89 lines
2.6 KiB
JSON
Raw Normal View History

{
"id": "CVE-2022-41763",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T13:15:07.717",
"lastModified": "2024-11-21T07:23:48.080",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in NOKIA AMS 9.7.05. Remote Code Execution exists via the debugger of the ipAddress variable. A remote user, authenticated to the AMS server, could inject code in the PING function. The privileges of the command executed depend on the user that runs the service."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en NOKIA AMS v9.7.05. Existe ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s del depurador de la variable \"ipAddress\". Un usuario remoto autenticado en el servidor AMS, podr\u00eda inyectar c\u00f3digo en la funci\u00f3n PING. Los privilegios del comando ejecutado depende del usuario que ejecuta el servicio. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nokia:access_management_system:9.7.05:*:*:*:*:*:*:*",
"matchCriteriaId": "1E5A3717-77A8-476F-939F-530FACD43166"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}