Show plain JSON{"id": "CVE-2018-14573", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 5.5, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 1.8}]}, "published": "2018-07-23T23:29:00.217", "references": [{"url": "http://release-notes.trms.com/txt/448", "tags": ["Not Applicable", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://release-notes.trms.com/txt/448", "tags": ["Not Applicable", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "A Local File Inclusion (LFI) vulnerability exists in the Web Interface API of TightRope Media Carousel Digital Signage before 7.3.5. The RenderingFetch API allows for the downloading of arbitrary files through the use of directory traversal sequences, aka CSL-1683."}, {"lang": "es", "value": "Existe una vulnerabilidad de inclusi\u00f3n de archivos locales (LFI) en la API de la interfaz web de TightRope Media Carousel Digital Signage en versiones anteriores a la 7.3.5. La API RenderingFetch permite la descarga de archivos arbitrarios mediante el uso de secuencias de salto de directorio, lo que tambi\u00e9n se conoce como CSL-1683."}], "lastModified": "2024-11-21T03:49:20.003", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:trms:tightrope_media_carousel_digital_signage:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "237987D7-1EA7-4390-9DD6-61AC362FFE43", "versionEndExcluding": "7.3.5"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}