cvelist/2018/7xxx/CVE-2018-7300.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2018-02-21 15:05:08 -05:00
{
2019-03-18 01:04:45 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-7300",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-02-22 14:04:20 -05:00
{
2019-03-18 01:04:45 +00:00
"lang": "eng",
"value": "Directory Traversal / Arbitrary File Write / Remote Code Execution in the User.setLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to write arbitrary files to the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface."
2018-02-22 14:04:20 -05:00
}
2019-03-18 01:04:45 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://atomic111.github.io/article/homematic-ccu2-filewrite",
"refsource": "MISC",
"url": "http://atomic111.github.io/article/homematic-ccu2-filewrite"
},
{
"name": "44361",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44361/"
}
]
}
}