2024-12-08 03:06:42 +00:00

124 lines
3.5 KiB
JSON

{
"id": "CVE-2007-0804",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-02-07T11:28:00.000",
"lastModified": "2024-11-21T00:26:47.213",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in admin/subpages.php in GGCMS 1.1.0 RC1 and earlier allows remote attackers to inject arbitrary PHP code into arbitrary files via \"..\" sequences in the subpageName parameter, as demonstrated by injecting PHP code into a template file."
},
{
"lang": "es",
"value": "Vulnerabilidad de escalado de directorio en admin/subpages.php de GGCMS 1.1.0 RC1 y versiones anteriores permite a atacantes remotos inyectar c\u00f3digo PHP en ficheros de su elecci\u00f3n mediante secuencias \"..\" (punto punto) en el par\u00e1metro subpageName, como se demuestra inyectando c\u00f3digo PHP en un fichero plantilla."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ggcms:ggcms:1.1.0_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "31E5135C-B0B2-4143-B408-A8C4B90D0B46"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/35849",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/22412",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/0492",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32211",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/3271",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/35849",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/22412",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/0492",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32211",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.exploit-db.com/exploits/3271",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}