2023-10-05 18:01:48 +00:00

117 lines
3.4 KiB
JSON

{
"id": "CVE-2023-3512",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-10-04T11:15:10.363",
"lastModified": "2023-10-05T17:04:39.053",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Relative path traversal vulnerability in Setelsa Security's ConacWin CB, in its 3.8.2.2 version and earlier, the exploitation of which could allow an attacker to perform an arbitrary download of files from the system via the \"Download file\" parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad relativa de path traversal en Setelsa Security's ConacWin CB, en su versi\u00f3n 3.8.2.2 y anteriores, cuya explotaci\u00f3n podr\u00eda permitir a un atacante realizar una descarga arbitraria de archivos del sistema a trav\u00e9s del par\u00e1metro \"Descargar archivo\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:setelsa-security:conacwin:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.8.2.2",
"matchCriteriaId": "AECA3302-4A34-45AA-A68E-A8CDEC89526A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/advisories/GHSA-v6jm-v768-76h2",
"source": "nvd@nist.gov",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-setelsa-security-conacwin",
"source": "cve-coordination@incibe.es",
"tags": [
"Broken Link"
]
}
]
}