2023-11-07 21:03:21 +00:00

136 lines
4.3 KiB
JSON

{
"id": "CVE-2018-18589",
"sourceIdentifier": "security@opentext.com",
"published": "2018-10-23T17:29:00.267",
"lastModified": "2023-11-07T02:55:19.320",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A potential Remote Arbitrary Code Execution vulnerability has been identified in Micro Focus' Real User Monitoring software, versions 9.26IP, 9.30, 9.40 and 9.50. The vulnerability could be exploited to execute arbitrary code."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad potencial de ejecuci\u00f3n remota de c\u00f3digo arbitrario en Micro Focus Real User Monitoring, en versiones 9.26IP, 9.30, 9.40 y 9.50. La vulnerabilidad podr\u00eda ser explotada para ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "f81092c5-7f14-476d-80dc-24857f90be84",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:real_user_monitoring:9.26ip:*:*:*:*:*:*:*",
"matchCriteriaId": "AE3C17FA-2520-465C-80D8-2510351265E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:real_user_monitoring:9.30:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD6AA1F-CEBB-46DC-A3E8-B91ADF00A156"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:real_user_monitoring:9.40:*:*:*:*:*:*:*",
"matchCriteriaId": "885A49C2-B996-48B9-BB15-8B0E847C5DF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:real_user_monitoring:9.50:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA7B764-D8F8-492F-9CBA-DFA1A8D91991"
}
]
}
]
}
],
"references": [
{
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03272900",
"source": "security@opentext.com"
}
]
}