mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
186 lines
6.3 KiB
JSON
186 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2005-4458",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-12-21T11:03:00.000",
|
|
"lastModified": "2018-10-19T15:41:00.007",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Group.pm in Metadot Portal Server 6.4.4 and earlier does not properly reset the $IS_OWNER, $IS_ADMIN, and $IS_MANAGER global variables when performing checks for special privileges, which allows users to gain administrator privileges by adding themselves to the SITE_MGR group."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.5.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCD7614E-A0ED-417E-ACE0-659F4139D4ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B4AE88C-3416-4EFA-A8F5-B1E8CC4B30CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8AFC7D26-0919-4821-A8FF-7CFA16FA4355"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2BCDFCC2-7E27-407A-A0F5-CE7732508F00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7087EBB9-C43E-4C6C-921A-F558C0BD8858"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4671B391-6A50-45F0-B8A0-C03E141FE60F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FFC3F9E-0929-4A11-8922-67FBEDF25363"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D6FB02B0-D2F7-4722-86DC-A2491DCD5698"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ED55B5DE-16A7-4E1E-B5F9-55D00E1872EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.5.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32971B70-EBBA-45A2-BF7A-48868F7577AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.5.4b5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D44750A2-C92D-4C16-9AF6-5492E9714409"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:5.6.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86328838-92D4-4383-9F2B-69A17F51CBE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:6.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1AE65852-502F-481F-BA54-E984EC9E3356"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:6.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8403B353-20A1-4CF5-90E6-B1D0745F91A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:6.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBD0E637-AA77-4D5C-B449-D17136245752"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:6.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1CDFF2D5-6125-44BB-BA94-42B5AD84D7AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metadot:metadot_portal_server:6.4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "46A58B85-25E8-4B3F-8895-0DA2BB4E2809"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-12/1012.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/287",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.metadot.com/metadot/index.pl?iid=2632",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/420002/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/15975",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2005/3030",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23847",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |