Show plain JSON{"id": "CVE-2018-7669", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2018-04-27T16:29:01.050", "references": [{"url": "http://seclists.org/fulldisclosure/2018/Apr/47", "tags": ["Exploit", "Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://kb.sitecore.net/articles/356221", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/45152/", "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2018/Apr/47", "tags": ["Exploit", "Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://kb.sitecore.net/articles/356221", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/45152/", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 and above. The 'Log Viewer' application is vulnerable to a directory traversal attack, allowing an attacker to access arbitrary files from the host Operating System using a sitecore/shell/default.aspx?xmlcontrol=LogViewerDetails&file= URI. Validation is performed to ensure that the text passed to the 'file' parameter correlates to the correct log file directory. This filter can be bypassed by including a valid log filename and then appending a traditional 'dot dot' style attack."}, {"lang": "es", "value": "Se ha descubierto un problema en Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 y anteriores. La aplicaci\u00f3n \"Log Viewer\" es vulnerable a un ataque de salto de directorio que permite que un atacante acceda a archivos arbitrarios desde el sistema operativo del host mediante un URI sitecore/shell/default.aspx?xmlcontrol=LogViewerDetailsfile=. Se realiza validaci\u00f3n para asegurar que el texto que se pasa al par\u00e1metro \"file\" se correlaciona con el directorio de archivo de registro correcto. Este filtro puede ser omitido incluyendo un nombre de archivo de registro v\u00e1lido y, despu\u00e9s, a\u00f1adiendo un ataque tradicional de estilo \"punto punto\"."}], "lastModified": "2024-11-21T04:12:30.710", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:sitecore:sitecore.net:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B63EC1EF-1533-4424-A4F4-7AB100E97FB2", "versionStartIncluding": "8.2"}, {"criteria": "cpe:2.3:a:sitecore:sitecore.net:8.1:update1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC2A1105-4B1A-41FB-BDF2-27879231A376"}, {"criteria": "cpe:2.3:a:sitecore:sitecore.net:8.1:update2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "949E7547-0FA2-47DD-9046-EAF6B5117354"}, {"criteria": "cpe:2.3:a:sitecore:sitecore.net:8.1:update3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6DDD83E-FBFC-4919-B2B2-2B84D3398D23"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}