mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
250 lines
8.9 KiB
JSON
250 lines
8.9 KiB
JSON
{
|
|
"id": "CVE-2023-44278",
|
|
"sourceIdentifier": "security_alert@emc.com",
|
|
"published": "2023-12-14T16:15:45.490",
|
|
"lastModified": "2023-12-27T19:32:20.107",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application. \n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de path traversal. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad para obtener acceso de lectura y escritura no autorizado a los archivos del sistema operativo almacenados en el sistema de archivos del servidor, con los privilegios de la aplicaci\u00f3n en ejecuci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.7,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 0.8,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "security_alert@emc.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.7,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 0.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "security_alert@emc.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.7.6",
|
|
"matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "6.2.1.110",
|
|
"matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.0",
|
|
"versionEndExcluding": "7.10.1.15",
|
|
"matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*",
|
|
"versionEndExcluding": "6.2.1.110",
|
|
"matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*",
|
|
"versionStartIncluding": "7.0",
|
|
"versionEndExcluding": "7.12.0.0",
|
|
"matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "6.2.1.110",
|
|
"matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.0",
|
|
"versionEndExcluding": "7.13.0.10",
|
|
"matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "6.2.1.110",
|
|
"matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.0",
|
|
"versionEndExcluding": "7.12.0.0",
|
|
"matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*",
|
|
"versionStartIncluding": "7.7",
|
|
"versionEndExcluding": "7.7.5.25",
|
|
"matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*",
|
|
"versionStartIncluding": "7.10",
|
|
"versionEndExcluding": "7.10.1.15",
|
|
"matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*",
|
|
"versionStartIncluding": "7.7",
|
|
"versionEndExcluding": "7.7.5.25",
|
|
"matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*",
|
|
"versionStartIncluding": "7.10",
|
|
"versionEndExcluding": "7.10.1.15",
|
|
"matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities",
|
|
"source": "security_alert@emc.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |