René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.4 KiB
JSON

{
"id": "CVE-2018-19196",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-11-12T05:29:00.417",
"lastModified": "2018-12-13T18:14:48.063",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in XiaoCms 20141229. It allows remote attackers to execute arbitrary code by using the type parameter to bypass the standard admin\\controller\\uploadfile.php restrictions on uploaded file types (jpg, jpeg, bmp, png, gif), as demonstrated by an admin/index.php?c=uploadfile&a=uploadify_upload&type=php URI."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en XiaoCms 20141229. Permite a los atacantes remotos ejecutar c\u00f3digo arbitrario utilizando el par\u00e1metro type para omitir las restricciones est\u00e1ndar en admin\\controller\\uploadfile.php sobre los tipos de archivos subidos (jpg, jpeg, bmp, png, gif), tal y como queda demostrado con la URI admin/index.php?c=uploadfilea=uploadify_uploadtype=php."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xiaocms:xiaocms:20141229:*:*:*:*:*:*:*",
"matchCriteriaId": "8662FF0A-1CCB-4D27-9A1D-35725076C4E8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.patec.cn/newsshow.php?cid=24&id=136",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
}
]
}