Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D9FC84E-958F-450A-8400-1C51E00231A4", "versionEndIncluding": "6.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:-:*:*:*:*:*:*", "matchCriteriaId": "B2320EEE-367C-4CE1-8AC4-048B97DE71F3", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6100:*:*:*:*:*:*", "matchCriteriaId": "B1E5484A-D834-4C7A-962C-C78CF0CDAA8B", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6101:*:*:*:*:*:*", "matchCriteriaId": "6FA21683-29F7-44EB-84C6-D29C6C64DE97", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6102:*:*:*:*:*:*", "matchCriteriaId": "7BE0B72F-2963-4666-9A82-7812BFB52DB0", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6103:*:*:*:*:*:*", "matchCriteriaId": "85DD7E26-B9C5-4DCC-8F50-F5884AF61105", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6104:*:*:*:*:*:*", "matchCriteriaId": "AC37608E-E61B-4333-8358-50C8377A1ABF", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6105:*:*:*:*:*:*", "matchCriteriaId": "C13EF458-FE95-49E5-9A13-04C96C3F114A", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6106:*:*:*:*:*:*", "matchCriteriaId": "12919644-3D85-488C-89A3-58A1FB31279D", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6107:*:*:*:*:*:*", "matchCriteriaId": "75206A94-9155-48D7-A378-5020877B8B97", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6108:*:*:*:*:*:*", "matchCriteriaId": "E50CF265-DE6F-4281-8300-06D54185AA43", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6109:*:*:*:*:*:*", "matchCriteriaId": "EB577C00-1412-4F87-B91A-5E956EB2213F", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6110:*:*:*:*:*:*", "matchCriteriaId": "4C7681FA-FC15-49CE-9288-3C4E361F4D21", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6111:*:*:*:*:*:*", "matchCriteriaId": "80F12A94-93C5-4442-8FB3-4E02E4DECCEB", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6112:*:*:*:*:*:*", "matchCriteriaId": "17270CDC-C800-4B5A-BEAA-83AF455BBBEA", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6113:*:*:*:*:*:*", "matchCriteriaId": "DAFE53B1-7736-4560-8FEF-AA0F56FEACF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6114:*:*:*:*:*:*", "matchCriteriaId": "C5491174-9BE3-4FBF-AEF5-6A313E2CEBA0", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6115:*:*:*:*:*:*", "matchCriteriaId": "E407C5F1-43D0-4B5D-A3B8-A48A7024CCB1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "ManageEngine ADSelfService Plus below build 6116 stores the password policy file for each domain under the html/ web root with a predictable filename based on the domain name. When ADSSP is configured with multiple Windows domains, a user from one domain can obtain the password policy for another domain by authenticating to the service and then sending a request specifying the password policy file of the other domain."}, {"lang": "es", "value": "ManageEngine ADSelfService Plus versiones anteriores a la compilaci\u00f3n 6116, almacena el archivo de pol\u00edtica de contrase\u00f1as para cada dominio bajo la ra\u00edz html/ web con un nombre de archivo predecible basado en el nombre del dominio. Cuando ADSSP est\u00e1 configurado con m\u00faltiples dominios de Windows, un usuario de un dominio puede obtener la pol\u00edtica de contrase\u00f1as de otro dominio al autenticarse en el servicio y enviando una petici\u00f3n especificando el archivo de pol\u00edtica de contrase\u00f1as del otro dominio"}], "id": "CVE-2021-20148", "lastModified": "2024-11-21T05:46:00.877", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-01-03T22:15:08.560", "references": [{"source": "vulnreport@tenable.com", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.tenable.com/security/research/tra-2021-52"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.tenable.com/security/research/tra-2021-52"}], "sourceIdentifier": "vulnreport@tenable.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-552"}], "source": "nvd@nist.gov", "type": "Primary"}]}