research by Frank Breedijk"
- }
- ],
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
- "description": {
- "description_data": [
- {
- "lang": "eng",
- "value": "Kaseya VSA before 9.5.5 allows remote code execution."
- }
- ]
- },
- "generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "impact": {
- "cvss": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "NONE",
- "scope": "UNCHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "version": "3.1"
- }
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "name": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- },
- {
- "name": "https://csirt.divd.nl/CVE-2021-30118",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/CVE-2021-30118"
- },
- {
- "name": "https://csirt.divd.nl/DIVD-2021-00011",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/DIVD-2021-00011"
- },
- {
- "name": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019054377-9-5-5-Feature-Release-10-April-2021",
- "refsource": "CONFIRM",
- "url": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019054377-9-5-5-Feature-Release-10-April-2021"
- }
- ]
- },
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "UNKNOWN"
- }
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0",
+ "cveMetadata": {
+ "cveId": "CVE-2021-30118",
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "assignerShortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000",
+ "shortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z"
+ },
+ "title": "Unauthenticated Remote Code Execution in Kaseya VSA < v9.5.5",
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "lang": "en",
+ "description": "n/a",
+ "type": "text"
}
+ ]
}
- },
- "cveMetadata": {
- "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "assignerShortName": "mitre",
- "cveId": "CVE-2021-30118",
- "dateUpdated": "2022-03-15T00:00:00",
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-175",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-175 Code Inclusion"
+ }
+ ]
+ }
+ ],
+ "affected": [
+ {
+ "vendor": "Kaseya",
+ "product": "Kasey VSA",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "n/a"
+ }
+ ],
+ "defaultStatus": "unaffected"
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Kaseya VSA before 9.5.5 allows remote code execution.\n",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "Kaseya VSA before 9.5.5 allows remote code execution.
"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/CVE-2021-30118",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/DIVD-2021-00011",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019054377-9-5-5-Feature-Release-10-April-2021",
+ "tags": [
+ "release-notes"
+ ]
+ }
+ ],
+ "metrics": [
+ {
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ],
+ "cvssV3_1": {
+ "version": "3.1",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
+ }
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Discovered by Wietse Boonstra of DIVD",
+ "type": "finder"
+ },
+ {
+ "lang": "en",
+ "value": "Additional research by Frank Breedijk of DIVD",
+ "type": "analyst"
+ }
+ ],
+ "source": {
+ "advisory": "DIVD-2021-00011",
+ "discovery": "INTERNAL"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.0.9"
+ }
+ }
+ }
}
\ No newline at end of file
diff --git a/review_set/2021/30xxx/CVE-2021-30119.json b/review_set/2021/30xxx/CVE-2021-30119.json
index c053f6e15fea..192999745451 100644
--- a/review_set/2021/30xxx/CVE-2021-30119.json
+++ b/review_set/2021/30xxx/CVE-2021-30119.json
@@ -1,211 +1,137 @@
{
- "containers": {
- "cna": {
- "affected": [
- {
- "product": "n/a",
- "vendor": "n/a",
- "versions": [
- {
- "status": "affected",
- "version": "n/a"
- }
- ]
- }
- ],
- "credits": [
- {
- "lang": "en",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "en",
- "value": "Additional research by Frank Breedijk and Hidde Smit"
- }
- ],
- "descriptions": [
- {
- "lang": "en",
- "value": "Cross Site Scripting (XSS) exists in Kaseya VSA before 9.5.7."
- }
- ],
- "metrics": [
- {
- "cvssV3_1": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "NONE",
- "baseScore": 5.4,
- "baseSeverity": "MEDIUM",
- "confidentialityImpact": "LOW",
- "integrityImpact": "LOW",
- "privilegesRequired": "LOW",
- "scope": "CHANGED",
- "userInteraction": "REQUIRED",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
- "version": "3.1"
- }
- }
- ],
- "problemTypes": [
- {
- "descriptions": [
- {
- "description": "n/a",
- "lang": "en",
- "type": "text"
- }
- ]
- }
- ],
- "providerMetadata": {
- "dateUpdated": "2022-03-15T00:00:00",
- "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "shortName": "mitre"
- },
- "references": [
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/DIVD-2021-00011"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/CVE-2021-30119"
- }
- ],
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "EXTERNAL"
- },
- "title": "Authenticated Authenticated reflective XSS in Kaseya VSA <= v9.5.6",
- "x_generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "x_legacyV4Record": {
- "CVE_data_meta": {
- "ASSIGNER": "cve@mitre.org",
- "ID": "CVE-2021-30119",
- "STATE": "PUBLIC",
- "TITLE": "Authenticated Authenticated reflective XSS in Kaseya VSA <= v9.5.6"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "credit": [
- {
- "lang": "eng",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "eng",
- "value": "Additional research by Frank Breedijk and Hidde Smit"
- }
- ],
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
- "description": {
- "description_data": [
- {
- "lang": "eng",
- "value": "Cross Site Scripting (XSS) exists in Kaseya VSA before 9.5.7."
