Vulnerabilites related to netiq - edirectory
cve-2017-9285
Vulnerability from cvelistv5
Published
2018-03-02 20:00
Modified
2024-09-17 00:25
Severity ?
EPSS score ?
Summary
NetIQ eDirectory before 9.0 SP4 did not enforce login restrictions when "ebaclient" was used, allowing unpermitted access to eDirectory services.
References
▼ | URL | Tags |
---|---|---|
https://www.novell.com/support/kb/doc.php?id=7016794 | x_refsource_CONFIRM | |
https://bugzilla.suse.com/show_bug.cgi?id=1029077 | x_refsource_CONFIRM | |
https://www.netiq.com/documentation/edirectory-9/edirectory904_releasenotes/data/edirectory904_releasenotes.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | NetIQ | eDirectory |
Version: unspecified < 9.0 SP4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:02:44.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.novell.com/support/kb/doc.php?id=7016794" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1029077" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.netiq.com/documentation/edirectory-9/edirectory904_releasenotes/data/edirectory904_releasenotes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "eDirectory", "vendor": "NetIQ", "versions": [ { "lessThan": "9.0 SP4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2017-10-02T00:00:00", "descriptions": [ { "lang": "en", "value": "NetIQ eDirectory before 9.0 SP4 did not enforce login restrictions when \"ebaclient\" was used, allowing unpermitted access to eDirectory services." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Lack of access checks", "lang": "en", "type": "text" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:35", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.novell.com/support/kb/doc.php?id=7016794" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1029077" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.netiq.com/documentation/edirectory-9/edirectory904_releasenotes/data/edirectory904_releasenotes.html" } ], "source": { "defect": [ "1029077" ], "discovery": "INTERNAL" }, "title": "Login restrictions not applied when using ebaclient against NetIQ eDirectory EBA interface", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2017-10-02T00:00:00.000Z", "ID": "CVE-2017-9285", "STATE": "PUBLIC", "TITLE": "Login restrictions not applied when using ebaclient against NetIQ eDirectory EBA interface" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "eDirectory", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "9.0 SP4" } ] } } ] }, "vendor_name": "NetIQ" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NetIQ eDirectory before 9.0 SP4 did not enforce login restrictions when \"ebaclient\" was used, allowing unpermitted access to eDirectory services." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Lack of access checks" } ] }, { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.novell.com/support/kb/doc.php?id=7016794", "refsource": "CONFIRM", "url": "https://www.novell.com/support/kb/doc.php?id=7016794" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1029077", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1029077" }, { "name": "https://www.netiq.com/documentation/edirectory-9/edirectory904_releasenotes/data/edirectory904_releasenotes.html", "refsource": "CONFIRM", "url": "https://www.netiq.com/documentation/edirectory-9/edirectory904_releasenotes/data/edirectory904_releasenotes.html" } ] }, "source": { "defect": [ "1029077" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2017-9285", "datePublished": "2018-03-02T20:00:00Z", "dateReserved": "2017-05-29T00:00:00", "dateUpdated": "2024-09-17T00:25:58.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7429
Vulnerability from cvelistv5
Published
2018-03-02 20:00
Modified
2024-09-16 23:35
Severity ?
EPSS score ?
Summary
The certificate upload in NetIQ eDirectory PKI plugin before 8.8.8 Patch 10 Hotfix 1 could be abused to upload JSP code which could be used by authenticated attackers to execute JSP applets on the iManager server.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1024957 | x_refsource_CONFIRM | |
https://www.novell.com/support/kb/doc.php?id=3426981 | x_refsource_CONFIRM | |
https://www.netiq.com/documentation/edir88/edir88810hf1_releasenotes/data/edir88810hf1_releasenotes.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | NetIQ | eDirectory |
Version: unspecified < 8.8.8 Patch 10 HF1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:11.244Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1024957" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.novell.com/support/kb/doc.php?id=3426981" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.netiq.com/documentation/edir88/edir88810hf1_releasenotes/data/edir88810hf1_releasenotes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "eDirectory", "vendor": "NetIQ", "versions": [ { "lessThan": "8.8.8 Patch 10 HF1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "SySS GmbH" } ], "datePublic": "2017-10-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The certificate upload in NetIQ eDirectory PKI plugin before 8.8.8 Patch 10 Hotfix 1 could be abused to upload JSP code which could be used by authenticated attackers to execute JSP applets on the iManager server." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:34", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1024957" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.novell.com/support/kb/doc.php?id=3426981" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.netiq.com/documentation/edir88/edir88810hf1_releasenotes/data/edir88810hf1_releasenotes.html" } ], "source": { "defect": [ "1024957" ], "discovery": "EXTERNAL" }, "title": "Fix for NetIQ shell code upload", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2017-10-02T00:00:00.000Z", "ID": "CVE-2017-7429", "STATE": "PUBLIC", "TITLE": "Fix for NetIQ shell code upload" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "eDirectory", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.8.8 Patch 10 HF1" } ] } } ] }, "vendor_name": "NetIQ" } ] } }, "credit": [ { "lang": "eng", "value": "SySS GmbH" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The certificate upload in NetIQ eDirectory PKI plugin before 8.8.8 Patch 10 Hotfix 1 could be abused to upload JSP code which could be used by authenticated attackers to execute JSP applets on the iManager server." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-434" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1024957", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1024957" }, { "name": "https://www.novell.com/support/kb/doc.php?id=3426981", "refsource": "CONFIRM", "url": "https://www.novell.com/support/kb/doc.php?id=3426981" }, { "name": "https://www.netiq.com/documentation/edir88/edir88810hf1_releasenotes/data/edir88810hf1_releasenotes.html", "refsource": "CONFIRM", "url": "https://www.netiq.com/documentation/edir88/edir88810hf1_releasenotes/data/edir88810hf1_releasenotes.html" } ] }, "source": { "defect": [ "1024957" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2017-7429", "datePublished": "2018-03-02T20:00:00Z", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-09-16T23:35:59.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1346
Vulnerability from cvelistv5
Published
2018-03-21 14:00
Modified
2024-08-05 03:59
Severity ?
EPSS score ?
Summary
Addresses denial of service attack to eDirectory versions prior to 9.1.
References
▼ | URL | Tags |
---|---|---|
https://www.netiq.com/documentation/edirectory-91/edirectory91_releasenotes/data/edirectory91_releasenotes.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103493 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | NetIQ | eDirectory |
Version: prior to (9.1) < 9.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:38.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.netiq.com/documentation/edirectory-91/edirectory91_releasenotes/data/edirectory91_releasenotes.html" }, { "name": "103493", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103493" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "eDirectory", "vendor": "NetIQ", "versions": [ { "lessThan": "9.1", "status": "affected", "version": "prior to (9.1)", "versionType": "custom" } ] } ], "datePublic": "2018-02-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Addresses denial of service attack to eDirectory versions prior to 9.1." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:16:04", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.netiq.com/documentation/edirectory-91/edirectory91_releasenotes/data/edirectory91_releasenotes.html" }, { "name": "103493", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103493" } ], "solutions": [ { "lang": "en", "value": "Upgrade to eDiectory 9.1" } ], "source": { "discovery": "INTERNAL" }, "title": "NetIQ eDirectory Denial of Service", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "ID": "CVE-2018-1346", "STATE": "PUBLIC", "TITLE": "NetIQ eDirectory Denial of Service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "eDirectory", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "prior to (9.1)", "version_value": "9.1" } ] } } ] }, "vendor_name": "NetIQ" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Addresses denial of service attack to eDirectory versions prior to 9.1." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.netiq.com/documentation/edirectory-91/edirectory91_releasenotes/data/edirectory91_releasenotes.html", "refsource": "CONFIRM", "url": "https://www.netiq.com/documentation/edirectory-91/edirectory91_releasenotes/data/edirectory91_releasenotes.html" }, { "name": "103493", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103493" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to eDiectory 9.1" } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2018-1346", "datePublished": "2018-03-21T14:00:00", "dateReserved": "2017-12-10T00:00:00", "dateUpdated": "2024-08-05T03:59:38.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12461
Vulnerability from cvelistv5
Published
2018-07-10 18:00
Modified
2024-09-16 17:18
Severity ?
EPSS score ?
Summary
Fixed issues with NetIQ eDirectory prior to 9.1.1 when checking certificate revocation.
References
▼ | URL | Tags |
---|---|---|
https://www.netiq.com/support/kb/doc.php?id=7016794 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | NetIQ | eDirectory |
Version: eDirectory 9.1.1 < 9.1.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:38:05.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.netiq.com/support/kb/doc.php?id=7016794" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "eDirectory", "vendor": "NetIQ", "versions": [ { "lessThan": "9.1.1", "status": "affected", "version": "eDirectory 9.1.1", "versionType": "custom" } ] } ], "datePublic": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Fixed issues with NetIQ eDirectory prior to 9.1.1 when checking certificate revocation." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Under some circumstances certificate revocation checks in NetIQ eDirectory versions prior to 9.1.1 do not work.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:48", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.netiq.com/support/kb/doc.php?id=7016794" } ], "solutions": [ { "lang": "en", "value": "Upgrade to eDirectory 9.1.1 ." } ], "source": { "discovery": "INTERNAL" }, "title": "Certificate Revocation Check failure", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-07-10T05:00:00.000Z", "ID": "CVE-2018-12461", "STATE": "PUBLIC", "TITLE": "Certificate Revocation Check failure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "eDirectory", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "eDirectory 9.1.1", "version_value": "9.1.1" } ] } } ] }, "vendor_name": "NetIQ" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Fixed issues with NetIQ eDirectory prior to 9.1.1 when checking certificate revocation." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Under some circumstances certificate revocation checks in NetIQ eDirectory versions prior to 9.1.1 do not work." } ] } ] }, "references": { "reference_data": [ { "name": "https://www.netiq.com/support/kb/doc.php?id=7016794", "refsource": "CONFIRM", "url": "https://www.netiq.com/support/kb/doc.php?id=7016794" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to eDirectory 9.1.1 ." } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2018-12461", "datePublished": "2018-07-10T18:00:00Z", "dateReserved": "2018-06-15T00:00:00", "dateUpdated": "2024-09-16T17:18:10.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5186
Vulnerability from cvelistv5
Published
2017-04-27 14:00
Modified
2024-08-05 14:55
Severity ?
EPSS score ?
Summary
Novell iManager 2.7 before SP7 Patch 9, NetIQ iManager 3.x before 3.0.2.1, Novell eDirectory 8.8.x before 8.8 SP8 Patch 9 Hotfix 2, and NetIQ eDirectory 9.x before 9.0.2 Hotfix 2 (9.0.2.2) use the deprecated MD5 hashing algorithm in a communications certificate.
References
▼ | URL | Tags |
---|---|---|
https://www.novell.com/support/kb/doc.php?id=7016794 | x_refsource_CONFIRM | |
https://www.novell.com/support/kb/doc.php?id=3426981 | x_refsource_CONFIRM | |
https://www.novell.com/support/kb/doc.php?id=7016795 | x_refsource_CONFIRM | |
https://bugzilla.novell.com/show_bug.cgi?id=1019789 | x_refsource_CONFIRM | |
https://bugzilla.novell.com/show_bug.cgi?id=988749 | x_refsource_CONFIRM | |
https://www.novell.com/support/kb/doc.php?id=7010166 | x_refsource_CONFIRM | |
https://bugzilla.novell.com/show_bug.cgi?id=1019041 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | NetIQ/Novell iManager and eDirectory |
Version: NetIQ/Novell iManager and eDirectory |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:55:35.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.novell.com/support/kb/doc.php?id=7016794" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.novell.com/support/kb/doc.php?id=3426981" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.novell.com/support/kb/doc.php?id=7016795" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=1019789" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=988749" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.novell.com/support/kb/doc.php?id=7010166" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=1019041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NetIQ/Novell iManager and eDirectory", "vendor": "n/a", "versions": [ { "status": "affected", "version": "NetIQ/Novell iManager and eDirectory" } ] } ], "datePublic": "2017-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Novell iManager 2.7 before SP7 Patch 9, NetIQ iManager 3.x before 3.0.2.1, Novell eDirectory 8.8.x before 8.8 SP8 Patch 9 Hotfix 2, and NetIQ eDirectory 9.x before 9.0.2 Hotfix 2 (9.0.2.2) use the deprecated MD5 hashing algorithm in a communications certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "deprecated hashing