René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
4.1 KiB
JSON

{
"id": "CVE-2017-6777",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2017-08-17T20:29:00.650",
"lastModified": "2017-08-22T17:59:26.997",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the ConfD server of the Cisco Elastic Services Controller (ESC) could allow an authenticated, remote attacker to acquire sensitive system information. The vulnerability is due to insufficient protection of sensitive files on the system. An attacker could exploit this vulnerability by logging into the ConfD server and executing certain commands. An exploit could allow an unprivileged user to view configuration parameters that can be maliciously used. Cisco Bug IDs: CSCvd76409. Known Affected Releases: 2.3, 2.3(2)."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el servidor ConfD de Cisco Elastic Services Controller (ESC) podr\u00eda permitir que un atacante remoto autenticado obtenga informaci\u00f3n sensible del sistema. Esta vulnerabilidad se debe a una protecci\u00f3n de archivos sensibles del sistema insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad iniciando sesi\u00f3n en el servidor ConfD y ejecutando ciertos comandos. Un exploit podr\u00eda permitir que un usuario sin privilegios vea par\u00e1metros de configuraci\u00f3n que pueden emplearse de forma maliciosa. Cisco Bug IDs: CSCvd76409. Versiones afectadas conocidas: 2.3, 2.3(2)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:elastic_services_controller:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2F72EBEE-43E5-42E1-9DDB-5A5CEBE5CA13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:elastic_services_controller:2.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69D4B076-9094-43A1-B2BC-0E3F080BF187"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/100390",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-esc3",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}