Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mids\\'_reborn_hero_designer_project:mids\\'_reborn_hero_designer:2.6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "2A59FBE0-3B0A-4845-9C09-958EB2C7C773", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Mids' Reborn Hero Designer 2.6.0.7 downloads the update manifest, as well as update files, over cleartext HTTP. Additionally, the application does not perform file integrity validation for files after download. An attacker can perform a man-in-the-middle attack against this connection and replace executable files with malicious versions, which the operating system then executes under the context of the user running Hero Designer."}, {"lang": "es", "value": "Reborn Hero Designer de Mids versi\u00f3n 2.6.0.7 descarga el manifiesto de actualizaci\u00f3n, as\u00ed como los archivos de actualizaci\u00f3n, por medio de HTTP en texto sin cifrar. Adem\u00e1s, la aplicaci\u00f3n no lleva a cabo la comprobaci\u00f3n de integridad de los archivos despu\u00e9s de la descarga. Un atacante puede realizar un ataque de tipo man-in-the-middle contra esta conexi\u00f3n y reemplazar los archivos ejecutables con versiones maliciosas, que el sistema operativo ejecuta en el contexto del usuario que ejecuta Hero Designer"}], "id": "CVE-2020-11614", "lastModified": "2024-11-21T04:58:15.063", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-06-11T17:15:12.317", "references": [{"source": "cve@mitre.org", "tags": ["Release Notes", "Third Party Advisory"], "url": "https://github.com/Crytilis/mids-reborn-hero-designer/releases"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.doyler.net/security-not-included/mids-reborn-vulnerabilities"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Third Party Advisory"], "url": "https://github.com/Crytilis/mids-reborn-hero-designer/releases"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.doyler.net/security-not-included/mids-reborn-vulnerabilities"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-319"}, {"lang": "en", "value": "CWE-345"}], "source": "nvd@nist.gov", "type": "Primary"}]}