René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

106 lines
3.1 KiB
JSON

{
"id": "CVE-2021-28132",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-03-11T07:15:12.587",
"lastModified": "2021-03-22T12:50:47.680",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "LUCY Security Awareness Software through 4.7.x allows unauthenticated remote code execution because the Migration Tool (in the Support section) allows upload of .php files within a system.tar.gz file. The .php file becomes accessible with a public/system/static URI."
},
{
"lang": "es",
"value": "LUCY Security Awareness Software versiones hasta 4.7.x, permite una ejecuci\u00f3n de c\u00f3digo remota no autenticada porque la Migration Tool (en la secci\u00f3n Support) permite cargar archivos .php dentro de un archivo system.tar.gz. El archivo .php se vuelve accesible con un URI public/system/static"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lucysecurity:security_awareness:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.7.8",
"matchCriteriaId": "9CB367C4-34B9-4C25-AA51-4C486AC252BA"
}
]
}
]
}
],
"references": [
{
"url": "https://abuyv.com/cve/lucy-file-upload-RCE",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}