René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

192 lines
6.5 KiB
JSON

{
"id": "CVE-2006-4684",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-19T18:07:00.000",
"lastModified": "2011-03-08T02:41:53.563",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The docutils module in Zope (Zope2) 2.7.0 through 2.7.9 and 2.8.0 through 2.8.8 does not properly handle web pages with reStructuredText (reST) markup, which allows remote attackers to read arbitrary files via a csv_table directive, a different vulnerability than CVE-2006-3458."
},
{
"lang": "es",
"value": "El m\u00f3dulo docutils en Zope (Zope2) desde 2.7.0 hasta 2.7.9 y desde 2.8.0 hasta 2.8.8 no maneja adecuadamente p\u00e1ginas web con el marcado reStructuredText (reST), lo cual permite a atacantes remotos leer ficheros de su elecci\u00f3n v\u00eda una directiva csv_table, una vulnerabilidad diferente que CVE-2006-3458."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E296CD1C-2601-4A63-9E9D-38A39C84BF5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF9B22D-6EF3-4364-A016-041457C4DFC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "88153606-52FE-4C0B-88CD-B76538C19055"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EAA38381-4C32-4C55-8116-341028D1888A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1B294E38-65FD-474D-BABC-9447EF33202A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "685805FD-1A33-480E-A313-255EDF0B5266"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D827148D-4A8A-41DB-91B6-0049706D53D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0273EF1B-BC64-432F-8966-68547DFAD6BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52CDCE-172C-4FAC-9015-ACF362E8E8A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "84DFC911-D226-4F8C-840A-D5F6EBBBF0CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "234C776B-C053-484C-ADE4-ED270064943F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "244107E5-42B0-4695-BBC9-5B90AD0A1336"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "93785E75-3F82-471E-B802-6337A6469AF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B34066B4-CE72-4271-9CFD-F725F7D17C89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9A40B0D1-1812-4BC7-AC7D-CCE6184A9DB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81028DBB-7A75-4D27-8027-947F15CAA21E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "62BCE60F-9081-44D3-87FC-396D1A954626"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA09D22-779C-4E63-B216-B931FA11E014"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:zope:2.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B2759CCE-3A1F-4E3F-9832-8BF3AA4F20F9"
}
]
}
]
}
],
"references": [
{
"url": "http://mail.zope.org/pipermail/zope-announce/2006-August/002005.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2006/dsa-1176",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/20022",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/3653",
"source": "cve@mitre.org"
},
{
"url": "http://www.zope.org/Products/Zope/Hotfix-2006-08-21/Hotfix-20060821/README.txt",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}