Action not permitted
Modal body text goes here.
CVE-2020-15688
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/embedthis/goahead-gpl/issues/3 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:22:30.807Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-07-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-07T17:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15688", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead-gpl/issues/3", "refsource": "MISC", "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "name": "https://github.com/embedthis/goahead-gpl/issues/3", "refsource": "CONFIRM", "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "name": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-15688", "datePublished": "2020-07-23T12:32:37", "dateReserved": "2020-07-13T00:00:00", "dateUpdated": "2024-08-04T13:22:30.807Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-15688\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-07-23T13:15:10.257\",\"lastModified\":\"2023-01-31T17:25:42.877\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.\"},{\"lang\":\"es\",\"value\":\"La autenticaci\u00f3n de HTTP Digest en el servidor web de GoAhead versiones anteriores a 5.1.2 no protege completamente contra los ataques de repetici\u00f3n. Esto permite a un atacante remoto no autenticado eludir la autenticaci\u00f3n a trav\u00e9s de la captura-reproducci\u00f3n si no se utiliza el TLS para proteger el canal de comunicaci\u00f3n subyacente\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-294\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.1.2\",\"matchCriteriaId\":\"2D376801-99A2-499C-81A0-BE19120B78BF\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/embedthis/goahead-gpl/issues/3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
icsa-23-129-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to obtain user access credentials of the MSM web interface or cause a denial-of-service condition. ", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploits specifically target this vulnerability.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-129-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-129-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-129-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-129-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/Recommended-Practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://cisa.gov/ics" } ], "title": "Hitachi Energy MSM", "tracking": { "current_release_date": "2023-05-10T21:13:09.601070Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-129-02", "initial_release_date": "2023-05-10T21:13:09.601070Z", "revision_history": [ { "date": "2023-05-10T21:13:09.601070Z", "legacy_version": "1", "number": "1", "summary": "CSAF Creation Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "2.2.5", "product": { "name": "MSM: \u003c= 2.2.5", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "MSM" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-43298", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "summary", "text": "The code that performs password matching when using \u0027basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. An unauthenticated network attacker could brute-force the HTTP basic password byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response. CVE-2021-43298 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43298" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-15688", "cwe": { "id": "CWE-294", "name": "Authentication Bypass by Capture-replay" }, "notes": [ { "category": "summary", "text": "The HTTP digest authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. An unauthenticated remote attacker could bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel. CVE-2020-15688 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15688" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2019-16645", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (ex: goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP host header sent by an attacker. This could potentially be used in a phishing attack. CVE-2019-16645 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16645" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2019-12822", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and a potential denial-of-service condition, as demonstrated by a single colon on a line. CVE-2019-12822 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12822" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-15504", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11. CVE-2018-15504 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-15504" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-15505", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted \"host\" header field may cause a NULL pointer dereference resulting in a denial-of-service condition, as demonstrated by the lack of a trailing \u0027]\u0027 character in an IPv6 address. CVE-2018-15505 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-15505" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-41615", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "notes": [ { "category": "summary", "text": "Websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy due to the nonce calculation relying on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP digest access authentication in RFC 7616 section 3.3 (or RFC 2617 section 3.2.1).Note: 2.1.8 is a version from 2003; however, the affected websda.c code appears in derivative works that may be used in 2021. Recent GoAhead software is unaffected. CVE-2021-41615 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41615" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2023-23916", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "notes": [ { "category": "summary", "text": "An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \"chained\" HTTP compression algorithms; a server response can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was capped, but the cap was implemented on a per-header basis, allowing a malicious server to insert a virtually unlimited number of compression steps by using many headers. CVE-2023-23916 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23916" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
var-202007-0690
Vulnerability from variot
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel. GoAhead for, Capture-replay An authentication bypass vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. GoAhead is the world's most popular, tiny embedded web server. It is compact, secure and simple to use. GoAhead is deployed in hundreds of millions of devices and is ideal for the smallest of embedded devices.A security vulnerability affecting GoAhead versions 2 to 5 has been identified when using Digest authentication over HTTP. GoAhead versions 3 to 5 validated the nonce with a fixed duration of 5 minutes which permitted short-period replays. This duration is too long for most implementations.Tested on: GoAhead-httpGoAhead-Webs. There is a security vulnerability in Embedthis Software GoAhead versions before 5.1.2. An attacker could exploit this vulnerability to bypass authentication
