Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:archibus:web_central:21.3.3.815:*:*:*:*:*:*:*", "matchCriteriaId": "99192A58-5724-427F-8824-3A1F5BE350C5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["unsupported-when-assigned"]}], "descriptions": [{"lang": "en", "value": "ARCHIBUS Web Central 21.3.3.815 (a version from 2014) does not properly validate requests for access to data and functionality in these affected endpoints: /archibus/schema/ab-edit-users.axvw, /archibus/schema/ab-data-dictionary-table.axvw, /archibus/schema/ab-schema-add-field.axvw, /archibus/schema/ab-core/views/process-navigator/ab-my-user-profile.axvw. By not verifying the permissions for access to resources, it allows a potential attacker to view pages that are not allowed. Specifically, it was found that any authenticated user can reach the administrative console for user management by directly requesting access to the page via URL. This allows a malicious user to modify all users' profiles, to elevate any privileges to administrative ones, or to create or delete any type of user. It is also possible to modify the emails of other users, through a misconfiguration of the username parameter, on the user profile page. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020"}, {"lang": "es", "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** ARCHIBUS Web Central 21.3.3.815 (una versi\u00f3n de 2014) no valida correctamente las solicitudes de acceso a los datos y la funcionalidad en estos puntos finales afectados: /archibus/schema/ab-edit-users.axvw, /archibus/schema/ab-data-dictionary-table.axvw, /archibus/schema/ab-schema-add-field.axvw, /archibus/schema/ab-core/views/process-navigator/ab-my-user-profile.axvw. Al no verificar los permisos de acceso a los recursos, permite a un potencial atacante ver p\u00e1ginas no permitidas. En concreto, se ha detectado que cualquier usuario autentificado puede llegar a la consola administrativa de gesti\u00f3n de usuarios solicitando directamente el acceso a la p\u00e1gina a trav\u00e9s de la URL. Esto permite a un usuario malicioso modificar los perfiles de todos los usuarios, elevar cualquier privilegio a administrativo o crear o eliminar cualquier tipo de usuario. Tambi\u00e9n es posible modificar los correos electr\u00f3nicos de otros usuarios, a trav\u00e9s de una mala configuraci\u00f3n del par\u00e1metro nombre de usuario, en la p\u00e1gina de perfil de usuario. Esto est\u00e1 solucionado en todas las versiones recientes, como la versi\u00f3n 26. NOTA: Esta vulnerabilidad s\u00f3lo afecta a los productos que ya no est\u00e1n soportados por el mantenedor. La versi\u00f3n 21.3 dej\u00f3 de recibir soporte oficialmente a finales de 2020."}], "id": "CVE-2021-41554", "lastModified": "2024-11-21T06:26:24.523", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-10-05T15:15:07.850", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.gruppotim.it/redteam"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.gruppotim.it/redteam"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-862"}], "source": "nvd@nist.gov", "type": "Primary"}]}