118 lines
3.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-37060",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-18T17:15:08.033",
"lastModified": "2022-12-12T21:11:38.377",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "FLIR AX8 thermal sensor cameras version up to and including 1.46.16 is vulnerable to Directory Traversal due to an improper access restriction. An unauthenticated, remote attacker can exploit this by sending a URI that contains directory traversal characters to disclose the contents of files located outside of the server's restricted path."
},
{
"lang": "es",
"value": "Las c\u00e1maras de sensor t\u00e9rmico FLIR AX8, versiones hasta 1.46.16 incluy\u00e9ndola, son vulnerables a un Salto de Directorio debido a una restricci\u00f3n de acceso inapropiada. Un atacante remoto no autenticado puede aprovechar esta situaci\u00f3n mediante el env\u00edo de una URI que contenga caracteres de salto de directorio para divulgar el contenido de archivos ubicados fuera de la ruta restringida del servidor."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:flir:flir_ax8_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.46.16",
"matchCriteriaId": "585EFD55-2D2F-4488-AE42-6BA5562FB3A6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:flir:flir_ax8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4DACB7-0558-4C74-8EDB-39591236ADEE"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://gist.github.com/Nwqda/9e16852ab7827dc62b8e44d6180a6899",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.flir.com/products/ax8-automation/",
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
]
},
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5493.php",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}