Show plain JSON{"id": "CVE-2016-9885", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": true, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2017-01-06T22:59:00.390", "references": [{"url": "http://www.securityfocus.com/bid/95270", "source": "security_alert@emc.com"}, {"url": "https://pivotal.io/security/cve-2016-9885", "tags": ["Vendor Advisory"], "source": "security_alert@emc.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-200"}, {"lang": "en", "value": "CWE-254"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1. The gfsh (Geode Shell) endpoint, used by operators and application developers to connect to their cluster, is unauthenticated and publicly accessible. Because HTTPS communications are terminated at the gorouter, communications from the gorouter to GemFire clusters are unencrypted. An attacker could run any command available on gfsh and could cause denial of service, lost confidentiality of data, escalate privileges, or eavesdrop on other communications between the gorouter and the cluster."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en Pivotal GemFire para PCF 1.6.x versiones previas a 1.6.5 y 1.7.x versiones previas a 1.7.1. El punto final gfsh (Geode Shell), utilizado por operadores y desarrolladores de aplicaciones para conectar a su cluster, no est\u00e1 autenticado y es p\u00fablicamente accesible. Debido a que las comunicaciones HTTPS terminan en el gorouter, las comunicaciones desde el gorouter a los clusters GemFire no est\u00e1n cifradas. Un atacante podr\u00eda ejecutar cualquier comando disponible en gfsh y podr\u00eda provocar denegaci\u00f3n de servicio, p\u00e9rdida de la confidencialidad de los datos, escalar privilegios o escuchar otras comunicaciones entre el gorouter y el cluster."}], "lastModified": "2017-01-11T02:59:12.717", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD909621-396B-4DBA-9BBF-E7624F021DD1"}, {"criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF873DE7-FB88-4843-A30C-D19DE457AA9E"}, {"criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E53629D-345C-4F47-9B3C-7E06C92F41A8"}, {"criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.6.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6830AC00-0645-47E1-A6C8-4CDFFB3FEDFF"}, {"criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.6.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8EEFAC4-E1E7-4B64-8C52-0596F130E8F3"}, {"criteria": "cpe:2.3:a:pivotal_software:gemfire_for_pivotal_cloud_foundry:1.7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94B36355-047D-410F-9B41-927CCD95B2C9"}], "operator": "OR"}]}], "sourceIdentifier": "security_alert@emc.com"}