2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-3447" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-09-29T15:30:00.420" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:07:22.607" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Unrestricted file upload vulnerability in RADactive I-Load before 2008.2.5.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, and then sending a request for a predictable filename during a short time window."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad de subida de archivos sin restricci\u00f3n en RADactive I-Load anterior a v2008.2.5.0 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s subiendo un fichero con una extensi\u00f3n ejecutable, y enviando una petici\u00f3n a un fichero predecible durante una ventana de corta duraci\u00f3n."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 6.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-362"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2008.2.4.0" ,
"matchCriteriaId" : "4F139A75-38DA-423B-BF6A-0F72D289C3FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE74540D-CEF8-4D69-9B5C-EF65AB75297E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.6.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3D9C87F5-72A5-4067-88B3-AF93063D299E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.6.3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "013704F2-FE79-4576-8A9B-5BF8F57B64B2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.6.3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5482B06C-8E4E-46CD-B828-33BB9A535EEF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D7C075F-0A1B-4216-B32C-B95CD73442E4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3E66E491-7785-4371-AE45-DA957D48DC3B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E1B949F-5984-4726-B0AA-901A7C9B82C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F93132F-BD03-4731-9EBF-607F0C1E2CD8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "73C8F452-D278-4B4D-9C35-BF993894DF19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A99B631-3142-413E-A00E-2A914A941A73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD79EE0A-1603-43C3-BD22-3D3E6E3A542B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10AC750D-2FD5-40B2-807E-3A7693FAB4C5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A765BE3-9BE1-46B1-8C9C-A274D8AFBEC5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C06A2416-1CD5-4F22-AD19-FADFE6D94997"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A30F2246-03AB-4A99-B2CB-2B116F70F7B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "508A871B-64F7-411E-9911-95E51D070D6B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.0.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "556A339D-308F-4B16-8080-2756CC4225FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "54F277DA-2B18-4CFF-8C0B-03D8B226982D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "88B1BC55-4481-4B17-8137-C65D5F4BD651"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D573A940-3848-4653-B92A-3D0CA07962E6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4AE4CC98-79E6-4F92-86D8-31902D071556"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5222097B-5239-4545-BBC8-9EEDA96372F9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "574A108B-091A-4061-88A0-3A4AC75737DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "344775B7-18C6-4689-A513-C9A9E2F0B7DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C348E59F-085B-481D-A18F-CD9F20AE31F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "32BBAACD-9D5B-4160-9266-D2C31C19990F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4EF467CB-26D0-49C8-B0D5-20089E907FA5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.7.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "01F0EDCD-B278-4B01-9048-5C316AB156AA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E72C34E7-9E2E-4EB8-B942-9314444A4F9D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.7.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "55656D0E-1017-4C5A-BDC4-1182A744035E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.7.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B83A4E9F-9188-438B-BA04-293460EAAA7D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:1.7.7.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9F9EFA57-7AB4-4662-94CC-902C71546D12"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.1.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C02639B-16A5-499A-959C-7BA9DC1696D2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.1.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9F506BE-4540-4419-866C-70D67F9B5A9B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.1.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "727B9CEA-AE45-4839-83A5-36D845823D84"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.1.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "90FBD2D6-A917-4BBF-A215-4B61056EF5CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.1.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D97E6B5-22B8-47F4-9C4B-61EB3E82FAD1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.1.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5FCA880C-7A43-42F0-B918-708A52301E58"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.1.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A88B8238-3B59-4005-9368-707F0AD6DD2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.2.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8B881471-9471-4C0C-8075-C13039237850"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.2.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "65A4543A-1774-4DD2-B7CA-59B373D9A285"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.2.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "302B973C-E014-4A4E-8F5D-558A18DF806E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.2.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "380F947D-2B8A-4768-B1F4-B04F6CC1E855"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.2.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E93F09B9-FD14-4ABE-A650-1CAE4727FE90"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:radactive:i-load:2008.2.3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "221D2428-6648-4B8D-8C38-68ED6480748A"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://radnet.radactive.com/forum/Default.aspx?g=posts&t=339" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/23807" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.osvdb.org/58197" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/archive/1/506555/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.sec-consult.com/files/20090917-0_RADactive_I-Load_Multiple_Vulnerabilities.txt" ,
"source" : "cve@mitre.org"
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://radnet.radactive.com/forum/Default.aspx?g=posts&t=339" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/23807" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.osvdb.org/58197" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/506555/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.sec-consult.com/files/20090917-0_RADactive_I-Load_Multiple_Vulnerabilities.txt" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}