cve-2023-45161
Vulnerability from cvelistv5
Published
2023-11-06 12:13
Modified
2024-09-05 13:52
Severity
Summary
1E-Exchange-URLResponseTime instruction before v20.1 allows arbitrary code execution
References
Source | URL | Tags |
---|---|---|
security@1e.com | https://exchange.1e.com/product-packs/network/ | Product |
security@1e.com | https://www.1e.com/trust-security-compliance/cve-info/ | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:14:19.524Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://exchange.1e.com/product-packs/network/" }, { "tags": [ "x_transferred" ], "url": "https://www.1e.com/trust-security-compliance/cve-info/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45161", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T13:51:52.700343Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-05T13:52:59.032Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://exchange.1e.com/product-packs/network/", "defaultStatus": "affected", "packageName": "1E-Exchange-URLResponseTime", "platforms": [ "Windows" ], "product": "Platform", "vendor": "1E", "versions": [ { "lessThan": "20.1", "status": "affected", "version": "0", "versionType": "Update" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Lockheed Martin red team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The 1E-Exchange-URLResponseTime instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the URL parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\u003cbr\u003e\u003cbr\u003eTo remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-URLResponseTime instruction to v20.1 by uploading it through the 1E Platform instruction upload UI" } ], "value": "The 1E-Exchange-URLResponseTime instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the URL parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-URLResponseTime instruction to v20.1 by uploading it through the 1E Platform instruction upload UI" } ], "impacts": [ { "capecId": "CAPEC-248", "descriptions": [ { "lang": "en", "value": "CAPEC-248 Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T17:44:06.508Z", "orgId": "4a68d2b9-b68a-4765-95bd-17f35092666b", "shortName": "1E" }, "references": [ { "url": "https://exchange.1e.com/product-packs/network/" }, { "url": "https://www.1e.com/trust-security-compliance/cve-info/" } ], "source": { "discovery": "EXTERNAL" }, "title": "1E-Exchange-URLResponseTime instruction before v20.1 allows arbitrary code execution", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "4a68d2b9-b68a-4765-95bd-17f35092666b", "assignerShortName": "1E", "cveId": "CVE-2023-45161", "datePublished": "2023-11-06T12:13:09.083Z", "dateReserved": "2023-10-04T23:59:54.078Z", "dateUpdated": "2024-09-05T13:52:59.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-45161\",\"sourceIdentifier\":\"security@1e.com\",\"published\":\"2023-11-06T13:15:09.730\",\"lastModified\":\"2024-09-05T14:35:10.047\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The 1E-Exchange-URLResponseTime instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the URL parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\\n\\nTo remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-URLResponseTime instruction to v20.1 by uploading it through the 1E Platform instruction upload UI\"},{\"lang\":\"es\",\"value\":\"La instrucci\u00f3n 1E-Exchange-URLResponseTime que forma parte del paquete de productos Network disponible en 1E Exchange no valida correctamente el par\u00e1metro URL, lo que permite una entrada especialmente manipulada para realizar la ejecuci\u00f3n de c\u00f3digo arbitrario con permisos del SYSTEM. Para solucionar este problema, descargue el paquete de producto de red actualizado desde 1E Exchange y actualice la instrucci\u00f3n 1E-Exchange-URLResponseTime a v20.1 carg\u00e1ndola a trav\u00e9s de la interfaz de usuario de carga de instrucciones de 1E Platform.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9},{\"source\":\"security@1e.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.1,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"security@1e.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:1e:platform:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20.1\",\"matchCriteriaId\":\"311D316D-840E-4A1E-9555-A654300BCE76\"}]}]}],\"references\":[{\"url\":\"https://exchange.1e.com/product-packs/network/\",\"source\":\"security@1e.com\",\"tags\":[\"Product\"]},{\"url\":\"https://www.1e.com/trust-security-compliance/cve-info/\",\"source\":\"security@1e.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...