Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf", "name": "https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf", "tags": ["Permissions Required", "Release Notes", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client", "name": "https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client", "tags": ["Permissions Required", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://airbus-seclab.github.io/advisories/netskope.html", "name": "https://airbus-seclab.github.io/advisories/netskope.html", "tags": ["Third Party Advisory"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from command injection vulnerability. Local users can use this vulnerability to execute code with NT\\SYSTEM privilege."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-78"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2019-12091", "ASSIGNER": "cert@airbus.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "acInsufInfo": false, "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}}, "publishedDate": "2019-09-26T16:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:netskope:netskope:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "60.2.0.214", "versionStartIncluding": "60"}, {"cpe23Uri": "cpe:2.3:a:netskope:netskope:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "57.2.0.219", "versionStartIncluding": "57"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2019-10-09T23:45Z"}