CVE-2022-1648
Vulnerability from cvelistv5
Published
2022-07-26 14:24
Modified
2024-09-16 19:47
Severity ?
EPSS score ?
Summary
Pandora FMS v7.0NG.760 and below allows a relative path traversal in File Manager where a privileged user could upload a .php file outside the intended images directory which is restricted to execute the .php file. The impact could lead to a Remote Code Execution with running application privilege.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Artica PFMS | Pandora FMS |
Version: v760 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:10:03.702Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.incibe.es/en/cve-assignment-publication/coordinated-cves" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "all" ], "product": "Pandora FMS", "vendor": "Artica PFMS", "versions": [ { "lessThanOrEqual": "v760", "status": "affected", "version": "v760", "versionType": "custom" } ] } ], "datePublic": "2022-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Pandora FMS v7.0NG.760 and below allows a relative path traversal in File Manager where a privileged user could upload a .php file outside the intended images directory which is restricted to execute the .php file. The impact could lead to a Remote Code Execution with running application privilege." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23 Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-26T14:24:32", "orgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", "shortName": "INCIBE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.incibe.es/en/cve-assignment-publication/coordinated-cves" } ], "solutions": [ { "lang": "en", "value": "Fixed in v761" } ], "source": { "defect": [ "Ticket", "#4850" ], "discovery": "EXTERNAL" }, "title": "Relative Path Traversal to Remote Code Execution in File Manager", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-coordination@incibe.es", "DATE_PUBLIC": "2022-05-13T08:00:00.000Z", "ID": "CVE-2022-1648", "STATE": "PUBLIC", "TITLE": "Relative Path Traversal to Remote Code Execution in File Manager" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Pandora FMS", "version": { "version_data": [ { "platform": "all", "version_affected": "\u003c=", "version_name": "v760", "version_value": "v760" } ] } } ] }, "vendor_name": "Artica PFMS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pandora FMS v7.0NG.760 and below allows a relative path traversal in File Manager where a privileged user could upload a .php file outside the intended images directory which is restricted to execute the .php file. The impact could lead to a Remote Code Execution with running application privilege." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-23 Relative Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/", "refsource": "CONFIRM", "url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/" }, { "name": "https://www.incibe.es/en/cve-assignment-publication/coordinated-cves", "refsource": "CONFIRM", "url": "https://www.incibe.es/en/cve-assignment-publication/coordinated-cves" } ] }, "solution": [ { "lang": "en", "value": "Fixed in v761" } ], "source": { "defect": [ "Ticket", "#4850" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", "assignerShortName": "INCIBE", "cveId": "CVE-2022-1648", "datePublished": "2022-07-26T14:24:32.531380Z", "dateReserved": "2022-05-10T00:00:00", "dateUpdated": "2024-09-16T19:47:11.391Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-1648\",\"sourceIdentifier\":\"cve-coordination@incibe.es\",\"published\":\"2022-07-26T15:15:10.513\",\"lastModified\":\"2024-11-21T06:41:10.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Pandora FMS v7.0NG.760 and below allows a relative path traversal in File Manager where a privileged user could upload a .php file outside the intended images directory which is restricted to execute the .php file. The impact could lead to a Remote Code Execution with running application privilege.\"},{\"lang\":\"es\",\"value\":\"Pandora FMS versi\u00f3n v7.0NG.760 y anteriores, permite un salto de ruta relativo en el Administrador de Archivos en el que un usuario con privilegios podr\u00eda cargar un archivo .php fuera del directorio de im\u00e1genes previsto que est\u00e1 restringido para ejecutar el archivo .php. El impacto podr\u00eda conllevar a una Ejecuci\u00f3n de C\u00f3digo Remota con privilegio de aplicaci\u00f3n en ejecuci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve-coordination@incibe.es\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":0.2,\"impactScore\":5.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"cve-coordination@incibe.es\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-23\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.0_ng_760\",\"matchCriteriaId\":\"F9ACE0CF-C204-470A-B706-969837339CDC\"}]}]}],\"references\":[{\"url\":\"https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/\",\"source\":\"cve-coordination@incibe.es\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.incibe.es/en/cve-assignment-publication/coordinated-cves\",\"source\":\"cve-coordination@incibe.es\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.incibe.es/en/cve-assignment-publication/coordinated-cves\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.