2023-12-15 09:00:31 +00:00
{
"id" : "CVE-2023-48376" ,
"sourceIdentifier" : "twcert@cert.org.tw" ,
"published" : "2023-12-15T08:15:45.277" ,
2023-12-20 15:00:28 +00:00
"lastModified" : "2023-12-20T13:44:44.227" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-15 09:00:31 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "SmartStar Software CWS is a web-based integration platform, its file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service."
2023-12-15 15:00:30 +00:00
} ,
{
"lang" : "es" ,
"value" : "SmartStar Software CWS es una plataforma de integraci\u00f3n basada en web, su funci\u00f3n de carga de archivos no restringe la carga de archivos con tipos peligrosos. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad para cargar archivos arbitrarios y ejecutar comandos arbitrarios o interrumpir el servicio."
2023-12-15 09:00:31 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-12-20 15:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
} ,
2023-12-15 09:00:31 +00:00
{
"source" : "twcert@cert.org.tw" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2023-12-20 15:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-434"
}
]
} ,
2023-12-15 09:00:31 +00:00
{
"source" : "twcert@cert.org.tw" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-434"
}
]
}
] ,
2023-12-20 15:00:28 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:csharp:cws_collaborative_development_platform:10.25:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10CC0021-D5D9-4794-9ABE-DF8F1B21F6A2"
}
]
}
]
}
] ,
2023-12-15 09:00:31 +00:00
"references" : [
{
"url" : "https://www.twcert.org.tw/tw/cp-132-7595-d58b1-1.html" ,
2023-12-20 15:00:28 +00:00
"source" : "twcert@cert.org.tw" ,
"tags" : [
"Third Party Advisory"
]
2023-12-15 09:00:31 +00:00
}
]
}