CVE-2017-18262 (GCVE-0-2017-18262)

Vulnerability from cvelistv5 – Published: 2018-04-30 13:00 – Updated: 2024-08-05 21:13
VLAI?
Summary
Blackboard Learn (Since at least 17th of October 2017) has allowed Unvalidated Redirects on any signed-in user through its endpoints for handling Shibboleth logins, as demonstrated by a webapps/bb-auth-provider-shibboleth-BBLEARN/execute/shibbolethLogin?returnUrl= URI.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id/1040767 vdb-entryx_refsource_SECTRACK
http://seclists.org/fulldisclosure/2018/Apr/57 mailing-listx_refsource_FULLDISC
https://ethan.pm/blackboard.txt x_refsource_MISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T21:13:49.302Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1040767",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1040767"
          },
          {
            "name": "20180427 Unvalidated Redirect in Shibboleth component of Blackboard Learn",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2018/Apr/57"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ethan.pm/blackboard.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Blackboard Learn (Since at least 17th of October 2017) has allowed Unvalidated Redirects on any signed-in user through its endpoints for handling Shibboleth logins, as demonstrated by a webapps/bb-auth-provider-shibboleth-BBLEARN/execute/shibbolethLogin?returnUrl= URI."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-05-01T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1040767",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1040767"
        },
        {
          "name": "20180427 Unvalidated Redirect in Shibboleth component of Blackboard Learn",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2018/Apr/57"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ethan.pm/blackboard.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-18262",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Blackboard Learn (Since at least 17th of October 2017) has allowed Unvalidated Redirects on any signed-in user through its endpoints for handling Shibboleth logins, as demonstrated by a webapps/bb-auth-provider-shibboleth-BBLEARN/execute/shibbolethLogin?returnUrl= URI."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1040767",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1040767"
            },
            {
              "name": "20180427 Unvalidated Redirect in Shibboleth component of Blackboard Learn",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2018/Apr/57"
            },
            {
              "name": "https://ethan.pm/blackboard.txt",
              "refsource": "MISC",
              "url": "https://ethan.pm/blackboard.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-18262",
    "datePublished": "2018-04-30T13:00:00",
    "dateReserved": "2018-04-26T00:00:00",
    "dateUpdated": "2024-08-05T21:13:49.302Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackboard:blackboard_learn:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.1\", \"matchCriteriaId\": \"30CF5A1E-02A2-4D02-A215-33B458C9DDB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackboard:blackboard_learn:9.1:q2_2016:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0E0E9DB-BC5C-4F68-BCBD-9E4EA81D7755\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackboard:blackboard_learn:9.1:q2_2017:*:*:*:*:*:*\", \"matchCriteriaId\": \"241DD4F3-BD1C-45AB-9F33-6F795BC87506\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackboard:blackboard_learn:9.1:q4_2015:*:*:*:*:*:*\", \"matchCriteriaId\": \"426531EE-872D-4C4A-B4E0-E9AC45EFD4B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackboard:blackboard_learn:9.1:q4_2016:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C800C52-41EA-4707-94F0-56582DED6CB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackboard:blackboard_learn:9.1:q4_2017:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D069CC7-307A-466A-B9AB-E76767F7E762\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Blackboard Learn (Since at least 17th of October 2017) has allowed Unvalidated Redirects on any signed-in user through its endpoints for handling Shibboleth logins, as demonstrated by a webapps/bb-auth-provider-shibboleth-BBLEARN/execute/shibbolethLogin?returnUrl= URI.\"}, {\"lang\": \"es\", \"value\": \"Blackboard Learn (desde, al menos, el 17 de octubre de 2017) ha permitido redirecciones no validadas en cualquier usuario que haya iniciado sesi\\u00f3n mediante sus endpoints para gestionar inicios de sesi\\u00f3n de Shibboleth. Esto se demuestra por un URI webapps/bb-auth-provider-shibboleth-BBLEARN/execute/shibbolethLogin?returnUrl=.\"}]",
      "id": "CVE-2017-18262",
      "lastModified": "2024-11-21T03:19:42.850",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:N\", \"baseScore\": 5.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2018-04-30T13:29:00.260",
      "references": "[{\"url\": \"http://seclists.org/fulldisclosure/2018/Apr/57\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1040767\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://ethan.pm/blackboard.txt\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2018/Apr/57\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1040767\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://ethan.pm/blackboard.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}, {\"lang\": \"en\", \"value\": \"CWE-601\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-18262\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-04-30T13:29:00.260\",\"lastModified\":\"2024-11-21T03:19:42.850\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Blackboard Learn (Since at least 17th of October 2017) has allowed Unvalidated Redirects on any signed-in user through its endpoints for handling Shibboleth logins, as demonstrated by a webapps/bb-auth-provider-shibboleth-BBLEARN/execute/shibbolethLogin?returnUrl= URI.\"},{\"lang\":\"es\",\"value\":\"Blackboard Learn (desde, al menos, el 17 de octubre de 2017) ha permitido redirecciones no validadas en cualquier usuario que haya iniciado sesi\u00f3n mediante sus endpoints para gestionar inicios de sesi\u00f3n de Shibboleth. Esto se demuestra por un URI webapps/bb-auth-provider-shibboleth-BBLEARN/execute/shibbolethLogin?returnUrl=.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackboard:blackboard_learn:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.1\",\"matchCriteriaId\":\"30CF5A1E-02A2-4D02-A215-33B458C9DDB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackboard:blackboard_learn:9.1:q2_2016:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E0E9DB-BC5C-4F68-BCBD-9E4EA81D7755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackboard:blackboard_learn:9.1:q2_2017:*:*:*:*:*:*\",\"matchCriteriaId\":\"241DD4F3-BD1C-45AB-9F33-6F795BC87506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackboard:blackboard_learn:9.1:q4_2015:*:*:*:*:*:*\",\"matchCriteriaId\":\"426531EE-872D-4C4A-B4E0-E9AC45EFD4B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackboard:blackboard_learn:9.1:q4_2016:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C800C52-41EA-4707-94F0-56582DED6CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackboard:blackboard_learn:9.1:q4_2017:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D069CC7-307A-466A-B9AB-E76767F7E762\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2018/Apr/57\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1040767\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ethan.pm/blackboard.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2018/Apr/57\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1040767\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ethan.pm/blackboard.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…