2023-11-07 21:03:21 +00:00

119 lines
4.1 KiB
JSON

{
"id": "CVE-2007-3816",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-07-17T00:30:00.000",
"lastModified": "2023-11-07T02:00:54.773",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "JWIG might allow context-dependent attackers to cause a denial of service (service degradation) via loops of references to external templates. NOTE: this issue has been disputed by multiple third parties who state that only the application developer can trigger the issue, so no privilege boundaries are crossed. However, it seems possible that this is a vulnerability class to which an JWIG application may be vulnerable if template contents can be influenced, but this would be an issue in the application itself, not JWIG"
},
{
"lang": "es",
"value": "** EN DISPUTA ** JWIG podr\u00eda permitir a atacantes dependientes del contexto provocar denegaci\u00f3n de servicio (degradaci\u00f3n de servicio) a trav\u00e9s de b\u00facles de referencias a plantillas externas. NOTA: este problema ha sido cuestionado por m\u00faltiples terceras partes que afirman que s\u00f3lo el desarrollador de la aplicaci\u00f3n puede disparar el problema, as\u00ed que no se cruza ning\u00fan l\u00edmite de privilegios. De todos modos, parece posible que este sea un tipo de vulnerabilidad a la que una aplicaci\u00f3n JWIG podr\u00eda ser vulnerable si los contenidos de la plantilla pueden ser influenciados, pero esto ser\u00eda un problema en la aplicaci\u00f3n misma, no JWIG."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brics:jwig:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CE9C91D-D116-45DD-A3FA-DC616B5B6E42"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064768.html",
"source": "cve@mitre.org"
},
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064933.html",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/bugtraq/2007/Jul/0206.html",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2007/Jul/0446.html",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2007/Jul/0451.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/473707/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/474474/100/200/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/24974",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1018432",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35515",
"source": "cve@mitre.org"
}
]
}