{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-23203","assignerOrgId":"22c90092-d340-4fb8-a06e-f1193e012523","state":"PUBLISHED","assignerShortName":"odoo","dateReserved":"2021-07-20T14:28:12.189Z","datePublished":"2023-04-25T18:35:38.489Z","dateUpdated":"2025-02-03T17:14:04.331Z"},"containers":{"cna":{"providerMetadata":{"orgId":"22c90092-d340-4fb8-a06e-f1193e012523","shortName":"odoo","dateUpdated":"2024-07-15T00:27:54.327Z"},"affected":[{"vendor":"Odoo","product":"Odoo Community","defaultStatus":"unaffected","versions":[{"version":"14.0","status":"affected","lessThanOrEqual":"15.0","versionType":"semver"}]},{"vendor":"Odoo","product":"Odoo Enterprise","defaultStatus":"unaffected","versions":[{"version":"14.0","status":"affected","lessThanOrEqual":"15.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"Improper access control in reporting engine of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to download PDF reports for arbitrary documents, via crafted requests."}],"references":[{"url":"https://github.com/odoo/odoo/issues/107695"},{"url":"https://www.debian.org/security/2023/dsa-5399"}],"metrics":[{"format":"CVSS","cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-284","description":"Improper Access Control","type":"CWE"}]}],"credits":[{"lang":"eng","value":"Tiffany Chang","type":"finder"},{"lang":"eng","value":"iamsushi","type":"finder"},{"lang":"eng","value":"Ranjit Pahan","type":"finder"},{"lang":"eng","value":"Iago Ruiz","type":"finder"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:05:55.598Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/odoo/odoo/issues/107695","tags":["x_transferred"]},{"url":"https://www.debian.org/security/2023/dsa-5399","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-863","lang":"en","description":"CWE-863 Incorrect Authorization"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-03T17:13:00.406283Z","id":"CVE-2021-23203","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-03T17:14:04.331Z"}}]}}