Show plain JSON{"id": "CVE-2016-9684", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2017-02-22T05:59:00.247", "references": [{"url": "http://documents.software.dell.com/sonicwall-sma-100-series/8.1.0.7/release-notes/resolved-issues?ParentProduct=868", "tags": ["Release Notes", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://pastebin.com/g1e2qU6N", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/96375", "source": "cve@mitre.org"}, {"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0005", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-77"}]}], "descriptions": [{"lang": "en", "value": "The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'viewcert' CGI (/cgi-bin/viewcert) component responsible for processing SSL certificate information. The CGI application doesn't properly escape the information it's passed in the 'CERT' variable before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account."}, {"lang": "es", "value": "El servidor SonicWall Secure Remote Access (version 8.1.0.2-14sv) es vulnerable a una vulnerabilidad de Inyecci\u00f3n Remota de Comandos en su interfaz administrativa web. Esta vulnerabilidad tiene lugar en el componente 'viewcert' CGI (/cgi-bin/viewcert) responsable del procesamiento de la informaci\u00f3n del certificado SSL. La aplicaci\u00f3n CGI no escapa adecuadamente de la informaci\u00f3n pasada en la variable 'CERT' antes de que se realice una llamada al sistema() - permitiendo la inyecci\u00f3n remota de comandos. La explotaci\u00f3n de esta vulnerabilidad genera acceso shell a la m\u00e1quina remota bajo la cuenta de usuario \"nobody\"."}], "lastModified": "2018-10-17T10:29:08.400", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:dell:sonicwall_secure_remote_access_server:8.1.0.2-14sv:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82AE3BB1-3886-41EE-866C-25EA3B21FDBA"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}