CWE-1021
Improper Restriction of Rendered UI Layers or Frames
The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.
CVE-2017-16775 (GCVE-0-2017-16775)
Vulnerability from cvelistv5
- CWE-1021 - Improper Restriction of Rendered UI Layers or Frames ()
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Synology | SSO Server |
Version: unspecified < 2.1.3-0129 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:21.065Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_18_28" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SSO Server", "vendor": "Synology", "versions": [ { "lessThan": "2.1.3-0129", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper restriction of rendered UI layers or frames vulnerability in SSOOauth.cgi in Synology SSO Server before 2.1.3-0129 allows remote attackers to conduct clickjacking attacks via unspecified vectors." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "Improper Restriction of Rendered UI Layers or Frames (CWE-1021)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-01T14:25:15", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_18_28" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2019-03-31T00:00:00", "ID": "CVE-2017-16775", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SSO Server", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.1.3-0129" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper restriction of rendered UI layers or frames vulnerability in SSOOauth.cgi in Synology SSO Server before 2.1.3-0129 allows remote attackers to conduct clickjacking attacks via unspecified vectors." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Rendered UI Layers or Frames (CWE-1021)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_18_28", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_18_28" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2017-16775", "datePublished": "2019-04-01T14:25:15.494166Z", "dateReserved": "2017-11-10T00:00:00", "dateUpdated": "2024-09-17T02:11:38.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-20041 (GCVE-0-2017-20041)
Vulnerability from cvelistv5
- CWE-1021 - Improper Restriction of Rendered UI Layers
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Ucweb | UC Browser |
Version: 11.2.5.932 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:45:24.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Mar/36" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.98214" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-20041", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T17:11:38.712097Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T14:25:56.127Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "UC Browser", "vendor": "Ucweb", "versions": [ { "status": "affected", "version": "11.2.5.932" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Ucweb UC Browser 11.2.5.932. It has been classified as critical. Affected is an unknown function of the component HTML Handler. The manipulation of the argument title leads to improper restriction of rendered ui layers (URL). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021 Improper Restriction of Rendered UI Layers", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T06:50:19.000Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/fulldisclosure/2017/Mar/36" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.98214" } ], "title": "Ucweb UC Browser HTML URL improper restriction of rendered ui layers", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2017-20041", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "Ucweb UC Browser HTML URL improper restriction of rendered ui layers" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "UC Browser", "version": { "version_data": [ { "version_value": "11.2.5.932" } ] } } ] }, "vendor_name": "Ucweb" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in Ucweb UC Browser 11.2.5.932. It has been classified as critical. Affected is an unknown function of the component HTML Handler. The manipulation of the argument title leads to improper restriction of rendered ui layers (URL). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "5.4", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1021 Improper Restriction of Rendered UI Layers" } ] } ] }, "references": { "reference_data": [ { "name": "http://seclists.org/fulldisclosure/2017/Mar/36", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2017/Mar/36" }, { "name": "https://vuldb.com/?id.98214", "refsource": "MISC", "url": "https://vuldb.com/?id.98214" } ] } } } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2017-20041", "datePublished": "2022-06-13T06:50:19.000Z", "dateReserved": "2022-06-06T00:00:00.000Z", "dateUpdated": "2025-04-15T14:25:56.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-19957 (GCVE-0-2018-19957)
Vulnerability from cvelistv5
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | QNAP Systems Inc. | QTS |
Version: unspecified < 4.5.4.1715 build 20210630 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:51:17.852Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.qnap.com/en/security-advisory/qsa-21-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "4.5.4.1715 build 20210630", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "QuTS hero", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "h4.5.4.1771 build 20210825", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "QuTScloud", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "c4.5.6.1755 build 20210809", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Independent Security Evaluators" } ], "datePublic": "2021-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability involving insufficient HTTP security headers has been reported to affect QNAP NAS running QTS, QuTS hero, and QuTScloud. This vulnerability allows remote attackers to launch privacy and security attacks. We have already fixed this vulnerability in the following versions: QTS 4.5.4.1715 build 20210630 and later QuTS hero h4.5.4.1771 build 20210825 and later QuTScloud c4.5.6.1755 build 20210809 and later" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-10T04:00:18", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.qnap.com/en/security-advisory/qsa-21-03" } ], "solutions": [ { "lang": "en", "value": "QNAP have already fixed this vulnerability in the following versions:\nQTS 4.5.4.1715 build 20210630 and later\nQuTS hero h4.5.4.1771 build 20210825 and later\nQuTScloud c4.5.6.1755 build 20210809 and later" } ], "source": { "advisory": "QSA-21-03", "discovery": "EXTERNAL" }, "title": "Insufficient HTTP Security Headers in QTS, QuTS hero, and QuTScloud", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2021-09-10T01:44:00.000Z", "ID": "CVE-2018-19957", "STATE": "PUBLIC", "TITLE": "Insufficient HTTP Security Headers in QTS, QuTS hero, and QuTScloud" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QTS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.5.4.1715 build 20210630" } ] } }, { "product_name": "QuTS hero", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "h4.5.4.1771 build 20210825" } ] } }, { "product_name": "QuTScloud", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "c4.5.6.1755 build 20210809" } ] } } ] }, "vendor_name": "QNAP Systems Inc." } ] } }, "credit": [ { "lang": "eng", "value": "Independent Security Evaluators" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability involving insufficient HTTP security headers has been reported to affect QNAP NAS running QTS, QuTS hero, and QuTScloud. This vulnerability allows remote attackers to launch privacy and security attacks. We have already fixed this vulnerability in the following versions: QTS 4.5.4.1715 build 20210630 and later QuTS hero h4.5.4.1771 build 20210825 and later QuTScloud c4.5.6.1755 build 20210809 and later" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1021" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/en/security-advisory/qsa-21-03", "refsource": "MISC", "url": "https://www.qnap.com/en/security-advisory/qsa-21-03" } ] }, "solution": [ { "lang": "en", "value": "QNAP have already fixed this vulnerability in the following versions:\nQTS 4.5.4.1715 build 20210630 and later\nQuTS hero h4.5.4.1771 build 20210825 and later\nQuTScloud c4.5.6.1755 build 20210809 and later" } ], "source": { "advisory": "QSA-21-03", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2018-19957", "datePublished": "2021-09-10T04:00:18.472580Z", "dateReserved": "2018-12-07T00:00:00", "dateUpdated": "2024-09-17T02:57:44.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-7393 (GCVE-0-2019-7393)
Vulnerability from cvelistv5
- CWE-1021 - Improper Restriction of Rendered UI Layers or Frames
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | CA Technologies, A Broadcom Company | CA Strong Authentication |
Version: 9.0.x Version: 8.2.x Version: 8.1.x Version: 8.0.x Version: 7.1.x |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:46:46.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190527 CA20190523-01: Security Notice for CA Risk Authentication and CA Strong Authentication", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/May/66" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/153089/CA-Risk-Strong-Authentication-Privilege-Escalation.html" }, { "name": "108483", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108483" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ca.com/us/product-content/recommended-reading/security-notices/CA20190523-01--security-notice-for-ca-risk-authentication-and-ca-strong-authentication.html" }, { "name": "20190529 CA20190523-01: Security Notice for CA Risk Authentication and CA Strong Authentication", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/May/43" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CA Strong Authentication", "vendor": "CA Technologies, A Broadcom Company", "versions": [ { "status": "affected", "version": "9.0.x" }, { "status": "affected", "version": "8.2.x" }, { "status": "affected", "version": "8.1.x" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "7.1.x" } ] }, { "product": "CA Risk Authentication", "vendor": "CA Technologies, A Broadcom Company", "versions": [ { "status": "affected", "version": "9.0.x" }, { "status": "affected", "version": "8.2.x" }, { "status": "affected", "version": "8.1.x" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "3.1.x" } ] } ], "datePublic": "2019-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "A UI redress vulnerability in the administrative user interface of CA Technologies CA Strong Authentication 9.0.x, 8.2.x, 8.1.x, 8.0.x, 7.1.x and CA Risk Authentication 9.0.x, 8.2.x, 8.1.x, 8.0.x, 3.1.x may allow a remote attacker to gain sensitive information in some cases." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021: Improper Restriction of Rendered UI Layers or Frames", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-30T03:06:01", "orgId": "e291eae9-7c0a-46ac-ba7d-5251811f8b7f", "shortName": "ca" }, "references": [ { "name": "20190527 CA20190523-01: Security Notice for CA Risk Authentication and CA Strong Authentication", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/May/66" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/153089/CA-Risk-Strong-Authentication-Privilege-Escalation.html" }, { "name": "108483", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108483" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ca.com/us/product-content/recommended-reading/security-notices/CA20190523-01--security-notice-for-ca-risk-authentication-and-ca-strong-authentication.html" }, { "name": "20190529 CA20190523-01: Security Notice for CA Risk Authentication and CA Strong Authentication", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/May/43" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@ca.com", "DATE_PUBLIC": "2019-05-23T04:00:00.000Z", "ID": "CVE-2019-7393", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CA Strong Authentication", "version": { "version_data": [ { "version_affected": "=", "version_name": "9", "version_value": "9.0.x" }, { "version_affected": "=", "version_name": "8", "version_value": "8.2.x" }, { "version_affected": "=", "version_name": "8", "version_value": "8.1.x" }, { "version_affected": "=", "version_name": "8", "version_value": "8.0.x" }, { "version_name": "7", "version_value": "7.1.x" } ] } }, { "product_name": "CA Risk Authentication", "version": { "version_data": [ { "version_affected": "=", "version_name": "9", "version_value": "9.0.x" }, { "version_affected": "=", "version_name": "8", "version_value": "8.2.x" }, { "version_affected": "=", "version_name": "8", "version_value": "8.1.x" }, { "version_affected": "=", "version_name": "8", "version_value": "8.0.x" }, { "version_name": "3", "version_value": "3.1.x" } ] } } ] }, "vendor_name": "CA Technologies, A Broadcom Company" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A UI redress vulnerability in the administrative user interface of CA Technologies CA Strong Authentication 9.0.x, 8.2.x, 8.1.x, 8.0.x, 7.1.x and CA Risk Authentication 9.0.x, 8.2.x, 8.1.x, 8.0.x, 3.1.x may allow a remote attacker to gain sensitive information in some cases." } ] }, "generator": { "engine": "Vulnogram 0.0.6" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1021: Improper Restriction of Rendered UI Layers or Frames" } ] } ] }, "references": { "reference_data": [ { "name": "20190527 CA20190523-01: Security Notice for CA Risk Authentication and CA Strong Authentication", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/May/66" }, { "name": "http://packetstormsecurity.com/files/153089/CA-Risk-Strong-Authentication-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153089/CA-Risk-Strong-Authentication-Privilege-Escalation.html" }, { "name": "108483", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108483" }, { "name": "https://support.ca.com/us/product-content/recommended-reading/security-notices/CA20190523-01--security-notice-for-ca-risk-authentication-and-ca-strong-authentication.html", "refsource": "CONFIRM", "url": "https://support.ca.com/us/product-content/recommended-reading/security-notices/CA20190523-01--security-notice-for-ca-risk-authentication-and-ca-strong-authentication.html" }, { "name": "20190529 CA20190523-01: Security Notice for CA Risk Authentication and CA Strong Authentication", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/May/43" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "e291eae9-7c0a-46ac-ba7d-5251811f8b7f", "assignerShortName": "ca", "cveId": "CVE-2019-7393", "datePublished": "2019-05-28T18:28:30.990510Z", "dateReserved": "2019-02-04T00:00:00", "dateUpdated": "2024-09-16T19:19:28.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13174 (GCVE-0-2020-13174)
Vulnerability from cvelistv5
- CWE-1021 - Clickjacking ()
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | - Management Console |
Version: 20.04 and 20.01.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:19.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisory.teradici.com/security-advisories/58/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "- Management Console", "vendor": "n/a", "versions": [ { "status": "affected", "version": "20.04 and 20.01.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The web server in the Teradici Managament console versions 20.04 and 20.01.1 did not properly set the X-Frame-Options HTTP header, which could allow an attacker to trick a user into clicking a malicious link via clickjacking." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "Clickjacking (CWE-1021)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-11T17:31:57", "orgId": "ba3c294d-a544-4fff-ad44-2de7c7bbb6be", "shortName": "Teradici" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisory.teradici.com/security-advisories/58/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@teradici.com", "ID": "CVE-2020-13174", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "- Management Console", "version": { "version_data": [ { "version_value": "20.04 and 20.01.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The web server in the Teradici Managament console versions 20.04 and 20.01.1 did not properly set the X-Frame-Options HTTP header, which could allow an attacker to trick a user into clicking a malicious link via clickjacking." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Clickjacking (CWE-1021)" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisory.teradici.com/security-advisories/58/", "refsource": "MISC", "url": "https://advisory.teradici.com/security-advisories/58/" } ] } } } }, "cveMetadata": { "assignerOrgId": "ba3c294d-a544-4fff-ad44-2de7c7bbb6be", "assignerShortName": "Teradici", "cveId": "CVE-2020-13174", "datePublished": "2020-08-11T17:31:57", "dateReserved": "2020-05-19T00:00:00", "dateUpdated": "2024-08-04T12:11:19.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-15793 (GCVE-0-2020-15793)
Vulnerability from cvelistv5
- CWE-1021 - Improper Restriction of Rendered UI Layers or Frames
