mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
186 lines
6.1 KiB
JSON
186 lines
6.1 KiB
JSON
{
|
|
"id": "CVE-2008-2575",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-06-06T22:32:00.000",
|
|
"lastModified": "2017-08-08T01:31:10.060",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "cbrPager before 0.9.17 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a (1) ZIP (aka .cbz) or (2) RAR (aka .cbr) archive filename."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "cbrPager anteriores a 0.9.17, permite a atacantes remotos asistidos por el usuario ejecutar comandos de su elecci\u00f3n a trav\u00e9s de metacaracteres de consola en un archivo con nombre de fichero (1) ZIP (aka .cbz) o (2) RAR (aka .cbr)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-94"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "988CD5E7-7728-42CA-9821-506AEAE0BE80"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "544A1A1F-2529-49DE-99EA-2CCE97109ADF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7D1C90B-B7F5-47EF-848C-AB5F1D76B038"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "77FDD5EA-C524-4531-B01F-63617DCDE6F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F70AB2F5-EB7A-4076-B190-0D3E9BB10053"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "56970745-240E-4E53-9DA5-AD64D9A80093"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "23FB0399-4F79-4178-820D-63C3A453E19D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A6B48E5-1CEA-4832-82B9-9E2B99E6FF99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B5F6CAE-7780-4153-B9B4-C82D703AFAFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08541172-8DB7-448A-97D5-D56A668E6B07"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "626DBC72-73C3-42DB-8781-45EA5FA6601C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3430545F-B67B-4092-B78C-0D9C612290C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "75A4EC14-BDAF-4468-BF5A-CCA9BEDFB537"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8D70D1C1-37DD-47C8-8D93-99144411B26C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jcoppens:cbrpager:0.9.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F59C126-9D02-4547-BD9B-DE2904D5A9B7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://security.gentoo.org/glsa/glsa-200806-05.xml",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/forum/forum.php?forum_id=827120",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=601538&group_id=119647",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.jcoppens.com/soft/cbrpager/log.en.php",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/1693/references",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=448285",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42741",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |