Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j98g-g34p-r4ch

Опубликовано: 28 июн. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 4.3

Описание

A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials. This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels.

A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials. This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels.

EPSS

Процентиль: 28%
0.001
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-269
CWE-648

Связанные уязвимости

CVSS3: 4.3
nvd
больше 2 лет назад

A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials. This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels.

CVSS3: 4.3
fstec
больше 3 лет назад

Уязвимость интерфейса OpenAPI средства защиты рабочих нагрузок мультиоблачных центров обработки данных Cisco Secure Workload (ранее Tetration), позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 28%
0.001
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-269
CWE-648