René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

98 lines
3.0 KiB
JSON

{
"id": "CVE-2015-4328",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2015-08-20T00:59:06.060",
"lastModified": "2017-01-04T15:50:37.883",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly checks for a user account's read-only attribute, which allows remote authenticated users to execute arbitrary OS commands via crafted HTTP requests, as demonstrated by read or write operations on the Unified Communications lookup page, aka Bug ID CSCuv12552."
},
{
"lang": "es",
"value": "Vulnerabilidad en Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2, no verifica adecuadamente el atributo de solo lectura para las cuentas de usuario, lo cual permite a usuarios remotos autenticados ejecutar arbitrariamente comandos del SO a trav\u00e9s de peticones HTTP manipuladas, como qued\u00f3 demostrado en las operaciones de lectura y escritura en la p\u00e1gina de b\u00fasqueda de Unified Communications, tambi\u00e9n conocido como Bug ID CSCuv12552."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server_software:x8.5.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "E549E37F-3D1A-490B-8BEE-482D082486EA"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40522",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76399",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1033329",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}