Show plain JSON{"id": "CVE-2021-43835", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}]}, "published": "2021-12-15T20:15:08.677", "references": [{"url": "https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a", "tags": ["Patch", "Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/sulu/sulu/security/advisories/GHSA-84px-q68r-2fc9", "tags": ["Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a", "tags": ["Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/sulu/sulu/security/advisories/GHSA-84px-q68r-2fc9", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-269"}]}], "descriptions": [{"lang": "en", "value": "Sulu is an open-source PHP content management system based on the Symfony framework. In affected versions Sulu users who have access to any subset of the admin UI are able to elevate their privilege. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction. The versions have been patched in 2.2.18, 2.3.8 and 2.4.0. For users unable to upgrade the only known workaround is to apply a patch to the ProfileController manually."}, {"lang": "es", "value": "Sulu es un sistema de administraci\u00f3n de contenidos PHP de c\u00f3digo abierto basado en el framework Symfony. En las versiones afectadas, los usuarios de Sulu que presentan acceso a cualquier subconjunto de la interfaz de usuario de administraci\u00f3n son capaces de elevar sus privilegios. A trav\u00e9s de la API era posible que se dieran permisos a \u00e1reas que a\u00fan no ten\u00edan. Este problema se introdujo en la versi\u00f3n 2.0.0-RC1 con el nuevo ProfileController putAction. Las versiones han sido parcheadas en 2.2.18, 2.3.8 y 2.4.0. Para usuarios que no puedan actualizar, la \u00fanica soluci\u00f3n conocida es aplicar un parche al ProfileController manualmente"}], "lastModified": "2024-11-21T06:29:53.723", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B6E9B64-0B43-40AD-B0B4-C8BA5EEA6F31", "versionEndExcluding": "2.2.18", "versionStartIncluding": "2.0.0"}, {"criteria": "cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "354C0B42-D950-497B-B3B7-09EA07063564", "versionEndExcluding": "2.3.8", "versionStartIncluding": "2.3.0"}, {"criteria": "cpe:2.3:a:sulu:sulu:2.4.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2889EBAA-7A15-436C-9658-CA67F7122DC1"}], "operator": "OR"}]}], "sourceIdentifier": "security-advisories@github.com"}