René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

123 lines
3.9 KiB
JSON

{
"id": "CVE-2017-16609",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2018-01-23T01:29:01.303",
"lastModified": "2019-10-09T23:25:11.457",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within download.jsp. The issue results from the lack of proper validation of a user-supplied string before using it to download a file. An attacker can leverage this vulnerability to expose sensitive information. Was ZDI-CAN-4750."
},
{
"lang": "es",
"value": "Esta vulnerabilidad permite que atacantes remotos revelen informaci\u00f3n sensible en instalaciones vulnerables de Netgain Enterprise Manager. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. Este error en concreto existe en download.jsp. El problema deriva de la falta de validaci\u00f3n correcta de una cadena proporcionada por el usuario antes de emplearla para descargar un archivo. Un atacante puede aprovechar esta vulnerabilidad para exponer informaci\u00f3n sensible. Anteriormente era ZDI-CAN-4750."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-39"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netgain-systems:enterprise_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2.766",
"matchCriteriaId": "DCAF3357-3AD7-4E1B-BFF9-E008D6C1D826"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/research/tra-2018-02",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://zerodayinitiative.com/advisories/ZDI-17-951",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}