CWE-289

Authentication Bypass by Alternate Name

The product performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor.

CVE-2017-16590 (GCVE-0-2017-16590)

Vulnerability from cvelistv5 – Published: 2018-01-23 01:00 – Updated: 2024-08-05 20:27
VLAI?
Summary
This vulnerability allows remote attackers to bypass authentication on vulnerable installations of NetGain Systems Enterprise Manager 7.2.699 build 1001. User interaction is required to exploit this vulnerability. The specific flaw exists within the MainFilter servlet. The issue results from the lack of proper string matching inside the doFilter method. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of Administrator. Was ZDI-CAN-5099.
Severity ?
No CVSS data available.
CWE
  • CWE-289 - Authentication Bypass by Alternate Name
Assigner
zdi
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:27:04.223Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://zerodayinitiative.com/advisories/ZDI-17-955"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NetGain Systems Enterprise Manager",
          "vendor": "NetGain Systems",
          "versions": [
            {
              "status": "affected",
              "version": "7.2.699 build 1001"
            }
          ]
        }
      ],
      "datePublic": "2017-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "This vulnerability allows remote attackers to bypass authentication on vulnerable installations of NetGain Systems Enterprise Manager 7.2.699 build 1001. User interaction is required to exploit this vulnerability. The specific flaw exists within the MainFilter servlet. The issue results from the lack of proper string matching inside the doFilter method. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of Administrator. Was ZDI-CAN-5099."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-289",
              "description": "CWE-289-Authentication Bypass by Alternate Name",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-23T00:57:01",
        "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
        "shortName": "zdi"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://zerodayinitiative.com/advisories/ZDI-17-955"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "zdi-disclosures@trendmicro.com",
          "ID": "CVE-2017-16590",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "NetGain Systems Enterprise Manager",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "7.2.699 build 1001"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "NetGain Systems"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "This vulnerability allows remote attackers to bypass authentication on vulnerable installations of NetGain Systems Enterprise Manager 7.2.699 build 1001. User interaction is required to exploit this vulnerability. The specific flaw exists within the MainFilter servlet. The issue results from the lack of proper string matching inside the doFilter method. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of Administrator. Was ZDI-CAN-5099."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-289-Authentication Bypass by Alternate Name"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://zerodayinitiative.com/advisories/ZDI-17-955",
              "refsource": "MISC",
              "url": "https://zerodayinitiative.com/advisories/ZDI-17-955"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
    "assignerShortName": "zdi",
    "cveId": "CVE-2017-16590",
    "datePublished": "2018-01-23T01:00:00",
    "dateReserved": "2017-11-06T00:00:00",
    "dateUpdated": "2024-08-05T20:27:04.223Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34746 (GCVE-0-2021-34746)

Vulnerability from cvelistv5 – Published: 2021-09-02 03:05 – Updated: 2024-11-07 22:01
VLAI?
Summary
A vulnerability in the TACACS+ authentication, authorization and accounting (AAA) feature of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to bypass authentication and log in to an affected device as an administrator. This vulnerability is due to incomplete validation of user-supplied input that is passed to an authentication script. An attacker could exploit this vulnerability by injecting parameters into an authentication request. A successful exploit could allow the attacker to bypass authentication and log in as an administrator to the affected device.
CWE
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:19:48.132Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210901 Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-g2DMVVh"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-gqx8-c4xr-c664"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34746",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:55:56.129103Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T22:01:40.427Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise NFV Infrastructure Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-09-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the TACACS+ authentication, authorization and accounting (AAA) feature of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to bypass authentication and log in to an affected device as an administrator. This vulnerability is due to incomplete validation of user-supplied input that is passed to an authentication script. An attacker could exploit this vulnerability by injecting parameters into an authentication request. A successful exploit could allow the attacker to bypass authentication and log in as an administrator to the affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-289",
              "description": "CWE-289",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-22T18:05:12",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210901 Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-g2DMVVh"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-gqx8-c4xr-c664"
        }
      ],
      "source": {
        "advisory": "cisco-sa-nfvis-g2DMVVh",
        "defect": [
          [
            "CSCvz16015"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-09-01T16:00:00",
          "ID": "CVE-2021-34746",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Enterprise NFV Infrastructure Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the TACACS+ authentication, authorization and accounting (AAA) feature of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to bypass authentication and log in to an affected device as an administrator. This vulnerability is due to incomplete validation of user-supplied input that is passed to an authentication script. An attacker could exploit this vulnerability by injecting parameters into an authentication request. A successful exploit could allow the attacker to bypass authentication and log in as an administrator to the affected device."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "9.8",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-289"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210901 Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-g2DMVVh"
            },
            {
              "name": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-gqx8-c4xr-c664",
              "refsource": "MISC",
              "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-gqx8-c4xr-c664"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-nfvis-g2DMVVh",
          "defect": [
            [
              "CSCvz16015"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-34746",
    "datePublished": "2021-09-02T03:05:45.577248Z",
    "dateReserved": "2021-06-15T00:00:00",
    "dateUpdated": "2024-11-07T22:01:40.427Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-1803 (GCVE-0-2023-1803)

Vulnerability from cvelistv5 – Published: 2023-04-14 13:40 – Updated: 2025-02-06 20:02
VLAI?
Summary
Authentication Bypass by Alternate Name vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.This issue affects Redline Router: before 7.17.
CWE
  • CWE-289 - Authentication Bypass by Alternate Name
Assigner
References
Impacted products
Vendor Product Version
DTS Electronics Redline Router Affected: 0 , < 7.17 (custom)
Create a notification for this product.
Credits
Berat KIRMAZ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:05:25.538Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "government-resource",
              "x_transferred"
            ],
            "url": "https://www.usom.gov.tr/bildirim/tr-23-0227"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-1803",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-06T20:02:19.413999Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-06T20:02:22.436Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Redline Router",
          "vendor": "DTS Electronics",
          "versions": [
            {
              "lessThan": "7.17",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Berat KIRMAZ"
        }
      ],
      "datePublic": "2023-04-14T13:25:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Authentication Bypass by Alternate Name vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.\u003cp\u003eThis issue affects Redline Router: before 7.17.\u003c/p\u003e"
            }
          ],
          "value": "Authentication Bypass by Alternate Name vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.This issue affects Redline Router: before 7.17.\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-289",
              "description": " CWE-289 Authentication Bypass by Alternate Name",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-26T09:03:10.987Z",
        "orgId": "ca940d4e-fea4-4aa2-9a58-591a58b1ce21",
        "shortName": "TR-CERT"
      },
      "references": [
        {
          "tags": [
            "government-resource"
          ],
          "url": "https://www.usom.gov.tr/bildirim/tr-23-0227"
        }
      ],
      "source": {
        "advisory": "TR-23-0227",
        "defect": [
          "TR-23-0227"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Authentication Bypass in Redline Router",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ca940d4e-fea4-4aa2-9a58-591a58b1ce21",
    "assignerShortName": "TR-CERT",
    "cveId": "CVE-2023-1803",
    "datePublished": "2023-04-14T13:40:27.226Z",
    "dateReserved": "2023-04-03T10:31:12.341Z",
    "dateUpdated": "2025-02-06T20:02:22.436Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20046 (GCVE-0-2023-20046)

Vulnerability from cvelistv5 – Published: 2023-05-09 13:06 – Updated: 2024-08-02 08:57
VLAI?
Summary
A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user. There are workarounds that address this vulnerability.
CWE
  • CWE-289 - Authentication Bypass by Alternate Name
Assigner
Impacted products
Vendor Product Version
Cisco Cisco ASR 5000 Series Software Affected: 21.11.0
Affected: 21.11.1
Affected: 21.11.2
Affected: 21.11.3
Affected: 21.11.10
Affected: 21.11.11
Affected: 21.11.12
Affected: 21.11.13
Affected: 21.11.14
Affected: 21.11.4
Affected: 21.11.5
Affected: 21.11.6
Affected: 21.11.7
Affected: 21.11.8
Affected: 21.11.9
Affected: 21.11.15
Affected: 21.11.16
Affected: 21.11.17
Affected: 21.11.18
Affected: 21.11.19
Affected: 21.11.20
Affected: 21.11.21
Affected: 21.12.0
Affected: 21.12.1
Affected: 21.12.2
Affected: 21.12.3
Affected: 21.12.4
Affected: 21.12.5
Affected: 21.12.6
Affected: 21.12.10
Affected: 21.12.11
Affected: 21.12.12
Affected: 21.12.13
Affected: 21.12.14
Affected: 21.12.16
Affected: 21.12.17
Affected: 21.12.18
Affected: 21.12.7
Affected: 21.12.8
Affected: 21.12.9
Affected: 21.12.19
Affected: 21.12.20
Affected: 21.12.21
Affected: 21.12.22
Affected: 21.12.15
Affected: 21.13.0
Affected: 21.13.1
Affected: 21.13.2
Affected: 21.13.3
Affected: 21.13.4
Affected: 21.13.10
Affected: 21.13.11
Affected: 21.13.12
Affected: 21.13.13
Affected: 21.13.14
Affected: 21.13.15
Affected: 21.13.16
Affected: 21.13.17
Affected: 21.13.18
Affected: 21.13.19
Affected: 21.13.20
Affected: 21.13.5
Affected: 21.13.6
Affected: 21.13.7
Affected: 21.13.8
Affected: 21.13.9
Affected: 21.13.21
Affected: 21.14.0
Affected: 21.14.1
Affected: 21.14.10
Affected: 21.14.11
Affected: 21.14.12
Affected: 21.14.16
Affected: 21.14.17
Affected: 21.14.19
Affected: 21.14.2
Affected: 21.14.20
Affected: 21.14.3
Affected: 21.14.4
Affected: 21.14.5
Affected: 21.14.6
Affected: 21.14.7
Affected: 21.14.8
Affected: 21.14.9
Affected: 21.14.b12
Affected: 21.14.b13
Affected: 21.14.b14
Affected: 21.14.b15
Affected: 21.14.b17
Affected: 21.14.b18
Affected: 21.14.b19
Affected: 21.14.b20
Affected: 21.14.b21
Affected: 21.14.22
Affected: 21.14.b22
Affected: 21.14.23
Affected: 21.15.0
Affected: 21.15.1
Affected: 21.15.10
Affected: 21.15.11
Affected: 21.15.12
Affected: 21.15.13
Affected: 21.15.14
Affected: 21.15.15
Affected: 21.15.16
Affected: 21.15.17
Affected: 21.15.18
Affected: 21.15.19
Affected: 21.15.2
Affected: 21.15.20
Affected: 21.15.21
Affected: 21.15.22
Affected: 21.15.24
Affected: 21.15.25
Affected: 21.15.26
Affected: 21.15.27
Affected: 21.15.28
Affected: 21.15.29
Affected: 21.15.3
Affected: 21.15.30
Affected: 21.15.32
Affected: 21.15.33
Affected: 21.15.36
Affected: 21.15.37
Affected: 21.15.39
Affected: 21.15.4
Affected: 21.15.40
Affected: 21.15.41
Affected: 21.15.5
Affected: 21.15.6
Affected: 21.15.7
Affected: 21.15.8
Affected: 21.15.43
Affected: 21.15.45
Affected: 21.15.46
Affected: 21.15.47
Affected: 21.15.48
Affected: 21.15.51
Affected: 21.15.52
Affected: 21.15.53
Affected: 21.15.54
Affected: 21.15.55
Affected: 21.15.57
Affected: 21.15.58
Affected: 21.15.59
Affected: 21.15.60
Affected: 21.16.2
Affected: 21.16.3
Affected: 21.16.4
Affected: 21.16.5
Affected: 21.16.c10
Affected: 21.16.c11
Affected: 21.16.c12
Affected: 21.16.c13
Affected: 21.16.c9
Affected: 21.16.d0
Affected: 21.16.d1
Affected: 21.16.6
Affected: 21.16.c14
Affected: 21.16.7
Affected: 21.16.c15
Affected: 21.16.8
Affected: 21.16.c16
Affected: 21.16.10
Affected: 21.16.9
Affected: 21.16.c17
Affected: 21.16.c18
Affected: 21.16.c19
Affected: 21.17.0
Affected: 21.17.1
Affected: 21.17.2
Affected: 21.17.3
Affected: 21.17.4
Affected: 21.17.5
Affected: 21.17.6
Affected: 21.17.7
Affected: 21.17.8
Affected: 21.17.10
Affected: 21.17.11
Affected: 21.17.9
Affected: 21.17.12
Affected: 21.17.13
Affected: 21.17.14
Affected: 21.17.15
Affected: 21.17.16
Affected: 21.17.17
Affected: 21.17.18
Affected: 21.17.19
Affected: 21.18.0
Affected: 21.18.1
Affected: 21.18.2
Affected: 21.18.3
Affected: 21.18.4
Affected: 21.18.5
Affected: 21.18.11
Affected: 21.18.6
Affected: 21.18.7
Affected: 21.18.8
Affected: 21.18.9
Affected: 21.18.12
Affected: 21.18.13
Affected: 21.18.14
Affected: 21.18.15
Affected: 21.18.16
Affected: 21.18.17
Affected: 21.18.18
Affected: 21.18.19
Affected: 21.18.20
Affected: 21.18.21
Affected: 21.18.22
Affected: 21.18.23
Affected: 21.18.24
Affected: 21.18.25
Affected: 21.18.26
Affected: 21.19.0
Affected: 21.19.1
Affected: 21.19.2
Affected: 21.19.3
Affected: 21.19.n2
Affected: 21.19.4
Affected: 21.19.5
Affected: 21.19.n3
Affected: 21.19.n4
Affected: 21.19.6
Affected: 21.19.7
Affected: 21.19.8
Affected: 21.19.n5
Affected: 21.19.10
Affected: 21.19.9
Affected: 21.19.n6
Affected: 21.19.n7
Affected: 21.19.n8
Affected: 21.19.11
Affected: 21.19.n10
Affected: 21.19.n11
Affected: 21.19.n12
Affected: 21.19.n13
Affected: 21.19.n14
Affected: 21.19.n15
Affected: 21.19.n16
Affected: 21.19.n9
Affected: 21.19.n17
Affected: 21.19.n18
Affected: 21.20.0
Affected: 21.20.1
Affected: 21.20.SV1
Affected: 21.20.SV3
Affected: 21.20.SV5
Affected: 21.20.2
Affected: 21.20.3
Affected: 21.20.4
Affected: 21.20.5
Affected: 21.20.6
Affected: 21.20.7
Affected: 21.20.8
Affected: 21.20.9
Affected: 21.20.k6
Affected: 21.20.10
Affected: 21.20.11
Affected: 21.20.k7
Affected: 21.20.u8
Affected: 21.20.12
Affected: 21.20.13
Affected: 21.20.14
Affected: 21.20.k8
Affected: 21.20.p9
Affected: 21.20.15
Affected: 21.20.16
Affected: 21.20.17
Affected: 21.20.18
Affected: 21.20.19
Affected: 21.20.20
Affected: 21.20.21
Affected: 21.20.22
Affected: 21.20.23
Affected: 21.20.24
Affected: 21.20.25
Affected: 21.20.26
Affected: 21.20.28
Affected: 21.20.29
Affected: 21.20.30
Affected: 21.20.c22
Affected: 21.20.31
Affected: 21.20.32
Affected: 21.20.33
Affected: 21.20.34
Affected: 21.20.35
Affected: 21.20.27
Affected: 21.20.SV2
Affected: 21.21.0
Affected: 21.21.1
Affected: 21.21.2
Affected: 21.21.3
Affected: 21.21.KS2
Affected: 21.22.0
Affected: 21.22.n2
Affected: 21.22.n3
Affected: 21.22.3
Affected: 21.22.4
Affected: 21.22.5
Affected: 21.22.uj3
Affected: 21.22.11
Affected: 21.22.6
Affected: 21.22.7
Affected: 21.22.8
Affected: 21.22.n4
Affected: 21.22.n5
Affected: 21.22.ua0
Affected: 21.22.ua2
Affected: 21.22.ua3
Affected: 21.22.ua5
Affected: 21.22.12
Affected: 21.22.13
Affected: 21.22.n10
Affected: 21.22.n11
Affected: 21.22.n12
Affected: 21.22.n6
Affected: 21.22.n7
Affected: 21.22.n8
Affected: 21.22.n9
Affected: 21.22.n13
Affected: 21.23.0
Affected: 21.23.1
Affected: 21.23.10
Affected: 21.23.11
Affected: 21.23.12
Affected: 21.23.13
Affected: 21.23.14
Affected: 21.23.15
Affected: 21.23.16
Affected: 21.23.17
Affected: 21.23.2
Affected: 21.23.3
Affected: 21.23.4
Affected: 21.23.5
Affected: 21.23.6
Affected: 21.23.7
Affected: 21.23.8
Affected: 21.23.9
Affected: 21.23.b2
Affected: 21.23.b3
Affected: 21.23.c16
Affected: 21.23.c17
Affected: 21.23.n6
Affected: 21.23.n7
Affected: 21.23.n9
Affected: 21.23.18
Affected: 21.23.19
Affected: 21.23.21
Affected: 21.23.22
Affected: 21.23.23
Affected: 21.23.24
Affected: 21.23.25
Affected: 21.23.26
Affected: 21.23.27
Affected: 21.23.29
Affected: 21.23.30
Affected: 21.23.c18
Affected: 21.23.n10
Affected: 21.23.n11
Affected: 21.23.n8
Affected: 21.23.yn14
Affected: 21.24.0
Affected: 21.24.1
Affected: 21.24.2
Affected: 21.24.3
Affected: 21.25.0
Affected: 21.25.3
Affected: 21.25.4
Affected: 21.25.5
Affected: 21.25.10
Affected: 21.25.11
Affected: 21.25.12
Affected: 21.25.13
Affected: 21.25.14
Affected: 21.25.6
Affected: 21.25.7
Affected: 21.25.8
Affected: 21.25.9
Affected: 21.26.0
Affected: 21.26.1
Affected: 21.26.10
Affected: 21.26.13
Affected: 21.26.14
Affected: 21.26.15
Affected: 21.26.3
Affected: 21.26.5
Affected: 21.26.6
Affected: 21.26.7
Affected: 21.26.17
Affected: 21.27.0
Affected: 21.27.1
Affected: 21.27.2
Affected: 21.27.3
Affected: 21.27.4
Affected: 21.27.5
Affected: 21.27.m0
Affected: 21.28.0
Affected: 21.28.1
Affected: 21.28.2
Affected: 21.28.m0
Affected: 21.28.m1
Affected: 21.28.m2
Affected: 21.28.m3
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.853Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-staros-ssh-privesc-BmWeJC3h",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco ASR 5000 Series Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "21.11.0"
            },
            {
              "status": "affected",
              "version": "21.11.1"
            },
            {
              "status": "affected",
              "version": "21.11.2"
            },
            {
              "status": "affected",
              "version": "21.11.3"
            },
            {
              "status": "affected",
              "version": "21.11.10"
            },
            {
              "status": "affected",
              "version": "21.11.11"
            },
            {
              "status": "affected",
              "version": "21.11.12"
            },
            {
              "status": "affected",
              "version": "21.11.13"
            },
            {
              "status": "affected",
              "version": "21.11.14"
            },
            {
              "status": "affected",
              "version": "21.11.4"
            },
            {
              "status": "affected",
              "version": "21.11.5"
            },
            {
              "status": "affected",
              "version": "21.11.6"
            },
            {
              "status": "affected",
              "version": "21.11.7"
            },
            {
              "status": "affected",
              "version": "21.11.8"
            },
            {
              "status": "affected",
              "version": "21.11.9"
            },
            {
              "status": "affected",
              "version": "21.11.15"
            },
            {
              "status": "affected",
              "version": "21.11.16"
            },
            {
              "status": "affected",
              "version": "21.11.17"
            },
            {
              "status": "affected",
              "version": "21.11.18"
            },
            {
              "status": "affected",
              "version": "21.11.19"
            },
            {
              "status": "affected",
              "version": "21.11.20"
            },
            {
              "status": "affected",
              "version": "21.11.21"
            },
            {
              "status": "affected",
              "version": "21.12.0"
            },
            {
              "status": "affected",
              "version": "21.12.1"
            },
            {
              "status": "affected",
              "version": "21.12.2"
            },
            {
              "status": "affected",
              "version": "21.12.3"
            },
            {
              "status": "affected",
              "version": "21.12.4"
            },
            {
              "status": "affected",
              "version": "21.12.5"
            },
            {
              "status": "affected",
              "version": "21.12.6"
            },
            {
              "status": "affected",
              "version": "21.12.10"
            },
            {
              "status": "affected",
              "version": "21.12.11"
            },
            {
              "status": "affected",
              "version": "21.12.12"
            },
            {
              "status": "affected",
              "version": "21.12.13"
            },
            {
              "status": "affected",
              "version": "21.12.14"
            },
            {
              "status": "affected",
              "version": "21.12.16"
            },
            {
              "status": "affected",
              "version": "21.12.17"
            },
            {
              "status": "affected",
              "version": "21.12.18"
            },
            {
              "status": "affected",
              "version": "21.12.7"
            },
            {
              "status": "affected",
              "version": "21.12.8"
            },
            {
              "status": "affected",
              "version": "21.12.9"
            },
            {
              "status": "affected",
              "version": "21.12.19"
            },
            {
              "status": "affected",
              "version": "21.12.20"
            },
            {
              "status": "affected",
              "version": "21.12.21"
            },
            {
              "status": "affected",
              "version": "21.12.22"
            },
            {
              "status": "affected",
              "version": "21.12.15"
            },
            {
              "status": "affected",
              "version": "21.13.0"
            },
            {
              "status": "affected",
              "version": "21.13.1"
            },
            {
              "status": "affected",
              "version": "21.13.2"
            },
            {
              "status": "affected",
              "version": "21.13.3"
            },
            {
              "status": "affected",
              "version": "21.13.4"
            },
            {
              "status": "affected",
              "version": "21.13.10"
            },
            {
              "status": "affected",
              "version": "21.13.11"
            },
            {
              "status": "affected",
              "version": "21.13.12"
            },
            {
              "status": "affected",
              "version": "21.13.13"
            },
            {
              "status": "affected",
              "version": "21.13.14"
            },
            {
              "status": "affected",
              "version": "21.13.15"
            },
            {
              "status": "affected",
              "version": "21.13.16"
            },
            {
              "status": "affected",
              "version": "21.13.17"
            },
            {
              "status": "affected",
              "version": "21.13.18"
            },
            {
              "status": "affected",
              "version": "21.13.19"
            },
            {
              "status": "affected",
              "version": "21.13.20"
            },
            {
              "status": "affected",
              "version": "21.13.5"
            },
            {
              "status": "affected",
              "version": "21.13.6"
            },
            {
              "status": "affected",
              "version": "21.13.7"
            },
            {
              "status": "affected",
              "version": "21.13.8"
            },
            {
              "status": "affected",
              "version": "21.13.9"
            },
            {
              "status": "affected",
              "version": "21.13.21"
            },
            {
              "status": "affected",
              "version": "21.14.0"
            },
            {
              "status": "affected",
              "version": "21.14.1"
            },
            {
              "status": "affected",
              "version": "21.14.10"
            },
            {
              "status": "affected",
              "version": "21.14.11"
            },
            {
              "status": "affected",
              "version": "21.14.12"
            },
            {
              "status": "affected",
              "version": "21.14.16"
            },
            {
              "status": "affected",
              "version": "21.14.17"
            },
            {
              "status": "affected",
              "version": "21.14.19"
            },
            {
              "status": "affected",
              "version": "21.14.2"
            },
            {
              "status": "affected",
              "version": "21.14.20"
            },
            {
              "status": "affected",
              "version": "21.14.3"
            },
            {
              "status": "affected",
              "version": "21.14.4"
            },
            {
              "status": "affected",
              "version": "21.14.5"
            },
            {
              "status": "affected",
              "version": "21.14.6"
            },
            {
              "status": "affected",
              "version": "21.14.7"
            },
            {
              "status": "affected",
              "version": "21.14.8"
            },
            {
              "status": "affected",
              "version": "21.14.9"
            },
            {
              "status": "affected",
              "version": "21.14.b12"
            },
            {
              "status": "affected",
              "version": "21.14.b13"
            },
            {
              "status": "affected",
              "version": "21.14.b14"
            },
            {
              "status": "affected",
              "version": "21.14.b15"
            },
            {
              "status": "affected",
              "version": "21.14.b17"
            },
            {
              "status": "affected",
              "version": "21.14.b18"
            },
            {
              "status": "affected",
              "version": "21.14.b19"
            },
            {
              "status": "affected",
              "version": "21.14.b20"
            },
            {
              "status": "affected",
              "version": "21.14.b21"
            },
            {
              "status": "affected",
              "version": "21.14.22"
            },
            {
              "status": "affected",
              "version": "21.14.b22"
            },
            {
              "status": "affected",
              "version": "21.14.23"
            },
            {
              "status": "affected",
              "version": "21.15.0"
            },
            {
              "status": "affected",
              "version": "21.15.1"
            },
            {
              "status": "affected",
              "version": "21.15.10"
            },
            {
              "status": "affected",
              "version": "21.15.11"
            },
            {
              "status": "affected",
              "version": "21.15.12"
            },
            {
              "status": "affected",
              "version": "21.15.13"
            },
            {
              "status": "affected",
              "version": "21.15.14"
            },
            {
              "status": "affected",
              "version": "21.15.15"
            },
            {
              "status": "affected",
              "version": "21.15.16"
            },
            {
              "status": "affected",
              "version": "21.15.17"
            },
            {
              "status": "affected",
              "version": "21.15.18"
            },
            {
              "status": "affected",
              "version": "21.15.19"
            },
            {
              "status": "affected",
              "version": "21.15.2"
            },
            {
              "status": "affected",
              "version": "21.15.20"
            },
            {
              "status": "affected",
              "version": "21.15.21"
            },
            {
              "status": "affected",
              "version": "21.15.22"
            },
            {
              "status": "affected",
              "version": "21.15.24"
            },
            {
              "status": "affected",
              "version": "21.15.25"
            },
            {
              "status": "affected",
              "version": "21.15.26"
            },
            {
              "status": "affected",
              "version": "21.15.27"
            },
            {
              "status": "affected",
              "version": "21.15.28"
            },
            {
              "status": "affected",
              "version": "21.15.29"
            },
            {
              "status": "affected",
              "version": "21.15.3"
            },
            {
              "status": "affected",
              "version": "21.15.30"
            },
            {
              "status": "affected",
              "version": "21.15.32"
            },
            {
              "status": "affected",
              "version": "21.15.33"
            },
            {
              "status": "affected",
              "version": "21.15.36"
            },
            {
              "status": "affected",
              "version": "21.15.37"
            },
            {
              "status": "affected",
              "version": "21.15.39"
            },
            {
              "status": "affected",
              "version": "21.15.4"
            },
            {
              "status": "affected",
              "version": "21.15.40"
            },
            {
              "status": "affected",
              "version": "21.15.41"
            },
            {
              "status": "affected",
              "version": "21.15.5"
            },
            {
              "status": "affected",
              "version": "21.15.6"
            },
            {
              "status": "affected",
              "version": "21.15.7"
            },
            {
              "status": "affected",
              "version": "21.15.8"
            },
            {
              "status": "affected",
              "version": "21.15.43"
            },
            {
              "status": "affected",
              "version": "21.15.45"
            },
            {
              "status": "affected",
              "version": "21.15.46"
            },
            {
              "status": "affected",
              "version": "21.15.47"
            },
            {
              "status": "affected",
              "version": "21.15.48"
            },
            {
              "status": "affected",
              "version": "21.15.51"
            },
            {
              "status": "affected",
              "version": "21.15.52"
            },
            {
              "status": "affected",
              "version": "21.15.53"
            },
            {
              "status": "affected",
              "version": "21.15.54"
            },
            {
              "status": "affected",
              "version": "21.15.55"
            },
            {
              "status": "affected",
              "version": "21.15.57"
            },
            {
              "status": "affected",
              "version": "21.15.58"
            },
            {
              "status": "affected",
              "version": "21.15.59"
            },
            {
              "status": "affected",
              "version": "21.15.60"
            },
            {
              "status": "affected",
              "version": "21.16.2"
            },
            {
              "status": "affected",
              "version": "21.16.3"
            },
            {
              "status": "affected",
              "version": "21.16.4"
            },
            {
              "status": "affected",
              "version": "21.16.5"
            },
            {
              "status": "affected",
              "version": "21.16.c10"
            },
            {
              "status": "affected",
              "version": "21.16.c11"
            },
            {
              "status": "affected",
              "version": "21.16.c12"
            },
            {
              "status": "affected",
              "version": "21.16.c13"
            },
            {
              "status": "affected",
              "version": "21.16.c9"
            },
            {
              "status": "affected",
              "version": "21.16.d0"
            },
            {
              "status": "affected",
              "version": "21.16.d1"
            },
            {
              "status": "affected",
              "version": "21.16.6"
            },
            {
              "status": "affected",
              "version": "21.16.c14"
            },
            {
              "status": "affected",
              "version": "21.16.7"
            },
            {
              "status": "affected",
              "version": "21.16.c15"
            },
            {
              "status": "affected",
              "version": "21.16.8"
            },
            {
              "status": "affected",
              "version": "21.16.c16"
            },
            {
              "status": "affected",
              "version": "21.16.10"
            },
            {
              "status": "affected",
              "version": "21.16.9"
            },
            {
              "status": "affected",
              "version": "21.16.c17"
            },
            {
              "status": "affected",
              "version": "21.16.c18"
            },
            {
              "status": "affected",
              "version": "21.16.c19"
            },
            {
              "status": "affected",
              "version": "21.17.0"
            },
            {
              "status": "affected",
              "version": "21.17.1"
            },
            {
              "status": "affected",
              "version": "21.17.2"
            },
            {
              "status": "affected",
              "version": "21.17.3"
            },
            {
              "status": "affected",
              "version": "21.17.4"
            },
            {
              "status": "affected",
              "version": "21.17.5"
            },
            {
              "status": "affected",
              "version": "21.17.6"
            },
            {
              "status": "affected",
              "version": "21.17.7"
            },
            {
              "status": "affected",
              "version": "21.17.8"
            },
            {
              "status": "affected",
              "version": "21.17.10"
            },
            {
              "status": "affected",
              "version": "21.17.11"
            },
            {
              "status": "affected",
              "version": "21.17.9"
            },
            {
              "status": "affected",
              "version": "21.17.12"
            },
            {
              "status": "affected",
              "version": "21.17.13"
            },
            {
              "status": "affected",
              "version": "21.17.14"
            },
            {
              "status": "affected",
              "version": "21.17.15"
            },
            {
              "status": "affected",
              "version": "21.17.16"
            },
            {
              "status": "affected",
              "version": "21.17.17"
            },
            {
              "status": "affected",
              "version": "21.17.18"
            },
            {
              "status": "affected",
              "version": "21.17.19"
            },
            {
              "status": "affected",
              "version": "21.18.0"
            },
            {
              "status": "affected",
              "version": "21.18.1"
            },
            {
              "status": "affected",
              "version": "21.18.2"
            },
            {
              "status": "affected",
              "version": "21.18.3"
            },
            {
              "status": "affected",
              "version": "21.18.4"
            },
            {
              "status": "affected",
              "version": "21.18.5"
            },
            {
              "status": "affected",
              "version": "21.18.11"
            },
            {
              "status": "affected",
              "version": "21.18.6"
            },
            {
              "status": "affected",
              "version": "21.18.7"
            },
            {
              "status": "affected",
              "version": "21.18.8"
            },
            {
              "status": "affected",
              "version": "21.18.9"
            },
            {
              "status": "affected",
              "version": "21.18.12"
            },
            {
              "status": "affected",
              "version": "21.18.13"
            },
            {
              "status": "affected",
              "version": "21.18.14"
            },
            {
              "status": "affected",
              "version": "21.18.15"
            },
            {
              "status": "affected",
              "version": "21.18.16"
            },
            {
              "status": "affected",
              "version": "21.18.17"
            },
            {
              "status": "affected",
              "version": "21.18.18"
            },
            {
              "status": "affected",
              "version": "21.18.19"
            },
            {
              "status": "affected",
              "version": "21.18.20"
            },
            {
              "status": "affected",
              "version": "21.18.21"
            },
            {
              "status": "affected",
              "version": "21.18.22"
            },
            {
              "status": "affected",
              "version": "21.18.23"
            },
            {
              "status": "affected",
              "version": "21.18.24"
            },
            {
              "status": "affected",
              "version": "21.18.25"
            },
            {
              "status": "affected",
              "version": "21.18.26"
            },
            {
              "status": "affected",
              "version": "21.19.0"
            },
            {
              "status": "affected",
              "version": "21.19.1"
            },
            {
              "status": "affected",
              "version": "21.19.2"
            },
            {
              "status": "affected",
              "version": "21.19.3"
            },
            {
              "status": "affected",
              "version": "21.19.n2"
            },
            {
              "status": "affected",
              "version": "21.19.4"
            },
            {
              "status": "affected",
              "version": "21.19.5"
            },
            {
              "status": "affected",
              "version": "21.19.n3"
            },
            {
              "status": "affected",
              "version": "21.19.n4"
            },
            {
              "status": "affected",
              "version": "21.19.6"
            },
            {
              "status": "affected",
              "version": "21.19.7"
            },
            {
              "status": "affected",
              "version": "21.19.8"
            },
            {
              "status": "affected",
              "version": "21.19.n5"
            },
            {
              "status": "affected",
              "version": "21.19.10"
            },
            {
              "status": "affected",
              "version": "21.19.9"
            },
            {
              "status": "affected",
              "version": "21.19.n6"
            },
            {
              "status": "affected",
              "version": "21.19.n7"
            },
            {
              "status": "affected",
              "version": "21.19.n8"
            },
            {
              "status": "affected",
              "version": "21.19.11"
            },
            {
              "status": "affected",
              "version": "21.19.n10"
            },
            {
              "status": "affected",
              "version": "21.19.n11"
            },
            {
              "status": "affected",
              "version": "21.19.n12"
            },
            {
              "status": "affected",
              "version": "21.19.n13"
            },
            {
              "status": "affected",
              "version": "21.19.n14"
            },
            {
              "status": "affected",
              "version": "21.19.n15"
            },
            {
              "status": "affected",
              "version": "21.19.n16"
            },
            {
              "status": "affected",
              "version": "21.19.n9"
            },
            {
              "status": "affected",
              "version": "21.19.n17"
            },
            {
              "status": "affected",
              "version": "21.19.n18"
            },
            {
              "status": "affected",
              "version": "21.20.0"
            },
            {
              "status": "affected",
              "version": "21.20.1"
            },
            {
              "status": "affected",
              "version": "21.20.SV1"
            },
            {
              "status": "affected",
              "version": "21.20.SV3"
            },
            {
              "status": "affected",
              "version": "21.20.SV5"
            },
            {
              "status": "affected",
              "version": "21.20.2"
            },
            {
              "status": "affected",
              "version": "21.20.3"
            },
            {
              "status": "affected",
              "version": "21.20.4"
            },
            {
              "status": "affected",
              "version": "21.20.5"
            },
            {
              "status": "affected",
              "version": "21.20.6"
            },
            {
              "status": "affected",
              "version": "21.20.7"
            },
            {
              "status": "affected",
              "version": "21.20.8"
            },
            {
              "status": "affected",
              "version": "21.20.9"
            },
            {
              "status": "affected",
              "version": "21.20.k6"
            },
            {
              "status": "affected",
              "version": "21.20.10"
            },
            {
              "status": "affected",
              "version": "21.20.11"
            },
            {
              "status": "affected",
              "version": "21.20.k7"
            },
            {
              "status": "affected",
              "version": "21.20.u8"
            },
            {
              "status": "affected",
              "version": "21.20.12"
            },
            {
              "status": "affected",
              "version": "21.20.13"
            },
            {
              "status": "affected",
              "version": "21.20.14"
            },
            {
              "status": "affected",
              "version": "21.20.k8"
            },
            {
              "status": "affected",
              "version": "21.20.p9"
            },
            {
              "status": "affected",
              "version": "21.20.15"
            },
            {
              "status": "affected",
              "version": "21.20.16"
            },
            {
              "status": "affected",
              "version": "21.20.17"
            },
            {
              "status": "affected",
              "version": "21.20.18"
            },
            {
              "status": "affected",
              "version": "21.20.19"
            },
            {
              "status": "affected",
              "version": "21.20.20"
            },
            {
              "status": "affected",
              "version": "21.20.21"
            },
            {
              "status": "affected",
              "version": "21.20.22"
            },
            {
              "status": "affected",
              "version": "21.20.23"
            },
            {
              "status": "affected",
              "version": "21.20.24"
            },
            {
              "status": "affected",
              "version": "21.20.25"
            },
            {
              "status": "affected",
              "version": "21.20.26"
            },
            {
              "status": "affected",
              "version": "21.20.28"
            },
            {
              "status": "affected",
              "version": "21.20.29"
            },
            {
              "status": "affected",
              "version": "21.20.30"
            },
            {
              "status": "affected",
              "version": "21.20.c22"
            },
            {
              "status": "affected",
              "version": "21.20.31"
            },
            {
              "status": "affected",
              "version": "21.20.32"
            },
            {
              "status": "affected",
              "version": "21.20.33"
            },
            {
              "status": "affected",
              "version": "21.20.34"
            },
            {
              "status": "affected",
              "version": "21.20.35"
            },
            {
              "status": "affected",
              "version": "21.20.27"
            },
            {
              "status": "affected",
              "version": "21.20.SV2"
            },
            {
              "status": "affected",
              "version": "21.21.0"
            },
            {
              "status": "affected",
              "version": "21.21.1"
            },
            {
              "status": "affected",
              "version": "21.21.2"
            },
            {
              "status": "affected",
              "version": "21.21.3"
            },
            {
              "status": "affected",
              "version": "21.21.KS2"
            },
            {
              "status": "affected",
              "version": "21.22.0"
            },
            {
              "status": "affected",
              "version": "21.22.n2"
            },
            {
              "status": "affected",
              "version": "21.22.n3"
            },
            {
              "status": "affected",
              "version": "21.22.3"
            },
            {
              "status": "affected",
              "version": "21.22.4"
            },
            {
              "status": "affected",
              "version": "21.22.5"
            },
            {
              "status": "affected",
              "version": "21.22.uj3"
            },
            {
              "status": "affected",
              "version": "21.22.11"
            },
            {
              "status": "affected",
              "version": "21.22.6"
            },
            {
              "status": "affected",
              "version": "21.22.7"
            },
            {
              "status": "affected",
              "version": "21.22.8"
            },
            {
              "status": "affected",
              "version": "21.22.n4"
            },
            {
              "status": "affected",
              "version": "21.22.n5"
            },
            {
              "status": "affected",
              "version": "21.22.ua0"
            },
            {
              "status": "affected",
              "version": "21.22.ua2"
            },
            {
              "status": "affected",
              "version": "21.22.ua3"
            },
            {
              "status": "affected",
              "version": "21.22.ua5"
            },
            {
              "status": "affected",
              "version": "21.22.12"
            },
            {
              "status": "affected",
              "version": "21.22.13"
            },
            {
              "status": "affected",
              "version": "21.22.n10"
            },
            {
              "status": "affected",
              "version": "21.22.n11"
            },
            {
              "status": "affected",
              "version": "21.22.n12"
            },
            {
              "status": "affected",
              "version": "21.22.n6"
            },
            {
              "status": "affected",
              "version": "21.22.n7"
            },
            {
              "status": "affected",
              "version": "21.22.n8"
            },
            {
              "status": "affected",
              "version": "21.22.n9"
            },
            {
              "status": "affected",
              "version": "21.22.n13"
            },
            {
              "status": "affected",
              "version": "21.23.0"
            },
            {
              "status": "affected",
              "version": "21.23.1"
            },
            {
              "status": "affected",
              "version": "21.23.10"
            },
            {
              "status": "affected",
              "version": "21.23.11"
            },
            {
              "status": "affected",
              "version": "21.23.12"
            },
            {
              "status": "affected",
              "version": "21.23.13"
            },
            {
              "status": "affected",
              "version": "21.23.14"
            },
            {
              "status": "affected",
              "version": "21.23.15"
            },
            {
              "status": "affected",
              "version": "21.23.16"
            },
            {
              "status": "affected",
              "version": "21.23.17"
            },
            {
              "status": "affected",
              "version": "21.23.2"
            },
            {
              "status": "affected",
              "version": "21.23.3"
            },
            {
              "status": "affected",
              "version": "21.23.4"
            },
            {
              "status": "affected",
              "version": "21.23.5"
            },
            {
              "status": "affected",
              "version": "21.23.6"
            },
            {
              "status": "affected",
              "version": "21.23.7"
            },
            {
              "status": "affected",
              "version": "21.23.8"
            },
            {
              "status": "affected",
              "version": "21.23.9"
            },
            {
              "status": "affected",
              "version": "21.23.b2"
            },
            {
              "status": "affected",
              "version": "21.23.b3"
            },
            {
              "status": "affected",
              "version": "21.23.c16"
            },
            {
              "status": "affected",
              "version": "21.23.c17"
            },
            {
              "status": "affected",
              "version": "21.23.n6"
            },
            {
              "status": "affected",
              "version": "21.23.n7"
            },
            {
              "status": "affected",
              "version": "21.23.n9"
            },
            {
              "status": "affected",
              "version": "21.23.18"
            },
            {
              "status": "affected",
              "version": "21.23.19"
            },
            {
              "status": "affected",
              "version": "21.23.21"
            },
            {
              "status": "affected",
              "version": "21.23.22"
            },
            {
              "status": "affected",
              "version": "21.23.23"
            },
            {
              "status": "affected",
              "version": "21.23.24"
            },
            {
              "status": "affected",
              "version": "21.23.25"
            },
            {
              "status": "affected",
              "version": "21.23.26"
            },
            {
              "status": "affected",
              "version": "21.23.27"
            },
            {
              "status": "affected",
              "version": "21.23.29"
            },
            {
              "status": "affected",
              "version": "21.23.30"
            },
            {
              "status": "affected",
              "version": "21.23.c18"
            },
            {
              "status": "affected",
              "version": "21.23.n10"
            },
            {
              "status": "affected",
              "version": "21.23.n11"
            },
            {
              "status": "affected",
              "version": "21.23.n8"
            },
            {
              "status": "affected",
              "version": "21.23.yn14"
            },
            {
              "status": "affected",
              "version": "21.24.0"
            },
            {
              "status": "affected",
              "version": "21.24.1"
            },
            {
              "status": "affected",
              "version": "21.24.2"
            },
            {
              "status": "affected",
              "version": "21.24.3"
            },
            {
              "status": "affected",
              "version": "21.25.0"
            },
            {
              "status": "affected",
              "version": "21.25.3"
            },
            {
              "status": "affected",
              "version": "21.25.4"
            },
            {
              "status": "affected",
              "version": "21.25.5"
            },
            {
              "status": "affected",
              "version": "21.25.10"
            },
            {
              "status": "affected",
              "version": "21.25.11"
            },
            {
              "status": "affected",
              "version": "21.25.12"
            },
            {
              "status": "affected",
              "version": "21.25.13"
            },
            {
              "status": "affected",
              "version": "21.25.14"
            },
            {
              "status": "affected",
              "version": "21.25.6"
            },
            {
              "status": "affected",
              "version": "21.25.7"
            },
            {
              "status": "affected",
              "version": "21.25.8"
            },
            {
              "status": "affected",
              "version": "21.25.9"
            },
            {
              "status": "affected",
              "version": "21.26.0"
            },
            {
              "status": "affected",
              "version": "21.26.1"
            },
            {
              "status": "affected",
              "version": "21.26.10"
            },
            {
              "status": "affected",
              "version": "21.26.13"
            },
            {
              "status": "affected",
              "version": "21.26.14"
            },
            {
              "status": "affected",
              "version": "21.26.15"
            },
            {
              "status": "affected",
              "version": "21.26.3"
            },
            {
              "status": "affected",
              "version": "21.26.5"
            },
            {
              "status": "affected",
              "version": "21.26.6"
            },
            {
              "status": "affected",
              "version": "21.26.7"
            },
            {
              "status": "affected",
              "version": "21.26.17"
            },
            {
              "status": "affected",
              "version": "21.27.0"
            },
            {
              "status": "affected",
              "version": "21.27.1"
            },
            {
              "status": "affected",
              "version": "21.27.2"
            },
            {
              "status": "affected",
              "version": "21.27.3"
            },
            {
              "status": "affected",
              "version": "21.27.4"
            },
            {
              "status": "affected",
              "version": "21.27.5"
            },
            {
              "status": "affected",
              "version": "21.27.m0"
            },
            {
              "status": "affected",
              "version": "21.28.0"
            },
            {
              "status": "affected",
              "version": "21.28.1"
            },
            {
              "status": "affected",
              "version": "21.28.2"
            },
            {
              "status": "affected",
              "version": "21.28.m0"
            },
            {
              "status": "affected",
              "version": "21.28.m1"
            },
            {
              "status": "affected",
              "version": "21.28.m2"
            },
            {
              "status": "affected",
              "version": "21.28.m3"
            }
          ]
        },
        {
          "product": "Cisco Ultra Cloud Core - User Plane Function",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.\r\n\r   There are workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-289",
              "description": "Authentication Bypass by Alternate Name",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-25T16:57:38.039Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-staros-ssh-privesc-BmWeJC3h",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h"
        }
      ],
      "source": {
        "advisory": "cisco-sa-staros-ssh-privesc-BmWeJC3h",
        "defects": [
          "CSCwd89468"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20046",
    "datePublished": "2023-05-09T13:06:10.748Z",
    "dateReserved": "2022-10-27T18:47:50.317Z",
    "dateUpdated": "2024-08-02T08:57:35.853Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-3263 (GCVE-0-2023-3263)

Vulnerability from cvelistv5 – Published: 2023-08-14 04:02 – Updated: 2024-10-09 14:44
VLAI?
Summary
The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution.
CWE
  • CWE-289 - Authentication Bypass by Alternate Name
Assigner
Impacted products
Vendor Product Version
Dataprobe iBoot PDU Affected: 1.43.03312023 , ≤ <= 1.43.03312023 (custom)
Create a notification for this product.
Credits
Sam Quinn
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:48:08.289Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:dataprobe:iboot_pdu:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "iboot_pdu",
            "vendor": "dataprobe",
            "versions": [
              {
                "lessThanOrEqual": "1.43.03312023",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-3263",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-09T14:41:13.535050Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-09T14:44:21.435Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "iBoot PDU",
          "vendor": "Dataprobe",
          "versions": [
            {
              "lessThanOrEqual": "\u003c= 1.43.03312023",
              "status": "affected",
              "version": "1.43.03312023",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Sam Quinn"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution."
            }
          ],
          "value": "The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-421",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-421 Influence Perception of Authority"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-289",
              "description": "CWE-289: Authentication Bypass by Alternate Name",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-14T04:02:55.740Z",
        "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808",
        "shortName": "trellix"
      },
      "references": [
        {
          "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808",
    "assignerShortName": "trellix",
    "cveId": "CVE-2023-3263",
    "datePublished": "2023-08-14T04:02:55.740Z",
    "dateReserved": "2023-06-15T06:50:27.340Z",
    "dateUpdated": "2024-10-09T14:44:21.435Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-38487 (GCVE-0-2023-38487)

