2025-03-02 03:03:52 +00:00

68 lines
2.1 KiB
JSON

{
"id": "CVE-2021-46686",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-02-18T00:15:20.757",
"lastModified": "2025-02-18T00:15:20.757",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in acmailer CGI ver.4.0.3 and earlier and acmailer DB ver.1.1.5 and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker."
},
{
"lang": "es",
"value": "Existe una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un problema de comando OS ('inyecci\u00f3n de comandos de os') en ACMailer CGI ver.4.0.3 y antes y Acmailer DB Ver.1.1.5 y anterior. Si se explota esta vulnerabilidad, un atacante puede ejecutar un comando arbitrario del sistema operativo."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://acmailer.jp/info/de.cgi?id=103",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN96957439/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.acmailer.jp/info/de.cgi?id=102",
"source": "vultures@jpcert.or.jp"
}
]
}