René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

123 lines
3.6 KiB
JSON

{
"id": "CVE-2017-0935",
"sourceIdentifier": "support@hackerone.com",
"published": "2018-03-22T14:29:00.427",
"lastModified": "2020-02-12T21:34:38.093",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Ubiquiti Networks EdgeOS version 1.9.1.1 and prior suffer from an Improper Privilege Management vulnerability due to the lack of protection of the file system leading to sensitive information being exposed. An attacker with access to an operator (read-only) account could escalate privileges to admin (root) access in the system."
},
{
"lang": "es",
"value": "Ubiquiti Networks EdgeOS, en versiones 1.9.1.1 y anteriores, sufre de una vulnerabilidad de gesti\u00f3n incorrecta de privilegios debido a la falta de protecci\u00f3n del sistema de archivos. Esto provoca que se exponga informaci\u00f3n sensible. Un atacante con acceso a una cuenta operator (solo lectura) podr\u00eda escalar sus privilegios a acceso admin (root) en el sistema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
},
{
"source": "support@hackerone.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ui:edgeos:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.9.1.1",
"matchCriteriaId": "1D5CED05-149F-4CA5-A18D-B508E6EF1EBD"
}
]
}
]
}
],
"references": [
{
"url": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-security-release-v1-9-7-hotfix-3/ba-p/2054117",
"source": "support@hackerone.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://hackerone.com/reports/242407",
"source": "support@hackerone.com",
"tags": [
"Third Party Advisory"
]
}
]
}