BDU:2022-05999

Vulnerability from fstec - Published: 09.07.2013
VLAI Severity ?
Title
Уязвимость реализации механизма сопоставления действий DefaultActionMapper программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код
Description
Уязвимость реализации механизма сопоставления действий DefaultActionMapper программной платформы Apache Struts связана с недостаточной очисткой входных данных при обработке параметров action:, redirect: и redirectAction: prefix. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольный код
Vendor
Oracle Corp., IBM Corp., Cisco Systems Inc., Apache Software Foundation, Fujitsu Limited
Software Name
WebCenter Sites, Oracle FLEXCUBE Private Banking, MySQL Enterprise Monitor, IBM Call Center for Commerce, Cisco Identity Services Engine, Cisco Unified Contact Center Enterprise, Cisco Media Experience Engine (MXE) 3500 Series, Struts, Interstage Business Process Manager Analytics, Siebel Apps - E-Billing, Cisco Unified SIP Proxy Software, Cisco Packaged Contact Center Enterprise
Software Version
11.1.1.8.0 (WebCenter Sites), 2.2.0.1 (Oracle FLEXCUBE Private Banking), 12.0.1.0 (Oracle FLEXCUBE Private Banking), 11.1.1.6.1 (WebCenter Sites), 1.7 (Oracle FLEXCUBE Private Banking), 2.0 (Oracle FLEXCUBE Private Banking), 2.0.1 (Oracle FLEXCUBE Private Banking), 3.0 (Oracle FLEXCUBE Private Banking), 12.0.2 (Oracle FLEXCUBE Private Banking), до 2.3.14 включительно (MySQL Enterprise Monitor), от 3.0.0 до 3.0.4 включительно (MySQL Enterprise Monitor), 9.5.0 (IBM Call Center for Commerce), 10.0 (IBM Call Center for Commerce), до 1.0.4.573-6 (Cisco Identity Services Engine), от 1.1.0.665 до 1.1.0.665-4 (Cisco Identity Services Engine), от 1.1.1.268 до 1.1.1.268-6 (Cisco Identity Services Engine), от 1.1.2.145 до 1.1.2.145-9 (Cisco Identity Services Engine), от 1.1.3.124 до 1.1.3.124-4 (Cisco Identity Services Engine), от 1.1.4.218 до 1.1.4.218-4 (Cisco Identity Services Engine), от 1.2.0.0 до 1.2.0.899 (Cisco Identity Services Engine), от 10.5 до 10.5(1) (Cisco Unified Contact Center Enterprise), от 8.5(4) до 8.5(4)ES37 (Cisco Unified Contact Center Enterprise), от 9.0(4) до 9.0(4)ES39 (Cisco Unified Contact Center Enterprise), от 9.0(3) до 9.0(3)ES13 (Cisco Unified Contact Center Enterprise), до 3.3.2 (Cisco Media Experience Engine (MXE) 3500 Series), от 2.0.0 до 2.3.15 включительно (Struts), 12.0 (Interstage Business Process Manager Analytics), 12.1 (Interstage Business Process Manager Analytics), 6.1 (Siebel Apps - E-Billing), 6.1.1 (Siebel Apps - E-Billing), 6.2 (Siebel Apps - E-Billing), до 8.5(5) (Cisco Unified SIP Proxy Software), от 10.0(1) до 10.0(1)ES10 (Cisco Unified Contact Center Enterprise), от 10.5 до 10.5(1) (Cisco Packaged Contact Center Enterprise), от 8.5(4) до 8.5(4)ES37 (Cisco Packaged Contact Center Enterprise), от 9.0(4) до 9.0(4)ES39 (Cisco Packaged Contact Center Enterprise), от 9.0(3) до 9.0(3)ES13 (Cisco Packaged Contact Center Enterprise), от 10.0(1) до 10.0(1)ES10 (Cisco Packaged Contact Center Enterprise)
Possible Mitigations
Использование рекомендаций: Для Apache Struts: https://cwiki.apache.org/confluence/display/WW/S2-016 Для программных продуктов IBM: https://www.ibm.com/blogs/psirt/security-bulletin-ibm-call-center-and-apache-struts-struts-upgrade-strategy-various-cves-see-below/ Для программных продуктов Cisco: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 Для программных продуктов Fujitsu: https://www.fujitsu.com/global/support/products/software/security/products-f/interstage-bpm-analytics-201301e.html Для программных продуктов Oracle: https://www.oracle.com/security-alerts/cpujan2014.html https://www.oracle.com/security-alerts/cpujul2015.html
Reference
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-call-center-and-apache-struts-struts-upgrade-strategy-various-cves-see-below/ https://exchange.xforce.ibmcloud.com/vulnerabilities/90392 https://seclists.org/fulldisclosure/2013/Oct/96 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 https://cwiki.apache.org/confluence/display/WW/S2-016 https://www.fujitsu.com/global/support/products/software/security/products-f/interstage-bpm-analytics-201301e.html https://www.oracle.com/security-alerts/cpujan2014.html https://www.oracle.com/security-alerts/cpujul2015.html https://nvd.nist.gov/vuln/detail/CVE-2013-2251 https://www.cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv
CWE
CWE-20

{
  "CVSS 2.0": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
  "CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp., IBM Corp., Cisco Systems Inc., Apache Software Foundation, Fujitsu Limited",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "11.1.1.8.0 (WebCenter Sites), 2.2.0.1 (Oracle FLEXCUBE Private Banking), 12.0.1.0 (Oracle FLEXCUBE Private Banking), 11.1.1.6.1 (WebCenter Sites), 1.7 (Oracle FLEXCUBE Private Banking), 2.0 (Oracle FLEXCUBE Private Banking), 2.0.1 (Oracle FLEXCUBE Private Banking), 3.0 (Oracle FLEXCUBE Private Banking), 12.0.2 (Oracle FLEXCUBE Private Banking), \u0434\u043e 2.3.14 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), \u043e\u0442 3.0.0 \u0434\u043e 3.0.4 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), 9.5.0 (IBM Call Center for Commerce), 10.0 (IBM Call Center for Commerce), \u0434\u043e 1.0.4.573-6 (Cisco Identity Services Engine), \u043e\u0442 1.1.0.665 \u0434\u043e 1.1.0.665-4 (Cisco Identity Services Engine), \u043e\u0442 1.1.1.268 \u0434\u043e 1.1.1.268-6 (Cisco Identity Services Engine), \u043e\u0442 1.1.2.145 \u0434\u043e 1.1.2.145-9 (Cisco Identity Services Engine), \u043e\u0442 1.1.3.124 \u0434\u043e 1.1.3.124-4 (Cisco Identity Services Engine), \u043e\u0442 1.1.4.218 \u0434\u043e 1.1.4.218-4 (Cisco Identity Services Engine), \u043e\u0442 1.2.0.0 \u0434\u043e 1.2.0.899 (Cisco Identity Services Engine), \u043e\u0442 10.5 \u0434\u043e 10.5(1) (Cisco Unified Contact Center Enterprise), \u043e\u0442 8.5(4) \u0434\u043e 8.5(4)ES37 (Cisco Unified Contact Center Enterprise), \u043e\u0442 9.0(4) \u0434\u043e 9.0(4)ES39 (Cisco Unified Contact Center Enterprise), \u043e\u0442 9.0(3) \u0434\u043e 9.0(3)ES13 (Cisco Unified Contact Center Enterprise), \u0434\u043e 3.3.2 (Cisco Media Experience Engine (MXE) 3500 Series), \u043e\u0442 2.0.0 \u0434\u043e 2.3.15 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Struts), 12.0 (Interstage Business Process Manager Analytics), 12.1 (Interstage Business Process Manager Analytics), 6.1 (Siebel Apps - E-Billing), 6.1.1 (Siebel Apps - E-Billing), 6.2 (Siebel Apps - E-Billing), \u0434\u043e 8.5(5) (Cisco Unified SIP Proxy Software), \u043e\u0442 10.0(1) \u0434\u043e 10.0(1)ES10 (Cisco Unified Contact Center Enterprise), \u043e\u0442 10.5 \u0434\u043e 10.5(1) (Cisco Packaged Contact Center Enterprise), \u043e\u0442 8.5(4) \u0434\u043e 8.5(4)ES37 (Cisco Packaged Contact Center Enterprise), \u043e\u0442 9.0(4) \u0434\u043e 9.0(4)ES39 (Cisco Packaged Contact Center Enterprise), \u043e\u0442 9.0(3) \u0434\u043e 9.0(3)ES13 (Cisco Packaged Contact Center Enterprise), \u043e\u0442 10.0(1) \u0434\u043e 10.0(1)ES10 (Cisco Packaged Contact Center Enterprise)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Apache Struts:\nhttps://cwiki.apache.org/confluence/display/WW/S2-016\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 IBM:\nhttps://www.ibm.com/blogs/psirt/security-bulletin-ibm-call-center-and-apache-struts-struts-upgrade-strategy-various-cves-see-below/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Cisco:\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Fujitsu:\nhttps://www.fujitsu.com/global/support/products/software/security/products-f/interstage-bpm-analytics-201301e.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Oracle:\nhttps://www.oracle.com/security-alerts/cpujan2014.html\nhttps://www.oracle.com/security-alerts/cpujul2015.html",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "09.07.2013",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.09.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "30.09.2022",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-05999",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2013-2251",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "WebCenter Sites, Oracle FLEXCUBE Private Banking, MySQL Enterprise Monitor, IBM Call Center for Commerce, Cisco Identity Services Engine, Cisco Unified Contact Center Enterprise, Cisco Media Experience Engine (MXE) 3500 Series, Struts, Interstage Business Process Manager Analytics, Siebel Apps - E-Billing, Cisco Unified SIP Proxy Software, Cisco Packaged Contact Center Enterprise",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u0441\u043e\u043f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 DefaultActionMapper \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Apache Struts, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u0441\u043e\u043f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 DefaultActionMapper \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Apache Struts \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043e\u0447\u0438\u0441\u0442\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432 action:, redirect: \u0438 redirectAction: prefix. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-call-center-and-apache-struts-struts-upgrade-strategy-various-cves-see-below/\nhttps://exchange.xforce.ibmcloud.com/vulnerabilities/90392\nhttps://seclists.org/fulldisclosure/2013/Oct/96\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2\nhttps://cwiki.apache.org/confluence/display/WW/S2-016\nhttps://www.fujitsu.com/global/support/products/software/security/products-f/interstage-bpm-analytics-201301e.html\nhttps://www.oracle.com/security-alerts/cpujan2014.html\nhttps://www.oracle.com/security-alerts/cpujul2015.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-2251\nhttps://www.cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,3)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…