René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

104 lines
3.7 KiB
JSON

{
"id": "CVE-2008-4453",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-10-06T23:25:50.630",
"lastModified": "2017-09-29T01:32:09.663",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The GdPicture (1) Light Imaging Toolkit 4.7.1 GdPicture4S.Imaging ActiveX control (gdpicture4s.ocx) 4.7.0.1 and (2) Pro Imaging SDK 5.7.1 GdPicturePro5S.Imaging ActiveX control (gdpicturepro5s.ocx) 5.7.0.1 allows remote attackers to create, overwrite, and modify arbitrary files via the SaveAsPDF method. NOTE: this issue might only be exploitable in limited environments or non-default browser settings. NOTE: this can be leveraged for remote code execution by accessing files using hcp:// URLs. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Los controles ActiveX GdPicture GdPicture4S.Imaging (gdpicture4s.ocx) 4.7.0.1 de Luz Imaging Toolkit 4.7.1 y GdPicturePro5S.Imaging (gdpicturepro5s.ocx) 5.7.0.1 de Pro Imaging SDK 5.7.1 permiten a atacantes remotos crear, sobrescribir, y modificar archivos arbitrarios a trav\u00e9s del m\u00e9todo SaveAsPDF. \r\nNOTA: Este problema s\u00f3lo podr\u00eda ser explotado en entornos limitados o con configuraciones del navegador diferentes a la que viene por defecto. \r\nNOTA: Esto puede ser aprovechado para la ejecuci\u00f3n de c\u00f3digo remoto mediante el acceso a los ficheros utilizando URLs hcp://.\r\nNOTA: Algunos de estos detalles se obtienen a partir de informaci\u00f3n de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dspicture:light_imaging_toolkit:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F1964B5-07E8-45FC-81F8-4CD8E1B7997D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dspicture:pro_imaging_sdk:5.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AFEEF1B7-53C6-488D-94C8-C087F440CD37"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/4355",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/31504",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2708",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45536",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/6638",
"source": "cve@mitre.org"
}
]
}