mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
157 lines
5.8 KiB
JSON
157 lines
5.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2010-3692",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Directory traversal vulnerability in the callback function in client.php in phpCAS before 1.1.3, when proxy mode is enabled, allows remote attackers to create or overwrite arbitrary files via directory traversal sequences in a Proxy Granting Ticket IOU (PGTiou) parameter."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495542#82",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495542#82"
|
|
},
|
|
{
|
|
"name": "DSA-2172",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2011/dsa-2172"
|
|
},
|
|
{
|
|
"name": "https://issues.jasig.org/browse/PHPCAS-80",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://issues.jasig.org/browse/PHPCAS-80"
|
|
},
|
|
{
|
|
"name": "ADV-2011-0456",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2011/0456"
|
|
},
|
|
{
|
|
"name": "FEDORA-2010-15943",
|
|
"refsource": "FEDORA",
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049600.html"
|
|
},
|
|
{
|
|
"name": "FEDORA-2010-15970",
|
|
"refsource": "FEDORA",
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049602.html"
|
|
},
|
|
{
|
|
"name": "ADV-2010-2909",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2010/2909"
|
|
},
|
|
{
|
|
"name": "43585",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/43585"
|
|
},
|
|
{
|
|
"name": "42149",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/42149"
|
|
},
|
|
{
|
|
"name": "https://forge.indepnet.net/projects/glpi/repository/revisions/12601",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://forge.indepnet.net/projects/glpi/repository/revisions/12601"
|
|
},
|
|
{
|
|
"name": "ADV-2010-2705",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2010/2705"
|
|
},
|
|
{
|
|
"name": "43427",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/43427"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20100929 CVE request - phpCAS: prevent symlink attacks, directory traversal and XSS during a proxy callback",
|
|
"refsource": "MLIST",
|
|
"url": "http://www.openwall.com/lists/oss-security/2010/09/29/6"
|
|
},
|
|
{
|
|
"name": "FEDORA-2010-16912",
|
|
"refsource": "FEDORA",
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html"
|
|
},
|
|
{
|
|
"name": "https://developer.jasig.org/source/changelog/jasigsvn?cs=21538",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://developer.jasig.org/source/changelog/jasigsvn?cs=21538"
|
|
},
|
|
{
|
|
"name": "FEDORA-2010-16905",
|
|
"refsource": "FEDORA",
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html"
|
|
},
|
|
{
|
|
"name": "41878",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/41878"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20101001 Re: CVE request - phpCAS: prevent symlink attacks, directory traversal and XSS during a proxy callback",
|
|
"refsource": "MLIST",
|
|
"url": "http://www.openwall.com/lists/oss-security/2010/10/01/5"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20101001 Re: CVE request - phpCAS: prevent symlink attacks, directory traversal and XSS during a proxy callback",
|
|
"refsource": "MLIST",
|
|
"url": "http://www.openwall.com/lists/oss-security/2010/10/01/2"
|
|
},
|
|
{
|
|
"name": "42184",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/42184"
|
|
}
|
|
]
|
|
}
|
|
} |