René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.9 KiB
JSON

{
"id": "CVE-2016-9182",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-11-04T10:59:01.333",
"lastModified": "2016-11-29T18:37:37.863",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Exponent CMS 2.4 uses PHP reflection to call a method of a controller class, and then uses the method name to check user permission. But, the method name in PHP reflection is case insensitive, and Exponent CMS permits undefined actions to execute by default, so an attacker can use a capitalized method name to bypass the permission check, e.g., controller=expHTMLEditor&action=preview&editor=ckeditor and controller=expHTMLEditor&action=Preview&editor=ckeditor. An anonymous user will be rejected for the former but can access the latter."
},
{
"lang": "es",
"value": "Exponent CMS 2.4 utiliza reflexi\u00f3n PHP para llamar a un m\u00e9todo de una clase de controlador y luego utiliza el nombre del m\u00e9todo para comprobar el permiso de usuario. Pero el nombre del m\u00e9todo en una reflexi\u00f3n PHP es insensible a las may\u00fasculas y Exponent CMS permite acciones no definidas para ejecutar por defecto, de manera que un atacante puede utilizar nombre de m\u00e9todo capitalizado para eludir la verificaci\u00f3n de permiso, por ejemplo, controller=expHTMLEditor&action=preview&editor=ckeditor y controller=expHTMLEditor&action=Preview&editor=ckeditor. Un usuario an\u00f3nimo ser\u00e1 rechazado por el anterior pero puede acceder este \u00faltimo."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEAA82F-83B2-49B8-B860-2F18C3C66321"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/94227",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/exponentcms/exponent-cms/commit/684d79424f768db8bb345d5c68aa2a886239492b",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}