{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1163","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-03T06:49:31.511Z","datePublished":"2023-03-03T06:49:59.427Z","dateUpdated":"2024-08-02T05:40:57.970Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-11-22T20:43:38.299Z"},"title":"DrayTek Vigor 2960 Web Management Interface mainfunction.cgi getSyslogFile path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"CWE-22 Path Traversal"}]}],"affected":[{"vendor":"DrayTek","product":"Vigor 2960","versions":[{"version":"1.5.1.4","status":"affected"},{"version":"1.5.1.5","status":"affected"}],"modules":["Web Management Interface"]}],"descriptions":[{"lang":"en","value":"** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5 and classified as critical. Affected by this vulnerability is the function getSyslogFile of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument option leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222259. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"In DrayTek Vigor 2960 1.5.1.4/1.5.1.5 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es die Funktion getSyslogFile der Datei mainfunction.cgi der Komponente Web Management Interface. Durch Manipulation des Arguments option mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N"}}],"timeline":[{"time":"2023-02-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-02-25T00:00:00.000Z","lang":"en","value":"Exploit disclosed"},{"time":"2023-03-03T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-03T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-11-22T21:46:41.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Tmotfl (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.222259","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.222259","tags":["signature","permissions-required"]},{"url":"https://github.com/xxy1126/Vuln/blob/main/Draytek/3.md","tags":["exploit"]}],"tags":["unsupported-when-assigned"]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:40:57.970Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.222259","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.222259","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/xxy1126/Vuln/blob/main/Draytek/3.md","tags":["exploit","x_transferred"]}]}]}}