algorithm", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:59", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.novell.com/support/kb/doc.php?id=7016794" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.novell.com/support/kb/doc.php?id=3426981" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.novell.com/support/kb/doc.php?id=7016795" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=1019789" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=988749" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.novell.com/support/kb/doc.php?id=7010166" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=1019041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-5186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NetIQ/Novell iManager and eDirectory", "version": { "version_data": [ { "version_value": "NetIQ/Novell iManager and eDirectory" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Novell iManager 2.7 before SP7 Patch 9, NetIQ iManager 3.x before 3.0.2.1, Novell eDirectory 8.8.x before 8.8 SP8 Patch 9 Hotfix 2, and NetIQ eDirectory 9.x before 9.0.2 Hotfix 2 (9.0.2.2) use the deprecated MD5 hashing algorithm in a communications certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "deprecated hashing algorithm" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.novell.com/support/kb/doc.php?id=7016794", "refsource": "CONFIRM", "url": "https://www.novell.com/support/kb/doc.php?id=7016794" }, { "name": "https://www.novell.com/support/kb/doc.php?id=3426981", "refsource": "CONFIRM", "url": "https://www.novell.com/support/kb/doc.php?id=3426981" }, { "name": "https://www.novell.com/support/kb/doc.php?id=7016795", "refsource": "CONFIRM", "url": "https://www.novell.com/support/kb/doc.php?id=7016795" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=1019789", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=1019789" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=988749", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=988749" }, { "name": "https://www.novell.com/support/kb/doc.php?id=7010166", "refsource": "CONFIRM", "url": "https://www.novell.com/support/kb/doc.php?id=7010166" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=1019041", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=1019041" } ] } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2017-5186", "datePublished": "2017-04-27T14:00:00", "dateReserved": "2017-01-06T00:00:00", "dateUpdated": "2024-08-05T14:55:35.486Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2018-07-10 18:29
Modified
2024-11-21 03:45
Severity ?
3.5 (Low) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
Fixed issues with NetIQ eDirectory prior to 9.1.1 when checking certificate revocation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netiq | edirectory | 9.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netiq:edirectory:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5244F440-1364-480E-9700-0EE6857BA0DB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fixed issues with NetIQ eDirectory prior to 9.1.1 when checking certificate revocation." }, { "lang": "es", "value": "Problemas solucionados con NetIQ eDirectory en versiones anteriores a la 9.1.1 al comprobar la revocaci\u00f3n de certificados." } ], "id": "CVE-2018-12461", "lastModified": "2024-11-21T03:45:15.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "security@opentext.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-10T18:29:00.357", "references": [ { "source": "security@opentext.com", "url": "https://www.netiq.com/support/kb/doc.php?id=7016794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.netiq.com/support/kb/doc.php?id=7016794" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-21 14:29
Modified
2024-11-21 03:59
Severity ?
3.1 (Low) - CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Addresses denial of service attack to eDirectory versions prior to 9.1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netiq | edirectory | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netiq:edirectory:*:*:*:*:*:*:*:*", "matchCriteriaId": "90CAF74B-A8CC-49D8-99C8-3C332636F091", "versionEndExcluding": "9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Addresses denial of service attack to eDirectory versions prior to 9.1." }, { "lang": "es", "value": "Se trata de un ataque de denegaci\u00f3n de servicio (DoS) en eDirectory, en versiones anteriores a la 9.1." } ], "id": "CVE-2018-1346", "lastModified": "2024-11-21T03:59:40.063", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security@opentext.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-21T14:29:00.343", "references": [ { "source": "security@opentext.com", "url": "http://www.securityfocus.com/bid/103493" }, { "source": "security@opentext.com", "url": "https://www.netiq.com/documentation/edirectory-91/edirectory91_releasenotes/data/edirectory91_releasenotes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.netiq.com/documentation/edirectory-91/edirectory91_releasenotes/data/edirectory91_releasenotes.html" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-02 20:29
Modified
2024-11-21 03:35
Severity ?
