Show plain JSON{"id": "CVE-2015-9098", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2017-06-22T19:29:00.197", "references": [{"url": "http://www.red-gate.com/products/dba/sql-monitor/entrypage/security-vulnerability", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/42444/", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "http://www.red-gate.com/products/dba/sql-monitor/entrypage/security-vulnerability", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/42444/", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "In Redgate SQL Monitor before 3.10 and 4.x before 4.2, a remote attacker can gain unauthenticated access to the Base Monitor, resulting in the ability to execute arbitrary SQL commands on any monitored Microsoft SQL Server machines. If the Base Monitor is connecting to these machines using an account with SQL admin privileges, then code execution on the operating system can result in full system compromise (if Microsoft SQL Server is running with local administrator privileges)."}, {"lang": "es", "value": "en Redgate SQL Monitor anterior a 3.10 y 4.x anterior a 4.3, un atacante remoto puede ganar acceso sin autentificar a el Base Monitor, resultando en la capacidad de ejecutar un comando SQL aleatorio en alguna m\u00e1quina Microsoft SQL Server monitoreada. Si el Base Monitor esta conectado a esas m\u00e1quinas usando una cuenta SQL con privilegios administrativos, la ejecuci\u00f3n del c\u00f3digo en el sistema operativo puede resultar en comprometer el sistema completo (si Microsoft SQL Server esta ejecut\u00e1ndose con privilegios de administrador local)."}], "lastModified": "2024-11-21T02:39:47.867", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:red-gate:sql_monitor:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D182AEA1-29B9-45D0-8C99-BE9D3A11A2FF", "versionEndIncluding": "3.5"}, {"criteria": "cpe:2.3:a:red-gate:sql_monitor:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62639546-5B26-49E8-BF6A-EF0BF072C8DC"}, {"criteria": "cpe:2.3:a:red-gate:sql_monitor:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "209DF30C-664F-4A8F-8430-BB9AE8DA30D7"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}