- }
- ]
- },
- "generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "impact": {
- "cvss": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "NONE",
- "baseScore": 5.4,
- "baseSeverity": "MEDIUM",
- "confidentialityImpact": "LOW",
- "integrityImpact": "LOW",
- "privilegesRequired": "LOW",
- "scope": "CHANGED",
- "userInteraction": "REQUIRED",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
- "version": "3.1"
- }
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "name": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- },
- {
- "name": "https://csirt.divd.nl/DIVD-2021-00011",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/DIVD-2021-00011"
- },
- {
- "name": "https://csirt.divd.nl/CVE-2021-30119",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/CVE-2021-30119"
- }
- ]
- },
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "EXTERNAL"
- }
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0",
+ "cveMetadata": {
+ "cveId": "CVE-2021-30119",
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "assignerShortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000",
+ "shortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z"
+ },
+ "title": "Authenticated Authenticated reflective XSS in Kaseya VSA <= v9.5.6",
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "lang": "en",
+ "cweId": "CWE-79",
+ "description": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
+ "type": "text"
}
+ ]
}
- },
- "cveMetadata": {
- "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "assignerShortName": "mitre",
- "cveId": "CVE-2021-30119",
- "dateUpdated": "2022-03-15T00:00:00",
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-63",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-63 Cross-Site Scripting (XSS)"
+ }
+ ]
+ }
+ ],
+ "affected": [
+ {
+ "vendor": "Kaseya",
+ "product": "Kaseya VSA",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "v9.0",
+ "lessThanOrEqual": "v9.5.6"
+ }
+ ],
+ "defaultStatus": "unaffected"
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nCross Site Scripting (XSS) exists in Kaseya VSA before 9.5.7.\n\n\n",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "\n\nCross Site Scripting (XSS) exists in Kaseya VSA before 9.5.7.\n\n
"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
+ "tags": [
+ "vendor-advisory",
+ "release-notes"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/DIVD-2021-00011",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://csirt.divd.nl/CVE-2021-30119",
+ "tags": [
+ "third-party-advisory"
+ ]
+ }
+ ],
+ "metrics": [
+ {
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ],
+ "cvssV3_1": {
+ "version": "3.1",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
+ }
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Discovered by Wietse Boonstra",
+ "type": "finder"
+ },
+ {
+ "lang": "en",
+ "value": "Additional research by Frank Breedijk and Hidde Smit",
+ "type": "analyst"
+ }
+ ],
+ "source": {
+ "advisory": "DIVD-2021-00011",
+ "discovery": "INTERNAL"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.0.9"
+ }
+ }
+ }
}
\ No newline at end of file
diff --git a/review_set/2021/30xxx/CVE-2021-30120.json b/review_set/2021/30xxx/CVE-2021-30120.json
index 5274644c0995..fd20bcbbcd67 100644
--- a/review_set/2021/30xxx/CVE-2021-30120.json
+++ b/review_set/2021/30xxx/CVE-2021-30120.json
@@ -1,203 +1,132 @@
{
- "containers": {
- "cna": {
- "affected": [
- {
- "product": "n/a",
- "vendor": "n/a",
- "versions": [
- {
- "status": "affected",
- "version": "n/a"
- }
- ]
- }
- ],
- "credits": [
- {
- "lang": "en",
- "value": "Discovered by Wietse Boonstra"
- }
- ],
- "descriptions": [
- {
- "lang": "en",
- "value": "Kaseya VSA through 9.5.7 allows attackers to bypass the 2FA requirement."
