René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
2.9 KiB
JSON

{
"id": "CVE-2018-10122",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-04-16T09:58:10.697",
"lastModified": "2018-05-23T14:33:01.507",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "QingDao Nature Easy Soft Chanzhi Enterprise Portal System (aka chanzhieps) pro1.6 allows remote attackers to read arbitrary files via directory traversal sequences in the pathname parameter to www/file.php."
},
{
"lang": "es",
"value": "QingDao Nature Easy Soft Chanzhi Enterprise Portal System (tambi\u00e9n conocido como chanzhieps) pro1.6 permite que atacantes remotos lean archivos arbitrarios mediante secuencias de salto de directorio en el par\u00e1metro pathname en www/file.php."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chanzhi:chanzhi:pro1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "277B0F16-A6FE-4BFA-BD0B-C0D9D1AC9AFF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/goodrain-apps/chanzhieps/issues/1",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}