{ "id": "CVE-2008-0577", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-05T02:00:00.000", "lastModified": "2024-11-21T00:42:25.547", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Project Issue Tracking module 5.x-2.x-dev before 20080130 in the 5.x-2.x series, 5.x-1.2 and earlier in the 5.x-1.x series, 4.7.x-2.6 and earlier in the 4.7.x-2.x series, and 4.7.x-1.6 and earlier in the 4.7.x-1.x series for Drupal (1) does not restrict the extensions of attached files when the Upload module is enabled for issue nodes, which allows remote attackers to upload and possibly execute arbitrary files; and (2) accepts the .html extension within the bundled file-upload functionality, which allows remote attackers to upload files containing arbitrary web script or HTML." }, { "lang": "es", "value": "El m\u00f3dulo Project Issue Tracking 5.x-2.x-dev antes del 2008-01-30 en las series 5.x-2.x, 5.x-1.2 y anteriores, en las series 5.x-1.x, 4.7.x-2.6 y anteriores, en las series 4.7.x-2.x, y 4.7.x-1.6 y anteriores en las series 4.7.x-1.x para Drupal. (1) No restringe las extensiones de archivos adjuntos cuando el m\u00f3dulo Upload (actualizar) est\u00e1 activado para nodos issue (emitidos), lo que permite a atacantes remotos actualizar y posiblemente ejecutar archivos arbitrarios; y (2) acepta la extensi\u00f3n .html dentro de la funcionalidad de actualizaci\u00f3n de archivos empaquetados, lo que permite a atacantes remotos actualizar archivos que contengan scripts web o HTMLs arbitrarios." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-264" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:project_issue_tracking_module:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "80E74B2F-1EB1-462D-B970-339C8817C229" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:project_issue_tracking_module:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2206A14-1C6A-4762-8E3A-0A75C6F30836" } ] } ] } ], "references": [ { "url": "http://drupal.org/node/216063", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/28731", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2008/0376/references", "source": "cve@mitre.org" }, { "url": "http://drupal.org/node/216063", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/28731", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2008/0376/references", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }