mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
131 lines
5.2 KiB
JSON
131 lines
5.2 KiB
JSON
{
|
|
"id": "CVE-2005-2473",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-08-05T04:00:00.000",
|
|
"lastModified": "2017-07-11T01:32:52.063",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple SQL injection vulnerabilities in ChurchInfo allow remote attackers to execute arbitrary SQL commands via the PersonID parameter to (1) PersonView.php, (2) MemberRoleChange.php, (3) PropertyAssign.php, (4) WhyCameEditor.php, (5) GroupPropsEditor.php, (6) Reports/PDFLabel.php, or (7) UserDelete.php, (8) DepositSlipID parameter to DepositSlipEditor.php, (9) QueryID parameter to QueryView.php, GroupID parameter to (10) GroupView.php, (11) GroupMemberList.php, (12) MemberRoleChange.php, (13) GroupDelete.php, (14) /Reports/ClassAttendance.php, or (15) /Reports/GroupReport.php, (16) PropertyID parameter to PropertyEditor.php, FamilyID parameter to (17) Canvas05Editor.php, (18) CanvasEditor.php, or (19) FamilyView.php, or (20) PledgeID parameter to PledgeDetails.php."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n de SQL en ChurchInfo permite que atacantes remotos ejecuten comandos SQL arbitrarios en: (1) PersonView.php, (2) MemberRoleChange.php, (3) PropertyAssign.php, (4) WhyCameEditor.php, (5) GroupPropsEditor.php, (6) Reports/PDFLabel.php, (7) UserDelete.php, (8) DepositSlipEditor.php, (9) QueryView.php, (10) GroupView.php, (11) GroupMemberList.php, (12) MemberRoleChange.php, (13) GroupDelete.php, (14) /Reports/ClassAttendance.php, (15) /Reports/GroupReport.php, (16) PropertyEditor.php, (17) Canvas05Editor.php, (18) CanvasEditor.php, (19) FamilyView.php, (20) PledgeDetails.php."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:churchinfo:churchinfo:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F879219C-C632-459D-A16F-8342B60462A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:churchinfo:churchinfo:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1C82088-3340-4612-BA6A-86A7F8E960F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:churchinfo:churchinfo:1.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E8C458ED-C5A0-4F6F-874D-7736BC9B4DF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:churchinfo:churchinfo:1.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DBB7A122-18F3-4EC2-B91F-17F3D18C4B95"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:churchinfo:churchinfo:1.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24D3103F-8660-481E-8B6A-6BEC565E668C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:churchinfo:churchinfo:1.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8DD7E63B-9E84-4C73-B6B9-97E19F763AC9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:churchinfo:churchinfo:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "62AF3C4E-031D-4F81-94F2-11FF29BF2207"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:churchinfo:churchinfo:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78C41826-6116-4F37-BA73-6B9C8AE2A299"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:churchinfo:churchinfo:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1F6567B-558F-475D-8EC4-9067F4F643DA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=112291550713546&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1014617",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/14438",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21647",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |