{ "id": "CVE-2017-7258", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-29T20:59:00.340", "lastModified": "2017-04-10T16:27:25.750", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "HTTP Exploit in eMLi Portal in AuroMeera Technometrix Pvt. Ltd. eMLi allows an Attacker to View Restricted Information or (even more seriously) execute powerful commands on the web server which can lead to a full compromise of the system via Directory Path Traversal, as demonstrated by reading core-emli/Storage. The affected versions are eMLi School Management 1.0, eMLi College Campus Management 1.0, and eMLi University Management 1.0." }, { "lang": "es", "value": "HTTP Exploit en el portal eMLi en AuroMeera Technometrix Pvt. Ltd. eMLi permite a un atacante ver informaci\u00f3n restringida o (a\u00fan m\u00e1s seriamente) ejecutar comandos poderosos en el servidor web lo que puede llevar a un compromiso total del sistema a trav\u00e9s de Path Path Directory, como lo demuestra la lectura core-emli/Storage. Las versiones afectas son eMLi School Management 1.0, eMLi College Campus Management 1.0, y eMLi University Management 1.0." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:auromeera:emli:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6EEF9FE-FE5D-454A-9B43-A9A2CFEE8722" } ] } ] } ], "references": [ { "url": "http://www.securityfocus.com/bid/97255", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://sudoat.blogspot.in/2017/03/path-traversal-vulnerability-in-emli.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] } ] }