2024-11-22 11:14:00 +00:00

341 lines
12 KiB
JSON

{
"id": "CVE-2009-2444",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-07-13T14:30:00.407",
"lastModified": "2024-11-21T01:04:53.143",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in maillinglist/setup/step1.php.inc in ADbNewsSender before 1.5.6, and 2.0 before RC2, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the path_to_lang parameter to setup/index.php."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en maillinglist/setup/step1.php.inc en ADbNewsSender antes de la versi\u00f3n v1.5.6, y en la v2.0 antes de RC2, permite a atacantes remotos incluir y ejecutar archivos locales a trav\u00e9s de un .. (punto punto) en el par\u00e1metro path_to_lang para setup/index.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5.5",
"matchCriteriaId": "5B412BB4-3E28-4678-9C3F-D2CB22D5E038"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F792DDE-D025-4F5B-AB1A-620A59900857"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A53D1A3-6A37-417B-8CF4-F5897635E774"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "815153B5-F97A-4C56-8C20-4F6E7C0D638A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0F051AB9-C299-4E9B-B4C2-EF77A0AE18E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C15AFACD-D8AD-415E-B050-7DAFC99506F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF5136-210C-446B-9E32-6299B10CB69B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2D524626-B977-4356-A93F-88B435CFCA90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "328B133E-7482-4946-BAB1-5D89C60041B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "91A71223-CD88-446F-AF93-0626B39BE3EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "80953021-E692-449B-A961-A369E8BB4A3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "683CA1FD-A4E4-41E4-97A1-01A77B520991"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1831F536-F07D-49E8-A863-FDAD8E383104"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BD13616B-33A3-4E43-BB91-19E192FA67F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6A250D35-B8DF-4999-997C-EC69AD725E36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4A87D52-68B5-488E-BA5E-FDF61C798195"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D8DDB844-AC56-443A-9099-DA0D54F070E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8E8417-9BFE-4CB2-A218-458CD718F41B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "01092A5C-0F07-488B-9F02-ACCA96618BD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF12021-D316-4A18-B3E1-ED6AB9736EB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1758BFA0-47BA-49DB-8477-2996D6D03A72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DD0EEF2A-61CC-472C-BE91-7199318DA51B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C5CAD3C9-3D51-4DAA-930E-B9ECCDBAB6C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "04F1B990-05DE-43FD-8923-CD2E675DE9F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0ECEF6BB-AF11-4427-B740-DC66AEA94DB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B3BA36-997A-4CAF-9103-966881BDFC87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6AD1EB-77AD-4F2F-A604-C290274C9AB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "04E5BC91-05F3-4E97-B47B-C0D4E620F22B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4AC95ACF-C82C-445F-AFB5-BE778EC3C3BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:2.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "244798D3-8486-43F7-9F90-CAB406564AF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:2.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "95A2C245-99A0-4DF2-B725-EB9F0E528E6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:2.0:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "228BE08C-4B63-4DE2-AFD3-C0B251F9C463"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:2.0:alpha4:*:*:*:*:*:*",
"matchCriteriaId": "C4997E07-2357-4AD5-9CB6-E98D5D690A2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE0C0685-2380-441D-B1DB-0432B6E2ABE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "FB1FC7EA-E883-426F-AE5E-288BBFBEAEE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adbnewssender:adbnewssender:2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3341B4AC-0A61-4437-8E8D-8D908C1CAE7C"
}
]
}
]
}
],
"references": [
{
"url": "http://r00tsecurity.org/forums/index.php?showtopic=9460",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/35845",
"source": "cve@mitre.org"
},
{
"url": "http://sourceforge.net/apps/mantisbt/adbnewssender/view.php?id=22",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://sourceforge.net/project/shownotes.php?release_id=694644",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/35596",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/1808",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51720",
"source": "cve@mitre.org"
},
{
"url": "http://r00tsecurity.org/forums/index.php?showtopic=9460",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/35845",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://sourceforge.net/apps/mantisbt/adbnewssender/view.php?id=22",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://sourceforge.net/project/shownotes.php?release_id=694644",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/35596",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/1808",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51720",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}