2023-11-07 21:03:21 +00:00

116 lines
3.7 KiB
JSON

{
"id": "CVE-2018-7259",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-02-20T00:29:00.207",
"lastModified": "2023-11-07T03:00:59.180",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The FSX / P3Dv4 installer 2.0.1.231 for Flight Sim Labs A320-X sends a user's Google account credentials to http://installLog.flightsimlabs.com/LogHandler3.ashx if a pirated serial number has been entered, which allows remote attackers to obtain sensitive information, e.g., by sniffing the network for cleartext HTTP traffic. This behavior was removed in 2.0.1.232."
},
{
"lang": "es",
"value": "El instalador FSX / P3Dv4, en su versi\u00f3n 2.0.1.231, para Flight Sim Labs A320-X env\u00eda las credenciales de la cuenta de Google a http://installLog.flightsimlabs.com/LogHandler3.ashx si se ha introducido un n\u00famero de serie pirateado. Esto permite que atacantes remotos obtengan informaci\u00f3n sensible, por ejemplo, rastreando la red en busca de tr\u00e1fico HTTP en texto claro. Este comportamiento fue eliminado en la versi\u00f3n 2.0.1.232."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flightsimlabs:a320-x:2.0.1.231:*:*:*:*:*:*:*",
"matchCriteriaId": "738A26E2-25CC-47C5-B04A-C85AB8BC31B0"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.flightsimlabs.com/index.php?/topic/16210-malware-in-installer/",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://medium.com/%40lukegorman97/flightsimlabs-alleged-malware-analysis-1427c4d23368",
"source": "cve@mitre.org"
},
{
"url": "https://www.reddit.com/r/flightsim/comments/7yh4zu/fslabs_a320_installer_seems_to_include_a_chrome/",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Press/Media Coverage"
]
}
]
}