2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2008-2230" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2008-06-11T01:32:00.000" ,
2025-04-09 02:05:49 +00:00
"lastModified" : "2025-04-09T00:30:58.490" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Untrusted search path vulnerability in (1) reportbug 3.8 and 3.31, and (2) reportbug-ng before 0.2008.06.04, allows local users to execute arbitrary code via a malicious module file in the current working directory."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad en b\u00fasqueda de ruta no confiable en (1) reportbug 3.8 y 3.31 y (2) reportbug-ng anterior a 0.2008.06.04, permite a usuarios locales ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo de m\u00f3dulo malicioso en el directorio de trabajo actual."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 4.6 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : true ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-94"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug:3.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58B32764-8C17-4D56-80E4-43C7046A8C79"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug:3.31:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5E42098-0EBF-4282-BF8D-285B817E5DA7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB04ADD7-8C46-4284-88AA-6AFF67846294"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "93DA8567-B900-4F0A-B995-F9FDCA1EB285"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F259110-0A01-45DB-AED5-D877A3505AEC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "04F7172F-F7DA-4A1C-8B8C-8F5B2DA6CD55"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.15:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2B35282-12AD-4418-B45C-9EBA2E2BE575"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.17:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "430EF0FE-5D29-4F0B-B528-F7C86136046D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.19:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "19B505BE-93F1-4591-B02B-D72F1BA99729"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.19.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ADCB0ECD-657B-47F6-B5F9-DA0BB1644777"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7DC4DFD6-64EF-48FC-88F8-A44DCB53C684"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.24:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4E36FD5-2086-44D2-93FF-CC865E38C326"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F480F5C-6CE8-40FA-87D6-827F4A6CF972"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.28:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E1F5BAA6-3E83-44CA-BFBA-F11054E76537"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.03.29:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AAE37A6E-173D-4B02-9597-EB1A12E5A35A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.04.07:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A6095AA-F44F-4A12-BA53-E5B8A00663B6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.04.07.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3A669C41-2808-4198-8F6F-47554EF4FA38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.04.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FC5C4028-A892-43D4-88B3-6B03BE345FBC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.04.16:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9AB84ADB-0A98-41F4-9AA4-3664A4C12CA5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.04.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D083431-8CB2-4AC6-8B30-31CBF6815D03"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.04.23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8D5FD6C3-1937-4A5F-B080-691CF16D4F8E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.04.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "89A5AC0F-B6B2-43A4-BC1E-ABCC8AE42B6E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.05.02:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DDCD7001-7E60-404D-A656-520939553188"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.05.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D8DAF8A-3EE7-4F1C-81D8-7FEE379CA032"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.05.28:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "086EAEFD-7550-46FA-8A9D-9B58EA2CB582"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.05.31:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "035EF141-C35F-4BC5-B563-BECB9809E3C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.06.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E233020F-A830-4481-94C2-E9D890B57905"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.06.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1880EEBC-ECA7-4658-B24F-661A01C91285"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.07.08:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8AA0CD14-57B0-45DA-8B1E-E77642034972"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.07.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B12E555-1BFD-4FC4-BF03-A8D7198D3C44"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.07.18:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "27FDAA63-AFDF-4FAD-87D9-0C8AB4DDD89B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.07.19:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B88A5405-6AC3-45D1-8BD6-B8E3501D2B02"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.08.02:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1F802FAD-99D3-48F3-9D79-05139199E7E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.08.03:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A80F519-9F50-4B94-ACBA-85479473C321"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.08.03.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE7905C1-3FD3-4C2E-82C0-E7F8BE8186B9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.08.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E34B0D90-EE9F-4804-A6F5-62AB534386A9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.08.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "28C29F2E-305B-46AF-BE73-9E313B9BE749"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2007.10.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A0BB4C4-EAEE-4EBF-BE94-E8EC91A2D939"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2008.01.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1224A345-6C0A-4410-B206-E52F7E20E5D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2008.03.26:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "48DFC588-AFDF-47F1-A58E-DD50904AA98F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:reportbug-ng:reportbug-ng:0.2008.03.28:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AEF6881A-8C64-4893-938E-195C2B0CC0AE"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484311" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484474" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43001" ,
"source" : "cve@mitre.org"
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484311" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484474" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43001" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}