-
Notifications
You must be signed in to change notification settings - Fork 44
/
Copy pathCVE-2023-4171.json
200 lines (200 loc) · 5.86 KB
/
CVE-2023-4171.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
{
"dataType": "CVE_RECORD",
"containers": {
"adp": [
{
"title": "CVE Program Container",
"references": [
{
"url": "https://vuldb.com/?id.236206",
"tags": [
"vdb-entry",
"technical-description",
"x_transferred"
]
},
{
"url": "https://vuldb.com/?ctiid.236206",
"tags": [
"signature",
"permissions-required",
"x_transferred"
]
},
{
"url": "https://github.com/nagenanhai/cve/blob/main/duqu.md",
"tags": [
"exploit",
"x_transferred"
]
}
],
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-02T07:17:12.135Z"
}
},
{
"title": "CISA ADP Vulnrichment",
"metrics": [
{
"other": {
"type": "ssvc",
"content": {
"id": "CVE-2023-4171",
"role": "CISA Coordinator",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"version": "2.0.3",
"timestamp": "2024-11-21T15:10:41.464300Z"
}
}
}
],
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2024-11-21T15:10:54.833Z"
}
}
],
"cna": {
"title": "Chengdu Flash Flood Disaster Monitoring and Warning System FileDownload.ashx path traversal",
"credits": [
{
"lang": "en",
"type": "analyst",
"value": "xiafine (VulDB User)"
}
],
"metrics": [
{
"cvssV3_1": {
"version": "3.1",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
}
},
{
"cvssV3_0": {
"version": "3.0",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
}
},
{
"cvssV2_0": {
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
}
}
],
"affected": [
{
"vendor": "Chengdu",
"product": "Flash Flood Disaster Monitoring and Warning System",
"versions": [
{
"status": "affected",
"version": "2.0"
}
]
}
],
"timeline": [
{
"lang": "en",
"time": "2023-08-05T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2023-08-05T00:00:00.000Z",
"value": "CVE reserved"
},
{
"lang": "en",
"time": "2023-08-05T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2023-08-30T08:08:36.000Z",
"value": "VulDB entry last update"
}
],
"references": [
{
"url": "https://vuldb.com/?id.236206",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.236206",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://github.com/nagenanhai/cve/blob/main/duqu.md",
"tags": [
"exploit"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This vulnerability affects unknown code of the file \\Service\\FileDownload.ashx. The manipulation of the argument Files leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-236206 is the identifier assigned to this vulnerability."
},
{
"lang": "de",
"value": "In Chengdu Flash Flood Disaster Monitoring and Warning System 2.0 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei \\Service\\FileDownload.ashx. Durch die Manipulation des Arguments Files mit unbekannten Daten kann eine path traversal: '../filedir'-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"type": "CWE",
"cweId": "CWE-24",
"description": "CWE-24 Path Traversal: '../filedir'"
}
]
}
],
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2023-10-24T08:23:26.813Z"
}
}
},
"cveMetadata": {
"cveId": "CVE-2023-4171",
"state": "PUBLISHED",
"dateUpdated": "2024-11-21T15:11:21.977Z",
"dateReserved": "2023-08-05T06:38:30.310Z",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"datePublished": "2023-08-05T21:00:06.077Z",
"assignerShortName": "VulDB"
},
"dataVersion": "5.1"
}