Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-30575", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "state": "PUBLISHED", "assignerShortName": "apache", "dateReserved": "2023-04-12T20:53:54.616Z", "datePublished": "2023-06-07T08:06:36.061Z", "dateUpdated": "2024-10-10T14:39:33.936Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Apache Guacamole", "vendor": "Apache Software Foundation", "versions": [{"lessThanOrEqual": "1.5.1", "status": "affected", "version": "0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "finder", "value": "Stefan Schiller (Sonar)"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data.<br><br>"}], "value": "Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data.\n\n"}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-131", "description": "CWE-131 Incorrect Calculation of Buffer Size", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache", "dateUpdated": "2023-06-15T07:28:16.579Z"}, "references": [{"tags": ["vendor-advisory"], "url": "https://lists.apache.org/thread/tn63n2lon0h5p45oft834t1dqvvxownv"}], "source": {"discovery": "EXTERNAL"}, "timeline": [{"lang": "en", "time": "2023-04-11T14:51:00.000Z", "value": "Reported to security@guacamole.apache.org"}, {"lang": "en", "time": "2023-04-11T15:07:00.000Z", "value": "Report acknowledged by project"}, {"lang": "en", "time": "2023-04-11T19:46:00.000Z", "value": "Report confirmed by project"}, {"lang": "en", "time": "2023-05-08T22:01:00.000Z", "value": "Fix completed and merged"}, {"lang": "en", "time": "2023-05-09T10:32:00.000Z", "value": "Fix tested and confirmed by reporter"}, {"lang": "en", "time": "2023-05-25T05:19:00.000Z", "value": "Fix released"}], "title": "Apache Guacamole: Incorrect calculation of Guacamole protocol element lengths", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T14:28:51.955Z"}, "title": "CVE Program Container", "references": [{"tags": ["vendor-advisory", "x_transferred"], "url": "https://lists.apache.org/thread/tn63n2lon0h5p45oft834t1dqvvxownv"}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-10T14:39:18.400824Z", "id": "CVE-2023-30575", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-10T14:39:33.936Z"}}]}}