-
Notifications
You must be signed in to change notification settings - Fork 16
/
CVE-2021-3341.json
122 lines (122 loc) · 3.6 KB
/
CVE-2021-3341.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
{
"id": "CVE-2021-3341",
"sourceIdentifier": "[email protected]",
"published": "2021-01-29T01:15:14.610",
"lastModified": "2024-11-21T06:21:20.143",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability in the DxWebEngine component of DH2i DxEnterprise and DxOdyssey for Windows, version 19.5 through 20.x before 20.0.219.0, allows an attacker to read any file on the host file system via an HTTP request."
},
{
"lang": "es",
"value": "Una vulnerabilidad de salto de ruta en el componente DxWebEngine de DH2i DxEnterprise y DxOdyssey para Windows, versiones 19.5 hasta 20.x anteriores a 20.0.219.0, permite a un atacante leer cualquier archivo en el sistema de archivos del host por medio de una petici\u00f3n HTTP"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dh2i:dxenterprise:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "19.5",
"versionEndIncluding": "20.0.218",
"matchCriteriaId": "CCFBC472-0753-4028-88ED-CB11A23DC445"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dh2i:dxodyssey:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "19.5",
"versionEndIncluding": "20.0.219",
"matchCriteriaId": "4B226A19-4E7D-4E63-B600-48719B7DD06D"
}
]
}
]
}
],
"references": [
{
"url": "https://clients.dh2i.com/Support/Article.aspx?ID=2963454",
"source": "[email protected]",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://clients.dh2i.com/Support/Article.aspx?ID=2963454",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}