mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
153 lines
5.4 KiB
JSON
153 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2006-3935",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-07-31T22:04:00.000",
|
|
"lastModified": "2018-10-17T21:32:24.817",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "system/workplace/views/admin/admin-main.jsp in Alkacon OpenCms before 6.2.2 does not restrict access to administrator functions, which allows remote authenticated users to (1) send broadcast messages to all users (/workplace/broadcast), (2) list all users (/accounts/users), (3) add webusers (/accounts/webusers/new), (4) upload database import and export files (/database/importhttp), (5) upload arbitrary program modules (/modules/modules_import), and (6) read the log file (/workplace/logfileview) by setting the appropriate value for the path parameter in a direct request to admin-main.jsp."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "system/workplace/views/admin/admin-main.jsp en Alkacon OpenCms before 6.2.2 no restringe el acceso a funciones de administraci\u00f3n, lo cual permite a usuarios remotos autenticados (1) enviar mensajes de difusi\u00f3n a todos los usuarios (/workplace/broadcast), (2) listar todos los usuarios (/accounts/users), (3) a\u00f1adir usuarios de la web (/accounts/webusers/new), (4) subir ficheros de importaci\u00f3n y exportaci\u00f3n de la base de datos (/database/importhttp), (5) subir m\u00f3dulos de programa de su elecci\u00f3n (/modules/modules_import), y (6) leer el fichero de log (/workplace/logfileview) estableciendo el valor apropiado en par\u00e1metro path en una petici\u00f3n directa a admin-main.jsp."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.5
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:alkacon:opencms:6.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8369451E-7C00-4CC3-9B80-871559E3F59E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:alkacon:opencms:6.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD4F9A11-BF2F-4C12-AE12-480EE547DD8D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:alkacon:opencms:6.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35A4931F-1EA7-48E5-B369-FA013FB87D12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:alkacon:opencms:6.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72D23BDD-8C14-44B4-83C3-26F4F35526A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:alkacon:opencms:6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16F73D28-272C-4271-BDA1-ACCFA3F8EEDB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:alkacon:opencms:6.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A26A8441-4BB4-423A-99D7-79D2537A91DD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://o0o.nu/~meder/OpenCMS_multiple_vulnerabilities.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/1302",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.opencms.org/export/download/opencms/opencms_6.2.2_src.zip",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.opencms.org/opencms/en/shownews.html?id=1002",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/441182/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27996",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28003",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28010",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28026",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28031",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28036",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |