Lucene search

K
cve[email protected]CVE-2020-36642
HistoryJan 06, 2023 - 11:15 a.m.

CVE-2020-36642

2023-01-0611:15:09
CWE-77
web.nvd.nist.gov
16
cve-2020-36642
trampgeek jobe
critical
command injection
vulnerability
upgrade
nvd

5.2 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.2%

A vulnerability was found in trampgeek jobe up to 1.6.x and classified as critical. This issue affects the function run_in_sandbox of the file application/libraries/LanguageTask.php. The manipulation leads to command injection. Upgrading to version 1.7.0 is able to address this issue. The identifier of the patch is 8f43daf50c943b98eaf0c542da901a4a16e85b02. It is recommended to upgrade the affected component. The identifier VDB-217553 was assigned to this vulnerability.

Affected configurations

Vulners
NVD
Node
jobe_projectjobeMatch1.0
OR
jobe_projectjobeMatch1.1
OR
jobe_projectjobeMatch1.2
OR
jobe_projectjobeMatch1.3
OR
jobe_projectjobeMatch1.4
OR
jobe_projectjobeMatch1.5
OR
jobe_projectjobeMatch1.6
VendorProductVersionCPE
jobe_projectjobe1.0cpe:2.3:a:jobe_project:jobe:1.0:*:*:*:*:*:*:*
jobe_projectjobe1.1cpe:2.3:a:jobe_project:jobe:1.1:*:*:*:*:*:*:*
jobe_projectjobe1.2cpe:2.3:a:jobe_project:jobe:1.2:*:*:*:*:*:*:*
jobe_projectjobe1.3cpe:2.3:a:jobe_project:jobe:1.3:*:*:*:*:*:*:*
jobe_projectjobe1.4cpe:2.3:a:jobe_project:jobe:1.4:*:*:*:*:*:*:*
jobe_projectjobe1.5cpe:2.3:a:jobe_project:jobe:1.5:*:*:*:*:*:*:*
jobe_projectjobe1.6cpe:2.3:a:jobe_project:jobe:1.6:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "trampgeek",
    "product": "jobe",
    "versions": [
      {
        "version": "1.0",
        "status": "affected"
      },
      {
        "version": "1.1",
        "status": "affected"
      },
      {
        "version": "1.2",
        "status": "affected"
      },
      {
        "version": "1.3",
        "status": "affected"
      },
      {
        "version": "1.4",
        "status": "affected"
      },
      {
        "version": "1.5",
        "status": "affected"
      },
      {
        "version": "1.6",
        "status": "affected"
      }
    ]
  }
]

5.2 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.2%

Related for CVE-2020-36642