Vulnerability Name: | CVE-2014-1682 (CCN-90947) |
Assigned: | 2014-01-30 |
Published: | 2014-01-30 |
Updated: | 2014-05-09 |
Summary: | The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N) 3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): Single_Instance | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None |
|
Vulnerability Type: | CWE-287
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2014-1682
Source: FEDORA Type: UNKNOWN FEDORA-2014-5551
Source: FEDORA Type: UNKNOWN FEDORA-2014-5540
Source: CCN Type: SA55099 Zabbix API User Spoofing Vulnerability
Source: BID Type: UNKNOWN 65402
Source: CCN Type: BID-65402 Zabbix User Spoofing Vulnerability
Source: XF Type: UNKNOWN zabbix-cve20141682-spoofing(90947)
Source: CCN Type: ZBX-7703 Security flaw with API access when using HTTP authentication
Source: CONFIRM Type: UNKNOWN https://support.zabbix.com/browse/ZBX-7703
Source: CCN Type: WhiteSource Vulnerability Database CVE-2014-1682
|
Vulnerable Configuration: | Configuration 1: cpe:/a:zabbix:zabbix:1.8:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:1.8.15:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:1.8.16:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:1.8.18:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:*:*:*:*:*:*:*:* (Version <= 1.8.19)OR cpe:/a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.2.0:-:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.2.1:-:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:19:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:20:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:zabbix:zabbix:1.8.19:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*OR cpe:/a:zabbix:zabbix:2.2.1:-:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |