René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
3.5 KiB
JSON

{
"id": "CVE-2015-5463",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-04-03T20:29:00.233",
"lastModified": "2019-04-04T12:21:45.520",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "AxiomSL's Axiom java applet module (used for editing uploaded Excel files and associated Java RMI services) 9.5.3 and earlier allows remote attackers to (1) access data of other basic users through arbitrary SQL commands, (2) perform a horizontal and vertical privilege escalation, (3) cause a Denial of Service on global application, or (4) write/read/delete arbitrary files on server hosting the application."
},
{
"lang": "es",
"value": "El m\u00f3dulo del applet de Java de Axiom, de AxiomSL (utilizado para editar archivos de Excel subidos y los servicios Java RMI asociados), en su versi\u00f3n 9.5.3 y anteriores, permite a los atacantes remotos (1) acceder a datos de otros usuarios b\u00e1sicos a trav\u00e9s de comandos SQL arbitrarios, (2) realizar un escalado de privilegios horizontal y vertical, (3) provocar denegaciones de servicio (DoS) en la aplicaci\u00f3n en su conjunto o (4) escribir/leer/eliminar archivos arbitrarios en el servidor que aloja la aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:axiomsl:axiom:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.5.3",
"matchCriteriaId": "F368FE16-5F9A-4A18-9A5B-F3B86D76D46E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.excellium-services.com/cert-xlm-advisory/cve-2015-5463/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}