René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

150 lines
5.2 KiB
JSON

{
"id": "CVE-2009-0517",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-02-11T00:30:03.017",
"lastModified": "2018-10-11T21:01:53.417",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Eval injection vulnerability in index.php in phpSlash 0.8.1.1 and earlier allows remote attackers to execute arbitrary PHP code via the fields parameter, which is supplied to an eval function call within the generic function in include/class/tz_env.class. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n Eval en phpSlash v0.8.1.1 y anteriores permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n, a trav\u00e9s del par\u00e1metro \"fields\", el cual en enviado a una llamada a la funci\u00f3n eval sin la funci\u00f3n gen\u00e9rica en include/class/tz_env.class. NOTA: Algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceras personas."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:*:*:*:*:*:*:*:*",
"matchCriteriaId": "385ABF67-157E-4592-80E7-8399C4D72879"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.8.1.1",
"matchCriteriaId": "9CA61227-D278-4502-92ED-24C3E900FEC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:0.5.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8FB8A1-BE41-4E62-88E9-AB15246AB0FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "68D5F330-5C61-4627-B925-272A357E1338"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9493398-C12A-439A-9836-0D62F6510D0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "506762E9-EAA6-4AFE-8F78-3FA6491C27F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31BDD3F6-789D-48AB-AD5C-137BB5D53BB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0292084B-B04A-4465-936B-51FFFE5328C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0B370B91-6B3C-4423-ABE5-840999099D0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "703FD7D9-5D17-4C57-882A-8EF33CDE44F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:0.61:*:*:*:*:*:*:*",
"matchCriteriaId": "BF4822EC-378F-44B5-90E3-5B3F82247C92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpslash:phpslash:065:*:*:*:*:*:*:*",
"matchCriteriaId": "1BCF8850-3160-45C9-AA16-C785AFDB246C"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/500664/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/33572",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48441",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/7948",
"source": "cve@mitre.org"
}
]
}