CVE-2021-44840

CVSS V2 Medium 4 CVSS V3 Low 2.7
Description
An issue was discovered in Delta RM 1.2. Using an privileged account, it is possible to edit, create, and delete risk labels, such as Criticality and Priority Indication labels. By using the /core/table/query endpoint, and by using a POST request and indicating the affected label with tableUid parameter and the operation with datas[query], it is possible to edit, create, and delete the following labels: Priority Indication, Quality Evaluation, Progress Margin and Priority. Furthermore, it is also possible to export Criticality labels with an unprivileged user.
Overview
  • CVE ID
  • CVE-2021-44840
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-01-18T19:15:09
  • Last Modified Date
  • 2022-07-12T17:42:04
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:deltarm:delta_rm:1.2:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 4
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • HIGH
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 2.7
  • Base Severity
  • LOW
  • Exploitability Score
  • 1.2
  • Impact Score
  • 1.4
References
Reference URL Reference Tags
https://www.deltarm.com Product Vendor Advisory
https://gist.github.com/rntcruz23/81f83f9e406198b08ab40ffae8336a92 Exploit Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:36:16 Added to TrackCVE
2022-12-06 06:56:11 2022-01-18T19:15Z 2022-01-18T19:15:09 CVE Published Date updated
2022-12-06 06:56:11 2022-07-12T17:42:04 CVE Modified Date updated
2022-12-06 06:56:11 Analyzed Vulnerability Status updated