diff --git a/cves/2021/CVE-2021-31602.yaml b/cves/2021/CVE-2021-31602.yaml index 3b8ecf630d..14a0ed5e18 100644 --- a/cves/2021/CVE-2021-31602.yaml +++ b/cves/2021/CVE-2021-31602.yaml @@ -3,7 +3,7 @@ id: CVE-2021-31602 info: name: Pentaho <= 9.1 Authentication Bypass of Spring APIs author: pussycat0x - severity: medium + severity: high reference: - https://seclists.org/fulldisclosure/2021/Nov/13 - https://portswigger.net/daily-swig/remote-code-execution-sql-injection-bugs-uncovered-in-pentaho-business-analytics-software @@ -13,6 +13,11 @@ info: tags: cve,cve2021,pentaho,auth-bypass description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n\n" + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-31602 + cwe-id: CWE-863 requests: - method: GET path: diff --git a/cves/2021/CVE-2021-42237.yaml b/cves/2021/CVE-2021-42237.yaml index 1e8ce1c74c..737556c0de 100644 --- a/cves/2021/CVE-2021-42237.yaml +++ b/cves/2021/CVE-2021-42237.yaml @@ -19,6 +19,11 @@ info: metadata: shodan-query: http.title:"SiteCore" tags: rce,sitecore,deserialization,oast + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-42237 + cwe-id: CWE-502 requests: - raw: