Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15813

EPSS 0.19% · P41
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-15813

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Graylog before 3.3.3 lacks SSL Certificate Validation for LDAP servers. It allows use of an external user/group database stored in LDAP. The connection configuration allows the usage of unencrypted, SSL- or TLS-secured connections. Unfortunately, the Graylog client code (in all versions that support LDAP) does not implement proper certificate validation (regardless of whether the "Allow self-signed certificates" option is used). Therefore, any attacker with the ability to intercept network traffic between a Graylog server and an LDAP server is able to redirect traffic to a different LDAP server (unnoticed by the Graylog server due to the lack of certificate validation), effectively bypassing Graylog's authentication mechanism.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Graylog 信任管理问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Graylog是美国Graylog公司的一套集中式日志管理解决方案。该产品支持捕获、存储和实时分析日志等。 Graylog 3.3.3之前版本中存在安全漏洞,该漏洞源于程序没有充分验证LDAP服务器的SSL证书。攻击者可利用该漏洞绕过Graylog的身份验证机制。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-15813

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-15813

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-07-17 · 33 CVEs total

CVE-2020-76847.5 HIGHDirectory Traversal
CVE-2020-76965.3 MEDIUMInformation Exposure
CVE-2020-154975.3 MEDIUMJalios JCMS 跨站脚本漏洞
CVE-2020-0227Google Android 安全漏洞
CVE-2020-15803Zabbix SIA Zabbix 跨站脚本漏洞
CVE-2020-15801Python 代码问题漏洞
CVE-2020-14001kramdown gem for Ruby 注入漏洞
CVE-2020-14928evolution-data-server 注入漏洞
CVE-2020-15807GNU LibreDWG 代码问题漏洞
CVE-2020-15586Google Go 竞争条件问题漏洞
CVE-2020-14039Google Go 信任管理问题漏洞
CVE-2019-4091HCL Technologies Marketing Platform 跨站脚本漏洞
CVE-2019-4090HCL Technologies Campaign 跨站脚本漏洞
CVE-2020-15816Western Digital WD Discovery 注入漏洞
CVE-2020-0120Android Media Framework 缓冲区错误漏洞
CVE-2020-0305Android 资源管理错误漏洞
CVE-2020-9252多款Huawei产品路径遍历漏洞
CVE-2020-0225Android System 缓冲区错误漏洞
CVE-2020-0107Google Android 安全漏洞
CVE-2020-0122Android Framework 安全漏洞

Showing top 20 of 33 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-15813

No comments yet


Leave a comment