Vulnerabilites related to dell - rsa_identity_governance_and_lifecycle
Vulnerability from fkie_nvd
Published
2019-09-11 20:15
Modified
2024-11-21 04:42
Summary
The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a code injection vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to run custom Groovy scripts to gain limited access to view or modify information on the Workflow system.
Impacted products
Vendor Product Version
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.1
dell rsa_identity_governance_and_lifecycle 7.1.1
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "44CA4907-A783-46E1-8B46-E17D48969AD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "052C1A07-3FB4-42A6-97E0-5FEC8F8F4C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p2_hotfix2:*:*:*:*:*:*",
              "matchCriteriaId": "9F14DC98-ACE2-4881-A56E-DC65F4BD6EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p3:*:*:*:*:*:*",
              "matchCriteriaId": "01B41090-3B78-47DE-938D-54286A0113AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p4:*:*:*:*:*:*",
              "matchCriteriaId": "014C5B9E-AE6F-49B6-9B99-C788B06210A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p5:*:*:*:*:*:*",
              "matchCriteriaId": "B229032D-521D-42C7-A713-841549A732A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p5_hotfix2:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BDB3E-AFDD-4CBC-99D9-702BCBC3CC10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "BB614915-FEB0-40BA-B937-A94A2BC32EA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p1:*:*:*:*:*:*",
              "matchCriteriaId": "F9FB2F5C-689B-421E-8419-E854F589016E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p10:*:*:*:*:*:*",
              "matchCriteriaId": "7C261380-E92D-4CB5-8AEE-753C72C24616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p11:*:*:*:*:*:*",
              "matchCriteriaId": "0338F8EE-0C27-4321-912D-B27B599EC995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p12:*:*:*:*:*:*",
              "matchCriteriaId": "7CAE5789-2829-4235-9B88-DD56CBE9FE90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p13:*:*:*:*:*:*",
              "matchCriteriaId": "06EFC55E-26A0-43DB-A810-F478686CDDA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p14:*:*:*:*:*:*",
              "matchCriteriaId": "B75C0122-F2BD-44EE-AB23-4C3710916449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p2:*:*:*:*:*:*",
              "matchCriteriaId": "8CEB0CCE-3641-4FB5-9A36-3D3F4554B128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p3:*:*:*:*:*:*",
              "matchCriteriaId": "F3D8E30F-B267-4A78-A0BC-FB42A5CA623B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p4:*:*:*:*:*:*",
              "matchCriteriaId": "67E2D018-FEB3-4F42-808D-D0B3AADFC7C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p5:*:*:*:*:*:*",
              "matchCriteriaId": "055DDA5C-F433-447A-B017-FE9A14FEFA4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p6:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3EF7B-D9F7-442C-B344-21BD031ADE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p7:*:*:*:*:*:*",
              "matchCriteriaId": "C98D1027-D86A-4EFB-B440-D198D22219E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p8:*:*:*:*:*:*",
              "matchCriteriaId": "79343DD1-5BC0-4E4B-882A-CEBB9716EED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p9:*:*:*:*:*:*",
              "matchCriteriaId": "A7CF1FAC-F88B-487F-872C-5912C19AB1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "BC3F7997-46CC-4345-981A-4CA38A73BA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p01:*:*:*:*:*:*",
              "matchCriteriaId": "DD36DED8-5591-4A76-AD40-7DAED6EF1954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p02:*:*:*:*:*:*",
              "matchCriteriaId": "6CF203FD-8A59-4237-820A-FDBE4F28E4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p03:*:*:*:*:*:*",
              "matchCriteriaId": "08FC40D4-433A-4EDE-87B1-422D0473D6D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p04:*:*:*:*:*:*",
              "matchCriteriaId": "5CF1C39E-D12B-44E4-8172-CD91F17E871B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p05:*:*:*:*:*:*",
              "matchCriteriaId": "31DCF79D-E1EA-4F65-B355-C821B0D78E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p06:*:*:*:*:*:*",
              "matchCriteriaId": "82CFC850-4C98-42B5-AE77-592FD64E78E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p07:*:*:*:*:*:*",
              "matchCriteriaId": "9DE35E51-0C69-41A8-9332-A9E411CE0B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "6E9E1900-FE59-440A-87D6-35DE7233EAB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "929D3EE3-00B4-485C-AB3F-DA04FF91C7FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "3D2D40A1-3C94-4550-9085-9F9369332BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "91BBA4D3-680B-4915-954E-1E92D1567014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "516C78B3-D8F9-4750-94BB-9C20674C2528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "59D6612B-3400-43EC-9EAA-D6451A7BBD63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "32D04EBE-8F30-48EA-B3BF-CFCF5910679E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "ABF6EBBB-4460-451F-B7A2-AC5C6E0DB4D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a code injection vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to run custom Groovy scripts to gain limited access to view or modify information on the Workflow system."
    },
    {
      "lang": "es",
      "value": "El software RSA Identity Governance and Lifecycle y los productos RSA Via Lifecycle and Governance versiones anteriores a 7.1.0 P08,  contienen una vulnerabilidad de inyecci\u00f3n de c\u00f3digo. Un usuario malicioso autenticado remoto podr\u00eda explotar potencialmente esta vulnerabilidad para ejecutar scripts Groovy personalizados para conseguir acceso limitado para visualizar o modificar informaci\u00f3n en el sistema Workflow."
    }
  ],
  "id": "CVE-2019-3759",
  "lastModified": "2024-11-21T04:42:28.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 2.7,
        "source": "security_alert@emc.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-11T20:15:11.410",
  "references": [
    {
      "source": "security_alert@emc.com",
      "url": "http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html"
    },
    {
      "source": "security_alert@emc.com",
      "url": "https://community.rsa.com/docs/DOC-106943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://community.rsa.com/docs/DOC-106943"
    }
  ],
  "sourceIdentifier": "security_alert@emc.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "security_alert@emc.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-18 21:15
Modified
2024-11-21 04:33
Summary
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. An authenticated malicious local user could potentially exploit this vulnerability by sending crafted URL with scripts. When victim users access the module through their browsers, the malicious code gets injected and executed by the web browser in the context of the vulnerable web application.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F243EB-5F06-4728-8815-93BDB5502F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD518D4A-157A-42D8-B958-8C4661CE6224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2715882-4E9F-4E4C-A648-30B5D8B36C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "BC3F7997-46CC-4345-981A-4CA38A73BA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p01:*:*:*:*:*:*",
              "matchCriteriaId": "DD36DED8-5591-4A76-AD40-7DAED6EF1954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p02:*:*:*:*:*:*",
              "matchCriteriaId": "6CF203FD-8A59-4237-820A-FDBE4F28E4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p03:*:*:*:*:*:*",
              "matchCriteriaId": "08FC40D4-433A-4EDE-87B1-422D0473D6D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p04:*:*:*:*:*:*",
              "matchCriteriaId": "5CF1C39E-D12B-44E4-8172-CD91F17E871B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p05:*:*:*:*:*:*",
              "matchCriteriaId": "31DCF79D-E1EA-4F65-B355-C821B0D78E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p06:*:*:*:*:*:*",
              "matchCriteriaId": "82CFC850-4C98-42B5-AE77-592FD64E78E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p07:*:*:*:*:*:*",
              "matchCriteriaId": "9DE35E51-0C69-41A8-9332-A9E411CE0B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p08:*:*:*:*:*:*",
              "matchCriteriaId": "A8989E78-229D-47B1-A60F-50394D8DF244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "6E9E1900-FE59-440A-87D6-35DE7233EAB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p01:*:*:*:*:*:*",
              "matchCriteriaId": "15371ECD-CACD-4E1F-854B-D5EA6D1BBC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p02:*:*:*:*:*:*",
              "matchCriteriaId": "ACD868A6-05CC-4BCF-BC53-EA4418DE5F45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. An authenticated malicious local user could potentially exploit this vulnerability by sending crafted URL with scripts. When victim users access the module through their browsers, the malicious code gets injected and executed by the web browser in the context of the vulnerable web application."
    },
    {
      "lang": "es",
      "value": "Los productos RSA Identity Governance and Lifecycle y RSA Via Lifecycle and Governance versiones anteriores a 7.1.1 P03, contienen una vulnerabilidad de tipo cross-site scripting reflejado en el m\u00f3dulo My Access Live [MAL]. Un usuario local malicioso autenticado podr\u00eda explotar potencialmente esta vulnerabilidad mediante el env\u00edo de una URL dise\u00f1ada con scripts. Cuando los usuarios v\u00edctimas acceden al m\u00f3dulo por medio de sus navegadores, el c\u00f3digo malicioso es insertado y ejecutado mediante el navegador web en el contexto de la aplicaci\u00f3n web vulnerable."
    }
  ],
  "id": "CVE-2019-18571",
  "lastModified": "2024-11-21T04:33:19.187",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "security_alert@emc.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-18T21:15:12.833",
  "references": [
    {
      "source": "security_alert@emc.com",
      "url": "https://community.rsa.com/docs/DOC-109310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://community.rsa.com/docs/DOC-109310"
    }
  ],
  "sourceIdentifier": "security_alert@emc.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security_alert@emc.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-18 21:15
Modified
2024-11-21 04:33
Severity ?
Summary
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain an Improper Authentication vulnerability. A Java JMX agent running on the remote host is configured with plain text password authentication. An unauthenticated remote attacker can connect to the JMX agent and monitor and manage the Java application.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F243EB-5F06-4728-8815-93BDB5502F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD518D4A-157A-42D8-B958-8C4661CE6224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2715882-4E9F-4E4C-A648-30B5D8B36C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "BC3F7997-46CC-4345-981A-4CA38A73BA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p01:*:*:*:*:*:*",
              "matchCriteriaId": "DD36DED8-5591-4A76-AD40-7DAED6EF1954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p02:*:*:*:*:*:*",
              "matchCriteriaId": "6CF203FD-8A59-4237-820A-FDBE4F28E4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p03:*:*:*:*:*:*",
              "matchCriteriaId": "08FC40D4-433A-4EDE-87B1-422D0473D6D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p04:*:*:*:*:*:*",
              "matchCriteriaId": "5CF1C39E-D12B-44E4-8172-CD91F17E871B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p05:*:*:*:*:*:*",
              "matchCriteriaId": "31DCF79D-E1EA-4F65-B355-C821B0D78E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p06:*:*:*:*:*:*",
              "matchCriteriaId": "82CFC850-4C98-42B5-AE77-592FD64E78E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p07:*:*:*:*:*:*",
              "matchCriteriaId": "9DE35E51-0C69-41A8-9332-A9E411CE0B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p08:*:*:*:*:*:*",
              "matchCriteriaId": "A8989E78-229D-47B1-A60F-50394D8DF244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "6E9E1900-FE59-440A-87D6-35DE7233EAB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p01:*:*:*:*:*:*",
              "matchCriteriaId": "15371ECD-CACD-4E1F-854B-D5EA6D1BBC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p02:*:*:*:*:*:*",
              "matchCriteriaId": "ACD868A6-05CC-4BCF-BC53-EA4418DE5F45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain an Improper Authentication vulnerability. A Java JMX agent running on the remote host is configured with plain text password authentication. An unauthenticated remote attacker can connect to the JMX agent and monitor and manage the Java application."
    },
    {
      "lang": "es",
      "value": "Los productos RSA Identity Governance and Lifecycle y RSA Via Lifecycle and Governance versiones anteriores a 7.1.1 P03, contienen una vulnerabilidad de Autenticaci\u00f3n Inapropiada. Un agente Java JMX que se ejecuta en el host remoto est\u00e1 configurado con autenticaci\u00f3n de contrase\u00f1a de texto plano. Un atacante remoto no autenticado puede conectarse al agente JMX y monitorear y administrar la aplicaci\u00f3n Java."
