Show plain JSON{"containers": {"cna": {"affected": [{"platforms": ["Windows"], "product": "citizen certificate client-side component", "vendor": "Hicos", "versions": [{"lessThanOrEqual": "3.0.0", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"platforms": ["Mac"], "product": "citizen certificate client-side component", "vendor": "Hicos", "versions": [{"lessThanOrEqual": "1.3.4.12", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "datePublic": "2022-01-31T00:00:00", "descriptions": [{"lang": "en", "value": "Hicos citizen certificate client-side component does not filter special characters for command parameters in specific web URLs. An unauthenticated remote attacker can exploit this vulnerability to perform command injection attack to execute arbitrary system command, disrupt system or terminate service."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-03-01T01:55:17", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.twcert.org.tw/tw/cp-132-5695-421a7-1.html"}, {"tags": ["x_refsource_MISC"], "url": "https://moica.nat.gov.tw/rac_plugin.html"}], "solutions": [{"lang": "en", "value": "Download latest version"}], "source": {"advisory": "TVN-202201006", "discovery": "EXTERNAL"}, "title": "Hicos citizen certificate client-side component - Command Injection", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"AKA": "TWCERT/CC", "ASSIGNER": "cve@cert.org.tw", "DATE_PUBLIC": "2022-01-31T01:27:00.000Z", "ID": "CVE-2020-12775", "STATE": "PUBLIC", "TITLE": "Hicos citizen certificate client-side component - Command Injection"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "citizen certificate client-side component", "version": {"version_data": [{"platform": "Windows", "version_affected": "<=", "version_value": "3.0.0"}, {"platform": "Mac", "version_affected": "<=", "version_value": "1.3.4.12"}]}}]}, "vendor_name": "Hicos"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Hicos citizen certificate client-side component does not filter special characters for command parameters in specific web URLs. An unauthenticated remote attacker can exploit this vulnerability to perform command injection attack to execute arbitrary system command, disrupt system or terminate service."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-78 OS Command Injection"}]}]}, "references": {"reference_data": [{"name": "https://www.twcert.org.tw/tw/cp-132-5695-421a7-1.html", "refsource": "MISC", "url": "https://www.twcert.org.tw/tw/cp-132-5695-421a7-1.html"}, {"name": "https://moica.nat.gov.tw/rac_plugin.html", "refsource": "MISC", "url": "https://moica.nat.gov.tw/rac_plugin.html"}]}, "solution": [{"lang": "en", "value": "Download latest version"}], "source": {"advisory": "TVN-202201006", "discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T12:04:22.894Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.twcert.org.tw/tw/cp-132-5695-421a7-1.html"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://moica.nat.gov.tw/rac_plugin.html"}]}]}, "cveMetadata": {"assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2020-12775", "datePublished": "2022-03-01T01:55:17.625028Z", "dateReserved": "2020-05-11T00:00:00", "dateUpdated": "2024-09-16T22:35:31.057Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}