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Siemens | Desigo Insight |
Version: All versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:22:30.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-226339.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-287-05" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Desigo Insight", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Desigo Insight (All versions). The device does not properly set the X-Frame-Options HTTP Header which makes it vulnerable to Clickjacking attacks. This could allow an unauthenticated attacker to retrieve or modify data in the context of a legitimate user by tricking that user to click on a website controlled by the attacker." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021: Improper Restriction of Rendered UI Layers or Frames", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-21T18:10:13", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-226339.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-287-05" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2020-15793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Desigo Insight", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in Desigo Insight (All versions). The device does not properly set the X-Frame-Options HTTP Header which makes it vulnerable to Clickjacking attacks. This could allow an unauthenticated attacker to retrieve or modify data in the context of a legitimate user by tricking that user to click on a website controlled by the attacker." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1021: Improper Restriction of Rendered UI Layers or Frames" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-226339.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-226339.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-287-05", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-287-05" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-15793", "datePublished": "2020-10-15T18:45:33", "dateReserved": "2020-07-15T00:00:00", "dateUpdated": "2024-08-04T13:22:30.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-28218 (GCVE-0-2020-28218)
Vulnerability from cvelistv5
- CWE-1021 - Improper Restriction of Rendered UI Layers or Frames
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Easergy T300 (firmware 2.7 and older) |
Version: Easergy T300 (firmware 2.7 and older) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:33:58.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-06/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-343-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Easergy T300 (firmware 2.7 and older)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Easergy T300 (firmware 2.7 and older)" } ] } ], "descriptions": [ { "lang": "en", "value": "A CWE-1021: Improper Restriction of Rendered UI Layers or Frames vulnerability exists in Easergy T300 (firmware 2.7 and older), that would allow an attacker to trick a user into initiating an unintended action." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021: Improper Restriction of Rendered UI Layers or Frames", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-11T20:22:43", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-06/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-343-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2020-28218", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Easergy T300 (firmware 2.7 and older)", "version": { "version_data": [ { "version_value": "Easergy T300 (firmware 2.7 and older)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-1021: Improper Restriction of Rendered UI Layers or Frames vulnerability exists in Easergy T300 (firmware 2.7 and older), that would allow an attacker to trick a user into initiating an unintended action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1021: Improper Restriction of Rendered UI Layers or Frames" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.se.com/ww/en/download/document/SEVD-2020-315-06/", "refsource": "CONFIRM", "url": "https://www.se.com/ww/en/download/document/SEVD-2020-315-06/" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-343-03", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-343-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2020-28218", "datePublished": "2020-12-11T00:51:19", "dateReserved": "2020-11-05T00:00:00", "dateUpdated": "2024-08-04T16:33:58.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-27467 (GCVE-0-2021-27467)
Vulnerability from cvelistv5
- CWE-1021 - IMPROPER RESTRICTION OF RENDERED UI LAYERS OR FRAMES
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Emerson Rosemount X-STREAM Gas Analyzer |
Version: X-STREAM enhanced XEGP – all revisions, X-STREAM enhanced XEGK – all revisions, X-STREAM enhanced XEFD – all revisions, X- |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:17.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-138-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Emerson Rosemount X-STREAM Gas Analyzer", "vendor": "n/a", "versions": [ { "status": "affected", "version": "X-STREAM enhanced XEGP \u2013 all revisions, X-STREAM enhanced XEGK \u2013 all revisions, X-STREAM enhanced XEFD \u2013 all revisions, X-" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in multiple revisions of Emerson Rosemount X-STREAM Gas Analyzer. The affected product\u2019s web interface allows an attacker to route click or keystroke to another page provided by the attacker to gain unauthorized access to sensitive information." