2024-07-14 02:06:08 +00:00

121 lines
3.4 KiB
JSON

{
"id": "CVE-2007-0986",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-02-16T11:28:00.000",
"lastModified": "2018-10-16T16:35:56.780",
"vulnStatus": "Modified",
"cveTags": [],
"evaluatorComment": "This vulnerability requires that Jupiter CMS 1.1.5 is used with PHP 5.0.0 or later.",
"evaluatorImpact": "Successful exploitation requires that \"magic_quotes_gpc\" is disabled and that \"allow_url_fopen\" is enabled.",
"descriptions": [
{
"lang": "en",
"value": "PHP remote file inclusion vulnerability in index.php in Jupiter CMS 1.1.5, when PHP 5.0.0 or later is used, allows remote attackers to execute arbitrary PHP code via an ftp URL in the n parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad PHP de inclusi\u00f3n remota de archivo en index.php en Jupiter CMS 1.1.5, cuando se utiliza PHP 5.0.0 o posterior, permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de una URL ftp en el par\u00e1metro n."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jupiter_cms:jupiter_cms:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EB372559-61D8-4E8D-9ED2-DB7F211E8C78"
}
]
}
]
}
],
"references": [
{
"url": "http://mgsdl.free.fr/advisories/12070214.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/33730",
"source": "cve@mitre.org"
},
{
"url": "http://www.acid-root.new.fr/advisories/12070214.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/460076/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/460100/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/22560",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32519",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/3309",
"source": "cve@mitre.org"
}
]
}