FKIE_CVE-2020-26516
Vulnerability from fkie_nvd - Published: 2021-06-08 13:15 - Updated: 2024-11-21 05:19
Severity ?
Summary
A CSRF issue was discovered in Intland codeBeamer ALM 10.x through 10.1.SP4. Requests sent to the server that trigger actions do not contain a CSRF token and can therefore be entirely predicted allowing attackers to cause the victim's browser to execute undesired actions in the web application through crafted requests.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| intland | codebeamer | 10.0.0 | |
| intland | codebeamer | 10.0.0 | |
| intland | codebeamer | 10.0.0 | |
| intland | codebeamer | 10.0.0 | |
| intland | codebeamer | 10.0.0 | |
| intland | codebeamer | 10.0.1 | |
| intland | codebeamer | 10.1.0 | |
| intland | codebeamer | 10.1.0 | |
| intland | codebeamer | 10.1.0 | |
| intland | codebeamer | 10.1.0 | |
| intland | codebeamer | 10.1.0 | |
| intland | codebeamer | 21.04 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "EE5B0480-89AF-44AE-A9C1-0656627FA777",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:prerelease4:*:*:*:*:*:*",
"matchCriteriaId": "E3C0AE05-0E16-498D-B38D-4104C764CDAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "83F33C62-2D1B-462D-B3D6-FA0BB3EF4BE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "F9DC14C6-92A8-4388-9D8F-AD2C3201AD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "A1D61084-CBE7-464D-BA6A-485627BCB2B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.0.1:sp1:*:*:*:*:*:*",
"matchCriteriaId": "568A8794-36C0-40BE-9867-7D29D77DBC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A0128D1A-DA5B-49EE-ABC2-DA75EF2B5594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "35461BDC-7A06-49AE-A528-DB6A986C9F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "B32DF425-549F-4BEC-A7B6-F66CE063C878",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp3:*:*:*:*:*:*",
"matchCriteriaId": "8166F01E-B271-4491-B932-00BF843D2146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp4:*:*:*:*:*:*",
"matchCriteriaId": "504110BC-FC0C-4A3F-824C-5BF4C573A792",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intland:codebeamer:21.04:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B7C6A7-5FA8-42B8-B83B-0BF908A72E44",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CSRF issue was discovered in Intland codeBeamer ALM 10.x through 10.1.SP4. Requests sent to the server that trigger actions do not contain a CSRF token and can therefore be entirely predicted allowing attackers to cause the victim\u0027s browser to execute undesired actions in the web application through crafted requests."
},
{
"lang": "es",
"value": "Se ha detectado un problema de tipo CSRF en Intland codeBeamer ALM versiones 10.x hasta 10.1.SP4. Las peticiones enviadas al servidor que desencadenan acciones no contienen un token de tipo CSRF y, por lo tanto, pueden predecirse por completo, lo que permite a atacantes causar que el navegador de la v\u00edctima ejecute acciones no deseadas en la aplicaci\u00f3n web mediante peticiones manipuladas"
}
],
"id": "CVE-2020-26516",
"lastModified": "2024-11-21T05:19:58.237",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-08T13:15:07.493",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://intland.com/codebeamer/application-lifecycle-management/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2021-08_CSNC-2020-009-codebeamer_ALM_Missing-CSRF.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://intland.com/codebeamer/application-lifecycle-management/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2021-08_CSNC-2020-009-codebeamer_ALM_Missing-CSRF.txt"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…