    }
  ],
  "id": "CVE-2019-18572",
  "lastModified": "2024-11-21T04:33:19.300",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 8.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.5,
        "source": "security_alert@emc.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-18T21:15:12.943",
  "references": [
    {
      "source": "security_alert@emc.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.rsa.com/docs/DOC-109310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.rsa.com/docs/DOC-109310"
    }
  ],
  "sourceIdentifier": "security_alert@emc.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "security_alert@emc.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-522"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-09-11 20:15
Modified
2024-11-21 04:42
Summary
The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a SQL Injection vulnerability in Workflow Architect. A remote authenticated malicious user could potentially exploit this vulnerability to execute SQL commands on the back-end database to gain unauthorized access to the data by supplying specially crafted input data to the affected application.
Impacted products
Vendor Product Version
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.1
dell rsa_identity_governance_and_lifecycle 7.1.1
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "44CA4907-A783-46E1-8B46-E17D48969AD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "052C1A07-3FB4-42A6-97E0-5FEC8F8F4C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p2_hotfix2:*:*:*:*:*:*",
              "matchCriteriaId": "9F14DC98-ACE2-4881-A56E-DC65F4BD6EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p3:*:*:*:*:*:*",
              "matchCriteriaId": "01B41090-3B78-47DE-938D-54286A0113AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p4:*:*:*:*:*:*",
              "matchCriteriaId": "014C5B9E-AE6F-49B6-9B99-C788B06210A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p5:*:*:*:*:*:*",
              "matchCriteriaId": "B229032D-521D-42C7-A713-841549A732A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p5_hotfix2:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BDB3E-AFDD-4CBC-99D9-702BCBC3CC10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "BB614915-FEB0-40BA-B937-A94A2BC32EA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p1:*:*:*:*:*:*",
              "matchCriteriaId": "F9FB2F5C-689B-421E-8419-E854F589016E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p10:*:*:*:*:*:*",
              "matchCriteriaId": "7C261380-E92D-4CB5-8AEE-753C72C24616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p11:*:*:*:*:*:*",
              "matchCriteriaId": "0338F8EE-0C27-4321-912D-B27B599EC995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p12:*:*:*:*:*:*",
              "matchCriteriaId": "7CAE5789-2829-4235-9B88-DD56CBE9FE90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p13:*:*:*:*:*:*",
              "matchCriteriaId": "06EFC55E-26A0-43DB-A810-F478686CDDA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p14:*:*:*:*:*:*",
              "matchCriteriaId": "B75C0122-F2BD-44EE-AB23-4C3710916449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p2:*:*:*:*:*:*",
              "matchCriteriaId": "8CEB0CCE-3641-4FB5-9A36-3D3F4554B128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p3:*:*:*:*:*:*",
              "matchCriteriaId": "F3D8E30F-B267-4A78-A0BC-FB42A5CA623B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p4:*:*:*:*:*:*",
              "matchCriteriaId": "67E2D018-FEB3-4F42-808D-D0B3AADFC7C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p5:*:*:*:*:*:*",
              "matchCriteriaId": "055DDA5C-F433-447A-B017-FE9A14FEFA4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p6:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3EF7B-D9F7-442C-B344-21BD031ADE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p7:*:*:*:*:*:*",
              "matchCriteriaId": "C98D1027-D86A-4EFB-B440-D198D22219E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p8:*:*:*:*:*:*",
              "matchCriteriaId": "79343DD1-5BC0-4E4B-882A-CEBB9716EED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p9:*:*:*:*:*:*",
              "matchCriteriaId": "A7CF1FAC-F88B-487F-872C-5912C19AB1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "BC3F7997-46CC-4345-981A-4CA38A73BA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p01:*:*:*:*:*:*",
              "matchCriteriaId": "DD36DED8-5591-4A76-AD40-7DAED6EF1954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p02:*:*:*:*:*:*",
              "matchCriteriaId": "6CF203FD-8A59-4237-820A-FDBE4F28E4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p03:*:*:*:*:*:*",
              "matchCriteriaId": "08FC40D4-433A-4EDE-87B1-422D0473D6D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p04:*:*:*:*:*:*",
              "matchCriteriaId": "5CF1C39E-D12B-44E4-8172-CD91F17E871B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p05:*:*:*:*:*:*",
              "matchCriteriaId": "31DCF79D-E1EA-4F65-B355-C821B0D78E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p06:*:*:*:*:*:*",
              "matchCriteriaId": "82CFC850-4C98-42B5-AE77-592FD64E78E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p07:*:*:*:*:*:*",
              "matchCriteriaId": "9DE35E51-0C69-41A8-9332-A9E411CE0B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "6E9E1900-FE59-440A-87D6-35DE7233EAB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "929D3EE3-00B4-485C-AB3F-DA04FF91C7FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "3D2D40A1-3C94-4550-9085-9F9369332BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "91BBA4D3-680B-4915-954E-1E92D1567014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "516C78B3-D8F9-4750-94BB-9C20674C2528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "59D6612B-3400-43EC-9EAA-D6451A7BBD63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "32D04EBE-8F30-48EA-B3BF-CFCF5910679E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "ABF6EBBB-4460-451F-B7A2-AC5C6E0DB4D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a SQL Injection vulnerability in Workflow Architect. A remote authenticated malicious user could potentially exploit this vulnerability to execute SQL commands on the back-end database to gain unauthorized access to the data by supplying specially crafted input data to the affected application."
    },
    {
      "lang": "es",
      "value": "El software RSA Identity Governance and Lifecycle y los productos RSA Via Lifecycle and Governance versiones anteriores a 7.1.0 P08, contienen una vulnerabilidad de inyecci\u00f3n SQL en Workflow Architect. Un usuario malicioso autenticado remotamente podr\u00eda explotar potencialmente esta vulnerabilidad para ejecutar comandos SQL en la base de datos del back-end para conseguir acceso no autorizado a los datos mediante el suministro de datos de entrada especialmente dise\u00f1ados para la aplicaci\u00f3n afectada."
    }
  ],
  "id": "CVE-2019-3760",
  "lastModified": "2024-11-21T04:42:28.643",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 2.7,
        "source": "security_alert@emc.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-11T20:15:11.490",
  "references": [
    {
      "source": "security_alert@emc.com",
      "url": "https://community.rsa.com/docs/DOC-106943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://community.rsa.com/docs/DOC-106943"
    }
  ],
  "sourceIdentifier": "security_alert@emc.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "security_alert@emc.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-18 21:15
Modified
2024-11-21 04:33
Summary
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim’s session and perform arbitrary actions with privileges of the user within the compromised session.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F243EB-5F06-4728-8815-93BDB5502F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD518D4A-157A-42D8-B958-8C4661CE6224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2715882-4E9F-4E4C-A648-30B5D8B36C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "BC3F7997-46CC-4345-981A-4CA38A73BA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p01:*:*:*:*:*:*",
              "matchCriteriaId": "DD36DED8-5591-4A76-AD40-7DAED6EF1954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p02:*:*:*:*:*:*",
              "matchCriteriaId": "6CF203FD-8A59-4237-820A-FDBE4F28E4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p03:*:*:*:*:*:*",
              "matchCriteriaId": "08FC40D4-433A-4EDE-87B1-422D0473D6D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p04:*:*:*:*:*:*",
              "matchCriteriaId": "5CF1C39E-D12B-44E4-8172-CD91F17E871B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p05:*:*:*:*:*:*",
              "matchCriteriaId": "31DCF79D-E1EA-4F65-B355-C821B0D78E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p06:*:*:*:*:*:*",
              "matchCriteriaId": "82CFC850-4C98-42B5-AE77-592FD64E78E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p07:*:*:*:*:*:*",
              "matchCriteriaId": "9DE35E51-0C69-41A8-9332-A9E411CE0B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p08:*:*:*:*:*:*",
              "matchCriteriaId": "A8989E78-229D-47B1-A60F-50394D8DF244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "6E9E1900-FE59-440A-87D6-35DE7233EAB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p01:*:*:*:*:*:*",
              "matchCriteriaId": "15371ECD-CACD-4E1F-854B-D5EA6D1BBC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p02:*:*:*:*:*:*",
              "matchCriteriaId": "ACD868A6-05CC-4BCF-BC53-EA4418DE5F45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim\u2019s session and perform arbitrary actions with privileges of the user within the compromised session."
    },
    {
      "lang": "es",
      "value": "Los productos RSA Identity Governance and Lifecycle y RSA Via Lifecycle and Governance anteriores a 7.1.1 P03 contienen una vulnerabilidad de fijaci\u00f3n de sesi\u00f3n. Un usuario local malintencionado autenticado podr\u00eda aprovechar esta vulnerabilidad ya que el token de sesi\u00f3n se expone como parte de la URL. Un atacante remoto puede obtener acceso a la sesi\u00f3n de la v\u00edctima y realizar acciones arbitrarias con privilegios del usuario dentro de la sesi\u00f3n comprometida."
    }
  ],
  "id": "CVE-2019-18573",
  "lastModified": "2024-11-21T04:33:19.420",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 5.8,
        "source": "security_alert@emc.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-18T21:15:13.083",
  "references": [
    {
      "source": "security_alert@emc.com",
      "url": "https://community.rsa.com/docs/DOC-109310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://community.rsa.com/docs/DOC-109310"
    }
  ],
  "sourceIdentifier": "security_alert@emc.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-598"
        }
      ],
      "source": "security_alert@emc.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-384"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-09-11 20:15
Modified
2024-11-21 04:42
Summary
The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain an information exposure vulnerability. The Office 365 user password may get logged in a plain text format in the Office 365 connector debug log file. An authenticated malicious local user with access to the debug logs may obtain the exposed password to use in further attacks.
Impacted products
Vendor Product Version
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.1
dell rsa_identity_governance_and_lifecycle 7.1.1
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "44CA4907-A783-46E1-8B46-E17D48969AD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "052C1A07-3FB4-42A6-97E0-5FEC8F8F4C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p2_hotfix2:*:*:*:*:*:*",
              "matchCriteriaId": "9F14DC98-ACE2-4881-A56E-DC65F4BD6EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p3:*:*:*:*:*:*",
              "matchCriteriaId": "01B41090-3B78-47DE-938D-54286A0113AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p4:*:*:*:*:*:*",
              "matchCriteriaId": "014C5B9E-AE6F-49B6-9B99-C788B06210A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p5:*:*:*:*:*:*",
              "matchCriteriaId": "B229032D-521D-42C7-A713-841549A732A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p5_hotfix2:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BDB3E-AFDD-4CBC-99D9-702BCBC3CC10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "BB614915-FEB0-40BA-B937-A94A2BC32EA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p1:*:*:*:*:*:*",
              "matchCriteriaId": "F9FB2F5C-689B-421E-8419-E854F589016E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p10:*:*:*:*:*:*",
              "matchCriteriaId": "7C261380-E92D-4CB5-8AEE-753C72C24616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p11:*:*:*:*:*:*",
              "matchCriteriaId": "0338F8EE-0C27-4321-912D-B27B599EC995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p12:*:*:*:*:*:*",
              "matchCriteriaId": "7CAE5789-2829-4235-9B88-DD56CBE9FE90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p13:*:*:*:*:*:*",
              "matchCriteriaId": "06EFC55E-26A0-43DB-A810-F478686CDDA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p14:*:*:*:*:*:*",
              "matchCriteriaId": "B75C0122-F2BD-44EE-AB23-4C3710916449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p2:*:*:*:*:*:*",
              "matchCriteriaId": "8CEB0CCE-3641-4FB5-9A36-3D3F4554B128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p3:*:*:*:*:*:*",
              "matchCriteriaId": "F3D8E30F-B267-4A78-A0BC-FB42A5CA623B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p4:*:*:*:*:*:*",
              "matchCriteriaId": "67E2D018-FEB3-4F42-808D-D0B3AADFC7C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p5:*:*:*:*:*:*",
              "matchCriteriaId": "055DDA5C-F433-447A-B017-FE9A14FEFA4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p6:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3EF7B-D9F7-442C-B344-21BD031ADE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p7:*:*:*:*:*:*",
              "matchCriteriaId": "C98D1027-D86A-4EFB-B440-D198D22219E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p8:*:*:*:*:*:*",
              "matchCriteriaId": "79343DD1-5BC0-4E4B-882A-CEBB9716EED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p9:*:*:*:*:*:*",
              "matchCriteriaId": "A7CF1FAC-F88B-487F-872C-5912C19AB1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "BC3F7997-46CC-4345-981A-4CA38A73BA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p01:*:*:*:*:*:*",
              "matchCriteriaId": "DD36DED8-5591-4A76-AD40-7DAED6EF1954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p02:*:*:*:*:*:*",
              "matchCriteriaId": "6CF203FD-8A59-4237-820A-FDBE4F28E4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p03:*:*:*:*:*:*",
              "matchCriteriaId": "08FC40D4-433A-4EDE-87B1-422D0473D6D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p04:*:*:*:*:*:*",
              "matchCriteriaId": "5CF1C39E-D12B-44E4-8172-CD91F17E871B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p05:*:*:*:*:*:*",
              "matchCriteriaId": "31DCF79D-E1EA-4F65-B355-C821B0D78E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p06:*:*:*:*:*:*",
              "matchCriteriaId": "82CFC850-4C98-42B5-AE77-592FD64E78E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p07:*:*:*:*:*:*",
              "matchCriteriaId": "9DE35E51-0C69-41A8-9332-A9E411CE0B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "6E9E1900-FE59-440A-87D6-35DE7233EAB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "929D3EE3-00B4-485C-AB3F-DA04FF91C7FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "3D2D40A1-3C94-4550-9085-9F9369332BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "91BBA4D3-680B-4915-954E-1E92D1567014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "516C78B3-D8F9-4750-94BB-9C20674C2528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "59D6612B-3400-43EC-9EAA-D6451A7BBD63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "32D04EBE-8F30-48EA-B3BF-CFCF5910679E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "ABF6EBBB-4460-451F-B7A2-AC5C6E0DB4D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain an information exposure vulnerability. The Office 365 user password may get logged in a plain text format in the Office 365 connector debug log file. An authenticated malicious local user with access to the debug logs may obtain the exposed password to use in further attacks."
    },
    {
      "lang": "es",
      "value": "El software RSA Identity Governance and Lifecycle y los productos RSA Via Lifecycle and Governance versiones anteriores a 7.1.0 P08, contienen una vulnerabilidad de exposici\u00f3n de informaci\u00f3n. La contrase\u00f1a de usuario de Office 365 puede registrarse en un formato de texto plano en el archivo de registro de depuraci\u00f3n del conector de Office 365. Un usuario local malicioso autenticado con acceso a los registros de depuraci\u00f3n puede obtener la contrase\u00f1a expuesta para usarla en pr\u00f3ximos ataques."
    }
  ],
  "id": "CVE-2019-3763",
  "lastModified": "2024-11-21T04:42:29.020",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "security_alert@emc.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-11T20:15:11.630",
  "references": [
    {
      "source": "security_alert@emc.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.rsa.com/docs/DOC-106943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.rsa.com/docs/DOC-106943"
    }
  ],
  "sourceIdentifier": "security_alert@emc.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-532"
        }
      ],
      "source": "security_alert@emc.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-532"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-09-11 20:15
Modified
2024-11-21 04:42
Summary
The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a stored cross-site scripting vulnerability in the Access Request module. A remote authenticated malicious user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the stored malicious code would gets executed by the web browser in the context of the vulnerable web application.
Impacted products
Vendor Product Version
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.1
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.0.2
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.0
dell rsa_identity_governance_and_lifecycle 7.1.1
dell rsa_identity_governance_and_lifecycle 7.1.1
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0
dell rsa_via_lifecycle_and_governance 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "44CA4907-A783-46E1-8B46-E17D48969AD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "052C1A07-3FB4-42A6-97E0-5FEC8F8F4C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p2_hotfix2:*:*:*:*:*:*",
              "matchCriteriaId": "9F14DC98-ACE2-4881-A56E-DC65F4BD6EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p3:*:*:*:*:*:*",
              "matchCriteriaId": "01B41090-3B78-47DE-938D-54286A0113AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p4:*:*:*:*:*:*",
              "matchCriteriaId": "014C5B9E-AE6F-49B6-9B99-C788B06210A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p5:*:*:*:*:*:*",
              "matchCriteriaId": "B229032D-521D-42C7-A713-841549A732A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p5_hotfix2:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BDB3E-AFDD-4CBC-99D9-702BCBC3CC10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "BB614915-FEB0-40BA-B937-A94A2BC32EA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p1:*:*:*:*:*:*",
              "matchCriteriaId": "F9FB2F5C-689B-421E-8419-E854F589016E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p10:*:*:*:*:*:*",
              "matchCriteriaId": "7C261380-E92D-4CB5-8AEE-753C72C24616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p11:*:*:*:*:*:*",
              "matchCriteriaId": "0338F8EE-0C27-4321-912D-B27B599EC995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p12:*:*:*:*:*:*",
              "matchCriteriaId": "7CAE5789-2829-4235-9B88-DD56CBE9FE90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p13:*:*:*:*:*:*",
              "matchCriteriaId": "06EFC55E-26A0-43DB-A810-F478686CDDA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p14:*:*:*:*:*:*",
              "matchCriteriaId": "B75C0122-F2BD-44EE-AB23-4C3710916449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p2:*:*:*:*:*:*",
              "matchCriteriaId": "8CEB0CCE-3641-4FB5-9A36-3D3F4554B128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p3:*:*:*:*:*:*",
              "matchCriteriaId": "F3D8E30F-B267-4A78-A0BC-FB42A5CA623B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p4:*:*:*:*:*:*",
              "matchCriteriaId": "67E2D018-FEB3-4F42-808D-D0B3AADFC7C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p5:*:*:*:*:*:*",
              "matchCriteriaId": "055DDA5C-F433-447A-B017-FE9A14FEFA4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p6:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3EF7B-D9F7-442C-B344-21BD031ADE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p7:*:*:*:*:*:*",
              "matchCriteriaId": "C98D1027-D86A-4EFB-B440-D198D22219E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p8:*:*:*:*:*:*",
