cvelist/2023/6xxx/CVE-2023-6178.json

98 lines
3.4 KiB
JSON
Raw Normal View History

2023-11-16 17:00:34 +00:00
{
2023-11-20 21:00:35 +00:00
"data_version": "4.0",
2023-11-16 17:00:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6178",
2023-11-20 21:00:35 +00:00
"ASSIGNER": "vulnreport@tenable.com",
"STATE": "PUBLIC"
2023-11-16 17:00:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-11-20 21:00:35 +00:00
"value": "\nAn arbitrary file write vulnerability exists where an authenticated attacker with privileges on the managing application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition. \n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Tenable",
"product": {
"product_data": [
{
"product_name": "Nessus Agent",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "10.4.3",
"status": "affected",
"version": "0",
"versionType": "10.4.4"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.tenable.com/security/tns-2023-41",
"refsource": "MISC",
"name": "https://www.tenable.com/security/tns-2023-41"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "TNS-2023-41",
"discovery": "EXTERNAL"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
2023-11-16 17:00:34 +00:00
}
]
}
}