Show plain JSON{"id": "CVE-2019-7195", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2019-12-05T17:15:13.183", "references": [{"url": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "security@qnapsecurity.com.tw"}, {"url": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25", "tags": ["Vendor Advisory"], "source": "security@qnapsecurity.com.tw"}, {"url": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions."}, {"lang": "es", "value": "Esta vulnerabilidad de control externo del nombre de archivo o de ruta permite a atacantes remotos acceder o modificar archivos del sistema. Para corregir la vulnerabilidad, QNAP recomienda actualizar Photo Station a sus \u00faltimas versiones."}], "lastModified": "2025-02-13T14:13:03.560", "cisaActionDue": "2022-06-22", "cisaExploitAdd": "2022-06-08", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EBB24B5-9DF0-4758-8015-8D45CD88E48B", "versionEndExcluding": "6.0.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qnap:qts:4.4.1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "47B6D38A-D7C9-4D55-921C-488D56C43F25"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E45F93C-9B1F-4C76-AF80-620F6E954522", "versionEndExcluding": "5.7.10"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AD20D15E-C474-48FC-9A84-12CD6AF01F1F", "versionEndIncluding": "4.4.0", "versionStartIncluding": "4.3.4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C435DCB-A00F-49DA-B06B-06D29F1AAC5A", "versionEndExcluding": "5.4.9"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "99543D0A-1E01-4664-BDB6-E3263BA34825", "versionEndIncluding": "4.3.3", "versionStartIncluding": "4.3.0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9872DF1-5B03-4D85-925F-D0AF6CE0F5AF", "versionEndExcluding": "5.2.11"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qnap:qts:4.2.6:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1D9E6F8F-A433-45A7-8839-5D478FE179A4"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "security@qnapsecurity.com.tw", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "QNAP Photo Station Path Traversal Vulnerability"}