René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

125 lines
4.0 KiB
JSON

{
"id": "CVE-2019-7297",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-01-31T22:29:00.203",
"lastModified": "2019-02-19T16:47:02.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en dispositivos D-Link DIR-823G con firmware hasta la versi\u00f3n 1.02B03. Una vulnerabilidad de inyecci\u00f3n de comandos permite que los atacantes ejecuten comandos arbitrarios del sistema operativo mediante metacaracteres shell en una petici\u00f3n /HNAP1 manipulada. Esto ocurre cuando la funci\u00f3n GetNetworkTomographyResult llama a la funci\u00f3n del sistema con un par\u00e1metro de entrada no fiable llamado Address. Como consecuencia, un atacante puede ejecutar cualquier comando de forma remota cuando controla esta entrada."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:d-link:dir-823g_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.02b03",
"matchCriteriaId": "497F7AEB-9FFB-418B-8D92-CDA805D59C95"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:d-link:dir-823g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D56FA0A8-3D4A-4740-B7EF-2104A5ECE15A"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/106815",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/leonW7/D-Link/blob/master/Vul_1.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}