René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
3.6 KiB
JSON

{
"id": "CVE-2019-11201",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-07-29T16:15:11.413",
"lastModified": "2019-08-05T18:00:46.507",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies the inclusion of dynamic content. Thus, a lower privileged user of the application can execute code under the context and permissions of the underlying web server."
},
{
"lang": "es",
"value": "Dolibarr ERP/CRM versi\u00f3n 9.0.1, proporciona un m\u00f3dulo llamado website que proporciona la creaci\u00f3n de sitios web p\u00fablicos con un editor WYSIWYG. Se identific\u00f3 que el editor tambi\u00e9n permit\u00eda la inclusi\u00f3n de c\u00f3digo din\u00e1mico, lo que puede conllevar a la ejecuci\u00f3n de c\u00f3digo en el equipo host. Un atacante tiene que comprobar una configuraci\u00f3n en la misma p\u00e1gina, que especifica la inclusi\u00f3n de contenido din\u00e1mico. Por lo tanto, un usuario poco privilegiado de la aplicaci\u00f3n puede ejecutar c\u00f3digo bajo el contexto y los permisos del servidor web subyacente."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "22DC97F0-80D1-42CA-916C-0B87C3A4349A"
}
]
}
]
}
],
"references": [
{
"url": "https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}