gsd-2021-42000
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
When a password reset or password change flow with an authentication policy is configured and the adapter in the reset or change policy supports multiple parallel reset flows, an existing user can reset another existing users password.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-42000", "description": "When a password reset or password change flow with an authentication policy is configured and the adapter in the reset or change policy supports multiple parallel reset flows, an existing user can reset another existing users password.", "id": "GSD-2021-42000" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-42000" ], "details": "When a password reset or password change flow with an authentication policy is configured and the adapter in the reset or change policy supports multiple parallel reset flows, an existing user can reset another existing users password.", "id": "GSD-2021-42000", "modified": "2023-12-13T01:23:06.413890Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "responsible-disclosure@pingidentity.com", "ID": "CVE-2021-42000", "STATE": "PUBLIC", "TITLE": "Ping Identity PingFederate Password Reset and Password Change Mishandling with an authentication policy in parallel reset flows" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PingFederate", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "9.3.0", "version_value": "9.3.3-P15" }, { "version_affected": "\u003e=", "version_name": "10.0.0", "version_value": "10.0.11" }, { "version_affected": "\u003e=", "version_name": "10.1.0", "version_value": "10.1.8" }, { "version_affected": "\u003e=", "version_name": "10.2.0", "version_value": "10.2.6" }, { "version_affected": "\u003e=", "version_name": "10.3.0", "version_value": "10.3.2" } ] } } ] }, "vendor_name": "Ping Identity" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When a password reset or password change flow with an authentication policy is configured and the adapter in the reset or change policy supports multiple parallel reset flows, an existing user can reset another existing users password." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285 Improper Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.pingidentity.com/en/resources/downloads/pingfederate.html", "refsource": "MISC", "url": "https://www.pingidentity.com/en/resources/downloads/pingfederate.html" }, { "name": "https://docs.pingidentity.com/bundle/pingfederate-103/page/hhm1634833631515.html", "refsource": "MISC", "url": "https://docs.pingidentity.com/bundle/pingfederate-103/page/hhm1634833631515.html" } ] }, "solution": [ { "lang": "eng", "value": "PingFederate product patched versions 9.3.3-P16, 10.0.12, 10.1.9, 10.2.7, 10.3.3" } ], "source": { "advisory": "SECBL020", "defect": [ "PF-29924" ], "discovery": "INTERNAL" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.3.2", "versionStartIncluding": "10.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.6", "versionStartIncluding": "10.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.1.8", "versionStartIncluding": "10.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.0.11", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pingidentity:pingfederate:9.3.3:p15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pingidentity:pingfederate:9.3.3:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "responsible-disclosure@pingidentity.com", "ID": "CVE-2021-42000" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "When a password reset or password change flow with an authentication policy is configured and the adapter in the reset or change policy supports multiple parallel reset flows, an existing user can reset another existing users password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.pingidentity.com/en/resources/downloads/pingfederate.html", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.pingidentity.com/en/resources/downloads/pingfederate.html" }, { "name": "https://docs.pingidentity.com/bundle/pingfederate-103/page/hhm1634833631515.html", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.pingidentity.com/bundle/pingfederate-103/page/hhm1634833631515.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-08-09T00:39Z", "publishedDate": "2022-02-10T23:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…