mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
117 lines
3.6 KiB
JSON
117 lines
3.6 KiB
JSON
{
|
|
"id": "CVE-2007-5113",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-09-26T23:17:00.000",
|
|
"lastModified": "2024-11-21T00:37:09.330",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "report.cgi in Google Urchin allows remote attackers to bypass authentication and obtain sensitive information (web server logs) via certain modified query parameters, as demonstrated using the profile, rid, prefs, n, vid, bd, ed, dt, and gtype parameters, a different vulnerability than CVE-2007-5112."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "report.cgi de Google Urchin permite a atacantes remotos evitar autenticaci\u00f3n y obtener informaci\u00f3n confidencial (ficheros de traza del servidor web) mediante determinados par\u00e1metros de b\u00fasqueda modificados, como se demuetra utilizando los par\u00e1metros, profile, rid, prefs, n, vid, bd, ed, dt, y gtype, vulnerabilidad distinta de CVE-2007-5112."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-287"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:roi_revolution:urchin:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5.7.03",
|
|
"matchCriteriaId": "A5A11BEC-F78B-4883-8D47-EFACD23C30A2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://ha.ckers.org/blog/20070823/xss-and-possible-information-disclosure-in-urchin/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securityvulns.ru/Sdocument90.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://websecurity.com.ua/1283/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/26037",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://ha.ckers.org/blog/20070823/xss-and-possible-information-disclosure-in-urchin/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://securityvulns.ru/Sdocument90.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://websecurity.com.ua/1283/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/26037",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |