115 lines
4.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2017-9333",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-09-18T01:29:00.390",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "OpenWebif 1.2.5 allows remote code execution via a URL to the CallOPKG function in the IpkgController class in plugin/controllers/ipkg.py, when the URL refers to an attacker-controlled web site with a Trojan horse package. This has security implications in cases where untrusted users can trigger CallOPKG calls, and these users can enter an arbitrary URL in an input field, even though that input field was only intended for a package name. This threat model may be relevant in the latest versions of third-party products that bundle OpenWebif, i.e., set-top box products. The issue of Trojan horse packages does NOT have security implications in cases where the attacker has full OpenWebif access."
},
{
"lang": "es",
"value": "OpenWebif 1.2.5 permite la ejecuci\u00f3n remota de c\u00f3digo mediante una URL a la funci\u00f3n CallOPKG en la clase IpkgController en plugin/controllers/ipkg.py, cuando la URL referencia una p\u00e1gina web controlada por el atacante con un paquete que contiene un virus troyano. Esto tiene implicaciones de seguridad en casos en los que usuarios no fiables pueden desencadenar llamadas CallOPKG e introducir una URL arbitraria en un campo input, incluso si el campo estaba pensado para un nombre de paquete. Este modelo de amenaza puede ser relevante en las \u00faltimas versiones de productos externos que incluyan OpenWebif; es decir, productos Set-Top Box. El problema de los paquetes con virus troyanos NO tiene ninguna implicaci\u00f3n de seguridad en casos en los que el atacante tiene acceso completo a OpenWebif."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openwebif_project:openwebif:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BD29E375-8B66-4E01-9D90-89048D56984D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/619",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/621",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}