2024-04-04 08:46:00 +00:00

155 lines
5.1 KiB
JSON

{
"id": "CVE-2009-2093",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-08-13T18:30:00.937",
"lastModified": "2017-08-17T01:30:39.523",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the console in IBM WebSphere Partner Gateway (WPG) Enterprise 6.0 before FP8, 6.1 before FP3, 6.1.1 before FP2, and 6.2 before FP1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en la consola en IBM WebSphere Partner Gateway (WPG) Enterprise v6.0 anteriores a FP8, v6.1 anteriores a FP3, v6.1.1 anteriores a FP2, y v6.2 anteriores FP1 permite a los usuarios remotos autenticados ejecutar arbitrariamente comandos SQL a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "AF9BA887-4EC6-4BC1-87F8-1FB15C36FD1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0:fp7:*:*:*:*:*:*",
"matchCriteriaId": "1DC9F5DB-0CC0-4F2C-8B40-C3F1E2C80D90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_partner_gateway:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69E55335-9BDD-451B-A610-9389F072279D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_partner_gateway:6.1.0:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "63F561F2-344E-4AA7-A58B-34970DF97A5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_partner_gateway:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC33F02F-2381-4A6F-B322-B22E416B6887"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_partner_gateway:6.1.1:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "465A6CF3-DAB2-4DD2-8633-96217629E768"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_partner_gateway:6.1.1:fp1:*:*:*:*:*:*",
"matchCriteriaId": "99A89D4A-5B8E-444E-BCDD-6F84457848AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_partner_gateway:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6FA79605-3256-4E52-89B0-CE16873B4E5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_partner_gateway:6.2:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "49FF0FBF-AA8D-4FCF-A49D-B7B457524DDC"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/36295",
"source": "cve@mitre.org"
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21382117",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR32386",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR32607",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR32608",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR32609",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR33176",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2292",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52393",
"source": "cve@mitre.org"
}
]
}