René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

107 lines
3.5 KiB
JSON

{
"id": "CVE-2009-0615",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2009-02-26T16:17:20.030",
"lastModified": "2009-03-03T07:04:48.920",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in Cisco Application Networking Manager (ANM) before 2.0 and Application Control Engine (ACE) Device Manager before A3(2.1) allows remote authenticated users to read or modify arbitrary files via unspecified vectors, related to \"invalid directory permissions.\""
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en Cisco Application Networking Manager (ANM) anterior a v2.0 y Application Control Engine (ACE) Device Manager anterior a vA3(2.1) permite a usuarios atenticados remotamente leer o modificar ficheros de su elecci\u00f3n a atrav\u00e9s de vectores sin especificar relacionados con \"permisos de directorio inv\u00e1lido\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:application_control_engine_device_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.2",
"matchCriteriaId": "5D4DDB47-1E38-47B5-A77E-B967A0C11ADB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:application_control_engine_device_manager:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A02EE9C-8E93-409E-823A-08C8C9ADE002"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:application_networking_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.2",
"matchCriteriaId": "2E917E6B-F744-49D3-8516-132C8684F3D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:application_networking_manager:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0E427057-56BC-4E7C-8DBA-0388A6C81C87"
}
]
}
]
}
],
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33903",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021770",
"source": "ykramarz@cisco.com"
}
]
}