From a8683c1bb971017cea97434157cea637d8fb78e9 Mon Sep 17 00:00:00 2001 From: Neriberto CP Date: Mon, 28 Aug 2023 13:28:41 -0300 Subject: [PATCH] Update exposed-redis.yaml This suggests a CWE classification --- network/exposures/exposed-redis.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/network/exposures/exposed-redis.yaml b/network/exposures/exposed-redis.yaml index 05a0989c93..bf0d983473 100644 --- a/network/exposures/exposed-redis.yaml +++ b/network/exposures/exposed-redis.yaml @@ -7,6 +7,10 @@ info: description: Redis server without any required authentication was discovered. reference: - https://redis.io/topics/security + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N + cvss-score: 7.2 + cwe-id: CWE-306 metadata: max-request: 4 tags: network,redis,unauth,exposure