cvelist/2023/42xxx/CVE-2023-42659.json

109 lines
4.2 KiB
JSON
Raw Normal View History

2023-09-12 14:00:33 +00:00
{
2023-11-07 16:00:36 +00:00
"data_version": "4.0",
2023-09-12 14:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-42659",
2023-11-07 16:00:36 +00:00
"ASSIGNER": "security@progress.com",
"STATE": "PUBLIC"
2023-09-12 14:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-11-07 16:00:36 +00:00
"value": "\nIn WS_FTP Server versions prior to 8.7.6 and 8.8.4, an unrestricted file upload flaw has been identified. An authenticated Ad Hoc Transfer user has the ability to craft an API call which allows them to upload a file to a specified location on the underlying operating system hosting the WS_FTP Server application.\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"cweId": "CWE-434"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Progress Software Corporation",
"product": {
"product_data": [
{
"product_name": "WS_FTP Server",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "8.8.4",
"status": "affected",
"version": "8.8.0",
"versionType": "semver"
},
{
"lessThan": "8.7.6",
"status": "affected",
"version": "8.7.0",
"versionType": "semver"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.progress.com/ws_ftp",
"refsource": "MISC",
"name": "https://www.progress.com/ws_ftp"
},
{
"url": "https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-November-2023",
"refsource": "MISC",
"name": "https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-November-2023"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
2023-09-12 14:00:33 +00:00
}
]
}
}