ID: CVE-2014-0632

Last Modified: Oct. 13, 2015

Directory traversal vulnerability in EMC VPLEX GeoSynchrony 4.x and 5.x before 5.3 allows remote authenticated users to execute arbitrary code via unspecified vectors.

Access Vector: Network

Access Complexity: Low

Authentication: Single

Confidentiality Impact: Complete

Integrity Impact: Complete

Availability Impact: Complete

Base Score: 9.0

Exploitability Score: 8.0

Impact Score: 10.0

CVSS V2: AV:N/AC:L/Au:S/C:C/I:C/A:C

Specialize CVSS-Score

CWE-22

Condition Configuration
OR
OR
Alle Schwachstellen für emc
Alle Schwachstellen für emc
Alle Schwachstellen für emc
Alle Schwachstellen für emc
Alle Schwachstellen für emc
                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:emc:vplex_geosynchrony:5.0:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:emc:vplex_geosynchrony:5.1:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:emc:vplex_geosynchrony:5.2:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:emc:vplex_geosynchrony:4.0:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:emc:vplex_geosynchrony:5.2.1:*:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
    <prop key="range" value="remote"/>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <prop key="target" value="host"/>
    <set operator="or">
        <prop key="program_influence" value="input"/>
        <prop key="program_influence" value="output"/>
        <prop key="program_influence" value="existence"/>
    </set>
    <prop key="data" value="any"/>
    <set operator="or">
        <prop key="data_influence" value="read"/>
        <prop key="data_influence" value="write"/>
        <prop key="data_influence" value="delete"/>
    </set>
    <set operator="or">
        <prop key="range" value="remote"/>
        <prop key="range" value="local"/>
    </set>
</set>