mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
175 lines
5.7 KiB
JSON
175 lines
5.7 KiB
JSON
{
|
|
"id": "CVE-2009-3568",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-10-06T20:30:00.250",
|
|
"lastModified": "2009-10-08T04:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Comment RSS 5.x before 5.x-2.2 and 6.x before 6.x-2.2, a module for Drupal, does not properly enforce permissions when a link is added to the RSS feed, which allows remote attackers to obtain the node title and possibly other sensitive content by reading the feed."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El modulo de Drupal, Comment RSS v5.x anteriores a v5.x-2.2 y v6.x anteriores a v6.x-2.2, no hace cumplir correctamente los permisos cuando un enlace se a\u00f1ade a un feed RSS, lo que permite a atacantes remotos obtener el titulo del nodo y posiblemente mas informaci\u00f3n sensible mediante la lectura del feed."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dave_reid:commentrss:5.x-2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0891335F-6BBE-4517-947A-2D329A4582FF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dave_reid:commentrss:6.x-2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC9BF285-7CB3-4B6D-B422-74A1746BEC8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:5.x-1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "725FC7B8-6EA5-4F25-88A3-790B1758467D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:5.x-1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20322FF6-A0D4-4D09-A7B1-06E3456EB91C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:5.x-1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B37843CC-5550-4807-BFD6-8125788718D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:5.x-1.x:dev:*:*:*:*:*:*",
|
|
"matchCriteriaId": "19F8DFEF-46C8-4197-A1F4-722A8B6B5029"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:5.x-2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2D753EC-88C3-43D6-8E17-DAAEA378445C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:5.x-2.x:dev:*:*:*:*:*:*",
|
|
"matchCriteriaId": "94E8ACC7-9719-442F-810A-B76205C4F2DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:6.x-1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CEA997EE-B25C-4C24-B257-ECB13899C323"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:6.x-1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E707A50-E544-466C-9D09-A16E47450D29"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:6.x-1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36C84085-3549-441C-A714-729C8369B232"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:6.x-2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A672F19-3D97-4372-B038-D8418C1C54FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gabor_hojtsy:commentrss:6.x-2.x:dev:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B9DB9CF-4F49-4C36-A16C-983866ADA337"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://drupal.org/node/579280",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/579290",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/579292",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/36429",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |