{"containers":{"cna":{"affected":[{"product":"Open Build Service","vendor":"openSUSE","versions":[{"lessThanOrEqual":"0.6.2","status":"affected","version":"obs-service-download_files","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Matthias Gerstner of SUSE"}],"datePublic":"2020-05-11T00:00:00.000Z","descriptions":[{"lang":"en","value":"A Externally Controlled Reference to a Resource in Another Sphere vulnerability in obs-service-download_files of openSUSE Open Build Service allows authenticated users to generate HTTP request against internal networks and potentially downloading data that is exposed there. This issue affects: openSUSE Open Build Service ."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-610","description":"CWE-610: Externally Controlled Reference to a Resource in Another Sphere","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-01-06T16:15:48.000Z","orgId":"f81092c5-7f14-476d-80dc-24857f90be84","shortName":"microfocus"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1107821"}],"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1107821","defect":["1107821"],"discovery":"INTERNAL"},"title":"obs-service-download_files allows downloading from localhost or intranet hosts","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@microfocus.com","DATE_PUBLIC":"2020-05-11T00:00:00.000Z","ID":"CVE-2018-12475","STATE":"PUBLIC","TITLE":"obs-service-download_files allows downloading from localhost or intranet hosts"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Open Build Service","version":{"version_data":[{"version_affected":"<=","version_name":"obs-service-download_files","version_value":"0.6.2"}]}}]},"vendor_name":"openSUSE"}]}},"credit":[{"lang":"eng","value":"Matthias Gerstner of SUSE"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A Externally Controlled Reference to a Resource in Another Sphere vulnerability in obs-service-download_files of openSUSE Open Build Service allows authenticated users to generate HTTP request against internal networks and potentially downloading data that is exposed there. This issue affects: openSUSE Open Build Service ."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-610: Externally Controlled Reference to a Resource in Another Sphere"}]}]},"references":{"reference_data":[{"name":"https://bugzilla.suse.com/show_bug.cgi?id=1107821","refsource":"CONFIRM","url":"https://bugzilla.suse.com/show_bug.cgi?id=1107821"}]},"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1107821","defect":["1107821"],"discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T08:38:06.001Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1107821"}]}]},"cveMetadata":{"assignerOrgId":"f81092c5-7f14-476d-80dc-24857f90be84","assignerShortName":"microfocus","cveId":"CVE-2018-12475","datePublished":"2020-09-01T11:55:11.943Z","dateReserved":"2018-06-15T00:00:00.000Z","dateUpdated":"2024-09-17T00:36:57.174Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}