Show plain JSON{"id": "CVE-2020-11710", "cveTags": [{"tags": ["disputed"], "sourceIdentifier": "cve@mitre.org"}], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2020-04-12T17:15:10.737", "references": [{"url": "https://github.com/Kong/docker-kong/commit/dfa095cadf7e8309155be51982d8720daf32e31c", "tags": ["Patch", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611", "tags": ["Patch", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949", "source": "cve@mitre.org"}, {"url": "https://github.com/Kong/kong", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/Kong/docker-kong/commit/dfa095cadf7e8309155be51982d8720daf32e31c", "tags": ["Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611", "tags": ["Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/Kong/kong", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in docker-kong (for Kong) through 2.0.3. The admin API port may be accessible on interfaces other than 127.0.0.1. NOTE: The vendor argue that this CVE is not a vulnerability because it has an inaccurate bug scope and patch links. \u201c1) Inaccurate Bug Scope - The issue scope was on Kong's docker-compose template, and not Kong's docker image itself. In reality, this issue is not associated with any version of the Kong gateway. As such, the description stating \u2018An issue was discovered in docker-kong (for Kong) through 2.0.3.\u2019 is incorrect. This issue only occurs if a user decided to spin up Kong via docker-compose without following the security documentation. The docker-compose template is meant for users to quickly get started with Kong, and is meant for development purposes only. 2) Incorrect Patch Links - The CVE currently points to a documentation improvement as a \u201cPatch\u201d link: https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611.This link actually points to an improvement Kong Inc made for fool-proofing. However, instructions for how to protect the admin API were already well-documented here: https://docs.konghq.com/2.0.x/secure-admin-api/#network-layer-access-restrictions , which was first published back in 2017 (as shown in this commit: https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949) Lastly, the hyperlink to https://github.com/Kong/kong (an unrelated Github Repo to this issue) on the Hyperlink list does not include any meaningful information on this topic."}, {"lang": "es", "value": "** EN DISPUTA ** Se descubri\u00f3 un problema en docker-kong (para Kong) hasta la versi\u00f3n 2.0.3. El puerto API de administrador puede ser accesible en interfaces que no sean 127.0.0.1. NOTA: El proveedor argumenta que este CVE no es una vulnerabilidad porque tiene un alcance de error y enlaces de parche imprecisos. \u201c1) Alcance de error inexacto: el alcance del problema estaba en la plantilla de compilaci\u00f3n de acoplador de Kong, y no en la imagen de acoplador de Kong en s\u00ed. En realidad, este problema no est\u00e1 asociado con ninguna versi\u00f3n de la puerta de enlace Kong. Como tal, la descripci\u00f3n que indica \"Se descubri\u00f3 un problema en docker-kong (para Kong) a trav\u00e9s de 2.0.3.\" Es incorrecta. Este problema solo ocurre si un usuario decidi\u00f3 girar Kong a trav\u00e9s de Docker-compose sin seguir la documentaci\u00f3n de seguridad. La plantilla Docker-compose est\u00e1 dise\u00f1ada para que los usuarios comiencen r\u00e1pidamente con Kong, y solo para fines de desarrollo. 2) Enlaces de parches incorrectos: el CVE actualmente apunta a una mejora de la documentaci\u00f3n como un enlace de \"Parche\": https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611 Este enlace en realidad apunta a una mejora que Kong Inc hizo para la prueba de tontos. Sin embargo, las instrucciones sobre c\u00f3mo proteger la API de administraci\u00f3n ya estaban bien documentadas aqu\u00ed: https://docs.konghq.com/2.0.x/secure-admin-api/#network-layer-access-restrictions, que se public\u00f3 por primera vez en 2017 (como se muestra en esta confirmaci\u00f3n: https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949) Por \u00faltimo, el hiperv\u00ednculo a https://github.com/Kong/kong (un repositorio de Github no relacionado con este problema) en la lista de hiperv\u00ednculos no incluye ninguna informaci\u00f3n significativa sobre este tema \"."}], "lastModified": "2024-11-21T04:58:27.307", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:konghq:docker-kong:*:*:*:*:*:kong:*:*", "vulnerable": true, "matchCriteriaId": "7410A9B7-24FE-417D-8FEA-E9B4EF3F6352", "versionEndIncluding": "2.0.3"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}