5.4 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
NetIQ eDirectory before 9.0 SP4 did not enforce login restrictions when "ebaclient" was used, allowing unpermitted access to eDirectory services.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microfocus | edirectory | * | |
netiq | edirectory | 9.0 | |
netiq | edirectory | 9.0 | |
netiq | edirectory | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*", "matchCriteriaId": "A43799B6-460B-4460-8220-B95A8598DCB4", "versionEndIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:9.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "747AA5D9-EB98-4612-8DED-ECC34715396A", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:9.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "8C2F19B5-AB42-44F9-A142-0DD7F982BF14", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:9.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "D1039C58-C75E-441C-910A-CF08F5AD7DD5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NetIQ eDirectory before 9.0 SP4 did not enforce login restrictions when \"ebaclient\" was used, allowing unpermitted access to eDirectory services." }, { "lang": "es", "value": "NetIQ eDirectory, en versiones anteriores a la 9.0 SP4, no impon\u00eda restricciones de inicio de sesi\u00f3n al emplear \"ebaclient\". Esto permit\u00eda el acceso no autorizado a los servicios de eDirectory." } ], "id": "CVE-2017-9285", "lastModified": "2024-11-21T03:35:45.540", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "security@opentext.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-02T20:29:01.020", "references": [ { "source": "security@opentext.com", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1029077" }, { "source": "security@opentext.com", "url": "https://www.netiq.com/documentation/edirectory-9/edirectory904_releasenotes/data/edirectory904_releasenotes.html" }, { "source": "security@opentext.com", "url": "https://www.novell.com/support/kb/doc.php?id=7016794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1029077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.netiq.com/documentation/edirectory-9/edirectory904_releasenotes/data/edirectory904_releasenotes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.novell.com/support/kb/doc.php?id=7016794" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "security@opentext.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-27 14:59
Modified
2024-11-21 03:27
Severity ?
Summary
Novell iManager 2.7 before SP7 Patch 9, NetIQ iManager 3.x before 3.0.2.1, Novell eDirectory 8.8.x before 8.8 SP8 Patch 9 Hotfix 2, and NetIQ eDirectory 9.x before 9.0.2 Hotfix 2 (9.0.2.2) use the deprecated MD5 hashing algorithm in a communications certificate.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netiq | edirectory | 9.0 | |
netiq | edirectory | 9.0.1 | |
netiq | edirectory | 9.0.2 | |
netiq | imanager | 3.0 | |
netiq | imanager | 3.0.1 | |
netiq | imanager | 3.0.2 | |
novell | edirectory | * | |
novell | imanager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netiq:edirectory:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1822596B-5F37-4788-A596-32C994A4F39F", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D4F31E6-C304-43F0-997A-1DE23CD043CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B970239-2775-4377-AB77-6575F4EA6C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:imanager:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D3D7F7B-CF13-4729-BDC8-FA7C25EB0856", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:imanager:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B44FED3-A5D0-4F0D-AD4F-329152057627", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:imanager:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8A555C67-FE51-414D-B93A-42DEC732EAAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:edirectory:*:sp8_patch9:*:*:*:*:*:*", "matchCriteriaId": "445EEDC7-BA29-44DF-88D6-205F16D3D68B", "versionEndIncluding": "8.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:imanager:*:sp7_patch8:*:*:*:*:*:*", "matchCriteriaId": "9E43BD48-BFE5-49E4-AFD4-0B15A2FEA59A", "versionEndIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Novell iManager 2.7 before SP7 Patch 9, NetIQ iManager 3.x before 3.0.2.1, Novell eDirectory 8.8.x before 8.8 SP8 Patch 9 Hotfix 2, and NetIQ eDirectory 9.x before 9.0.2 Hotfix 2 (9.0.2.2) use the deprecated MD5 hashing algorithm in a communications certificate." }, { "lang": "es", "value": "Novell iManager versi\u00f3n 2.7 anterior a SP7 Patch 9, Novell eDirectory 8.8.x anterior a 8.8 SP8 Patch 9 Hotfix 2, NetIQ eDirectory 9.x anterior a 9.0.2 Hotfix 2 (9.0.2.2) y NetIQ iManager 3.x anterior a 3.0.2.1 usan el algoritmo de hashing MD5 en un certificado para comunicaciones." } ], "id": "CVE-2017-5186", "lastModified": "2024-11-21T03:27:13.547", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-27T14:59:00.263", "references": [ { "source": "security@opentext.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=1019041" }, { "source": "security@opentext.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=1019789" }, { "source": "security@opentext.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=988749" }, { "source": "security@opentext.com", "url": "https://www.novell.com/support/kb/doc.php?id=3426981" }, { "source": "security@opentext.com", "url": "https://www.novell.com/support/kb/doc.php?id=7010166" }, { "source": "security@opentext.com", "url": "https://www.novell.com/support/kb/doc.php?id=7016794" }, { "source": "security@opentext.com", "url": "https://www.novell.com/support/kb/doc.php?id=7016795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=1019041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=1019789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=988749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.novell.com/support/kb/doc.php?id=3426981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.novell.com/support/kb/doc.php?id=7010166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.novell.com/support/kb/doc.php?id=7016794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.novell.com/support/kb/doc.php?id=7016795" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-02 20:29
Modified
2024-11-21 03:31
Severity ?
