"comment":"CVE-2023-2868: Enriched via the cve_advanced module",
"deleted":false,
"description":"Vulnerability object describing a common vulnerability enumeration which can describe published, unpublished, under review or embargo vulnerability for software, equipments or hardware.",
"value":"A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives).\u00a0The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product.\u00a0This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances."
"comment":"CVE-2023-2868: Enriched via the cve_advanced module",
"deleted":false,
"description":"Weakness object describing a common weakness enumeration which can describe usable, incomplete, draft or deprecated weakness for software, equipment of hardware.",
"value":"Manipulating Web Input to File System Calls"
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"summary",
"timestamp":"1693319857",
"to_ids":false,
"type":"text",
"uuid":"1d1db3fd-c4f0-49bb-8483-04bd125f49b7",
"value":"An attacker manipulates inputs to the target software which the target software passes to file system calls in the OS. The goal is to gain access to, and perhaps modify, areas of the file system that the target software did not intend to be accessible."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"prerequisites",
"timestamp":"1693319857",
"to_ids":false,
"type":"text",
"uuid":"239fabee-f49a-4a3e-be5b-5665a3cd90d7",
"value":"Program must allow for user controlled variables to be applied directly to the filesystem"
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"solutions",
"timestamp":"1693319857",
"to_ids":false,
"type":"text",
"uuid":"6ed4b6bb-2713-4c73-a3e2-2236b798b898",
"value":"Design: Enforce principle of least privilege. Design: Ensure all input is validated, and does not contain file system commands Design: Run server interfaces with a non-root account and/or utilize chroot jails or other configuration techniques to constrain privileges even if attacker gains some limited access to commands. Design: For interactive user applications, consider if direct file system interface is necessary, instead consider having the application proxy communication. Implementation: Perform testing such as pen-testing and vulnerability scanning to identify directories, programs, and interfaces that grant direct access to executables."
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"ae31deec-3739-4a0b-90bf-fd5da327f7dc",
"value":"CWE-15"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"e6cc1976-b965-4714-bbe4-681762c9e4b6",
"value":"CWE-22"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"d2741eeb-de18-4d41-9c8c-f08d0673d23d",
"value":"CWE-23"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"d72bd60f-8401-4d76-90e9-fca1973f0c06",
"value":"CWE-264"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"ebdbec54-a16f-4005-aa24-b68a4684ad86",
"value":"CWE-272"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"fa60e705-0c30-4b29-b78f-d950463e6865",
"value":"CWE-285"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"1f941a8a-d8c6-462b-8b0f-82149702cbab",
"value":"CWE-346"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"54eee2c6-de23-408e-bc8d-6e201116313d",
"value":"CWE-348"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"cdf37ff0-d075-49e9-8384-a40303b441ae",
"value":"CWE-59"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"75c245ec-9285-4f6b-b55c-01cc4ebc5f43",
"value":"CWE-715"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"a990bbc2-bc14-4fb0-9e17-3b999a2980c7",
"value":"CWE-73"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"07917be0-89d9-4de5-9314-ab152881d5b6",
"value":"CWE-74"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"6c228ab5-94e2-41ce-b52c-5c1464f10224",
"value":"CWE-77"
}
]
},
{
"comment":"CVE-2023-2868: Enriched via the cve_advanced module",
"deleted":false,
"description":"Attack pattern describing a common attack pattern enumeration and classification.",
"value":"An adversary looking to execute a command of their choosing, injects new items into an existing command thus modifying interpretation away from what was intended. Commands in this context are often standalone strings that are interpreted by a downstream component and cause specific responses. This type of attack is possible when untrusted values are used to build these command strings. Weaknesses in input validation or command construction can enable the attack and lead to successful exploitation."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"prerequisites",
"timestamp":"1693319857",
"to_ids":false,
"type":"text",
"uuid":"6bbde7c3-a2b5-457a-b02d-4172c20c419a",
"value":"The target application must accept input from the user and then use this input in the construction of commands to be executed. In virtually all cases, this is some form of string input that is concatenated to a constant string defined by the application to form the full command to be executed."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"solutions",
"timestamp":"1693319857",
"to_ids":false,
"type":"text",
"uuid":"6840ee2a-59cb-4186-8323-8583f4805b2b",
"value":"All user-controllable input should be validated and filtered for potentially unwanted characters. Using an allowlist for input is desired, but if use of a denylist approach is necessary, then focusing on command related terms and delimiters is necessary. Input should be encoded prior to use in commands to make sure command related characters are not treated as part of the command. For example, quotation characters may need to be encoded so that the application does not treat the quotation as a delimiter. Input should be parameterized, or restricted to data sections of a command, thus removing the chance that the input will be treated as part of the command itself."
