Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://roundcube.net/news/2017/04/28/security-updates-1.2.5-1.1.9-and-1.0.11", "name": "https://roundcube.net/news/2017/04/28/security-updates-1.2.5-1.1.9-and-1.0.11", "tags": ["Release Notes", "Vendor Advisory"], "refsource": "MISC"}, {"url": "https://github.com/ilsani/rd/tree/master/security-advisories/web/roundcube/cve-2017-8114", "name": "https://github.com/ilsani/rd/tree/master/security-advisories/web/roundcube/cve-2017-8114", "tags": ["Exploit", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://security.gentoo.org/glsa/201707-11", "name": "GLSA-201707-11", "tags": ["Third Party Advisory"], "refsource": "GENTOO"}, {"url": "http://www.securityfocus.com/bid/98445", "name": "98445", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Roundcube Webmail allows arbitrary password resets by authenticated users. This affects versions before 1.0.11, 1.1.x before 1.1.9, and 1.2.x before 1.2.5. The problem is caused by an improperly restricted exec call in the virtualmin and sasl drivers of the password plugin."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-269"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2017-8114", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}}, "publishedDate": "2017-04-29T19:59Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.0.11"}, {"cpe23Uri": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.1.9", "versionStartIncluding": "1.1.0"}, {"cpe23Uri": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.2.5", "versionStartIncluding": "1.2.0"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2022-09-27T18:16Z"}