108 lines
3.2 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-40282",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-25T05:15:13.010",
"lastModified": "2023-08-08T14:22:24.967",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The web server of Hirschmann BAT-C2 before 09.13.01.00R04 allows authenticated command injection. This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21."
},
{
"lang": "es",
"value": "El servidor web de Hirschmann BAT-C2 anterior a 09.13.01.00R04 permite la inyecci\u00f3n de comandos autenticados. Esto permite que un atacante autenticado pase comandos al shell del sistema porque el par\u00e1metro dir de la funci\u00f3n FsCreateDir Ajax no est\u00e1 suficientemente sanitizado. La identificaci\u00f3n del proveedor es BSECV-2022-21."
2023-04-24 12:24:31 +02:00
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
2023-04-24 12:24:31 +02:00
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:belden:hirschmann_bat-c2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "09.13.00r04",
"matchCriteriaId": "A42848A3-9A6A-4B3F-893D-FAE33A049182"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:belden:hirschmann_bat-c2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "502010B9-C883-45A4-9126-4936DFB65EC0"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2022/Nov/19",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.belden.com/support/security-assurance",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}