2024-11-22 23:14:22 +00:00

149 lines
4.5 KiB
JSON

{
"id": "CVE-2015-0518",
"sourceIdentifier": "security_alert@emc.com",
"published": "2015-02-14T15:59:01.407",
"lastModified": "2024-11-21T02:23:14.303",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Properties service in the D2FS web-service component in EMC Documentum D2 3.1 through SP1, 4.0 and 4.1 before 4.1 P22, and 4.2 before P11 allows remote authenticated users to obtain superuser privileges via an unspecified method call that modifies group permissions."
},
{
"lang": "es",
"value": "El servicio Properties en el componente del servicio web D2FS en EMC Documentum D2 3.1 hasta SP1, 4.0 y 4.1 anterior a 4.1 P22, y 4.2 anterior a P11 permite a usuarios remotos autenticados obtener privilegios de superusuario a trav\u00e9s de una llamada a un m\u00e9todo no especificado que modifica los permisos de grupos."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:documentum_d2:3.1:-:*:*:*:*:*:*",
"matchCriteriaId": "9FE3ABC6-7F44-436A-B78A-C7FC6310C1FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:documentum_d2:3.1:sp1:*:*:*:*:*:*",
"matchCriteriaId": "BEECDCAB-54A9-4A99-B77E-6DAD0513AA3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:documentum_d2:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A265F6B-0975-4CA2-832D-AF0FA38B0077"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:documentum_d2:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F39C8470-59DA-4759-A8B4-2DEE6DCAAE1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:documentum_d2:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC69558D-8121-4CA9-BABB-9ACF77808706"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2015-02/0031.html",
"source": "security_alert@emc.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/72502",
"source": "security_alert@emc.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1031693",
"source": "security_alert@emc.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100875",
"source": "security_alert@emc.com"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2015-02/0031.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/72502",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1031693",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100875",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}