CWE-304
Missing Critical Step in Authentication
The product implements an authentication technique, but it skips a step that weakens the technique.
CVE-2011-3172 (GCVE-0-2011-3172)
Vulnerability from cvelistv5
Published
2018-06-08 13:00
Modified
2024-09-17 04:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SUSE | SUSE Linux Enterprise |
Version: unspecified < 12 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:22:27.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://build.opensuse.org/request/show/80346" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=707645" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SUSE Linux Enterprise", "vendor": "SUSE", "versions": [ { "lessThan": "12", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Michael Calmer of SUSE" } ], "datePublic": "2011-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "CWE-304", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:42", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://build.opensuse.org/request/show/80346" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=707645" } ], "source": { "defect": [ "707645" ], "discovery": "INTERNAL" }, "title": "unix2_chkpwd do not check for a valid account", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2011-08-31T00:00:00.000Z", "ID": "CVE-2011-3172", "STATE": "PUBLIC", "TITLE": "unix2_chkpwd do not check for a valid account" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SUSE Linux Enterprise", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "12" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Michael Calmer of SUSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-304" } ] } ] }, "references": { "reference_data": [ { "name": "https://build.opensuse.org/request/show/80346", "refsource": "CONFIRM", "url": "https://build.opensuse.org/request/show/80346" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=707645", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=707645" } ] }, "source": { "defect": [ "707645" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2011-3172", "datePublished": "2018-06-08T13:00:00Z", "dateReserved": "2011-08-19T00:00:00", "dateUpdated": "2024-09-17T04:28:45.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-16766 (GCVE-0-2019-16766)
Vulnerability from cvelistv5
Published
2019-11-29 17:05
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
Summary
When using wagtail-2fa before 1.3.0, if someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. This problem has been patched in version 1.3.0.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Lab Digital | wagtail-2fa |
Version: < 1.3.0 < 1.3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:47.232Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/LabD/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "wagtail-2fa", "vendor": "Lab Digital", "versions": [ { "lessThan": "1.3.0", "status": "affected", "version": "\u003c 1.3.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "When using wagtail-2fa before 1.3.0, if someone gains access to someone\u0027s Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. This problem has been patched in version 1.3.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "CWE-304 Missing Critical Step in Authentication", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-29T17:05:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/LabD/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca" } ], "source": { "advisory": "GHSA-89px-ww3j-g2mm", "discovery": "UNKNOWN" }, "title": "2FA bypass in Wagtail through new device path", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2019-16766", "STATE": "PUBLIC", "TITLE": "2FA bypass in Wagtail through new device path" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "wagtail-2fa", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "\u003c 1.3.0", "version_value": "1.3.0" } ] } } ] }, "vendor_name": "Lab Digital" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When using wagtail-2fa before 1.3.0, if someone gains access to someone\u0027s Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. This problem has been patched in version 1.3.0." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-304 Missing Critical Step in Authentication" } ] }, { "description": [ { "lang": "eng", "value": "CWE-290 Authentication Bypass by Spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/LabD/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm", "refsource": "CONFIRM", "url": "https://github.com/LabD/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm" }, { "name": "https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81", "refsource": "MISC", "url": "https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81" }, { "name": "https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca", "refsource": "MISC", "url": "https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca" } ] }, "source": { "advisory": "GHSA-89px-ww3j-g2mm", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2019-16766", "datePublished": "2019-11-29T17:05:14", "dateReserved": "2019-09-24T00:00:00", "dateUpdated": "2024-08-05T01:24:47.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41179 (GCVE-0-2021-41179)
Vulnerability from cvelistv5
Published
2021-10-25 22:00
Modified
2024-08-04 02:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-304 - Missing Critical Step in Authentication
Summary
Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn't enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn't authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
nextcloud | security-advisories |
Version: < 20.0.13 Version: >= 21.0.0, < 21.0.5 Version: < 22.2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/28725" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1322865" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.13" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.5" }, { "status": "affected", "version": "\u003c 22.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn\u0027t enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn\u0027t authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "CWE-304: Missing Critical Step in Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-25T22:00:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/28725" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1322865" } ], "source": { "advisory": "GHSA-7hvh-rc6f-px23", "discovery": "UNKNOWN" }, "title": "Two-Factor Authentication not enforced for pages marked as public", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41179", "STATE": "PUBLIC", "TITLE": "Two-Factor Authentication not enforced for pages marked as public" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.13" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.5" }, { "version_value": "\u003c 22.2.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn\u0027t enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn\u0027t authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-304: Missing Critical Step in Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23" }, { "name": "https://github.com/nextcloud/server/pull/28725", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/28725" }, { "name": "https://hackerone.com/reports/1322865", "refsource": "MISC", "url": "https://hackerone.com/reports/1322865" } ] }, "source": { "advisory": "GHSA-7hvh-rc6f-px23", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41179", "datePublished": "2021-10-25T22:00:13", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-1065 (GCVE-0-2022-1065)
Vulnerability from cvelistv5
Published
2022-04-19 07:50
Modified
2024-08-02 23:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-304 - Missing Critical Step in Authentication
Summary
A vulnerability within the authentication process of Abacus ERP allows a remote attacker to bypass the second authentication factor. This issue affects: Abacus ERP v2022 versions prior to R1 of 2022-01-15; v2021 versions prior to R4 of 2022-01-15; v2020 versions prior to R6 of 2022-01-15; v2019 versions later than R5 (service pack); v2018 versions later than R5 (service pack). This issue does not affect: Abacus ERP v2019 versions prior to R5 of 2020-03-15; v2018 versions prior to R7 of 2020-04-15; v2017 version and prior versions and prior versions.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Abacus Research AG | Abacus ERP |
Version: v2022 < R1 of 2022-01-15 Version: v2021 < R4 of 2022-01-15 Version: v2020 < R6 of 2022-01-15 Version: R5 (service pack) < v2019* Version: R5 (service pack) < v2018* Patch: v2017 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:47:43.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.redguard.ch/advisories/abacus_mfa_bypass.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Abacus ERP", "vendor": "Abacus Research AG", "versions": [ { "lessThan": "R1 of 2022-01-15", "status": "affected", "version": "v2022", "versionType": "custom" }, { "lessThan": "R4 of 2022-01-15", "status": "affected", "version": "v2021", "versionType": "custom" }, { "lessThan": "R6 of 2022-01-15", "status": "affected", "version": "v2020", "versionType": "custom" }, { "changes": [ { "at": "R5 of 2020-03-15", "status": "affected" } ], "lessThan": "v2019*", "status": "affected", "version": "R5 (service pack)", "versionType": "custom" }, { "changes": [ { "at": "R7 of 2020-04-15", "status": "affected" } ], "lessThan": "v2018*", "status": "affected", "version": "R5 (service pack)", "versionType": "custom" }, { "lessThanOrEqual": "and prior versions", "status": "unaffected", "version": "v2017", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Roman Gribi, Redguard AG" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability within the authentication process of Abacus ERP allows a remote attacker to bypass the second authentication factor. This issue affects: Abacus ERP v2022 versions prior to R1 of 2022-01-15; v2021 versions prior to R4 of 2022-01-15; v2020 versions prior to R6 of 2022-01-15; v2019 versions later than R5 (service pack); v2018 versions later than R5 (service pack). This issue does not affect: Abacus ERP v2019 versions prior to R5 of 2020-03-15; v2018 versions prior to R7 of 2020-04-15; v2017 version and prior versions and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "CWE-304 Missing Critical Step in Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T07:50:10", "orgId": "455daabc-a392-441d-aa46-37d35189897c", "shortName": "NCSC.ch" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.redguard.ch/advisories/abacus_mfa_bypass.txt" } ], "solutions": [ { "lang": "en", "value": "Install the available hot fixes and / or service packs from 2022-01-15 or newer" } ], "source": { "discovery": "EXTERNAL" }, "title": "Multi Factor Authentication Bypass in various versions of Abacus ERP", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vulnerability@ncsc.ch", "ID": "CVE-2022-1065", "STATE": "PUBLIC", "TITLE": "Multi Factor Authentication Bypass in various versions of Abacus ERP" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Abacus ERP", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "v2022", "version_value": "R1 of 2022-01-15" }, { "version_affected": "\u003c", "version_name": "v2021", "version_value": "R4 of 2022-01-15" }, { "version_affected": "\u003c", "version_name": "v2020", "version_value": "R6 of 2022-01-15" }, { "version_affected": "\u003e", "version_name": "v2019", "version_value": "R5 (service pack)" }, { "version_affected": "\u003e", "version_name": "v2018", "version_value": "R5 (service pack)" }, { "version_affected": "!\u003c", "version_name": "v2019", "version_value": "R5 of 2020-03-15" }, { "version_affected": "!\u003c", "version_name": "v2018", "version_value": "R7 of 2020-04-15" }, { "version_affected": "!\u003c=", "version_name": "v2017", "version_value": "and prior versions" } ] } } ] }, "vendor_name": "Abacus Research AG" } ] } }, "credit": [ { "lang": "eng", "value": "Roman Gribi, Redguard AG" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability within the authentication process of Abacus ERP allows a remote attacker to bypass the second authentication factor. This issue affects: Abacus ERP v2022 versions prior to R1 of 2022-01-15; v2021 versions prior to R4 of 2022-01-15; v2020 versions prior to R6 of 2022-01-15; v2019 versions later than R5 (service pack); v2018 versions later than R5 (service pack). This issue does not affect: Abacus ERP v2019 versions prior to R5 of 2020-03-15; v2018 versions prior to R7 of 2020-04-15; v2017 version and prior versions and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-304 Missing Critical Step in Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.redguard.ch/advisories/abacus_mfa_bypass.txt", "refsource": "CONFIRM", "url": "https://www.redguard.ch/advisories/abacus_mfa_bypass.txt" } ] }, "solution": [ { "lang": "en", "value": "Install the available hot fixes and / or service packs from 2022-01-15 or newer" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "455daabc-a392-441d-aa46-37d35189897c", "assignerShortName": "NCSC.ch", "cveId": "CVE-2022-1065", "datePublished": "2022-04-19T07:50:10", "dateReserved": "2022-03-24T00:00:00", "dateUpdated": "2024-08-02T23:47:43.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-2302 (GCVE-0-2022-2302)
Vulnerability from cvelistv5
Published
2022-07-11 10:40
Modified
2024-09-16 22:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-304 - Missing Critical Step in Authentication
Summary
Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | LENZE | cabinet c520 |
Version: V01.07.00.2757 < V01.08.01.3021 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:32:09.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-030/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cabinet c520", "vendor": "LENZE", "versions": [ { "lessThan": "V01.08.01.3021", "status": "affected", "version": "V01.07.00.2757", "versionType": "custom" } ] }, { "product": "cabinet c550", "vendor": "LENZE", "versions": [ { "lessThan": "V01.08.01.3021", "status": "affected", "version": "V01.07.00.2757", "versionType": "custom" } ] }, { "product": "cabinet c750", "vendor": "LENZE", "versions": [ { "lessThan": "V01.08.01.3021", "status": "affected", "version": "V01.07.00.2757", "versionType": "custom" } ] } ], "datePublic": "2022-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "CWE-304 Missing Critical Step in Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T10:40:33", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-030/" } ], "source": { "advisory": "VDE-2022-030", "defect": [ "CERT@VDE#", "64157" ], "discovery": "INTERNAL" }, "title": "LENZE: Missing password verification in authorisation procedure", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2022-07-11T10:00:00.000Z", "ID": "CVE-2022-2302", "STATE": "PUBLIC", "TITLE": "LENZE: Missing password verification in authorisation procedure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "cabinet c520", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V01.07.00.2757", "version_value": "V01.08.01.3021" } ] } }, { "product_name": "cabinet c550", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V01.07.00.2757", "version_value": "V01.08.01.3021" } ] } }, { "product_name": "cabinet c750", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V01.07.00.2757", "version_value": "V01.08.01.3021" } ] } } ] }, "vendor_name": "LENZE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-304 Missing Critical Step in Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en/advisories/VDE-2022-030/", "refsource": "CONFIRM", "url": "https://cert.vde.com/en/advisories/VDE-2022-030/" } ] }, "source": { "advisory": "VDE-2022-030", "defect": [ "CERT@VDE#", "64157" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-2302", "datePublished": "2022-07-11T10:40:33.696766Z", "dateReserved": "2022-07-04T00:00:00", "dateUpdated": "2024-09-16T22:57:01.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-2821 (GCVE-0-2022-2821)
Vulnerability from cvelistv5
Published
2022-08-15 10:30
Modified
2024-08-03 00:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-304 - Missing Critical Step in Authentication
Summary
Missing Critical Step in Authentication in GitHub repository namelessmc/nameless prior to v2.0.2.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
namelessmc | namelessmc/nameless |
Version: unspecified < v2.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:52:58.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/c216db15-fe2f-42a7-852a-6c47498cf069" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/namelessmc/nameless/commit/98fe4b7fce5509e49e71f1357118db887b8b88e0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "namelessmc/nameless", "vendor": "namelessmc", "versions": [ { "lessThan": "v2.0.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing Critical Step in Authentication in GitHub repository namelessmc/nameless prior to v2.0.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "CWE-304 Missing Critical Step in Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-15T10:30:35", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/c216db15-fe2f-42a7-852a-6c47498cf069" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/namelessmc/nameless/commit/98fe4b7fce5509e49e71f1357118db887b8b88e0" } ], "source": { "advisory": "c216db15-fe2f-42a7-852a-6c47498cf069", "discovery": "EXTERNAL" }, "title": "Missing Critical Step in Authentication in namelessmc/nameless", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-2821", "STATE": "PUBLIC", "TITLE": "Missing Critical Step in Authentication in namelessmc/nameless" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "namelessmc/nameless", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.0.2" } ] } } ] }, "vendor_name": "namelessmc" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing Critical Step in Authentication in GitHub repository namelessmc/nameless prior to v2.0.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-304 Missing Critical Step in Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/c216db15-fe2f-42a7-852a-6c47498cf069", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/c216db15-fe2f-42a7-852a-6c47498cf069" }, { "name": "https://github.com/namelessmc/nameless/commit/98fe4b7fce5509e49e71f1357118db887b8b88e0", "refsource": "MISC", "url": "https://github.com/namelessmc/nameless/commit/98fe4b7fce5509e49e71f1357118db887b8b88e0" } ] }, "source": { "advisory": "c216db15-fe2f-42a7-852a-6c47498cf069", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-2821", "datePublished": "2022-08-15T10:30:35", "dateReserved": "2022-08-15T00:00:00", "dateUpdated": "2024-08-03T00:52:58.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-39360 (GCVE-0-2022-39360)
Vulnerability from cvelistv5
Published
2022-10-26 00:00
Modified
2025-04-23 16:42
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9 single sign on (SSO) users were able to do password resets on Metabase, which could allow a user access without going through the SSO IdP. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase now blocks password reset for all users who use SSO for their Metabase login.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/metabase/metabase/security/advisories/GHSA-gw4g-ww2m-v7vc" }, { "tags": [ "x_transferred" ], "url": "https://github.com/metabase/metabase/commit/edadf7303c3b068609f57ca073e67885d5c98730" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-39360", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:55:35.522682Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:42:39.520Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "metabase", "vendor": "metabase", "versions": [ { "status": "affected", "version": "\u003c 0.41.9" }, { "status": "affected", "version": "\u003e= 0.42.0, \u003c 0.42.6" }, { "status": "affected", "version": "\u003e= 0.43.0, \u003c 0.43.7" }, { "status": "affected", "version": "\u003e= 0.44.0, \u003c 0.44.5" }, { "status": "affected", "version": "\u003e= 1.0.0, \u003c 1.41.9" }, { "status": "affected", "version": "\u003e= 1.42.0, \u003c 1.42.6" }, { "status": "affected", "version": "\u003e= 1.43.0, \u003c 1.43.7" }, { "status": "affected", "version": "\u003e= 1.44.0, \u003c 1.44.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9 single sign on (SSO) users were able to do password resets on Metabase, which could allow a user access without going through the SSO IdP. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase now blocks password reset for all users who use SSO for their Metabase login." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "CWE-304: Missing Critical Step in Authentication", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-26T00:00:00.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/metabase/metabase/security/advisories/GHSA-gw4g-ww2m-v7vc" }, { "url": "https://github.com/metabase/metabase/commit/edadf7303c3b068609f57ca073e67885d5c98730" } ], "source": { "advisory": "GHSA-gw4g-ww2m-v7vc", "discovery": "UNKNOWN" }, "title": "Metabase SSO users able to circumvent IdP login by doing password reset" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39360", "datePublished": "2022-10-26T00:00:00.000Z", "dateReserved": "2022-09-02T00:00:00.000Z", "dateUpdated": "2025-04-23T16:42:39.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-40622 (GCVE-0-2022-40622)
Vulnerability from cvelistv5
Published
2022-09-13 20:35
Modified
2024-09-16 16:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-304 - Missing Critical Step in Authentication
Summary
The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator's, or is behind the same NAT as the logged in administrator, session takeover is possible.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:21:46.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://youtu.be/cSileV8YbsQ?t=655" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WN531G3", "vendor": "WAVLINK", "versions": [ { "lessThanOrEqual": "M31G3.V5030.200325", "status": "affected", "version": "M31G3.V5030.200325", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Corey Hartman" } ], "datePublic": "2022-08-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator\u0027s, or is behind the same NAT as the logged in administrator, session takeover is possible." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "CWE-304 Missing Critical Step in Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-13T20:35:12", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://youtu.be/cSileV8YbsQ?t=655" } ], "source": { "discovery": "EXTERNAL" }, "title": "WAVLINK Quantum D4G (WN531G3) Session Management by IP Address", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "cve@rapid7.com", "DATE_PUBLIC": "2022-08-02T14:00:00.000Z", "ID": "CVE-2022-40622", "STATE": "PUBLIC", "TITLE": "WAVLINK Quantum D4G (WN531G3) Session Management by IP Address" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WN531G3", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c=", "version_name": "M31G3.V5030.200325", "version_value": "M31G3.V5030.200325" } ] } } ] }, "vendor_name": "WAVLINK" } ] } }, "credit": [ { "lang": "eng", "value": "Corey Hartman" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator\u0027s, or is behind the same NAT as the logged in administrator, session takeover is possible." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-304 Missing Critical Step in Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://youtu.be/cSileV8YbsQ?t=655", "refsource": "MISC", "url": "https://youtu.be/cSileV8YbsQ?t=655" } ] }, "source": { "advisory": "", "defect": [], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2022-40622", "datePublished": "2022-09-13T20:35:12.848865Z", "dateReserved": "2022-09-12T00:00:00", "dateUpdated": "2024-09-16T16:54:00.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22833 (GCVE-0-2023-22833)
Vulnerability from cvelistv5
Published
2023-06-06 18:55
Modified
2025-01-07 16:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-304 - The product implements an authentication technique, but it skips a step that weakens the technique.
Summary
Palantir Foundry deployments running Lime2 versions between 2.519.0 and 2.532.0 were vulnerable a bug that allowed authenticated users within a Foundry organization to bypass discretionary or mandatory access controls under certain circumstances.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palantir | com.palantir.lime:lime2 |
Version: 2.519.0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://palantir.safebase.us/?tcuUid=7f1fd834-805d-4679-85d0-9d779fa064ae" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-22833", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-07T16:23:48.399139Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-07T16:24:09.439Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "com.palantir.lime:lime2", "vendor": "Palantir", "versions": [ { "lessThan": "2.532.0", "status": "affected", "version": "2.519.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Palantir Foundry deployments running Lime2 versions between 2.519.0 and 2.532.0 were vulnerable a bug that allowed authenticated users within a Foundry organization to bypass discretionary or mandatory access controls under certain circumstances." } ], "impacts": [ { "capecId": "CAPEC-36", "descriptions": [ { "lang": "en", "value": "An adversary searches for and invokes interfaces or functionality that the target system designers did not intend to be publicly available. If interfaces fail to authenticate requests, the attacker may be able to invoke functionality they are not authorized for." } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "The product implements an authentication technique, but it skips a step that weakens the technique.", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-08T16:49:59.385Z", "orgId": "bbcbe11d-db20-4bc2-8a6e-c79f87041fd4", "shortName": "Palantir" }, "references": [ { "url": "https://palantir.safebase.us/?tcuUid=7f1fd834-805d-4679-85d0-9d779fa064ae" } ], "source": { "defect": [ "PLTRSEC-2023-17" ], "discovery": "INTERNAL" }, "title": "Mandatory control bypass in Lime2" } }, "cveMetadata": { "assignerOrgId": "bbcbe11d-db20-4bc2-8a6e-c79f87041fd4", "assignerShortName": "Palantir", "cveId": "CVE-2023-22833", "datePublished": "2023-06-06T18:55:06.549Z", "dateReserved": "2023-01-06T21:43:46.848Z", "dateUpdated": "2025-01-07T16:24:09.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-3628 (GCVE-0-2023-3628)
Vulnerability from cvelistv5
Published
2023-12-18 13:43
Modified
2024-11-23 01:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-304 - Missing Critical Step in Authentication
Summary
A flaw was found in Infinispan's REST. Bulk read endpoints do not properly evaluate user permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Red Hat | Red Hat Data Grid 8.4.4 |
cpe:/a:redhat:jboss_data_grid:8 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:01:57.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2023:5396", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-3628" }, { "name": "RHBZ#2217924", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217924" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240125-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html", "cpes": [ "cpe:/a:redhat:jboss_data_grid:8" ], "defaultStatus": "unaffected", "packageName": "infinispan", "product": "Red Hat Data Grid 8.4.4", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html", "cpes": [ "cpe:/a:redhat:jboss_enterprise_application_platform:6" ], "defaultStatus": "unknown", "packageName": "infinispan", "product": "Red Hat JBoss Enterprise Application Platform 6", "vendor": "Red Hat" } ], "datePublic": "2023-09-21T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in Infinispan\u0027s REST. Bulk read endpoints do not properly evaluate user permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "Missing Critical Step in Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-23T01:11:14.506Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2023:5396", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:5396" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-3628" }, { "name": "RHBZ#2217924", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217924" } ], "timeline": [ { "lang": "en", "time": "2023-06-22T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-09-21T00:00:00+00:00", "value": "Made public." } ], "title": "Infispan: rest bulk ops don\u0027t check permissions", "x_redhatCweChain": "CWE-304: Missing Critical Step in Authentication" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-3628", "datePublished": "2023-12-18T13:43:07.750Z", "dateReserved": "2023-07-11T20:37:22.734Z", "dateUpdated": "2024-11-23T01:11:14.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
No mitigation information available for this CWE.
No CAPEC attack patterns related to this CWE.