2024-12-08 03:06:42 +00:00

145 lines
4.2 KiB
JSON

{
"id": "CVE-2022-25619",
"sourceIdentifier": "cve@profelis.com.tr",
"published": "2022-03-30T15:15:08.260",
"lastModified": "2024-11-21T06:52:27.337",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in ping tool of Profelis IT Consultancy SambaBox allows AUTHENTICATED user to cause run arbitrary code. This issue affects: Profelis IT Consultancy SambaBox 4.0 version 4.0 and prior versions on x86."
},
{
"lang": "es",
"value": "Neutralizaci\u00f3n inadecuada de los elementos especiales utilizados en un comando ('Command Injection') vulnerabilidad en la herramienta ping de Profelis IT Consultancy SambaBox permite al usuario AUTENTICADO provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Este problema afecta: Profelis IT Consultancy SambaBox 4.0 versi\u00f3n 4.0 y versiones anteriores en x86"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@profelis.com.tr",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 3.8,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.3,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 4.6,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cve@profelis.com.tr",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:profelis:sambabox:*:*:*:*:*:*:x86:*",
"versionEndIncluding": "4.0",
"matchCriteriaId": "72B249F6-F5DA-4809-AF06-D5071D3A04D3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.sambabox.io/sambabox-surum-4-0/",
"source": "cve@profelis.com.tr",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.sambabox.io/sambabox-surum-4-0/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}