mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
201 lines
6.1 KiB
JSON
201 lines
6.1 KiB
JSON
{
|
|
"id": "CVE-2007-0658",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-02-01T22:28:00.000",
|
|
"lastModified": "2017-07-29T01:30:19.517",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los m\u00f3dulos para Drupal (1) Textimage 4.7.x versiones anteriores a 4.7-1.2 y 5.x versiones anteriores a 5.x-1.1 y (2) Captcha 4.7.x versiones anteriores a 4.7-1.2 y 5.x versiones anteriores a 5.x-1.1, permiten a atacantes remotos evitar la comprobaci\u00f3n CAPTCHA mediante un elemento vac\u00edo captcha in $_SESSION."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:4.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FFE9A8A9-19D4-4C50-A4B5-2EFD8B05BAE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:4.7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79F8FEEF-6857-4DC8-9D0D-76D801D0E914"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:4.7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61EC4ECE-6719-4C54-B150-017ACB32E644"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:4.7.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D5368BD-60AC-49E7-80D4-A5B317319A31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:4.7.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC3B1D3A-B449-4F4A-9405-4B5FC9041974"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:4.7.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "228039D8-A41B-4D04-8084-40E13941659F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:4.7.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "550F4476-9749-4DE8-8ACF-C17FD4D82466"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:4.7_rev1.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55AD4DCD-C856-40F4-BB12-EFE2CAD0434C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDBE79A6-5762-4A7C-8FDA-C11FFFDCFC9B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A5BCAB7B-DF79-4DB8-A5C4-731F251A02A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:textimage:4.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A75C8891-7EFA-4B09-B2AE-542B16897C4F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:drupal:textimage:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79839DED-18F5-44C8-A2EB-EA3DA503616F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://cvs.drupal.org/viewcvs/drupal/contributions/modules/captcha/captcha.module?r1=1.25.2.1&r2=1.25.2.2",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://cvs.drupal.org/viewcvs/drupal/contributions/modules/textimage/captcha.inc?r1=1.1&r2=1.1.2.1",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/114364",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/114519",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/32137",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/32138",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/23983",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/23985",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/22329",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/0431",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31984",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31994",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |