René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.6 KiB
JSON

{
"id": "CVE-2019-19731",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-12-16T17:15:12.253",
"lastModified": "2019-12-23T19:12:52.863",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Roxy Fileman 1.4.5 for .NET is vulnerable to path traversal. A remote attacker can write uploaded files to arbitrary locations via the RENAMEFILE action. This can be leveraged for code execution by uploading a specially crafted Windows shortcut file and writing the file to the Startup folder (because an incomplete blacklist of file extensions allows Windows shortcut files to be uploaded)."
},
{
"lang": "es",
"value": "Roxy Fileman versi\u00f3n 1.4.5 para .NET es vulnerable a un salto de la ruta. Un atacante remoto puede escribir archivos cargados en ubicaciones arbitrarias por medio de la acci\u00f3n RENAMEFILE. Esto puede ser aprovechado para una ejecuci\u00f3n de c\u00f3digo mediante la carga de un archivo de acceso directo de Windows especialmente dise\u00f1ado y escribiendo el archivo en la carpeta de Inicio (porque una lista negra incompleta de extensiones de archivo permite que archivos de acceso directo de Windows sea cargados)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roxyfileman:roxy_fileman:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F1EB9BDC-7B22-4442-886F-EF28A8A1C9A9"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/155666/Roxy-Fileman-1.4.5-For-.NET-Directory-Traversal.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.roxyfileman.com/download",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}