Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:sos-berlin:jobscheduler:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9304B5EB-B352-480C-B1D0-5AA3F88F6C9A", "vulnerable": true}, {"criteria": "cpe:2.3:a:sos-berlin:jobscheduler:1.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "444A6B97-66A5-4F0E-9423-92A2838D33A9", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An XML External Entity (XEE) vulnerability exists in the JOC Cockpit component of SOS JobScheduler 1.12 and 1.13.2 allows attackers to read files from the server via an entity declaration in any of the XML documents that are used to specify the run-time settings of jobs and orders."}, {"lang": "es", "value": "Se presenta una vulnerabilidad de tipo XML External Entity (XEE) en el componente JOC Cockpit de SOS JobScheduler versiones 1.12 y 1.13.2, que permite a atacantes leer archivos del servidor por medio de una declaraci\u00f3n de entidad en cualquiera de los documentos XML que son usados para especificar la configuraci\u00f3n del tiempo de ejecuci\u00f3n de trabajos y pedidos."}], "id": "CVE-2020-6856", "lastModified": "2024-11-21T05:36:18.150", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-02-06T17:15:14.303", "references": [{"source": "cve@mitre.org", "tags": ["Issue Tracking", "Vendor Advisory"], "url": "https://change.sos-berlin.com/browse/JOC-853"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Vendor Advisory"], "url": "https://change.sos-berlin.com/browse/JOC-853"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-776"}], "source": "nvd@nist.gov", "type": "Primary"}]}