René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

122 lines
3.9 KiB
JSON

{
"id": "CVE-2018-9246",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-06-08T01:29:02.170",
"lastModified": "2018-08-01T16:00:26.653",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application."
},
{
"lang": "es",
"value": "El m\u00f3dulo PGObject::Util::DBAdmin en versiones anteriores a la 0.120.0 para Perl, tal y como se utiliza en LedgerSMB hasta la versi\u00f3n 1.5.x sanea o escapa insuficientemente los valores de variable que se emplean como parte de una ejecuci\u00f3n de comandos shell, lo que resulta en la inyecci\u00f3n de c\u00f3digo shell mediante las funciones create(), run_file(), backup() o restore(). La vulnerabilidad permite que usuarios no autorizados ejecuten c\u00f3digo con los mismos privilegios que la aplicaci\u00f3n que se est\u00e1 ejecutando."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pgobject-util-dbadmin_project:pgobject-util-dbadmin:*:*:*:*:*:perl:*:*",
"versionEndExcluding": "0.120.0",
"matchCriteriaId": "19AA986F-B73C-4BD6-9FFD-8A808B2D45B3"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.5.0",
"versionEndIncluding": "1.5.21",
"matchCriteriaId": "B2369675-B321-4129-9FFF-9F305C4B32B0"
}
]
}
]
}
],
"references": [
{
"url": "https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}