141 lines
4.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2006-5258",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-10-12T22:07:00.000",
"lastModified": "2011-06-13T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The spell checking component of (1) Asbru Web Content Management before 6.1.22, (2) Asbru Web Content Editor before 6.0.22, and (3) Asbru Website Manager before 6.0.22 allows remote attackers to execute arbitrary commands via an unspecified parameter that is not sanitized before Aspell is invoked."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en la comprobaci\u00f3n ortogr\u00e1fica de (1) Asbru Web Content Management versiones anteriores a 6.1.22, (2) Asbry Web Content Editor anterior a 6.0.22, y (3) Asbry Website Manager anterior a 6.0.22 permite a atacantes remotos ejecutar comandos de su elecci\u00f3n mediante un par\u00e1metro no especificado que no se limpia antes de que se invoque a Aspell."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asbru_software:asbru_web_content_management:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.1.20",
"matchCriteriaId": "DC5E064E-BF03-43C4-BCE9-D297F2AD3FF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asbru_software:asbru_web_content_management:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036B68FB-C72F-4796-80DC-742E1D15E4EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asbru_software:asbru_web_content_management:6.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "25652B15-502A-4F05-9032-A1D0624ADEA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asbru_software:asbru_web_content_management:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D1FF9CE0-7FBC-47CE-8D84-CDB9F2C5C74A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asbru_software:asbru_web_content_management:6.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "602B6F63-97FF-4288-8764-D47D19C3B79B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asbru_software:asbru_website_manager:6.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "08E0A460-41A8-47C9-9823-995D9714716E"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0306.html",
"source": "cve@mitre.org"
},
{
"url": "http://editor.asbrusoft.com/page.php/id=727",
"source": "cve@mitre.org"
},
{
"url": "http://wcm.asbrusoft.com/page.php/id=791",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/20544",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/4004",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/4060",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/4061",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}