{"containers":{"cna":{"affected":[{"product":"e-document system","vendor":"Excellent Infotek Corporation","versions":[{"status":"affected","version":"0 3.0.2"},{"status":"affected","version":"0 2.9"}]}],"datePublic":"2021-03-17T00:00:00.000Z","descriptions":[{"lang":"en","value":"EIC e-document system does not perform completed identity verification for sorting and filtering personnel data. The vulnerability allows remote attacker to obtain users’ credential information without logging in the system, and further acquire the privileged permissions and execute arbitrary commends."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"description":"Broken Authentication","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-03-17T09:10:31.000Z","orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.twcert.org.tw/tw/cp-132-4518-c813c-1.html"},{"tags":["x_refsource_MISC"],"url":"https://gist.github.com/tonykuo76/17d497b3472a80a5e8914227e81e6fa3"},{"tags":["x_refsource_MISC"],"url":"https://www.chtsecurity.com/news/12929036-924b-4b89-8a0e-3e7155e19011"}],"solutions":[{"lang":"en","value":"Update to version 3.0.4"}],"source":{"advisory":"TVN-202101011","discovery":"EXTERNAL"},"title":"EIC e-document system - Broken Authentication","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"AKA":"TWCERT/CC","ASSIGNER":"cve@cert.org.tw","DATE_PUBLIC":"2021-03-17T09:30:00.000Z","ID":"CVE-2021-22860","STATE":"PUBLIC","TITLE":"EIC e-document system - Broken Authentication"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"e-document system","version":{"version_data":[{"version_affected":"=","version_name":"0","version_value":"3.0.2"},{"version_affected":"=","version_name":"0","version_value":"2.9"}]}}]},"vendor_name":"Excellent Infotek Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"EIC e-document system does not perform completed identity verification for sorting and filtering personnel data. The vulnerability allows remote attacker to obtain users’ credential information without logging in the system, and further acquire the privileged permissions and execute arbitrary commends."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Broken Authentication"}]}]},"references":{"reference_data":[{"name":"https://www.twcert.org.tw/tw/cp-132-4518-c813c-1.html","refsource":"MISC","url":"https://www.twcert.org.tw/tw/cp-132-4518-c813c-1.html"},{"name":"https://gist.github.com/tonykuo76/17d497b3472a80a5e8914227e81e6fa3","refsource":"MISC","url":"https://gist.github.com/tonykuo76/17d497b3472a80a5e8914227e81e6fa3"},{"name":"https://www.chtsecurity.com/news/12929036-924b-4b89-8a0e-3e7155e19011","refsource":"MISC","url":"https://www.chtsecurity.com/news/12929036-924b-4b89-8a0e-3e7155e19011"}]},"solution":[{"lang":"en","value":"Update to version 3.0.4"}],"source":{"advisory":"TVN-202101011","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T18:51:07.538Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.twcert.org.tw/tw/cp-132-4518-c813c-1.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://gist.github.com/tonykuo76/17d497b3472a80a5e8914227e81e6fa3"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.chtsecurity.com/news/12929036-924b-4b89-8a0e-3e7155e19011"}]}]},"cveMetadata":{"assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","assignerShortName":"twcert","cveId":"CVE-2021-22860","datePublished":"2021-03-17T09:10:31.510Z","dateReserved":"2021-01-06T00:00:00.000Z","dateUpdated":"2024-09-16T16:12:43.224Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}