Show plain JSON{"id": "CVE-2019-14259", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.7, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 5.1, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.0, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.1}]}, "published": "2019-08-01T15:15:14.937", "references": [{"url": "https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Obihai_Obi1002.pdf?_=1563787869", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Obihai_Obi1002.pdf?_=1563787869", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "On the Polycom Obihai Obi1022 VoIP phone with firmware 5.1.11, a command injection (missing input validation) issue in the NTP server IP address field for the \"Time Service Settings web\" interface allows an authenticated remote attacker in the same network to trigger OS commands via shell commands in a POST request."}, {"lang": "es", "value": "En el tel\u00e9fono Obihai Obi1022 VoIP de Polycom con la versi\u00f3n firmware 5.1.11, un problema de inyecci\u00f3n de comandos (falta de comprobaci\u00f3n de entrada) en el campo direcci\u00f3n IP del servidor NTP para la interfaz \"Time Service Settings web\", permite a un atacante remoto autenticado en la misma red activar comandos de sistema operativo por medio de comandos shell en una petici\u00f3n POST."}], "lastModified": "2024-11-21T04:26:18.903", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:polycom:obihai_obi1022_firmware:5.1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "444CB461-2E6D-4792-A178-08E45D4DFF9A"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:polycom:obihai_obi1022:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "21B72C2A-CE0A-41A2-834A-EE4509980693"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}