Show plain JSON{"id": "CVE-2019-18939", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2019-11-14T19:15:13.410", "references": [{"url": "https://psytester.github.io/CVE-2019-18939/", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://psytester.github.io/CVE-2019-18939/", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-306"}]}], "descriptions": [{"lang": "en", "value": "eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn through 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP POST request."}, {"lang": "es", "value": "eQ-3 Homematic CCU2 versi\u00f3n 2.47.20 y CCU3 versi\u00f3n 3.47.18 con el AddOn HM-Print instalado versiones hasta 1.2a, permite la Ejecuci\u00f3n de C\u00f3digo Remota por parte de atacantes no autenticados con acceso a la interfaz web por medio de los scripts exec.cgi y exec1.cgi, que ejecutan un contenido de script TCL desde una petici\u00f3n POST de HTTP."}], "lastModified": "2024-11-21T04:33:52.900", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:hm-print_project:hm-print:1.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "286DA904-5631-4AAF-86DE-97C23982D2C5"}, {"criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC"}, {"criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26"}], "operator": "AND"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:hm-print_project:hm-print:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5D8290F-3541-4452-99CB-0766CDC59073"}, {"criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04"}, {"criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654"}], "operator": "AND"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:hm-print_project:hm-print:1.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "286DA904-5631-4AAF-86DE-97C23982D2C5"}, {"criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04"}, {"criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654"}], "operator": "AND"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:hm-print_project:hm-print:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5D8290F-3541-4452-99CB-0766CDC59073"}, {"criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC"}, {"criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26"}], "operator": "AND"}]}], "sourceIdentifier": "cve@mitre.org"}