Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://docs.bmc.com/docs/itsm90/export-and-import-repository-509983929.html", "name": "https://docs.bmc.com/docs/itsm90/export-and-import-repository-509983929.html", "tags": ["Product"], "refsource": "MISC"}, {"url": "http://seclists.org/fulldisclosure/2019/Dec/7", "name": "http://seclists.org/fulldisclosure/2019/Dec/7", "tags": ["Exploit", "Mailing List", "Third Party Advisory"], "refsource": "MISC"}, {"url": "http://packetstormsecurity.com/files/155552/BMC-Smart-Reporting-7.3-20180418-XML-Injection.html", "name": "http://packetstormsecurity.com/files/155552/BMC-Smart-Reporting-7.3-20180418-XML-Injection.html", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "BMC Smart Reporting 7.3 20180418 allows authenticated XXE within the import functionality. One can import a malicious XML file and perform XXE attacks to download local files from the server, or do DoS attacks with XML expansion attacks. XXE with direct response and XXE OOB are allowed."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-611"}, {"lang": "en", "value": "CWE-434"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2019-11216", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "authentication": "SINGLE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 4.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.2, "exploitabilityScore": 1.2}}, "publishedDate": "2019-12-04T20:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:bmc:remedy_smart_reporting:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.1.03.001", "versionStartIncluding": "9.1.03"}, {"cpe23Uri": "cpe:2.3:a:bmc:remedy_smart_reporting:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.1.04.002", "versionStartIncluding": "9.1.04"}, {"cpe23Uri": "cpe:2.3:a:bmc:remedy_smart_reporting:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "18.05.05", "versionStartIncluding": "18.05"}, {"cpe23Uri": "cpe:2.3:a:bmc:remedy_smart_reporting:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "19.02.01", "versionStartIncluding": "19.02"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2019-12-13T21:37Z"}