mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
95 lines
2.8 KiB
JSON
95 lines
2.8 KiB
JSON
{
|
|
"id": "CVE-2007-5431",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-10-12T23:17:00.000",
|
|
"lastModified": "2018-10-15T21:44:46.670",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "include/imageupload.js in the MyFTPUploader module in Stride 1.0 contains sensitive information including FTP login credentials, which might allow remote attackers to gain unauthorized access to the FTP server being used by the module by viewing the source code."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "el include/imageupload.js en el m\u00f3dulo MyFTPUploader del Stride 1.0 contiene informaci\u00f3n sensible incluyendo las credenciales de la autenticaci\u00f3n por FTP, lo que permite a atacantes remotos obtener acceso no autorizado al servidor FTP siendo utilizado por el m\u00f3dulo viendo el c\u00f3digo fuente."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:javaatwork:myftpuploader_module:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E571DABF-D38D-4DF2-8C0A-E9AFADC70AFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:scottmanktelow:stride:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B48EF2ED-045D-4BB9-B31D-C57C50CB9277"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/3216",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securityvulns.ru/Sdocument4.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |