Vulnerabilites related to teradici - pcoip_management_console
CVE-2020-13174 (GCVE-0-2020-13174)
Vulnerability from cvelistv5
Published
2020-08-11 17:31
Modified
2024-08-04 12:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1021 - Clickjacking ()
Summary
The web server in the Teradici Managament console versions 20.04 and 20.01.1 did not properly set the X-Frame-Options HTTP header, which could allow an attacker to trick a user into clicking a malicious link via clickjacking.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | - Management Console |
Version: 20.04 and 20.01.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:19.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisory.teradici.com/security-advisories/58/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "- Management Console", "vendor": "n/a", "versions": [ { "status": "affected", "version": "20.04 and 20.01.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The web server in the Teradici Managament console versions 20.04 and 20.01.1 did not properly set the X-Frame-Options HTTP header, which could allow an attacker to trick a user into clicking a malicious link via clickjacking." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "Clickjacking (CWE-1021)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-11T17:31:57", "orgId": "ba3c294d-a544-4fff-ad44-2de7c7bbb6be", "shortName": "Teradici" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisory.teradici.com/security-advisories/58/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@teradici.com", "ID": "CVE-2020-13174", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "- Management Console", "version": { "version_data": [ { "version_value": "20.04 and 20.01.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The web server in the Teradici Managament console versions 20.04 and 20.01.1 did not properly set the X-Frame-Options HTTP header, which could allow an attacker to trick a user into clicking a malicious link via clickjacking." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Clickjacking (CWE-1021)" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisory.teradici.com/security-advisories/58/", "refsource": "MISC", "url": "https://advisory.teradici.com/security-advisories/58/" } ] } } } }, "cveMetadata": { "assignerOrgId": "ba3c294d-a544-4fff-ad44-2de7c7bbb6be", "assignerShortName": "Teradici", "cveId": "CVE-2020-13174", "datePublished": "2020-08-11T17:31:57", "dateReserved": "2020-05-19T00:00:00", "dateUpdated": "2024-08-04T12:11:19.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10965 (GCVE-0-2020-10965)
Vulnerability from cvelistv5
Published
2020-03-25 22:53
Modified
2024-08-04 11:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Teradici PCoIP Management Console 20.01.0 and 19.11.1 is vulnerable to unauthenticated password resets via login/resetadminpassword of the default admin account. This vulnerability only exists when the default admin account is not disabled. It is fixed in 20.01.1 and 19.11.2.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:13.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://help.teradici.com/s/article/3729" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://healdb.tech/blog.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Teradici PCoIP Management Console 20.01.0 and 19.11.1 is vulnerable to unauthenticated password resets via login/resetadminpassword of the default admin account. This vulnerability only exists when the default admin account is not disabled. It is fixed in 20.01.1 and 19.11.2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-26T17:52:54", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://help.teradici.com/s/article/3729" }, { "tags": [ "x_refsource_MISC" ], "url": "https://healdb.tech/blog.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10965", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Teradici PCoIP Management Console 20.01.0 and 19.11.1 is vulnerable to unauthenticated password resets via login/resetadminpassword of the default admin account. This vulnerability only exists when the default admin account is not disabled. It is fixed in 20.01.1 and 19.11.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://help.teradici.com/s/article/3729", "refsource": "MISC", "url": "https://help.teradici.com/s/article/3729" }, { "name": "https://healdb.tech/blog.html", "refsource": "MISC", "url": "https://healdb.tech/blog.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10965", "datePublished": "2020-03-25T22:53:12", "dateReserved": "2020-03-25T00:00:00", "dateUpdated": "2024-08-04T11:21:13.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-35451 (GCVE-0-2021-35451)
Vulnerability from cvelistv5
Published
2021-07-07 13:30
Modified
2024-08-04 00:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Teradici PCoIP Management Console-Enterprise 20.07.0, an unauthenticated user can inject arbitrary text into user browser via the Web application.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:40:46.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://teradici.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/rvismit/578f9f98d79f22d81a5e45dbbc0b4fa4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Teradici PCoIP Management Console-Enterprise 20.07.0, an unauthenticated user can inject arbitrary text into user browser via the Web application." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-07T13:30:23", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://teradici.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/rvismit/578f9f98d79f22d81a5e45dbbc0b4fa4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-35451", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Teradici PCoIP Management Console-Enterprise 20.07.0, an unauthenticated user can inject arbitrary text into user browser via the Web application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://teradici.com", "refsource": "MISC", "url": "http://teradici.com" }, { "name": "https://gist.github.com/rvismit/578f9f98d79f22d81a5e45dbbc0b4fa4", "refsource": "MISC", "url": "https://gist.github.com/rvismit/578f9f98d79f22d81a5e45dbbc0b4fa4" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-35451", "datePublished": "2021-07-07T13:30:23", "dateReserved": "2021-06-23T00:00:00", "dateUpdated": "2024-08-04T00:40:46.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13183 (GCVE-0-2020-13183)
Vulnerability from cvelistv5
Published
2020-08-17 20:31
Modified
2024-08-04 12:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Reflected Cross Site Scripting
Summary
Reflected Cross Site Scripting in Teradici PCoIP Management Console prior to 20.07 could allow an attacker to take over the user's active session if the user is exposed to a malicious payload.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Teradici PCoIP Management Console |
Version: Before 20.07 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:19.444Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisory.teradici.com/security-advisories/63/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Teradici PCoIP Management Console", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Before 20.07" } ] } ], "descriptions": [ { "lang": "en", "value": "Reflected Cross Site Scripting in Teradici PCoIP Management Console prior to 20.07 could allow an attacker to take over the user\u0027s active session if the user is exposed to a malicious payload." } ], "problemTypes": [ { "descriptions": [ { "description": "Reflected Cross Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-17T20:31:06", "orgId": "ba3c294d-a544-4fff-ad44-2de7c7bbb6be", "shortName": "Teradici" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisory.teradici.com/security-advisories/63/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@teradici.com", "ID": "CVE-2020-13183", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Teradici PCoIP Management Console", "version": { "version_data": [ { "version_value": "Before 20.07" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Reflected Cross Site Scripting in Teradici PCoIP Management Console prior to 20.07 could allow an attacker to take over the user\u0027s active session if the user is exposed to a malicious payload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Reflected Cross Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisory.teradici.com/security-advisories/63/", "refsource": "MISC", "url": "https://advisory.teradici.com/security-advisories/63/" } ] } } } }, "cveMetadata": { "assignerOrgId": "ba3c294d-a544-4fff-ad44-2de7c7bbb6be", "assignerShortName": "Teradici", "cveId": "CVE-2020-13183", "datePublished": "2020-08-17T20:31:06", "dateReserved": "2020-05-19T00:00:00", "dateUpdated": "2024-08-04T12:11:19.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-20121 (GCVE-0-2017-20121)
Vulnerability from cvelistv5
Published
2022-06-30 05:05
Modified
2025-04-15 14:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Database Management. The manipulation leads to improper privilege management. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Teradici | Management Console |
Version: 2.2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:45:25.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/62" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.97279" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-20121", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T16:55:31.406855Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T14:08:51.896Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Management Console", "vendor": "Teradici", "versions": [ { "status": "affected", "version": "2.2.0" } ] } ], "credits": [ { "lang": "en", "value": "ERRor" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Database Management. The manipulation leads to improper privilege management. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-30T05:05:20.000Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/62" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.97279" } ], "title": "Teradici Management Console Database Management privileges management", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2017-20121", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "Teradici Management Console Database Management privileges management" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Management Console", "version": { "version_data": [ { "version_value": "2.2.0" } ] } } ] }, "vendor_name": "Teradici" } ] } }, "credit": "ERRor", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Database Management. The manipulation leads to improper privilege management. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "7.8", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "http://seclists.org/fulldisclosure/2017/Feb/62", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2017/Feb/62" }, { "name": "https://vuldb.com/?id.97279", "refsource": "MISC", "url": "https://vuldb.com/?id.97279" } ] } } } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2017-20121", "datePublished": "2022-06-30T05:05:20.000Z", "dateReserved": "2022-06-27T00:00:00.000Z", "dateUpdated": "2025-04-15T14:08:51.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-03-25 23:15
Modified
2024-11-21 04:56
Severity ?
Summary
Teradici PCoIP Management Console 20.01.0 and 19.11.1 is vulnerable to unauthenticated password resets via login/resetadminpassword of the default admin account. This vulnerability only exists when the default admin account is not disabled. It is fixed in 20.01.1 and 19.11.2.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://healdb.tech/blog.html | Exploit, Vendor Advisory | |
cve@mitre.org | https://help.teradici.com/s/article/3729 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://healdb.tech/blog.html | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://help.teradici.com/s/article/3729 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
teradici | pcoip_management_console | 19.11.1 | |
teradici | pcoip_management_console | 20.01.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teradici:pcoip_management_console:19.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "CABBF930-ED90-49DA-A07E-22B055E41261", "vulnerable": true }, { "criteria": "cpe:2.3:a:teradici:pcoip_management_console:20.01.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7450659-2197-4F2E-9C07-94E54C01E49D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Teradici PCoIP Management Console 20.01.0 and 19.11.1 is vulnerable to unauthenticated password resets via login/resetadminpassword of the default admin account. This vulnerability only exists when the default admin account is not disabled. It is fixed in 20.01.1 and 19.11.2." }, { "lang": "es", "value": "Teradici PCoIP Management Console versiones 20.01.0 y 19.11.1, es vulnerable a restablecimientos de contrase\u00f1a no autenticados por medio de login/resetadminpassword de la cuenta de administrador predeterminada. Esta vulnerabilidad solo se presenta cuando la cuenta de administrador predeterminada no est\u00e1 deshabilitada. Es corregida en las versiones 20.01.1 y 19.11.2." } ], "id": "CVE-2020-10965", "lastModified": "2024-11-21T04:56:28.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-25T23:15:16.137", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://healdb.tech/blog.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://help.teradici.com/s/article/3729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://healdb.tech/blog.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://help.teradici.com/s/article/3729" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" }, { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-07 14:15
Modified
2024-11-21 06:12
Severity ?
Summary
In Teradici PCoIP Management Console-Enterprise 20.07.0, an unauthenticated user can inject arbitrary text into user browser via the Web application.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://teradici.com | Vendor Advisory | |
cve@mitre.org | https://gist.github.com/rvismit/578f9f98d79f22d81a5e45dbbc0b4fa4 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://teradici.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/rvismit/578f9f98d79f22d81a5e45dbbc0b4fa4 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
teradici | pcoip_management_console | 20.07.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teradici:pcoip_management_console:20.07.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "9DDD5C72-7B17-46B9-B11E-F3600D28FCAF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Teradici PCoIP Management Console-Enterprise 20.07.0, an unauthenticated user can inject arbitrary text into user browser via the Web application." }, { "lang": "es", "value": "En Teradici PCoIP Management Console-Enterprise versi\u00f3n 20.07.0, un usuario no autenticado puede inyectar texto arbitrario en el navegador del usuario por medio de la aplicaci\u00f3n web" } ], "id": "CVE-2021-35451", "lastModified": "2024-11-21T06:12:19.107", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-07T14:15:12.297", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://teradici.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/rvismit/578f9f98d79f22d81a5e45dbbc0b4fa4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://teradici.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/rvismit/578f9f98d79f22d81a5e45dbbc0b4fa4" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-08-11 18:15
Modified
2024-11-21 05:00
Severity ?
Summary
The web server in the Teradici Managament console versions 20.04 and 20.01.1 did not properly set the X-Frame-Options HTTP header, which could allow an attacker to trick a user into clicking a malicious link via clickjacking.
References
▶ | URL | Tags | |
---|---|---|---|
security@teradici.com | https://advisory.teradici.com/security-advisories/58/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisory.teradici.com/security-advisories/58/ | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
teradici | pcoip_management_console | 20.01.1 | |
teradici | pcoip_management_console | 20.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teradici:pcoip_management_console:20.01.1:*:*:*:*:*:*:*", "matchCriteriaId": "78283EF0-FF09-4B16-AC47-880321FA19F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:teradici:pcoip_management_console:20.04:*:*:*:*:*:*:*", "matchCriteriaId": "B9C100F3-9C76-4BE8-94CA-C9E7BE70FBD8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web server in the Teradici Managament console versions 20.04 and 20.01.1 did not properly set the X-Frame-Options HTTP header, which could allow an attacker to trick a user into clicking a malicious link via clickjacking." }, { "lang": "es", "value": "El servidor web en la consola de Teradici Managament versiones 20.04 y 20.01.1, no configur\u00f3 apropiadamente el encabezado HTTP X-Frame-Options, lo que podr\u00eda permitir a un atacante enga\u00f1ar a un usuario para que haga clic en un enlace malicioso mediante un secuestro de clic" } ], "id": "CVE-2020-13174", "lastModified": "2024-11-21T05:00:48.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-11T18:15:12.393", "references": [ { "source": "security@teradici.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://advisory.teradici.com/security-advisories/58/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://advisory.teradici.com/security-advisories/58/" } ], "sourceIdentifier": "security@teradici.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1021" } ], "source": "security@teradici.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-1021" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-08-17 21:15
Modified
2024-11-21 05:00
Severity ?
Summary
Reflected Cross Site Scripting in Teradici PCoIP Management Console prior to 20.07 could allow an attacker to take over the user's active session if the user is exposed to a malicious payload.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
teradici | pcoip_management_console | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teradici:pcoip_management_console:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A91B2BB-99F8-47C8-AFDA-38A9134957F2", "versionEndExcluding": "20.07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Reflected Cross Site Scripting in Teradici PCoIP Management Console prior to 20.07 could allow an attacker to take over the user\u0027s active session if the user is exposed to a malicious payload." }, { "lang": "es", "value": "Una vulnerabilidad de tipo Cross Site Scripting Reflejado en Teradici PCoIP Management Console versiones anteriores a 20.07, podr\u00edan permitir a un atacante tomar el control de la sesi\u00f3n activa del usuario si el usuario est\u00e1 expuesto a una carga \u00fatil maliciosa." } ], "id": "CVE-2020-13183", "lastModified": "2024-11-21T05:00:49.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-17T21:15:11.587", "references": [ { "source": "security@teradici.com", "tags": [ "Vendor Advisory" ], "url": "https://advisory.teradici.com/security-advisories/63/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisory.teradici.com/security-advisories/63/" } ], "sourceIdentifier": "security@teradici.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-30 05:15
Modified
2024-11-21 03:22
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Database Management. The manipulation leads to improper privilege management. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
References
▶ | URL | Tags | |
---|---|---|---|
cna@vuldb.com | http://seclists.org/fulldisclosure/2017/Feb/62 | Exploit, Mailing List, Third Party Advisory | |
cna@vuldb.com | https://vuldb.com/?id.97279 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2017/Feb/62 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://vuldb.com/?id.97279 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
teradici | pcoip_management_console | 2.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teradici:pcoip_management_console:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F032FC47-A2C9-415F-915A-5DD2F9851AE1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Database Management. The manipulation leads to improper privilege management. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad en Teradici Management Console versi\u00f3n 2.2.0. Ha sido declarada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente Database Management. La manipulaci\u00f3n conlleva a una administraci\u00f3n de privilegios inapropiada. Es posible lanzar el ataque en el host local. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede ser usada" } ], "id": "CVE-2017-20121", "lastModified": "2024-11-21T03:22:41.390", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-30T05:15:06.897", "references": [ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/62" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.97279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.97279" } ], "sourceIdentifier": "cna@vuldb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "cna@vuldb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }