Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC457927-FBA7-40B4-A8F3-43D77E050A2C", "versionEndExcluding": "4.5.3", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "605F8BA7-68CF-42B0-85A9-21AADA2DBBC4", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:hotfix1:*:*:*:*:*:*", "matchCriteriaId": "E6CE7386-A6A7-4083-ABCC-308BDCBB72EB", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:*:hotfix1:*:*:jms:*:*:*", "matchCriteriaId": "07C4DEAC-6739-4195-BB6A-F61549C05608", "versionEndExcluding": "4.4.2", "versionStartIncluding": "4.4.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:*:*:*:*:jms:*:*:*", "matchCriteriaId": "664A2CB3-B739-40FE-9E39-2304886E562F", "versionEndExcluding": "4.5.3", "versionStartIncluding": "4.5.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:4.0.5:*:*:*:jms:*:*:*", "matchCriteriaId": "205D9C60-D31B-4F7D-8C18-B249A8A17164", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:4.0.6:*:*:*:jms:*:*:*", "matchCriteriaId": "73B41C3E-184E-4D8B-A51D-A2FA2B813FE6", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:4.0.6:hotfix2:*:*:jms:*:*:*", "matchCriteriaId": "8C21A5D5-D0CD-4C0A-B4B1-B347334854A0", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:4.0.7:*:*:*:jms:*:*:*", "matchCriteriaId": "41F28304-6392-4FA2-AC2D-E29BD96EB414", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:4.4.2:hotfix1:*:*:jms:*:*:*", "matchCriteriaId": "58CA61F8-6B9E-4A4E-88C5-D438BE71EB2A", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:hotfix1:*:*:jms:*:*:*", "matchCriteriaId": "CEA5CD95-09A5-4B76-A070-765430822B05", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:tenefit:kaazing_websocket_gateway:*:*:*:*:community:*:*:*", "matchCriteriaId": "4285FC8E-DC4C-4C33-99EB-D00753AE6A15", "versionEndExcluding": "5.6.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:tenefit:kaazing_websocket_gateway:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "195047EF-F9E8-4502-B773-5A6476A55345", "versionEndExcluding": "5.6.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The HTTP and WebSocket engine components in the server in Kaazing Gateway before 4.5.3 hotfix-1, Gateway - JMS Edition before 4.0.5 hotfix-15, 4.0.6 before hotfix-4, 4.0.7, 4.0.9 before hotfix-19, 4.4.x before 4.4.2 hotfix-1, 4.5.x before 4.5.3 hotfix-1, and Gateway Community and Enterprise Editions before 5.6.0 allow remote attackers to bypass intended access restrictions and obtain sensitive information via vectors related to HTTP request handling."}, {"lang": "es", "value": "Los componentes del motor HTTP y WebSocket en el servidor en Kaazing Gateway, en versiones anteriores a la 4.5.3 hotfix-1; Gateway - JMS Edition, en versiones anteriores a la 4.0.5 hotfix-15, 4.0.6 anteriores al hotfix-4, 4.0.7, 4.0.9 anteriores al hotfix-19, 4.4.x anteriores a la 4.4.2 hotfix-1, 4.5.x anteriores a la 4.5.3 hotfix-1; y las ediciones Community y Enterprise de Gateway anteriores a la versi\u00f3n 5.6.0 permiten que atacantes remotos omitan las restricciones de acceso planeadas y obtengan informaci\u00f3n sensible mediante vectores relacionados con la gesti\u00f3n de peticiones HTTP."}], "id": "CVE-2017-6910", "lastModified": "2024-11-21T03:30:46.220", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-04-12T15:29:00.537", "references": [{"source": "cve@mitre.org", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://support.kaazing.com/hc/en-us/articles/115004752368"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://support.kaazing.com/hc/en-us/articles/115004752368"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}]}