Show plain JSON{"dataType": "CVE_RECORD", "containers": {"adp": [{"title": "CVE Program Container", "references": [{"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-921/", "name": "ZDI-23-921", "tags": ["x_research-advisory", "x_transferred"]}, {"url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", "name": "vendor-provided URL", "tags": ["vendor-advisory", "x_transferred"]}], "providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T17:30:13.933Z"}}, {"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2023-38095", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-05-10T17:20:07.569103Z"}}}], "affected": [{"cpes": ["cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*"], "vendor": "netgear", "product": "prosafe_network_management_system", "versions": [{"status": "affected", "version": "0", "lessThan": "1.7.0.20", "versionType": "custom"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-05-10T17:20:05.825Z"}}], "cna": {"title": "NETGEAR ProSAFE Network Management System MFileUploadController Unrestricted File Upload Remote Code Execution Vulnerability", "source": {"lang": "en", "value": "Steven Seeley of Source Incite"}, "metrics": [{"format": "CVSS", "cvssV3_0": {"version": "3.0", "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}}], "affected": [{"vendor": "NETGEAR", "product": "ProSAFE Network Management System", "versions": [{"status": "affected", "version": "R.47.0.0 AutoCAD 2021 & R.47.0.0 AutoCAD LT 2021"}], "defaultStatus": "unknown"}], "datePublic": "2023-07-13T14:53:03.927-05:00", "references": [{"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-921/", "name": "ZDI-23-921", "tags": ["x_research-advisory"]}, {"url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", "name": "vendor-provided URL", "tags": ["vendor-advisory"]}], "dateAssigned": "2023-07-12T10:35:24.815-05:00", "descriptions": [{"lang": "en", "value": "NETGEAR ProSAFE Network Management System MFileUploadController Unrestricted File Upload Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the MFileUploadController class. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19717."}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-434", "description": "CWE-434: Unrestricted Upload of File with Dangerous Type"}]}], "providerMetadata": {"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi", "dateUpdated": "2024-05-03T01:58:58.287Z"}}}, "cveMetadata": {"cveId": "CVE-2023-38095", "state": "PUBLISHED", "dateUpdated": "2024-08-02T17:30:13.933Z", "dateReserved": "2023-07-12T15:22:20.617Z", "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "datePublished": "2024-05-03T01:58:58.287Z", "assignerShortName": "zdi"}, "dataVersion": "5.1"}