René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

90 lines
2.6 KiB
JSON

{
"id": "CVE-2009-1777",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-05-22T20:30:00.767",
"lastModified": "2018-10-10T19:38:17.597",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "CRLF injection vulnerability in FormMail.pl in Matt Wright FormMail 1.92, and possibly earlier, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the redirect parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n CRLF (se refiere a CR (retorno de carro) y LF (salto de l\u00ednea)) en FormMail.pl en Matt Wright FormMail v1.92 y posiblemente anteriores, permite a atacantes remotos inyectar cabeceras HTTP de su elecci\u00f3n y llevar a cabo ataques de separaci\u00f3n de respuesta HTTP a trav\u00e9s del par\u00e1metro redirect."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:matt_wright:formmail:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "45929A3B-C4BF-4E62-8F04-BA3A42960EE4"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/503446/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/34929",
"source": "cve@mitre.org"
},
{
"url": "http://www.ush.it/team/ush/hack-formmail_192/adv.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}