René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

131 lines
4.2 KiB
JSON

{
"id": "CVE-2022-21167",
"sourceIdentifier": "report@snyk.io",
"published": "2022-05-01T16:15:08.080",
"lastModified": "2022-10-07T15:11:30.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "All versions of package masuit.tools.core are vulnerable to Arbitrary Code Execution via the ReceiveVarData<T> function in the SocketClient.cs component. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter."
},
{
"lang": "es",
"value": "Todas las versiones del paquete masuit.tools.core son vulnerables a una Ejecuci\u00f3n Arbitraria de C\u00f3digo por medio de la funci\u00f3n ReceiveVarData(T) en el componente SocketClient.cs. El cliente de socket en el paquete puede pasar en la carga \u00fatil por medio de la entrada controlable por el usuario despu\u00e9s de que ha sido establecida, porque esta transmisi\u00f3n de cliente de socket no presenta las restricciones apropiadas o enlaces de tipo para el BinaryFormatter"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ldqk:masuit.tools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93FD2B19-5381-4771-A654-BBFCB4F53871"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ldqk/Masuit.Tools/blob/327f42b9f20f25bb66188672199c8265fc968d91/Masuit.Tools.Abstractions/Net/SocketClient.cs%23L197",
"source": "report@snyk.io",
"tags": [
"Broken Link"
]
},
{
"url": "https://snyk.io/vuln/SNYK-DOTNET-MASUITTOOLSCORE-2316875",
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
]
}
]
}