cvelist/2019/5xxx/CVE-2019-5631.json

113 lines
3.1 KiB
JSON
Raw Normal View History

2019-01-07 15:03:33 -05:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"generator": {
"engine": "Vulnogram 0.0.7"
},
"CVE_data_meta": {
"ID": "CVE-2019-5631",
"ASSIGNER": "cve@rapid7.com",
"DATE_PUBLIC": "2019-07-10T21:30:00.000Z",
"TITLE": "Rapid7 InsightAppSec Local Privilege Escalation",
"AKA": "",
"STATE": "PUBLIC"
},
"source": {
"defect": [],
"advisory": "R7-2019-26",
"discovery": "EXTERNAL"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Rapid7",
"product": {
"product_data": [
{
"product_name": "InsightAppSec",
"version": {
"version_data": [
{
"version_name": "2019.06.24",
"version_affected": "<=",
"version_value": "2019.06.24",
"platform": ""
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-427: Uncontrolled Search Path Element"
}
2019-03-17 23:38:17 +00:00
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Rapid7 InsightAgent suffers from a DLL injection vulnerability in the 'prunsrv.exe' component of the product. If exploited, a local user of the system (who must already be authenticated to the operating system) can elevate their privileges with this vulnerability to the privilege level of InsightAppSec (usually, SYSTEM). This issue affects version 2019.06.24 and prior versions of the product."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://help.rapid7.com/insightappsec/release-notes/archive/2019/07/",
"name": "https://help.rapid7.com/insightappsec/release-notes/archive/2019/07/"
}
]
},
"configuration": [],
"impact": {
"cvss": {
"version": "3.0",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH"
}
},
"exploit": [],
"work_around": [
{
"lang": "eng",
"value": "In the absence of a vendor-supplied update, system administrators of machines running Rapid7 InsightAppSec should not grant local logon privileges to untrusted users. "
}
],
"solution": [
{
"lang": "eng",
"value": "Users should update Rapid7 InsightAppSec to version 2019.07.08 or later."
}
],
"credit": [
{
"lang": "eng",
"value": "This vulnerability was privately reported by security researcher Maciej Oszutowski to Rapid7."
2019-03-17 23:38:17 +00:00
}
]
}