{ "id": "CVE-2008-4358", "sourceIdentifier": "cve@mitre.org", "published": "2008-09-30T18:15:08.890", "lastModified": "2017-08-08T01:32:35.013", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in class/theme.class.php in SPAW Editor PHP Edition before 2.0.8.1 has unknown impact and attack vectors, probably related to directory traversal sequences in the theme name." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en class/theme.class.php en SPAW Editor PHP Edition 2.0.8.1 tiene un impacto y vectores de ataque desconocidos, probablemente relacionados con las secuencias transversales de salto de directorio en el nombre \"theme\"." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 10.0 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": true, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.0.8", "matchCriteriaId": "6F544164-4510-46D3-AAD3-1E6F06E1D7D3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0971506E-CA54-4A9A-826D-BD367C19A2DF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "16AE05A7-82E0-4320-9B13-0EC04C1D73F9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C3BE436B-CC61-4037-BD27-9E393DDE19A4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CC7F0EF-5C67-4AF1-B837-055E4DA349F2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CD7DB482-8D93-4FD6-BAE0-81D484843E30" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C2375362-A03D-4E87-914C-F8B5EDBCD1C3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "66A3ED26-3B53-4886-8FCA-4B05C0064A4A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "01252EAC-AE95-4ED3-A6F2-AEDFBC352B07" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "B9314F2C-43CF-488E-8F80-1E665B1E62CF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "FDD4E921-D01F-4165-99FA-F921C63374E0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5CB28C8A-DED5-4FCC-AF7D-3B63AD5CF8A3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "235D1152-F7AD-493B-8407-524B04DFEF9F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.1:beta:*:*:*:*:*:*", "matchCriteriaId": "8357ADA5-9E54-43E1-AD2E-BC8CBE49A888" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "58BE8F2D-0DEE-4326-91B6-030EC143A8C6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B8BA3521-7A6F-44FA-88A7-70E950700DF6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2:beta:*:*:*:*:*:*", "matchCriteriaId": "2471F346-CB24-48A9-A692-022563B0F107" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2:beta_2:*:*:*:*:*:*", "matchCriteriaId": "11C4D204-F801-493C-B560-3E66460A6BF3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3F9CB96-13CE-4A80-B056-F8C941A02976" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C6C619F-EF81-415B-9B55-4D5D418DEFA9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "37842F25-59E4-42A0-B8B7-65118FB6F05C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B46B16C9-0723-488D-AFB9-5FCCBA23CFA4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.0:beta:*:*:*:*:*:*", "matchCriteriaId": "E73FC77A-9256-4AED-A346-78D232260124" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.0:rc:*:*:*:*:*:*", "matchCriteriaId": "D8970BBD-46B2-411B-975E-FFA535FC513D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "89D8AABC-9FB3-4C7C-93B6-915B5BF71E1B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6F94244D-6AD4-4770-B498-0636E359435E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "F23EA6FD-6951-4413-B747-96EA469825DE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "1C46F19C-2DE3-4C40-9F28-0B7D1C6C44B9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "D57B47C9-61D5-437F-8DFE-8875341AB960" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.5:beta:*:*:*:*:*:*", "matchCriteriaId": "D9C33FA9-84B7-45D4-A5B1-127D34C28408" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "7E1554C2-AF1C-4451-8F70-98917D2A5492" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spaw_editor:spaw_php:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "579C4163-F550-40D7-9561-449971D0E6B0" } ] } ] } ], "references": [ { "url": "http://blog.solmetra.com/2008/09/10/spaw-editor-php-edition-hotfix-release/", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://sourceforge.net/project/shownotes.php?release_id=625333&group_id=77954", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://spaw.svn.sourceforge.net/viewvc/spaw/spaw2/trunk/class/theme.class.php?r1=151&r2=359", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/31185", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45104", "source": "cve@mitre.org" } ] }