Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:trovebox:trovebox:*:*:*:*:*:*:*:*", "matchCriteriaId": "78F6699A-A397-4D6A-970A-E7123622C5CF", "versionEndIncluding": "3.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:trovebox:trovebox:4.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD80BAFE-28C1-49F1-AE8C-0E0BC943AA67", "vulnerable": true}, {"criteria": "cpe:2.3:a:trovebox:trovebox:4.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "8A011E31-96B1-4979-A4C4-83639B024693", "vulnerable": true}, {"criteria": "cpe:2.3:a:trovebox:trovebox:4.0.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "F6946C75-E3BE-475C-B4BB-B41EFE5D86ED", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Trovebox version <= 4.0.0-rc6 contains a Server-Side request forgery vulnerability in webhook component that can result in read or update internal resources. This attack appear to be exploitable via HTTP request. This vulnerability appears to have been fixed in after commit 742b8ed."}, {"lang": "es", "value": "Trovebox, en versiones 4.0.0-rc6 y anteriores, contiene una vulnerabilidad Server-Side Request Forgery (SSRF) en el componente webhook que puede resultar en la lectura o actualizaci\u00f3n de recursos internos. Parece ser que este ataque puede ser explotado mediante una petici\u00f3n HTTP. La vulnerabilidad parece haber sido solucionada tras el commit con ID 742b8ed."}], "id": "CVE-2018-1000553", "lastModified": "2024-11-21T03:40:11.073", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-06-26T16:29:02.697", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://telekomsecurity.github.io/2018/04/trovebox-vulnerabilities.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://telekomsecurity.github.io/2018/04/trovebox-vulnerabilities.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-918"}], "source": "nvd@nist.gov", "type": "Primary"}]}