{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-25650","assignerOrgId":"6786b568-6808-4982-b61f-398b0d9679eb","state":"PUBLISHED","assignerShortName":"zte","dateReserved":"2023-02-09T19:47:48.023Z","datePublished":"2023-12-14T06:52:23.199Z","dateUpdated":"2024-08-02T11:25:19.352Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows"],"product":"ZXCLOUD iRAI","vendor":"ZTE","versions":[{"lessThanOrEqual":"V7.23.23","status":"affected","version":"All versions up to V7.23.23","versionType":"V7.23.23"}]}],"datePublic":"2023-09-21T06:51:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">There is an arbitrary file download vulnerability in ZXCLOUD iRAI. Since the backend does not escape special strings or restrict paths, an attacker with user permission could access the download interface by modifying the request parameter, causing arbitrary file downloads.</span>\n\n"}],"value":"\nThere is an arbitrary file download vulnerability in ZXCLOUD iRAI. Since the backend does not escape special strings or restrict paths, an attacker with user permission could access the download interface by modifying the request parameter, causing arbitrary file downloads.\n\n"}],"impacts":[{"capecId":"CAPEC-1","descriptions":[{"lang":"en","value":"CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"6786b568-6808-4982-b61f-398b0d9679eb","shortName":"zte","dateUpdated":"2023-12-14T08:17:02.352Z"},"references":[{"url":"https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032904"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"ZXCLOUD iRAI V7.23.30<br>"}],"value":"ZXCLOUD iRAI V7.23.30\n"}],"source":{"discovery":"EXTERNAL"},"title":"Arbitrary File Download Vulnerability in ZTE ZXCLOUD iRAI","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T11:25:19.352Z"},"title":"CVE Program Container","references":[{"url":"https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032904","tags":["x_transferred"]}]}]}}