{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T09:47:06.754","vulnerabilities":[{"cve":{"id":"CVE-2017-20217","sourceIdentifier":"disclosure@vulncheck.com","published":"2026-03-16T14:17:51.090","lastModified":"2026-04-15T14:56:45.970","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Serviio PRO 1.8 contains an information disclosure vulnerability due to improper access control enforcement in the Configuration REST API that allows unauthenticated attackers to access sensitive information. Remote attackers can send specially crafted requests to the REST API endpoints to retrieve potentially sensitive configuration data without authentication."},{"lang":"es","value":"Serviio PRO 1.8 contiene una vulnerabilidad de revelación de información debido a una aplicación inadecuada del control de acceso en la API REST de configuración que permite a atacantes no autenticados acceder a información sensible. Atacantes remotos pueden enviar solicitudes especialmente diseñadas a los puntos finales de la API REST para recuperar datos de configuración potencialmente sensibles sin autenticación."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"disclosure@vulncheck.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"references":[{"url":"http://www.securitylab.ru/poc/486048.php","source":"disclosure@vulncheck.com"},{"url":"https://blogs.securiteam.com/index.php/archives/3094","source":"disclosure@vulncheck.com"},{"url":"https://cxsecurity.com/issue/WLB-2017050022","source":"disclosure@vulncheck.com"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/125646","source":"disclosure@vulncheck.com"},{"url":"https://packetstormsecurity.com/files/142383","source":"disclosure@vulncheck.com"},{"url":"https://www.exploit-db.com/exploits/41958/","source":"disclosure@vulncheck.com"},{"url":"https://www.vulncheck.com/advisories/serviio-pro-rest-api-information-disclosure","source":"disclosure@vulncheck.com"},{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5404.php","source":"disclosure@vulncheck.com"}]}}]}