mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
63 lines
2.2 KiB
JSON
63 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cybersecurity@schneider-electric.com",
|
|
"DATE_PUBLIC": "2018-05-22T00:00:00",
|
|
"ID": "CVE-2018-7783",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "SoMachine Basic",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "SoMachine Basic prior to v1.6 SP1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Schneider Electric SE"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Schneider Electric SoMachine Basic prior to v1.6 SP1 suffers from an XML External Entity (XXE) vulnerability using the DTD parameter entities technique resulting in disclosure and retrieval of arbitrary data on the affected node via out-of-band (OOB) attack. The vulnerability is triggered when input passed to the xml parser is not sanitized while parsing the xml project/template file."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Out-Of-Band Remote Arbitrary Data Retrieval"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://www.schneider-electric.com/en/download/document/SEVD-2018-142-01/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-142-01/"
|
|
}
|
|
]
|
|
}
|
|
} |