135 lines
4.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2018-5404",
"sourceIdentifier": "cret@cert.org",
"published": "2019-06-03T19:29:01.593",
"lastModified": "2019-10-09T23:41:18.487",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Quest Kace K1000 Appliance, versions prior to 9.0.270, allows an authenticated, remote attacker with least privileges ('User Console Only' role) to potentially exploit multiple Blind SQL Injection vulnerabilities to retrieve sensitive information from the database or copy the entire database. An authenticated remote attacker could leverage Blind SQL injections to obtain sensitive data."
},
{
"lang": "es",
"value": "El dispositivo Quest Kace K1000, versiones anteriores a 9.0.270, permite a un atacante remoto autenticado con los privilegios m\u00ednimos (funci\u00f3n 'Solo consola de usuario') explotar varias vulnerabilidades de Inyecci\u00f3n SQL ciega para recuperar informaci\u00f3n confidencial de la base de datos o copiar la base de datos completa. Un atacante remoto autenticado podr\u00eda aprovechar las inyecciones SQL ciegas para obtener datos confidenciales."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cret@cert.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:quest:kace_systems_management_appliance_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.0.270",
"matchCriteriaId": "24B925CF-12DB-4729-8FD9-5CA8872B6679"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:quest:kace_systems_management_appliance:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15602132-D4C9-466E-9973-CDE289F23363"
}
]
}
]
}
],
"references": [
{
"url": "https://support.quest.com/kb/288310/cert-coordination-center-report-update",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/877837/",
"source": "cret@cert.org",
"tags": [
"US Government Resource",
"Third Party Advisory"
]
}
]
}