mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
106 lines
3.8 KiB
JSON
106 lines
3.8 KiB
JSON
{
|
|
"id": "CVE-2025-27167",
|
|
"sourceIdentifier": "psirt@adobe.com",
|
|
"published": "2025-03-11T18:15:34.730",
|
|
"lastModified": "2025-03-31T20:06:44.963",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute their own programs, access unauthorized data files, or modify configuration in unexpected ways. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. The problem extends to any type of critical resource that the application trusts."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Las versiones 29.2.1, 28.7.4 y anteriores de Illustrator se ven afectadas por una vulnerabilidad de ruta de b\u00fasqueda no confiable que podr\u00eda permitir a los atacantes ejecutar sus propios programas, acceder a archivos de datos no autorizados o modificar la configuraci\u00f3n de forma inesperada. Si la aplicaci\u00f3n utiliza una ruta de b\u00fasqueda para localizar recursos cr\u00edticos, como programas, un atacante podr\u00eda modificarla para que apunte a un programa malicioso, que la aplicaci\u00f3n objetivo ejecutar\u00eda. El problema se extiende a cualquier tipo de recurso cr\u00edtico en el que la aplicaci\u00f3n conf\u00ede."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "psirt@adobe.com",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "psirt@adobe.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-426"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "28.0",
|
|
"versionEndExcluding": "28.7.5",
|
|
"matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "29.0",
|
|
"versionEndExcluding": "29.3",
|
|
"matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
|
|
"source": "psirt@adobe.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |