Show plain JSON{"id": "CVE-2018-1000889", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2018-12-28T16:29:02.050", "references": [{"url": "https://github.com/reds-heig/logisim-evolution/pull/139", "tags": ["Patch", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.kvakil.me/posts/logisim/", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/reds-heig/logisim-evolution/pull/139", "tags": ["Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.kvakil.me/posts/logisim/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-611"}]}], "descriptions": [{"lang": "en", "value": "Logisim Evolution version 2.14.3 and earlier contains an XML External Entity (XXE) vulnerability in Circuit file loading functionality (loadXmlFrom in src/com/cburch/logisim/file/XmlReader.java) that can result in information leak, possible RCE depending on system configuration. This attack appears to be exploitable via the victim opening a specially crafted circuit file. This vulnerability appears to have been fixed in 2.14.4."}, {"lang": "es", "value": "Logisim Evolution, en versiones 2.14.3 y anteriores, contiene una vulnerabilidad XEE (XML External Entity) en la funcionalidad de carga de archivos Circuit (loadXmlFrom en src/com/cburch/logisim/file/XmlReader.java) que puede resultar en la fuga de informaci\u00f3n y una posible ejecuci\u00f3n remota de c\u00f3digo, dependiendo de la configuraci\u00f3n del sistema. El ataque parece ser explotable si una v\u00edctima abre un archivo circuit especialmente manipulado. La vulnerabilidad parece haber sido solucionada en la versi\u00f3n 2.14.4."}], "lastModified": "2024-11-21T03:40:35.880", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:logisim-evolution_project:logisim-evolution:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D70F429-0F6E-49C9-BC2D-2DA11D6BE98B", "versionEndIncluding": "2.14.3"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}