2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2013-0182" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2013-03-27T21:55:02.107" ,
2024-11-22 19:15:24 +00:00
"lastModified" : "2024-11-21T01:47:00.840" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Payment module 7.x-1.x before 7.x-1.3 for Drupal does not properly restrict access to payments, which allows remote attackers to read arbitrary payments."
} ,
{
"lang" : "es" ,
"value" : "El m\u00f3dulo de venta v7.x-1.x antes v7.x-1.3 para Drupal no restringe debidamente en el acceso a los pagos, lo que permite a atacantes remotos leer pagos arbitrarios."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-22 19:15:24 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-22 19:15:24 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.0:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C75CF26-CFAB-4673-B8CD-0A8B424EA4BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.0:alpha1:*:*:*:*:*" ,
"matchCriteriaId" : "0E0F7B95-E3EE-46D3-90EF-CAE9F8629738"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.0:alpha2:*:*:*:*:*" ,
"matchCriteriaId" : "C50731D2-C283-4C9F-A59F-3DB5CCBE504B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.0:alpha3:*:*:*:*:*" ,
"matchCriteriaId" : "3639D22E-9E4E-462C-B4C8-65F79945BD9C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.0:alpha4:*:*:*:*:*" ,
"matchCriteriaId" : "F9ED8E33-C021-48DE-8D8A-33122AE953EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.0:alpha5:*:*:*:*:*" ,
"matchCriteriaId" : "D55B7373-94C4-48C8-B0A8-EE6FE5A554E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.0:alpha6:*:*:*:*:*" ,
"matchCriteriaId" : "EFEC2557-0863-4DCE-A630-9B6BF6CD7107"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.0:beta1:*:*:*:*:*" ,
"matchCriteriaId" : "EBCDA8F0-A550-4DCD-B04F-641CB6A9D359"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.0:beta2:*:*:*:*:*" ,
"matchCriteriaId" : "78017416-B311-4E8E-962E-1D3FF7202B14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.0:beta3:*:*:*:*:*" ,
"matchCriteriaId" : "251909EB-2C24-45AF-A4EE-611CAEFF700B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.1:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A42E50C-D43C-417B-BE01-B8119B49CED5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.2:*:*:*:*:*:*" ,
"matchCriteriaId" : "50F447C3-07B6-4B0E-9222-2F8027CC6F97"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:bart_feenstra:payment:*:7.x-1.x:dev:*:*:*:*:*" ,
"matchCriteriaId" : "FB378573-8F37-4159-8CE3-8A2F6CA8B806"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8B1170D-AD33-4C7A-892D-63AC71B032CF"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://drupal.org/node/1871508" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://drupal.org/node/1883830" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://drupalcode.org/project/payment.git/commitdiff/62c9186" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2013/01/15/3" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://drupal.org/node/1884360" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-11-22 19:15:24 +00:00
} ,
{
"url" : "http://drupal.org/node/1871508" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://drupal.org/node/1883830" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://drupalcode.org/project/payment.git/commitdiff/62c9186" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2013/01/15/3" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://drupal.org/node/1884360" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}