René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

158 lines
4.9 KiB
JSON

{
"id": "CVE-2010-2465",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-06-25T21:30:01.547",
"lastModified": "2010-07-13T05:52:58.483",
"vulnStatus": "Modified",
"evaluatorSolution": "Per: http://www.kb.cert.org/vuls/id/MAPG-83TQL8\r\n\r\n'Vendor Statement\r\nS2 Security has made available patches or upgrades available to address this vulnerability in all versions of our product (2.5, 3.3, and 4.0). These are available through Linear Customer Support or S2 Customer Support'",
"descriptions": [
{
"lang": "en",
"value": "The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests."
},
{
"lang": "es",
"value": "S2 Security NetBox, probablemente v2.x v3.x, comoel usado en Linear eMerge 50 y 5000 y Sonitrol eAccess, almacena informaci\u00f3n sensible bajo la ra\u00edz web con insuficiente control de acceso, lo que permite a atacantes remotos descargar logs de nodo, fotograf\u00edas de personas, y archivos backup a trav\u00e9s de peticiones no especificadas. \r\n"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:s2sys:netbox:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3922C3C5-2C55-4A0E-B75D-E60C97D40AAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:s2sys:netbox:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "65399B51-DBB1-42E0-978D-D6E1C99A5EC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:s2sys:netbox:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "31F57E74-E9AE-4ED2-B19E-AA0C561B9E4F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linearcorp:emerge_50:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0530B7-711F-4187-829F-A266ADDE8C84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linearcorp:emerge_5000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA501469-8783-40D7-A52B-E47319A0F593"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:sonitrol:eaccess:*:*:*:*:*:*:*:*",
"matchCriteriaId": "864551FE-2A80-4DFE-BF54-2D6A6470F390"
}
]
}
]
}
],
"references": [
{
"url": "http://blip.tv/file/3414004",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.darkreading.com/blog/archives/2010/04/attacking_door.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/251133",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/MAPG-83TQL8",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/41134",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityinfowatch.com/Executives+Columns+%2526+Features/1316527?pageNum=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}