133 lines
4.0 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2006-3936",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-07-31T22:04:00.000",
"lastModified": "2018-10-17T21:32:25.893",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "system/workplace/editors/editor.jsp in Alkacon OpenCms before 6.2.2 allows remote authenticated users to read the source code of arbitrary JSP files by specifying the file in the resource parameter, as demonstrated using index.jsp."
},
{
"lang": "es",
"value": "system/workplace/editors/editor.jsp en Alkacon OpenCms anterior a 6.2.2 permite a usuarios remotos autenticados leer el c\u00f3digo fuente de ficheros JSP de su elecci\u00f3n especificando el fichero en el par\u00e1metro resource, como ha sido demostrado usando index.jsp."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alkacon:opencms:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8369451E-7C00-4CC3-9B80-871559E3F59E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alkacon:opencms:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4F9A11-BF2F-4C12-AE12-480EE547DD8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alkacon:opencms:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "35A4931F-1EA7-48E5-B369-FA013FB87D12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alkacon:opencms:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "72D23BDD-8C14-44B4-83C3-26F4F35526A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alkacon:opencms:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "16F73D28-272C-4271-BDA1-ACCFA3F8EEDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alkacon:opencms:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A26A8441-4BB4-423A-99D7-79D2537A91DD"
}
]
}
]
}
],
"references": [
{
"url": "http://o0o.nu/~meder/OpenCMS_multiple_vulnerabilities.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://securityreason.com/securityalert/1302",
"source": "cve@mitre.org"
},
{
"url": "http://www.opencms.org/export/download/opencms/opencms_6.2.2_src.zip",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.opencms.org/opencms/en/shownews.html?id=1002",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/archive/1/441182/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28001",
"source": "cve@mitre.org"
}
]
}