143 lines
4.4 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2007-6483",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-12-20T20:46:00.000",
"lastModified": "2018-10-15T21:54:33.507",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and possibly earlier versions, and Sentinel Keys Server 1.0.3 and possibly earlier versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the query string."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en SafeNet Sentinel Protection Server 7.0.0 hasta 7.4.0 y versiones anteriores, y Sentinel Keys Server 1.0.3 y posiblemente versiones anteriores, permite a atacantes remotos leer ficheros de su elecci\u00f3n mediante un .. (punto punto) en la cadena de consulta."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_keys_server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D766F1C-934F-407E-AEE5-BA1DD904E693"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "86733C86-4D91-47F9-AA69-1517EBD9185C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF9F0AF6-18BC-45F9-8D11-982BA9BB7FFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BCDE352B-1D4E-4EB9-9669-D62670FE45E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DCE6B275-B786-4BB2-97AA-B7918C30F301"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:safenet:sentinel_protection_server:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "17DBD0D0-57A9-4381-BE18-01D2E4FD97B6"
}
]
}
]
}
],
"references": [
{
"url": "http://safenet-inc.com/support/files/SPI740SecurityPatch.zip",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3471",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/484201/100/200/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/484224/100/200/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/26583",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1018992",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/4011",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38636",
"source": "cve@mitre.org"
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01",
"source": "cve@mitre.org"
}
]
}