René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

257 lines
7.5 KiB
JSON

{
"id": "CVE-2015-3153",
"sourceIdentifier": "secalert@redhat.com",
"published": "2015-05-01T15:59:05.817",
"lastModified": "2018-10-17T01:29:25.897",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents."
},
{
"lang": "es",
"value": "La configuraci\u00f3n por defecto para cURL y libcurl anterior a 7.42.1 env\u00eda cabeceras HTTP personalizadas tanto al servidor proxy como al de destinaci\u00f3n, lo que podr\u00eda permitir a servidores proxy remotos obtener informaci\u00f3n sensible mediante la lectura de los contenidos de cabeceras."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*",
"versionEndIncluding": "12.1.3",
"matchCriteriaId": "B60F073D-5C5A-4A63-9DE5-EAB6ED3A9E65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4725EA61-9BAB-4E72-9F92-ADE4624439CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D0879FB1-58E2-4EC4-8111-044642E046BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7CF2929-4CBC-4B56-87AE-F45F53BD8DD6"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.42.0",
"matchCriteriaId": "8EC285E6-08E4-47DA-BD56-AA613015F701"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.42.0",
"matchCriteriaId": "F79A4691-7C35-472A-B115-0EA3B355B021"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E0D7C3-E368-4F6C-AA67-8E066BB35654"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B0A12E-E122-4189-A05E-4FEA43C19876"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
]
}
]
}
],
"references": [
{
"url": "http://curl.haxx.se/docs/adv_20150429.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743",
"source": "secalert@redhat.com"
},
{
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2015/dsa-3240",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74408",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securitytracker.com/id/1032233",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-2591-1",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10131",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT205031",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}