2024-12-08 03:06:42 +00:00

133 lines
4.4 KiB
JSON

{
"id": "CVE-2017-5168",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2017-02-13T21:59:03.050",
"lastModified": "2024-11-21T03:27:11.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Hanwha Techwin Smart Security Manager Versions 1.5 and prior. Multiple Path Traversal vulnerabilities have been identified. The flaws exist within the ActiveMQ Broker service that is installed as part of the product. By issuing specific HTTP requests, if a user visits a malicious page, an attacker can gain access to arbitrary files on the server. Smart Security Manager Versions 1.4 and prior to 1.31 are affected by these vulnerabilities. These vulnerabilities can allow for remote code execution."
},
{
"lang": "es",
"value": "Ha sido descubierto un problema en Hanwha Techwin Smart Security Manager Versiones 1.5 y anteriores. M\u00faltiples vulnerabilidades de salto de ruta han sido identificadas. Los defectos existen dentro del servicio de ActiveMQ Broker que se instala como parte del producto. Mediante la emisi\u00f3n de peticiones HTTP espec\u00edficas, si un usuario visita una p\u00e1gina maliciosa, un atacante puede obtener acceso a archivos arbitrarios en el servidor. Smart Security Manager Versiones 1.4 y anteriores a 1.31 est\u00e1n afectadas por estas vulnerabilidades. Estas vulnerabilidades pueden permitir la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"baseScore": 5.1,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hanwha-security:smart_security_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5",
"matchCriteriaId": "38BFDE92-9695-4ABC-BF16-7BCAFC6573A8"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/96147",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/96147",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
}
]
}