Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:oneidentity:password_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BB9DDED-0454-482A-B760-D59409637901", "versionEndExcluding": "5.13.1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "One Identity Password Manager before 5.13.1 allows Kiosk Escape. This product enables users to reset their Active Directory passwords on the login screen of a Windows client. It launches a Chromium based browser in Kiosk mode to provide the reset functionality. The escape sequence is: go to the Google ReCAPTCHA section, click on the Privacy link, observe that there is a new browser window, navigate to any website that offers file upload, navigate to cmd.exe from the file explorer window, and launch cmd.exe as NT AUTHORITY\\SYSTEM."}, {"lang": "es", "value": "One Identity Password Manager anterior a 5.13.1 permite Kiosk Escape. Este producto permite a los usuarios restablecer sus contrase\u00f1as de Active Directory en la pantalla de inicio de sesi\u00f3n de un cliente de Windows. Inicia un navegador basado en Chromium en modo quiosco para proporcionar la funcionalidad de reinicio. La secuencia de escape es: vaya a la secci\u00f3n Google ReCAPTCHA, haga clic en el enlace Privacidad, observe que hay una nueva ventana del navegador, navegue a cualquier sitio web que ofrezca carga de archivos, navegue a cmd.exe desde la ventana del explorador de archivos e inicie cmd. .exe como NT AUTHORITY\\SYSTEM."}], "id": "CVE-2023-48654", "lastModified": "2024-11-21T08:32:11.937", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-12-25T06:15:08.483", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/"}, {"source": "cve@mitre.org", "tags": ["Product"], "url": "https://www.oneidentity.com/products/password-manager/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "https://www.oneidentity.com/products/password-manager/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}