2024-12-08 03:06:42 +00:00

122 lines
4.0 KiB
JSON

{
"id": "CVE-2017-8799",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-05-05T18:29:00.557",
"lastModified": "2024-11-21T03:34:43.757",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Untrusted input execution via igetwild in all iRODS versions before 4.1.11 and 4.2.1 allows other iRODS users (potentially anonymous) to execute remote shell commands via iRODS virtual pathnames. To exploit this vulnerability, a virtual iRODS pathname that includes a semicolon would be retrieved via igetwild. Because igetwild is a Bash script, the part of the pathname following the semicolon would be executed in the user's shell."
},
{
"lang": "es",
"value": "Una ejecuci\u00f3n de entrada no confiable a trav\u00e9s de igetwild en todas las versiones de iRODS anteriores a 4.1.11 y 4.2.1 permite a otros usuarios de iRODS (potencialmente an\u00f3nimos) ejecutar comandos de shell remotos a trav\u00e9s de rutas virtuales de iRODS. Para explotar esta vulnerabilidad, una ruta virtual de iRODS que incluye un punto y coma ser\u00eda recuperada a trav\u00e9s de igetwild. Debido a que igetwild es un Bash script, la parte del nombre de ruta que sigue al punto y coma ser\u00eda ejecutada en el shell del usuario."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.1.10",
"matchCriteriaId": "751FFDCB-E29E-4CB9-9056-73DE558B26BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:irods:irods:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "128CDF56-B194-4157-BDB5-DC2294853D62"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/irods/irods/issues/3452",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/irods/irods/issues/3452",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}