René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

106 lines
3.6 KiB
JSON

{
"id": "CVE-2019-16064",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-19T18:15:14.037",
"lastModified": "2020-03-23T18:39:05.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "NETSAS Enigma NMS 65.0.0 and prior suffers from a directory traversal vulnerability that can allow an authenticated user to access files and directories stored outside of the web root folder. By exploiting this vulnerability, it is possible for an attacker to list operating-system directory contents on the server, create directories and upload files in permissible locations, and modify filenames and delete files that are accessible by the user running the web server instance."
},
{
"lang": "es",
"value": "NETSAS Enigma NMS versi\u00f3n 65.0.0 y anteriores, sufren de una vulnerabilidad de salto de directorio que puede permitir a un usuario autenticado acceder a archivos y directorios almacenados fuera de la carpeta root web. Al explotar esta vulnerabilidad, es posible que un atacante enumere el contenido del directorio del sistema operativo en el servidor, cree directorios y cargue archivos en ubicaciones permitidas, y modifique nombres de archivo y elimine los archivos a los que puede acceder el usuario que ejecuta la instancia del servidor web."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netsas:enigma_network_management_solution:*:*:*:*:*:*:*:*",
"versionEndIncluding": "65.0.0",
"matchCriteriaId": "220C0E41-42B3-4A8B-BBBB-F16BF22404B6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mogozobo.com/?p=3647",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}