2024-12-08 03:06:42 +00:00

133 lines
4.2 KiB
JSON

{
"id": "CVE-2020-35488",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-05T15:15:13.797",
"lastModified": "2024-11-21T05:27:23.733",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allows remote attackers to cause a denial of service (daemon crash) via a crafted Syslog payload to the Syslog service. This attack requires a specific configuration. Also, the name of the directory created must use a Syslog field. (For example, on Linux it is not possible to create a .. directory. On Windows, it is not possible to create a CON directory.)"
},
{
"lang": "es",
"value": "El m\u00f3dulo fileop del servicio NXLog en NXLog Community Edition versi\u00f3n 2.10.2150, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio) por medio de una carga \u00fatil de Syslog dise\u00f1ada para el servicio Syslog. Este ataque requiere una configuraci\u00f3n espec\u00edfica. Adem\u00e1s, el nombre del directorio creado debe usar un campo Syslog. (Por ejemplo, en Linux no es posible crear un directorio ... En Windows, no es posible crear un directorio CON)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nxlog:nxlog:*:*:*:*:community:*:*:*",
"versionEndExcluding": "3.0.2272",
"matchCriteriaId": "A32AB3C7-8386-4D09-A8B4-2017678E55AB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GuillaumePetit84/CVE-2020-35488",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://gitlab.com/nxlog-public/nxlog-ce/-/blob/master/ChangeLog.txt#L2",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "https://github.com/GuillaumePetit84/CVE-2020-35488",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://gitlab.com/nxlog-public/nxlog-ce/-/blob/master/ChangeLog.txt#L2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
]
}
]
}