René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

106 lines
3.2 KiB
JSON

{
"id": "CVE-2018-14579",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-07-24T14:29:00.207",
"lastModified": "2018-09-20T18:55:27.810",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "GolemCMS through 2008-12-24, if the install/ directory remains active after an installation, allows remote attackers to execute arbitrary PHP code by inserting this code into the \"Database Information\" \"Table prefix\" form field, or obtain sensitive information via a direct request for install/install.sql."
},
{
"lang": "es",
"value": "GolemCMS hasta el 24/12/2008, si el directorio install/ sigue activo tras una instalaci\u00f3n, permite que atacantes remotos ejecuten c\u00f3digo PHP arbitrario insertando este c\u00f3digo en los campos del formulario \"Database Information\" y \"Table prefix\" u obtener informaci\u00f3n sensible mediante una petici\u00f3n directa a install/install.sql."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:golemcms_project:golemcms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2008-12-24",
"matchCriteriaId": "61DD8918-C0FE-4DCF-BDF3-AE00B24F1F19"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/havysec/Useful_Code/blob/master/mycve/001.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}