Lucene search

K
cvelistKrcertCVELIST:CVE-2020-7882
HistoryNov 22, 2021 - 2:43 p.m.

CVE-2020-7882 anySign directory traversal vulnerability

2021-11-2214:43:26
CWE-24
krcert
www.cve.org
6
cve-2020-7882
anysign
directory traversal
vulnerability
authorization certification
path traversal characters
getpfxfolderlist function
deletion of files

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

9.2

Confidence

High

EPSS

0.002

Percentile

65.0%

Using the parameter of getPFXFolderList function, attackers can see the information of authorization certification and delete the files. It occurs because the parameter contains path traversal characters(ie. ‘…/…/…/’)

CNA Affected

[
  {
    "platforms": [
      "Windows"
    ],
    "product": "anySign4PC",
    "vendor": "Hancomwith",
    "versions": [
      {
        "status": "affected",
        "version": "1.1.1.0"
      },
      {
        "status": "affected",
        "version": "1.1.2.6"
      },
      {
        "status": "affected",
        "version": "1.1.2.7"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

9.2

Confidence

High

EPSS

0.002

Percentile

65.0%

Related for CVELIST:CVE-2020-7882