Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://github.com/opendistro-for-elasticsearch/alerting/pull/353", "name": "https://github.com/opendistro-for-elasticsearch/alerting/pull/353", "tags": ["Patch", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://opendistro.github.io/for-elasticsearch-docs/version-history/", "name": "https://opendistro.github.io/for-elasticsearch-docs/version-history/", "tags": ["Release Notes", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://rotem-bar.com/ssrf-in-open-distro-for-elasticsearch-cve-2021-31828", "name": "https://rotem-bar.com/ssrf-in-open-distro-for-elasticsearch-cve-2021-31828", "tags": ["Third Party Advisory"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "An SSRF issue in Open Distro for Elasticsearch (ODFE) before 1.13.1.0 allows an existing privileged user to enumerate listening services or interact with configured resources via HTTP requests exceeding the Alerting plugin's intended scope."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-918"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2021-31828", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 4.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 4.2, "exploitabilityScore": 2.8}}, "publishedDate": "2021-05-06T19:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:amazon:open_distro:*:*:*:*:*:elasticsearch:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.13.1.0"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-05-18T13:26Z"}