2024-12-08 03:06:42 +00:00

120 lines
3.4 KiB
JSON

{
"id": "CVE-2009-0458",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-02-10T07:00:24.017",
"lastModified": "2024-11-21T00:59:57.047",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in admin/login_submit.php in Whole Hog Ware Support 1.x allow remote attackers to execute arbitrary SQL commands via (1) the uid parameter (aka Username field) or (2) the pwd parameter (aka Password field). NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades SQL en admin/login_submit.php de Whole Hog Ware Support v1.x, permite a atacantes remotos la ejecuci\u00f3n de comandos SQL de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros (1)\"uid\" (tambi\u00e9n conocido como campo nombre de usuario) o(2)\"pwd\" (tambi\u00e9n conocido como campo password). NOTA: Algunos detalles han sido obtenidos a partir de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wholehogsoftware:ware_support:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BC1693-6008-46BA-A13B-E5FAECA7C94D"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/51733",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/33777",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33564",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://www.exploit-db.com/exploits/7940",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/51733",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/33777",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33564",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://www.exploit-db.com/exploits/7940",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}