René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.9 KiB
JSON

{
"id": "CVE-2020-8810",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-02-25T19:15:11.880",
"lastModified": "2020-03-04T21:27:07.373",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Gurux GXDLMS Director through 8.5.1905.1301. When downloading OBIS codes, it does not verify that the downloaded files are actual OBIS codes and doesn't check for path traversal. This allows the attacker exploiting CVE-2020-8809 to send executable files and place them in an autorun directory, or to place DLLs inside the existing GXDLMS Director installation (run on next execution of GXDLMS Director). This can be used to achieve code execution even if the user doesn't have any add-ins installed."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Gurux GXDLMS Director versiones hasta 8.5.1905.1301. Cuando se descargan c\u00f3digos OBIS, no verifica que los archivos descargados sean c\u00f3digos OBIS reales y no comprueba el salto de ruta. Esto permite a un atacante explotar el CVE-2020-8809 al enviar archivos ejecutables y colocarlos en un directorio autorun, o colocar bibliotecas DLL dentro de la instalaci\u00f3n existente de GXDLMS Director (correr en la pr\u00f3xima ejecuci\u00f3n del GXDLMS Director). Esto puede ser usado para lograr una ejecuci\u00f3n de c\u00f3digo incluso si el usuario no tiene ning\u00fan add-ins instalado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gurux:device_language_message_specification_director:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.5.1905.1301",
"matchCriteriaId": "9D931C54-0AB4-4DDE-8A4F-83A6900169CC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/seqred-s-a/gxdlmsdirector-cve",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://seqred.pl/en/cve-gurux-gxdlms-director/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}