2024-12-08 03:06:42 +00:00

134 lines
4.1 KiB
JSON

{
"id": "CVE-2010-0620",
"sourceIdentifier": "security_alert@emc.com",
"published": "2010-02-25T00:30:00.563",
"lastModified": "2024-11-21T01:12:35.783",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the SSL Service in EMC HomeBase Server 6.2.x before 6.2.3 and 6.3.x before 6.3.2 allows remote attackers to overwrite arbitrary files with any content, and consequently execute arbitrary code, via a .. (dot dot) in an unspecified parameter."
},
{
"lang": "es",
"value": "Una vulnerabilidad de salto del directorio en Servicio SSL en HomeBase Server de EMC, versiones 6.2.x anteriores a 6.2.3 y versiones 6.3.x anteriores a 6.3.2, permite a los atacantes remotos sobrescribir archivos arbitrarios con cualquier contenido y en consecuencia, ejecutar c\u00f3digo arbitrario por medio de un .. (punto punto) en un par\u00e1metro no especificado."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:homebase_server:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D36EB7F-CA40-4C44-9E25-1E7AF6BB2FA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:homebase_server:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0D186C00-9FD7-4635-B312-B6EF32855725"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/8230",
"source": "security_alert@emc.com"
},
{
"url": "http://www.securityfocus.com/archive/1/509723/100/0/threaded",
"source": "security_alert@emc.com"
},
{
"url": "http://www.securityfocus.com/bid/38380",
"source": "security_alert@emc.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2010/0458",
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-020/",
"source": "security_alert@emc.com"
},
{
"url": "http://securityreason.com/securityalert/8230",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/509723/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/38380",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2010/0458",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-020/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"evaluatorComment": "Per: http://seclists.org/bugtraq/2010/Feb/222\r\n\r\nAffected products:\r\n\r\nEMC HomeBase Server version 6.2.x\r\n\r\nEMC HomeBase Server version 6.3.x\r\n"
}