2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-2077" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-06-16T19:30:00.267" ,
2024-11-22 09:15:19 +00:00
"lastModified" : "2024-11-21T01:04:04.583" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Drupal 6.x before 6.x-2.6, a module for Drupal, allows remote authenticated users to bypass access restrictions and (1) read unpublished content from anonymous users when a view is already configured to display the content, and (2) read private content in generated queries."
} ,
{
"lang" : "es" ,
"value" : "Drupal v6.x anteriores a v6.x-2.6, un modulo de Drupal, permite a usuarios autenticados evitar las restricciones de acceso y (1) leer contenido sin publicar de usuarios an\u00f3nimos cuando una vista esta configurada para mostrar contenido, y (2) leer contenido privado en peticiones generadas."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N" ,
2024-11-22 09:15:19 +00:00
"baseScore" : 4.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-22 09:15:19 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83414EC6-8EB7-4315-8CBD-4A636C2AA221"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:alpha1:*:*:*:*:*:*" ,
"matchCriteriaId" : "8AB72D39-36A0-45B3-B754-BE0586A70ED2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:alpha2:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF66A326-E339-42D3-B930-5F1BBC12EA30"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:alpha3:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2056B71-0789-4472-B777-E6D0D679ED73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:alpha4:*:*:*:*:*:*" ,
"matchCriteriaId" : "9FFE2EA1-46C4-43C2-8C0B-88D8F8459628"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:alpha5:*:*:*:*:*:*" ,
"matchCriteriaId" : "743C9847-4192-40CD-ADD2-261608E00BE7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "3342C5AC-6693-461D-9170-080AFF29E05F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "28B8A701-0DC1-4159-8A5C-4B100D1366A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "7B69E676-A056-4A03-893C-82F9648C6AD2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:beta4:*:*:*:*:*:*" ,
"matchCriteriaId" : "344B872A-6B72-45DA-A0D3-ED04EBF40AC4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2B1D17D-B06B-4801-AEBA-98B782AE18E9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "D11D3B74-4D1D-46A1-8EF3-C9CEA3E47C5C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "F567110E-A23C-42E8-9B76-1E872FCDC147"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:rc4:*:*:*:*:*:*" ,
"matchCriteriaId" : "47415DF9-80EB-4ACE-87A2-9B1FA4D3E772"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.0:rc5:*:*:*:*:*:*" ,
"matchCriteriaId" : "9F8DE5A9-38B3-4696-A141-D300FF68291B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "48806155-F591-49A7-8258-31E8B7E917D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9B376B96-3A17-446B-80AC-A6408120D950"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B36D36B-9EA4-441C-813C-8D99405B5F8D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "457E23F8-7961-410D-8E8A-030116889002"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "50F929B4-BBDA-4E83-98BF-A8F3650A7445"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:angrydonuts:views:6.x-2.x:dev:*:*:*:*:*:*" ,
"matchCriteriaId" : "9809F86C-3887-4922-9203-DB0CAAC03D03"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "799CA80B-F3FA-4183-A791-2071A7DA1E54"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://drupal.org/node/488068" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://drupal.org/node/488082" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/35425" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/bid/35304" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
2024-11-22 09:15:19 +00:00
} ,
{
"url" : "http://drupal.org/node/488068" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://drupal.org/node/488082" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/35425" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/35304" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
2023-04-24 12:24:31 +02:00
}
]
}