Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:dalmark:systeam_enterprise_resource_planning:2.22.8:build_1724:*:*:*:*:*:*", "matchCriteriaId": "DA84FF69-3864-4439-B930-7E9418418F14", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Incorrect Access Control. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. A broken access control vulnerability has been found while using a temporary generated token in order to consume api resources. The vulnerability allows an unauthenticated attacker to use an api endpoint to generate a temporary JWT token that is designed to reference the correct tenant prior to authentication, to request system configuration parameters using direct api requests. The correct exploitation of this vulnerability causes sensitive information exposure. In case the tenant has an smtp credential set, the full credential information is disclosed."}, {"lang": "es", "value": "Dalmark Systems Systeam 2.22.8 build 1724 es vulnerable al Control de Acceso Incorrecto. La aplicaci\u00f3n Systeam es un sistema ERP que usa una arquitectura mixta basada en la administraci\u00f3n de usuarios e inquilinos SaaS, y en la base de datos y la aplicaci\u00f3n web locales. Se ha encontrado una vulnerabilidad de control de acceso rota mientras es usado un token generado temporalmente para consumir recursos api. La vulnerabilidad permite a un atacante no autenticado usar un endpoint api para generar un token JWT temporal que est\u00e1 dise\u00f1ado para hacer referencia al inquilino correcto antes de la autenticaci\u00f3n, para solicitar par\u00e1metros de configuraci\u00f3n del sistema usando peticiones api directas. La explotaci\u00f3n correcta de esta vulnerabilidad causa la exposici\u00f3n de informaci\u00f3n confidencial. En caso de que el inquilino tenga un conjunto de credenciales smtp, se revela la informaci\u00f3n completa de las credenciales"}], "id": "CVE-2021-44877", "lastModified": "2024-11-21T06:31:38.730", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-12-21T17:15:08.590", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.systeam.com.br/cve/broken-access-control-en.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.systeam.com.br/cve/broken-access-control-en.txt"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}