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The certificate upload in NetIQ eDirectory PKI plugin before 8.8.8 Patch 10 Hotfix 1 could be abused to upload JSP code which could be used by authenticated attackers to execute JSP applets on the iManager server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microfocus | edirectory | * | |
netiq | edirectory | 8.8.8 | |
netiq | edirectory | 8.8.8 | |
netiq | edirectory | 8.8.8 | |
netiq | edirectory | 8.8.8 | |
netiq | edirectory | 8.8.8 | |
netiq | edirectory | 8.8.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*", "matchCriteriaId": "F84A12FE-0920-45C3-BF8F-6B9D1030AE0D", "versionEndIncluding": "8.8.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:8.8.8:patch10:*:*:*:*:*:*", "matchCriteriaId": "B4F19781-7439-4D43-9FE7-6ACB4C154513", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:8.8.8:patch5:*:*:*:*:*:*", "matchCriteriaId": "B1FD6CA7-4B36-4835-8841-C964BCC98400", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:8.8.8:patch6:*:*:*:*:*:*", "matchCriteriaId": "92A0DBF5-B69E-49C5-8D70-137B27619AEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:8.8.8:patch7:*:*:*:*:*:*", "matchCriteriaId": "EC21192D-9C4A-4841-861F-127AB1C5F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:8.8.8:patch8:*:*:*:*:*:*", "matchCriteriaId": "C60A8A5D-F154-4520-8CE1-2EC889484562", "vulnerable": true }, { "criteria": "cpe:2.3:a:netiq:edirectory:8.8.8:patch9:*:*:*:*:*:*", "matchCriteriaId": "4942CADE-A224-4929-91D8-AD0D82BE7341", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The certificate upload in NetIQ eDirectory PKI plugin before 8.8.8 Patch 10 Hotfix 1 could be abused to upload JSP code which could be used by authenticated attackers to execute JSP applets on the iManager server." }, { "lang": "es", "value": "La subida de certificados en el plugin NetIQ eDirectory PKI, en versiones anteriores a 8.8.8 Patch 10 Hotfix 1, podr\u00eda aprovecharse para subir c\u00f3digo JSP que puede ser empleado por atacantes autenticados para ejecutar applets JSP en el servidor iManager." } ], "id": "CVE-2017-7429", "lastModified": "2024-11-21T03:31:52.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security@opentext.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-02T20:29:00.490", "references": [ { "source": "security@opentext.com", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1024957" }, { "source": "security@opentext.com", "url": "https://www.netiq.com/documentation/edir88/edir88810hf1_releasenotes/data/edir88810hf1_releasenotes.html" }, { "source": "security@opentext.com", "url": "https://www.novell.com/support/kb/doc.php?id=3426981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1024957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.netiq.com/documentation/edir88/edir88810hf1_releasenotes/data/edir88810hf1_releasenotes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.novell.com/support/kb/doc.php?id=3426981" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "security@opentext.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }