cvelist/2010/1xxx/CVE-2010-1438.json
2019-03-18 06:30:51 +00:00

77 lines
3.0 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1438",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Web Application Finger Printer (WAFP) 0.01-26c3 uses fixed pathnames under /tmp for temporary files and directories, which (1) allows local users to cause a denial of service (application outage) by creating a file with a pathname that the product expects is available for its own internal use, (2) allows local users to overwrite arbitrary files via symlink attacks on certain files in /tmp, (3) might allow local users to delete arbitrary files and directories via a symlink attack on a directory under /tmp, and (4) might make it easier for local users to obtain sensitive information by reading files in a directory under /tmp, related to (a) lib/wafp_pidify.rb, (b) utils/generate_wafp_fingerprint.sh, (c) utils/online_update.sh, and (d) utils/extract_from_db.sh."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://code.google.com/p/webapplicationfingerprinter/issues/detail?id=8",
"refsource": "MISC",
"url": "http://code.google.com/p/webapplicationfingerprinter/issues/detail?id=8"
},
{
"name": "[oss-security] 20100427 Re: wafp insecure temporary directory",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/04/28/3"
},
{
"name": "39760",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39760"
},
{
"name": "[oss-security] 20100427 wafp insecure temporary directory",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/04/27/6"
}
]
}
}