mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
342 lines
12 KiB
JSON
342 lines
12 KiB
JSON
{
|
|
"id": "CVE-2016-2242",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2017-01-23T21:59:01.097",
|
|
"lastModified": "2018-10-09T19:59:39.067",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Exponent CMS 2.x en versiones anteriores a 2.3.7 Patch 3 permite a atacantes remotos ejecutar c\u00f3digo arbitrarios a trav\u00e9s del par\u00e1metro sc para install/index.php."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-94"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8643385-8673-40EE-97D0-87F2C39D91D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D71D0337-96AF-4F40-9466-52C8D0A16747"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0217F357-EEF6-4E0F-B8C4-79B60D8B9638"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24C51C67-1870-4302-B1A2-298E3A675640"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3CC4E7EE-DB6B-456F-80A0-DC3DAC93BE94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.4:p3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "647925AE-3268-4CA8-A59E-76F8B85B4502"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "15E42B89-8F34-4272-8F15-9C39CA7D701C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.5:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F58A7A6-84C5-4D0D-931C-AC401532D938"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57B206CC-4ABC-4207-88C0-D75AB5455AFE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.6:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59DE46A6-FDA7-4FB7-9ED5-FB6274B6938A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "863835E5-2D07-4F79-842B-69CA65BD8CF2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44CBBED1-40D4-4851-949A-8FC0CF4E31E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.8:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A38D396-D5FC-4B87-9359-AB32A367D11B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4408D4CD-4B7F-4A57-8C19-CDB517A48AF1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.0.9:p5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A60296F9-8A44-4EA2-80C7-1734820B346C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.0:alpha:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7CE0F2BF-6850-4860-84A0-3C45629131CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "175E9F04-B0E1-4504-BB46-42F6AF64A1E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1296B22E-6A9F-4354-A3F9-C0098E15E5B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F084FB2-AC3E-426C-AE51-7916A56A0576"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74FEA650-B6CF-4F43-A302-4665A63145DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.1.4:p11:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17A20CFC-0A1B-4A18-99DC-076ADA132311"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B1CFBA46-C600-41AA-BDDA-205B1BDF435B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.0:p5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC6EB13B-E1D4-4533-81BF-6331E8633153"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2B5B416-5125-4BF9-B60C-92BAC0CBA4DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D01F38E-039A-4F19-AAFC-67B67DCE5DDE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.2:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7DF4DDC-BF1F-4BE3-9247-59D32EFB87CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "28A7169C-E465-40AC-B054-2CB2E9DA0D10"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.2.3:p14:*:*:*:*:*:*",
|
|
"matchCriteriaId": "630E621B-6BF4-4006-A465-92ACFAF56DE2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9757868-2F5C-4796-9C35-DC3A6A827AAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.0:p4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93D0084C-04DE-4813-AFAB-3D60999F35E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8139DFA4-CF47-442F-B238-D6A8B9F451EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.1:p4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F67584A-D847-4128-A3F9-FCE29C6D9AD5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1908130F-299F-4DFA-9557-FE0667083D02"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.2:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1397A083-FD8D-47CF-85A0-32C509B00CC5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BB625BF-972B-46BF-8CDE-89C3C1777D41"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.3:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CAC4DF15-0D30-4048-BBEC-2CF0326B5DC3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3BB05EB8-2415-4B30-9243-89088E033CED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.4:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6AAA99FC-045B-4C78-A07D-D4F4577E9927"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1B5858D-1FDD-4D29-B2BA-21C0743DF04F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.5:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6D557F2-4EE1-4640-920F-15B7CAFAD5B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD5777A6-4466-420F-98B8-0C5DB06B391C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.3.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8F7766EC-5D6A-4050-ACC6-85A443347A78"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.exponentcms.org/news/patch-3-released-for-v2-3-7",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Release Notes",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.exponentcms.org/news/show/title/security-notice-closing-an-exponent-security-vulnerability",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Mitigation",
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/537499/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.htbridge.com/advisory/HTB23290",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |