Show plain JSON{"id": "CVE-2020-5804", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 8.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 9.2, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 5.2, "exploitabilityScore": 2.8}]}, "published": "2021-01-08T16:15:15.137", "references": [{"url": "https://www.tenable.com/security/research/tra-2021-01", "tags": ["Exploit", "Third Party Advisory"], "source": "vulnreport@tenable.com"}, {"url": "https://www.tenable.com/security/research/tra-2021-01", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Marvell QConvergeConsole GUI <= 5.5.0.74 is affected by a path traversal vulnerability. The deleteEventLogFile method of the GWTTestServiceImpl class lacks proper validation of a user-supplied path prior to using it in file deletion operations. An authenticated, remote attacker can leverage this vulnerability to delete arbitrary remote files as SYSTEM or root."}, {"lang": "es", "value": "Marvell QConvergeConsole GUI versiones anteriores a 5.5.0.74 incluy\u00e9ndola, est\u00e1 afectado por una vulnerabilidad de salto de ruta. El m\u00e9todo deleteEventLogFile de la clase GWTTestServiceImpl carece de una comprobaci\u00f3n apropiada de una ruta suministrada por un usuario antes de usarla en operaciones de eliminaci\u00f3n de archivos. Un atacante remoto autenticado puede aprovechar esta vulnerabilidad para eliminar archivos remotos arbitrarios como SYSTEM o root"}], "lastModified": "2024-11-21T05:34:37.627", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:marvell:qconvergeconslole_gui:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBCEF915-1A9C-4561-85D3-8E52ACB380B2", "versionEndIncluding": "5.5.0.74"}], "operator": "OR"}]}], "sourceIdentifier": "vulnreport@tenable.com"}