Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF4492E6-23CD-4162-94F8-B47A64123978", "versionEndIncluding": "10.9.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "90CBB0DC-9216-4224-B1C7-B852990FE2FF", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:rolling_patch1:*:*:*:*:*:*", "matchCriteriaId": "D13600BB-D45D-4EE0-BE08-C9AB9778E42C", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:rolling_patch2:*:*:*:*:*:*", "matchCriteriaId": "12B7F68D-7F6F-4305-BDD2-2B3F6FBF12EE", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:rolling_patch3:*:*:*:*:*:*", "matchCriteriaId": "7FCF41C7-62BC-4DF4-8A38-4E727E492CEF", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:rolling_patch4:*:*:*:*:*:*", "matchCriteriaId": "65AD3824-ABE8-4FD2-B201-C11E7D11E938", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:rolling_patch5:*:*:*:*:*:*", "matchCriteriaId": "1AFAE25F-DF7D-45EE-91DE-3A07F4D5625D", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "6E2CC054-2FC3-4C68-A3AB-411382CD1332", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.11.0:rolling_patch1:*:*:*:*:*:*", "matchCriteriaId": "ABD3BDF2-39B2-4C5C-A647-406142363632", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.11.0:rolling_patch2:*:*:*:*:*:*", "matchCriteriaId": "88FF116A-5E98-402D-901D-F4A91006722B", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.11.0:rolling_patch3:*:*:*:*:*:*", "matchCriteriaId": "0748ECB6-DCD1-4B49-A0A8-E0ABFC5F1EAD", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.11.0:rolling_patch4:*:*:*:*:*:*", "matchCriteriaId": "734CD590-7B5E-4067-BDB1-A3780812B619", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.11.0:rolling_patch5:*:*:*:*:*:*", "matchCriteriaId": "2ABFF915-CB4B-4AE9-87BE-C3FF6E846BB5", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "33335E33-AAE8-4DAB-85B7-6B376993EC2C", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.12.0:rolling_patch1:*:*:*:*:*:*", "matchCriteriaId": "50F4279F-C878-4684-9DA7-0C9FDE213D6A", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.12.0:rolling_patch2:*:*:*:*:*:*", "matchCriteriaId": "954AD540-BAB0-4F96-B123-1E4D408CDB49", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Improper access control in Citrix XenMobile Server 10.12 before RP3, Citrix XenMobile Server 10.11 before RP6, Citrix XenMobile Server 10.10 RP6 and Citrix XenMobile Server before 10.9 RP5 allows access to privileged functionality."}, {"lang": "es", "value": "Un control de acceso inapropiado en Citrix XenMobile Server versiones 10.12 anteriores a RP3, Citrix XenMobile Server versiones 10.11 anteriores a RP6, Citrix XenMobile Server versi\u00f3n 10.10 RP6 y Citrix XenMobile Server versiones anteriores a 10.9 RP5, permite acceso a funcionalidades privilegiadas."}], "id": "CVE-2020-8212", "lastModified": "2024-11-21T05:38:30.857", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-08-17T16:15:13.547", "references": [{"source": "support@hackerone.com", "tags": ["Patch", "Vendor Advisory"], "url": "https://support.citrix.com/article/CTX277457"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://support.citrix.com/article/CTX277457"}], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-749"}], "source": "support@hackerone.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-863"}], "source": "nvd@nist.gov", "type": "Primary"}]}