René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

115 lines
3.6 KiB
JSON

{
"id": "CVE-2018-19135",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-11-11T04:29:00.173",
"lastModified": "2019-01-30T15:40:38.567",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ClipperCMS 1.3.3 does not have CSRF protection on its kcfinder file upload (enabled by default). This can be used by an attacker to perform actions for an admin (or any user with the file upload capability). With this vulnerability, one can automatically upload files (by default, it allows html, pdf, xml, zip, and many other file types). A file can be accessed publicly under the \"/assets/files\" directory."
},
{
"lang": "es",
"value": "ClipperCMS 1.3.3 no tiene protecci\u00f3n contra Cross-Site Request Forgery (CSRF) en la subida de archivos kcfinder (habilitado por defecto). Esto puede ser utilizado por un atacante para realizar acciones para un administrador (o cualquier usuario con la capacidad de subir archivos). Con esta vulnerabilidad, se pueden subir archivos autom\u00e1ticamente (por defecto, permite html, pdf, xml, zip, y muchos otros tipos de archivos). Se puede acceder p\u00fablicamente a un fichero en el directorio \"/assets/files\"."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C72E4CBC-C990-42AE-86BC-3123A14E5426"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ClipperCMS/ClipperCMS/issues/494",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/45839/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}