Show plain JSON{"id": "CVE-2018-1000844", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.4, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.1, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.2, "exploitabilityScore": 3.9}]}, "published": "2018-12-20T15:29:02.127", "references": [{"url": "https://github.com/square/retrofit/pull/2735", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/square/retrofit/pull/2735", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-611"}]}], "descriptions": [{"lang": "en", "value": "Square Open Source Retrofit version Prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contains a XML External Entity (XXE) vulnerability in JAXB that can result in An attacker could use this to remotely read files from the file system or to perform SSRF.. This vulnerability appears to have been fixed in After commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437."}, {"lang": "es", "value": "Square Open Source Retrofit, en versiones anteriores al commit con ID 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437, contiene una vulnerabilidad XEE (XML External Entity) en JAXB que puede resultar en que un atacante podr\u00eda aprovecharla para leer archivos de forma remota desde el sistema de archivos o para realizar Server-Side Request Forgery (SSRF). La vulnerabilidad parece haber sido solucionada tras el commit con ID 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437."}], "lastModified": "2024-11-21T03:40:28.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:squareup:retrofit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D95FECC-802F-4708-BE61-5A6A9CAAF843", "versionEndExcluding": "2.5.0", "versionStartIncluding": "2.4.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}