Vulnerability from cvelistv5 – Published: 2023-08-04 15:40 – Updated: 2024-10-03 18:17
VLAI?
Summary
HedgeDoc is software for creating real-time collaborative markdown notes. Prior to version 1.9.9, the API of HedgeDoc 1 can be used to create notes with an alias matching the ID of existing notes. The affected existing note can then not be accessed anymore and is effectively hidden by the new one. When the freeURL feature is enabled (by setting the `allowFreeURL` config option or the `CMD_ALLOW_FREEURL` environment variable to `true`), any user with the appropriate permissions can create a note by making a POST request to the `/new/<ALIAS>` API endpoint. The `<ALIAS>` parameter can be set to the ID of an existing note. HedgeDoc did not verify whether the provided `<ALIAS>` value corresponds to a valid ID of an existing note and always allowed creation of the new note. When a visitor tried to access the existing note, HedgeDoc will first search for a note with a matching alias before it searches using the ID, therefore only the new note can be accessed. Depending on the permission settings of the HedgeDoc instance, the issue can be exploited only by logged-in users or by all (including non-logged-in) users. The exploit requires knowledge of the ID of the target note. Attackers could use this issue to present a manipulated copy of the original note to the user, e.g. by replacing the links with malicious ones. Attackers can also use this issue to prevent access to the original note, causing a denial of service. No data is lost, as the original content of the affected notes is still present in the database. This issue was fixed in version 1.9.9. As a workaround, disabling freeURL mode prevents the exploitation of this issue. The impact can be limited by restricting freeURL note creation to trusted, logged-in users by enabling `requireFreeURLAuthentication`/`CMD_REQUIRE_FREEURL_AUTHENTICATION`.
CWE
  • CWE-289 - Authentication Bypass by Alternate Name
Assigner
Impacted products
Vendor Product Version
hedgedoc hedgedoc Affected: < 1.9.9
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T17:39:13.554Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg"
          },
          {
            "name": "https://github.com/hedgedoc/hedgedoc/pull/4476/commits/781263ab84255885e1fe60c7e92e2f8d611664d2",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/hedgedoc/hedgedoc/pull/4476/commits/781263ab84255885e1fe60c7e92e2f8d611664d2"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:hedgedoc:hedgedoc:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "hedgedoc",
            "vendor": "hedgedoc",
            "versions": [
              {
                "lessThan": "1.9.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-38487",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-03T18:14:03.501396Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-03T18:17:39.633Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "hedgedoc",
          "vendor": "hedgedoc",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 1.9.9"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "HedgeDoc is software for creating real-time collaborative markdown notes. Prior to version 1.9.9, the API of HedgeDoc 1 can be used to create notes with an alias matching the ID of existing notes. The affected existing note can then not be accessed anymore and is effectively hidden by the new one.\n\nWhen the freeURL feature is enabled (by setting the `allowFreeURL` config option or the `CMD_ALLOW_FREEURL` environment variable to `true`), any user with the appropriate permissions can create a note by making a POST request to the `/new/\u003cALIAS\u003e` API endpoint. The `\u003cALIAS\u003e` parameter can be set to the ID of an existing note. HedgeDoc did not verify whether the provided `\u003cALIAS\u003e` value corresponds to a valid ID of an existing note and always allowed creation of the new note. When a visitor tried to access the existing note, HedgeDoc will first search for a note with a matching alias before it searches using the ID, therefore only the new note can be accessed.\n\nDepending on the permission settings of the HedgeDoc instance, the issue can be exploited only by logged-in users or by all (including non-logged-in) users. The exploit requires knowledge of the ID of the target note. Attackers could use this issue to present a manipulated copy of the original note to the user, e.g. by replacing the links with malicious ones. Attackers can also use this issue to prevent access to the original note, causing a denial of service. No data is lost, as the original content of the affected notes is still present in the database.\n\nThis issue was fixed in version 1.9.9. As a workaround, disabling freeURL mode prevents the exploitation of this issue. The impact can be limited by restricting freeURL note creation to trusted, logged-in users by enabling `requireFreeURLAuthentication`/`CMD_REQUIRE_FREEURL_AUTHENTICATION`."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-289",
              "description": "CWE-289: Authentication Bypass by Alternate Name",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-04T15:40:16.370Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg"
        },
        {
          "name": "https://github.com/hedgedoc/hedgedoc/pull/4476/commits/781263ab84255885e1fe60c7e92e2f8d611664d2",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/hedgedoc/hedgedoc/pull/4476/commits/781263ab84255885e1fe60c7e92e2f8d611664d2"
        }
      ],
      "source": {
        "advisory": "GHSA-7494-7hcf-vxpg",
        "discovery": "UNKNOWN"
      },
      "title": "HedgeDoc API allows to hide existing notes"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-38487",
    "datePublished": "2023-08-04T15:40:16.370Z",
    "dateReserved": "2023-07-18T16:28:12.074Z",
    "dateUpdated": "2024-10-03T18:17:39.633Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-41890 (GCVE-0-2023-41890)

