Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:koji_project:koji:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA79F52E-2741-4F74-8ACE-E95B78B04DDB", "vulnerable": true}, {"criteria": "cpe:2.3:a:koji_project:koji:1.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECECE389-C19B-4AE8-9B50-5EAC716F1468", "vulnerable": true}, {"criteria": "cpe:2.3:a:koji_project:koji:1.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB8C4004-1228-4B7D-A5DD-4BF31EDA53C9", "vulnerable": true}, {"criteria": "cpe:2.3:a:koji_project:koji:1.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "949015F6-8C70-4529-AE24-B2DC64181BDD", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Koji version 1.12, 1.13, 1.14 and 1.15 contain an incorrect access control vulnerability resulting in arbitrary filesystem read/write access. This vulnerability has been fixed in versions 1.12.1, 1.13.1, 1.14.1 and 1.15.1."}, {"lang": "es", "value": "Koji, en sus versiones 1.12, 1.13, 1.14 y 1.15, contiene una vulnerabilidad de control de acceso incorrecto que resulta en el acceso de lectura/escritura a un sistema de archivos arbitrario. Esta vulnerabilidad se ha solucionado en las versiones 1.12.1, 1.13.1, 1.14.1 y 1.15.1."}], "id": "CVE-2018-1002150", "lastModified": "2024-11-21T03:40:39.170", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-04-04T20:29:00.210", "references": [{"source": "patrick@puiterwijk.org", "tags": ["Mitigation", "Third Party Advisory"], "url": "https://docs.pagure.org/koji/CVE-2018-1002150/"}, {"source": "patrick@puiterwijk.org", "tags": ["Third Party Advisory"], "url": "https://pagure.io/koji/issue/850"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mitigation", "Third Party Advisory"], "url": "https://docs.pagure.org/koji/CVE-2018-1002150/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://pagure.io/koji/issue/850"}], "sourceIdentifier": "patrick@puiterwijk.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-732"}], "source": "nvd@nist.gov", "type": "Primary"}]}