CVE-2020-11854 (GCVE-0-2020-11854)
Vulnerability from cvelistv5 – Published: 2020-10-27 16:29 – Updated: 2024-08-04 11:42
VLAI?
Summary
Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravility affects: 1.) Operation Bridge Manager versions 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. 3.) Application Performance Management versions 9,51, 9.50 and 9.40 with uCMDB 10.33 CUP 3. The vulnerability could allow Arbitrary code execution.
Severity ?
9.8 (Critical)
CWE
- Arbitrary code execution
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Micro Focus | Application Performance Management |
Affected:
9.51
Affected: 9.50 Affected: 9.40 |
||||||||||||
|
||||||||||||||
Credits
Micro Focus would like to thank Pedro Ribeiro from Agile Information Security working with Trend Micro Zero Day Initiative for discovering and reporting the vulnerability
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:42:00.149Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://softwaresupport.softwaregrp.com/doc/KM03747657"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1287/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Application Performance Management ",
"vendor": "Micro Focus ",
"versions": [
{
"status": "affected",
"version": "9.51"
},
{
"status": "affected",
"version": "9.50"
},
{
"status": "affected",
"version": "9.40"
}
]
},
{
"product": "Operation Bridge (containerized)",
"vendor": "Micro Focus ",
"versions": [
{
"status": "affected",
"version": "2020.05"
},
{
"status": "affected",
"version": "2019.08"
},
{
"status": "affected",
"version": "2019.05"
},
{
"status": "affected",
"version": "2018.11"
},
{
"status": "affected",
"version": "2018.08"
},
{
"status": "affected",
"version": "2018.05"
},
{
"status": "affected",
"version": "2018.02"
},
{
"status": "affected",
"version": "2017.11"
}
]
},
{
"product": "Operation Bridge Manager",
"vendor": "Micro Focus ",
"versions": [
{
"status": "affected",
"version": "2020.05"
},
{
"status": "affected",
"version": "2019.11"
},
{
"status": "affected",
"version": "2019.05"
},
{
"status": "affected",
"version": "2018.11"
},
{
"status": "affected",
"version": "2018.05"
},
{
"status": "affected",
"version": "10.63"
},
{
"status": "affected",
"version": "10.62"
},
{
"status": "affected",
"version": "10.61"
},
{
"status": "affected",
"version": "10.60"
},
{
"status": "affected",
"version": "10.12"
},
{
"status": "affected",
"version": "10.11"
},
{
"lessThanOrEqual": "10.10",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Micro Focus would like to thank Pedro Ribeiro from Agile Information Security working with Trend Micro Zero Day Initiative for discovering and reporting the vulnerability"
}
],
"descriptions": [
{
"lang": "en",
"value": "Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravility affects: 1.) Operation Bridge Manager versions 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. 3.) Application Performance Management versions 9,51, 9.50 and 9.40 with uCMDB 10.33 CUP 3. The vulnerability could allow Arbitrary code execution."
}
],
"exploits": [
{
"lang": "en",
"value": "Arbitrary code execution. "
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Arbitrary code execution",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-28T15:06:08",
"orgId": "f81092c5-7f14-476d-80dc-24857f90be84",
"shortName": "microfocus"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://softwaresupport.softwaregrp.com/doc/KM03747657"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1287/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html"
}
],
"solutions": [
{
"lang": "en",
"value": "For Operation Bridge Manager https://softwaresupport.softwaregrp.com/doc/KM03747658\nFor Operation Bridge (containerized) https://softwaresupport.softwaregrp.com/doc/KM03747854\nFor Application Performance Management https://softwaresupport.softwaregrp.com/doc/KM03747657"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) products.",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2020-11854",
"STATE": "PUBLIC",
"TITLE": "Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) products."
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Application Performance Management ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.51"
},
{
"version_affected": "=",
"version_value": "9.50"
},
{
"version_affected": "=",
"version_value": "9.40"
}
]
}
},
{
"product_name": "Operation Bridge (containerized)",
"version": {
"version_data": [
{
"version_value": "2020.05"
},
{
"version_value": "2019.08"
},
{
"version_value": "2019.05"
},
{
"version_value": "2018.11"
},
{
"version_value": "2018.08"
},
{
"version_value": "2018.05"
},
{
"version_value": "2018.02"
},
{
"version_value": "2017.11"
}
]
}
},
{
"product_name": "Operation Bridge Manager",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2020.05"
},
{
"version_affected": "=",
"version_value": "2019.11"
},
{
"version_affected": "=",
"version_value": "2019.05"
},
{
"version_affected": "=",
"version_value": "2018.11"
},
{
"version_affected": "=",
"version_value": "2018.05"
},
{
"version_affected": "=",
"version_value": "10.63"
},
{
"version_affected": "=",
"version_value": "10.62"
},
{
"version_affected": "=",
"version_value": "10.61"
},
{
"version_affected": "=",
"version_value": "10.60"
},
{
"version_affected": "=",
"version_value": "10.12"
},
{
"version_affected": "=",
"version_value": "10.11"
},
{
"version_affected": "\u003c=",
"version_value": "10.10"
}
]
}
}
]
},
"vendor_name": "Micro Focus "
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Micro Focus would like to thank Pedro Ribeiro from Agile Information Security working with Trend Micro Zero Day Initiative for discovering and reporting the vulnerability"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravility affects: 1.) Operation Bridge Manager versions 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. 3.) Application Performance Management versions 9,51, 9.50 and 9.40 with uCMDB 10.33 CUP 3. The vulnerability could allow Arbitrary code execution."
}
]
},
"exploit": [
{
"lang": "en",
"value": "Arbitrary code execution. "
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://softwaresupport.softwaregrp.com/doc/KM03747658",
"refsource": "MISC",
"url": "https://softwaresupport.softwaregrp.com/doc/KM03747658"
},
{
"name": "https://softwaresupport.softwaregrp.com/doc/KM03747657",
"refsource": "MISC",
"url": "https://softwaresupport.softwaregrp.com/doc/KM03747657"
},
{
"name": "https://softwaresupport.softwaregrp.com/doc/KM03747854",
"refsource": "MISC",
"url": "https://softwaresupport.softwaregrp.com/doc/KM03747854"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1287/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1287/"
},
{
"name": "http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html"
}
]
},
"solution": [
{
"lang": "en",
"value": "For Operation Bridge Manager https://softwaresupport.softwaregrp.com/doc/KM03747658\nFor Operation Bridge (containerized) https://softwaresupport.softwaregrp.com/doc/KM03747854\nFor Application Performance Management https://softwaresupport.softwaregrp.com/doc/KM03747657"
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84",
"assignerShortName": "microfocus",
"cveId": "CVE-2020-11854",
"datePublished": "2020-10-27T16:29:44",
"dateReserved": "2020-04-16T00:00:00",
"dateUpdated": "2024-08-04T11:42:00.149Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:application_performance_management:9.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E3938F6-E50A-480B-8219-0B210983525E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:application_performance_management:9.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C419162B-A41C-49D0-9293-5F10B8A911EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2017.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22CE2A4E-D42B-47F7-BFC1-EA498795D0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2018.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88D1F756-6699-4046-AC9F-FED971A26B9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2018.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68B8CDAA-33CF-4B9D-954B-1976160A1A76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2018.08:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C945B57-F9CB-4282-9D0E-F552B8AD1AC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2018.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7939DB7E-484A-477F-A303-BD5B1EF9BD4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2019.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6212937A-A038-41B6-929E-F8A1C2DB41A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2019.08:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A28436C6-6A21-4A1D-A1E0-C4F224DB669A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge:2020.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7F4EB07-6B54-4EB1-9C47-7D42BADA6C6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"10.10\", \"matchCriteriaId\": \"95F47B66-7FAD-44C9-9C8C-8DD785F4B297\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E38A260-424C-4B73-A502-75394F64AEAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F0B3E96-BEE7-4F04-8FB7-633C42DEBEA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DEC1A77-DFF5-4E35-BD25-9ED3EEC77702\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9328132A-CB29-4252-B0DE-32E1AE402526\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C163191-6D2E-4403-B416-ED29174B5781\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:10.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9C552EF-2ADA-4293-8DA6-8EFF201FD2E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:2018.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1A2E37C-69DC-42AC-BE72-475561249F24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:2018.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F169AF11-4F4D-4A17-8808-8F5E5822D17C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:2019.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65B2691B-246F-4305-943F-392062AD7C9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:2019.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFD9DF2A-E5D3-48DD-8D0A-CD2C333E5354\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:operations_bridge_manager:2020.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F113173-2ECD-4FF6-A664-A9AABFD448CA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microfocus:application_performance_management:9.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C520D74-D011-4C1E-9429-BA0A38BC0D28\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:microfocus:universal_cmdb:10.33:cumulative_update_package_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7648EAC-3790-4C80-AC6B-70C3745F52AC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravility affects: 1.) Operation Bridge Manager versions 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. 3.) Application Performance Management versions 9,51, 9.50 and 9.40 with uCMDB 10.33 CUP 3. The vulnerability could allow Arbitrary code execution.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de ejecuci\\u00f3n de c\\u00f3digo arbitraria en Operation Bridge Manager, Application Performance Management y Operations Bridge (en contenedores). Vulnerabilidad en los productos Micro Focus Operation Bridge Manager, Operation Bridge (containerized) y Application Performance Management.\u0026#xa0;La vulnerabilidad afecta: 1.) Operation Bridge Manager versiones 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 y todas las versiones anteriores.\u0026#xa0;2.) Operations Bridge (en contenedores) versiones: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05.\u0026#xa0;2018.02 y 2017.11.\u0026#xa0;3.) Application Performance Management versiones: 9,51, 9.50 y 9.40 con uCMDB versi\\u00f3n 10.33 CUP 3. La vulnerabilidad podr\\u00eda permitir una ejecuci\\u00f3n de c\\u00f3digo Arbitraria\"}]",
"id": "CVE-2020-11854",
"lastModified": "2024-11-21T04:58:45.713",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security@opentext.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-10-27T17:15:12.130",
