192 lines
6.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2006-5750",
"sourceIdentifier": "secalert@redhat.com",
"published": "2006-11-27T20:07:00.000",
"lastModified": "2018-10-17T21:44:37.393",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en la clase JBoss Application Server (jbossas) 3.2.4 hasta 4.0.5 permite a usuarios remotos validados leer o modificar archivos y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n, a trav\u00e9s de vectores no especificados en el administrador de consola."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:3.2.5_final:*:*:*:*:*:*:*",
"matchCriteriaId": "9BA0BFE2-246F-4F9D-9698-23B7A453C627"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:3.2.6_final:*:*:*:*:*:*:*",
"matchCriteriaId": "5415149C-6EF9-4B94-ABDA-3F52B9A871E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:3.2.7_final:*:*:*:*:*:*:*",
"matchCriteriaId": "0A5BA730-1650-4CD6-8033-AE7B90F2242F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:3.2.8.sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "A496B6B5-C331-4354-9538-51704BC172A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:3.2.8_final:*:*:*:*:*:*:*",
"matchCriteriaId": "42EC3FC8-D370-4EA3-8FC5-CB8671A669B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:4.0.0_final:*:*:*:*:*:*:*",
"matchCriteriaId": "C467186E-74BB-4CC6-A4AA-144DA3A2B0C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:4.0.1_final:*:*:*:*:*:*:*",
"matchCriteriaId": "9D678E52-DEE5-4A77-9504-5E62F9A6E61A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:4.0.1_sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC7B567-CACB-4F07-BE1D-E7420060C4E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:4.0.2_final:*:*:*:*:*:*:*",
"matchCriteriaId": "8C763991-3D3C-40A9-ADA1-1BCD70491224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:4.0.3_final:*:*:*:*:*:*:*",
"matchCriteriaId": "3D381E62-7EBD-4F40-92B4-C967C82BBEBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:4.0.4.ga:*:*:*:*:*:*:*",
"matchCriteriaId": "B0F232BE-9181-4B28-B9ED-C947BCB754DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jboss:jboss_application_server:4.0.5.ga:*:*:*:*:*:*:*",
"matchCriteriaId": "2559DFD5-A230-467E-A720-7AE7FA9309CD"
}
]
}
]
}
],
"references": [
{
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402",
"source": "secalert@redhat.com"
},
{
"url": "http://jira.jboss.com/jira/browse/ASPATCH-126",
"source": "secalert@redhat.com"
},
{
"url": "http://jira.jboss.com/jira/browse/JBAS-3861",
"source": "secalert@redhat.com"
},
{
"url": "http://securitytracker.com/id?1017289",
"source": "secalert@redhat.com"
},
{
"url": "http://www.novell.com/linux/security/advisories/2007_02_sr.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2006-0743.html",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/archive/1/452830/100/0/threaded",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/archive/1/452862/100/100/threaded",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/21219",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/4724",
"source": "secalert@redhat.com"
},
{
"url": "http://www.vupen.com/english/advisories/2006/4726",
"source": "secalert@redhat.com"
},
{
"url": "http://www.vupen.com/english/advisories/2007/0554",
"source": "secalert@redhat.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1155/references",
"source": "secalert@redhat.com"
},
{
"url": "https://secure-support.novell.com/KanisaPlatform/Publishing/719/3024921_f.SAL_Public.html",
"source": "secalert@redhat.com"
}
]
}