2024-01-10 17:00:35 +00:00
{
"id" : "CVE-2023-49863" ,
"sourceIdentifier" : "talos-cna@cisco.com" ,
"published" : "2024-01-10T16:15:49.180" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:33:57.940" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-01-10 17:00:35 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_webpimage` parameter."
2024-01-18 21:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la funcionalidad de carga de im\u00e1genes aVideoEncoderReceiveImage.json.php de la confirmaci\u00f3n maestra de desarrollo de WWBN AVideo 15fed957fb. Una solicitud HTTP especialmente manipulada puede provocar la lectura de archivos arbitrarios. Esta vulnerabilidad se activa mediante el par\u00e1metro `downloadURL_webpimage`."
2024-01-10 17:00:35 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-01-18 21:00:29 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "talos-cna@cisco.com" ,
"type" : "Secondary" ,
2024-01-18 21:00:29 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM" ,
2024-01-18 21:00:29 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-01-18 21:00:29 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
} ,
2024-01-10 17:00:35 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-01-10 17:00:35 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM" ,
2024-01-10 17:00:35 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-01-10 17:00:35 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
2024-01-18 21:00:29 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "talos-cna@cisco.com" ,
"type" : "Secondary" ,
2024-01-18 21:00:29 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-73"
2024-01-18 21:00:29 +00:00
}
]
} ,
2024-01-10 17:00:35 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-01-10 17:00:35 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-610"
2024-01-10 17:00:35 +00:00
}
]
}
] ,
2024-01-18 21:00:29 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wwbn:avideo:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D1AF6154-CDE7-45F9-9F6F-FDBC2D4E42B1"
}
]
}
]
}
] ,
2024-01-10 17:00:35 +00:00
"references" : [
{
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1880" ,
2024-01-18 21:00:29 +00:00
"source" : "talos-cna@cisco.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1880" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-01-10 17:00:35 +00:00
}
]
}