Show plain JSON{"containers": {"cna": {"affected": [{"product": "SmartControl", "vendor": "Philips", "versions": [{"status": "affected", "version": "4.3.15"}, {"status": "unaffected", "version": "1.0.7"}]}], "credits": [{"lang": "en", "value": "This issue was discovered and reported by Erik Wynter of Vonahi Security."}], "datePublic": "2020-08-06T00:00:00", "descriptions": [{"lang": "en", "value": "An Uncontrolled Search Path Element (CWE-427) vulnerability in SmartControl version 4.3.15 and versions released before April 15, 2020 may allow an authenticated user to escalate privileges by placing a specially crafted DLL file in the search path. This issue was fixed in version 1.0.7, which was released after April 15, 2020. (Note, the version numbering system changed significantly between version 4.3.15 and version 1.0.7.)"}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2020-08-13T19:05:15", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://blog.vonahi.io/when-the-path-to-system-is-wide-open/"}], "source": {"discovery": "EXTERNAL"}, "title": "Philips SmartControl DLL Hijacking", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@rapid7.com", "DATE_PUBLIC": "2020-08-06T13:27:00.000Z", "ID": "CVE-2020-7360", "STATE": "PUBLIC", "TITLE": "Philips SmartControl DLL Hijacking"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SmartControl", "version": {"version_data": [{"version_affected": "=", "version_name": "4.3.15", "version_value": "4.3.15"}, {"version_affected": "!", "version_name": "1.0.7", "version_value": "1.0.7"}]}}]}, "vendor_name": "Philips"}]}}, "credit": [{"lang": "eng", "value": "This issue was discovered and reported by Erik Wynter of Vonahi Security."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "An Uncontrolled Search Path Element (CWE-427) vulnerability in SmartControl version 4.3.15 and versions released before April 15, 2020 may allow an authenticated user to escalate privileges by placing a specially crafted DLL file in the search path. This issue was fixed in version 1.0.7, which was released after April 15, 2020. (Note, the version numbering system changed significantly between version 4.3.15 and version 1.0.7.)"}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-427 Uncontrolled Search Path Element"}]}]}, "references": {"reference_data": [{"name": "https://blog.vonahi.io/when-the-path-to-system-is-wide-open/", "refsource": "MISC", "url": "https://blog.vonahi.io/when-the-path-to-system-is-wide-open/"}]}, "source": {"discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T09:25:48.983Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://blog.vonahi.io/when-the-path-to-system-is-wide-open/"}]}]}, "cveMetadata": {"assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2020-7360", "datePublished": "2020-08-13T19:05:15.783973Z", "dateReserved": "2020-01-21T00:00:00", "dateUpdated": "2024-09-17T01:21:03.461Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}