René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

104 lines
3.5 KiB
JSON

{
"id": "CVE-2007-4038",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-07-27T22:30:00.000",
"lastModified": "2018-10-15T21:33:05.587",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Argument injection vulnerability in Mozilla Firefox before 2.0.0.5, when running on systems with Thunderbird 1.5 installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a mailto URI, which are inserted into the command line that is created when invoking Thunderbird.exe, a similar issue to CVE-2007-3670."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n de argumentos en Mozilla Firefox versiones anteriores a 2.0.0.5, cuando se ejecuta en sistemas con Thunderbird versi\u00f3n 1.5 instalado y ciertas URI registradas, permite a atacantes remotos conducir ataques de tipo cross-browser scripting y ejecutar comandos arbitrarios por medio de metacaracteres shell en una URI mailto, que se insertan en la l\u00ednea de comandos que es creada al invocar el archivo Thunderbird.exe, un problema similar a CVE-2007-3670."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "Not vulnerable. This issue does not affect the versions of Firefox or Thunderbird as shipped with Red Hat Enterprise Linux.",
"lastModified": "2007-07-31T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0.0.4",
"matchCriteriaId": "C99BB6C8-1877-4B70-B6EF-952E200ABABE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4FB87608-0DF8-4729-95C5-CFA386AB3AC2"
}
]
}
]
}
],
"references": [
{
"url": "http://larholm.com/2007/07/25/mozilla-protocol-abuse/",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2007/Jul/0557.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/474624/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/474686/100/0/threaded",
"source": "cve@mitre.org"
}
]
}