2024-12-08 03:06:42 +00:00

120 lines
3.6 KiB
JSON

{
"id": "CVE-2006-6735",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-12-26T23:28:00.000",
"lastModified": "2024-11-21T00:23:31.323",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "modules/viewcategory.php in Minh Nguyen Duong Obie Website Mini Web Shop 2.1.c allows remote attackers to obtain sensitive information via a request with an arbitrary catname parameter but no itemsdb parameter, which reveals the path in an error message. NOTE: CVE analysis suggests that this error might be resultant from a more serious issue such as directory traversal."
},
{
"lang": "es",
"value": "modules/viewcategory.php en Minh Nguyen Duong obie Website Mini Web Shop 2.1.c permite a atacantes remotos obtener informaci\u00f3n sensible mediante una petici\u00f3n con un par\u00e1metro catname de su elecci\u00f3n pero sin el par\u00e1metro itemsdb, lo cual revela la ruta en un mensaje de error. NOTA: los analistas de CVE sugieren que este error podr\u00eda ser resultado de un problema m\u00e1s serio tal como un salto de directorio."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:obie_website:mini_web_shop:2.1.c:*:*:*:*:*:*:*",
"matchCriteriaId": "55280924-E7F6-4A1A-8ED0-D99FE2D412A7"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/2072",
"source": "cve@mitre.org"
},
{
"url": "http://www.attrition.org/pipermail/vim/2006-December/001197.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/454864/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/21677",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://securityreason.com/securityalert/2072",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.attrition.org/pipermail/vim/2006-December/001197.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/454864/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/21677",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}