FKIE_CVE-2019-3768
Vulnerability from fkie_nvd - Published: 2020-01-03 23:15 - Updated: 2024-11-21 04:42
Severity ?
Summary
RSA Authentication Manager versions prior to 8.4 P7 contain an XML Entity Injection Vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to cause information disclosure of local system files by supplying specially crafted XML message.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| emc | rsa_authentication_manager | * | |
| emc | rsa_authentication_manager | 8.4 | |
| emc | rsa_authentication_manager | 8.4 | |
| emc | rsa_authentication_manager | 8.4 | |
| emc | rsa_authentication_manager | 8.4 | |
| emc | rsa_authentication_manager | 8.4 | |
| emc | rsa_authentication_manager | 8.4 | |
| emc | rsa_authentication_manager | 8.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "80B64419-BB7A-4DE7-B563-8C5B93CEEF89",
"versionEndExcluding": "8.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:-:*:*:*:*:*:*",
"matchCriteriaId": "EF61F8BF-7483-4A81-9219-EE2465D48182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p1:*:*:*:*:*:*",
"matchCriteriaId": "08F52AB3-9C6A-467B-82F9-527956CD7A14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p2:*:*:*:*:*:*",
"matchCriteriaId": "968CDDC6-703C-44C4-8ACE-EAB208364B0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p3:*:*:*:*:*:*",
"matchCriteriaId": "E450B2C9-FAE5-4450-85D3-7243A1FF3CF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p4:*:*:*:*:*:*",
"matchCriteriaId": "F13BB0FC-951C-42EA-AA63-FF940C5ABCF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p5:*:*:*:*:*:*",
"matchCriteriaId": "478214DC-9A4C-4411-B297-0A4E0B318E15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p6:*:*:*:*:*:*",
"matchCriteriaId": "45596D96-AC9F-49DC-9AB1-EE979909745A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RSA Authentication Manager versions prior to 8.4 P7 contain an XML Entity Injection Vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to cause information disclosure of local system files by supplying specially crafted XML message."
},
{
"lang": "es",
"value": "RSA Authentication Manager versiones anteriores a la versi\u00f3n 8.4 P7, contienen una vulnerabilidad de tipo XML Entity Injection. Un usuario malicioso autenticado remoto podr\u00eda explotar esta vulnerabilidad para causar una divulgaci\u00f3n de informaci\u00f3n de archivos del sistema local mediante el suministro de un mensaje XML especialmente dise\u00f1ado."
}
],
"id": "CVE-2019-3768",
"lastModified": "2024-11-21T04:42:29.640",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "security_alert@emc.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-01-03T23:15:12.273",
"references": [
{
"source": "security_alert@emc.com",
"url": "https://www.dell.com/support/security/en-us/details/DOC-108320/DSA-2019-148-RSA\u0026#174%3B-Authentication-Manager-Software-XML-Entity-Injection-Vulnerability"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.dell.com/support/security/en-us/details/DOC-108320/DSA-2019-148-RSA\u0026#174%3B-Authentication-Manager-Software-XML-Entity-Injection-Vulnerability"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…