René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

149 lines
5.1 KiB
JSON

{
"id": "CVE-2015-6940",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-09-22T15:59:00.107",
"lastModified": "2018-10-09T19:57:58.860",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The GetResource servlet in Pentaho Business Analytics (BA) Suite 4.5.x, 4.8.x, and 5.0.x through 5.2.x and Pentaho Data Integration (PDI) Suite 4.3.x, 4.4.x, and 5.0.x through 5.2.x does not restrict access to files in the pentaho-solutions/system folder, which allows remote attackers to obtain passwords and other sensitive information via a file name in the resource parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad en el servlet GetResource en Pentaho Business Analytics (BA) Suite 4.5.x, 4.8.x y 5.0.x hasta la versi\u00f3n 5.2.x y Pentaho Data Integration (PDI) Suite 4.3.x, 4.4.x, y 5.0.x hasta la versi\u00f3n 5.2.x, no restringe el acceso a los archivos en la carpeta pentaho-solutions/system, lo que permite a atacantes remotos obtener contrase\u00f1as y otra informaci\u00f3n sensible a trav\u00e9s de un nombre de archivo en el par\u00e1metro resource."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentaho:data_integration:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B2C1FC8-0787-4357-8B0A-125D2BF3418B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentaho:data_integration:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66215B-13D7-4B34-A33B-EDFB77E5D128"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentaho:data_integration:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBBE7301-81A0-41AB-9EFB-28791E6544AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentaho:data_integration:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7246E3BC-3EB7-4AE6-B108-CB1B0786F275"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentaho:data_integration:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "66ADD153-3A7D-4D71-963F-EAA3FE0D4A4E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentaho:business_analytics:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9C6E6F-CE9C-4FDA-9405-E03B21EBA153"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentaho:business_analytics:4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BF618DEB-8AF9-4DB5-B03B-E69219EE020E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentaho:business_analytics:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C0E25BD3-540F-4722-B019-F2709D398536"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentaho:business_analytics:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A6A70A-DDA1-41AF-8E24-2AE698813B69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentaho:business_analytics:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B3A812-E5E7-42E1-A107-2AEE2232A0FD"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/133601/Pentaho-5.2.x-BA-Suite-PDI-Information-Disclosure.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/536477/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "https://support.pentaho.com/entries/78884125-Security-Vulnerability-Announcement-Feb-2015",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}