99 lines
3.9 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2007-1849",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-04-03T16:19:00.000",
"lastModified": "2017-07-29T01:31:03.157",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in 404.php in Drake CMS allows remote attackers to include and execute arbitrary local arbitrary files via a .. (dot dot) in the d_private parameter. NOTE: some of these details are obtained from third party information. NOTE: Drake CMS has only a beta version available, and the vendor has previously stated \"We do not consider security reports valid until the first official release of Drake CMS.\""
},
{
"lang": "es",
"value": "Vulnerabilidad de escalado de directorio en el 404.php del Drake CMS permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n mediante la inclusi\u00f3n de .. (punto punto) en el par\u00e1metro d_private. NOTA: algunos de los detalles se obtienen a partir de la informaci\u00f3n de terceros. NOTA: Drake CMS s\u00f3lo tiene disponible una versi\u00f3n beta y el proveedor ha indicado previamente \"No se van a considerar reportes de seguridad v\u00e1lidos hasta la primera versi\u00f3n oficial del Drake CMS\"."
}
],
"vendorComments": [
{
"organization": "Drake CMS",
"comment": "An apposite mailing list\n(drakecms-security@lists.sourceforge.net) has been created to discuss all publicly disclosed security reports (mostly from National Vulnerability Database and Security Focus); for the valid security reports temporary solutions will be offered even before the official patch release. Specific patches will be released for all critical vulnerabilities (available through the automatic update feature).\n\nThis vulnerability has been fixed in Drake CMS v0.3.8 Beta, previous versions\u2019 users can update their software directly from the administrative backend.",
"lastModified": "2007-04-17T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drake_team:drake_cms:0.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7A605E0F-C5F3-4E2C-8DAE-63B52C60C67B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drake_team:drake_cms:0.3.7_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "61285E3A-BB8E-4506-99EE-D95312DB8B96"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/464272",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/23215",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33331",
"source": "cve@mitre.org"
}
]
}