Goby/json/Commvault-CVSearchService-A...

69 lines
4.0 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Commvault CVSearchService Authentication Bypass (CVE-2021-34993)",
"Description": "<p>Commvault software is a platform that can be used for data backup and recovery, cloud and infrastructure management.</p><p>There are specific flaws in the Commvault platform CVSearchService service. Attackers can use authentication to bypass the system to read arbitrary files to obtain sensitive information.</p>",
"Product": "Commvault",
"Homepage": "https://www.commvault.com/",
"DisclosureDate": "2021-11-01",
"Author": "1291904552@qq.com",
"FofaQuery": "banner=\"Server: Commvault\" || header=\"Server: Commvault\" || body=\"cvUtil.CONTEXT_PATH = '/webconsole'\"",
"GobyQuery": "banner=\"Server: Commvault\" || header=\"Server: Commvault\" || body=\"cvUtil.CONTEXT_PATH = '/webconsole'\"",
"Level": "2",
"Impact": "<p>There are specific flaws in the Commvault platform CVSearchService service. Attackers can use authentication to bypass the system to read arbitrary files to obtain sensitive information.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://www.commvault.com\">https://www.commvault.com</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "Commvault 平台 CVSearchService 认证绕过CVE-2021-34993",
"VulType": ["权限绕过"],
"Tags": ["权限绕过"],
"Description": "<p>Commvault软件是一个可用于数据备份和恢复云和基础架构管理平台。</p><p>Commvault平台CVSearchService服务中存在特定缺陷。攻击者可以利用绕过系统的身份验证读取任意文件获取敏感信息。</p>",
"Impact": "<p>Commvault平台CVSearchService服务中存在特定缺陷。攻击者可以利用绕过系统的身份验证读取任意文件获取敏感信息。</p>",
"Product": "Commvault",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新:厂商暂未提供修复方案,请关注厂商网站及时更新: <a href=\"https://www.commvault.com\">https://www.commvault.com</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p>"
},
"EN": {
"Name": "Commvault CVSearchService Authentication Bypass (CVE-2021-34993)",
"VulType": ["login-bypass"],
"Tags": ["login-bypass"],
"Description": "<p>Commvault software is a platform that can be used for data backup and recovery, cloud and infrastructure management.</p><p>There are specific flaws in the Commvault platform CVSearchService service. Attackers can use authentication to bypass the system to read arbitrary files to obtain sensitive information.</p>",
"Impact": "<p>There are specific flaws in the Commvault platform CVSearchService service. Attackers can use authentication to bypass the system to read arbitrary files to obtain sensitive information.</p>",
"Product": "Commvault",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://www.commvault.com\">https://www.commvault.com</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>"
}
},
"References": [
"https://fofa.so"
],
"HasExp": true,
"ExpParams": [
{
"name": "filepath",
"type": "input",
"value": "C:/Windows/win.ini"
}
],
"ExpTips": null,
"ScanSteps": null,
"Tags": [
"login-bypass"
],
"VulType": [
"login-bypass"
],
"CVEIDs": [
"CVE-2021-34993"
],
"CVSSScore": "9.8",
"AttackSurfaces": {
"Application": ["Commvault"],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"CNNVD": [
""
],
"CNVD": [
""
]
}