Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:code42:code42:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "D6D874A0-0EC5-4FE3-A315-BC50A776F7A5", "versionEndIncluding": "7.0.4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Code42 environments with on-premises server versions 7.0.4 and earlier allow for possible remote code execution. When an administrator creates a local (non-SSO) user via a Code42-generated email, the administrator has the option to modify content for the email invitation. If the administrator entered template language code in the subject line, that code could be interpreted by the email generation services, potentially resulting in server-side code injection."}, {"lang": "es", "value": "Los entornos Code42 con servidor local versiones 7.0.4 y anteriores, permiten una posible ejecuci\u00f3n de c\u00f3digo remota. Cuando un administrador crea un usuario local (no SSO) por medio de un correo electr\u00f3nico generado por Code42, el administrador posee la opci\u00f3n de modificar el contenido de la invitaci\u00f3n por correo electr\u00f3nico. Si el administrador ingres\u00f3 el c\u00f3digo de idioma de la plantilla en la l\u00ednea del asunto, ese c\u00f3digo podr\u00eda ser interpretado por los servicios de generaci\u00f3n de correo electr\u00f3nico, lo que podr\u00eda resultar en una inyecci\u00f3n de c\u00f3digo del lado del servidor"}], "id": "CVE-2020-12736", "lastModified": "2024-11-21T05:00:10.393", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-07-07T20:15:09.947", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://code42.com/r/support/CVE-2020-12736"}, {"source": "cve@mitre.org", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://support.code42.com/Release_Notes"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://code42.com/r/support/CVE-2020-12736"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://support.code42.com/Release_Notes"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-74"}], "source": "nvd@nist.gov", "type": "Primary"}]}