2024-12-08 03:06:42 +00:00

181 lines
5.2 KiB
JSON

{
"id": "CVE-2021-45876",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-21T11:15:10.620",
"lastModified": "2024-11-21T06:33:10.977",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple versions of GARO Wallbox GLB/GTB/GTC are affected by unauthenticated command injection. The url parameter of the function module downloadAndUpdate is vulnerable to an command Injection. Unfiltered user input is used to generate code which then gets executed when downloading new firmware."
},
{
"lang": "es",
"value": "M\u00faltiples versiones de GARO Wallbox GLB/GTB/GTC est\u00e1n afectadas por la inyecci\u00f3n de comandos no autenticados. El par\u00e1metro url del m\u00f3dulo de funci\u00f3n downloadAndUpdate es vulnerable a una inyecci\u00f3n de comando. La entrada del usuario no filtrada es usada para generar c\u00f3digo que luego es ejecutado cuando es descargado un nuevo firmware"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:garo:wallbox_gtb_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "185",
"matchCriteriaId": "62C49B04-6ADF-43DC-97FA-B17BC7C2611B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:garo:wallbox_gtb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2954CEA4-F30C-4BED-AAA2-49D6966A2760"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:garo:wallbox_gtc_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "185",
"matchCriteriaId": "8AE5290A-84F0-4A08-AA34-57F1B5DD1689"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:garo:wallbox_gtc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27B3EFDD-F075-4175-8BD2-F09F87E8AEFA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:garo:wallbox_glb_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "185",
"matchCriteriaId": "C7E90C76-CB8A-4002-A140-F7EA9023A4F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:garo:wallbox_glb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "184D4B15-74BD-415A-9A48-7EE08BC52EDE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/delikely/advisory/tree/main/GARO",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/delikely/advisory/tree/main/GARO",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}