{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T12:05:28.214","vulnerabilities":[{"cve":{"id":"CVE-2017-14323","sourceIdentifier":"cve@mitre.org","published":"2018-04-10T15:29:01.080","lastModified":"2024-11-21T03:12:33.580","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SSRF (Server Side Request Forgery) in getRemoteImage.php in Ueditor in Onethink V1.0 and V1.1 allows remote attackers to obtain sensitive information, attack intranet hosts, or possibly trigger remote command execution via the upfile parameter."},{"lang":"es","value":"SSRF (Server Side Request Forgery) en getRemoteImage.php en Ueditor en Onethink V1.0 y V1.1 permite que atacantes remotos obtengan información sensible, ataquen hosts de la intranet o desencadenen la ejecución de comandos remotos mediante el parámetro upfile."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:onethink:onethink:1.0:*:*:*:*:*:*:*","matchCriteriaId":"A00DF0F2-182A-4AB4-A287-18D1AC29DFBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:onethink:onethink:1.1:*:*:*:*:*:*:*","matchCriteriaId":"119125BC-9E3E-470E-88C8-4C653FB5AD3C"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2018/Apr/16","source":"cve@mitre.org","tags":["Exploit","Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2018/Apr/16","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mailing List","Third Party Advisory"]}]}}]}