René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

177 lines
5.1 KiB
JSON

{
"id": "CVE-2014-2179",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-11-07T11:55:02.517",
"lastModified": "2018-10-09T19:43:10.847",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to upload files to arbitrary locations via a crafted HTTP request, aka Bug ID CSCuh86998."
},
{
"lang": "es",
"value": "El firmware del router Cisco RV en los dispositivos RV220W, anterior a 1.0.5.9 en los dispositivos RV120W, y anterior a 1.0.4.14 en los dispositivos RV180 y RV180W permite a atacantes remotos subir ficheros a localizaciones arbitrarias a trav\u00e9s de una solicitud HTTP manipulada, tambi\u00e9n conocido como Bug ID CSCuh86998."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.3.10",
"matchCriteriaId": "66B8EC15-EC05-49DD-9334-AEE5C396FEC1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8BD67F3-98CE-4B03-8980-6791B753FDC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E3FBF6-4EB3-4C2F-AE0E-25F5765DD107"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.5.8",
"matchCriteriaId": "CAE232F2-B674-40E7-A96D-A1AC07CB84B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40465CA8-BE8B-4F15-8578-D8972C241D84"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.5.8",
"matchCriteriaId": "6D5EB99F-8672-4939-95E8-AEE242A4EB6E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8620DFD9-E280-464E-91FF-2E901EDD49C0"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html",
"source": "ykramarz@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2014/Nov/6",
"source": "ykramarz@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv",
"source": "ykramarz@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031171",
"source": "ykramarz@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98499",
"source": "ykramarz@cisco.com"
}
]
}