2024-04-04 08:46:00 +00:00

106 lines
3.3 KiB
JSON

{
"id": "CVE-2022-0130",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2022-01-14T20:15:15.640",
"lastModified": "2023-08-08T14:22:24.967",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Tenable.sc versions 5.14.0 through 5.19.1 were found to contain a remote code execution vulnerability which could allow a remote, unauthenticated attacker to execute code under special circumstances. An attacker would first have to stage a specific file type in the web server root of the Tenable.sc host prior to remote exploitation."
},
{
"lang": "es",
"value": "Se ha detectado que Tenable.sc versiones 5.14.0 a 5.19.1, contienen una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota que podr\u00eda permitir a un atacante remoto no autenticado ejecutar c\u00f3digo en circunstancias especiales. Un atacante tendr\u00eda que escenificar primero un tipo de archivo espec\u00edfico en el root del servidor web del host de Tenable.sc antes de la explotaci\u00f3n remota"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.14.0",
"versionEndIncluding": "5.19.1",
"matchCriteriaId": "494A137C-A8B9-4E02-9324-BD76C8EE83CF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/tns-2022-01",
"source": "vulnreport@tenable.com",
"tags": [
"Vendor Advisory"
]
}
]
}