124 lines
3.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-4219",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-14T11:03:00.000",
"lastModified": "2024-11-21T00:03:43.083",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "setting.php in Innovative CMS (ICMS, formerly Imoel-CMS) contains username and password information in cleartext, which might allow attackers to obtain this information via a direct request to setting.php. NOTE: on a properly configured web server, it would be expected that a .php file would be processed before content is returned to the user, so this might not be a vulnerability."
},
{
"lang": "es",
"value": "setting.php en Innovative CMS (ICMS, anteriormente Imoel-CMS) contiene informaci\u00f3n de nombres de usuario y contrase\u00f1as en texto claro, lo que podr\u00eda permitir a atacantes obtener esta informaci\u00f3n mediante una petici\u00f3n directa a settings.php.\r\nNOTA: en un servidor web apropiadamente configurado, ser\u00eda de esperar que un fichero .php sea procesado antes de que su contenido sea devuelto al usuario, de forma que esto podr\u00eda no ser una vulnerabilidad."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:innovative_cms:innovative_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4568845-8D54-48A8-BFB3-69321F32F204"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/250",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1015343",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/21766",
"source": "cve@mitre.org"
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.securityfocus.com/archive/1/419238/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/419500/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/250",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securitytracker.com/id?1015343",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/21766",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/419238/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/419500/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}