Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2023-3981

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Server-Side Request Forgery (SSRF) in GitHub repository omeka/omeka-s prior to 4.0.2.
Gravedad CVSS v3.1: MEDIA
Última modificación:
03/08/2023

CVE-2023-3982

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Cross-site Scripting (XSS) - Stored in GitHub repository omeka/omeka-s prior to 4.0.2.
Gravedad CVSS v3.1: MEDIA
Última modificación:
03/08/2023

Vulnerabilidad en Atmail (CVE-2022-31200)

Fecha de publicación:
27/07/2023
Idioma:
Español
Atmail v5.62 permite ataques de tipo Cross-Site Scripting (XSS) a través del campo "mail/parse.php?file=html/$this-%3ELanguage/help/filexp.html&FirstLoad=1&HelpFile=file.html Search Terms".
Gravedad CVSS v3.1: MEDIA
Última modificación:
07/11/2023

CVE-2023-36941

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** A cross-site scripting (XSS) vulnerability in PHPGurukul Online Fire Reporting System Using PHP and MySQL 1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the team name, leader, and member fields.
Gravedad CVSS v3.1: MEDIA
Última modificación:
21/12/2023

CVE-2021-36580

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Open Redirect vulnerability exists in IceWarp MailServer IceWarp Server Deep Castle 2 Update 1 (13.0.1.2) via the referer parameter.
Gravedad CVSS v3.1: MEDIA
Última modificación:
07/11/2023

CVE-2023-38492

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby&amp;#39;s API and Panel are disabled in the config). The real-world impact of this vulnerability is limited, however we still recommend to update to one of the patch releases because they also fix more severe vulnerabilities.<br /> <br /> Kirby&amp;#39;s authentication endpoint did not limit the password length. This allowed attackers to provide a password with a length up to the server&amp;#39;s maximum request body length. Validating that password against the user&amp;#39;s actual password requires hashing the provided password, which requires more CPU and memory resources (and therefore processing time) the longer the provided password gets. This could be abused by an attacker to cause the website to become unresponsive or unavailable. Because Kirby comes with a built-in brute force protection, the impact of this vulnerability is limited to 10 failed logins from each IP address and 10 failed logins for each existing user per hour.<br /> <br /> The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have added password length limits in the affected code so that passwords longer than 1000 bytes are immediately blocked, both when setting a password and when logging in.
Gravedad CVSS v3.1: ALTA
Última modificación:
03/08/2023

CVE-2023-29845

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Gravedad: Pendiente de análisis
Última modificación:
07/11/2023

CVE-2023-37900

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Crossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, a high-privileged user could create a Package referencing an arbitrarily large image containing that Crossplane would then parse, possibly resulting in exhausting all the available memory and therefore in the container being OOMKilled. The impact is limited due to the high privileges required to be able to create the Package and the eventually consistency nature of controller. This issue is fixed in versions 1.11.5, 1.12.3, and 1.13.0.
Gravedad CVSS v3.1: BAJA
Última modificación:
03/08/2023

CVE-2023-38491

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to upload an arbitrary file to the content folder. Kirby sites are not affected if they don&amp;#39;t allow file uploads for untrusted users or visitors or if the file extensions of uploaded files are limited to a fixed safe list. The attack requires user interaction by another user or visitor and cannot be automated.<br /> <br /> An editor with write access to the Kirby Panel could upload a file with an unknown file extension like `.xyz` that contains HTML code including harmful content like `` tags. The direct link to that file could be sent to other users or visitors of the site. If the victim opened that link in a browser where they are logged in to Kirby and the file had not been opened by anyone since the upload, Kirby would not be able to send the correct MIME content type, instead falling back to `text/html`. The browser would then run the script, which could for example trigger requests to Kirby&amp;#39;s API with the permissions of the victim.<br /> <br /> The issue was caused by the underlying `Kirby\Http\Response::file()` method, which didn&amp;#39;t have an explicit fallback if the MIME type could not be determined from the file extension. If you use this method in site or plugin code, these uses may be affected by the same vulnerability.<br /> <br /> The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have fixed the affected method to use a fallback MIME type of `text/plain` and set the `X-Content-Type-Options: nosniff` header if the MIME type of the file is unknown.
Gravedad CVSS v3.1: MEDIA
Última modificación:
03/08/2023

CVE-2023-3974

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** OS Command Injection in GitHub repository jgraph/drawio prior to 21.4.0.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
03/08/2023

CVE-2023-3975

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** OS Command Injection in GitHub repository jgraph/drawio prior to 21.5.0.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
03/08/2023

CVE-2023-38489

Fecha de publicación:
27/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby&amp;#39;s API and Panel are disabled in the config). It can only be abused if a Kirby user is logged in on a device or browser that is shared with potentially untrusted users or if an attacker already maliciously used a previous password to log in to a Kirby site as the affected user.<br /> <br /> Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization. In the variation described in this advisory, it allows attackers to stay logged in to a Kirby site on another device even if the logged in user has since changed their password. Kirby did not invalidate user sessions that were created with a password that was since changed by the user or by a site admin. If a user changed their password to lock out an attacker who was already in possession of the previous password or of a login session on another device or browser, the attacker would not be reliably prevented from accessing the Kirby site as the affected user.<br /> <br /> The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have updated the authentication implementation to keep track of the hashed password in each active session. If the password changed since the login, the session is invalidated. To enforce this fix even if the vulnerability was previously abused, all users are logged out from the Kirby site after updating to one of the patched releases.
Gravedad CVSS v3.1: ALTA
Última modificación:
03/08/2023