René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

131 lines
3.9 KiB
JSON

{
"id": "CVE-2020-26894",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-10-08T21:15:10.370",
"lastModified": "2021-07-21T11:39:23.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "LiveCode v9.6.1 on Windows allows local, low-privileged users to gain privileges by creating a malicious \"cmd.exe\" in the folder of the vulnerable LiveCode application. If the application is using LiveCode's \"shell()\" function, it will attempt to search for \"cmd.exe\" in the folder of the current application and run the malicious \"cmd.exe\"."
},
{
"lang": "es",
"value": "LiveCode v9.6.1 en Windows permite a los usuarios locales con pocos privilegios obtener privilegios creando un \"cmd.exe\" malicioso en la carpeta de la aplicaci\u00f3n LiveCode vulnerable. Si la aplicaci\u00f3n utiliza la funci\u00f3n \"shell()\" de LiveCode, intentar\u00e1 buscar \"cmd.exe\" en la carpeta de la aplicaci\u00f3n actual y ejecutar el \"cmd.exe\" malicioso"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:faulknermedia:wildlife_issues_in_the_new_millennium:18.0.160:*:*:*:*:*:*:*",
"matchCriteriaId": "3B4BDB27-F960-44AF-AEF5-0A75F13C871A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/livecode/livecode/pull/7454",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://john-woodman.com/posts/LiveCode-Privilege-Escalation-Vulnerability/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://quality.livecode.com/show_bug.cgi?id=22942",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}