mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-30 15:16:45 +00:00
89 lines
2.7 KiB
JSON
89 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2012-4599",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2012-08-22T10:42:05.587",
|
|
"lastModified": "2017-01-20T02:59:02.120",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "McAfee SmartFilter Administration, and SmartFilter Administration Bess Edition, before 4.2.1.01 does not require authentication for access to the JBoss Remote Method Invocation (RMI) interface, which allows remote attackers to execute arbitrary code via a crafted .war file."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "McAfee SmartFilter Administration y SmartFilter Administration Bess Edition, en versiones anteriores a 4.2.1.01 no requiere autenticaci\u00f3n para el acceso a la interfaz JBoss Remote Method Invocation (RMI), lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo .war manipulado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-287"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mcafee:smartfilter_administration:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2.1",
|
|
"matchCriteriaId": "39E48E7D-BB4E-4CF4-BA56-A7B41FDB274A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mcafee:smartfilter_administration:*:*:bess:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2.1",
|
|
"matchCriteriaId": "0AC5A81D-5D22-4ABD-A4F0-62BF709C330A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10029",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |