99 lines
2.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-40274",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2022-09-30T17:15:13.217",
"lastModified": "2022-10-04T18:23:03.957",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Gridea version 0.9.3 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Gridea. This is possible because the application has the 'nodeIntegration' option enabled."
},
{
"lang": "es",
"value": "Gridea versi\u00f3n 0.9.3, permite a un atacante externo ejecutar c\u00f3digo arbitrario de forma remota en cualquier cliente que intente visualizar un archivo markdown malicioso mediante Gridea. Esto es posible porque la aplicaci\u00f3n presenta habilitada la opci\u00f3n \"nodeIntegration\""
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gridea:gridea:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B98837D1-2EB7-4910-8B77-2D607810B1BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/marshmello/",
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/getgridea/gridea",
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
}
]
}