Vulnerability from cvelistv5 – Published: 2023-09-19 14:38 – Updated: 2024-10-15 18:32
VLAI?
Summary
Sustainsys.Saml2 library adds SAML2P support to ASP.NET web sites, allowing the web site to act as a SAML2 Service Provider. Prior to versions 1.0.3 and 2.9.2, when a response is processed, the issuer of the Identity Provider is not sufficiently validated. This could allow a malicious identity provider to craft a Saml2 response that is processed as if issued by another identity provider. It is also possible for a malicious end user to cause stored state intended for one identity provider to be used when processing the response from another provider. An application is impacted if they rely on any of these features in their authentication/authorization logic: the issuer of the generated identity and claims; or items in the stored request state (AuthenticationProperties). This issue is patched in versions 2.9.2 and 1.0.3. The `AcsCommandResultCreated` notification can be used to add the validation required if an upgrade to patched packages is not possible.
CWE
  • CWE-289 - Authentication Bypass by Alternate Name
  • CWE-294 - Authentication Bypass by Capture-replay
Assigner
Impacted products
Vendor Product Version
Sustainsys Saml2 Affected: < 1.0.3
Affected: >= 2.0.0, < 2.9.2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:09:49.378Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/Sustainsys/Saml2/security/advisories/GHSA-fv2h-753j-9g39",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/Sustainsys/Saml2/security/advisories/GHSA-fv2h-753j-9g39"
          },
          {
            "name": "https://github.com/Sustainsys/Saml2/issues/712",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Sustainsys/Saml2/issues/712"
          },
          {
            "name": "https://github.com/Sustainsys/Saml2/issues/713",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Sustainsys/Saml2/issues/713"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41890",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T17:28:58.427263Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-15T18:32:14.776Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Saml2",
          "vendor": "Sustainsys",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 1.0.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.0.0, \u003c 2.9.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Sustainsys.Saml2 library adds SAML2P support to ASP.NET web sites, allowing the web site to act as a SAML2 Service Provider. \nPrior to versions 1.0.3 and 2.9.2, when a response is processed, the issuer of the Identity Provider is not sufficiently validated. This could allow a malicious identity provider to craft a Saml2 response that is processed as if issued by another identity provider. It is also possible for a malicious end user to cause stored state intended for one identity provider to be used when processing the response from another provider. An application is impacted if they rely on any of these features in their authentication/authorization logic: the issuer of the generated identity and claims; or items in the stored request state (AuthenticationProperties). This issue is patched in versions 2.9.2 and 1.0.3. The `AcsCommandResultCreated` notification can be used to add the validation required if an upgrade to patched packages is not possible."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-289",
              "description": "CWE-289: Authentication Bypass by Alternate Name",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-294",
              "description": "CWE-294: Authentication Bypass by Capture-replay",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-19T14:38:55.861Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/Sustainsys/Saml2/security/advisories/GHSA-fv2h-753j-9g39",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/Sustainsys/Saml2/security/advisories/GHSA-fv2h-753j-9g39"
        },
        {
          "name": "https://github.com/Sustainsys/Saml2/issues/712",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Sustainsys/Saml2/issues/712"
        },
        {
          "name": "https://github.com/Sustainsys/Saml2/issues/713",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Sustainsys/Saml2/issues/713"
        }
      ],
      "source": {
        "advisory": "GHSA-fv2h-753j-9g39",
        "discovery": "UNKNOWN"
      },
      "title": "Sustainsys.Saml2 Insufficient Identity Provider Issuer Validation"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-41890",
    "datePublished": "2023-09-19T14:38:55.861Z",
    "dateReserved": "2023-09-04T16:31:48.225Z",
    "dateUpdated": "2024-10-15T18:32:14.776Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-51663 (GCVE-0-2023-51663)

Vulnerability from cvelistv5 – Published: 2023-12-29 16:53 – Updated: 2025-04-17 20:14
VLAI?
Summary
Hail is an open-source, general-purpose, Python-based data analysis tool with additional data types and methods for working with genomic data. Hail relies on OpenID Connect (OIDC) email addresses from ID tokens to verify the validity of a user's domain, but because users have the ability to change their email address, they could create accounts and use resources in clusters that they should not have access to. For example, a user could create a Microsoft or Google account and then change their email to `test@example.org`. This account can then be used to create a Hail Batch account in Hail Batch clusters whose organization domain is `example.org`. The attacker is not able to access private data or impersonate another user, but they would have the ability to run jobs if Hail Batch billing projects are enabled and create Azure Tenants if they have Azure Active Directory Administrator access.
CWE
  • CWE-289 - Authentication Bypass by Alternate Name
Assigner
References
Impacted products
Vendor Product Version
hail-is hail Affected: < 0.2.127
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T22:40:34.155Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-51663",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-03T19:26:10.951535Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-17T20:14:52.468Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "hail",
          "vendor": "hail-is",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 0.2.127"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hail is an open-source, general-purpose, Python-based data analysis tool with additional data types and methods for working with genomic data. Hail relies on OpenID Connect (OIDC) email addresses from ID tokens to verify the validity of a user\u0027s domain, but because users have the ability to change their email address, they could create accounts and use resources in clusters that they should not have access to. For example, a user could create a Microsoft or Google account and then change their email to `test@example.org`. This account can then be used to create a Hail Batch account in Hail Batch clusters whose organization domain is `example.org`. The attacker is not able to access private data or impersonate another user, but they would have the ability to run jobs if Hail Batch billing projects are enabled and create Azure Tenants if they have Azure Active Directory Administrator access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-289",
              "description": "CWE-289: Authentication Bypass by Alternate Name",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-29T16:53:36.692Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw"
        }
      ],
      "source": {
        "advisory": "GHSA-487p-qx68-5vjw",
        "discovery": "UNKNOWN"
      },
      "title": "Hail authentication can be bypassed by changing email address"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-51663",
    "datePublished": "2023-12-29T16:53:36.692Z",
    "dateReserved": "2023-12-21T14:14:26.224Z",
    "dateUpdated": "2025-04-17T20:14:52.468Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-11283 (GCVE-0-2024-11283)

