{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T16:21:26.644","vulnerabilities":[{"cve":{"id":"CVE-2020-14341","sourceIdentifier":"secalert@redhat.com","published":"2021-01-12T15:15:13.593","lastModified":"2024-11-21T05:03:02.947","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The \"Test Connection\" available in v7.x of the Red Hat Single Sign On application console can permit an authorized user to cause SMTP connections to be attempted to arbitrary hosts and ports of the user's choosing, and originating from the RHSSO installation. By observing differences in the timings of these scans, an attacker may glean information about hosts and ports which they do not have access to scan directly."},{"lang":"es","value":"La \"Test Connection\" disponible en la versión v7.x de la consola de la aplicación Red Hat Single Sign On puede permitir a un usuario autorizado causar conexiones SMTP que se intentarán con hosts y puertos arbitrarios para hosts y puertos arbitrarios que elija el usuario, y que se originen la instalación de RHSSO.&#xa0;Al observar las diferencias en los tiempos de estos análisis, un atacante puede obtener información sobre hosts y puertos a los que no tiene acceso para analizar directamente"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N","baseScore":2.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-385"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0","versionEndIncluding":"7.4","matchCriteriaId":"6999270F-5739-486B-A2C2-1DA8E746D8DB"}]}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1860138","source":"secalert@redhat.com","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1860138","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Vendor Advisory"]}]}}]}