2024-12-08 03:06:42 +00:00

115 lines
3.5 KiB
JSON

{
"id": "CVE-2020-10365",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-18T22:15:12.250",
"lastModified": "2024-11-21T04:55:09.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LogicalDoc before 8.3.3 allows SQL Injection. LogicalDoc populates the list of available documents by querying the database. This list could be filtered by modifying some of the parameters. Some of them are not properly sanitized which could allow an authenticated attacker to perform arbitrary queries to the database."
},
{
"lang": "es",
"value": "LogicalDoc versiones anteriores a 8.3.3, permite una Inyecci\u00f3n SQL. LogicalDoc llena la lista de documentos disponibles consultando la base de datos. Esta lista podr\u00eda ser filtrada al modificar algunos de los par\u00e1metros. Alguno de ellos no est\u00e1n apropiadamente saneados lo que podr\u00eda permitir a un atacante autenticado realizar consultas arbitrarias en la base de datos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.3.3",
"matchCriteriaId": "3F1A3864-AE31-4FA6-AE3A-B6086D4AFA3A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}