{ "id": "CVE-2015-7231", "sourceIdentifier": "cve@mitre.org", "published": "2015-09-17T16:59:10.667", "lastModified": "2015-09-22T00:20:21.373", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Commerce Commonwealth (CBA) module 7.x-1.x before 7.x-1.5 for Drupal does not properly validate payments, which allows remote attackers to make a failed payment appear valid via a crafted URL, related to a \"response from commweb.\"" }, { "lang": "es", "value": "Vulnerabilidad en el m\u00f3dulo Commerce Commonwealth (CBA) 7.x-1.x en versiones anteriores a 7.x-1.5 para Drupal, no valida adecuadamente los pagos, lo que permite a atacantes remotos hacer que un pago fallido parezca v\u00e1lido a trav\u00e9s de una URL manipulada, relacionado con un 'response from commweb'." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:drupalcommerce:commerce_commonwealth:7.x-1.0:*:*:*:*:drupal:*:*", "matchCriteriaId": "92676E12-8533-474C-9DC0-2429C8B9EF5B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupalcommerce:commerce_commonwealth:7.x-1.1:*:*:*:*:drupal:*:*", "matchCriteriaId": "9D03B6FB-72CE-4286-BB61-D3375831A36F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupalcommerce:commerce_commonwealth:7.x-1.2:*:*:*:*:drupal:*:*", "matchCriteriaId": "972E031A-9A62-4316-AF6E-04FBF77BF6C2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupalcommerce:commerce_commonwealth:7.x-1.3:*:*:*:*:drupal:*:*", "matchCriteriaId": "DBDDB9F4-334B-482A-8B22-29B1B6E45836" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupalcommerce:commerce_commonwealth:7.x-1.4:*:*:*:*:drupal:*:*", "matchCriteriaId": "9CE9A536-5E8A-405F-9B15-D317BD897C09" } ] } ] } ], "references": [ { "url": "https://www.drupal.org/node/2541832", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "https://www.drupal.org/node/2542380", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] } ] }