Show plain JSON{"id": "CVE-2020-21994", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2021-04-28T15:15:07.917", "references": [{"url": "https://cwe.mitre.org/data/definitions/522.html", "tags": ["Technical Description"], "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/47819", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5550.php", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://cwe.mitre.org/data/definitions/522.html", "tags": ["Technical Description"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/47819", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5550.php", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-522"}]}], "descriptions": [{"lang": "en", "value": "AVE DOMINAplus <=1.10.x suffers from clear-text credentials disclosure vulnerability that allows an unauthenticated attacker to issue a request to an unprotected directory that hosts an XML file '/xml/authClients.xml' and obtain administrative login information that allows for a successful authentication bypass attack."}, {"lang": "es", "value": "AVE DOMINAplus versiones anteriores a 1.10.x incluy\u00e9ndola, sufre una vulnerabilidad de divulgaci\u00f3n de credenciales de texto plano que permite a un atacante no autenticado enviar una petici\u00f3n hacia un directorio desprotegido que aloja un archivo XML \"/xml/authClients.xml\" y obtener informaci\u00f3n de inicio de sesi\u00f3n administrativa que permite una ataque de omisi\u00f3n de autenticaci\u00f3n con \u00e9xito"}], "lastModified": "2024-11-21T05:12:59.207", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ave:dominaplus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3B569E4-349B-4FE1-B430-B313A019E028", "versionEndIncluding": "1.10.77", "versionStartIncluding": "1.10.11"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ave:53ab-wbs_firmware:1.10.62:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51CC92CB-942B-4BE1-BEFE-57A71DAF7D50"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ave:53ab-wbs:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "171FD211-CB91-4123-99F4-12C19D68EEAF"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ave:ts01_firmware:1.0.65:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AE9FCB9-DE6F-44B1-9433-02D7CDF88DA5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ave:ts01:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "064E7673-1221-4142-A57F-001EDBAAEB6C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ave:ts03x-v_firmware:1.10.45a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F31ABD8E-0CF3-4CE3-B8EF-8C46A7353457"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ave:ts03x-v:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B20A9921-50C8-4954-A8B4-B43D32678695"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ave:ts04x-v_firmware:1.10.45a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B777067-9710-4D28-9A5B-F0A4FF7D09AA"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ave:ts04x-v:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "88A2B318-3DA2-491B-9A6C-BAEC0E10D185"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ave:ts05_firmware:1.10.36:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7636D17E-6E48-409B-82BC-1E9C00B426F0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ave:ts05:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "42DDCD50-D9C6-4515-8AFD-0FAD983D00C0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ave:ts05n-v_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8F9D39B-6F67-47EF-BB2C-86FBCD84D76C"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ave:ts05n-v:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "73DFB4EC-EB30-4041-AB29-4000D5E2B29A"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}