Search criteria

3 vulnerabilities found for vspace_pro by ncomputing

FKIE_CVE-2018-10201

Vulnerability from fkie_nvd - Published: 2018-04-20 08:29 - Updated: 2024-11-21 03:41
Summary
An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\ or ..../ or ....\ as a directory-traversal pattern to TCP port 8667.
Impacted products
Vendor Product Version
ncomputing vspace_pro 10
ncomputing vspace_pro 11

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ncomputing:vspace_pro:10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4B4787-4102-4583-9ED3-861F0823213C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ncomputing:vspace_pro:11:*:*:*:*:*:*:*",
              "matchCriteriaId": "19989773-0D6F-44C7-8FEA-4E8E1D2ABB69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."
    },
    {
      "lang": "es",
      "value": "Se ha descubierto un problema en NcMonitorServer.exe en NC Monitor Server en NComputing vSpace Pro 10 y 11. Es posible leer archivos arbitrarios fuera del directorio root del servidor web. Esta vulnerabilidad podr\u00eda ser explotada de forma remota por una URL manipulada sin credenciales, con .../ o ...\\ o ..../ o ....\\ como patrones de salto de directorio al puerto TCP 8667."
    }
  ],
  "id": "CVE-2018-10201",
  "lastModified": "2024-11-21T03:41:00.460",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-20T08:29:00.240",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://www.kwell.net/kwell_blog/?p=5199"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/44497/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://www.kwell.net/kwell_blog/?p=5199"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/44497/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2018-10201 (GCVE-0-2018-10201)

Vulnerability from cvelistv5 – Published: 2018-04-20 08:00 – Updated: 2024-08-05 07:32
VLAI?
Summary
An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\ or ..../ or ....\ as a directory-traversal pattern to TCP port 8667.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:32:01.645Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
          },
          {
            "name": "44497",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/44497/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kwell.net/kwell_blog/?p=5199"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-05-15T02:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
        },
        {
          "name": "44497",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/44497/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kwell.net/kwell_blog/?p=5199"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-10201",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es",
              "refsource": "MISC",
              "url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
            },
            {
              "name": "44497",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/44497/"
            },
            {
              "name": "http://www.kwell.net/kwell_blog/?p=5199",
              "refsource": "MISC",
              "url": "http://www.kwell.net/kwell_blog/?p=5199"
            },
            {
              "name": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch",
              "refsource": "CONFIRM",
              "url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-10201",
    "datePublished": "2018-04-20T08:00:00",
    "dateReserved": "2018-04-18T00:00:00",
    "dateUpdated": "2024-08-05T07:32:01.645Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-10201 (GCVE-0-2018-10201)

Vulnerability from nvd – Published: 2018-04-20 08:00 – Updated: 2024-08-05 07:32
VLAI?
Summary
An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\ or ..../ or ....\ as a directory-traversal pattern to TCP port 8667.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:32:01.645Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
          },
          {
            "name": "44497",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/44497/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kwell.net/kwell_blog/?p=5199"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-05-15T02:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
        },
        {
          "name": "44497",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/44497/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kwell.net/kwell_blog/?p=5199"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-10201",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es",
              "refsource": "MISC",
              "url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
            },
            {
              "name": "44497",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/44497/"
            },
            {
              "name": "http://www.kwell.net/kwell_blog/?p=5199",
              "refsource": "MISC",
              "url": "http://www.kwell.net/kwell_blog/?p=5199"
            },
            {
              "name": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch",
              "refsource": "CONFIRM",
              "url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-10201",
    "datePublished": "2018-04-20T08:00:00",
    "dateReserved": "2018-04-18T00:00:00",
    "dateUpdated": "2024-08-05T07:32:01.645Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}