Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:dh2i:dxenterprise:*:*:*:*:*:windows:*:*", "matchCriteriaId": "CCFBC472-0753-4028-88ED-CB11A23DC445", "versionEndIncluding": "20.0.218", "versionStartIncluding": "19.5", "vulnerable": true}, {"criteria": "cpe:2.3:a:dh2i:dxodyssey:*:*:*:*:*:windows:*:*", "matchCriteriaId": "4B226A19-4E7D-4E63-B600-48719B7DD06D", "versionEndIncluding": "20.0.219", "versionStartIncluding": "19.5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A path traversal vulnerability in the DxWebEngine component of DH2i DxEnterprise and DxOdyssey for Windows, version 19.5 through 20.x before 20.0.219.0, allows an attacker to read any file on the host file system via an HTTP request."}, {"lang": "es", "value": "Una vulnerabilidad de salto de ruta en el componente DxWebEngine de DH2i DxEnterprise y DxOdyssey para Windows, versiones 19.5 hasta 20.x anteriores a 20.0.219.0, permite a un atacante leer cualquier archivo en el sistema de archivos del host por medio de una petici\u00f3n HTTP"}], "id": "CVE-2021-3341", "lastModified": "2024-11-21T06:21:20.143", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-01-29T01:15:14.610", "references": [{"source": "cve@mitre.org", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://clients.dh2i.com/Support/Article.aspx?ID=2963454"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://clients.dh2i.com/Support/Article.aspx?ID=2963454"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}