2024-12-08 03:06:42 +00:00

122 lines
4.1 KiB
JSON

{
"id": "CVE-2020-13651",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-06-15T19:15:10.043",
"lastModified": "2024-11-21T05:01:40.913",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in DigDash 2018R2 before p20200528, 2019R1 before p20200421, and 2019R2 before p20200430. It allows a user to provide data that will be used to generate the JNLP file used by a client to obtain the right Java application. By providing an attacker-controlled URL, the client will obtain a rogue JNLP file specifying the installation of malicious JAR archives and executed with full privileges on the client computer."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en DigDash versiones 2018R2 anteriores a p20200528, versiones 2019R1 anteriores a p20200421 y versiones 2019R2 anteriores a p20200430. Permite al usuario proporcionar datos que se utilizar\u00e1n para generar el archivo JNLP utilizado por un cliente para obtener la aplicaci\u00f3n Java correcta. Al proporcionar una URL controlada por el atacante, el cliente obtendr\u00e1 un archivo JNLP falso que especifica la instalaci\u00f3n de archivos JAR maliciosos y se ejecutar\u00e1 con todos los privilegios en la computadora del cliente"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digdash:digdash:2018r2:-:*:*:*:*:*:*",
"matchCriteriaId": "4C915628-1A66-4FAB-AF2E-60B7E116D9EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digdash:digdash:2019r1:-:*:*:*:*:*:*",
"matchCriteriaId": "EFD00F91-55B8-4779-A25E-1103247C38EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digdash:digdash:2019r2:-:*:*:*:*:*:*",
"matchCriteriaId": "E59A6E14-D7E8-4E0D-91E6-5DCB4C2CC7C8"
}
]
}
]
}
],
"references": [
{
"url": "https://know.bishopfox.com/advisories/digdash-version-2018",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://know.bishopfox.com/advisories/digdash-version-2018",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}