paloaltonetworks cortex_xsoar 授权机制不正确
CVE编号
CVE-2021-3049利用情况
暂无补丁情况
N/A披露时间
2021-09-09漏洞描述
An improper authorization vulnerability in the Palo Alto Networks Cortex XSOAR server enables an authenticated network-based attacker with investigation read permissions to download files from incident investigations of which they are aware but are not a part of. This issue impacts: All Cortex XSOAR 5.5.0 builds; Cortex XSOAR 6.1.0 builds earlier than 12099345. This issue does not impact Cortex XSOAR 6.2.0 versions.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://security.paloaltonetworks.com/CVE-2021-3049 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | paloaltonetworks | cortex_xsoar | 5.5.0 | - | |||||
运行在以下环境 | |||||||||
应用 | paloaltonetworks | cortex_xsoar | 6.1.0 | - | |||||
运行在以下环境 | |||||||||
系统 | fedora_34 | python3-caca | * | Up to (excluding) 0.99-0.59.beta20.fc34 | |||||
运行在以下环境 | |||||||||
系统 | fedora_35 | libcaca-debugsource | * | Up to (excluding) 0.99-0.59.beta20.fc35 | |||||
运行在以下环境 | |||||||||
系统 | fedora_36 | python3-caca | * | Up to (excluding) 0.99-0.59.beta20.fc36 | |||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | libcaca-devel | * | Up to (excluding) 0.99-0.40.beta20.el7 | |||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_8 | python3-caca | * | Up to (excluding) 0.99-0.59.beta20.el8 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | caca-utils | * | Up to (excluding) 0.99.beta19.git20171003-11.3.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | caca-utils | * | Up to (excluding) 0.99.beta19.git20171003-11.3.1 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | libcaca0 | * | Up to (excluding) 0.99.beta18-14.6.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | libcaca | * | Up to (excluding) 0.99.beta19-2ubuntu0.18.04.3 | |||||
- 攻击路径 网络
- 攻击复杂度 高
- 权限要求 低
- 影响范围 未更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 无
CWE-ID | 漏洞类型 |
CWE-863 | 授权机制不正确 |
NVD-CWE-Other |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论