René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

129 lines
4.4 KiB
JSON

{
"id": "CVE-2017-6710",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2017-08-17T20:29:00.370",
"lastModified": "2017-08-25T11:04:55.343",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cisco Virtual Network Function (VNF) Element Manager could allow an authenticated, remote attacker to elevate privileges and run commands in the context of the root user on the server. The vulnerability is due to command settings that allow Cisco VNF Element Manager users to specify arbitrary commands that will run as root on the server. An attacker could use this setting to elevate privileges and run commands in the context of the root user on the server. Cisco Bug IDs: CSCvc76670. Known Affected Releases: prior to 5.0.4 and 5.1.4."
},
{
"lang": "es",
"value": "Una vulnerabilidad en Cisco Virtual Network Function (VNF) Element Manager podr\u00eda permitir que un atacante remoto autenticado elevase privilegios y ejecutase comandos en el contexto del usuario root en el servidor. Esta vulnerabilidad se debe a la configuraci\u00f3n de comandos que permite a los usuarios de Cisco VNF Element Manager especificar comandos arbitrarios que se ejecutar\u00e1n como root en el servidor. Un atacante podr\u00eda emplear esta configuraci\u00f3n para elevar privilegios y ejecutar comandos en el contexto del usuario root en el servidor. Cisco Bug IDs: CSCvc76670. Versiones afectadas conocidas: anteriores a la 5.0.4 y 5.1.4"
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 9.2,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:virtual_network_function_element_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.1.3",
"matchCriteriaId": "FF9B8506-3299-4441-A13A-D7BE4D840689"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:virtual_network_function_element_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "BA0EA90E-C0E1-4ECE-83E0-4CC1BDE3C2A7"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/100362",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-em",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}