Vulnerability from cvelistv5 – Published: 2025-03-14 04:22 – Updated: 2025-03-14 13:50
VLAI?
Summary
The WP JobHunt plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.1. This is due to wp_ajax_google_api_login_callback function not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to access arbitrary candidate accounts.
CWE
  • CWE-289 - Authentication Bypass by Alternate Name
Assigner
Impacted products
Vendor Product Version
n/a WP JobHunt Affected: * , ≤ 7.1 (semver)
Credits
Tonn
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-11283",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-14T13:49:20.938565Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-14T13:50:01.460Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WP JobHunt",
          "vendor": "n/a",
          "versions": [
            {
              "lessThanOrEqual": "7.1",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Tonn"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The WP JobHunt plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.1. This is due to wp_ajax_google_api_login_callback function not properly verifying a user\u0027s identity prior to authenticating them. This makes it possible for unauthenticated attackers to access arbitrary candidate accounts."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-289",
              "description": "CWE-289 Authentication Bypass by Alternate Name",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-14T04:22:34.127Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfa487fb-c014-47f1-9537-73881ede30b4?source=cve"
        },
        {
          "url": "https://themeforest.net/item/jobcareer-job-board-responsive-wordpress-theme/14221636"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-03-13T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ],
      "title": "WP JobHunt \u003c= 7.1 - Authentication Bypass to Candidate"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2024-11283",
    "datePublished": "2025-03-14T04:22:34.127Z",
    "dateReserved": "2024-11-15T20:04:20.781Z",
    "dateUpdated": "2025-03-14T13:50:01.460Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-51996 (GCVE-0-2024-51996)

Vulnerability from cvelistv5 – Published: 2024-11-13 16:18 – Updated: 2024-11-13 18:49
VLAI?
Summary
Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. When consuming a persisted remember-me cookie, Symfony does not check if the username persisted in the database matches the username attached with the cookie, leading to authentication bypass. This vulnerability is fixed in 5.4.47, 6.4.15, and 7.1.8.
CWE
  • CWE-287 - Improper Authentication
  • CWE-289 - Authentication Bypass by Alternate Name
Assigner
Impacted products
Vendor Product Version
symfony symfony Affected: >= 5.3.0, < 5.4.47
Affected: >= 6.0.0-BETA1, < 6.4.15
Affected: >= 7.0.0-BETA1, < 7.1.8
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:symphony_php_framework:symphony_process:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "symphony_process",
            "vendor": "symphony_php_framework",
            "versions": [
              {
                "lessThanOrEqual": "5.3.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "5.4.47",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.0.0-BETA1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "6.4.15",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "7.0.0-BETA1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "7.1.8",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-51996",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-13T18:49:11.199886Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-13T18:49:31.776Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "symfony",
          "vendor": "symfony",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 5.3.0, \u003c 5.4.47"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.0.0-BETA1, \u003c 6.4.15"
            },
            {
              "status": "affected",
              "version": "\u003e= 7.0.0-BETA1, \u003c 7.1.8"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. When consuming a persisted remember-me cookie, Symfony does not check if the username persisted in the database matches the username attached with the cookie, leading to authentication bypass. This vulnerability is fixed in 5.4.47, 6.4.15, and 7.1.8."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "CWE-287: Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-289",
              "description": "CWE-289: Authentication Bypass by Alternate Name",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-13T16:18:49.473Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/symfony/symfony/security/advisories/GHSA-cg23-qf8f-62rr",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/symfony/symfony/security/advisories/GHSA-cg23-qf8f-62rr"
        },
        {
          "name": "https://github.com/symfony/symfony/commit/81354d392c5f0b7a52bcbd729d6f82501e94135a",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/symfony/symfony/commit/81354d392c5f0b7a52bcbd729d6f82501e94135a"
        }
      ],
      "source": {
        "advisory": "GHSA-cg23-qf8f-62rr",
        "discovery": "UNKNOWN"
      },
      "title": "Symphony has an Authentication Bypass via RememberMe"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-51996",
    "datePublished": "2024-11-13T16:18:49.473Z",
    "dateReserved": "2024-11-04T17:46:16.776Z",
    "dateUpdated": "2024-11-13T18:49:31.776Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Mitigation ID: MIT-44

Phase: Architecture and Design

Strategy: Input Validation

Description:

  • Avoid making decisions based on names of resources (e.g. files) if those resources can have alternate names.
Mitigation ID: MIT-5

Phase: Implementation

Strategy: Input Validation

Description:

  • Assume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.
  • When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, "boat" may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as "red" or "blue."
  • Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code's environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.
Mitigation ID: MIT-20

Phase: Implementation

Strategy: Input Validation

Description:

  • Inputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.

No CAPEC attack patterns related to this CWE.

Back to CWE stats page