CVE-2018-8495 (CNNVD-201810-301)
HIGH
中文标题:
Microsoft Windows Shell 路径遍历漏洞
英文标题:
A remote code execution vulnerability exists when Windows Shell improperly handles URIs, aka "Window...
CVSS分数:
7.5
发布时间:
2018-10-10 13:00:00
漏洞类型:
路径遍历
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
Microsoft Windows 10等都是美国微软(Microsoft)公司发布的一系列操作系统。Windows Shell是一个Windows系统下与用户交互的界面,它允许用户执行公共的任务,如访问文件系统、导出执行程序和改变系统设置等。 Microsoft Windows Shell中存在远程代码执行漏洞,该漏洞源于程序没有正确地处理URLs。远程攻击者可借助特制的网站利用该漏洞在当前用户的上下文中执行任意代码。以下系统版本受到影响:Microsoft Windows 10版本1607,Windows 10版本1703,Windows 10版本1709,Windows 10版本1803,Windows Server 2016,Windows Server版本1709,Windows Server版本1803。
英文描述:
A remote code execution vulnerability exists when Windows Shell improperly handles URIs, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
CWE类型:
CWE-22
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Microsoft | Windows Server 2016 | (Server Core installation) | - | - |
cpe:2.3:a:microsoft:windows_server_2016:(server_core_installation):*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1607 for 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1607_for_32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1607 for x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1607_for_x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1703 for 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1703_for_32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1703 for x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1703_for_x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1709 for 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1709_for_32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1709 for x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1709_for_x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1803 for 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1803_for_32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1803 for x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1803_for_x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Servers | version 1709 (Server Core Installation) | - | - |
cpe:2.3:a:microsoft:windows_10_servers:version_1709__(server_core_installation):*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Servers | version 1803 (Server Core Installation) | - | - |
cpe:2.3:a:microsoft:windows_10_servers:version_1803__(server_core_installation):*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1607 | - | - |
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1703 | - | - |
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1709 | - | - |
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1803 | - | - |
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | 1709 | - | - |
cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | 1803 | - | - |
cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
CVSS评分详情
7.5
HIGH
CVSS向量:
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS版本:
3.0
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2018-10-10 13:00:00
修改时间:
2024-08-05 06:54:36
创建时间:
2025-11-11 15:35:22
更新时间:
2025-11-11 15:54:04
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2018-8495 |
2025-11-11 15:19:55 | 2025-11-11 07:35:22 |
| NVD | nvd_CVE-2018-8495 |
2025-11-11 14:55:59 | 2025-11-11 07:43:56 |
| CNNVD | cnnvd_CNNVD-201810-301 |
2025-11-11 15:10:06 | 2025-11-11 07:54:04 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:54:04
vulnerability_type: 未提取 → 路径遍历; cnnvd_id: 未提取 → CNNVD-201810-301; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 路径遍历
- cnnvd_id: 未提取 -> CNNVD-201810-301
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:43:56
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 11 → 18; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 11 -> 18
- data_sources: ['cve'] -> ['cve', 'nvd']