René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

134 lines
4.5 KiB
JSON

{
"id": "CVE-2022-39265",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-10-06T18:16:12.163",
"lastModified": "2023-03-01T18:08:06.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "MyBB is a free and open source forum software. The _Mail Settings_ ? Additional Parameters for PHP's mail() function mail_parameters setting value, in connection with the configured mail program's options and behavior, may allow access to sensitive information and Remote Code Execution (RCE). The vulnerable module requires Admin CP access with the `_Can manage settings?_` permission and may depend on configured file permissions. MyBB 1.8.31 resolves this issue with the commit `0cd318136a`. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "MyBB es un software de foros gratuito y de c\u00f3digo abierto. El valor de la configuraci\u00f3n de _Mail_ ? Additional Parameters for PHP's mail() function mail_parameters setting value, en relaci\u00f3n con las opciones y el comportamiento del programa de correo configurado, puede permitir el acceso a informaci\u00f3n sensible y la ejecuci\u00f3n remota de c\u00f3digo (RCE). El m\u00f3dulo vulnerable requiere acceso al CP de administrador con el permiso `_Can manage settings?_` y puede depender de los permisos de los archivos configurados. MyBB 1.8.31 resuelve este problema con el commit `0cd318136a`. Se recomienda a los usuarios que actualicen. No hay soluciones conocidas para esta vulnerabilidad"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.31",
"matchCriteriaId": "7C214187-7786-44BE-AD2F-5DF1B4C481EA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mybb/mybb/blob/mybb_1830/install/resources/settings.xml#L2331-L2338",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/mybb/mybb/commit/0cd318136a10b029bb5c8a8f6dddf39d87519797",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/mybb/mybb/security/advisories/GHSA-hxhm-rq9f-7xj7",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://mybb.com/versions/1.8.31/",
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}