Auto Generated CVE annotations [Wed Nov 10 16:04:38 UTC 2021] 🤖

patch-1
GitHub Action 2021-11-10 16:04:38 +00:00
parent 33fccd20b3
commit 2cfad99d03
2 changed files with 11 additions and 1 deletions

View File

@ -3,7 +3,7 @@ id: CVE-2021-31602
info:
name: Pentaho <= 9.1 Authentication Bypass of Spring APIs
author: pussycat0x
severity: medium
severity: high
reference:
- https://seclists.org/fulldisclosure/2021/Nov/13
- https://portswigger.net/daily-swig/remote-code-execution-sql-injection-bugs-uncovered-in-pentaho-business-analytics-software
@ -13,6 +13,11 @@ info:
tags: cve,cve2021,pentaho,auth-bypass
description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n\n"
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.50
cve-id: CVE-2021-31602
cwe-id: CWE-863
requests:
- method: GET
path:

View File

@ -19,6 +19,11 @@ info:
metadata:
shodan-query: http.title:"SiteCore"
tags: rce,sitecore,deserialization,oast
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80
cve-id: CVE-2021-42237
cwe-id: CWE-502
requests:
- raw: