87 lines
2.3 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-41149",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-06T13:15:09.117",
"lastModified": "2023-09-08T21:21:47.880",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "F-RevoCRM version7.3.7 and version7.3.8 contains an OS command injection vulnerability. If this vulnerability is exploited, an attacker who can access the product may execute an arbitrary OS command on the server where the product is running."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f-revocrm:f-revocrm:7.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "474DBB2C-1655-4EFE-AECD-A98C6A6E246B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f-revocrm:f-revocrm:7.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8C1BF5CB-4DAB-4CB3-879E-05FF74092E4B"
}
]
}
]
}
],
"references": [
{
"url": "http://jvn.jp/en/jp/JVN78113802/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://f-revocrm.jp/2023/08/9394/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}
]
}