mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
161 lines
5.6 KiB
JSON
161 lines
5.6 KiB
JSON
{
|
|
"id": "CVE-2014-6299",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2014-10-03T14:55:09.320",
|
|
"lastModified": "2014-10-06T18:02:49.170",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site request forgery (CSRF) vulnerability in the mm_forum extension before 1.9.3 for TYPO3 allows remote attackers to hijack the authentication of users for requests that create posts via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de CSRF en la extensi\u00f3n mm_forum anterior a 1.9.3 para TYPO3 permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios para solicitudes que crean mensajes a trav\u00e9s de vectores no especificados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-352"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:*:*:*:*:*:typo3:*:*",
|
|
"versionEndIncluding": "1.9.2",
|
|
"matchCriteriaId": "8C7AB401-0CCD-46FA-B29D-CF10E88750E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:0.1.0:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "D056B78A-421B-4D30-AF16-D8B62F5B36EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:0.1.1:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "C166F5EA-8587-40FD-A802-2E33CE247AA4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:0.1.2:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "989DA434-D5C4-4608-B656-63F3A86B9E95"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:0.1.3:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "EA87E733-8D9D-461F-A7A6-370617DCFAA0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:0.1.4:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "70BF967D-F4B8-4DB4-BFFE-04ED61CE6325"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:0.1.5:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "60941195-A065-4412-BF80-4126491C3021"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:0.1.6:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "87DE2337-CE57-4437-89C3-A6D331FF70D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:0.1.7:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "4BE8E78D-0236-49F1-8F1F-65AA5F3BC0FF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:0.1.8:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "1B243743-84ED-4215-95FF-04BF69C880B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:1.8.1:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "F56A0B0A-26BA-480A-A303-DE419F32DEA1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:1.8.2:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "A807249C-916C-470B-B8D0-17D177500357"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:1.8.3:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "B858C1D4-1385-454A-AAC2-374FA03DF09B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:1.9.0:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "9C6EA9DE-9755-4478-9B24-7B8B2CF987ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mm_forum_project:mm_forum:1.9.1:*:*:*:*:typo3:*:*",
|
|
"matchCriteriaId": "54B00771-FDD3-47D8-8114-BFCDAC1908B9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://typo3.org/extensions/repository/view/mm_forum",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-001/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |