| Title | Pleasant Password Server における認可に関する脆弱性 |
|---|---|
| Summary | Pleasant Password Server には、認可に関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される、および情報を改ざんされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Dec. 19, 2017, midnight |
| Registration Date | Nov. 5, 2018, 5:04 p.m. |
| Last Update | Nov. 5, 2018, 5:04 p.m. |
| CVSS3.0 : 重要 | |
| Score | 8.1 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
| CVSS2.0 : 警告 | |
| Score | 6.5 |
|---|---|
| Vector | AV:N/AC:L/Au:S/C:P/I:P/A:P |
| Pleasant Solutions |
| Pleasant Password Server 7.8.3 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年11月05日] 掲載 |
Nov. 5, 2018, 5:04 p.m. |
| Summary | Due to missing authorization checks, any authenticated user is able to list, upload, or delete attachments to password safe entries in Pleasant Password Server before 7.8.3. To perform those actions on an entry, the user needs to know the corresponding "CredentialId" value, which uniquely identifies a password safe entry. Since "CredentialId" values are implemented as GUIDs, they are hard to guess. However, if for example an entry's owner grants read-only access to a malicious user, the value gets exposed to the malicious user. The same holds true for temporary grants. |
|---|---|
| Publication Date | July 31, 2018, 11:29 p.m. |
| Registration Date | Jan. 26, 2021, 1:19 p.m. |
| Last Update | Nov. 21, 2024, 12:18 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:pleasantsolutions:pleasant_password_server:*:*:*:*:*:*:*:* | 7.8.3 | ||||