Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:trovebox:trovebox:*:*:*:*:*:*:*:*", "matchCriteriaId": "78F6699A-A397-4D6A-970A-E7123622C5CF", "versionEndIncluding": "3.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:trovebox:trovebox:4.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD80BAFE-28C1-49F1-AE8C-0E0BC943AA67", "vulnerable": true}, {"criteria": "cpe:2.3:a:trovebox:trovebox:4.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "8A011E31-96B1-4979-A4C4-83639B024693", "vulnerable": true}, {"criteria": "cpe:2.3:a:trovebox:trovebox:4.0.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "F6946C75-E3BE-475C-B4BB-B41EFE5D86ED", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Trovebox version <= 4.0.0-rc6 contains a Unsafe password reset token generation vulnerability in user component that can result in Password reset. This attack appear to be exploitable via HTTP request. This vulnerability appears to have been fixed in after commit 742b8ed."}, {"lang": "es", "value": "Trovebox, en versiones 4.0.0-rc6 y anteriores, contiene una vulnerabilidad de generaci\u00f3n de tokens de reinicio de contrase\u00f1as no segura en el componente user que puede resultar en el reinicio de contrase\u00f1as. Parece ser que este ataque puede ser explotado mediante una petici\u00f3n HTTP. La vulnerabilidad parece haber sido solucionada tras el commit con ID 742b8ed."}], "id": "CVE-2018-1000554", "lastModified": "2024-11-21T03:40:11.223", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-06-26T16:29:02.743", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://telekomsecurity.github.io/2018/04/trovebox-vulnerabilities.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://telekomsecurity.github.io/2018/04/trovebox-vulnerabilities.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-640"}], "source": "nvd@nist.gov", "type": "Primary"}]}