Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCCD3A36-E8E1-459E-ACE0-98743E86296D", "versionEndExcluding": "6.0.3", "versionStartIncluding": "4.0.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "JFrog JFrog Artifactory version Prior to version 6.0.3, since version 4.0.0 contains a Directory Traversal vulnerability in The \"Import Repository from Zip\" feature, available through the Admin menu -> Import & Export -> Repositories, triggers a vulnerable UI REST endpoint (/ui/artifactimport/upload) that can result in Directory traversal / file overwrite and remote code execution. This attack appear to be exploitable via An attacker with Admin privileges may use the aforementioned UI endpoint and exploit the publicly known \"Zip Slip\" vulnerability, to add/overwrite files outside the target directory. This vulnerability appears to have been fixed in 6.0.3."}, {"lang": "es", "value": "JFrog JFrog Artifactory en versiones anteriores a la 6.0.3 y desde la versi\u00f3n 4.0.0 contiene una vulnerabilidad de salto de directorio en la caracter\u00edstica \"Import Repository from Zip\", disponible mediante el men\u00fa Admin -> Import Export -> Repositories, que desencadena un endpoint UI REST vulnerable (/ui/artifactimport/upload) que puede resultar en un salto de directorio/sobrescritura de archivos y la ejecuci\u00f3n remota de c\u00f3digo. Un atacante con privilegios de administrador podr\u00eda utilizar el endpoint UI mencionado anteriormente y explotar la vulnerabilidad p\u00fablicamente conocida como \"Zip Slip\" para agregar o sobrescribir archivos fuera del directorio objetivo. La vulnerabilidad parece haber sido solucionada en la versi\u00f3n 6.0.3."}], "id": "CVE-2018-1000623", "lastModified": "2024-11-21T03:40:15.443", "metrics": {"cvssMetricV2": [{"acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-07-09T20:29:00.877", "references": [{"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.0.3"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.0.3"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}