René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

128 lines
4.0 KiB
JSON

{
"id": "CVE-2009-4896",
"sourceIdentifier": "secalert@redhat.com",
"published": "2010-08-02T20:40:00.217",
"lastModified": "2010-08-03T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple directory traversal vulnerabilities in the mlmmj-php-admin web interface for Mailing List Managing Made Joyful (mlmmj) 1.2.15 through 1.2.17 allow remote authenticated users to overwrite, create, or delete arbitrary files, or determine the existence of arbitrary directories, via a .. (dot dot) in a list name in a (1) edit or (2) save action."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de salto de directorio en la interfaz web mlmmj-php-admin para Mailing List Managing Made Joyful (mlmmj) 1.2.15 a 1.2.17, permiten a atacantes remotos autenticados sobrescribir, crear o borrar ficheros de su elecci\u00f3n, o conocer la existencia de directorios de su elecci\u00f3n mediante un .. (punto punto) en un nombre de lista en una acci\u00f3n (1) edit o (2) save."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mlmmj:mlmmj:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5394054E-1693-4639-972C-222DCCC39AAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mlmmj:mlmmj:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "19BD6525-7D22-4A43-914B-97E755D99E42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mlmmj:mlmmj:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "64B9843D-5D0D-4E49-BF16-11CF7187D771"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=259968",
"source": "secalert@redhat.com"
},
{
"url": "http://mlmmj.org/node/84",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2010/dsa-2073",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/06/23/5",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/06/23/6",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/06/25/2",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/06/26/1",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/07/04/4",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/07/06/1",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=607256",
"source": "secalert@redhat.com"
}
]
}