Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:apereo:bw-calendar-engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "153F6397-23B2-4C14-A763-822941BC12F6", "versionEndIncluding": "3.12.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "bw-calendar-engine version <= bw-calendar-engine-3.12.0 contains a XML External Entity (XXE) vulnerability in IscheduleClient XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Man in the Middle or malicious server."}, {"lang": "es", "value": "bw-calendar-engine, en versiones iguales o anteriores a la bw-calendar-engine-3.12.0, contiene una vulnerabilidad de XEE (XML External Entity) en el analizador de XML IscheduleClient que puede resultar en la divulgaci\u00f3n de datos confidenciales, una denegaci\u00f3n de servicio (DoS), Server-Side Request Forgery (SSRF) o el escaneo de puertos. El ataque parece ser explotable mediante un Man-in-the-Middle (MitM) o un servidor malicioso."}], "id": "CVE-2018-1000836", "lastModified": "2024-11-21T03:40:27.690", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.2, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-12-20T15:29:01.657", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://0dd.zone/2018/10/28/bw-calendar-engine-XXE-MitM/"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/Bedework/bw-calendar-engine/issues/3"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://0dd.zone/2018/10/28/bw-calendar-engine-XXE-MitM/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/Bedework/bw-calendar-engine/issues/3"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-611"}], "source": "nvd@nist.gov", "type": "Primary"}]}