cvelist/2021/46xxx/CVE-2021-46686.json

95 lines
3.3 KiB
JSON
Raw Normal View History

2025-02-12 08:00:36 +00:00
{
2025-02-18 00:00:33 +00:00
"data_version": "4.0",
2025-02-12 08:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2021-46686",
2025-02-18 00:00:33 +00:00
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
2025-02-12 08:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2025-02-18 00:00:33 +00:00
"value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in acmailer CGI ver.4.0.3 and earlier and acmailer DB ver.1.1.5 and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper neutralization of special elements used in an OS command ('OS Command Injection')",
"cweId": "CWE-78"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Extra Innovation Inc.",
"product": {
"product_data": [
{
"product_name": "acmailer CGI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "ver.4.0.3 and earlier"
}
]
}
},
{
"product_name": "acmailer DB",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "ver.1.1.5 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://acmailer.jp/info/de.cgi?id=103",
"refsource": "MISC",
"name": "https://acmailer.jp/info/de.cgi?id=103"
},
{
"url": "https://www.acmailer.jp/info/de.cgi?id=102",
"refsource": "MISC",
"name": "https://www.acmailer.jp/info/de.cgi?id=102"
},
{
"url": "https://jvn.jp/en/jp/JVN96957439/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN96957439/"
}
]
},
"impact": {
"cvss": [
{
"version": "3.0",
"baseSeverity": "CRITICAL",
"baseScore": 9.8,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
2025-02-12 08:00:36 +00:00
}
]
}
}