CVE-2020-36127

Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by an information disclosure vulnerability. Through the PUK signature functionality, an administrator will not have access to the current p12 certificate and password. When accessing this functionality, the administrator has the option to replace the current certificate and it is not possible to view the certificate password (p12) already deployed on the platform. The replacement p12 certificate returns to users in base64 with its password, which can be accessed by non-administrator users.
Configurations

Configuration 1 (hide)

cpe:2.3:a:paxtechnology:paxstore:*:*:*:*:*:*:*:*

History

13 May 2021, 15:00

Type Values Removed Values Added
References (MISC) https://marketing.paxtechnology.com/about-pax - (MISC) https://marketing.paxtechnology.com/about-pax - Product
References (MISC) https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ - (MISC) https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ - Exploit, Third Party Advisory
References (MISC) https://www.whatspos.com/ - (MISC) https://www.whatspos.com/ - Product
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 6.5
CWE CWE-295
CPE cpe:2.3:a:paxtechnology:paxstore:*:*:*:*:*:*:*:*

07 May 2021, 18:30

Type Values Removed Values Added

07 May 2021, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-07 11:15

Updated : 2023-12-10 13:55


NVD link : CVE-2020-36127

Mitre link : CVE-2020-36127

CVE.ORG link : CVE-2020-36127


JSON object : View

Products Affected

paxtechnology

  • paxstore
CWE
CWE-295

Improper Certificate Validation