René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

135 lines
4.2 KiB
JSON

{
"id": "CVE-2008-5090",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-11-14T19:20:53.997",
"lastModified": "2018-10-11T20:54:04.553",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Electron Inc. Advanced Electron Forum before 1.0.7 allows remote attackers to execute arbitrary PHP code via PHP code embedded in bbcode in the email parameter, which is processed by the preg_replace function with the eval switch."
},
{
"lang": "es",
"value": "Electron Inc. Advanced Electron Forum versiones anteriores a v1.0.7 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de c\u00f3digo PHP embebido en BBcode en el par\u00e1metro \"email\", lo cual es procesado por la funci\u00f3n preg_replace con el switch \"eval\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anelectron:advanced_electron_forum:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.6",
"matchCriteriaId": "346A0065-57B5-44C8-9A0D-B681B653935A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anelectron:advanced_electron_forum:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "68188511-BA5A-454A-8959-A754AA7147BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anelectron:advanced_electron_forum:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "39DBB3C6-A59B-46E8-AE2E-B4F90B4327E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anelectron:advanced_electron_forum:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B729A246-6642-44BD-8842-B676E6F9D0D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anelectron:advanced_electron_forum:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "938E89B8-C921-44B5-B97F-D756CC5607C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anelectron:advanced_electron_forum:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D35C1FAF-9F98-42A0-B457-E5949AEA8864"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/4598",
"source": "cve@mitre.org"
},
{
"url": "http://www.anelectron.com/board/index.php?tid=3282",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.gulftech.org/?node=research&article_id=00131-09202008",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/496552/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/31268",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45270",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/6499",
"source": "cve@mitre.org"
}
]
}