Show plain JSON{"id": "CVE-2018-20468", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2019-06-17T14:15:09.860", "references": [{"url": "https://barriersec.com/2019/06/cve-2018-20468-sahi-pro/", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://barriersec.com/2019/06/cve-2018-20468-sahi-pro/", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-1236"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Tyto Sahi Pro through 7.x.x and 8.0.0. A web reports module has \"export to excel features\" that are vulnerable to CSV injection. An attacker can embed Excel formulas inside an automation script that, when exported after execution, results in code execution."}, {"lang": "es", "value": "Se detect\u00f3 un problema en Tyto Sahi Pro hasta las versiones 7.x.x y 8.0.0. Un m\u00f3dulo de informes web tiene \"export to excel features\" que es vulnerable a la inyecci\u00f3n de CSV. Un atacante puede insertar f\u00f3rmulas de Excel dentro de un script de automatizaci\u00f3n que, cuando se exporta despu\u00e9s de la ejecuci\u00f3n, da como resultado la ejecuci\u00f3n del c\u00f3digo."}], "lastModified": "2024-11-21T04:01:32.927", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:sahipro:sahi_pro:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "533186A1-E74C-476B-B285-67ACBB989AB0", "versionEndIncluding": "8.0.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}