{ "id": "CVE-2009-4372", "sourceIdentifier": "cve@mitre.org", "published": "2009-12-21T16:30:00.717", "lastModified": "2017-08-17T01:31:33.883", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "AlienVault Open Source Security Information Management (OSSIM) 2.1.5, and possibly other versions before 2.1.5-4, allows remote attackers to execute arbitrary commands via shell metacharacters in the uniqueid parameter to (1) wcl.php, (2) storage_graphs.php, (3) storage_graphs2.php, (4) storage_graphs3.php, and (5) storage_graphs4.php in sem/." }, { "lang": "es", "value": "AlienVault Open Source Security Information Management (OSSIM) v2.1.5, y posiblemente otras versiones anteriores a v2.1.5-4, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n mediante metacaracteres del interprete de comandos en el par\u00e1metro \"uniqueid\" en (1) wcl.php, (2) storage_graphs.php, (3) storage_graphs2.php, (4) storage_graphs3.php, y (5) storage_graphs4.php en sem/." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC15D313-4971-429C-BE74-29D35830D87D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-1:*:*:*:*:*:*:*", "matchCriteriaId": "0FC3013D-06C7-4FEA-83B2-70CB6DDF4F64" }, { "vulnerable": true, "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-2:*:*:*:*:*:*:*", "matchCriteriaId": "4442E047-9A5B-4C26-95E9-D4B21477BB1B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-3:*:*:*:*:*:*:*", "matchCriteriaId": "A7DD2C75-EF88-4A2D-B086-864AE0E9673B" } ] } ] } ], "references": [ { "url": "http://www.alienvault.com/community.php?section=News", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.cybsec.com/vuln/OSSIM_2_1_5_Remote_Command_Execution.pdf", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.exploit-db.com/exploits/10480", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.securityfocus.com/bid/37375", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54843", "source": "cve@mitre.org" } ] }