cvelist/2021/34xxx/CVE-2021-34602.json

194 lines
8.2 KiB
JSON
Raw Normal View History

2021-06-10 20:00:51 +00:00
{
"CVE_data_meta": {
2022-04-27 17:10:21 +02:00
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2022-04-27T10:00:00.000Z",
2021-06-10 20:00:51 +00:00
"ID": "CVE-2021-34602",
2022-04-27 17:10:21 +02:00
"STATE": "PUBLIC",
"TITLE": "Bender Charge Controller: Long URL could lead to webserver crash"
2021-06-10 20:00:51 +00:00
},
2022-04-27 17:10:21 +02:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CC612",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "5.11.x",
"version_value": "5.11.2"
},
{
"version_affected": "<",
"version_name": "5.12.x",
"version_value": "5.12.5"
},
{
"version_affected": "<",
"version_name": "5.13.x",
"version_value": "5.13.2"
},
{
"version_affected": "<",
"version_name": "5.20.x",
"version_value": "5.20.2"
}
]
}
},
{
"product_name": "CC613",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "5.11.x",
"version_value": "5.11.2"
},
{
"version_affected": "<",
"version_name": "5.12.x",
"version_value": "5.12.5"
},
{
"version_affected": "<",
"version_name": "5.13.x",
"version_value": "5.13.2"
},
{
"version_affected": "<",
"version_name": "5.20.x",
"version_value": "5.20.2"
}
]
}
},
{
"product_name": "ICC15xx",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "5.11.x",
"version_value": "5.11.2"
},
{
"version_affected": "<",
"version_name": "5.12.x",
"version_value": "5.12.5"
},
{
"version_affected": "<",
"version_name": "5.13.x",
"version_value": "5.13.2"
},
{
"version_affected": "<",
"version_name": "5.20.x",
"version_value": "5.20.2"
}
]
}
},
{
"product_name": "ICC16xx",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "5.11.x",
"version_value": "5.11.2"
},
{
"version_affected": "<",
"version_name": "5.12.x",
"version_value": "5.12.5"
},
{
"version_affected": "<",
"version_name": "5.13.x",
"version_value": "5.13.2"
},
{
"version_affected": "<",
"version_name": "5.20.x",
"version_value": "5.20.2"
}
]
}
}
]
},
"vendor_name": "Bender / ebee"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Bender thanks Qianxin StarV Security Lab, China. The issue was coordinated by CERT@VDE."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-06-10 20:00:51 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-04-27 17:10:21 +02:00
"value": "In Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields that are executed with root privileges."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 OS Command Injection"
}
]
2021-06-10 20:00:51 +00:00
}
]
2022-04-27 17:10:21 +02:00
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en/advisories/VDE-2021-047",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en/advisories/VDE-2021-047"
}
]
},
"source": {
"advisory": "VDE-2021-047",
"defect": [
"CERT@VDE#64027"
],
"discovery": "EXTERNAL"
2021-06-10 20:00:51 +00:00
}
}