2023-11-07 21:03:21 +00:00

242 lines
9.4 KiB
JSON

{
"id": "CVE-2018-6498",
"sourceIdentifier": "security@opentext.com",
"published": "2018-08-30T21:29:00.267",
"lastModified": "2023-11-07T02:59:58.310",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Remote Code Execution in the following products Hybrid Cloud Management Containerized Suite HCM2017.11, HCM2018.02, HCM2018.05, Operations Bridge Containerized Suite 2017.11, 2018.02, 2018.05, Data Center Automation Containerized Suite 2017.01 until 2018.05, Service Management Automation Suite 2017.11, 2018.02, 2018.05 and Network Operations Management (NOM) Suite CDF 2017.11, 2018.02, 2018.05 will allow Remote Code Execution."
},
{
"lang": "es",
"value": "Ejecuci\u00f3n remota de c\u00f3digo en los siguientes productos: Hybrid Cloud Management Containerized Suite HCM2017.11, HCM2018.02, HCM2018.05; Operations Bridge Containerized Suite 2017.11, 2018.02, 2018.05; Data Center Automation Containerized Suite 2017.01 hasta la versi\u00f3n 2018.05; Service Management Automation Suite 2017.11, 2018.02, 2018.05 y Network Operations Management (NOM) Suite CDF 2017.11, 2018.02 y 2018.05 permitir\u00e1 la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "f81092c5-7f14-476d-80dc-24857f90be84",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.3
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:data_center_automation:2017.01:*:*:*:*:*:*:*",
"matchCriteriaId": "F8CBD371-84AA-45F2-B53C-FF2F94316FDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:data_center_automation:2017.05:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA57EDB-69A7-439A-886A-06E844A45CFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:data_center_automation:2017.08:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E861D6-7812-4190-A3C1-F338D544123E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:data_center_automation:2017.09:*:*:*:*:*:*:*",
"matchCriteriaId": "4CA11555-95A4-4086-9C67-CA4C92EA4D0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:data_center_automation:2017.11:*:*:*:*:*:*:*",
"matchCriteriaId": "008EA036-C58F-4B01-AEAD-3E8E79304A68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:data_center_automation:2018.02:*:*:*:*:*:*:*",
"matchCriteriaId": "34E310E2-2F0F-4942-A7CD-61616D366824"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:data_center_automation:2018.05:*:*:*:*:*:*:*",
"matchCriteriaId": "D1CA1EEE-301A-4DB1-ACE6-A8DC7FF101C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:hybrid_cloud_management:2017.11:*:*:*:premium:*:*:*",
"matchCriteriaId": "EC84CBAE-0AB4-4405-8423-A221E3BABCA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:hybrid_cloud_management:2017.11:*:*:*:ultimate:*:*:*",
"matchCriteriaId": "28F73BBD-DA6B-42A5-BDC9-F8832E475B03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:hybrid_cloud_management:2018.02:*:*:*:premium:*:*:*",
"matchCriteriaId": "E52C4EA5-AE1E-476E-9AAF-FB8A6D34658A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:hybrid_cloud_management:2018.02:*:*:*:ultimate:*:*:*",
"matchCriteriaId": "69087F9D-D5F1-462C-8264-13DBCF50474C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:hybrid_cloud_management:2018.05:*:*:*:premium:*:*:*",
"matchCriteriaId": "5686CFAC-0091-4B98-9654-359AC77343EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:hybrid_cloud_management:2018.05:*:*:*:ultimate:*:*:*",
"matchCriteriaId": "C7E8812B-28DC-4F66-B395-73AF00E57113"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:network_operations_management:2017.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E21E1238-6D5F-4AA5-8FE4-B818D0DBF6C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:network_operations_management:2018.02:*:*:*:*:*:*:*",
"matchCriteriaId": "EA8F1189-19DF-43EB-9B35-61720EE11357"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:network_operations_management:2018.05:*:*:*:premium:*:*:*",
"matchCriteriaId": "DF75B30C-1E8D-462E-A30A-9C17EF0B7CE7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:operations_bridge:2017.11:*:*:*:premium:*:*:*",
"matchCriteriaId": "34099595-3D44-4B10-AA42-5A6DC9B82F25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:operations_bridge:2018.02:*:*:*:premium:*:*:*",
"matchCriteriaId": "2D4D7844-FA36-4C63-8AD6-C40F81134DBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:operations_bridge:2018.05:*:*:*:premium:*:*:*",
"matchCriteriaId": "78756DED-D384-4F7F-99C3-6BC6293B1D28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:service_management_automation:2017.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5166B660-88F2-437B-96DA-F7E44E6AE9A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*",
"matchCriteriaId": "2DCFB2E7-D769-4365-9B99-952907563749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*",
"matchCriteriaId": "3909E337-F1FC-45C8-A120-EEBDBFB0E4D0"
}
]
}
]
}
],
"references": [
{
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236632",
"source": "security@opentext.com"
},
{
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236667",
"source": "security@opentext.com"
},
{
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236669",
"source": "security@opentext.com"
},
{
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236678",
"source": "security@opentext.com"
},
{
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236725",
"source": "security@opentext.com"
}
]
}