mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
114 lines
4.2 KiB
JSON
114 lines
4.2 KiB
JSON
{
|
|
"id": "CVE-2007-4808",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-09-11T18:17:00.000",
|
|
"lastModified": "2017-09-29T01:29:23.580",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple SQL injection vulnerabilities in TLM CMS 3.2 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to news.php in a lirenews action, (2) the idnews parameter to goodies.php in a lire action, (3) the id parameter to file.php in a voir action, (4) the ID parameter to affichage.php, (5) the id_sal parameter to mod_forum/afficher.php, or (6) the id_sujet parameter to mod_forum/messages.php. NOTE: it was later reported that goodies.php and affichage.php scripts are reachable through index.php, and 1.1 is also affected. NOTE: it was later reported that the goodies.php vector also affects 3.1."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en TLM CMS versi\u00f3n 3.2, permiten a atacantes remotos ejecutar comandos SQL arbitrarios por medio de (1) el par\u00e1metro id en el archivo news.php en una acci\u00f3n lirenews, (2) el par\u00e1metro idnews en el archivo goodies.php en una acci\u00f3n lire, (3) el par\u00e1metro id en el archivo file.php en una acci\u00f3n voir, (4) el par\u00e1metro ID en el archivo affichage.php, (5) el par\u00e1metro id_sal en el archivo mod_forum/afficher.php, o (6) el par\u00e1metro id_sujet en el archivo mod_forum/messages.php . NOTA: m\u00e1s tarde se report\u00f3 que los scripts goodies.php y affichage.php son accesibles por medio del archivo index.php, y la versi\u00f3n 1.1 tambi\u00e9n est\u00e1 afectada. NOTA: m\u00e1s tarde se report\u00f3 que el vector goodies.php tambi\u00e9n afecta la versi\u00f3n 3.1."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tlm_cms:tlm_cms:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "83FF3F9F-4E5A-47EB-80B5-C8A59A57D93C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tlm_cms:tlm_cms:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "384EF97C-6D55-475F-BB57-2625B8C2BCBB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/25602",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/29049",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/3137",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.z0rlu.ownspace.org/index.php?/archives/74-Powered-by-TLM-CMS-index.php-sql-inj..html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36536",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42204",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.exploit-db.com/exploits/4376",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |