René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

98 lines
3.3 KiB
JSON

{
"id": "CVE-2008-4529",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-10-09T18:14:15.280",
"lastModified": "2017-09-29T01:32:12.603",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple PHP remote file inclusion vulnerabilities in asiCMS alpha 0.208 allow remote attackers to execute arbitrary PHP code via a URL in the _ENV[asicms][path] parameter to (1) Association.php, (2) BigMath.php, (3) DiffieHellman.php, (4) DumbStore.php, (5) Extension.php, (6) FileStore.php, (7) HMAC.php, (8) MemcachedStore.php, (9) Message.php, (10) Nonce.php, (11) SQLStore.php, (12) SReg.php, (13) TrustRoot.php, and (14) URINorm.php in classes/Auth/OpenID/; and (15) XRDS.php, (16) XRI.php and (17) XRIRes.php in classes/Auth/Yadis/."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de fichero PHP en asiCMS alpha 0.208 que permite a los atacante remotos ejecutar arbitrariamente c\u00f3digo PHP a trav\u00e9s de URL en el par\u00e1metro the _ENV[asicms][path] para (1) Association.php, (2) BigMath.php, (3) DiffieHellman.php, (4) DumbStore.php, (5) Extension.php, (6) FileStore.php, (7) HMAC.php, (8) MemcachedStore.php, (9) Message.php, (10) Nonce.php, (11) SQLStore.php, (12) SReg.php, (13) TrustRoot.php, y (14) URINorm.php en classes/Auth/OpenID/; y (15) XRDS.php, (16) XRI.php y (17) XRIRes.php en classes/Auth/Yadis/."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asicms:asicms:0.208:alpha:*:*:*:*:*:*",
"matchCriteriaId": "EB2570CA-6A15-48A0-A5EC-A06AE3FEFD56"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/4391",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/31601",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2755",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45684",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/6685",
"source": "cve@mitre.org"
}
]
}