Show plain JSON{"id": "CVE-2013-4228", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "authentication": "SINGLE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 2.8}]}, "published": "2020-02-18T19:15:11.910", "references": [{"url": "http://www.openwall.com/lists/oss-security/2013/08/10/1", "tags": ["Mailing List", "Third Party Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/61708", "tags": ["Third Party Advisory", "VDB Entry"], "source": "secalert@redhat.com"}, {"url": "https://drupal.org/node/2059755", "tags": ["Release Notes", "Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "https://drupal.org/node/2059765", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86328", "tags": ["VDB Entry", "Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2013/08/10/1", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/61708", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://drupal.org/node/2059755", "tags": ["Release Notes", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://drupal.org/node/2059765", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86328", "tags": ["VDB Entry", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-863"}]}], "descriptions": [{"lang": "en", "value": "The OG access fields (visibility fields) implementation in Organic Groups (OG) module 7.x-2.x before 7.x-2.3 for Drupal does not properly restrict access to private groups, which allows remote authenticated users to guess node IDs, subscribe to, and read the content of arbitrary private groups via unspecified vectors."}, {"lang": "es", "value": "La implementaci\u00f3n de los campos de acceso OG (campos de visibilidad) en el m\u00f3dulo de Organic Groups (OG) versiones 7.x-2.x anteriores a 7.x-2.3 para Drupal, no restringe el acceso apropiadamente a grupos privados, lo que permite a usuarios autenticados remotos adivinar los ID de nodo, suscribirse a y leer el contenido de grupos privados arbitrarios por medio de vectores no especificados."}], "lastModified": "2024-11-21T01:55:10.293", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:-:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "AF72996D-7ABE-4F85-ABC8-5D0FA973845A"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:alpha1:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "757C478D-3E62-4992-8A78-AD4309955400"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:alpha2:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "CF2D03A8-8844-467D-AFB2-F4EDA35EBFF3"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:alpha3:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "1CE40904-4E21-44A0-8EF8-AAF0E7B5726C"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:beta1:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "31A865F3-7276-4D4F-A238-1F2A99078DA9"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:beta2:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "BF15DDBA-F639-4DEC-804B-8B998C2E906B"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:beta3:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "A990C458-AD98-4B69-A27A-A13EDC35D9FB"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:beta4:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "61CA452F-691C-4D5A-8391-827853BA7859"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:rc1:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "E52E67B3-9594-4513-9707-03A49ACD6356"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:rc2:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "ABA5E86F-070A-4CDC-AE59-0A56B611CF11"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:rc3:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "2B0F3805-C347-4799-98D4-45B8131FA4BC"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.0:rc4:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "D0D4979C-61EF-4542-B7C1-186B2BD8F03B"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.1:*:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "CA1513EB-F578-4EB9-B117-BC941E204F13"}, {"criteria": "cpe:2.3:a:organic_groups_project:organic_groups:7.x-2.2:*:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "02206421-1BEA-4E36-83EF-E56B28A94DA3"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}