{"containers":{"cna":{"affected":[{"product":"HumHub","vendor":"unspecified","versions":[{"status":"affected","version":"0.20.1"},{"status":"affected","version":"1.0.0-beta.3"}]}],"credits":[{"lang":"en","value":"Tim Coen"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in HumHub 0.20.1/1.0.0-beta.3. It has been classified as critical. This affects an unknown part. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-269","description":"CWE-269 Improper Privilege Management","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-09T22:36:05.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Mar/48"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.98925"}],"title":"HumHub privileges management","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20028","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"HumHub privileges management"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"HumHub","version":{"version_data":[{"version_value":"0.20.1"},{"version_value":"1.0.0-beta.3"}]}}]},"vendor_name":""}]}},"credit":"Tim Coen","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in HumHub 0.20.1/1.0.0-beta.3. It has been classified as critical. This affects an unknown part. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. It is recommended to upgrade the affected component."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"5.6","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-269 Improper Privilege Management"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Mar/48","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Mar/48"},{"name":"https://vuldb.com/?id.98925","refsource":"MISC","url":"https://vuldb.com/?id.98925"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:24.570Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Mar/48"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.98925"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:13:32.357442Z","id":"CVE-2017-20028","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:28:51.461Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20028","datePublished":"2022-06-09T22:36:05.000Z","dateReserved":"2022-06-05T00:00:00.000Z","dateUpdated":"2025-04-15T14:28:51.461Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}