mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
77 lines
2.7 KiB
JSON
77 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security_alert@emc.com",
|
|
"ID": "CVE-2017-8007",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "EMC ViPR SRM, EMC Storage M&R, EMC VNX M&R, EMC M&R (Watch4Net) for SAS Solution Packs",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "EMC ViPR SRM, EMC Storage M&R, EMC VNX M&R, EMC M&R (Watch4Net) for SAS Solution Packs"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In EMC ViPR SRM, Storage M&R, VNX M&R, and M&R (Watch4Net) for SAS Solution Packs, the Webservice Gateway is affected by a directory traversal vulnerability. Attackers with knowledge of Webservice Gateway credentials could potentially exploit this vulnerability to access unauthorized information, and modify or delete data, by supplying specially crafted strings in input parameters of the web service call."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Directory Traversal"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "100957",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/100957"
|
|
},
|
|
{
|
|
"name": "1039418",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1039418"
|
|
},
|
|
{
|
|
"name": "http://seclists.org/fulldisclosure/2017/Sep/51",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://seclists.org/fulldisclosure/2017/Sep/51"
|
|
},
|
|
{
|
|
"name": "1039417",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1039417"
|
|
}
|
|
]
|
|
}
|
|
} |