{ "id": "CVE-2019-14224", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-05T22:15:11.427", "lastModified": "2020-08-24T17:37:01.140", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Alfresco Community Edition 5.2 201707. By leveraging multiple components in the Alfresco Software applications, an exploit chain was observed that allows an attacker to achieve remote code execution on the victim machine. The attacker must upload malicious Solr configuration files and then receive a JMX connection from the victim, and serve a Java object that results in deserialization and code execution." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Alfresco Community Edition versi\u00f3n 5.2 201707. Mediante el aprovechamiento de m\u00faltiples componentes en las aplicaciones de Alfresco Software, se observ\u00f3 una cadena de explotaciones que permite a un atacante lograr la ejecuci\u00f3n de c\u00f3digo remota en la m\u00e1quina v\u00edctima. El atacante necesita cargar archivos de configuraci\u00f3n de Solr maliciosos y entonces recibir una conexi\u00f3n JMX de la v\u00edctima y servir un objeto Java lo que resulta en la deserializaci\u00f3n y ejecuci\u00f3n de c\u00f3digo." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.2, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.0 }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-502" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:alfresco:alfresco:5.2:*:*:*:community:*:*:*", "matchCriteriaId": "013417A2-71FD-4C37-9EC2-3CEA16CFBC85" } ] } ] } ], "references": [ { "url": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14224-Authenticated%20Remote%20Code%20Execution-Alfresco%20Community", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] } ] }