2024-12-08 03:06:42 +00:00

131 lines
4.2 KiB
JSON

{
"id": "CVE-2020-7227",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-18T19:15:11.167",
"lastModified": "2024-11-21T05:36:52.353",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, backup.asp, sys-power.asp, ifaces-wls.asp, ifaces-wls-pkt.asp, and ifaces-wls-pkt-adv.asp."
},
{
"lang": "es",
"value": "Los dispositivos Westermo MRD-315 versiones 1.7.3 y 1.7.4, presentan una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n que permite a un atacante remoto autenticado recuperar el c\u00f3digo fuente de diferentes funciones de la aplicaci\u00f3n web por medio de peticiones que carecen de determinados par\u00e1metros obligatorios. Esto afecta a los archivos ifaces-diag.asp, system.asp, backup.asp, sys-power.asp, ifaces-wls.asp, ifaces-wls-pkt.asp e ifaces-wls-pkt-adv.asp."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:westermo:mrd-315_firmware:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D744FC14-CB9D-42F9-A10A-F561060C6FE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:westermo:mrd-315_firmware:1.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5E89BF-AB6D-4491-B06F-BC69A763DEC0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westermo:mrd-315:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC85514-06C0-4E7B-AA7E-E1C25DE85007"
}
]
}
]
}
],
"references": [
{
"url": "https://sku11army.blogspot.com/2020/01/westermo-source-code-disclousure-in.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://sku11army.blogspot.com/2020/01/westermo-source-code-disclousure-in.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}