Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "80B64419-BB7A-4DE7-B563-8C5B93CEEF89", "versionEndExcluding": "8.4", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:-:*:*:*:*:*:*", "matchCriteriaId": "EF61F8BF-7483-4A81-9219-EE2465D48182", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p1:*:*:*:*:*:*", "matchCriteriaId": "08F52AB3-9C6A-467B-82F9-527956CD7A14", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p2:*:*:*:*:*:*", "matchCriteriaId": "968CDDC6-703C-44C4-8ACE-EAB208364B0C", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p3:*:*:*:*:*:*", "matchCriteriaId": "E450B2C9-FAE5-4450-85D3-7243A1FF3CF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p4:*:*:*:*:*:*", "matchCriteriaId": "F13BB0FC-951C-42EA-AA63-FF940C5ABCF0", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p5:*:*:*:*:*:*", "matchCriteriaId": "478214DC-9A4C-4411-B297-0A4E0B318E15", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:rsa_authentication_manager:8.4:p6:*:*:*:*:*:*", "matchCriteriaId": "45596D96-AC9F-49DC-9AB1-EE979909745A", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "RSA Authentication Manager versions prior to 8.4 P7 contain an XML Entity Injection Vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to cause information disclosure of local system files by supplying specially crafted XML message."}, {"lang": "es", "value": "RSA Authentication Manager versiones anteriores a la versi\u00f3n 8.4 P7, contienen una vulnerabilidad de tipo XML Entity Injection. Un usuario malicioso autenticado remoto podr\u00eda explotar esta vulnerabilidad para causar una divulgaci\u00f3n de informaci\u00f3n de archivos del sistema local mediante el suministro de un mensaje XML especialmente dise\u00f1ado."}], "id": "CVE-2019-3768", "lastModified": "2024-11-21T04:42:29.640", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security_alert@emc.com", "type": "Secondary"}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-01-03T23:15:12.273", "references": [{"source": "security_alert@emc.com", "url": "https://www.dell.com/support/security/en-us/details/DOC-108320/DSA-2019-148-RSA®%3B-Authentication-Manager-Software-XML-Entity-Injection-Vulnerability"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.dell.com/support/security/en-us/details/DOC-108320/DSA-2019-148-RSA®%3B-Authentication-Manager-Software-XML-Entity-Injection-Vulnerability"}], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-611"}], "source": "security_alert@emc.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-611"}], "source": "nvd@nist.gov", "type": "Primary"}]}