2024-12-08 03:06:42 +00:00

129 lines
3.7 KiB
JSON

{
"id": "CVE-2020-10375",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-02-05T20:15:12.717",
"lastModified": "2024-11-21T04:55:10.630",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in New Media Smarty before 9.10. Passwords are stored in the database in an obfuscated format that can be easily reversed. The file data.mdb contains these obfuscated passwords in the second column. NOTE: this is unrelated to the popular Smarty template engine product."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en New Media Smarty versiones anteriores a 9.10. Las contrase\u00f1as son almacenadas en la base de datos en un formato ofuscado que puede ser revertido f\u00e1cilmente. El archivo data.mdb contiene estas contrase\u00f1as ofuscadas en la segunda columna. NOTA: esto no est\u00e1 relacionado con el popular producto de motor de plantillas Smarty"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 2.1,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:newmediacompany:smarty:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.10",
"matchCriteriaId": "D6818067-7D6D-477E-A2F5-C02468888AF8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.smarty-online.de",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.x41-dsec.de/lab/advisories/x41-2020-005-smarty/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.smarty-online.de",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.x41-dsec.de/lab/advisories/x41-2020-005-smarty/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}