mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
229 lines
7.9 KiB
JSON
229 lines
7.9 KiB
JSON
{
|
|
"id": "CVE-2007-1474",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-03-16T21:19:00.000",
|
|
"lastModified": "2017-07-29T01:30:47.847",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Argument injection vulnerability in the cleanup cron script in Horde Project Horde and IMP before Horde Application Framework 3.1.4 allows local users to delete arbitrary files and possibly gain privileges via multiple space-delimited pathnames."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de inyecci\u00f3n de argumento en la secuencia de comandos cleanup para cron de Horde Project Horde e IMP anterior a Horde Application Framework 3.1.4 permite a usuarios locales borrar archivos de su elecci\u00f3n y posiblemente obtener privilegios mediante m\u00faltiples nombres de ruta separados por espacios."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:horde_application_framework:3.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76A5CF62-60DD-4EA7-A6C3-2061548EF1B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:horde_application_framework:3.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78356C5F-A76E-4CB1-894D-0D882A665096"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:horde_application_framework:3.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6E3FE20-264A-4496-8FB3-E59A3A38BAE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8D2A8C5B-6155-4B40-B8C8-B4944064E3DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D11E08A4-79D6-46FE-880F-66E9778C298E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55A3894F-2E3F-49CA-BEE5-759D603F6EAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDDBDC41-7E6F-4C97-95BD-7DEB2D9FE837"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B52D447-8E56-4E04-9650-38D222DA8D2C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C455353-0401-4975-89BC-C23D32A684F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1D9D9E1-D8B7-4A56-BC2F-90BDC97322B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59DE856E-98FF-4B49-BD7F-3E326FEB89EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6ED34889-9F98-46BC-9176-557484272C05"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7FBC61D-6A08-4DE8-A5E5-A3FC57E7759D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E52AEEE6-2364-4CFB-9337-C5CCA54362E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD137160-B80D-4C65-A9A9-CEE12107E3DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E6C2AC8-C21A-4152-AAE6-915ACE65CB5C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:3.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1956C8F0-EB91-4322-85C1-6BE15AA13703"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A48DEBEB-0C2D-4F6A-AF63-04990D2FD5AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:3.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E004FA4-0180-458A-8E8C-8167EF684ED8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:3.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F0A1617-17D1-4C9F-A818-27321FD2FEAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:3.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D86CDC19-43C3-4ACC-94B4-388BCC8A2203"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:3.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9931A5B-CD0C-43A3-B32D-915FF4AF57D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:3.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDC69F98-A3B4-4573-AFE4-2069218B3454"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:horde:imp:3.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD4D0137-3515-4857-8E70-4600CD2D4278"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=489",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://lists.horde.org/archives/announce/2007/000315.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2007/dsa-1406",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/22985",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1017784",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1017785",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/0965",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32997",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |