Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:elabftw:elabftw:*:*:*:*:*:*:*:*", "matchCriteriaId": "094D67B9-C2BD-426A-9118-5EEBE51AE16E", "versionEndExcluding": "4.2.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "eLabFTW is an electronic lab notebook manager for research teams. In versions prior to 4.2.0 there is a vulnerability which allows any authenticated user to gain access to arbitrary accounts by setting a specially crafted email address. This vulnerability impacts all instances that have not set an explicit email domain name allowlist. Note that whereas neither administrators nor targeted users are notified of a change, an attacker will need to control an account. The default settings require administrators to validate newly created accounts. The problem has been patched. Users should upgrade to at least version 4.2.0. For users unable to upgrade enabling an email domain allow list (from Sysconfig panel, Security tab) will completely resolve the issue."}, {"lang": "es", "value": "eLabFTW es un administrador de cuadernos de laboratorio electr\u00f3nicos para equipos de investigaci\u00f3n. En versiones anteriores a 4.2.0, se presenta una vulnerabilidad que permite a cualquier usuario autenticado conseguir acceso a cuentas arbitrarias mediante la configuraci\u00f3n de una direcci\u00f3n de correo electr\u00f3nico especialmente dise\u00f1ada. Esta vulnerabilidad afecta a todas las instancias que no han configurado una lista expl\u00edcita de nombres de dominio de correo electr\u00f3nico permitidos. Tenga en cuenta que, mientras que ni los administradores ni los usuarios a los que se dirige la aplicaci\u00f3n son notificados de un cambio, un atacante necesitar\u00e1 controlar una cuenta. La configuraci\u00f3n por defecto requiere que los administradores comprueben las cuentas reci\u00e9n creadas. El problema ha sido parcheado. Los usuarios deben actualizar al menos a la versi\u00f3n 4.2.0. Para los usuarios que no puedan actualizar, la habilitaci\u00f3n de una lista de dominios permitidos de correo electr\u00f3nico (desde el panel Sysconfig, pesta\u00f1a Seguridad) resolver\u00e1 completamente el problema"}], "id": "CVE-2021-43833", "lastModified": "2024-11-21T06:29:53.487", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-12-16T00:15:07.447", "references": [{"source": "security-advisories@github.com", "tags": ["Release Notes", "Third Party Advisory"], "url": "https://github.com/elabftw/elabftw/releases/tag/4.2.0"}, {"source": "security-advisories@github.com", "tags": ["Third Party Advisory"], "url": "https://github.com/elabftw/elabftw/security/advisories/GHSA-v659-q2fh-v99w"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Third Party Advisory"], "url": "https://github.com/elabftw/elabftw/releases/tag/4.2.0"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/elabftw/elabftw/security/advisories/GHSA-v659-q2fh-v99w"}], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-287"}], "source": "security-advisories@github.com", "type": "Secondary"}]}