Show plain JSON{"id": "CVE-2019-9189", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2019-06-05T18:29:01.217", "references": [{"url": "http://packetstormsecurity.com/files/155273/Prima-Access-Control-2.3.35-Script-Upload-Remote-Code-Execution.html", "source": "cve@mitre.org"}, {"url": "https://applied-risk.com/index.php/download_file/view/199/165", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://applied-risk.com/labs/advisories", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://applied-risk.com/resources/ar-2019-007", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02", "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.com/files/155273/Prima-Access-Control-2.3.35-Script-Upload-Remote-Code-Execution.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://applied-risk.com/index.php/download_file/view/199/165", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://applied-risk.com/labs/advisories", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://applied-risk.com/resources/ar-2019-007", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-434"}]}], "descriptions": [{"lang": "en", "value": "Prima Systems FlexAir, Versions 2.4.9api3 and prior. The application allows the upload of arbitrary Python scripts when configuring the main central controller. These scripts can be immediately executed because of root code execution, not as a web server user, allowing an authenticated attacker to gain full system access."}, {"lang": "es", "value": "En los dispositivos Prima Systems FlexAir, versiones 2.4.9api3 y anteriores. La aplicaci\u00f3n permite la carga de scripts arbitrarios de Python al configurar el controlador central principal. Estos scripts pueden ejecutarse inmediatamente debido a la ejecuci\u00f3n del c\u00f3digo ra\u00edz, no como un usuario del servidor web, lo que permite que un atacante autenticado obtenga acceso completo al sistema."}], "lastModified": "2024-11-21T04:51:10.250", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:primasystems:flexair:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "175CBF56-BD66-48B3-A3AC-25B4FCD4F601", "versionEndIncluding": "2.3.38"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}