2023-11-07 21:03:21 +00:00

91 lines
2.9 KiB
JSON

{
"id": "CVE-2007-5364",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-10-11T01:17:00.000",
"lastModified": "2023-11-07T02:01:17.157",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in payments/ideal_process.php in the iDEAL transaction handler in ViArt Shopping Cart allows remote attackers to have an unknown impact via directory traversal sequences in the filename parameter to the createCertFingerprint function. NOTE: this issue is disputed by CVE because PHP encounters a fatal function-call error on a direct request for payments/ideal_process.php"
},
{
"lang": "es",
"value": "** IMPUGNADA ** Vulnerabilidad de salto de directorio en payments/ideal_process.php en el manejador de transacciones iDEAL de ViArt Shopping Cart permite a atacantes remotos tener un impacto desconocido mediante secuencias de salto de directorio en el par\u00e1metro filename de la funci\u00f3n createCertFingerprint. NOTA: CVE niega este problema porque PHP encuentra un error fatal de llamada a funci\u00f3n en una petici\u00f3n directa de payments/ideal_process.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:viart:shopping_cart:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43899B59-C059-4A5A-AE00-7936798E1466"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/3212",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/481658/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/481848",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25998",
"source": "cve@mitre.org"
}
]
}