Show plain JSON{"id": "CVE-2020-14414", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2020-06-29T17:15:11.177", "references": [{"url": "https://gist.github.com/farid007/a3d96d305f028d221f729eb6ae681f5a", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://gist.github.com/farid007/a3d96d305f028d221f729eb6ae681f5a", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "NeDi 1.9C is vulnerable to Remote Command Execution. pwsec.php improperly escapes shell metacharacters from a POST request. An attacker can exploit this by crafting an arbitrary payload (any system commands) that contains shell metacharacters via a POST request with a pw parameter. (This can also be exploited via CSRF.)"}, {"lang": "es", "value": "NeDi versi\u00f3n 1.9C, es vulnerable a una ejecuci\u00f3n de comandos remota. El archivo pwsec.php escapa inapropiadamente metacaracteres de shell desde una petici\u00f3n POST. Un atacante puede explotar esto mediante el dise\u00f1o de una carga \u00fatil arbitraria (cualquier comando del sistema) que contenga metacaracteres de shell por medio de una petici\u00f3n POST con un par\u00e1metro pw. (Esto tambi\u00e9n puede ser explotado por medio de un ataque de tipo CSRF)"}], "lastModified": "2024-11-21T05:03:12.940", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:nedi:nedi:1.9c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0BB6C22-9477-4233-874F-7FA0717789AF"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}