Show plain JSON{"id": "CVE-2018-1000082", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2018-03-13T15:29:00.973", "references": [{"url": "https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "Ajenti version version 2 contains a Cross ite Request Forgery (CSRF) vulnerability in the command execution panel of the tool used to manage the server. that can result in Code execution on the server . This attack appear to be exploitable via Being a CSRF, victim interaction is needed, when the victim access the infected trigger of the CSRF any code that match the victim privledges on the server can be executed.."}, {"lang": "es", "value": "La versi\u00f3n 2 de Ajenti contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) en el panel de ejecuci\u00f3n de comandos de la herramienta empleada para gestionar el servidor que puede resultar en la ejecuci\u00f3n de c\u00f3digo en el servidor. Este ataque parece ser explotable ya que, al tratarse de CSRF, se necesita interacci\u00f3n con la v\u00edctima cuando la v\u00edctima accede al desencadenante infectado del CSRF, cualquier c\u00f3digo que coincida con los privilegios de la v\u00edctima en el servidor puede ejecutarse."}], "lastModified": "2024-11-21T03:39:36.110", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ajenti:ajenti:2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8536982E-2969-42F7-B702-59330A87046C"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}