René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

122 lines
3.6 KiB
JSON

{
"id": "CVE-2019-16885",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-12-03T20:15:11.077",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In OkayCMS through 2.3.4, an unauthenticated attacker can achieve remote code execution by injecting a malicious PHP object via a crafted cookie. This could happen at two places: first in view/ProductsView.php using the cookie price_filter, and second in api/Comparison.php via the cookie comparison."
},
{
"lang": "es",
"value": "En OkayCMS versiones hasta 2.3.4, un atacante no autenticado puede lograr una ejecuci\u00f3n de c\u00f3digo remota al inyectar un objeto PHP malicioso por medio de una cookie creada. Esto podr\u00eda suceder en dos lugares: primero en el archivo view/ProductsView.php usando la cookie price_filter, y segundo en el archivo api/Comparison.php por medio de la cookie comparison."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:okay-cms:okaycms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3.4",
"matchCriteriaId": "501DE749-B649-4313-B504-9C64DCDE4382"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/155583/OkayCMS-2.3.4-Remote-Code-Execution.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2019/Dec/15",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.ait.ac.at/ait-sa-20191129-01-unauthenticated-remote-code-execution-okaycms",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}