mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
177 lines
6.0 KiB
JSON
177 lines
6.0 KiB
JSON
{
|
|
"id": "CVE-2006-6131",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-11-28T01:07:00.000",
|
|
"lastModified": "2018-10-17T21:46:49.407",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorSolution": "Successful exploitation requires that the attacker is part of the \"admin\" group or the \"webstar\" user.",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Untrusted search path vulnerability in (1) WSAdminServer and (2) WSWebServer in Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 and earlier allows local users with webstar privileges to gain root privileges via a malicious libucache.dylib helper library in the current working directory."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en (1) WSAdminServer y (2) WSWebServer en Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 y anteriores permite a atacantes remotos con privilegios webstar obtener privilegios de root mediante una librer\u00eda de ayuda libucache.dylib maliciosa en el directorio de trabajo actual."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 6.2
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 1.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5.4.2",
|
|
"matchCriteriaId": "B7F28702-84B0-42A3-A244-53F3D94F6BC3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C1D166E-75B3-4EB3-98AF-6833ABD5B8E2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2E97519-73F0-4458-BB7B-DA586822D3AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "972BFD94-E0AE-4FC3-939B-92755E1DFEF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40545A77-1C92-4794-99B9-F702092A3119"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02B475F7-CA40-4253-A035-43CFAF3CAA5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04E6E05E-3917-4BCA-8EFC-478BC6D47140"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "977ACE5E-7B5E-4BB2-9E0D-4B1207767A00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F99FFA5-A88D-480D-BCB6-C7FA240758E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60FB0855-0483-491C-AECC-B72E3C7349F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F405A681-5451-455E-AC82-4CA6BB023684"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F592F600-295A-4F0F-A5BB-02ED95FA95F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84F7E9C9-4FFC-45B3-B031-385769F008BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F0963F3-EA87-4337-90C2-4DFA80B79D7E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kerio:webstar:5.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B5E33D19-BA94-4444-8C9F-43F92147F782"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/1921",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1017239",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/451832/100/200/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/21123",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/4539",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30308",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |