Show plain JSON{"id": "CVE-2019-20050", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "HIGH", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.8, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.9}]}, "published": "2020-01-30T16:15:11.690", "references": [{"url": "https://k4m1ll0.com/cve-2019-20050.html", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://k4m1ll0.com/cve-2019-20050.html", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "Pandora FMS \u2264 7.42 suffers from a remote code execution vulnerability. To exploit the vulnerability, an authenticated user should create a new folder with a \"tricky\" name in the filemanager. The exploit works when the php-fileinfo extension is disabled on the host system. The attacker must include shell metacharacters in the content type."}, {"lang": "es", "value": "Pandora FMS anterior o igual a la versi\u00f3n 7.42, sufre de una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota. Para explotar la vulnerabilidad, un usuario autenticado debe crear una nueva carpeta con un nombre \"tricky\" en el administrador de archivos. La explotaci\u00f3n funciona cuando la extensi\u00f3n php-fileinfo est\u00e1 deshabilitada en el sistema host. El atacante necesita incluir metacaracteres de shell en el tipo de contenido."}], "lastModified": "2024-11-21T04:37:57.967", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:artica:pandora_fms:7.42:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "262F864F-F93B-4F34-A39A-5EF8FD7E0A0D"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}