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "IMPROPER RESTRICTION OF RENDERED UI LAYERS OR FRAMES CWE-1021", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-20T11:05:52", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-138-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27467", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Emerson Rosemount X-STREAM Gas Analyzer", "version": { "version_data": [ { "version_value": "X-STREAM enhanced XEGP \u2013 all revisions, X-STREAM enhanced XEGK \u2013 all revisions, X-STREAM enhanced XEFD \u2013 all revisions, X-" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been found in multiple revisions of Emerson Rosemount X-STREAM Gas Analyzer. The affected product\u2019s web interface allows an attacker to route click or keystroke to another page provided by the attacker to gain unauthorized access to sensitive information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER RESTRICTION OF RENDERED UI LAYERS OR FRAMES CWE-1021" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-138-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-138-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27467", "datePublished": "2021-05-20T11:05:52", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T20:48:17.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-29827 (GCVE-0-2021-29827)
Vulnerability from cvelistv5
- CWE-1021 - Improper Restriction of Rendered UI Layers or Frames
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | InfoSphere Information Server |
Version: 11.7 cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-29827", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-19T16:26:22.060639Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-19T16:39:00.402Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "InfoSphere Information Server", "vendor": "IBM", "versions": [ { "status": "affected", "version": "11.7" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIBM InfoSphere Information Server 11.7 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim\u0027s click actions and possibly launch further attacks against the victim.\u003c/span\u003e" } ], "value": "IBM InfoSphere Information Server 11.7 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim\u0027s click actions and possibly launch further attacks against the victim." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021 Improper Restriction of Rendered UI Layers or Frames", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-18T23:44:18.973Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/security-bulletin-ibm-infosphere-information-server-vulnerable-cross-frame-scripting-exploit-cve-2021-29827" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM InfoSphere Information Server clickjacking", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2021-29827", "datePublished": "2024-12-18T23:44:18.973Z", "dateReserved": "2021-03-31T20:12:10.412Z", "dateUpdated": "2024-12-19T16:39:00.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-35237 (GCVE-0-2021-35237)
Vulnerability from cvelistv5
- CWE-1021 - Protection Mechanism Failure
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
SolarWinds | Kiwi Syslog Server |
Version: 9.7.2 and previous versions < 9.7.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Kiwi Syslog Server", "vendor": "SolarWinds", "versions": [ { "lessThan": "9.7.2", "status": "affected", "version": "9.7.2 and previous versions", "versionType": "custom" } ] } ], "datePublic": "2021-10-18T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server.\u003c/p\u003e" } ], "value": "A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-03T20:31:25.943Z", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eSolarWinds has fixed the vulnerability by configuring the X-Frame-Options header. It is recommended that Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available which now uses Microsoft IIS as the web server.\u003c/p\u003e" } ], "value": "SolarWinds has fixed the vulnerability by configuring the X-Frame-Options header. It is recommended that Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available which now uses Microsoft IIS as the web server." } ], "source": { "defect": [ "CVE-2021-35237" ], "discovery": "UNKNOWN" }, "title": "Clickjacking Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@solarwinds.com", "DATE_PUBLIC": "2021-10-19T12:30:00.000Z", "ID": "CVE-2021-35237", "STATE": "PUBLIC", "TITLE": "Clickjacking Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kiwi Syslog Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.7.2 and previous versions", "version_value": "9.7.2" } ] } } ] }, "vendor_name": "SolarWinds" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693 Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm", "refsource": "MISC", "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "name": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237", "refsource": "MISC", "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237" } ] }, "solution": [ { "lang": "en", "value": "SolarWinds has fixed the vulnerability by configuring the X-Frame-Options header. It is recommended that Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available which now uses Microsoft IIS as the web server." } ], "source": { "defect": [ "CVE-2021-35237" ], "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2021-35237", "datePublished": "2021-10-29T13:32:18.489198Z", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-09-16T22:50:51.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Implementation
Description:
- The use of X-Frame-Options allows developers of web content to restrict the usage of their application within the form of overlays, frames, or iFrames. The developer can indicate from which domains can frame the content.
