- Description
- Template injection (Improper Neutralization of Special Elements Used in a Template Engine) vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to obtain an arbitrary file on the server via unspecified vectors.
- Source
- vultures@jpcert.or.jp
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
- nvd@nist.gov
- CWE-94
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9F010318-C88D-4F0D-9648-CD8CEE015D3B",
"versionEndExcluding": "2.8.75",
"versionStartIncluding": "2.8.0"
},
{
"criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A0320EBA-DACA-4E38-AAF7-BFB93414BECC",
"versionEndExcluding": "2.9.40",
"versionStartIncluding": "2.9.0"
},
{
"criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3D0763C8-A9C0-4A27-B4DF-456C4AF75D82",
"versionEndExcluding": "2.10.44",
"versionStartIncluding": "2.10.0"
},
{
"criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C92C05DD-EF1E-4CD2-9F4A-846DBC2C89A0",
"versionEndExcluding": "2.11.42",
"versionStartIncluding": "2.11.0"
},
{
"criteria": "cpe:2.3:a:appleple:a-blog_cms:3.0.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "521E93AF-17C4-4AB0-9FDA-9C997E74608A"
}
],
"operator": "OR"
}
]
}
]