186 lines
5.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2008-0466",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-01-29T00:00:00.000",
"lastModified": "2025-04-09T00:30:58.490",
"vulnStatus": "Deferred",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Web Wiz RTE_file_browser.asp in, as used in Web Wiz Rich Text Editor 4.0, Web Wiz Forums 9.07, and Web Wiz Newspad 1.02, does not require authentication, which allows remote attackers to list directories and read files. NOTE: this can be leveraged for listings outside the configured directory tree by exploiting a separate directory traversal vulnerability."
},
{
"lang": "es",
"value": "El archivo RTE_file_browser.asp en Web Wiz, como es usado en Web Wiz Rich Text Editor versi\u00f3n 4.0, Web Wiz Forums versi\u00f3n 9.07 y Web Wiz Newspad versi\u00f3n 1.02, no requiere autenticaci\u00f3n, lo que permite a atacantes remotos enumerar directorios y leer archivos. NOTA: esto puede ser aprovechado para listados fuera del \u00e1rbol de directorios configurado explotando una vulnerabilidad de salto de directorio separada"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webwiz:web_wiz_forums:9.07:*:*:*:*:*:*:*",
"matchCriteriaId": "67D078BB-71D4-4182-B733-4EAE579CB949"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webwiz:web_wiz_newspad:1.02:*:*:*:*:*:*:*",
"matchCriteriaId": "FA2DDB39-D5DA-4696-BBA8-D7CDE2620949"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webwiz:web_wiz_rich_text_editor:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "069C4645-7B6A-430A-89ED-7BB24286FE52"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/3584",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1019267",
"source": "cve@mitre.org"
},
{
"url": "http://www.bugreport.ir/?/29",
"source": "cve@mitre.org"
},
{
"url": "http://www.bugreport.ir/?/31",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/486866/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/486868/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/27419",
"source": "cve@mitre.org"
},
{
"url": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/4970",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/4971",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3584",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securitytracker.com/id?1019267",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.bugreport.ir/?/29",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.bugreport.ir/?/31",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/486866/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/486868/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/27419",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.exploit-db.com/exploits/4970",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.exploit-db.com/exploits/4971",
"source": "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}