mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
101 lines
3.6 KiB
JSON
101 lines
3.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2020-10189",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://srcincite.io/advisories/src-2020-0011/",
|
|
"refsource": "MISC",
|
|
"name": "https://srcincite.io/advisories/src-2020-0011/"
|
|
},
|
|
{
|
|
"url": "https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/",
|
|
"refsource": "MISC",
|
|
"name": "https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/"
|
|
},
|
|
{
|
|
"url": "https://srcincite.io/pocs/src-2020-0011.py.txt",
|
|
"refsource": "MISC",
|
|
"name": "https://srcincite.io/pocs/src-2020-0011.py.txt"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html",
|
|
"url": "https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html",
|
|
"url": "http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://cwe.mitre.org/data/definitions/502.html",
|
|
"url": "https://cwe.mitre.org/data/definitions/502.html"
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
|
|
"version": "3.0"
|
|
}
|
|
}
|
|
} |