René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

214 lines
7.6 KiB
JSON

{
"id": "CVE-2011-1492",
"sourceIdentifier": "secalert@redhat.com",
"published": "2011-04-08T15:17:28.447",
"lastModified": "2017-08-17T01:34:14.387",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not properly verify that a request is an expected request for an external Cascading Style Sheets (CSS) stylesheet, which allows remote authenticated users to trigger arbitrary outbound TCP connections from the server, and possibly obtain sensitive information, via a crafted request."
},
{
"lang": "es",
"value": "steps/utils/modcss.inc en Roundcube Webmail anterior a v0.5.1 no comprueba correctamente que una solicitud es una solicitud esperada para una hoja de estilo externa (Cascading Style Sheets), permitiendo a usuarios remotos autenticados lanzar conexiones arbitrarias salientes TCP desde el servidor , y posiblemente obtener informaci\u00f3n sensible, a trav\u00e9s de una solicitud manipulada."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5",
"matchCriteriaId": "2E961628-4624-4095-8CE6-698F66BF462B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4C785B00-7F4D-4EBD-A9FA-726D4D35E5D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.1:alpha:*:*:*:*:*:*",
"matchCriteriaId": "8F433741-5F73-43B5-A522-C484C64C66A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "09DF755B-041E-4A61-BEF6-A613F6F0CE13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.1:beta2:*:*:*:*:*:*",
"matchCriteriaId": "34D20437-7DE7-4DB8-8C11-37B09A87E3A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "55FB4AA3-3528-46B7-BBB9-9185DAA5425C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "066AA2BC-95A8-43E8-A1FE-9F15860691E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "82FB886B-35A4-4A8C-AE18-62C845886018"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "83FF6973-9BAC-4DF2-BACE-42F0D9340A27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.2:alpha:*:*:*:*:*:*",
"matchCriteriaId": "EB6449FD-C6EE-497C-BE34-88900883AD09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "0CEF8BF6-E09F-4376-B089-9B722A84F591"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "946B0B6A-46D3-46B9-BD1E-B03D3339EEB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D6EA96-EE58-47C3-B545-7238B3F64941"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "3584BB62-818D-4A5B-BC7D-EAB0B85614EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "332FF744-3682-4818-9602-8F868BF0781E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B502047-4DDD-4586-978C-6CEE1C41F923"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "43581564-48CF-410C-9CE1-CBAE71153DA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "6A5CC548-05E4-4059-8252-FA78ECBB95A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C3FA495A-D7FE-4461-AF57-EB649A1C49B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2D773E61-113A-4EE8-804E-0584B73AB58D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "FC0D4825-F78E-40F5-A9CB-45B73DE8FBD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:roundcube:webmail:0.5:rc:*:*:*:*:*:*",
"matchCriteriaId": "9C8376B9-4DF2-4E23-9C43-EEDE3D800519"
}
]
}
]
}
],
"references": [
{
"url": "http://openwall.com/lists/oss-security/2011/03/24/3",
"source": "secalert@redhat.com"
},
{
"url": "http://openwall.com/lists/oss-security/2011/03/24/4",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://openwall.com/lists/oss-security/2011/04/04/50",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://trac.roundcube.net/changeset/4488",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://trac.roundcube.net/wiki/Changelog",
"source": "secalert@redhat.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66613",
"source": "secalert@redhat.com"
}
]
}