mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
189 lines
6.4 KiB
JSON
189 lines
6.4 KiB
JSON
{
|
|
"id": "CVE-2008-5920",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-01-21T02:30:00.297",
|
|
"lastModified": "2017-09-29T01:32:52.760",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorSolution": "Patch information - http://websvn.tigris.org/",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The create_anchors function in utils.inc in WebSVN 1.x allows remote attackers to execute arbitrary PHP code via a crafted username that is processed by the preg_replace function with the eval switch."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La funci\u00f3n create_anchors en utils.inc en WebSVN v1.x permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de nombres de usuario manipulados que es procesado por la funci\u00f3n preg_replace con el switch \"eval\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-94"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5184AC02-1F9D-4986-A08A-837A9CCA79D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE26E8A6-A516-4D1D-894D-E23AABA51A7F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BFDC8A10-08EB-4444-8771-4493E491DD21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.03:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93B1AFDE-3DF3-4F9D-B6C9-54AD7F1F056C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.04:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F420EE5-22E2-42B7-A906-EA9FEC4053DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31688948-CC90-46AA-AB3A-B66B88E465FE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDBFBAEE-7B71-4D40-ACA1-BCFC889C0D04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.31a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E889518B-485B-4CD3-996B-7198DFBAD805"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.32:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "648D1220-2387-497E-BBAE-82D43903754A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.33:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0AAF04A7-4D3C-4A56-99BA-3075D59DA136"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.34:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3FF1A838-B8B8-4395-9317-8A6A2552C2D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.37:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E28A169D-4C20-42A5-9947-D996710D5705"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.38:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A8BE03BE-1122-4A78-9E7C-9ADA01DCD8C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.39:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AEFAEA8-7A6E-430A-87DD-C6C9C55D5ABF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.40:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07CF6D7C-8F68-47F3-BD5B-0720B33EB89D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.51:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0BC5AAC1-6110-4282-824C-6A660BEC5517"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.60:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C26622F-C77F-42AB-AA6A-F13B3A12DB7D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.61:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D0152F8-71BA-4C7D-A8A1-72340B6924C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tigris:websvn:1.62:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58024D23-C2D7-42E9-B0A2-7F774939241A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/4928",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.gulftech.org/?node=research&article_id=00132-10202008",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/31891",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48168",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.exploit-db.com/exploits/6822",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |