cvelist/2019/12xxx/CVE-2019-12328.json

76 lines
2.4 KiB
JSON
Raw Normal View History

2019-05-27 19:00:46 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2019-07-22 18:00:49 +00:00
"ID": "CVE-2019-12328",
"STATE": "PUBLIC"
2019-05-27 19:00:46 +00:00
},
2019-07-22 18:00:49 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-05-27 19:00:46 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2019-07-22 18:00:49 +00:00
"value": "A command injection (missing input validation) issue in the remote phonebook configuration URI in the web interface of the Atcom A10W VoIP phone with firmware 2.6.1a2421 allows an authenticated remote attacker in the same network to trigger OS commands via shell metacharacters in a POST request."
2019-05-27 19:00:46 +00:00
}
]
2019-07-22 18:00:49 +00:00
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Atcom_A10W.pdf",
"refsource": "MISC",
"name": "https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Atcom_A10W.pdf"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:H/I:H/PR:L/S:C/UI:N",
"version": "3.0"
}
2019-05-27 19:00:46 +00:00
}
}