René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

162 lines
4.9 KiB
JSON

{
"id": "CVE-2017-12460",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-10-30T14:29:00.797",
"lastModified": "2017-11-18T16:21:33.540",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Barco ClickShare CSM-1 firmware before v1.7.0.3 and CSC-1 firmware before v1.10.0.10. An authenticated user can manage the wallpaper collection in the webUI to be shown as background on the ClickShare product. By uploading a wallpaper with a specially crafted name, an HTML injection can be triggered as special characters are not neutralized before output."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en Barco ClickShare con firmware CSM-1 anterior a v1.7.0.3 y firmware CSC-1 anterior a v1.10.0.10. Un usuario autenticado puede gestionar la colecci\u00f3n de fondos de pantalla en la interfaz de usuario web para que se muestre como fondo en el producto ClickShare. Mediante la subida de un fondo de pantalla con un nombre especialmente manipulado, se puede desencadenar una inyecci\u00f3n HTML, ya que los caracteres especiales no se neutralizan antes de la salida."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:barco:clickshare_csm-1_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.0.3",
"matchCriteriaId": "153A768C-A1C0-4E5D-81CE-C0760019C3F9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:barco:clickshare_csm-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6332071-FA97-4220-AC19-0C62C6593BE1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:barco:clickshare_csc-1_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.10.0.10",
"matchCriteriaId": "A9E89FB2-F4E3-4F89-AF1D-AF3D207BEE87"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:barco:clickshare_csc-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A88BAB0-B290-46CB-91BD-F6872C838FC5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.barco.com/en/Support/software/R33050037",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://www.barco.com/en/support/knowledge-base/KB5169",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://www.barco.com/en/support/software/R33050020",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}