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319857",
"to_ids":false,
"type":"weakness",
"uuid":"a8b15c1f-a3a7-4e99-a3ef-fa290ab2fa5d",
"value":"CWE-77"
}
]
},
{
"comment":"CVE-2023-2868: Enriched via the cve_advanced module",
"deleted":false,
"description":"Attack pattern describing a common attack pattern enumeration and classification.",
"value":"This attack exploits terminal devices that allow themselves to be written to by other users. The attacker sends command strings to the target terminal device hoping that the target user will hit enter and thereby execute the malicious command with their privileges. The attacker can send the results (such as copying /etc/passwd) to a known directory and collect once the attack has succeeded."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"prerequisites",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"86d3a928-4cbb-4d14-98de-466d2321c73b",
"value":"User terminals must have a permissive access control such as world writeable that allows normal users to control data on other user's terminals."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"solutions",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"bc9e698a-20f1-4e5f-adb6-8fb4178d34e6",
"value":"Design: Ensure that terminals are only writeable by named owner user and/or administrator Design: Enforce principle of least privilege"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"6d3e5335-a6eb-4ce2-8b49-9efea2f7b6d8",
"value":"CWE-77"
}
]
},
{
"comment":"CVE-2023-2868: Enriched via the cve_advanced module",
"deleted":false,
"description":"Attack pattern describing a common attack pattern enumeration and classification.",
"value":"An attacker supplies the target software with input data that contains sequences of special characters designed to bypass input validation logic. This exploit relies on the target making multiples passes over the input data and processing a \"layer\" of special characters with each pass. In this manner, the attacker can disguise input that would otherwise be rejected as invalid by concealing it with layers of special/escape characters that are stripped off by subsequent processing steps. The goal is to first discover cases where the input validation layer executes before one or more parsing layers. That is, user input may go through the following logic in an application: <parser1> --> <input validator> --> <parser2>. In such cases, the attacker will need to provide input that will pass through the input validator, but after passing through parser2, will be converted into something that the input validator was supposed to stop."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"prerequisites",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"704ce1d6-bfa0-4880-9ce9-e5f185854102",
"value":"User input is used to construct a command to be executed on the target system or as part of the file name. Multiple parser passes are performed on the data supplied by the user."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"solutions",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"757d73b2-2f59-49a9-a359-5d86632a057d",
"value":"An iterative approach to input validation may be required to ensure that no dangerous characters are present. It may be necessary to implement redundant checking across different input validation layers. Ensure that invalid data is rejected as soon as possible and do not continue to work with it. Make sure to perform input validation on canonicalized data (i.e. data that is data in its most standard form). This will help avoid tricky encodings getting past the filters. Assume all input is malicious. Create an allowlist that defines all valid input to the software system based on the requirements specifications. Input that does not match against the allowlist would not be permitted to enter into the system."
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"587bb3de-f6a0-48f6-9560-fc76a9e2e897",
"value":"CWE-171"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"2709809c-1880-4884-aa68-d472dc889bec",
"value":"CWE-179"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"f9f98872-2ce8-4b9e-a4a5-987e4371a094",
"value":"CWE-181"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"9032fdb7-5eae-4c14-8223-4720ee5f69d1",
"value":"CWE-183"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"790e180e-a7d7-44ea-a8a3-474f12b6f19f",
"value":"CWE-184"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"f73ab834-5124-45c8-9f66-5d4a5468e42f",
"value":"CWE-20"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"cccdc53a-4850-4d25-9e83-36e60827caf9",
"value":"CWE-697"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"c56908e8-baff-4554-98d3-558524a5fc12",
"value":"CWE-707"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"677ebe9a-715e-4a63-b749-a7c5a58898bb",
"value":"CWE-74"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"be0b670e-c35d-421b-9ed1-a35a227ea054",
"value":"CWE-77"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"1c567e22-0305-4faf-87b6-c8ac3effbf9a",
"value":"CWE-78"
}
]
},
{
"comment":"CVE-2023-2868: Enriched via the cve_advanced module",
"deleted":false,
"description":"Attack pattern describing a common attack pattern enumeration and classification.",
"value":"An attacker manipulates or crafts an LDAP query for the purpose of undermining the security of the target. Some applications use user input to create LDAP queries that are processed by an LDAP server. For example, a user might provide their username during authentication and the username might be inserted in an LDAP query during the authentication process. An attacker could use this input to inject additional commands into an LDAP query that could disclose sensitive information. For example, entering a * in the aforementioned query might return information about all users on the system. This attack is very similar to an SQL injection attack in that it manipulates a query to gather additional information or coerce a particular return value."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"prerequisites",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"c725c46f-0b12-42a6-b9fd-f17a3bab7189",
"value":"The target application must accept a string as user input, fail to sanitize characters that have a special meaning in LDAP queries in the user input, and insert the user-supplied string in an LDAP query which is then processed."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"solutions",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"fca19e6e-f5be-4303-861a-73238460fca4",
"value":"Strong input validation - All user-controllable input must be validated and filtered for illegal characters as well as LDAP content. Use of custom error pages - Attackers can glean information about the nature of queries from descriptive error messages. Input validation must be coupled with customized error pages that inform about an error without disclosing information about the LDAP or application."
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"f9078c9b-2b04-4843-9b89-5d0a62693dc9",
"value":"CWE-20"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"3e10a074-7094-4879-bcc3-3f8b90b68644",
"value":"CWE-77"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"0e26f5b2-88dd-4565-a655-e206d4d10103",
"value":"CWE-90"
}
]
},
{
"comment":"CVE-2023-2868: Enriched via the cve_advanced module",
"deleted":false,
"description":"Attack pattern describing a common attack pattern enumeration and classification.",
"value":"An attack of this type exploits a programs' vulnerabilities that allows an attacker's commands to be concatenated onto a legitimate command with the intent of targeting other resources such as the file system or database. The system that uses a filter or denylist input validation, as opposed to allowlist validation is vulnerable to an attacker who predicts delimiters (or combinations of delimiters) not present in the filter or denylist. As with other injection attacks, the attacker uses the command delimiter payload as an entry point to tunnel through the application and activate additional attacks through SQL queries, shell commands, network scanning, and so on."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"prerequisites",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"5eb4594e-cfb8-435a-b169-fe8ba8e4c9c0",
"value":"Software's input validation or filtering must not detect and block presence of additional malicious command."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"solutions",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"01a71ec9-fccd-4b14-b12f-b0b0975e4420",
"value":"Design: Perform allowlist validation against a positive specification for command length, type, and parameters. Design: Limit program privileges, so if commands circumvent program input validation or filter routines then commands do not running under a privileged account Implementation: Perform input validation for all remote content. Implementation: Use type conversions such as JDBC prepared statements."
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"c6e0d2cb-ab1a-4764-bbfd-a3d022679bf3",
"value":"CWE-138"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"c6696871-5f8a-4566-b48d-1c9a1dcdd774",
"value":"CWE-140"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"9226d2cb-9d48-48ed-acfb-b5e78d31e4d1",
"value":"CWE-146"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"7bab1d20-623e-4581-86bc-ed960ac5b773",
"value":"CWE-154"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"00c3cab9-edf0-45f1-9ce7-8f422090f994",
"value":"CWE-157"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"015cc0bf-34ab-4764-beae-f9adce963b56",
"value":"CWE-184"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"33e737f5-3b4f-49d2-ad9d-c8d428e4a737",
"value":"CWE-185"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"015beedd-6a24-40d8-b7e5-fa877fe8317d",
"value":"CWE-697"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"d73c1d78-d5c5-45d1-a619-a96f2e4e1794",
"value":"CWE-713"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"1e4abe4a-a449-427f-a8fb-46bb44d7d740",
"value":"CWE-77"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"580dc0d2-3672-4a18-9bbf-6d073b10aaf4",
"value":"CWE-78"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"23572a22-5be4-42a7-a577-19999d373bb6",
"value":"CWE-93"
}
]
},
{
"comment":"CVE-2023-2868: Enriched via the cve_advanced module",
"deleted":false,
"description":"Attack pattern describing a common attack pattern enumeration and classification.",
"value":"An attacker exploits weaknesses in input validation on IMAP/SMTP servers to execute commands on the server. Web-mail servers often sit between the Internet and the IMAP or SMTP mail server. User requests are received by the web-mail servers which then query the back-end mail server for the requested information and return this response to the user. In an IMAP/SMTP command injection attack, mail-server commands are embedded in parts of the request sent to the web-mail server. If the web-mail server fails to adequately sanitize these requests, these commands are then sent to the back-end mail server when it is queried by the web-mail server, where the commands are then executed. This attack can be especially dangerous since administrators may assume that the back-end server is protected against direct Internet access and therefore may not secure it adequately against the execution of malicious commands."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"prerequisites",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"684697f4-0c93-470f-96ca-a0085b2b6411",
"value":"The target environment must consist of a web-mail server that the attacker can query and a back-end mail server. The back-end mail server need not be directly accessible to the attacker. The web-mail server must fail to adequately sanitize fields received from users and passed on to the back-end mail server. The back-end mail server must not be adequately secured against receiving malicious commands from the web-mail server."
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"a3a4df2a-4293-4c61-a4dd-c919d979ae3a",
"value":"CWE-77"
}
]
},
{
"comment":"CVE-2023-2868: Enriched via the cve_advanced module",
"deleted":false,
"description":"Attack pattern describing a common attack pattern enumeration and classification.",
"value":"Generally these are manually edited files that are not in the preview of the system administrators, any ability on the attackers' behalf to modify these files, for example in a CVS repository, gives unauthorized access directly to the application, the same as authorized users."
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"prerequisites",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"231194a7-d752-459c-aa7d-cfe701fa6d60",
"value":"Configuration files must be modifiable by the attacker"
},
{
"category":"Other",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"solutions",
"timestamp":"1693319858",
"to_ids":false,
"type":"text",
"uuid":"3d44514f-4e82-48cd-9d20-72e27e6123fa",
"value":"Design: Enforce principle of least privilege Design: Backup copies of all configuration files Implementation: Integrity monitoring for configuration files Implementation: Enforce audit logging on code and configuration promotion procedures. Implementation: Load configuration from separate process and memory space, for example a separate physical device like a CD"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"1b935a2b-572e-4556-b76b-b3452bed0c48",
"value":"CWE-346"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"9b998ecc-e323-4a68-9fe7-489419ab430e",
"value":"CWE-349"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"5d510d71-9579-412a-8514-a388a991487e",
"value":"CWE-353"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"f39ee6ce-a917-4203-b75b-446b6ea5afba",
"value":"CWE-354"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"84bd9549-4598-42d4-99eb-35e9d9c9387c",
"value":"CWE-713"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"0e3ed79f-1f56-4a80-bddf-69159be6fc9f",
"value":"CWE-77"
},
{
"category":"External analysis",
"comment":"",
"deleted":false,
"disable_correlation":false,
"object_relation":"related-weakness",
"timestamp":"1693319858",
"to_ids":false,
"type":"weakness",
"uuid":"feb44333-ec25-4821-91e6-9c86f632e2ef",
"value":"CWE-99"
}
]
},
{
"comment":"",
"deleted":false,
"description":"Metadata used to generate an executive level report",