2023-10-05 20:01:36 +00:00
{
"id" : "CVE-2023-43070" ,
"sourceIdentifier" : "security_alert@emc.com" ,
"published" : "2023-10-05T18:15:12.240" ,
2023-10-06 18:00:28 +00:00
"lastModified" : "2023-10-06T17:57:03.317" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-10-05 20:01:36 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "\nDell SmartFabric Storage Software v1.4 (and earlier) contains a Path Traversal Vulnerability in the HTTP interface. A remote authenticated attacker could potentially exploit this vulnerability, leading to modify or write arbitrary files to arbitrary locations in the license container.\n\n"
2023-10-06 18:00:28 +00:00
} ,
{
"lang" : "es" ,
2024-04-04 08:46:00 +00:00
"value" : "Dell SmartFabric Storage Software v1.4 (y anteriores) contiene una vulnerabilidad de path traversal en la interfaz HTTP. Un atacante autenticado remoto podr\u00eda explotar esta vulnerabilidad, lo que podr\u00eda provocar la modificaci\u00f3n o escritura de archivos arbitrarios en ubicaciones arbitrarias del contenedor de licencias."
2023-10-05 20:01:36 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-10-06 18:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
} ,
2023-10-05 20:01:36 +00:00
{
"source" : "security_alert@emc.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 6.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.4
}
]
} ,
"weaknesses" : [
{
"source" : "security_alert@emc.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-22"
}
]
}
] ,
2023-10-06 18:00:28 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dell:smartfabric_storage_software:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.4.1" ,
"matchCriteriaId" : "9BD8875C-3CAC-443C-A6B5-FE7F702B5DFD"
}
]
}
]
}
] ,
2023-10-05 20:01:36 +00:00
"references" : [
{
"url" : "https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities" ,
2023-10-06 18:00:28 +00:00
"source" : "security_alert@emc.com" ,
"tags" : [
"Vendor Advisory"
]
2023-10-05 20:01:36 +00:00
}
]
}