Show plain JSON{"id": "CVE-2020-13650", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2020-06-15T19:15:09.980", "references": [{"url": "https://know.bishopfox.com/advisories/digdash-version-2018", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://know.bishopfox.com/advisories/digdash-version-2018", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-918"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in DigDash 2018R2 before p20200210 and 2019R1 before p20200210. The login page is vulnerable to Server-Side Request Forgery (SSRF) that allows use of the application as a proxy. Sent to an external server, a forged request discloses application credentials. For a request to an internal component, the request is blind, but through the error message it's possible to determine whether the request targeted a open service."}, {"lang": "es", "value": "Se detect\u00f3 un problema en DigDash versiones 2018R2 anteriores a p20200210 y versiones 2019R1 anteriores a p20200210. La p\u00e1gina de inicio de sesi\u00f3n es vulnerable a un ataque de tipo Server-Side Request Forgery (SSRF), que permite el uso de la aplicaci\u00f3n como un proxy. Enviar hacia un servidor externo, una petici\u00f3n falsificada revela las credenciales de la aplicaci\u00f3n. Para una petici\u00f3n en un componente interno, la petici\u00f3n es ciega, pero por medio del mensaje de error es posible determinar si la petici\u00f3n se dirigi\u00f3 a un servicio abierto"}], "lastModified": "2024-11-21T05:01:40.773", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:digdash:digdash:2018r2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C915628-1A66-4FAB-AF2E-60B7E116D9EF"}, {"criteria": "cpe:2.3:a:digdash:digdash:2019r1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFD00F91-55B8-4779-A25E-1103247C38EA"}, {"criteria": "cpe:2.3:a:digdash:digdash:2019r2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E59A6E14-D7E8-4E0D-91E6-5DCB4C2CC7C8"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}