René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

120 lines
4.3 KiB
JSON

{
"id": "CVE-2017-15285",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-10-12T08:29:00.617",
"lastModified": "2017-11-03T16:53:02.790",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "X-Cart 5.2.23, 5.3.1.9, 5.3.2.13, and 5.3.3 is vulnerable to Remote Code Execution. This vulnerability exists because the application fails to check remote file extensions before saving locally. This vulnerability can be exploited by anyone with Vendor access or higher. One attack methodology is to upload an image file in the Attachments section of a product catalog, upload a .php file with an \"Add File Via URL\" action, and change the image's Description URL to reference the .php URL in the attachments/ directory."
},
{
"lang": "es",
"value": "X-Cart 5.2.23, 5.3.1.9, 5.3.2.13 y 5.3.3 es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo. Esta vulnerabilidad existe porque la aplicaci\u00f3n no consigue chequear las extensiones de archivos remotos antes de guardarlos localmente. Esta vulnerabilidad la puede explotar cualquiera con acceso Vendor o superior. Una metodolog\u00eda de ataque es subir un archivo de imagen en la secci\u00f3n Attachments de un cat\u00e1logo de productos, subir un archivo .php con una acci\u00f3n \"Add File Via URL\" y cambiar la URL de descripci\u00f3n de la imagen para que haga referencia a la URL .php en el directorio attachments/."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qualiteam:x-cart:5.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E903FF-8AB1-4B3D-B0A4-303E14CC343C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qualiteam:x-cart:5.3.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "56A18495-7945-4A70-BC1C-F955A2EB010F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qualiteam:x-cart:5.3.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "FCC932CA-D539-4D75-A101-F5892FEE1A32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qualiteam:x-cart:5.3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC2B8FB-B386-431C-9321-36A71AECC891"
}
]
}
]
}
],
"references": [
{
"url": "https://sxcurity.github.io/PHP%20Code%20Injection%20in%20X-Cart.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}