René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

145 lines
4.3 KiB
JSON

{
"id": "CVE-2021-26473",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-08T19:15:08.290",
"lastModified": "2022-04-22T19:10:57.920",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 the http API located at /sgwebservice_o.php action logFilePath allows an attacker to write arbitrary files in the context of the web server process. These files can then be executed remotely by calling the file via the web server."
},
{
"lang": "es",
"value": "En VembuBDR antes de 4.2.0.1 y VembuOffsiteDR antes de 4.2.0.1 la API http ubicada en /sgwebservice_o.php action logFilePath permite a un atacante escribir archivos arbitrarios en el contexto del proceso del servidor web. Estos archivos pueden entonces ser ejecutados remotamente llamando al archivo a trav\u00e9s del servidor web"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vembu:bdr_suite:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.0.1",
"matchCriteriaId": "D9F91BA2-195F-4A24-9403-724BD268CB56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vembu:offsite_dr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.0.1",
"matchCriteriaId": "04101E71-5807-4324-9992-358362D276E4"
}
]
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://csirt.divd.nl/cases/DIVD-2020-00011/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://csirt.divd.nl/cves/CVE-2021-26473/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}