2024-12-08 03:06:42 +00:00

230 lines
6.9 KiB
JSON

{
"id": "CVE-2009-1213",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-04-01T10:30:00.453",
"lastModified": "2024-11-21T01:01:55.483",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in attachment.cgi in Bugzilla 3.2 before 3.2.3, 3.3 before 3.3.4, and earlier versions allows remote attackers to hijack the authentication of arbitrary users for requests that use attachment editing."
},
{
"lang": "es",
"value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en attachment.cgi de Bugzilla v3.2 anterior a v3.2.3, v3.3 anterior a v3.3.4 y versiones anteriores, permiten a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios aleatorios de solicitudes que utilizan la edici\u00f3n de adjuntos."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "170EB43B-9488-4E25-9401-B84DE838247B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1ED7682-A315-4F92-9F9F-38290BCC058E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB4EF1D-D4D0-40DA-BE78-24FD48030EE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2962084-F778-4574-8105-8C5A260CCBD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF288A74-070E-4EB4-BB92-7D4D41635DD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8B31F0-6FCC-4258-865B-B65ECBFAF252"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/34545",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/34547",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/34624",
"source": "cve@mitre.org"
},
{
"url": "http://www.bugzilla.org/security/3.2.2/",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/34308",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0887",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=476603",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49524",
"source": "cve@mitre.org"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00188.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00191.html",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/34545",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/34547",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/34624",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.bugzilla.org/security/3.2.2/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/34308",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0887",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=476603",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49524",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00188.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00191.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}