2024-11-22 07:15:30 +00:00

124 lines
4.4 KiB
JSON

{
"id": "CVE-2007-5456",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-10-14T18:17:00.000",
"lastModified": "2024-11-21T00:37:56.210",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Internet Explorer 7 and earlier allows remote attackers to bypass the \"File Download - Security Warning\" dialog box and download arbitrary .exe files by placing a '?' (question mark) followed by a non-.exe filename after the .exe filename, as demonstrated by (1) .txt, (2) .cda, (3) .log, (4) .dif, (5) .sol, (6) .htt, (7) .itpc, (8) .itms, (9) .dvr-ms, (10) .dib, (11) .asf, (12) .tif, and unspecified other extensions, a different issue than CVE-2004-1331. NOTE: this issue might not cross privilege boundaries, although it does bypass an intended protection mechanism."
},
{
"lang": "es",
"value": "Microsoft Internet Explorer versi\u00f3n 7 y anteriores, permite a atacantes remotos omitir el cuadro de di\u00e1logo \"File Download - Security Warning\" y descargar archivos .exe arbitrarios colocando un '?' (signo de interrogaci\u00f3n) seguido por un nombre de archivo que no sea .exe despu\u00e9s del nombre de archivo .exe, como es demostrado por las extensiones (1) .txt, (2) .cda, (3) .log, (4) .dif, (5) .sol , (6) .htt, (7) .itpc, (8) .itms, (9) .dvr-ms, (10) .dib, (11) .asf, (12) .tif y otras no especificadas, un problema diferente de CVE-2004-1331. NOTA: este problema podr\u00eda no cruzar los l\u00edmites de privilegio, aunque omite un mecanismo de protecci\u00f3n previsto."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7",
"matchCriteriaId": "867E819D-6E9D-42DA-8ABA-67180FC1CE74"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/3222",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/482220/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/482248/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/482297/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/482314/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/26062",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3222",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/482220/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/482248/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/482297/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/482314/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/26062",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}