René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

159 lines
5.4 KiB
JSON

{
"id": "CVE-2019-7139",
"sourceIdentifier": "psirt@adobe.com",
"published": "2019-04-10T18:29:01.247",
"lastModified": "2019-08-06T14:15:12.127",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated user can execute SQL statements that allow arbitrary read access to the underlying database, which causes sensitive data leakage. This issue is fixed in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2."
},
{
"lang": "es",
"value": "Un usuario no autenticado puede ejecutar sentencias SQL que permiten el acceso de lectura arbitraria a la base de datos subyacente, lo que provoca una fuga de datos confidenciales. Este problema se solucion\u00f3 en Magento 2.1 versiones anteriores a 2.1.18, Magento 2.2 versiones anteriores a 2.2.9, Magento 2.3 versiones anteriores a 2.3.2."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"versionEndExcluding": "1.9.4.1",
"matchCriteriaId": "301CD70F-E31C-43AD-9125-DAC78C514E0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"versionStartIncluding": "1.14.0.0",
"versionEndExcluding": "1.14.4.1",
"matchCriteriaId": "00D860BC-9E7C-4CF2-9B6A-1181869509EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"versionStartIncluding": "2.1.0",
"versionEndExcluding": "2.1.17",
"matchCriteriaId": "FCA87878-4437-418E-8D19-D40674FBEE1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"versionStartIncluding": "2.1.0",
"versionEndExcluding": "2.1.17",
"matchCriteriaId": "2B7B6D6D-3481-4E8D-B5FC-D06AC7B727F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"versionStartIncluding": "2.2.0",
"versionEndExcluding": "2.2.8",
"matchCriteriaId": "5AF193BC-1111-4879-BEC2-5423F3EA3D85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"versionStartIncluding": "2.2.0",
"versionEndExcluding": "2.2.8",
"matchCriteriaId": "B7B7D3EB-54DB-4B69-A4EE-61F44328C371"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"versionStartIncluding": "2.3.0",
"versionEndExcluding": "2.3.1",
"matchCriteriaId": "2F1D18BC-47FA-4BAD-8BDD-0DF4779531CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"versionStartIncluding": "2.3.0",
"versionEndExcluding": "2.3.1",
"matchCriteriaId": "050A96AF-2F85-476F-A704-6540C8895362"
}
]
}
]
}
],
"references": [
{
"url": "https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13",
"source": "psirt@adobe.com"
},
{
"url": "https://www.ambionics.io/blog/magento-sqli",
"source": "psirt@adobe.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}