              "matchCriteriaId": "79343DD1-5BC0-4E4B-882A-CEBB9716EED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p9:*:*:*:*:*:*",
              "matchCriteriaId": "A7CF1FAC-F88B-487F-872C-5912C19AB1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "BC3F7997-46CC-4345-981A-4CA38A73BA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p01:*:*:*:*:*:*",
              "matchCriteriaId": "DD36DED8-5591-4A76-AD40-7DAED6EF1954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p02:*:*:*:*:*:*",
              "matchCriteriaId": "6CF203FD-8A59-4237-820A-FDBE4F28E4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p03:*:*:*:*:*:*",
              "matchCriteriaId": "08FC40D4-433A-4EDE-87B1-422D0473D6D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p04:*:*:*:*:*:*",
              "matchCriteriaId": "5CF1C39E-D12B-44E4-8172-CD91F17E871B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p05:*:*:*:*:*:*",
              "matchCriteriaId": "31DCF79D-E1EA-4F65-B355-C821B0D78E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p06:*:*:*:*:*:*",
              "matchCriteriaId": "82CFC850-4C98-42B5-AE77-592FD64E78E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p07:*:*:*:*:*:*",
              "matchCriteriaId": "9DE35E51-0C69-41A8-9332-A9E411CE0B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "6E9E1900-FE59-440A-87D6-35DE7233EAB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "929D3EE3-00B4-485C-AB3F-DA04FF91C7FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "3D2D40A1-3C94-4550-9085-9F9369332BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "91BBA4D3-680B-4915-954E-1E92D1567014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "516C78B3-D8F9-4750-94BB-9C20674C2528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "59D6612B-3400-43EC-9EAA-D6451A7BBD63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "32D04EBE-8F30-48EA-B3BF-CFCF5910679E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "ABF6EBBB-4460-451F-B7A2-AC5C6E0DB4D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a stored cross-site scripting vulnerability in the Access Request module. A remote authenticated malicious user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the stored malicious code would gets executed by the web browser in the context of the vulnerable web application."
    },
    {
      "lang": "es",
      "value": "El software RSA Identity Governance and Lifecycle y los productos RSA Via Lifecycle and Governance versiones anteriores a 7.1.0 P08, contienen una vulnerabilidad de tipo cross-site scripting almacenado en el m\u00f3dulo Access Request. Un usuario malicioso autenticado remotamente podr\u00eda explotar potencialmente esta vulnerabilidad para almacenar c\u00f3digo HTML o JavaScript malicioso en un almac\u00e9n de datos de aplicaciones confiable. Cuando usuarios v\u00edctimas acceden al almac\u00e9n de datos mediante sus navegadores, el c\u00f3digo malicioso almacenado ser\u00eda ejecutado mediante la aplicaci\u00f3n web vulnerable."
    }
  ],
  "id": "CVE-2019-3761",
  "lastModified": "2024-11-21T04:42:28.777",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "security_alert@emc.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-11T20:15:11.553",
  "references": [
    {
      "source": "security_alert@emc.com",
      "url": "https://community.rsa.com/docs/DOC-106943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://community.rsa.com/docs/DOC-106943"
    }
  ],
  "sourceIdentifier": "security_alert@emc.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security_alert@emc.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2019-3759 (GCVE-0-2019-3759)
Vulnerability from cvelistv5
Published
2019-09-11 19:17
Modified
2024-09-17 01:06
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
Summary
The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a code injection vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to run custom Groovy scripts to gain limited access to view or modify information on the Workflow system.
Impacted products
Vendor Product Version
Dell RSA Identity Governance and Lifecycle Version: unspecified   < 7.1.1 P02
Version: unspecified   < 7.1.0 P08
Version: 7.0.2
Version: 7.0.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:19:18.447Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.rsa.com/docs/DOC-106943"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "RSA Identity Governance and Lifecycle",
          "vendor": "Dell",
          "versions": [
            {
              "lessThan": "7.1.1 P02",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "7.1.0 P08",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.0.2"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            }
          ]
        },
        {
          "product": "RSA Via Lifecycle and Governance",
          "vendor": "Dell",
          "versions": [
            {
              "status": "affected",
              "version": "7.0"
            }
          ]
        }
      ],
      "datePublic": "2019-09-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a code injection vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to run custom Groovy scripts to gain limited access to view or modify information on the Workflow system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-31T15:12:36",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.rsa.com/docs/DOC-106943"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.8"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@dell.com",
          "DATE_PUBLIC": "2019-09-09T16:00:00.000Z",
          "ID": "CVE-2019-3759",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RSA Identity Governance and Lifecycle",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.1 P02"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.0 P08"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.0.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.0.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RSA Via Lifecycle and Governance",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "7.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Dell"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a code injection vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to run custom Groovy scripts to gain limited access to view or modify information on the Workflow system."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.8"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.rsa.com/docs/DOC-106943",
              "refsource": "MISC",
              "url": "https://community.rsa.com/docs/DOC-106943"
            },
            {
              "name": "http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2019-3759",
    "datePublished": "2019-09-11T19:17:30.305420Z",
    "dateReserved": "2019-01-03T00:00:00",
    "dateUpdated": "2024-09-17T01:06:30.738Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-18573 (GCVE-0-2019-18573)
Vulnerability from cvelistv5
Published
2019-12-18 20:50
Modified
2024-09-16 16:28
CWE
  • CWE-598 - Information Exposure Through Query Strings in GET Request
Summary
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim’s session and perform arbitrary actions with privileges of the user within the compromised session.
References
Impacted products
Vendor Product Version
Dell RSA Identity Governance & Lifecycle Version: unspecified   < 7.1.0 P09, 7.1.1 P03
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:54:14.362Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.rsa.com/docs/DOC-109310"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "RSA Identity Governance \u0026 Lifecycle",
          "vendor": "Dell",
          "versions": [
            {
              "lessThan": "7.1.0 P09, 7.1.1 P03",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-11-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim\u2019s session and perform arbitrary actions with privileges of the user within the compromised session."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-598",
              "description": "CWE-598: Information Exposure Through Query Strings in GET Request",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-31T15:12:36",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.rsa.com/docs/DOC-109310"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@dell.com",
          "DATE_PUBLIC": "2019-11-26",
          "ID": "CVE-2019-18573",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RSA Identity Governance \u0026 Lifecycle",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.0 P09, 7.1.1 P03"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Dell"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim\u2019s session and perform arbitrary actions with privileges of the user within the compromised session."
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": 8.7,
            "baseSeverity": "High",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-598: Information Exposure Through Query Strings in GET Request"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.rsa.com/docs/DOC-109310",
              "refsource": "MISC",
              "url": "https://community.rsa.com/docs/DOC-109310"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2019-18573",
    "datePublished": "2019-12-18T20:50:14.868223Z",
    "dateReserved": "2019-10-29T00:00:00",
    "dateUpdated": "2024-09-16T16:28:49.370Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-3760 (GCVE-0-2019-3760)
Vulnerability from cvelistv5
Published
2019-09-11 19:17
Modified
2024-09-17 04:18
CWE
  • CWE-20 - Improper Input Validation
Summary
The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a SQL Injection vulnerability in Workflow Architect. A remote authenticated malicious user could potentially exploit this vulnerability to execute SQL commands on the back-end database to gain unauthorized access to the data by supplying specially crafted input data to the affected application.
References
Impacted products
Vendor Product Version
Dell RSA Identity Governance and Lifecycle Version: unspecified   < 7.1.1 P02
Version: unspecified   < 7.1.0 P08
Version: 7.0.2
Version: 7.0.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:19:18.584Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.rsa.com/docs/DOC-106943"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "RSA Identity Governance and Lifecycle",
          "vendor": "Dell",
          "versions": [
            {
              "lessThan": "7.1.1 P02",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "7.1.0 P08",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.0.2"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            }
          ]
        },
        {
          "product": "RSA Via Lifecycle and Governance",
          "vendor": "Dell",
          "versions": [
            {
              "status": "affected",
              "version": "7.0"
            }
          ]
        }
      ],
      "datePublic": "2019-09-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a SQL Injection vulnerability in Workflow Architect. A remote authenticated malicious user could potentially exploit this vulnerability to execute SQL commands on the back-end database to gain unauthorized access to the data by supplying specially crafted input data to the affected application."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-31T15:12:36",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.rsa.com/docs/DOC-106943"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.8"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@dell.com",
          "DATE_PUBLIC": "2019-09-09T16:00:00.000Z",
          "ID": "CVE-2019-3760",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RSA Identity Governance and Lifecycle",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.1 P02"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.0 P08"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.0.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.0.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RSA Via Lifecycle and Governance",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "7.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Dell"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a SQL Injection vulnerability in Workflow Architect. A remote authenticated malicious user could potentially exploit this vulnerability to execute SQL commands on the back-end database to gain unauthorized access to the data by supplying specially crafted input data to the affected application."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.8"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.rsa.com/docs/DOC-106943",
              "refsource": "MISC",
              "url": "https://community.rsa.com/docs/DOC-106943"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2019-3760",
    "datePublished": "2019-09-11T19:17:30.353240Z",
    "dateReserved": "2019-01-03T00:00:00",
    "dateUpdated": "2024-09-17T04:18:59.375Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-3761 (GCVE-0-2019-3761)
Vulnerability from cvelistv5
Published
2019-09-11 19:17
Modified
2024-09-16 18:12
CWE
  • CWE-79 - Cross-site Scripting (XSS)
Summary
The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a stored cross-site scripting vulnerability in the Access Request module. A remote authenticated malicious user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the stored malicious code would gets executed by the web browser in the context of the vulnerable web application.
References
Impacted products
Vendor Product Version
Dell RSA Identity Governance and Lifecycle Version: unspecified   < 7.1.1 P02
Version: unspecified   < 7.1.0 P08
Version: 7.0.2
Version: 7.0.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:19:18.200Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.rsa.com/docs/DOC-106943"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "RSA Identity Governance and Lifecycle",
          "vendor": "Dell",
          "versions": [
            {
              "lessThan": "7.1.1 P02",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "7.1.0 P08",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.0.2"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            }
          ]
        },
        {
          "product": "RSA Via Lifecycle and Governance",
          "vendor": "Dell",
          "versions": [
            {
              "status": "affected",
              "version": "7.0"
            }
          ]
        }
      ],
      "datePublic": "2019-09-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a stored cross-site scripting vulnerability in the Access Request module. A remote authenticated malicious user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the stored malicious code would gets executed by the web browser in the context of the vulnerable web application."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross-site Scripting (XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-31T15:12:36",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.rsa.com/docs/DOC-106943"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.8"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@dell.com",
          "DATE_PUBLIC": "2019-09-09T16:00:00.000Z",
          "ID": "CVE-2019-3761",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RSA Identity Governance and Lifecycle",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.1 P02"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.0 P08"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.0.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.0.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RSA Via Lifecycle and Governance",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "7.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Dell"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain a stored cross-site scripting vulnerability in the Access Request module. A remote authenticated malicious user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the stored malicious code would gets executed by the web browser in the context of the vulnerable web application."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.8"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79 Cross-site Scripting (XSS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.rsa.com/docs/DOC-106943",
              "refsource": "MISC",
              "url": "https://community.rsa.com/docs/DOC-106943"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2019-3761",
    "datePublished": "2019-09-11T19:17:30.396232Z",
    "dateReserved": "2019-01-03T00:00:00",
    "dateUpdated": "2024-09-16T18:12:57.898Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-18571 (GCVE-0-2019-18571)
Vulnerability from cvelistv5
Published
2019-12-18 20:50
Modified
2024-09-16 19:10
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. An authenticated malicious local user could potentially exploit this vulnerability by sending crafted URL with scripts. When victim users access the module through their browsers, the malicious code gets injected and executed by the web browser in the context of the vulnerable web application.
References
Impacted products
Vendor Product Version
Dell RSA Identity Governance & Lifecycle Version: unspecified   < 7.1.0 P09, 7.1.1 P3
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:54:14.492Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.rsa.com/docs/DOC-109310"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "RSA Identity Governance \u0026 Lifecycle",
          "vendor": "Dell",
          "versions": [
            {
              "lessThan": "7.1.0 P09, 7.1.1 P3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-11-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. An authenticated malicious local user could potentially exploit this vulnerability by sending crafted URL with scripts. When victim users access the module through their browsers, the malicious code gets injected and executed by the web browser in the context of the vulnerable web application."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-31T15:12:35",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.rsa.com/docs/DOC-109310"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@dell.com",
          "DATE_PUBLIC": "2019-11-26",
          "ID": "CVE-2019-18571",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RSA Identity Governance \u0026 Lifecycle",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.0 P09, 7.1.1 P3"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Dell"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. An authenticated malicious local user could potentially exploit this vulnerability by sending crafted URL with scripts. When victim users access the module through their browsers, the malicious code gets injected and executed by the web browser in the context of the vulnerable web application."
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": 5.4,
            "baseSeverity": "Medium",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.rsa.com/docs/DOC-109310",
              "refsource": "MISC",
              "url": "https://community.rsa.com/docs/DOC-109310"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2019-18571",
    "datePublished": "2019-12-18T20:50:13.968502Z",
    "dateReserved": "2019-10-29T00:00:00",
    "dateUpdated": "2024-09-16T19:10:42.619Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-3763 (GCVE-0-2019-3763)
Vulnerability from cvelistv5
Published
2019-09-11 19:17
Modified
2024-09-16 22:20
CWE
  • CWE-532 - Information Exposure Through Log Files
Summary
The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain an information exposure vulnerability. The Office 365 user password may get logged in a plain text format in the Office 365 connector debug log file. An authenticated malicious local user with access to the debug logs may obtain the exposed password to use in further attacks.
References
Impacted products
Vendor Product Version
Dell RSA Identity Governance and Lifecycle Version: unspecified   < 7.1.1 P02
Version: unspecified   < 7.1.0 P08
Version: 7.0.2
Version: 7.0.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:19:18.307Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.rsa.com/docs/DOC-106943"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "RSA Identity Governance and Lifecycle",
          "vendor": "Dell",
          "versions": [
            {
              "lessThan": "7.1.1 P02",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "7.1.0 P08",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.0.2"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            }
          ]
        },
        {
          "product": "RSA Via Lifecycle and Governance",
          "vendor": "Dell",
          "versions": [
            {
              "status": "affected",
              "version": "7.0"
            }
          ]
        }
      ],
      "datePublic": "2019-09-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain an information exposure vulnerability. The Office 365 user password may get logged in a plain text format in the Office 365 connector debug log file. An authenticated malicious local user with access to the debug logs may obtain the exposed password to use in further attacks."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "CWE-532 Information Exposure Through Log Files",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-31T15:12:36",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.rsa.com/docs/DOC-106943"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.8"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@dell.com",
          "DATE_PUBLIC": "2019-09-09T16:00:00.000Z",
          "ID": "CVE-2019-3763",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RSA Identity Governance and Lifecycle",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.1 P02"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.0 P08"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.0.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.0.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RSA Via Lifecycle and Governance",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "7.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Dell"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain an information exposure vulnerability. The Office 365 user password may get logged in a plain text format in the Office 365 connector debug log file. An authenticated malicious local user with access to the debug logs may obtain the exposed password to use in further attacks."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.8"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-532 Information Exposure Through Log Files"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.rsa.com/docs/DOC-106943",
              "refsource": "MISC",
              "url": "https://community.rsa.com/docs/DOC-106943"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2019-3763",
    "datePublished": "2019-09-11T19:17:30.440600Z",
    "dateReserved": "2019-01-03T00:00:00",
    "dateUpdated": "2024-09-16T22:20:25.143Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-18572 (GCVE-0-2019-18572)
Vulnerability from cvelistv5
Published
2019-12-18 20:50
Modified
2024-09-16 22:19
CWE
  • CWE-306 - Missing Authentication for Critical Function
Summary
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain an Improper Authentication vulnerability. A Java JMX agent running on the remote host is configured with plain text password authentication. An unauthenticated remote attacker can connect to the JMX agent and monitor and manage the Java application.
References
Impacted products
Vendor Product Version
Dell RSA Identity Governance & Lifecycle Version: unspecified   < 7.1.0 P09, 7.1.1 P03
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:54:14.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.rsa.com/docs/DOC-109310"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "RSA Identity Governance \u0026 Lifecycle",
          "vendor": "Dell",
          "versions": [
            {
              "lessThan": "7.1.0 P09, 7.1.1 P03",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-11-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain an Improper Authentication vulnerability. A Java JMX agent running on the remote host is configured with plain text password authentication. An unauthenticated remote attacker can connect to the JMX agent and monitor and manage the Java application."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306: Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-31T15:12:36",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.rsa.com/docs/DOC-109310"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@dell.com",
          "DATE_PUBLIC": "2019-11-26",
          "ID": "CVE-2019-18572",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RSA Identity Governance \u0026 Lifecycle",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.1.0 P09, 7.1.1 P03"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Dell"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain an Improper Authentication vulnerability. A Java JMX agent running on the remote host is configured with plain text password authentication. An unauthenticated remote attacker can connect to the JMX agent and monitor and manage the Java application."
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": 8.3,
            "baseSeverity": "High",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-306: Missing Authentication for Critical Function"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.rsa.com/docs/DOC-109310",
              "refsource": "MISC",
              "url": "https://community.rsa.com/docs/DOC-109310"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2019-18572",
    "datePublished": "2019-12-18T20:50:14.414861Z",
    "dateReserved": "2019-10-29T00:00:00",
    "dateUpdated": "2024-09-16T22:19:43.694Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}