René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

123 lines
3.6 KiB
JSON

{
"id": "CVE-2005-3571",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-11-16T07:42:00.000",
"lastModified": "2016-10-18T03:36:14.593",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "PHP file inclusion vulnerability in protection.php in CodeGrrl (a) PHPCalendar 1.0, (b) PHPClique 1.0, (c) PHPCurrently 2.0, (d) PHPFanBase 2.1, and (e) PHPQuotes 1.0 allows remote attackers to include arbitrary local files via the siteurl parameter when register_globals is enabled. NOTE: It was later reported that PHPFanBase 2.2 is also affected."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codegrrl:phpcalendar:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "24B7C89C-7458-466C-91B1-DDA354FE4F15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codegrrl:phpclique:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "CF9DA482-08DF-4857-B377-E271A207A10F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codegrrl:phpcurrently:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0",
"matchCriteriaId": "FC225CF6-E48A-43CE-B5ED-1DE376E4AF4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codegrrl:phpfanbase:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.2",
"matchCriteriaId": "D8BFBCF4-3EFD-4096-8C89-5EABA3261D1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codegrrl:phpquotes:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "531A83B0-FF3A-45AA-80BD-CFEB23D072EA"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=113199214723444&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/176",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1015206",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15417",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/21664",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2005/2402",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}