"references": "[{\"url\": \"http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html\", \"source\": \"security@opentext.com\"}, {\"url\": \"https://softwaresupport.softwaregrp.com/doc/KM03747657\", \"source\": \"security@opentext.com\"}, {\"url\": \"https://softwaresupport.softwaregrp.com/doc/KM03747658\", \"source\": \"security@opentext.com\"}, {\"url\": \"https://softwaresupport.softwaregrp.com/doc/KM03747854\", \"source\": \"security@opentext.com\"}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1287/\", \"source\": \"security@opentext.com\"}, {\"url\": \"http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://softwaresupport.softwaregrp.com/doc/KM03747657\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://softwaresupport.softwaregrp.com/doc/KM03747658\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://softwaresupport.softwaregrp.com/doc/KM03747854\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1287/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@opentext.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-798\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-11854\",\"sourceIdentifier\":\"security@opentext.com\",\"published\":\"2020-10-27T17:15:12.130\",\"lastModified\":\"2024-11-21T04:58:45.713\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravility affects: 1.) Operation Bridge Manager versions 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. 3.) Application Performance Management versions 9,51, 9.50 and 9.40 with uCMDB 10.33 CUP 3. The vulnerability could allow Arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitraria en Operation Bridge Manager, Application Performance Management y Operations Bridge (en contenedores). Vulnerabilidad en los productos Micro Focus Operation Bridge Manager, Operation Bridge (containerized) y Application Performance Management.\u0026#xa0;La vulnerabilidad afecta: 1.) Operation Bridge Manager versiones 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 y todas las versiones anteriores.\u0026#xa0;2.) Operations Bridge (en contenedores) versiones: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05.\u0026#xa0;2018.02 y 2017.11.\u0026#xa0;3.) Application Performance Management versiones: 9,51, 9.50 y 9.40 con uCMDB versi\u00f3n 10.33 CUP 3. La vulnerabilidad podr\u00eda permitir una ejecuci\u00f3n de c\u00f3digo Arbitraria\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@opentext.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:application_performance_management:9.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E3938F6-E50A-480B-8219-0B210983525E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:application_performance_management:9.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C419162B-A41C-49D0-9293-5F10B8A911EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2017.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22CE2A4E-D42B-47F7-BFC1-EA498795D0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2018.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D1F756-6699-4046-AC9F-FED971A26B9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2018.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68B8CDAA-33CF-4B9D-954B-1976160A1A76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2018.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C945B57-F9CB-4282-9D0E-F552B8AD1AC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2018.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7939DB7E-484A-477F-A303-BD5B1EF9BD4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2019.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6212937A-A038-41B6-929E-F8A1C2DB41A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2019.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A28436C6-6A21-4A1D-A1E0-C4F224DB669A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge:2020.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7F4EB07-6B54-4EB1-9C47-7D42BADA6C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.10\",\"matchCriteriaId\":\"95F47B66-7FAD-44C9-9C8C-8DD785F4B297\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E38A260-424C-4B73-A502-75394F64AEAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0B3E96-BEE7-4F04-8FB7-633C42DEBEA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DEC1A77-DFF5-4E35-BD25-9ED3EEC77702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9328132A-CB29-4252-B0DE-32E1AE402526\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C163191-6D2E-4403-B416-ED29174B5781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:10.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C552EF-2ADA-4293-8DA6-8EFF201FD2E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:2018.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2E37C-69DC-42AC-BE72-475561249F24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:2018.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F169AF11-4F4D-4A17-8808-8F5E5822D17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:2019.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65B2691B-246F-4305-943F-392062AD7C9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:2019.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFD9DF2A-E5D3-48DD-8D0A-CD2C333E5354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:operations_bridge_manager:2020.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F113173-2ECD-4FF6-A664-A9AABFD448CA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microfocus:application_performance_management:9.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C520D74-D011-4C1E-9429-BA0A38BC0D28\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:microfocus:universal_cmdb:10.33:cumulative_update_package_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7648EAC-3790-4C80-AC6B-70C3745F52AC\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html\",\"source\":\"security@opentext.com\"},{\"url\":\"https://softwaresupport.softwaregrp.com/doc/KM03747657\",\"source\":\"security@opentext.com\"},{\"url\":\"https://softwaresupport.softwaregrp.com/doc/KM03747658\",\"source\":\"security@opentext.com\"},{\"url\":\"https://softwaresupport.softwaregrp.com/doc/KM03747854\",\"source\":\"security@opentext.com\"},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-20-1287/\",\"source\":\"security@opentext.com\"},{\"url\":\"http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://softwaresupport.softwaregrp.com/doc/KM03747657\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://softwaresupport.softwaregrp.com/doc/KM03747658\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://softwaresupport.softwaregrp.com/doc/KM03747854\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-20-1287/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…