Show plain JSON{"id": "CVE-2020-25249", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 3.9}]}, "published": "2020-09-11T03:15:12.380", "references": [{"url": "https://seclists.org/fulldisclosure/2020/Sep/8", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://seclists.org/fulldisclosure/2020/Sep/8", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Hyland OnBase 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. The server typically logs activity only when a client application specifies that logging is desired. This can be problematic for use cases in a regulated industry, where server-side logging is required in additional situations."}, {"lang": "es", "value": "Se detect\u00f3 un problema en Hyland OnBase versi\u00f3n 16.0.2.83 e inferior, versi\u00f3n 17.0.2.109 e inferior, versi\u00f3n 18.0.0.37 e inferior, versi\u00f3n 19.8.16.1000 e inferior y versi\u00f3n 20.3.10.1000 e inferior. El servidor normalmente registra la actividad s\u00f3lo cuando una aplicaci\u00f3n cliente especifica que se desea registrar. Esto puede ser problem\u00e1tico para los casos de uso en una industria regulada, en la que se requiere el registro del lado del servidor en situaciones adicionales"}], "lastModified": "2024-11-21T05:17:45.770", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8676658E-9F96-4213-9062-119274A085A4", "versionEndIncluding": "16.0.2.83"}, {"criteria": "cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46DE98EF-38B4-4C32-8FF1-54D1733771AC", "versionEndIncluding": "17.0.2.109", "versionStartIncluding": "17.0.0.0"}, {"criteria": "cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFEE664C-014B-4B42-8DA2-86617D8E279E", "versionEndIncluding": "18.0.0.37", "versionStartIncluding": "18.0.0.0"}, {"criteria": "cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E72BFC-F30C-45FF-9253-2CF1FF633B82", "versionEndIncluding": "19.8.16.1000", "versionStartIncluding": "19.0.0.0"}, {"criteria": "cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "966A05D7-1D0A-4618-9DFC-8F1A062D3DC6", "versionEndIncluding": "20.3.10.1000", "versionStartIncluding": "20.0.0.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}