mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
112 lines
3.4 KiB
JSON
112 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2010-0992",
|
|
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
|
|
"published": "2010-04-09T17:30:00.303",
|
|
"lastModified": "2018-10-10T19:55:14.417",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Pulse CMS Basic 1.2.2 and 1.2.3, and possibly Pulse Pro before 1.3.2, allow remote attackers to hijack the authentication of users for requests that (1) upload image files, (2) delete image files, or (3) create blocks."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en Pulse CMS Basic v1.2.2 y v1.2.3, y probablemente Pulse Pro anterior v1.3.2, permite a atacantes remotos secuestar la autenticaci\u00f3n de otros usuarios de peticiones que cargan (1) ficheros im\u00e1genes, (2) borra ficheros im\u00e1genes, o (3) crea bloques."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-352"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:pulsecms:pulse_cms:1.2.2:-:basic:*:*:*:*:*",
|
|
"matchCriteriaId": "49648AF1-DAD8-44C6-BEDF-8F19DF180E8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:pulsecms:pulse_cms:1.2.3:-:basic:*:*:*:*:*",
|
|
"matchCriteriaId": "6902B6AA-D3A3-4453-B3C5-16DE2EB660CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:pulsecms:pulse_cms:1.3.2:-:pro:*:*:*:*:*",
|
|
"matchCriteriaId": "FFA8814A-69C9-48B4-B8BB-3265C7058A8D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://pulsecms.com/blog.php",
|
|
"source": "PSIRT-CNA@flexerasoftware.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/39046",
|
|
"source": "PSIRT-CNA@flexerasoftware.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/secunia_research/2010-46/",
|
|
"source": "PSIRT-CNA@flexerasoftware.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/510619/100/0/threaded",
|
|
"source": "PSIRT-CNA@flexerasoftware.com"
|
|
}
|
|
]
|
|
} |