Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CA09036-632C-43B1-905D-9C0791741175", "versionEndIncluding": "10.8.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "08A7F5AB-EBFF-4178-A453-E15DE705297E", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.9.0:rolling_patch1:*:*:*:*:*:*", "matchCriteriaId": "694A17F8-C261-4980-9599-0FD10FE28B29", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.9.0:rolling_patch2:*:*:*:*:*:*", "matchCriteriaId": "AA372FE3-5F64-4578-B7EF-D5858A09A2CD", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.9.0:rolling_patch3:*:*:*:*:*:*", "matchCriteriaId": "0A620E08-F0EA-4132-8D2F-8D1DD284DD16", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.9.0:rolling_patch4:*:*:*:*:*:*", "matchCriteriaId": "DD2FC0D4-D4CD-4E18-8B87-9DF5FC5EC851", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "90CBB0DC-9216-4224-B1C7-B852990FE2FF", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:rolling_patch1:*:*:*:*:*:*", "matchCriteriaId": "D13600BB-D45D-4EE0-BE08-C9AB9778E42C", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:rolling_patch2:*:*:*:*:*:*", "matchCriteriaId": "12B7F68D-7F6F-4305-BDD2-2B3F6FBF12EE", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:rolling_patch3:*:*:*:*:*:*", "matchCriteriaId": "7FCF41C7-62BC-4DF4-8A38-4E727E492CEF", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:rolling_patch4:*:*:*:*:*:*", "matchCriteriaId": "65AD3824-ABE8-4FD2-B201-C11E7D11E938", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.10.0:rolling_patch5:*:*:*:*:*:*", "matchCriteriaId": "1AFAE25F-DF7D-45EE-91DE-3A07F4D5625D", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "6E2CC054-2FC3-4C68-A3AB-411382CD1332", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.11.0:rolling_patch1:*:*:*:*:*:*", "matchCriteriaId": "ABD3BDF2-39B2-4C5C-A647-406142363632", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.11.0:rolling_patch2:*:*:*:*:*:*", "matchCriteriaId": "88FF116A-5E98-402D-901D-F4A91006722B", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.11.0:rolling_patch3:*:*:*:*:*:*", "matchCriteriaId": "0748ECB6-DCD1-4B49-A0A8-E0ABFC5F1EAD", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "33335E33-AAE8-4DAB-85B7-6B376993EC2C", "vulnerable": true}, {"criteria": "cpe:2.3:a:citrix:xenmobile_server:10.12.0:rolling_patch1:*:*:*:*:*:*", "matchCriteriaId": "50F4279F-C878-4684-9DA7-0C9FDE213D6A", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Improper access control in Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files."}, {"lang": "es", "value": "Un control de acceso inapropiado en Citrix XenMobile Server versiones 10.12 anteriores a RP2, Citrix XenMobile Server versiones 10.11 anteriores a RP4, Citrix XenMobile Server versiones 10.10 anteriores a RP6 y Citrix XenMobile Server versiones anteriores a 10.9 RP5 y conlleva a una habilidad de leer archivos arbitrarios."}], "id": "CVE-2020-8209", "lastModified": "2024-11-21T05:38:30.537", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-08-17T16:15:13.343", "references": [{"source": "support@hackerone.com", "tags": ["Vendor Advisory"], "url": "https://support.citrix.com/article/CTX277457"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://support.citrix.com/article/CTX277457"}], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "support@hackerone.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}