René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
3.9 KiB
JSON

{
"id": "CVE-2018-19290",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-11-30T18:29:00.567",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In modules/HELPBOT_MODULE in Budabot 0.6 through 4.0, lax syntax validation allows remote attackers to perform a command injection attack against the PHP daemon with a crafted command, resulting in a denial of service or possibly unspecified other impact, as demonstrated by the \"!calc 5 x 5\" command. In versions before 3.0, modules/HELPBOT_MODULE/calc.php has the vulnerable code; in 3.0 and above, modules/HELPBOT_MODULE/HelpbotController.class.php has the vulnerable code."
},
{
"lang": "es",
"value": "En modules/HELPBOT_MODULE en Budabot, desde la versi\u00f3n 0.6 hasta la 4.0, la validaci\u00f3n de la sintaxis lax permite que atacantes remotos realicen un ataque de inyecci\u00f3n de comandos contra el demonio PHP con un comandos manipulado, lo que resulta en una denegaci\u00f3n de servicio (DoS) o en otro tipo de impacto sin especificar, tal y como queda demostrado con el comando \"!calc 5 x 5\". En versiones anteriores a la 3.0, modules/HELPBOT_MODULE/calc.php tiene el c\u00f3digo vulnerable; en versiones 3.0 y posteriores, modules/HELPBOT_MODULE/HelpbotController.class.php tiene el c\u00f3digo vulnerable."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:budabot:budabot:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.6",
"versionEndIncluding": "4.0",
"matchCriteriaId": "8887AB38-2B68-4CA4-9BC2-04C78FF27387"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/150391/Budabot-4.0-Denial-Of-Service.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2018/Nov/44",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
}
]
}