Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:gleeztech:gleez_cms:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B8DE79A-3439-4388-A4AF-A92B4F2BC185", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the Gleez CMS 1.2.0 login page could allow an unauthenticated, remote attacker to perform multiple user enumerations, which can further help an attacker to perform login attempts in excess of the configured login attempt limit. The vulnerability is due to insufficient server-side access control and login attempt limit enforcement. An attacker could exploit this vulnerability by sending modified login attempts to the Portal login page. An exploit could allow the attacker to identify existing users and perform brute-force password attacks on the Portal, as demonstrated by navigating to the user/4 URI."}, {"lang": "es", "value": "Una vulnerabilidad en la p\u00e1gina de inicio de sesi\u00f3n de Gleez CMS 1.2.0 podr\u00eda permitir que un atacante remoto no autenticado realice m\u00faltiples enumeraciones de usuario, lo que puede ayudar a un atacante a realizar intentos de inicio de sesi\u00f3n que sobrepasan el l\u00edmite configurado de intentos de inicio de sesi\u00f3n. La vulnerabilidad se debe a un control de acceso insuficiente del lado del servidor y a una aplicaci\u00f3n insuficiente del l\u00edmite de intentos de inicio de sesi\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad enviando intentos modificados de inicio de sesi\u00f3n a la p\u00e1gina de inicio de sesi\u00f3n del portal. Su explotaci\u00f3n podr\u00eda permitir que el atacante identifique a los usuarios existentes y realice ataques de adivinaci\u00f3n de contrase\u00f1a por fuerza bruta en el portal, tal y como queda demostrado navegando hasta el URI user/4."}], "id": "CVE-2018-16703", "lastModified": "2024-11-21T03:53:11.410", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-09-07T17:29:01.020", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/gleez/cms/issues/802"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/gleez/cms/issues/802"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-307"}, {"lang": "en", "value": "CWE-521"}, {"lang": "en", "value": "CWE-732"}], "source": "nvd@nist.gov", "type": "Primary"}]}