René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

146 lines
5.0 KiB
JSON

{
"id": "CVE-2018-11048",
"sourceIdentifier": "security_alert@emc.com",
"published": "2018-08-10T20:29:00.243",
"lastModified": "2020-12-08T17:08:46.950",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Dell EMC Data Protection Advisor, versions 6.2, 6,3, 6.4, 6.5 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 contain a XML External Entity (XXE) Injection vulnerability in the REST API. An authenticated remote malicious user could potentially exploit this vulnerability to read certain system files in the server or cause denial of service by supplying specially crafted Document Type Definitions (DTDs) in an XML request."
},
{
"lang": "es",
"value": "Dell EMC Data Protection Advisor, en versiones 6.2, 6,3, 6.4 y 6.5 y Dell EMC Integrated Data Protection Appliance (IDPA) en versiones 2.0 y 2.1 contienen una vulnerabilidad de inyecci\u00f3n XEE (XML External Entity) en la API REST. Un usuario autenticado remoto malicioso podr\u00eda explotar esta vulnerabilidad para leer ciertos archivos del sistema en el servidor o provocar una denegaci\u00f3n de servicio (DoS) proporcionando DTD (Document Type Definition) especialmente manipulados en una petici\u00f3n XML."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:emc_data_protection_advisor:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1941D69-2AFA-46AF-B5A6-DA54A704919A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:emc_data_protection_advisor:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A98B199D-3590-43AD-B3DD-3832E0B1CDF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:emc_data_protection_advisor:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EB4A43EE-2F9D-43C0-B8C8-CB231ECEE3E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:emc_data_protection_advisor:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "669875C4-F354-4F36-A7F1-404BAC90276E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:emc_integrated_data_protection_appliance:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C4D195D-C047-42E9-9885-0464642EC6EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:emc_integrated_data_protection_appliance:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "76D6282D-ABA7-4972-8E13-2A625F13CF53"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2018/Aug/5",
"source": "security_alert@emc.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/105130",
"source": "security_alert@emc.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1041417",
"source": "security_alert@emc.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}