-
Notifications
You must be signed in to change notification settings - Fork 58
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
GSD-automation
committed
Apr 12, 2024
1 parent
6cd3989
commit fcdf55a
Showing
445 changed files
with
17,826 additions
and
2,009 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -109,107 +109,141 @@ | |
} | ||
}, | ||
"nvd.nist.gov": { | ||
"configurations": { | ||
"CVE_data_version": "4.0", | ||
"nodes": [ | ||
"cve": { | ||
"configurations": [ | ||
{ | ||
"children": [], | ||
"cpe_match": [ | ||
"nodes": [ | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:cisco:webex_meetings:*:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"versionEndExcluding": "2020-11-24", | ||
"vulnerable": true | ||
"cpeMatch": [ | ||
{ | ||
"criteria": "cpe:2.3:a:cisco:webex_meetings:*:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "16E3E396-FE11-45CF-B820-DD167762BED1", | ||
"versionEndExcluding": "40.11.1", | ||
"vulnerable": true | ||
} | ||
], | ||
"negate": false, | ||
"operator": "OR" | ||
} | ||
], | ||
"operator": "OR" | ||
] | ||
} | ||
] | ||
}, | ||
"cve": { | ||
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2021-1310" | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "A vulnerability in the web-based management interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to redirect a user to an untrusted web page, bypassing the warning mechanism that should prompt the user before the redirection. This vulnerability is due to improper input validation of the URL parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website, bypassing the Webex URL check that should result in a warning before the redirection to the web page. Attackers may use this type of vulnerability, known as an open redirect attack, as part of a phishing attack to convince users to unknowingly visit malicious sites." | ||
}, | ||
{ | ||
"lang": "es", | ||
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Webex Meetings, podr\u00eda permitir a un atacante remoto no autenticado redirecciona a un usuario a una p\u00e1gina web que no sea de confianza, sin pasar por el mecanismo de advertencia que deber\u00eda avisar al usuario antes del redireccionamiento. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada incorrecta de los par\u00e1metros de URL en una petici\u00f3n HTTP. Un atacante podr\u00eda explotar esta vulnerabilidad persuadiendo a un usuario para que haga clic en un v\u00ednculo creado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante redirigir a un usuario a un sitio web malicioso, sin pasar por la verificaci\u00f3n de URL de Webex que deber\u00eda generar una advertencia antes del redireccionamiento a la p\u00e1gina web. Los atacantes pueden utilizar este tipo de vulnerabilidad, conocida como ataque de redireccionamiento abierto, como parte de un ataque de phishing para convencer a los usuarios de que visiten sitios maliciosos sin saberlo." | ||
} | ||
], | ||
"id": "CVE-2021-1310", | ||
"lastModified": "2024-04-11T13:25:28.977", | ||
"metrics": { | ||
"cvssMetricV2": [ | ||
{ | ||
"lang": "en", | ||
"value": "A vulnerability in the web-based management interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to redirect a user to an untrusted web page, bypassing the warning mechanism that should prompt the user before the redirection. This vulnerability is due to improper input validation of the URL parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website, bypassing the Webex URL check that should result in a warning before the redirection to the web page. Attackers may use this type of vulnerability, known as an open redirect attack, as part of a phishing attack to convince users to unknowingly visit malicious sites." | ||
"acInsufInfo": false, | ||
"baseSeverity": "MEDIUM", | ||
"cvssData": { | ||
"accessComplexity": "MEDIUM", | ||
"accessVector": "NETWORK", | ||
"authentication": "NONE", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 4.3, | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "PARTIAL", | ||
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", | ||
"version": "2.0" | ||
}, | ||
"exploitabilityScore": 8.6, | ||
"impactScore": 2.9, | ||
"obtainAllPrivilege": false, | ||
"obtainOtherPrivilege": false, | ||
"obtainUserPrivilege": false, | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"userInteractionRequired": true | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
], | ||
"cvssMetricV31": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-601" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
"cvssData": { | ||
"attackComplexity": "LOW", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 4.7, | ||
"baseSeverity": "MEDIUM", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "LOW", | ||
"privilegesRequired": "NONE", | ||
"scope": "CHANGED", | ||
"userInteraction": "REQUIRED", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", | ||
"version": "3.1" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 1.4, | ||
"source": "[email protected]", | ||
"type": "Primary" | ||
}, | ||
{ | ||
"name": "20210113 Cisco Webex Meetings Open Redirect Vulnerability", | ||
"refsource": "CISCO", | ||
"tags": [ | ||
"Vendor Advisory" | ||
], | ||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-open-redirect-PWvBQ2q" | ||
"cvssData": { | ||
"attackComplexity": "LOW", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 4.7, | ||
"baseSeverity": "MEDIUM", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "LOW", | ||
"privilegesRequired": "NONE", | ||
"scope": "CHANGED", | ||
"userInteraction": "REQUIRED", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", | ||
"version": "3.1" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 1.4, | ||
"source": "[email protected]", | ||
"type": "Secondary" | ||
} | ||
] | ||
} | ||
}, | ||
"impact": { | ||
"baseMetricV2": { | ||
"acInsufInfo": false, | ||
"cvssV2": { | ||
"accessComplexity": "MEDIUM", | ||
"accessVector": "NETWORK", | ||
"authentication": "NONE", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 4.3, | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "PARTIAL", | ||
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", | ||
"version": "2.0" | ||
}, | ||
"exploitabilityScore": 8.6, | ||
"impactScore": 2.9, | ||
"obtainAllPrivilege": false, | ||
"obtainOtherPrivilege": false, | ||
"obtainUserPrivilege": false, | ||
"severity": "MEDIUM", | ||
"userInteractionRequired": true | ||
}, | ||
"baseMetricV3": { | ||
"cvssV3": { | ||
"attackComplexity": "LOW", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 4.7, | ||
"baseSeverity": "MEDIUM", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "LOW", | ||
"privilegesRequired": "NONE", | ||
"scope": "CHANGED", | ||
"userInteraction": "REQUIRED", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", | ||
"version": "3.1" | ||
"published": "2021-01-13T22:15:21.553", | ||
"references": [ | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Vendor Advisory" | ||
], | ||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-open-redirect-PWvBQ2q" | ||
} | ||
], | ||
"sourceIdentifier": "[email protected]", | ||
"vulnStatus": "Analyzed", | ||
"weaknesses": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-601" | ||
} | ||
], | ||
"source": "[email protected]", | ||
"type": "Primary" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 1.4 | ||
} | ||
}, | ||
"lastModifiedDate": "2021-01-20T16:14Z", | ||
"publishedDate": "2021-01-13T22:15Z" | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-601" | ||
} | ||
], | ||
"source": "[email protected]", | ||
"type": "Secondary" | ||
} | ||
] | ||
} | ||
} | ||
} | ||
} |
Oops, something went wrong.