René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

123 lines
4.4 KiB
JSON

{
"id": "CVE-2009-1936",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-06-05T18:30:00.187",
"lastModified": "2017-09-29T01:34:40.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "_functions.php in cpCommerce 1.2.x, possibly including 1.2.9, sends a redirect but does not exit when it is called directly, which allows remote attackers to bypass a protection mechanism to conduct remote file inclusion and directory traversal attacks, execute arbitrary PHP code, or read arbitrary files via the GLOBALS[prefix] parameter, a different vector than CVE-2003-1500."
},
{
"lang": "es",
"value": "_functions.php de cpCommerce v.1.2.x, posiblemente incluyendo la 1.2.9, env\u00eda una redirecci\u00f3n pero no finaliza cuando es llamado directamente, lo que permite a atacantes remotos evitar el mecanismo de protecci\u00f3n para evitar los ataques de inclusi\u00f3n de ficheros remotos y de salto de directorio, ejecutar c\u00f3digo PHP o leer archivos de su elecci\u00f3n, a trav\u00e9s del par\u00e1metro GLOBALS[prefix], un vector de ataque diferente al CVE-2003-1500."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cpcommerce:cpcommerce:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD02E75-F434-4B84-9E88-430485C023BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cpcommerce:cpcommerce:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2458A0A-3018-42BE-9C9D-8670E0ADBCCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cpcommerce:cpcommerce:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "19CCEF08-5E94-45BE-B8AC-0FB3D63918CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cpcommerce:cpcommerce:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC0B0DD-E630-4C89-9CB9-0C9C2F767A07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cpcommerce:cpcommerce:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "979F163B-810A-4CEF-9E1D-92A268F74F80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cpcommerce:cpcommerce:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "31025ADC-872A-44C6-AFF3-7B0024589C8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cpcommerce:cpcommerce:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "85CD2F86-22B2-4CD3-9063-FE1B0262CB16"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cpcommerce:cpcommerce:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E70369A4-FED2-42C5-A0CB-A5299B5B8AFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cpcommerce:cpcommerce:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1BE2D467-BCA4-47A9-9DE4-9276A01E3536"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/35103",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/8790",
"source": "cve@mitre.org"
}
]
}