Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-45159", "assignerOrgId": "4a68d2b9-b68a-4765-95bd-17f35092666b", "state": "PUBLISHED", "assignerShortName": "1E", "dateReserved": "2023-10-04T23:59:54.078Z", "datePublished": "2023-10-05T10:11:20.065Z", "dateUpdated": "2024-09-19T17:39:03.825Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "affected", "platforms": ["Windows"], "product": "1E Client", "vendor": "1E", "versions": [{"changes": [{"at": "Q23097", "status": "unaffected"}], "lessThan": "8.1.2.62", "status": "affected", "version": "0", "versionType": "Q23097"}, {"changes": [{"at": "Q23105", "status": "unaffected"}], "lessThan": "8.4.1.159", "status": "affected", "version": "0", "versionType": "Q23105"}, {"changes": [{"at": "Q23115", "status": "unaffected"}], "lessThan": "9.0.1.88", "status": "affected", "version": "0", "versionType": "Q23115"}, {"changes": [{"at": "Q23121", "status": "unaffected"}], "lessThan": "23.7.1.151", "status": "affected", "version": "0", "versionType": "Q23121"}]}], "credits": [{"lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Thanks to Lockheed Martin red team who reported this issue."}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "1E Client installer can perform arbitrary file deletion on protected files. \n\n<span style=\"background-color: rgb(255, 255, 255);\">A non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. <br><br>A hotfix is available from the 1E support portal that forces <span style=\"background-color: rgb(255, 255, 255);\">the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.<br><br>for v8.1 use hotfix Q23097<br>for v8.4 use hotfix Q23105<br>for v9.0 use hotfix Q23115<br><br>for SaaS customers, use 1EClient v23.7 plus hotfix Q23121</span></span>"}], "value": "1E Client installer can perform arbitrary file deletion on protected files.\u00a0\u00a0\n\nA non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. \n\nA hotfix is available from the 1E support portal that forces\u00a0the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.\n\nfor v8.1 use hotfix Q23097\nfor v8.4 use hotfix Q23105\nfor v9.0 use hotfix Q23115\n\nfor SaaS customers, use 1EClient v23.7 plus hotfix Q23121"}], "impacts": [{"capecId": "CAPEC-122", "descriptions": [{"lang": "en", "value": "CAPEC-122 Privilege Abuse"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access ('Link Following')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "4a68d2b9-b68a-4765-95bd-17f35092666b", "shortName": "1E", "dateUpdated": "2023-10-19T12:40:46.822Z"}, "references": [{"url": "https://www.1e.com/trust-security-compliance/cve-info/"}], "source": {"discovery": "EXTERNAL"}, "title": "1E Client installer can perform arbitrary file deletion on protected files", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T20:14:19.830Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.1e.com/trust-security-compliance/cve-info/", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "1e", "product": "client", "cpes": ["cpe:2.3:a:1e:client:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "8.1.2.62", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "8.4.1.159", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "9.0.1.88", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "23.7.1.151", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-19T17:33:38.940543Z", "id": "CVE-2023-45159", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-19T17:39:03.825Z"}}]}}