Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:-:*:*:*:*:*:*", "matchCriteriaId": "4C9B2448-E35C-4198-A389-11F46D98907C", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.0:build10001:*:*:*:*:*:*", "matchCriteriaId": "422EF4FC-F29E-4166-9EA0-C34BA3F160B6", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10100:*:*:*:*:*:*", "matchCriteriaId": "5E6B99B8-4B22-40D6-8E9B-7E51C4E0BC03", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10101:*:*:*:*:*:*", "matchCriteriaId": "E8DAC87D-4501-47B9-A3EE-7AC28646377B", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10102:*:*:*:*:*:*", "matchCriteriaId": "83A397DA-91F0-42E9-8066-DBC2A02C680A", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10103:*:*:*:*:*:*", "matchCriteriaId": "E4DA1517-9C49-4E46-9BE4-7B6A9B9CA71D", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.1:build10104:*:*:*:*:*:*", "matchCriteriaId": "D56A0C6E-8865-409D-A7F3-600A466CB7F4", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.2:build10200:*:*:*:*:*:*", "matchCriteriaId": "92DCA776-14CD-4258-8804-1C531966F8FB", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10300:*:*:*:*:*:*", "matchCriteriaId": "38BB8CEB-43AE-43FC-80E9-1FD5D518C822", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10301:*:*:*:*:*:*", "matchCriteriaId": "A5DBA962-E485-47FB-8C06-B74B28417E87", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.3:build10302:*:*:*:*:*:*", "matchCriteriaId": "E34CD968-6820-4D24-A792-F272E4A582BE", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:-:*:*:*:*:*:*", "matchCriteriaId": "310987F7-216C-47DC-9AEA-F383D31B2F8C", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10400:*:*:*:*:*:*", "matchCriteriaId": "EBE9858E-817C-4E40-B880-4B466272FD87", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10401:*:*:*:*:*:*", "matchCriteriaId": "5B94A45F-595F-4F2A-83C9-501DDFDF1DC3", "vulnerable": true}, {"criteria": "cpe:2.3:a:zohocorp:manageengine_password_manager_pro:10.4:build10402:*:*:*:*:*:*", "matchCriteriaId": "EA1DD26C-22D3-45F4-B877-605B56379A0B", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "Zoho ManageEngine Password Manager Pro through 10.x has a CSV Excel Macro Injection vulnerability via a crafted name that is mishandled by the Export Passwords feature. NOTE: the vendor disputes the significance of this report because they expect CSV risk mitigation to be provided by an external application, and do not plan to add CSV constraints to their own products"}, {"lang": "es", "value": "** EN DISPUTA ** Zoho ManageEngine Password Manager Pro hasta la versi\u00f3n de 10.x tiene una vulnerabilidad de inyecci\u00f3n de macro en Excel CSV a trav\u00e9s de un nombre especialmente dise\u00f1ado que es mal manejado por la funci\u00f3n Exportar contrase\u00f1as. NOTA: el proveedor cuestiona la importancia de este informe porque espera que una aplicaci\u00f3n externa proporcione la mitigaci\u00f3n del riesgo de CSV y no planea agregar restricciones de CSV a sus propios productos."}], "id": "CVE-2020-9347", "lastModified": "2024-11-21T05:40:27.633", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-03-16T22:15:15.247", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.x_CSV_Excel_Macro_Injection.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.x_CSV_Excel_Macro_Injection.txt"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-1236"}], "source": "nvd@nist.gov", "type": "Primary"}]}