René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

287 lines
11 KiB
JSON

{
"id": "CVE-2006-4140",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-08-14T23:04:00.000",
"lastModified": "2018-10-17T21:33:38.347",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in IPCheck Server Monitor before 5.3.3.639/640 allows remote attackers to read arbitrary files via modified .. (dot dot) sequences in the URL, including (1) \"..%2f\" (encoded \"/\" slash), \"..../\" (multiple dot), and \"..%255c../\" (double-encoded \"\\\" backslash)."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorios en IPCheck Server Monitor anterior 5.3.3.639/640 permite a un atacante remoto leer archivos de su elecci\u00f3n a trav\u00e9s de la secuencia modificada .. (punto punto) en la URL, incluyendo (1) \"..%2f\" (codificaci\u00f3n \"/\" barra), \"..../\" (multiples puntos), y \"..%255c../\" (doble-codificaci\u00f3n \"\\\" barra invertida)."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:4.3.1.368:*:*:*:*:*:*:*",
"matchCriteriaId": "D893AA0C-7C8A-4932-B6E9-96CE9C932AC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:4.3.1.382:*:*:*:*:*:*:*",
"matchCriteriaId": "50A39A25-9AAC-4408-AB31-0B09903FD641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:4.4.1.521:*:*:*:*:*:*:*",
"matchCriteriaId": "D4234547-7D3E-4893-8FEE-9AFE619ED4FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:4.4.1.522:*:*:*:*:*:*:*",
"matchCriteriaId": "E2AFE26C-54D9-498E-BB50-2778A852EBB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.0.1.272:*:*:*:*:*:*:*",
"matchCriteriaId": "0BF9E20B-664A-49C4-9404-CD52E816650F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.0.1.299:*:*:*:*:*:*:*",
"matchCriteriaId": "A6A738C8-BC16-44C2-A086-9C0AD3B4B388"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.0.1.309:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE5CE47-EA55-4879-A1A2-CE57821961A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.0.1.321:*:*:*:*:*:*:*",
"matchCriteriaId": "910BA740-01C5-40C9-BE6C-9389BD9B9C9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.1.0.341:*:*:*:*:*:*:*",
"matchCriteriaId": "AB962CF1-44D1-4D2E-9EA4-3835BE0E3B03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.1.0.342:*:*:*:*:*:*:*",
"matchCriteriaId": "CE6B279D-9367-4DFB-B60C-C577215EBC8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.1.0.345:*:*:*:*:*:*:*",
"matchCriteriaId": "A7648BA8-8F02-4DF1-A763-96EF599895BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.0.404:*:*:*:*:*:*:*",
"matchCriteriaId": "FDF7387A-4A43-4CF1-8717-8710772EBACA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.0.405:*:*:*:*:*:*:*",
"matchCriteriaId": "C057AED9-565E-4B16-849B-B9FD9C0FF341"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.0.418:*:*:*:*:*:*:*",
"matchCriteriaId": "56B364DE-C33B-431E-AB26-069DDF132B66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.0.420:*:*:*:*:*:*:*",
"matchCriteriaId": "40D2BAE0-C1EA-4836-9E70-93C30D8E6242"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.2.449:*:*:*:*:*:*:*",
"matchCriteriaId": "9997D3EA-9CA4-439B-8386-3E6A24A05D5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.2.451:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D11DE7-F2FE-4FBE-B8B0-4B1471AF787E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.0.506:*:*:*:*:*:*:*",
"matchCriteriaId": "2FFE35FA-8861-4F1A-82CC-4CEBC6BF45FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.0.507:*:*:*:*:*:*:*",
"matchCriteriaId": "C0A25FEC-DDB7-493A-8FD4-DDD2565FB848"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.0.508:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF38CB0-5253-4D32-89E1-8F3E515983AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.0.509:*:*:*:*:*:*:*",
"matchCriteriaId": "E39296C3-ED79-40DC-8D82-FDBE8D80E545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.574:*:*:*:*:*:*:*",
"matchCriteriaId": "7075DFAE-75ED-4CBC-99FC-862075394ADC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.575:*:*:*:*:*:*:*",
"matchCriteriaId": "3EDD8498-245E-4E18-984F-06CA179D6301"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.578:*:*:*:*:*:*:*",
"matchCriteriaId": "7C33747D-6584-4D51-A906-71F545BE78A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.579:*:*:*:*:*:*:*",
"matchCriteriaId": "085438B9-B318-46A9-A9C0-43ECDB4F043C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.580:*:*:*:*:*:*:*",
"matchCriteriaId": "E07FDAA9-24A0-4805-B67B-15FD25C10296"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.581:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FD5462-4996-4349-9ACE-BC2A8AB17E70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.586:*:*:*:*:*:*:*",
"matchCriteriaId": "EA60EC11-B955-4ED6-8FBA-C9082EFC8BF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.587:*:*:*:*:*:*:*",
"matchCriteriaId": "FC7D9496-8AA4-495E-AB2F-8242D34FBFA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.605:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4955AE-4666-4497-9C04-5ACF2D45DAC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.606:*:*:*:*:*:*:*",
"matchCriteriaId": "607B59F7-B643-4C16-9EA9-007AFEE95340"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.609:*:*:*:*:*:*:*",
"matchCriteriaId": "96A17536-2CAC-4F73-8649-D72FFFF4B142"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.610:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF94D78-4D7B-4983-8514-65676D61BC17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.616:*:*:*:*:*:*:*",
"matchCriteriaId": "840DBDE7-DDEC-4CC0-BA60-A3EE1B76A483"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.617:*:*:*:*:*:*:*",
"matchCriteriaId": "AD414917-1AFB-4DC2-B2A4-9635DF774B81"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/1389",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016676",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.paessler.com/forum/viewtopic.php?p=4047&sid=f8c0f03a69d9498338797c6ea3cc6733",
"source": "cve@mitre.org"
},
{
"url": "http://www.paessler.com/ipcheck/history",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/442822/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/444227/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/19473",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3259",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28341",
"source": "cve@mitre.org"
}
]
}