mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
213 lines
6.9 KiB
JSON
213 lines
6.9 KiB
JSON
{
|
|
"id": "CVE-2020-8009",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2020-01-27T14:15:11.217",
|
|
"lastModified": "2020-02-06T19:37:44.430",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "AVB MOTU devices through 2020-01-22 allow /.. Directory Traversal, as demonstrated by reading the /etc/passwd file."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los dispositivos AVB MOTU hasta el 22-01-2020, permiten Salto de Directorio /.., como es demostrado mediante la lectura del archivo /etc/passwd."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:motu:avb_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2020-01-22",
|
|
"matchCriteriaId": "2FA0D687-AE7A-433E-BDF8-C4C4F6AE8326"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:112d:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43005D10-0110-4DA7-A59F-9549CBFE1AC1"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:1248:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34734A03-6A0A-45B6-88F6-2D70ADF198E9"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:16a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9DE36888-96C5-4B76-8EA9-CCEC6EB8A4DD"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:24ai:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24CF212D-089C-41A9-9E62-7597F3EEB50E"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:24ao:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B1E7F8F-4F68-469D-BD66-DE07B47D5B7A"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:624:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AADFCC4C-29CF-4755-901A-7C6D2F47BC3C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:828es:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32ABE074-2629-40F9-9AEC-CD56CBD27C52"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:828x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60D5251B-1589-47B1-8CF1-16077A7F3E32"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:8a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8F10102D-FA5A-46C7-9159-8711E60E401C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:8d:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9698D651-9695-429B-A682-286CFD635620"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:8m:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1509F8C5-46FB-4EB0-9F12-BDC5C8D45FF6"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:8pre-es:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BCAF560F-0E82-4712-B41E-8E2CA55991C3"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:avb:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7988DA87-F513-41DF-8A7D-0AED219C1629"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:lp32:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EF8CE98A-BF2D-4406-A000-4342F3532CB8"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:m64:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "753D5656-9F8D-488F-A198-EE148B50C366"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:monitor_8:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32B8A1F3-09E8-4DBB-965D-D03F9EC41F9B"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:moto_avb_switch:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5782F020-89F3-4850-9200-7E2B95FCBA3A"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:stage-b16:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B6E2EF0-642B-43DA-A3DD-9C45200EBC7B"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:ultralite-mk4:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "716575DA-D9A1-469C-B080-EC48674B2634"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motu:ultralite_avb:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "607DB0BD-A447-48ED-A1D5-1EB6399116CC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.securenetworkinc.com/news/2020/1/22/new-vulnerability-motu-avb-directory-traversal",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |