CVE-2020-9300 (GCVE-0-2020-9300)

Vulnerability from cvelistv5 – Published: 2020-11-09 14:41 – Updated: 2024-08-04 10:26
VLAI?
Summary
The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user.
Severity ?
No CVSS data available.
CWE
  • Multiple Multiple Access Control Issues in Dispatch
Assigner
Impacted products
Vendor Product Version
n/a Netflix Dispatch Affected: All versions prior to v20201106
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:26:15.669Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-005.md"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Netflix/dispatch/releases/tag/v20201106"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Netflix Dispatch",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "All versions prior to v20201106"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Multiple Multiple Access Control Issues in Dispatch",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-09T14:41:37",
        "orgId": "ea63fd80-a441-4c7b-ba78-e48a8071cae2",
        "shortName": "netflix"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-005.md"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Netflix/dispatch/releases/tag/v20201106"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-report@netflix.com",
          "ID": "CVE-2020-9300",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Netflix Dispatch",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions prior to v20201106"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Multiple Multiple Access Control Issues in Dispatch"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-005.md",
              "refsource": "MISC",
              "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-005.md"
            },
            {
              "name": "https://github.com/Netflix/dispatch/releases/tag/v20201106",
              "refsource": "MISC",
              "url": "https://github.com/Netflix/dispatch/releases/tag/v20201106"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ea63fd80-a441-4c7b-ba78-e48a8071cae2",
    "assignerShortName": "netflix",
    "cveId": "CVE-2020-9300",
    "datePublished": "2020-11-09T14:41:37",
    "dateReserved": "2020-02-19T00:00:00",
    "dateUpdated": "2024-08-04T10:26:15.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netflix:dispatch:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"20201106\", \"matchCriteriaId\": \"AAD94C3D-CBB6-4542-8254-7D860E39AFD4\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user.\"}, {\"lang\": \"es\", \"value\": \"Los problemas de Control de Acceso incluyen permitir a un usuario normal visualizar un incidente restringido, escalada de roles de usuario a administrador, usuarios que se agregan a s\\u00ed mismos como participantes en un incidente restringido y usuarios capaces de visualizar incidentes restringidos por medio de la funcionalidad search.\u0026#xa0;Si su instalaci\\u00f3n ha seguido las pautas de implementaci\\u00f3n segura, el riesgo de esto es reducido, ya que esto solo puede ser explotado por un usuario autenticado\"}]",
      "id": "CVE-2020-9300",
      "lastModified": "2024-11-21T05:40:22.870",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:N/A:N\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2020-11-09T15:15:13.757",
      "references": "[{\"url\": \"https://github.com/Netflix/dispatch/releases/tag/v20201106\", \"source\": \"security-report@netflix.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-005.md\", \"source\": \"security-report@netflix.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/Netflix/dispatch/releases/tag/v20201106\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-005.md\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
      "sourceIdentifier": "security-report@netflix.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-9300\",\"sourceIdentifier\":\"security-report@netflix.com\",\"published\":\"2020-11-09T15:15:13.757\",\"lastModified\":\"2024-11-21T05:40:22.870\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user.\"},{\"lang\":\"es\",\"value\":\"Los problemas de Control de Acceso incluyen permitir a un usuario normal visualizar un incidente restringido, escalada de roles de usuario a administrador, usuarios que se agregan a s\u00ed mismos como participantes en un incidente restringido y usuarios capaces de visualizar incidentes restringidos por medio de la funcionalidad search.\u0026#xa0;Si su instalaci\u00f3n ha seguido las pautas de implementaci\u00f3n segura, el riesgo de esto es reducido, ya que esto solo puede ser explotado por un usuario autenticado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netflix:dispatch:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20201106\",\"matchCriteriaId\":\"AAD94C3D-CBB6-4542-8254-7D860E39AFD4\"}]}]}],\"references\":[{\"url\":\"https://github.com/Netflix/dispatch/releases/tag/v20201106\",\"source\":\"security-report@netflix.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-005.md\",\"source\":\"security-report@netflix.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Netflix/dispatch/releases/tag/v20201106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-005.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…