cvelist/2020/13xxx/CVE-2020-13542.json

70 lines
2.2 KiB
JSON
Raw Normal View History

2020-05-26 15:01:39 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13542",
2020-12-03 17:01:36 +00:00
"ASSIGNER": "talos-cna@cisco.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "LogicalDoc",
"version": {
"version_data": [
{
"version_value": "LogicalDoc 8.5.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "local privilege escalation"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1154",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1154"
}
]
2020-05-26 15:01:39 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-12-03 17:01:36 +00:00
"value": "A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges."
2020-05-26 15:01:39 +00:00
}
]
2022-04-19 11:47:58 -04:00
},
"impact": {
"cvss": {
"baseScore": 9.3,
"baseSeverity": "Critical",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
2020-05-26 15:01:39 +00:00
}
}