- }
- ],
- "metrics": [
- {
- "cvssV3_1": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 9.9,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "LOW",
- "scope": "CHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
- "version": "3.1"
- }
- }
- ],
- "problemTypes": [
- {
- "descriptions": [
- {
- "description": "n/a",
- "lang": "en",
- "type": "text"
- }
- ]
- }
- ],
- "providerMetadata": {
- "dateUpdated": "2022-03-15T00:00:00",
- "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "shortName": "mitre"
- },
- "references": [
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csrit.divd.nl/DIVD-2021-00011"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csrit.divd.nl/CVE-2021-30120"
- }
- ],
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "EXTERNAL"
- },
- "title": "2FA bypass in Kaseya VSA <= v9.5.6",
- "x_generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "x_legacyV4Record": {
- "CVE_data_meta": {
- "ASSIGNER": "cve@mitre.org",
- "ID": "CVE-2021-30120",
- "STATE": "PUBLIC",
- "TITLE": "2FA bypass in Kaseya VSA <= v9.5.6"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "credit": [
- {
- "lang": "eng",
- "value": "Discovered by Wietse Boonstra"
- }
- ],
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
- "description": {
- "description_data": [
- {
- "lang": "eng",
- "value": "Kaseya VSA through 9.5.7 allows attackers to bypass the 2FA requirement."
- }
- ]
- },
- "generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "impact": {
- "cvss": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "HIGH",
- "baseScore": 9.9,
- "baseSeverity": "CRITICAL",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "privilegesRequired": "LOW",
- "scope": "CHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
- "version": "3.1"
- }
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "name": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- },
- {
- "name": "https://csrit.divd.nl/DIVD-2021-00011",
- "refsource": "CONFIRM",
- "url": "https://csrit.divd.nl/DIVD-2021-00011"
- },
- {
- "name": "https://csrit.divd.nl/CVE-2021-30120",
- "refsource": "CONFIRM",
- "url": "https://csrit.divd.nl/CVE-2021-30120"
- }
- ]
- },
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "EXTERNAL"
- }
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0",
+ "cveMetadata": {
+ "cveId": "CVE-2021-30120",
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "assignerShortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000",
+ "shortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z"
+ },
+ "title": "2FA bypass in Kaseya VSA <= v9.5.6",
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "lang": "en",
+ "cweId": "CWE-287",
+ "description": "CWE-287 Improper Authentication",
+ "type": "text"
}
+ ]
}
- },
- "cveMetadata": {
- "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "assignerShortName": "mitre",
- "cveId": "CVE-2021-30120",
- "dateUpdated": "2022-03-15T00:00:00",
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-115",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-115 Authentication Bypass"
+ }
+ ]
+ }
+ ],
+ "affected": [
+ {
+ "vendor": "Kaseya",
+ "product": "Kaseya VSA",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "v9.0",
+ "lessThanOrEqual": "v9.5.6"
+ }
+ ],
+ "defaultStatus": "unaffected"
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nKaseya VSA through 9.5.7 allows attackers to bypass the 2FA requirement.\n\n\n",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "\n\nKaseya VSA through 9.5.7 allows attackers to bypass the 2FA requirement.\n\n
"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
+ "tags": [
+ "release-notes",
+ "vendor-advisory"
+ ]
+ },
+ {
+ "url": "https://csrit.divd.nl/DIVD-2021-00011",
+ "tags": [
+ "third-party-advisory"
+ ]
+ },
+ {
+ "url": "https://csrit.divd.nl/CVE-2021-30120",
+ "tags": [
+ "third-party-advisory"
+ ]
+ }
+ ],
+ "metrics": [
+ {
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ],
+ "cvssV3_1": {
+ "version": "3.1",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
+ }
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Discovered by Wietse Boonstra of DIVD",
+ "type": "finder"
+ }
+ ],
+ "source": {
+ "advisory": "DIVD-2021-00011",
+ "discovery": "INTERNAL"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.0.9"
+ }
+ }
+ }
}
\ No newline at end of file
diff --git a/review_set/2021/30xxx/CVE-2021-30121.json b/review_set/2021/30xxx/CVE-2021-30121.json
index ea7eff5f2a3c..6c065b9a43de 100644
--- a/review_set/2021/30xxx/CVE-2021-30121.json
+++ b/review_set/2021/30xxx/CVE-2021-30121.json
@@ -1,211 +1,159 @@
{
- "containers": {
- "cna": {
- "affected": [
- {
