René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.6 KiB
JSON

{
"id": "CVE-2006-4586",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-06T22:04:00.000",
"lastModified": "2018-10-17T21:38:11.247",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The admin panel in Tr Forum 2.0 accepts a username and password hash for authentication, which allows remote authenticated users to perform unauthorized actions, as demonstrated by modifying user settings via the id parameter to /membres/modif_profil.php, and changing a password via /membres/change_mdp.php. NOTE: this can be leveraged with other Tr Forum vulnerabilities to allow unauthenticated attackers to gain privileges."
},
{
"lang": "es",
"value": "El panel de administraci\u00f3n en Tr Forum 2.0 acepta un hash para el nombre de usuario y contrase\u00f1a para su validaci\u00f3n, lo cual permite que un usurio remoto validado realizar acciones para las que no estaba autorizado, seg\u00fan lo demostrado en la modificaci\u00f3n de los ajustes del usuario a trav\u00e9s del par\u00e1metro id a /membres/modif_profil.php, y cambiando la contrase\u00f1a /membres/change_mdp.php. NOTA: esto puede ser acoplado con otras vulnerabilidades de Tr Forum que permiten a atacantes no validados escalar privilegios."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tr_forum:tr_forum:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E83DC88-E354-46FF-83EE-B6ADB2D60328"
}
]
}
]
}
],
"references": [
{
"url": "http://acid-root.new.fr/poc/10060903.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://securityreason.com/securityalert/1508",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016788",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/445079/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/19834",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3452",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28756",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/2297",
"source": "cve@mitre.org"
}
]
}