{"containers":{"cna":{"affected":[{"product":"HCL BigFix Inventory","vendor":"HCL Software","versions":[{"status":"affected","version":"9.x"},{"status":"affected","version":"10.x"}]}],"datePublic":"2022-04-28T00:00:00.000Z","descriptions":[{"lang":"en","value":"This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. An attacker can cause a victim's browser to emit an HTTP request to an arbitrary URL in the application."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","availabilityRequirement":"LOW","baseScore":2.3,"baseSeverity":"LOW","confidentialityImpact":"LOW","confidentialityRequirement":"LOW","environmentalScore":1.6,"environmentalSeverity":"LOW","exploitCodeMaturity":"FUNCTIONAL","integrityImpact":"NONE","integrityRequirement":"LOW","modifiedAttackComplexity":"HIGH","modifiedAttackVector":"ADJACENT_NETWORK","modifiedAvailabilityImpact":"NONE","modifiedConfidentialityImpact":"LOW","modifiedIntegrityImpact":"NONE","modifiedPrivilegesRequired":"LOW","modifiedScope":"UNCHANGED","modifiedUserInteraction":"REQUIRED","privilegesRequired":"LOW","remediationLevel":"UNAVAILABLE","reportConfidence":"CONFIRMED","scope":"UNCHANGED","temporalScore":2.3,"temporalSeverity":"LOW","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:L/IR:L/AR:L/MAV:A/MAC:H/MPR:L/MUI:R/MS:U/MC:X/MI:N/MA:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-05-06T18:10:29.000Z","orgId":"1e47fe04-f25f-42fa-b674-36de2c5e3cfc","shortName":"HCL"},"references":[{"tags":["x_refsource_MISC"],"url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@hcl.com","DATE_PUBLIC":"2022-04-28T00:00:00.000Z","ID":"CVE-2021-27759","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"HCL BigFix Inventory","version":{"version_data":[{"version_value":"9.x"},{"version_value":"10.x"}]}}]},"vendor_name":"HCL Software"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. An attacker can cause a victim's browser to emit an HTTP request to an arbitrary URL in the application."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":1.6,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:L/IR:L/AR:L/MAV:A/MAC:H/MPR:L/MUI:R/MS:U/MC:X/MI:N/MA:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}]},"references":{"reference_data":[{"name":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006","refsource":"MISC","url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T21:26:10.810Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"}]}]},"cveMetadata":{"assignerOrgId":"1e47fe04-f25f-42fa-b674-36de2c5e3cfc","assignerShortName":"HCL","cveId":"CVE-2021-27759","datePublished":"2022-05-06T18:10:29.374Z","dateReserved":"2021-02-26T00:00:00.000Z","dateUpdated":"2024-09-17T04:19:25.489Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}