Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:apache:ode:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D9B5C09-35AD-400F-8662-049314308E83", "versionEndIncluding": "1.3.2", "versionStartExcluding": "1.1.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.0:incubating:*:*:*:*:*:*", "matchCriteriaId": "6BE9947E-5979-49A6-8111-FCD3CE5F754D", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.0:rc1-incubating:*:*:*:*:*:*", "matchCriteriaId": "BA4DAE51-EF08-40DE-BD15-38545FBB3914", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.0:rc2-incubating:*:*:*:*:*:*", "matchCriteriaId": "6458BAB7-683D-466B-9A5F-9360AA0C35F4", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.0:rc3-incubating:*:*:*:*:*:*", "matchCriteriaId": "44A54273-E367-437B-AAC6-5FAA62BF2DB9", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.0:rc4-incubating:*:*:*:*:*:*", "matchCriteriaId": "700BE4BB-28D4-4C1D-BD01-CC7D6AE2F36E", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "1AE449D9-4653-47DB-B7B7-0D57A004470C", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "51F34109-61B7-4111-931F-3B7A24B24F05", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "E015A305-0D16-4AAB-BACB-9A7CAE223542", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.1:rc4:*:*:*:*:*:*", "matchCriteriaId": "381D420A-F058-450E-862D-3AD8ED83978E", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.1:rc5:*:*:*:*:*:*", "matchCriteriaId": "3ADDB273-B624-4CA8-92FA-E1FCA92B6191", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:ode:1.1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "1E7A7A2F-137C-49A6-8634-446D34C46B27", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The ODE process deployment web service was sensible to deployment messages with forged names. Using a path for the name was allowing directory traversal, resulting in the potential writing of files under unwanted locations, the overwriting of existing files or their deletion. This issue was addressed in Apache ODE 1.3.3 which was released in 2009, however the incorrect name CVE-2008-2370 was used on the advisory by mistake."}, {"lang": "es", "value": "El servicio web de despliegue del proceso ODE era sensible a mensajes de despliegue con nombres falsificados. El uso de una ruta para el nombre permit\u00eda salto de directorio, lo que resultaba en la potencial escritura de archivos en ubicaciones no deseadas, la sobrescritura de archivos existente o su eliminaci\u00f3n. Este problema fue abordado en Apache ODE 1.3.3, que se lanz\u00f3 en 2009. Sin embargo, el nombre incorrecto CVE-2008-2370 se emple\u00f3 en el advisory por error."}], "id": "CVE-2018-1316", "lastModified": "2024-11-21T03:59:36.740", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-03-05T14:29:00.313", "references": [{"source": "security@apache.org", "tags": ["Vendor Advisory"], "url": "http://mail-archives.apache.org/mod_mbox/www-announce/200908.mbox/%3Cfbdc6a970908072141w20a7a9d9ka1f896ad8073dffb%40mail.gmail.com%3E"}, {"source": "security@apache.org", "url": "https://lists.apache.org/thread.html/ce416ddfba1a87f4b8e2d8125f1c3b45d1f0b350af29a4d0405e213b%40%3Cuser.ode.apache.org%3E"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://mail-archives.apache.org/mod_mbox/www-announce/200908.mbox/%3Cfbdc6a970908072141w20a7a9d9ka1f896ad8073dffb%40mail.gmail.com%3E"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ce416ddfba1a87f4b8e2d8125f1c3b45d1f0b350af29a4d0405e213b%40%3Cuser.ode.apache.org%3E"}], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}