Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cloud_foundry:bosh:260:*:*:*:*:*:*:*", "matchCriteriaId": "B8F3F33E-AEE9-4D6B-96F8-908AECBCE525", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloud_foundry:bosh:260.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF5D0352-286C-4F64-9147-DEBE00F8B00D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloud_foundry:bosh:260.2:*:*:*:*:*:*:*", "matchCriteriaId": "44842718-23C0-462F-AEA0-0A1112BBF3B6", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloud_foundry:bosh:260.3:*:*:*:*:*:*:*", "matchCriteriaId": "3D81B883-92C1-40C5-A791-03243CA6A463", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloud_foundry:bosh:260.4:*:*:*:*:*:*:*", "matchCriteriaId": "2D755675-393A-440C-8333-E53CEE9CCB49", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloud_foundry:bosh:260.5:*:*:*:*:*:*:*", "matchCriteriaId": "99AD3D75-6439-43CC-89CE-BA94BB8617A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloud_foundry:bosh:260.6:*:*:*:*:*:*:*", "matchCriteriaId": "075C80C7-CF9E-4D0B-8A8F-009DAC9FF84D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloud_foundry:bosh:260.7:*:*:*:*:*:*:*", "matchCriteriaId": "5126E768-3CF2-4E88-AC18-23BAD27EDDAB", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloud_foundry:bosh:261:*:*:*:*:*:*:*", "matchCriteriaId": "A8AC8AC7-38F4-4106-8805-8F805C257A58", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloud_foundry:bosh:261.1:*:*:*:*:*:*:*", "matchCriteriaId": "F460F5ED-2FB6-49B7-9E9F-326388E713C1", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloud_foundry:bosh:261.2:*:*:*:*:*:*:*", "matchCriteriaId": "0D858418-DCD2-4463-9330-C9A6C3E99237", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation BOSH Release 261.x versions prior to 261.3 and all 260.x versions. In certain cases an authenticated Director user can provide a malicious checksum that could allow them to escalate their privileges on the Director VM, aka \"BOSH Director Shell Injection Vulnerabilities.\""}, {"lang": "es", "value": "Se detect\u00f3 un problema en las versiones de BOSH versi\u00f3n 261.x anteriores a 261.3 y en todas las versiones de 260.x de Cloud Foundry Foundation. En ciertos casos, un usuario Director identificado puede proporcionar una suma de comprobaciones maliciosa que podr\u00eda permitirles escalar sus privilegios en la M\u00e1quina Virtual Director, tambi\u00e9n se conoce como \"BOSH Director Shell Injection Vulnerabilities"}], "id": "CVE-2017-4961", "lastModified": "2024-11-21T03:26:45.670", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-06-13T06:29:00.393", "references": [{"source": "security_alert@emc.com", "tags": ["Vendor Advisory"], "url": "https://www.cloudfoundry.org/cve-2017-4961/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.cloudfoundry.org/cve-2017-4961/"}], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-354"}], "source": "nvd@nist.gov", "type": "Primary"}]}