mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
114 lines
3.9 KiB
JSON
114 lines
3.9 KiB
JSON
{
|
|
"id": "CVE-2011-4554",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-12-06T11:55:07.113",
|
|
"lastModified": "2011-12-08T05:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "One Click Orgs before 1.2.3 allows remote authenticated users to trigger crafted SMTP traffic via (1) \" (double quote) and newline characters in an org name or (2) \" (double quote) characters in an e-mail address, related to a \"2nd Order SMTP Injection\" issue."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "One Click Orgs antes de su versi\u00f3n v1.2.3 permite a usuarios remotos autenticados generar tr\u00e1fico SMTP a trav\u00e9s de (1) los caracteres \" (comilla doble) y nueva linea (/n) en un nombre de organizaci\u00f3n o (2) el car\u00e1cter \" (comilla doble) en una direccci\u00f3n de correo electr\u00f3nico. Se trata de un problema relacionado con una vulnerabilidad de inyecci\u00f3n SMTP de segundo orden."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.5
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oneclickorgs:one_click_orgs:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.2.2",
|
|
"matchCriteriaId": "986482E2-0875-41FD-B10F-1D415229722E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oneclickorgs:one_click_orgs:1.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E19D160-676C-4D93-8224-DD3BA7296A56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oneclickorgs:one_click_orgs:1.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0551C219-6CD6-4DBB-B36F-54B750EDA9F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oneclickorgs:one_click_orgs:1.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04E09162-B070-441F-BE2D-EF2C5F515339"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oneclickorgs:one_click_orgs:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20A2140E-685F-41E7-AEC4-82DEBC2B3B60"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oneclickorgs:one_click_orgs:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "23D9A2D4-CC43-453E-A3A6-17DD21988617"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oneclickorgs:one_click_orgs:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43103D6D-C861-409B-BC58-036B735F5C4C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://dmcdonald.net/?page_id=43",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://groups.google.com/group/oneclickorgs-devspace/msg/26c40a4cc9e127d2?hl=en&dmode=source&output=gplain",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |