Show plain JSON{"id": "CVE-2018-14864", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2019-07-03T19:15:10.707", "references": [{"url": "https://github.com/odoo/odoo/issues/32502", "tags": ["Patch", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/odoo/odoo/issues/32502", "tags": ["Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-284"}]}], "descriptions": [{"lang": "en", "value": "Incorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment."}, {"lang": "es", "value": "El control de acceso incorrecto en los paquetes de activos en Odoo Community 9.0 a 11.0 y anteriores y Odoo Enterprise 9.0 a 11.0 y anteriores permite a los usuarios identificados remotamente inyectar un script web arbitrario a trav\u00e9s de un adjunto dise\u00f1ado."}], "lastModified": "2024-11-21T03:49:57.220", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "705E446A-98DC-43D6-905A-F52E3FDCAF48"}, {"criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "F8E37238-5C5A-41E4-8D46-48446E539277"}, {"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE"}, {"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A"}, {"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24"}, {"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}