2023-10-16 12:00:28 +00:00
{
"id" : "CVE-2023-3991" ,
"sourceIdentifier" : "cve_disclosure@tech.gov.sg" ,
"published" : "2023-10-16T10:15:11.000" ,
2023-10-29 09:06:41 +00:00
"lastModified" : "2023-10-20T15:21:56.180" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-10-16 12:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An OS command injection vulnerability exists in the httpd iperfrun.cgi functionality of FreshTomato 2023.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability."
2023-10-29 09:06:41 +00:00
} ,
{
"lang" : "es" ,
"value" : "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funcionalidad httpd iperfrun.cgi de FreshTomato 2023.3. Una solicitud HTTP especialmente manipulada puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede enviar una solicitud HTTP para desencadenar esta vulnerabilidad."
2023-10-16 12:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-10-29 09:06:41 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
} ,
2023-10-16 12:00:28 +00:00
{
"source" : "cve_disclosure@tech.gov.sg" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 10.0 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 6.0
}
]
} ,
"weaknesses" : [
2023-10-29 09:06:41 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
} ,
2023-10-16 12:00:28 +00:00
{
"source" : "cve_disclosure@tech.gov.sg" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
}
] ,
2023-10-29 09:06:41 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freshtomato:freshtomato:2023.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C445939-BA12-44AD-928C-F0D2C52F3B9E"
}
]
}
]
}
] ,
2023-10-16 12:00:28 +00:00
"references" : [
{
"url" : "https://govtech-csg.github.io/security-advisories/2023/10/16/CVE-2023-3991.html" ,
2023-10-29 09:06:41 +00:00
"source" : "cve_disclosure@tech.gov.sg" ,
"tags" : [
"Third Party Advisory"
]
2023-10-16 12:00:28 +00:00
}
]
}