Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:zx2c4:password-store:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA29FB3C-65F9-494B-BE3A-EBA15C1C9FC9", "versionEndIncluding": "1.7.3", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "pass through 1.7.3 has a possibility of using a password for an unintended resource. For exploitation to occur, the user must do a git pull, decrypt a password, and log into a remote service with the password. If an attacker controls the central Git server or one of the other members' machines, and also controls one of the services already in the password store, they can rename one of the password files in the Git repository to something else: pass doesn't correctly verify that the content of a file matches the filename, so a user might be tricked into decrypting the wrong password and sending that to a service that the attacker controls. NOTE: for environments in which this threat model is of concern, signing commits can be a solution."}, {"lang": "es", "value": "pass versiones hasta 1.7.3, presenta la posibilidad de utilizar una contrase\u00f1a para un recurso no deseado. Para que ocurra la explotaci\u00f3n, el usuario debe hacer un pull de git, descifrar una contrase\u00f1a e iniciar sesi\u00f3n en un servicio remoto con la contrase\u00f1a. Si un atacante controla el servidor central de Git o una de las m\u00e1quinas de los otros miembros, y tambi\u00e9n controla uno de los servicios que ya est\u00e1n en el almac\u00e9n de contrase\u00f1as, puede cambiar el nombre de uno de los archivos de contrase\u00f1as en el repositorio de Git a otra cosa: el pase no verifica correctamente que el contenido de un archivo coincida con el nombre del archivo, por lo que un usuario podr\u00eda ser enga\u00f1ado para que descifre la contrase\u00f1a incorrecta y la env\u00ede a un servicio que controla el atacante. NOTA: para entornos en los que este modelo de amenaza es una preocupaci\u00f3n, la firma de confirmaciones puede ser una soluci\u00f3n"}], "id": "CVE-2020-28086", "lastModified": "2024-11-21T05:22:19.390", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-12-09T19:15:11.593", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://lists.zx2c4.com/pipermail/password-store/2014-March/000498.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://lists.zx2c4.com/pipermail/password-store/2014-March/000498.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-347"}], "source": "nvd@nist.gov", "type": "Primary"}]}