cvelist/2023/20xxx/CVE-2023-20274.json

195 lines
8.9 KiB
JSON
Raw Normal View History

2022-10-27 19:00:52 +00:00
{
2023-11-21 19:00:35 +00:00
"data_version": "4.0",
2022-10-27 19:00:52 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-20274",
2023-11-21 19:00:35 +00:00
"ASSIGNER": "psirt@cisco.com",
"STATE": "PUBLIC"
2022-10-27 19:00:52 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-11-21 19:00:35 +00:00
"value": "A vulnerability in the installer script of Cisco AppDynamics PHP Agent could allow an authenticated, local attacker to elevate privileges on an affected device.\r\n\r This vulnerability is due to insufficient permissions that are set by the PHP Agent Installer on the PHP Agent install directory. An attacker could exploit this vulnerability by modifying objects in the PHP Agent install directory, which would run with the same privileges as PHP. A successful exploit could allow a lower-privileged attacker to elevate their privileges to root on an affected device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2024-01-25 17:06:19 +00:00
"value": "Improper Privilege Management",
"cweId": "CWE-269"
2023-11-21 19:00:35 +00:00
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Cisco",
"product": {
"product_data": [
{
"product_name": "Cisco AppDynamics",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "21.2.7"
},
{
"version_affected": "=",
"version_value": "21.2.8"
},
{
"version_affected": "=",
"version_value": "21.4.0"
},
{
"version_affected": "=",
"version_value": "21.4.10"
},
{
"version_affected": "=",
"version_value": "21.4.11"
},
{
"version_affected": "=",
"version_value": "21.4.2"
},
{
"version_affected": "=",
"version_value": "21.4.3"
},
{
"version_affected": "=",
"version_value": "21.4.4"
},
{
"version_affected": "=",
"version_value": "21.4.5"
},
{
"version_affected": "=",
"version_value": "21.4.6"
},
{
"version_affected": "=",
"version_value": "21.4.7"
},
{
"version_affected": "=",
"version_value": "21.4.8"
},
{
"version_affected": "=",
"version_value": "21.4.9"
},
{
"version_affected": "=",
"version_value": "21.5.0"
},
{
"version_affected": "=",
"version_value": "21.6.0"
},
{
"version_affected": "=",
"version_value": "22.1.0"
},
{
"version_affected": "=",
"version_value": "22.1.1"
},
{
"version_affected": "=",
"version_value": "22.11.0"
},
{
"version_affected": "=",
"version_value": "22.3.0"
},
{
"version_affected": "=",
"version_value": "22.10.0"
},
{
"version_affected": "=",
"version_value": "22.12.0"
},
{
"version_affected": "=",
"version_value": "22.12.1"
},
{
"version_affected": "=",
"version_value": "21.7.0"
},
{
"version_affected": "=",
"version_value": "22.8.0"
},
{
"version_affected": "=",
"version_value": "23.2.0"
},
{
"version_affected": "=",
"version_value": "23.4.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-php-authpriv-gEBwTvu5",
"refsource": "MISC",
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-php-authpriv-gEBwTvu5"
}
]
},
"source": {
"advisory": "cisco-sa-appd-php-authpriv-gEBwTvu5",
"discovery": "INTERNAL",
"defects": [
"CSCwh65119"
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
2022-10-27 19:00:52 +00:00
}
]
}
}