René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

92 lines
2.5 KiB
JSON

{
"id": "CVE-2006-1480",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-03-29T01:06:00.000",
"lastModified": "2017-10-19T01:29:04.457",
"vulnStatus": "Modified",
"evaluatorSolution": "Successful exploitation requires that the \"magic_quotes_gpc\" parameter is disabled.\r\n",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in start.php in WebAlbum 2.02 allows remote attackers to include arbitrary files and execute commands by (1) injecting code into local log files via GET commands, then (2) accessing that log via a .. (dot dot) sequence and a trailing null (%00) byte in the skin2 COOKIE parameter."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:duda:webalbum:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.02",
"matchCriteriaId": "B96EABED-416D-4887-BB1F-EDBC622B50F7"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/17228",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/1108",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25443",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/1608",
"source": "cve@mitre.org"
}
]
}