mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
165 lines
6.5 KiB
JSON
165 lines
6.5 KiB
JSON
{
|
|
"id": "CVE-2018-11758",
|
|
"sourceIdentifier": "security@apache.org",
|
|
"published": "2018-08-22T20:29:00.240",
|
|
"lastModified": "2023-11-07T02:51:44.787",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2. CayenneModeler is a desktop GUI tool shipped with Apache Cayenne and intended for editing Cayenne ORM models stored as XML files. If an attacker tricks a user of CayenneModeler into opening a malicious XML file, the attacker will be able to instruct the XML parser built into CayenneModeler to transfer files from a local machine to a remote machine controlled by the attacker. The cause of the issue is XML parser processing XML External Entity (XXE) declarations included in XML. The vulnerability is addressed in Cayenne by disabling XXE processing in all operations that require XML parsing."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Esto afecta a Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1 y 3.1.2. CayenneModeler es una herramienta de interfaz de usuario gr\u00e1fica de escritorio suministrada con Apache Cayenne y destinada a la edici\u00f3n de modelos Cayenne ORM almacenados como archivos XML. Si un atacante enga\u00f1a a un usuario de CayenneModeler para abrir un archivo XML malicioso, el atacante ser\u00e1 capaz de instruir al analizador de XML incorporado en CayenneModeler para transferir archivos desde una m\u00e1quina local a una m\u00e1quina remota controlada por el atacante. La causa del problema es el analizador XML que procesa las declaraciones XXE (XML External Entity) incluidas en XML. La vulnerabilidad se soluciona en Cayenne desactivando el procesamiento XXE en todas las operaciones que requieran an\u00e1lisis XML."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 8.1,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.2
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-611"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.1.0",
|
|
"matchCriteriaId": "A45BC9B2-656A-4905-8184-4DE828569B40"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:3.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87533584-5B17-4159-AA08-EC535737E810"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:3.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0975873A-CC34-4D0F-A56D-05B5380B9A72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:3.2:milestone1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7FF0AE8E-3ED0-4461-ADF2-3C5BF92248FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:4.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "54353968-CDE4-404A-AF3C-19C4EF010B97"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:4.0:beta2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "30C167DA-CE35-4196-8820-57544174BEDA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:4.0:milestone2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59BB4BA9-F008-4283-8258-98766AE4B085"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:4.0:milestone3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6EDD25F6-C3C6-45BD-AF31-4C4A8578C91A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:4.0:milestone4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11F8CDD0-9A16-4A96-9B7F-1C87D00A8482"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:4.0:milestone5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72A2690C-7F05-4CB0-8B18-1E14766CD89C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:4.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E2B239A-230E-4A47-9889-722A9D06C647"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cayenne:4.1:milestone1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8042AA22-69F3-47D3-9B04-BFB3D8A2FAA2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/105142",
|
|
"source": "security@apache.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.apache.org/thread.html/ed60a4d329be3c722f105317ca883986dfcd17615c70d1df87f4528c%40%3Cuser.cayenne.apache.org%3E",
|
|
"source": "security@apache.org"
|
|
}
|
|
]
|
|
} |