Show plain JSON{"id": "CVE-2020-11094", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}, {"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "REQUIRED", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 4.0, "exploitabilityScore": 1.6}]}, "published": "2020-06-04T00:15:10.817", "references": [{"url": "https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18", "tags": ["Patch", "Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/rainlab/debugbar-plugin/security/advisories/GHSA-c8wh-6jw4-2h79", "tags": ["Patch", "Third Party Advisory"], "source": "security-advisories@github.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-532"}]}, {"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-532"}]}], "descriptions": [{"lang": "en", "value": "The October CMS debugbar plugin before version 3.1.0 contains a feature where it will log all requests (and all information pertaining to each request including session data) whenever it is enabled. This presents a problem if the plugin is ever enabled on a system that is open to untrusted users as the potential exists for them to use this feature to view all requests being made to the application and obtain sensitive information from those requests. There even exists the potential for account takeovers of authenticated users by non-authenticated public users, which would then lead to a number of other potential issues as an attacker could theoretically get full access to the system if the required conditions existed. Issue has been patched in v3.1.0 by locking down access to the debugbar to all users; it now requires an authenticated backend user with a specifically enabled permission before it is even usable, and the feature that allows access to stored request information is restricted behind a different permission that's more restrictive."}, {"lang": "es", "value": "El plugin debugbar de October CMS versiones anteriores a 3.1.0, contiene una funcionalidad donde registrar\u00e1 todas las peticiones (y toda la informaci\u00f3n relacionada con cada petici\u00f3n, incluidos los datos de la sesi\u00f3n) siempre que est\u00e9 habilitada. Esto presenta un problema si el plugin alguna vez est\u00e1 habilitado en un sistema que est\u00e1 abierto a usuarios no confiables, ya que se presenta la posibilidad de que usen esta funcionalidad para visualizar todas las peticiones que se realizan a la aplicaci\u00f3n y obtener informaci\u00f3n confidencial de esas peticiones. Incluso se presenta la posibilidad de que los usuarios p\u00fablicos no autenticados tomen cuentas de usuarios autenticados, lo que conllevar\u00eda a una serie de problemas adicionales potenciales, ya que a un atacante te\u00f3ricamente podr\u00eda obtener acceso completo al sistema que se presentaran las condiciones requeridas. El problema se ha parcheado en la versi\u00f3n v3.1.0 al bloquear el acceso a debugbar para todos los usuarios; ahora requiere un usuario del backend autenticado con un permiso espec\u00edficamente habilitado antes a que sea incluso utilizable, y la funcionalidad que permite el acceso a la informaci\u00f3n de petici\u00f3n almacenada est\u00e1 restringida detr\u00e1s de un permiso diferente que es m\u00e1s restrictivo"}], "lastModified": "2020-06-10T13:53:57.647", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:octobercms:debugbar:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D9BDD9F-0EFF-4A7B-85B9-828994F14A70", "versionEndExcluding": "3.1.0"}], "operator": "OR"}]}], "sourceIdentifier": "security-advisories@github.com"}