{"containers":{"cna":{"affected":[{"product":"cryptctl","vendor":"SUSE","versions":[{"lessThan":"2.0","status":"affected","version":"unspecified","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Sebastian Krahmer of SUSE"}],"datePublic":"2017-07-14T00:00:00.000Z","descriptions":[{"lang":"en","value":"In cryptctl before version 2.0 a malicious server could send RPC requests that could overwrite files outside of the cryptctl key database."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N","version":"3.0"}}],"problemTypes":[{"descriptions":[{"description":"A directory traversal due to insufficient parameter checking could allow malicious servers to get a cryptctl client overwrite  and corrupt files outside of the key storage directory.","lang":"en","type":"text"}]},{"descriptions":[{"cweId":"CWE-22","description":"CWE-22","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-01-06T16:15:50.000Z","orgId":"f81092c5-7f14-476d-80dc-24857f90be84","shortName":"microfocus"},"references":[{"name":"SUSE-SU-2017:1865","tags":["vendor-advisory","x_refsource_SUSE"],"url":"https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00022.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1041963"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.suse.com/de-de/security/cve/CVE-2017-9270/"}],"source":{"defect":["https://bugzilla.suse.com/show_bug.cgi?id=1041963"],"discovery":"INTERNAL"},"title":"post-auth arbitrary file write on cryptctl server","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@microfocus.com","DATE_PUBLIC":"2017-07-14T00:00:00.000Z","ID":"CVE-2017-9270","STATE":"PUBLIC","TITLE":"post-auth arbitrary file write on cryptctl server"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"cryptctl","version":{"version_data":[{"affected":"<","version_affected":"<","version_value":"2.0"}]}}]},"vendor_name":"SUSE"}]}},"credit":[{"lang":"eng","value":"Sebastian Krahmer of SUSE"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In cryptctl before version 2.0 a malicious server could send RPC requests that could overwrite files outside of the cryptctl key database."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"A directory traversal due to insufficient parameter checking could allow malicious servers to get a cryptctl client overwrite  and corrupt files outside of the key storage directory."}]},{"description":[{"lang":"eng","value":"CWE-22"}]}]},"references":{"reference_data":[{"name":"SUSE-SU-2017:1865","refsource":"SUSE","url":"https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00022.html"},{"name":"https://bugzilla.suse.com/show_bug.cgi?id=1041963","refsource":"CONFIRM","url":"https://bugzilla.suse.com/show_bug.cgi?id=1041963"},{"name":"https://www.suse.com/de-de/security/cve/CVE-2017-9270/","refsource":"CONFIRM","url":"https://www.suse.com/de-de/security/cve/CVE-2017-9270/"}]},"source":{"defect":["https://bugzilla.suse.com/show_bug.cgi?id=1041963"],"discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T17:02:44.152Z"},"title":"CVE Program Container","references":[{"name":"SUSE-SU-2017:1865","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00022.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1041963"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.suse.com/de-de/security/cve/CVE-2017-9270/"}]}]},"cveMetadata":{"assignerOrgId":"f81092c5-7f14-476d-80dc-24857f90be84","assignerShortName":"microfocus","cveId":"CVE-2017-9270","datePublished":"2018-03-01T19:00:00.000Z","dateReserved":"2017-05-29T00:00:00.000Z","dateUpdated":"2024-09-17T00:36:08.565Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}