René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

137 lines
4.9 KiB
JSON

{
"id": "CVE-2008-4559",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-02-08T21:30:00.250",
"lastModified": "2019-10-09T22:56:37.707",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via shell metacharacters in argument fields to the (1) webappmon.exe or (2) OpenView5.exe CGI program. NOTE: this issue may be partially covered by CVE-2009-0205."
},
{
"lang": "es",
"value": "HP OpenView Network Node Manager (OV NNM) v7.01, v7.51, y v7.53, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de caracteres de consola en los campos de argumentos a los programas CGI (1) webappmon.exe o (2) OpenView5.exe NOTA: esta cuesti\u00f3n se encuentra parcialmente tratado en el CVE-2009-0205."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*",
"matchCriteriaId": "A54C04BC-7EA3-412B-B509-414BBC942E92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*",
"matchCriteriaId": "8EFF07E8-239D-413D-90DB-E3153232D73C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*",
"matchCriteriaId": "D506AC90-5383-4221-BBC8-7AF34D62C929"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*",
"matchCriteriaId": "16BAE549-664A-47D1-8355-EA63B1BCFD4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*",
"matchCriteriaId": "6692E05F-4864-449F-8A52-9001028D8C44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*",
"matchCriteriaId": "2A40F2C6-AFF9-4D63-ACD0-A9D37160BA3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*",
"matchCriteriaId": "FC1DA299-A180-4078-9172-67D116840D29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*",
"matchCriteriaId": "FED610E9-7639-48FE-8B4F-B394A7EEC7C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*",
"matchCriteriaId": "C1935DA4-A1AF-4867-BCB1-F5BB75360702"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*",
"matchCriteriaId": "769ED1A5-C3C5-404E-8040-655D69C2AA88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*",
"matchCriteriaId": "186EFE05-AC1C-48FF-91B7-0CCD49FEABCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*",
"matchCriteriaId": "D5CE1F56-FA80-416D-8F42-C1C291F0965C"
}
]
}
]
}
],
"references": [
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=770",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}