Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "4E0BF886-B732-4210-82AA-4D2B3F77132B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_10_interim_fix_3:*:*:*:*:*:*", "matchCriteriaId": "2D00AC8D-4E35-49F4-B0EE-C03E1EE67B8E", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_10_interim_fix_4:*:*:*:*:*:*", "matchCriteriaId": "0FBD1792-01BA-402A-859E-531F7614C9A2", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_10_interim_fix_5:*:*:*:*:*:*", "matchCriteriaId": "DB652BE0-5767-4D42-A618-1315243A5C52", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8:*:*:*:*:*:*", "matchCriteriaId": "F3D799A2-AC87-43E8-A6A2-E76E1535A7C4", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8_interim_fix_1:*:*:*:*:*:*", "matchCriteriaId": "9C9A93C4-70E8-472D-A038-14F72780E02F", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8_interim_fix_2:*:*:*:*:*:*", "matchCriteriaId": "442C02A0-0232-488A-8A66-62386FFBC807", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8_interim_fix_3:*:*:*:*:*:*", "matchCriteriaId": "A349B3BD-CB3D-4290-BE9E-8FFA68C3512B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_3:*:*:*:*:*:*", "matchCriteriaId": "9F8486D8-494D-45B0-8447-F1EDB8C2F8A5", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_4:*:*:*:*:*:*", "matchCriteriaId": "19CC1B88-ED3D-4AD0-8B06-C75D198E1BB3", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_5:*:*:*:*:*:*", "matchCriteriaId": "C76546DF-A75A-489C-80D8-D1372F2FF586", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_6:*:*:*:*:*:*", "matchCriteriaId": "C49C0CA8-485E-4748-A5D5-C3B5FF98381E", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_7:*:*:*:*:*:*", "matchCriteriaId": "2C1D2585-833B-4A5A-AAF3-3215C52FE73A", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_8:*:*:*:*:*:*", "matchCriteriaId": "AAAE216E-780B-48A7-89D9-6FB8E799B78C", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_9:*:*:*:*:*:*", "matchCriteriaId": "A44BBF13-7FCF-4CD9-8EA7-C20CA701B8BA", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B73514B-7CA9-4783-9212-84465482A496", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:10.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "EC5EB2B8-9B48-4E9B-9726-71E4A6CCFA99", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_1:*:*:*:*:*:*", "matchCriteriaId": "D81AF106-7E8D-4B32-8F63-BD361E2E9508", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_2:*:*:*:*:*:*", "matchCriteriaId": "67E40E37-09A5-4BBD-9602-3B72B9A3885F", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_3:*:*:*:*:*:*", "matchCriteriaId": "656627F5-4DE4-41FE-9A6E-34D45C6B2639", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_4:*:*:*:*:*:*", "matchCriteriaId": "37E5C137-6124-4543-83BC-12BE6BB20309", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_5:*:*:*:*:*:*", "matchCriteriaId": "0F7DE084-A236-4ED8-B8A9-EBE2D0ACF580", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_6:*:*:*:*:*:*", "matchCriteriaId": "907DF79A-A607-4F3A-9C7E-1FB028B34001", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_7:*:*:*:*:*:*", "matchCriteriaId": "9EA72598-85D1-4341-A865-1E6E278F4185", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:11.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "6D792E4C-170B-4E6E-8808-EFDB3DF42417", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_1:*:*:*:*:*:*", "matchCriteriaId": "479BE6F6-9947-4261-8685-E6357ED90CD1", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_2:*:*:*:*:*:*", "matchCriteriaId": "C63BD98F-1ADD-494D-B05A-45B86351F0D1", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_3:*:*:*:*:*:*", "matchCriteriaId": "51F750D7-3CE2-48CA-8D13-006E9CA3E383", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_4:*:*:*:*:*:*", "matchCriteriaId": "93202EFB-89DD-49B1-9E29-77145F6A43F1", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_5:*:*:*:*:*:*", "matchCriteriaId": "B65E88C8-173C-40BE-87A3-E3512EBB7C9A", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:domino:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "09FF8200-5500-420F-93DF-7F7708E76300", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "HCL Domino is susceptible to an information disclosure vulnerability. In some scenarios, local calls made on the server to search the Domino directory will ignore xACL read restrictions. An authenticated attacker could leverage this vulnerability to access attributes from a user's person record.\n"}, {"lang": "es", "value": "HCL Domino es susceptible a una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n. En algunos escenarios, las llamadas locales realizadas en el servidor para buscar en el directorio Domino ignorar\u00e1n las restricciones de lectura de xACL. Un atacante autenticado podr\u00eda aprovechar esta vulnerabilidad para acceder a los atributos del registro personal de un usuario."}], "id": "CVE-2022-38654", "lastModified": "2024-11-21T07:16:52.233", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "psirt@hcl.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-11-04T21:15:10.710", "references": [{"source": "psirt@hcl.com", "tags": ["Vendor Advisory"], "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0101017"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0101017"}], "sourceIdentifier": "psirt@hcl.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "psirt@hcl.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}