{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2017-20179","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-02-19T20:01:39.990Z","datePublished":"2023-02-21T20:31:03.420Z","dateUpdated":"2024-08-05T21:45:25.998Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T12:01:54.738Z"},"title":"InSTEDD Pollit tour_controller.rb TourController Privilege Escalation","problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Privilege Escalation"}]}],"affected":[{"vendor":"InSTEDD","product":"Pollit","versions":[{"version":"2.3.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in InSTEDD Pollit 2.3.1. It has been rated as critical. This issue affects the function TourController of the file app/controllers/tour_controller.rb. The manipulation leads to an unknown weakness. The attack may be initiated remotely. Upgrading to version 2.3.2 is able to address this issue. The patch is named 6ef04f8b5972d5f16f8b86f8b53f62fac68d5498. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221507."},{"lang":"de","value":"Eine Schwachstelle wurde in InSTEDD Pollit 2.3.1 ausgemacht. Sie wurde als kritisch eingestuft. Dies betrifft die Funktion TourController der Datei app/controllers/tour_controller.rb. Dank der Manipulation mit unbekannten Daten kann eine unbekannte Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Ein Aktualisieren auf die Version 2.3.2 vermag dieses Problem zu lösen. Der Patch wird als 6ef04f8b5972d5f16f8b86f8b53f62fac68d5498 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-02-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-02-19T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-02-19T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-03-23T12:48:30.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.221507","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.221507","tags":["signature","permissions-required"]},{"url":"https://github.com/instedd/pollit/commit/6ef04f8b5972d5f16f8b86f8b53f62fac68d5498","tags":["patch"]},{"url":"https://github.com/instedd/pollit/releases/tag/2.3.2","tags":["patch"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-18T15:16:27.770318Z","id":"CVE-2017-20179","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-18T15:16:35.505Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:25.998Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.221507","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.221507","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/instedd/pollit/commit/6ef04f8b5972d5f16f8b86f8b53f62fac68d5498","tags":["patch","x_transferred"]},{"url":"https://github.com/instedd/pollit/releases/tag/2.3.2","tags":["patch","x_transferred"]}]}]}}