2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-7317" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2017-09-25T17:29:00.633" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T02:36:34.670" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Kupu 3.3.0 through 3.3.6, 4.0.0 through 4.0.10, 4.1.0 through 4.1.6, and 4.2.0 through 4.2.7 allows remote authenticated users to edit Kupu settings."
} ,
{
"lang" : "es" ,
"value" : "Kupu desde la versi\u00f3n 3.3.0 hasta la versi\u00f3n 3.3.6, desde la 4.0.0 hasta la 4.0.10, desde la 4.1.0 hasta la versi\u00f3n 4.1.6 y desde la 4.2.0 hasta la versi\u00f3n 4.2.7 permite que los usuarios autenticados remotos editen la configuraci\u00f3n de Kupu."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.8 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.6 ,
"impactScore" : 5.2
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:S/C:P/I:P/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.9 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 6.8 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:kupu_project:kupu:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.4.16" ,
"matchCriteriaId" : "05664B32-3887-4FD8-A5CA-2CFEBA022AE3"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FDC93803-6506-4382-A013-18010EE7E06B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E65977FD-A880-4D16-B56B-94A72774F42D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4EA5B4F8-2155-403D-97D8-1272285D508B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A3CA2943-77E5-4384-A019-415BBCE62F94"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B7FF63F6-F1DC-4A97-A2E6-11CF613A31E8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "538A3519-5B04-4FE5-A3C0-FD26EFA32705"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:3.3.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "858CBC5A-C241-475C-8125-C5EA351B12A7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F3306D84-0F5B-46BA-9BCC-DCD0A1CDD604"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E08F4534-A588-463F-A745-39E559AB1CB8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B64341BA-5722-415E-9771-9837168AB7C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2929227-AE19-428D-9AC3-D312A559039B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B6DC866-0FEE-475B-855C-A69E004810CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "50BF3E8E-152C-4E89-BAA2-A952D10F4611"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49DB97A7-89DD-43C0-A490-84AA7069764B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1F88BF6-9058-4CB8-A2D6-5653860CF489"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B2AA3FA2-15C3-444A-8810-5EF3E0E84D58"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72F3B15A-CD0F-4CC5-A76F-E62637B30E2E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.0.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D913FCA7-4DAE-4E9A-9146-9AFA8472B04B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7C44B53B-953B-4522-A5B4-11573850D2CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8883023-113A-420A-97B6-A4A9B29CF7DB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4DF4D113-8D9D-4DA3-A177-64783352F608"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "28F9B699-D1A4-425C-84ED-6A8FD29BE7F8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47321B60-67DA-4543-B173-D629A9569B45"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58B36EB2-723F-4E25-8018-EEB2BE806D9D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7962EF74-6AC1-424C-A202-163AFDADA971"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1F1818BB-E23A-4136-898D-1D0C80C08728"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5CB06627-133A-40D1-8816-E31E0A9BAD22"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE7E448A-2C0C-4DE0-89EA-904718CB6C6D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6E727C5C-9E54-49F7-B92C-2492069AAE08"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BFD68465-4CDC-4788-8932-41335B5C4AC8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A7B739E0-FB73-401C-AB1A-E3C1434AA2A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DCC8B987-5173-4C61-8DE6-B70C18EE6FD3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "38BA31E8-77EC-478B-BC6E-E2F145A8B9BD"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.openwall.com/lists/oss-security/2015/09/22/15" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1264799" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://plone.org/security/hotfix/20150910" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://plone.org/security/hotfix/20150910/privilege-escalation-in-kupu" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2015/09/22/15" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1264799" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://plone.org/security/hotfix/20150910" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://plone.org/security/hotfix/20150910/privilege-escalation-in-kupu" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}