Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mitel:connect_onsite:*:*:*:*:*:*:*:*", "matchCriteriaId": "880EBE7A-32CF-427A-9657-243646B56800", "versionEndIncluding": "r1711-prem", "vulnerable": true}, {"criteria": "cpe:2.3:a:mitel:st14.2:*:*:*:*:*:*:*:*", "matchCriteriaId": "22CF80BB-56C8-40CF-AD9C-D8911F5D5C1E", "versionEndIncluding": "ga28", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vnewmeeting.php page. Successful exploit could allow an attacker to execute arbitrary PHP code within the context of the application."}, {"lang": "es", "value": "Una vulnerabilidad en el componente conferencing de Mitel Connect ONSITE, en versiones R1711-PREM y anteriores y Mitel ST 14.2, release GA28 y anteriores, podr\u00eda permitir que un atacante no autenticado inyecte c\u00f3digo PHP empleando peticiones especialmente manipuladas en la p\u00e1gina vnewmeeting.php. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que un atacante ejecute c\u00f3digo PHP arbitrario en el contexto de la aplicaci\u00f3n."}], "id": "CVE-2018-5780", "lastModified": "2024-11-21T04:09:22.830", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-03-14T16:29:00.337", "references": [{"source": "cve@mitre.org", "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-94"}], "source": "nvd@nist.gov", "type": "Primary"}]}