Show plain JSON{"id": "CVE-2021-25780", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}]}, "published": "2021-02-17T15:15:13.423", "references": [{"url": "https://github.com/TCSWT/Baby-Care-System/blob/main/README.md", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/TCSWT/Baby-Care-System/blob/main/README.md", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-434"}]}], "descriptions": [{"lang": "en", "value": "An arbitrary file upload vulnerability has been identified in posts.php in Baby Care System 1.0. The vulnerability could be exploited by an remote attacker to upload content to the server, including PHP files, which could result in command execution and obtaining a shell."}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad de carga de archivos arbitraria en el archivo posts.php en Baby Care System versi\u00f3n 1.0. La vulnerabilidad podr\u00eda ser explotada por un atacante remoto para cargar contenido en el servidor, incluyendo archivos PHP, lo que podr\u00eda resultar en una ejecuci\u00f3n de comandos y obtenci\u00f3n de un shell"}], "lastModified": "2024-11-21T05:55:26.143", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:baby_care_system_project:baby_care_system:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EED4DC7-F56D-4839-B0A0-AFAC14C21DD8"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}