2020-01-22 14:01:07 +00:00
{
"CVE_data_meta" : {
2020-05-28 14:01:19 +00:00
"ASSIGNER" : "vuln@krcert.or.kr" ,
2020-01-22 14:01:07 +00:00
"ID" : "CVE-2020-7812" ,
2020-05-28 14:01:19 +00:00
"STATE" : "PUBLIC" ,
"TITLE" : "Kaoni ezHTTPTrans Active-X File Download and Execution Vulnerability"
2020-01-22 14:01:07 +00:00
} ,
2020-05-28 14:01:19 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "ezHTTPTrans" ,
"version" : {
"version_data" : [
{
"version_affected" : "<=" ,
"version_name" : "1.0.0.70" ,
"version_value" : "1.0.0.90"
}
]
}
}
]
} ,
"vendor_name" : "Kaoni"
}
]
}
} ,
"credit" : [
{
"lang" : "eng" ,
"value" : "Thanks to Eunsol Lee for this vulnerability report."
}
] ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2020-01-22 14:01:07 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2020-05-28 14:01:19 +00:00
"value" : "Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim\u2019s PC."
2020-01-22 14:01:07 +00:00
}
]
2020-05-28 14:01:19 +00:00
} ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "LOW" ,
"attackVector" : "LOCAL" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "REQUIRED" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
"version" : "3.1"
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-494 Download of Code Without Integrity Check"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"url" : "http://www.kaoni.com/" ,
"name" : "http://www.kaoni.com/"
} ,
{
"refsource" : "MISC" ,
"url" : "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428" ,
"name" : "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428"
}
]
} ,
"source" : {
"discovery" : "EXTERNAL"
2020-01-22 14:01:07 +00:00
}
}