Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:oneidentity:password_manager:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "5748FA10-B6EE-4F49-B612-55A08CCD5907", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in One Identity Password Manager 5.8. An attacker could enumerate valid answers for a user. It is possible for an attacker to detect a valid answer based on the HTTP response content, and reuse this answer later for a password reset on a chosen password. The enumeration is possible because, within the HTTP response content, WRONG ID is only returned when the answer is incorrect."}, {"lang": "es", "value": "Se detect\u00f3 un problema en One Identity Password Manager versi\u00f3n 5.8. Un atacante podr\u00eda enumerar respuestas v\u00e1lidas para un usuario. Es posible para un atacante detectar una respuesta v\u00e1lida basada en el contenido de la respuesta HTTP y reutilizar esta respuesta m\u00e1s tarde para restablecer la contrase\u00f1a de una contrase\u00f1a elegida. La enumeraci\u00f3n es posible porque, dentro del contenido de la respuesta HTTP, un WRONG ID es solo devuelto cuando la respuesta es incorrecta"}], "id": "CVE-2020-7962", "lastModified": "2024-11-21T05:38:05.957", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-11-13T19:15:12.173", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://cxsecurity.com/issue/WLB-2020050185"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://cxsecurity.com/issue/WLB-2020050185"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-203"}], "source": "nvd@nist.gov", "type": "Primary"}]}