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0690", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "5.1.2" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": "5.1.2" }, { "model": "goahead web server", "scope": "lt", "trust": 0.1, "vendor": "embedthis", "version": "\u0026lt;=5.1.1 and \u0026lt;=4.1.2" } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "NVD", "id": "CVE-2020-15688" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1.2", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-15688" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "LiquidWorm", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-1390" } ], "trust": 0.6 }, "cve": "CVE-2020-15688", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-15688", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-168691", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-15688", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-15688", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202007-1390", "trust": 0.6, "value": "HIGH" }, { "author": "ZSL", "id": "ZSL-2020-5598", "trust": 0.1, "value": "(3/5)" }, { "author": "VULHUB", "id": "VHN-168691", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "VULHUB", "id": "VHN-168691" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "NVD", "id": "CVE-2020-15688" }, { "db": "CNNVD", "id": "CNNVD-202007-1390" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel. GoAhead for, Capture-replay An authentication bypass vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. GoAhead is the world\u0027s most popular, tiny embedded web server. It is compact, secure and simple to use. GoAhead is deployed in hundreds of millions of devices and is ideal for the smallest of embedded devices.A security vulnerability affecting GoAhead versions 2 to 5 has been identified when using Digest authentication over HTTP. GoAhead versions 3 to 5 validated the nonce with a fixed duration of 5 minutes which permitted short-period replays. This duration is too long for most implementations.Tested on: GoAhead-httpGoAhead-Webs. There is a security vulnerability in Embedthis Software GoAhead versions before 5.1.2. An attacker could exploit this vulnerability to bypass authentication", "sources": [ { "db": "NVD", "id": "CVE-2020-15688" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "VULHUB", "id": "VHN-168691" } ], "trust": 1.8 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.zeroscience.mk/codes/goahead_noncereplay.txt", "trust": 0.1, "type": "poc" } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5598" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-15688", "trust": 3.4 }, { "db": "PACKETSTORM", "id": "159505", "trust": 1.8 }, { "db": "JVN", "id": "JVNVU92569237", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-008671", "trust": 0.8 }, { "db": "CXSECURITY", "id": "WLB-2020100044", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202007-1390", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "48958", "trust": 0.1 }, { "db": "ZSL", "id": "ZSL-2020-5598", "trust": 0.1 }, { "db": "CNVD", "id": "CNVD-2020-46563", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-168691", "trust": 0.1 } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "VULHUB", "id": "VHN-168691" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "NVD", "id": "CVE-2020-15688" }, { "db": "CNNVD", "id": "CNNVD-202007-1390" } ] }, "id": "VAR-202007-0690", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-168691" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:32:15.779000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Digest\u00a0Nonce\u00a0Handling\u00a0over\u00a0HTTP\u00a0#3", "trust": 0.8, "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "title": "Embedthis Software GoAhead Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=125067" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "CNNVD", "id": "CNNVD-202007-1390" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-294", "trust": 1.1 }, { "problemtype": "Capture-replay authentication evasion by (CWE-294) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-168691" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "NVD", "id": "CVE-2020-15688" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://packetstormsecurity.com/files/159505/embedthis-goahead-web-server-5.1.1-digest-authentication-capture-replay-nonce-reuse.html" }, { "trust": 1.8, "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15688" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92569237/index.html" }, { "trust": 0.7, "url": "https://cxsecurity.com/issue/wlb-2020100044" }, { "trust": 0.1, "url": "https://github.com/embedthis/goahead-gpl/issues/2" }, { "trust": 0.1, "url": "https://github.com/embedthis/appweb-gpl/issues/4" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-15688" }, { "trust": 0.1, "url": "https://www.tenable.com/cve/cve-2020-15688" }, { "trust": 0.1, "url": "https://cert.civis.net/en/index.php?action=alert\u0026amp;param=cve-2020-15688" }, { "trust": 0.1, "url": "https://packetstormsecurity.com/files/159505" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/185771" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/48958" } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "VULHUB", "id": "VHN-168691" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "NVD", "id": "CVE-2020-15688" }, { "db": "CNNVD", "id": "CNNVD-202007-1390" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "VULHUB", "id": "VHN-168691" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "NVD", "id": "CVE-2020-15688" }, { "db": "CNNVD", "id": "CNNVD-202007-1390" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-06T00:00:00", "db": "ZSL", "id": "ZSL-2020-5598" }, { "date": "2020-07-23T00:00:00", "db": "VULHUB", "id": "VHN-168691" }, { "date": "2020-09-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "date": "2020-07-23T13:15:10.257000", "db": "NVD", "id": "CVE-2020-15688" }, { "date": "2020-07-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-1390" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-04T00:00:00", "db": "ZSL", "id": "ZSL-2020-5598" }, { "date": "2023-01-31T00:00:00", "db": "VULHUB", "id": "VHN-168691" }, { "date": "2023-05-11T08:45:00", "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "date": "2023-01-31T17:25:42.877000", "db": "NVD", "id": "CVE-2020-15688" }, { "date": "2020-10-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-1390" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-1390" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GoAhead\u00a0 In \u00a0Capture-replay\u00a0 Authentication Bypass Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008671" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-1390" } ], "trust": 0.6 } }
ghsa-6r2c-458p-644h
Vulnerability from github
GoAhead before 5.1.2 mishandles the nonce value during Digest authentication. This may permit request replay attacks for local requests over HTTP.
{ "affected": [], "aliases": [ "CVE-2020-15688" ], "database_specific": { "cwe_ids": [ "CWE-294" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-07-23T13:15:00Z", "severity": "MODERATE" }, "details": "GoAhead before 5.1.2 mishandles the nonce value during Digest authentication. This may permit request replay attacks for local requests over HTTP.", "id": "GHSA-6r2c-458p-644h", "modified": "2023-01-31T18:30:23Z", "published": "2022-05-24T17:24:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15688" }, { "type": "WEB", "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2020-15688
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-15688", "description": "The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.", "id": "GSD-2020-15688", "references": [ "https://packetstormsecurity.com/files/cve/CVE-2020-15688" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-15688" ], "details": "The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.", "id": "GSD-2020-15688", "modified": "2023-12-13T01:21:44.040809Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15688", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead-gpl/issues/3", "refsource": "MISC", "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "name": "https://github.com/embedthis/goahead-gpl/issues/3", "refsource": "CONFIRM", "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "name": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1.2", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15688" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-294" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead-gpl/issues/3", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "name": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-01-31T17:25Z", "publishedDate": "2020-07-23T13:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.