cvelist/2020/14xxx/CVE-2020-14030.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2020-06-11 16:01:21 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-09-30 18:01:40 +00:00
"ID": "CVE-2020-14030",
"STATE": "PUBLIC"
2020-06-11 16:01:21 +00:00
},
2020-09-30 18:01:40 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-06-11 16:01:21 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-09-30 18:01:40 +00:00
"value": "An issue was discovered in Ozeki NG SMS Gateway through 4.17.6. It stores SMS messages in .NET serialized format on the filesystem. By generating (and writing to the disk) malicious .NET serialized files, an attacker can trick the product into deserializing them, resulting in arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://www.ozeki.hu/index.php?owpn=231",
"refsource": "MISC",
"name": "http://www.ozeki.hu/index.php?owpn=231"
},
{
"refsource": "MISC",
"name": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway",
"url": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway"
2020-06-11 16:01:21 +00:00
}
]
}
}