{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"dateAssigned":"2018-06-23T00:00:00.000Z","datePublic":"2018-06-26T00:00:00.000Z","descriptions":[{"lang":"en","value":"The Sympa Community Sympa version prior to version 6.2.32 contains a Directory Traversal vulnerability in wwsympa.fcgi template editing function that can result in Possibility to create or modify files on the server filesystem. This attack appear to be exploitable via HTTP GET/POST request. This vulnerability appears to have been fixed in 6.2.32."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-08-04T20:06:24.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"https://sympa-community.github.io/security/2018-001.html"},{"name":"DSA-4285","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"https://www.debian.org/security/2018/dsa-4285"},{"name":"[debian-lts-announce] 20180724 [SECURITY] [DLA 1441-1] sympa security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00033.html"},{"name":"USN-4442-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/4442-1/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","DATE_ASSIGNED":"2018-06-23T11:22:33.073045","DATE_REQUESTED":"2018-04-19T15:27:54","ID":"CVE-2018-1000550","REQUESTER":"ikeda@conversion.co.jp","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Sympa Community Sympa version prior to version 6.2.32 contains a Directory Traversal vulnerability in wwsympa.fcgi template editing function that can result in Possibility to create or modify files on the server filesystem. This attack appear to be exploitable via HTTP GET/POST request. This vulnerability appears to have been fixed in 6.2.32."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://sympa-community.github.io/security/2018-001.html","refsource":"MISC","url":"https://sympa-community.github.io/security/2018-001.html"},{"name":"DSA-4285","refsource":"DEBIAN","url":"https://www.debian.org/security/2018/dsa-4285"},{"name":"[debian-lts-announce] 20180724 [SECURITY] [DLA 1441-1] sympa security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00033.html"},{"name":"USN-4442-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/4442-1/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T12:40:47.269Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://sympa-community.github.io/security/2018-001.html"},{"name":"DSA-4285","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"https://www.debian.org/security/2018/dsa-4285"},{"name":"[debian-lts-announce] 20180724 [SECURITY] [DLA 1441-1] sympa security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00033.html"},{"name":"USN-4442-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/4442-1/"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2018-1000550","datePublished":"2018-06-26T16:00:00.000Z","dateReserved":"2018-04-19T00:00:00.000Z","dateUpdated":"2024-08-05T12:40:47.269Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}