{ "id": "CVE-2006-6974", "sourceIdentifier": "cve@mitre.org", "published": "2007-02-07T20:28:00.000", "lastModified": "2024-11-21T00:24:05.263", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Headstart Solutions DeskPRO stores sensitive information under the web root with insufficient access control, which allows remote attackers to (1) list files in the includes/ directory; obtain the SQL username and password via a direct request for (2) config.php and (3) config.php.bak in includes/; read files in (4) email/, (5) admin/graphs/, (6) includes/javascript/, and (7) certain other includes/ directories via direct requests; and download SQL database data via direct requests for (8) data.sql, (9) install.sql, (10) settings.sql, and possibly other files in install/v2data/." }, { "lang": "es", "value": "Headstart Solutions DeskPRO almacena informaci\u00f3n sensible bajo el directorio ra\u00edz del web, con insuficiente control de acceso, lo que permite a atacantes remotos (1) listar ficheros en el directorio includes/; obtener el nombre de usuario SQL y la contrase\u00f1a mediante una petici\u00f3n directa al (2) config.php y (3) config.php.bak del includes/; leer ficherosen (4) email/, (5) admin/graphs/, (6) includes/javascript/ y (7) otros directorios includes/ mediante peticiones directas; y la descarga de datos de la Base de Datos SQL mediante peticiones directas al (8) data.sql, (9) install.sql, (10) settings.sql y posiblemente otros ficheros en el install/v2data/." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:headstart_solutions:deskpro:*:*:*:*:*:*:*:*", "matchCriteriaId": "69180821-8707-49DE-B919-B9602C4E3A3C" } ] } ] } ], "references": [ { "url": "http://www.zion-security.com/text/Mul_Vulnerability_DeskPro.txt", "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "http://www.zion-security.com/text/Mul_Vulnerability_DeskPro.txt", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ] } ] }