René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

151 lines
4.3 KiB
JSON

{
"id": "CVE-2019-18910",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2019-11-22T22:15:11.373",
"lastModified": "2022-01-01T20:12:33.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Citrix Receiver wrapper function does not safely handle user supplied input, which may be leveraged by an attacker to inject commands that will execute with local user privileges."
},
{
"lang": "es",
"value": "La funci\u00f3n de contenedor Citrix Receiver no maneja de forma segura la entrada suministrada por parte el usuario, lo que puede ser aprovechado por un atacante para inyectar comandos que se ejecutar\u00e1n con privilegios de usuario local."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:thinpro:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3690A60E-FF1E-48D3-A3B0-A2A09B381D92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:thinpro:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D52CF5AE-B169-4DF0-8680-0090AC0BAB97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:thinpro:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "57986577-5CED-4480-85AE-80B175820158"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:thinpro:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D71F8BCD-3262-4FC4-8E51-A3D64EA59B5E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/156909/HP-ThinPro-6.x-7.x-Privileged-Command-Injection.html",
"source": "hp-security-alert@hp.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2020/Mar/40",
"source": "hp-security-alert@hp.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://support.hp.com/us-en/document/c06509350",
"source": "hp-security-alert@hp.com",
"tags": [
"Vendor Advisory"
]
}
]
}