2024-11-22 03:16:05 +00:00

209 lines
6.4 KiB
JSON

{
"id": "CVE-2006-5840",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-11-10T02:07:00.000",
"lastModified": "2024-11-21T00:20:46.303",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in Abarcar Realty Portal allow remote attackers to execute arbitrary SQL commands via the (1) neid parameter to newsdetails.php, or the (2) slid parameter to slistl.php. NOTE: the cat vector is already covered by CVE-2006-2853. NOTE: the vendor has notified CVE that the current version only creates static pages, and that slistl.php/slid never existed in any version"
},
{
"lang": "es",
"value": "** IMPUGNADA ** M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en \r\nAbarcar Realty Portal permiten a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante (1) el par\u00e1metro neid en newsdetails.php, o (2) el par\u00e1metro slid en slistl.php.\r\nNOTA: el vector cat ya est\u00e1 tratado en CVE-2006-2853. NOTA: el fabricante ha notificado a CVE que la versi\u00f3n actual s\u00f3lo crea p\u00e1ginas est\u00e1ticas, y que slisl.php/slid nunca existi\u00f3 en ninguna versi\u00f3n."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abarcar:abarcar_realty_portal:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DE14B3E1-74AA-4E49-A010-B988564A113B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abarcar:abarcar_realty_portal:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F11DEC59-C6B9-443D-B907-8ED9B03D3D41"
}
]
}
]
}
],
"references": [
{
"url": "http://attrition.org/pipermail/vim/2006-December/001190.html",
"source": "cve@mitre.org"
},
{
"url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=7",
"source": "cve@mitre.org",
"tags": [
"URL Repurposed"
]
},
{
"url": "http://secunia.com/advisories/22792",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/1840",
"source": "cve@mitre.org"
},
{
"url": "http://www.attrition.org/pipermail/vim/2006-December/001170.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/30249",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/30250",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/450946/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/20970",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/4418",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30135",
"source": "cve@mitre.org"
},
{
"url": "http://attrition.org/pipermail/vim/2006-December/001190.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=7",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"URL Repurposed"
]
},
{
"url": "http://secunia.com/advisories/22792",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/1840",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.attrition.org/pipermail/vim/2006-December/001170.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/30249",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/30250",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/450946/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/20970",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/4418",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30135",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"vendorComments": [
{
"organization": "abarcar Software",
"comment": "The version 5.1.5 of the abarcar Realty Portal has been discontinued 2003.\nThe version 6.xx has been discontinued beginning 2006.\nA fix for above versions has been available since that time.\n\nAs of version 7.0 static pages are created\n- a parameter for cat.php is no longer used\n- the routine for news has been dropped and a different routine creating static pages is used\n- slistl.php never existed in the Realty Portal",
"lastModified": "2006-12-20T00:00:00"
}
]
}