cvelist/2020/11xxx/CVE-2020-11733.json

67 lines
2.3 KiB
JSON
Raw Normal View History

2020-04-13 02:01:42 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-08-13 14:04:26 +00:00
"ID": "CVE-2020-11733",
"STATE": "PUBLIC"
2020-04-13 02:01:42 +00:00
},
2020-08-13 14:04:26 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-04-13 02:01:42 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-08-13 14:04:26 +00:00
"value": "An issue was discovered on Spirent TestCenter and Avalanche appliance admin interface firmware. An attacker, who already has access to an SSH restricted shell, can achieve root access via shell metacharacters. The attacker can then, for example, read sensitive files such as appliance admin configuration source code. This affects Spirent TestCenter and Avalanche products which chassis version <= 5.08. The SSH restricted shell is available with default credentials."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://gist.github.com/a05110511t/65d07bc776d7c11b4ccf112a09cca4ab",
"url": "https://gist.github.com/a05110511t/65d07bc776d7c11b4ccf112a09cca4ab"
},
{
"refsource": "MISC",
"name": "https://github.com/a05110511t/CVE/blob/master/CVE-2020-11733.md",
"url": "https://github.com/a05110511t/CVE/blob/master/CVE-2020-11733.md"
2020-04-13 02:01:42 +00:00
}
]
}
}