Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:code42:code42:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "11E3DFF6-4747-44D2-A037-F044E5BF5F4A", "versionEndIncluding": "6.8.4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "In Code42 for Enterprise through 6.8.4, an administrator without web restore permission but with the ability to manage users in an organization can impersonate a user with web restore permission. When requesting the token to do a web restore, an administrator with permission to manage a user could request the token of that user. If the administrator was not authorized to perform web restores but the user was authorized to perform web restores, this would allow the administrator to impersonate the user with greater permissions. In order to exploit this vulnerability, the user would have to be an administrator with access to manage an organization with a user with greater permissions than themselves."}, {"lang": "es", "value": "En Code42 para Enterprise hasta la versi\u00f3n 6.8.4, un administrador sin permiso de restauraci\u00f3n web pero con la capacidad de administrar usuarios en una organizaci\u00f3n puede hacerse pasar por un usuario con permiso de restauraci\u00f3n web. Al solicitar que el token realice una restauraci\u00f3n web, un administrador con permiso para administrar un usuario puede solicitar el token de ese usuario. Si el administrador no estaba autorizado para realizar restauraciones web, pero el usuario estaba autorizado para realizar restauraciones web, esto permitir\u00eda al administrador suplantar al usuario con mayores permisos. Para aprovechar esta vulnerabilidad, el usuario tendr\u00eda que ser un administrador con acceso para administrar una organizaci\u00f3n con un usuario con m\u00e1s permisos que ellos."}], "id": "CVE-2019-11553", "lastModified": "2024-11-21T04:21:20.127", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-07-19T17:15:11.957", "references": [{"source": "cve@mitre.org", "url": "https://code42.com/r/support/CVE-2019-11553"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code42.com/r/support/CVE-2019-11553"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-269"}], "source": "nvd@nist.gov", "type": "Primary"}]}