Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:sensu:sensu_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "359FD09B-DB74-4307-BEA6-8BA99F035E35", "versionEndExcluding": "1.4.2-3", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Sensu, Inc. Sensu Core version Before version 1.4.2-3 contains a Insecure Permissions vulnerability in Sensu Core on Windows platforms that can result in Unprivileged users may execute code in context of Sensu service account. This attack appear to be exploitable via Unprivileged user may place an arbitrary DLL in the c:\\opt\\sensu\\embedded\\bin directory in order to exploit standard Windows DLL load order behavior. This vulnerability appears to have been fixed in 1.4.2-3 and later."}, {"lang": "es", "value": "Sensu Core, de Sensu, Inc., en versiones anteriores a la 1.4.2-3 contiene una vulnerabilidad de permisos inseguros en Sensu Core en plataformas Windows que puede resultar en que usuarios sin privilegios puedan ejecutar c\u00f3digo en el contexto de la cuenta de servicio de Sensu. Este ataque parece ser explotable si el usuario sin privilegios coloca un DLL arbitrario en el directorio c:\\opt\\sensu\\embedded\\bin para explotar el comportamiento de orden de carga de DLL est\u00e1ndar de Windows. La vulnerabilidad parece haber sido solucionada en las versiones 1.4.2-3 y siguientes."}], "id": "CVE-2018-1000209", "lastModified": "2024-11-21T03:39:56.640", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-07-13T18:29:00.367", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://docs.sensu.io/sensu-core/1.4/changelog/#core-v1-4-2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://docs.sensu.io/sensu-core/1.4/changelog/#core-v1-4-2"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-732"}], "source": "nvd@nist.gov", "type": "Primary"}]}