mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
206 lines
7.0 KiB
JSON
206 lines
7.0 KiB
JSON
{
|
|
"id": "CVE-2022-42136",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2023-01-13T21:15:15.523",
|
|
"lastModified": "2025-04-07T19:15:43.457",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Authenticated mail users, under specific circumstances, could add files with unsanitized content in public folders where the IIS user had permission to access. That action, could lead an attacker to store arbitrary code on that files and execute RCE commands."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los usuarios de correo autenticados, en circunstancias espec\u00edficas, pod\u00edan agregar archivos con contenido no desinfectado en carpetas p\u00fablicas a las que el usuario de IIS ten\u00eda permiso para acceder. Esa acci\u00f3n podr\u00eda llevar a un atacante a almacenar c\u00f3digo arbitrario en esos archivos y ejecutar comandos RCE."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*",
|
|
"versionEndExcluding": "8.66",
|
|
"matchCriteriaId": "0BD1DC6B-569B-4A68-A940-8DD7D46B0EC7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise_premium:*:*:*",
|
|
"versionEndExcluding": "8.66",
|
|
"matchCriteriaId": "F00FBB02-0396-48FD-A212-B8AA0EED5EB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*",
|
|
"versionEndExcluding": "8.66",
|
|
"matchCriteriaId": "04012D59-A1A5-4E0D-9D09-B916DF4109C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*",
|
|
"versionEndExcluding": "8.66",
|
|
"matchCriteriaId": "236A06C3-A366-46E8-AA7A-6BB0076B747F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*",
|
|
"versionStartIncluding": "9.0",
|
|
"versionEndExcluding": "9.85",
|
|
"matchCriteriaId": "FB5FA14B-9800-4944-914B-6F5EC3AFE2D3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise_premium:*:*:*",
|
|
"versionStartIncluding": "9.0",
|
|
"versionEndExcluding": "9.85",
|
|
"matchCriteriaId": "4335FB0F-3311-4DB4-82F7-A1951FD2972C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*",
|
|
"versionStartIncluding": "9.0",
|
|
"versionEndExcluding": "9.85",
|
|
"matchCriteriaId": "12E681AC-2B1C-4848-A7F3-D32412F971E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*",
|
|
"versionStartIncluding": "9.0",
|
|
"versionEndExcluding": "9.85",
|
|
"matchCriteriaId": "9DAB75C2-9F57-4E54-80EC-B69147E619D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*",
|
|
"versionStartIncluding": "10.00",
|
|
"versionEndExcluding": "10.42",
|
|
"matchCriteriaId": "7BF6CDCE-2212-49CF-ADA1-F066D126B970"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise_premium:*:*:*",
|
|
"versionStartIncluding": "10.00",
|
|
"versionEndExcluding": "10.42",
|
|
"matchCriteriaId": "DD783D53-EEA4-4DBC-B105-E224E4AE978B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*",
|
|
"versionStartIncluding": "10.00",
|
|
"versionEndExcluding": "10.42",
|
|
"matchCriteriaId": "DE07E64E-C8C4-40D7-AF5D-54C684CF29C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*",
|
|
"versionStartIncluding": "10.00",
|
|
"versionEndExcluding": "10.42",
|
|
"matchCriteriaId": "D2D9F41A-E2A3-495C-90A7-F56104291EDA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://pastebin.com/ahLNMf5n",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.mailenable.com/kb/content/article.asp?ID=ME020737",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://pastebin.com/ahLNMf5n",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.mailenable.com/kb/content/article.asp?ID=ME020737",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |