Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:checkpoint:harmony_browse:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25A14A0-83C3-4A21-9B4D-FB633EAB2142", "versionEndExcluding": "90.08.7405", "vulnerable": true}, {"criteria": "cpe:2.3:a:checkpoint:sandblast_agent_for_browsers:*:*:*:*:*:*:*:*", "matchCriteriaId": "50CFBD01-F629-48A7-A39A-121C0DC99E62", "versionEndExcluding": "90.08.7405", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "The Harmony Browse and the SandBlast Agent for Browsers installers must have admin privileges to execute some steps during the installation. Because the MS Installer allows regular users to repair their installation, an attacker running an installer before 90.08.7405 can start the installation repair and place a specially crafted binary in the repair folder, which runs with the admin privileges."}, {"lang": "es", "value": "Los instaladores de Harmony Browse y SandBlast Agent for Browsers deben tener privilegios de administrador para ejecutar algunos pasos durante la instalaci\u00f3n. Dado que el instalador de MS permite a usuarios normales reparar su instalaci\u00f3n, un atacante que ejecute un instalador anterior a versi\u00f3n 90.08.7405, puede iniciar una reparaci\u00f3n de la instalaci\u00f3n y colocar un binario especialmente dise\u00f1ado en la carpeta de reparaci\u00f3n, que se ejecuta con los privilegios de administrador"}], "id": "CVE-2021-30359", "lastModified": "2024-11-21T06:03:56.697", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-10-22T14:15:08.530", "references": [{"source": "cve@checkpoint.com", "tags": ["Third Party Advisory"], "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/MNDT-2021-0007/MNDT-2021-0007.md"}, {"source": "cve@checkpoint.com", "tags": ["Vendor Advisory"], "url": "https://supportcontent.checkpoint.com/solutions?id=sk175968"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/MNDT-2021-0007/MNDT-2021-0007.md"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://supportcontent.checkpoint.com/solutions?id=sk175968"}], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-427"}], "source": "cve@checkpoint.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-427"}], "source": "nvd@nist.gov", "type": "Primary"}]}