mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
114 lines
4.0 KiB
JSON
114 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2018-12076",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2018-12-13T19:29:00.213",
|
|
"lastModified": "2024-11-21T03:44:32.477",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the UPC bar code of the Avanti Markets MarketCard could allow an unauthenticated, local attacker to access funds within the customer's MarketCard balance, and also could lead to Customer Information Disclosure. The vulnerability is due to lack of proper validation of the UPC bar code present on the MarketCard. An attacker could exploit this vulnerability by generating a copy of a customer's bar code. An exploit could allow the attacker to access all funds located within the MarketCard or allow unauthenticated disclosure of information."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en el c\u00f3digo de barras de UPC de Avanti Markets MarketCard podr\u00eda permitir que un atacante local no autenticado acceda a fondos en el balance MarketCard del cliente y tambi\u00e9n podr\u00eda conducir a una divulgaci\u00f3n de la informaci\u00f3n del cliente. La vulnerabilidad se debe a la falta de validaci\u00f3n del c\u00f3digo de barras de UPC en el MarketCard. Un atacante podr\u00eda explotar esta vulnerabilidad generando una copia del c\u00f3digo de barras de un cliente. Su explotaci\u00f3n podr\u00eda permitir que el atacante acceda a todos los fondos ubicados en MarketCard o permitir la divulgaci\u00f3n no autenticada de informaci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"baseScore": 4.2,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "PHYSICAL",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 0.5,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
|
"baseScore": 1.9,
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.4,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:avantimarkets:market_card:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "18C6A374-E11C-4141-B13F-CBAFFDF54600"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://sorsnce.com/2018/11/13/announcing-cve-2018-12076/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"URL Repurposed"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://sorsnce.com/2018/11/13/announcing-cve-2018-12076/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"URL Repurposed"
|
|
]
|
|
}
|
|
]
|
|
} |