Lucene search

K
cveKrcertCVE-2020-7882
HistoryNov 22, 2021 - 3:15 p.m.

CVE-2020-7882

2021-11-2215:15:08
CWE-22
CWE-24
krcert
web.nvd.nist.gov
25
cve
2020
7882
path traversal
unauthorized access
file deletion
authorization certification
nvd

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

9

Confidence

High

EPSS

0.002

Percentile

65.0%

Using the parameter of getPFXFolderList function, attackers can see the information of authorization certification and delete the files. It occurs because the parameter contains path traversal characters(ie. ‘…/…/…/’)

Affected configurations

Nvd
Node
microsoftwindowsMatch-
AND
hancomanysign4pcMatch1.1.1.0
OR
hancomanysign4pcMatch1.1.2.6
OR
hancomanysign4pcMatch1.1.2.7
VendorProductVersionCPE
microsoftwindows-cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
hancomanysign4pc1.1.1.0cpe:2.3:a:hancom:anysign4pc:1.1.1.0:*:*:*:*:*:*:*
hancomanysign4pc1.1.2.6cpe:2.3:a:hancom:anysign4pc:1.1.2.6:*:*:*:*:*:*:*
hancomanysign4pc1.1.2.7cpe:2.3:a:hancom:anysign4pc:1.1.2.7:*:*:*:*:*:*:*

CNA Affected

[
  {
    "platforms": [
      "Windows"
    ],
    "product": "anySign4PC",
    "vendor": "Hancomwith",
    "versions": [
      {
        "status": "affected",
        "version": "1.1.1.0"
      },
      {
        "status": "affected",
        "version": "1.1.2.6"
      },
      {
        "status": "affected",
        "version": "1.1.2.7"
      }
    ]
  }
]

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

9

Confidence

High

EPSS

0.002

Percentile

65.0%

Related for CVE-2020-7882