136 lines
4.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-7360",
"sourceIdentifier": "cve@rapid7.com",
2023-04-24 12:24:31 +02:00
"published": "2020-08-13T19:15:14.113",
"lastModified": "2020-08-19T21:26:02.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An Uncontrolled Search Path Element (CWE-427) vulnerability in SmartControl version 4.3.15 and versions released before April 15, 2020 may allow an authenticated user to escalate privileges by placing a specially crafted DLL file in the search path. This issue was fixed in version 1.0.7, which was released after April 15, 2020. (Note, the version numbering system changed significantly between version 4.3.15 and version 1.0.7.)"
},
{
"lang": "es",
"value": "(CWE-427) Una vulnerabilidad de Elemento Ruta B\u00fasqueda no Controlada en SmartControl versi\u00f3n 4.3.15 y versiones publicadas antes del 15 de abril de 2020, puede permitir a un usuario autenticado escalar privilegios al colocar un archivo DLL especialmente dise\u00f1ado en la ruta de b\u00fasqueda. Este problema fue corregido en la versi\u00f3n 1.0.7, que fue publicado despu\u00e9s del 15 de abril de 2020 (tome en cuenta que el sistema de numeraci\u00f3n de versiones cambi\u00f3 significativamente entre la versi\u00f3n 4.3.15 y la versi\u00f3n 1.0.7)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
},
{
"source": "cve@rapid7.com",
2023-04-24 12:24:31 +02:00
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
},
{
"source": "cve@rapid7.com",
2023-04-24 12:24:31 +02:00
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:philips:smartcontrol:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.3.15",
"matchCriteriaId": "AA868B5E-9DFE-4741-9EDF-C06FB73FBAAA"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.vonahi.io/when-the-path-to-system-is-wide-open/",
"source": "cve@rapid7.com",
2023-04-24 12:24:31 +02:00
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}