119 lines
3.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-46306",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-01-03T03:15:10.637",
"lastModified": "2024-11-21T07:30:21.113",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "ChangingTec ServiSign component has a path traversal vulnerability due to insufficient filtering for special characters in the DLL file path. An unauthenticated remote attacker can host a malicious website for the component user to access, which triggers the component to load malicious DLL files under arbitrary file path and allows the attacker to perform arbitrary system operation and disrupt of service."
},
{
"lang": "es",
"value": "El componente ChangingTec ServiSign tiene una vulnerabilidad de Path Traversal debido a un filtrado insuficiente de caracteres especiales en la ruta del archivo DLL. Un atacante remoto no autenticado puede alojar un sitio web malicioso al que puede acceder el usuario del componente, lo que hace que el componente cargue archivos DLL maliciosos en una ruta de archivo arbitraria y permite al atacante realizar operaciones arbitrarias del sistema e interrumpir el servicio."
2023-04-24 12:24:31 +02:00
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
2023-04-24 12:24:31 +02:00
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
2023-04-24 12:24:31 +02:00
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 2.8,
2023-04-24 12:24:31 +02:00
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
2023-04-24 12:24:31 +02:00
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
2023-04-24 12:24:31 +02:00
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 1.8,
2023-04-24 12:24:31 +02:00
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
2023-04-24 12:24:31 +02:00
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
2023-04-24 12:24:31 +02:00
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:changingtec:servisign:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB1F1012-3AFF-4D76-AEB6-BDEADFE1423F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-6802-4341b-1.html",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-6802-4341b-1.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
}
]
}