Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "D99D4163-5CAE-4651-AA0C-70F4B3291511", "versionEndExcluding": "1.52.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Cloud Foundry Cloud Controller, versions prior to 1.52.0, contains information disclosure and path traversal vulnerabilities. An authenticated malicious user can predict the location of application blobs and leverage path traversal to create a malicious application that has the ability to overwrite arbitrary files on the Cloud Controller instance."}, {"lang": "es", "value": "Cloud Foundry Cloud Controller, en versiones anteriores a la 1.52.0, contiene vulnerabilidades de revelaci\u00f3n de informaci\u00f3n y salto de directorio. Un usuario malicioso autenticado puede predecir la localizaci\u00f3n de los BLOB de las aplicaciones y aprovechar el salto de directorio para crear una aplicaci\u00f3n maliciosa que tenga la capacidad de sobrescribir archivos arbitrarios en la instancia Cloud Controller."}], "id": "CVE-2018-1266", "lastModified": "2024-11-21T03:59:30.003", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-03-27T16:29:00.420", "references": [{"source": "security_alert@emc.com", "tags": ["Third Party Advisory"], "url": "https://www.cloudfoundry.org/blog/cve-2018-1266/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.cloudfoundry.org/blog/cve-2018-1266/"}], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}, {"lang": "en", "value": "CWE-330"}], "source": "nvd@nist.gov", "type": "Primary"}]}