- "product": "n/a",
- "vendor": "n/a",
- "versions": [
- {
- "status": "affected",
- "version": "n/a"
- }
- ]
- }
- ],
- "credits": [
- {
- "lang": "en",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "en",
- "value": "Additional research by Frank Breedijk"
- }
- ],
- "descriptions": [
- {
- "lang": "en",
- "value": "Authenticated local file inclusion in Kaseya VSA < v9.5.6"
- }
- ],
- "metrics": [
- {
- "cvssV3_1": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "NONE",
- "baseScore": 6.5,
- "baseSeverity": "MEDIUM",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "NONE",
- "privilegesRequired": "LOW",
- "scope": "UNCHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
- "version": "3.1"
- }
- }
- ],
- "problemTypes": [
- {
- "descriptions": [
- {
- "description": "n/a",
- "lang": "en",
- "type": "text"
- }
- ]
- }
- ],
- "providerMetadata": {
- "dateUpdated": "2022-03-15T00:00:00",
- "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "shortName": "mitre"
- },
- "references": [
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/DIVD-2021-00011"
- },
- {
- "tags": [
- "x_refsource_CONFIRM"
- ],
- "url": "https://csirt.divd.nl/CVE-2021-30121"
- }
- ],
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "EXTERNAL"
- },
- "title": "Authenticated local file inclusion in Kaseya VSA < v9.5.6",
- "x_generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "x_legacyV4Record": {
- "CVE_data_meta": {
- "ASSIGNER": "cve@mitre.org",
- "ID": "CVE-2021-30121",
- "STATE": "PUBLIC",
- "TITLE": "Authenticated local file inclusion in Kaseya VSA < v9.5.6"
- },
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "credit": [
- {
- "lang": "eng",
- "value": "Discovered by Wietse Boonstra"
- },
- {
- "lang": "eng",
- "value": "Additional research by Frank Breedijk"
- }
- ],
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
- "description": {
- "description_data": [
- {
- "lang": "eng",
- "value": "Authenticated local file inclusion in Kaseya VSA < v9.5.6"
- }
- ]
- },
- "generator": {
- "engine": "Vulnogram 0.0.9"
- },
- "impact": {
- "cvss": {
- "attackComplexity": "LOW",
- "attackVector": "NETWORK",
- "availabilityImpact": "NONE",
- "baseScore": 6.5,
- "baseSeverity": "MEDIUM",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "NONE",
- "privilegesRequired": "LOW",
- "scope": "UNCHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
- "version": "3.1"
- }
- },
- "problemtype": {
- "problemtype_data": [
- {
- "description": [
- {
- "lang": "eng",
- "value": "n/a"
- }
- ]
- }
- ]
- },
- "references": {
- "reference_data": [
- {
- "name": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
- },
- {
- "name": "https://csirt.divd.nl/DIVD-2021-00011",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/DIVD-2021-00011"
- },
- {
- "name": "https://csirt.divd.nl/CVE-2021-30121",
- "refsource": "CONFIRM",
- "url": "https://csirt.divd.nl/CVE-2021-30121"
- }
- ]
- },
- "source": {
- "advisory": "DIVD-2021-00011",
- "discovery": "EXTERNAL"
- }
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0",
+ "cveMetadata": {
+ "cveId": "CVE-2021-30121",
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "assignerShortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000",
+ "shortName": "mitre",
+ "dateUpdated": "2022-03-14T23:00:00.000Z"
+ },
+ "title": "Authenticated local file inclusion in Kaseya VSA < v9.5.6",
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "lang": "en",
+ "description": "n/a",
+ "type": "text"
}
+ ]
}
- },
- "cveMetadata": {
- "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
- "assignerShortName": "mitre",
- "cveId": "CVE-2021-30121",
- "dateUpdated": "2022-03-15T00:00:00",
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-251",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-251 Local Code Inclusion"
+ }
+ ]
+ }
+ ],
+ "affected": [
+ {
+ "vendor": "Kaseya",
+ "product": "VSA",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "v9.0",
+ "lessThan": "v9.5.6"
+ }
+ ],
+ "defaultStatus": "unaffected"
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nAuthenticated local file inclusion in Kaseya VSA < v9.5.6\n\n\n\n\n",
+ "supportingMedia": [
+ {
+ "type": "text/html",
+ "base64": false,
+ "value": "\n\n
Authenticated local file inclusion in Kaseya VSA < v9.5.6
\n\nA vulnerability in Qlik Sense Enterprise on Windows could allow an remote attacker to enumerate domain user accounts. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow the attacker to compare the response time that are returned by the affected system to determine which accounts are valid user accounts. Affected systems are only vulnerable if they have LDAP configured.
" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/cases/DIVD-2021-00021", + "tags": [ + "third-party-advisory" + ] + }, + { + "url": "https://csirt.divd.nl/cves/CVE-2022-0564", + "tags": [ + "third-party-advisory" + ] + }, + { + "url": "https://community.qlik.com/t5/Release-Notes/Qlik-Sense-Enterprise-on-Windows-November-2021-Initial-Release/ta-p/1856531" + } + ], + "metrics": [ + { + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ], + "cvssV3_1": { + "version": "3.1", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + } + ], + "workarounds": [ + { + "lang": "en", + "value": "\nDisable internet-facing NTLM endpoints, e.g. internal_windows_authentication, to avoid domain enumeration.\n\n\n", + "supportingMedia": [ + { + "type": "text/html", + "base64": false, + "value": "Disable internet-facing NTLM endpoints, e.g. internal_windows_authentication, to avoid domain enumeration." + } + ] + } + ], + "solutions": [ + { + "lang": "en", + "value": "\nUpdate Qlik Sense Enterprise on Windows to version 14.44.0 or higher.\n\n\n", + "supportingMedia": [ + { + "type": "text/html", + "base64": false, + "value": "Update Qlik Sense Enterprise on Windows to version 14.44.0 or higher." + } + ] + } + ], + "credits": [ + { + "lang": "en", + "value": "This issue was discovered by Hidde Smit of DIVD", + "type": "finder" + } + ], + "source": { + "advisory": "DIVD-2021-00021", + "discovery": "INTERNAL" + }, + "x_generator": { + "engine": "Vulnogram 0.0.9" + } + } + } } \ No newline at end of file diff --git a/review_set/2022/24xxx/CVE-2022-24384.json b/review_set/2022/24xxx/CVE-2022-24384.json index ffed0070d4d9..a8cbd8f90d1c 100644 --- a/review_set/2022/24xxx/CVE-2022-24384.json +++ b/review_set/2022/24xxx/CVE-2022-24384.json @@ -1,200 +1,126 @@ { - "containers": { - "cna": { - "affected": [ - { - "product": "SmarterTrack", - "vendor": "SmarterTools", - "versions": [ - { - "lessThan": "Build 8075", - "status": "affected", - "version": "100.x", - "versionType": "custom" - } - ] - } - ], - "credits": [ - { - "lang": "en", - "value": "Discovered by Wietse Boonstra of DIVD" - } - ], - "datePublic": "2022-03-11T00:00:00", - "descriptions": [ - { - "lang": "en", - "value": "Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010." - } - ], - "metrics": [ - { - "cvssV3_1": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "version": "3.1" - } - } - ], - "problemTypes": [ - { - "descriptions": [ - { - "cweId": "CWE-79", - "description": "CWE-79 Cross-site Scripting (XSS)", - "lang": "en", - "type": "CWE" - } - ] - } - ], - "providerMetadata": { - "dateUpdated": "2022-03-15T00:00:00", - "orgId": "b87402ff-ae37-4194-9dae-31abdbd6f217", - "shortName": "DIVD" - }, - "references": [ - { - "tags": [ - "x_refsource_CONFIRM" - ], - "url": "https://csirt.divd.nl/DIVD-2021-00029" - }, - { - "tags": [ - "x_refsource_CONFIRM" - ], - "url": "https://csirt.divd.nl/CVE-2022-24384" - } - ], - "source": { - "advisory": "DIVD-2021-00029", - "discovery": "INTERNAL" - }, - "title": "Reflective XSS on SmarterTrack v100.0.8019.14010", - "x_generator": { - "engine": "Vulnogram 0.0.9" - }, - "x_legacyV4Record": { - "CVE_data_meta": { - "ASSIGNER": "csirt@divd.nl", - "DATE_PUBLIC": "2022-03-11T23:00:00.000Z", - "ID": "CVE-2022-24384", - "STATE": "PUBLIC", - "TITLE": "Reflective XSS on SmarterTrack v100.0.8019.14010" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "SmarterTrack", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "100.x", - "version_value": "Build 8075" - } - ] - } - } - ] - }, - "vendor_name": "SmarterTools" - } - ] - } - }, - "credit": [ - { - "lang": "eng", - "value": "Discovered by Wietse Boonstra of DIVD" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010." - } - ] - }, - "generator": { - "engine": "Vulnogram 0.0.9" - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "version": "3.1" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79 Cross-site Scripting (XSS)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://csirt.divd.nl/DIVD-2021-00029", - "refsource": "CONFIRM", - "url": "https://csirt.divd.nl/DIVD-2021-00029" - }, - { - "name": "https://csirt.divd.nl/CVE-2022-24384", - "refsource": "CONFIRM", - "url": "https://csirt.divd.nl/CVE-2022-24384" - } - ] - }, - "source": { - "advisory": "DIVD-2021-00029", - "discovery": "INTERNAL" - } + "dataType": "CVE_RECORD", + "dataVersion": "5.0", + "cveMetadata": { + "cveId": "CVE-2022-24384", + "assignerOrgId": "00000000-0000-4000-9000-000000000000", + "assignerShortName": "DIVD", + "dateUpdated": "2022-03-14T23:00:00.000Z", + "serial": 1, + "datePublished": "2022-03-10T23:00:00.000Z", + "state": "PUBLISHED" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "00000000-0000-4000-9000-000000000000", + "shortName": "DIVD", + "dateUpdated": "2022-03-14T23:00:00.000Z" + }, + "title": "Reflective XSS on SmarterTrack v100.0.8019.14010", + "datePublic": "2022-03-10T23:00:00.000Z", + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "cweId": "CWE-79", + "description": "CWE-79 Cross-site Scripting (XSS)", + "type": "CWE" } + ] } - }, - "cveMetadata": { - "assignerOrgId": "b87402ff-ae37-4194-9dae-31abdbd6f217", - "assignerShortName": "DIVD", - "cveId": "CVE-2022-24384", - "datePublished": "2022-03-11T00:00:00", - "dateUpdated": "2022-03-15T00:00:00", - "state": "PUBLISHED" - }, - "dataType": "CVE_RECORD", - "dataVersion": "5.0" + ], + "impacts": [ + { + "capecId": "CAPEC-63", + "descriptions": [ + { + "lang": "en", + "value": "CAPEC-63 Cross-Site Scripting (XSS)" + } + ] + } + ], + "affected": [ + { + "vendor": "SmarterTools", + "product": "SmarterTrack", + "versions": [ + { + "status": "affected", + "version": "v100.0.8019.14010" + } + ], + "defaultStatus": "unknown" + } + ], + "descriptions": [ + { + "lang": "en", + "value": "\nCross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.\n\n\n", + "supportingMedia": [ + { + "type": "text/html", + "base64": false, + "value": "\n\nCross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.\n\nWith administrator or admin privileges the application can be tricked into overwriting files in app_data/Config folder, e.g. the systemsettings.xml file.
This is possible in SmarterTrack v100.0.8019.14010
" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/DIVD-2021-00029", + "tags": [ + "third-party-advisory" + ] + }, + { + "url": "https://csrit.divd.nl/CVE-2022-24387", + "tags": [ + "third-party-advisory" + ] + } + ], + "metrics": [ + { + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ], + "cvssV3_1": { + "version": "3.1", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + } + ], + "credits": [ + { + "lang": "en", + "value": "Wietse Boonstra of DIVD", + "type": "finder" } - }, - "cveMetadata": { - "assignerOrgId": "b87402ff-ae37-4194-9dae-31abdbd6f217", - "assignerShortName": "DIVD", - "cveId": "CVE-2022-24387", - "dateUpdated": "2022-03-15T00:00:00", - "state": "PUBLISHED" - }, - "dataType": "CVE_RECORD", - "dataVersion": "5.0" + ], + "source": { + "advisory": "DIVD-2021-00029", + "discovery": "INTERNAL" + }, + "x_generator": { + "engine": "Vulnogram 0.0.9" + } + } + } } \ No newline at end of file