- The concept of X-Frame-Options is well documented, but implementation of this protection mechanism is in development to cover gaps. There is a need for allowing frames from multiple domains.
Mitigation
Phase: Implementation
Description:
- A developer can use a "frame-breaker" script in each page that should not be framed. This is very helpful for legacy browsers that do not support X-Frame-Options security feature previously mentioned.
- It is also important to note that this tactic has been circumvented or bypassed. Improper usage of frames can persist in the web application through nested frames. The "frame-breaking" script does not intuitively account for multiple nested frames that can be presented to the user.
Mitigation
Phase: Implementation
Description:
- This defense-in-depth technique can be used to prevent the improper usage of frames in web applications. It prioritizes the valid sources of data to be loaded into the application through the usage of declarative policies. Based on which implementation of Content Security Policy is in use, the developer should use the "frame-ancestors" directive or the "frame-src" directive to mitigate this weakness. Both directives allow for the placement of restrictions when it comes to allowing embedded content.
CAPEC-103: Clickjacking
An adversary tricks a victim into unknowingly initiating some action in one system while interacting with the UI from a seemingly completely different, usually an adversary controlled or intended, system.
CAPEC-181: Flash File Overlay
An attacker creates a transparent overlay using flash in order to intercept user actions for the purpose of performing a clickjacking attack. In this technique, the Flash file provides a transparent overlay over HTML content. Because the Flash application is on top of the content, user actions, such as clicks, are caught by the Flash application rather than the underlying HTML. The action is then interpreted by the overlay to perform the actions the attacker wishes.
CAPEC-222: iFrame Overlay
In an iFrame overlay attack the victim is tricked into unknowingly initiating some action in one system while interacting with the UI from seemingly completely different system.
CAPEC-504: Task Impersonation
An adversary, through a previously installed malicious application, impersonates an expected or routine task in an attempt to steal sensitive information or leverage a user's privileges.
CAPEC-506: Tapjacking
An adversary, through a previously installed malicious application, displays an interface that misleads the user and convinces them to tap on an attacker desired location on the screen. This is often accomplished by overlaying one screen on top of another while giving the appearance of a single interface. There are two main techniques used to accomplish this. The first is to leverage transparent properties that allow taps on the screen to pass through the visible application to an application running in the background. The second is to strategically place a small object (e.g., a button or text field) on top of the visible screen and make it appear to be a part of the underlying application. In both cases, the user is convinced to tap on the screen but does not realize the application that they are interacting with.
CAPEC-587: Cross Frame Scripting (XFS)
This attack pattern combines malicious Javascript and a legitimate webpage loaded into a concealed iframe. The malicious Javascript is then able to interact with a legitimate webpage in a manner that is unknown to the user. This attack usually leverages some element of social engineering in that an attacker must convinces a user to visit a web page that the attacker controls.
CAPEC-654: Credential Prompt Impersonation
An adversary, through a previously installed malicious application, impersonates a credential prompt in an attempt to steal a user's credentials.