Show plain JSON{"id": "CVE-2014-5393", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "authentication": "SINGLE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-09-11T15:55:04.753", "references": [{"url": "http://packetstormsecurity.com/files/128192/JobScheduler-Path-Traversal.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.christian-schneider.net/advisories/CVE-2014-5393.txt", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/533373/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.sos-berlin.com/modules/news/article.php?storyid=73", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.sos-berlin.com/modules/news/article.php?storyid=74", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://change.sos-berlin.com/browse/JS-1205", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95796", "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.com/files/128192/JobScheduler-Path-Traversal.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.christian-schneider.net/advisories/CVE-2014-5393.txt", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/533373/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.sos-berlin.com/modules/news/article.php?storyid=73", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.sos-berlin.com/modules/news/article.php?storyid=74", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://change.sos-berlin.com/browse/JS-1205", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95796", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in the JobScheduler Operations Center (JOC) in SOS JobScheduler before 1.6.4246 and 1.7.x before 1.7.4241 allows remote authenticated users with the info permission to read arbitrary files in the webroot via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en JobScheduler Operations Center (JOC) en SOS JobScheduler anterior a 1.6.4246 y 1.7.x anterior a 1.7.4241 permite a usuarios remotos autenticados con el permiso info leer ficheros arbitrarios en el webroot a trav\u00e9s de vectores no especificados."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:sos:jobscheduler:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04063BAB-E033-4FCB-9894-11974EC85316", "versionEndIncluding": "1.6.4131"}, {"criteria": "cpe:2.3:a:sos:jobscheduler:1.6.4014:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2B9B1EE-3C37-4B0C-9AC0-7B479558CED9"}, {"criteria": "cpe:2.3:a:sos:jobscheduler:1.6.4043:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3467B07E-0498-4B36-BCC3-DC7EC385D06D"}, {"criteria": "cpe:2.3:a:sos:jobscheduler:1.7.4177:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BEA7100-9FA7-4F66-9DA9-AD52AD487217"}, {"criteria": "cpe:2.3:a:sos:jobscheduler:1.7.4189:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "337165FD-1F47-4493-89F6-73834E436C63"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}