mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
165 lines
5.8 KiB
JSON
165 lines
5.8 KiB
JSON
{
|
|
"id": "CVE-2019-12165",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2019-05-29T17:29:00.227",
|
|
"lastModified": "2021-04-20T17:47:41.780",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "MiCollab 7.3 PR2 (7.3.0.204) and earlier, 7.2 (7.2.2.13) and earlier, and 7.1 (7.1.0.57) and earlier and MiCollab AWV 6.3 (6.3.0.103), 6.2 (6.2.2.8), 6.1 (6.1.0.28), 6.0 (6.0.0.61), and 5.0 (5.0.5.7) have a Command Execution Vulnerability. Successful exploit of this vulnerability could allow an attacker to execute arbitrary system commands."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "MiCollab versi\u00f3n 7.3 PR2 (7.3.0.204) y anteriores, versi\u00f3n 7.2 (7.2.2.13) y anteriores, y versi\u00f3n 7.1 (7.1.0.57) y anteriores y MiCollab AWV versi\u00f3n 6.3 (6.3.0.103), versi\u00f3n 6.2 (6.2.2.8), versi\u00f3n 6.1 (6.1. 0.28), versi\u00f3n 6.0 (6.0.0.61) y versi\u00f3n 5.0 (5.0.5.7), presentan una vulnerabilidad de ejecuci\u00f3n de comandos. La explotaci\u00f3n con \u00e9xito de esta vulnerabilidad permitir\u00eda a un atacante ejecutar comandos de sistema arbitrarios."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.1",
|
|
"versionEndIncluding": "7.1.0.57",
|
|
"matchCriteriaId": "0A0B6D66-718E-452E-BDD3-F16B49F100DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.2",
|
|
"versionEndIncluding": "7.2.2.13",
|
|
"matchCriteriaId": "95FCE96A-2887-48CE-9692-BF3A7019F54C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.3",
|
|
"versionEndIncluding": "7.3.0.204",
|
|
"matchCriteriaId": "07CC5E58-CF84-4B0F-ABA5-B7550246D27F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mitel:micollab_audio\\,_web_\\&_video_conferencing:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "5.0",
|
|
"versionEndIncluding": "5.0.5.7",
|
|
"matchCriteriaId": "754F2F9A-38AA-4B97-A82B-062002722886"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mitel:micollab_audio\\,_web_\\&_video_conferencing:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.0",
|
|
"versionEndIncluding": "6.0.0.61",
|
|
"matchCriteriaId": "90B5DD67-ED2E-49ED-B498-687B20C4EACF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mitel:micollab_audio\\,_web_\\&_video_conferencing:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.1",
|
|
"versionEndIncluding": "6.1.0.28",
|
|
"matchCriteriaId": "D114B88B-2391-42A1-AE69-30A2D02B14E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mitel:micollab_audio\\,_web_\\&_video_conferencing:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.2",
|
|
"versionEndIncluding": "6.2.2.8",
|
|
"matchCriteriaId": "E46A2995-2F38-47F2-AF9A-66FC8E282C10"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mitel:micollab_audio\\,_web_\\&_video_conferencing:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.3",
|
|
"versionEndIncluding": "6.3.0.103",
|
|
"matchCriteriaId": "8904EE7C-E511-46EF-B9FB-B05166888DAA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.mitel.com/-/media/mitel/pdf/content-entry-pdf/en-security-bulletin-17-0010-004.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |