mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
254 lines
8.8 KiB
JSON
254 lines
8.8 KiB
JSON
{
|
|
"id": "CVE-2015-3297",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2017-07-07T16:29:00.173",
|
|
"lastModified": "2017-07-14T13:16:06.657",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Directory traversal vulnerability in node/utils/Minify.js in Etherpad 1.1.1 through 1.5.2 allows remote attackers to read arbitrary files by leveraging replacement of backslashes with slashes in the path parameter of HTTP API requests."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad de salto de directorio en node/utils/Minify.js en Etherpad desde la versi\u00f3n 1.1.1 hasta la 1.5.2 permite que atacantes remotos lean archivos arbitrarios aprovechando el reemplazo de barras diagonales inversas por barras diagonales en el par\u00e1metro path de peticiones API HTTP."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E21B176-6B0C-4EC9-AC85-814CCD7B02AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A021FEF-DBC8-455A-945A-96CE411091C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5CBB9277-A9C7-4979-8CD6-5DAF20B21022"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4B5085F7-7BF6-4C34-9D2D-2738A49B21D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "643BCCDE-77EF-4551-8CAD-390C4AB0289E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "41A2C651-7345-4354-B112-21DBCD176BF9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86DC65D6-8950-4EF2-880E-2916AAB2B544"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "810D72F9-71E7-47A8-9496-7EF0F7F96BAF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B4F28C6F-31ED-4A86-A8CB-A7F3FE80463D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "554B75F7-6CF0-47AD-AB49-1519DC5E5FC1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47725F83-A7FB-47AC-9868-EEC0D9BE7F85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "856989B3-F1CA-4CE3-8B0D-BF1D040FF407"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "00362C25-0438-4928-866C-7BE99C569987"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "272184D3-C079-4D69-9C99-B9C22576DD15"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3ECA2014-464B-4140-9B22-9704DB16274B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FA27831F-08D4-488A-922F-D0FA210A9882"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C5829CF-4DBB-44CD-B989-F5D3A4EC6D9E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5629C43A-9910-45EA-A43F-C7CA22FC4434"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.81:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9865B41A-F7BA-4281-AE08-5E9D821C5310"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.2.91:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CD2B7A2-34F9-48EB-90E5-93C8D2167D75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2C42AC6-B0C9-4468-BD0D-589916E29AAB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08B94664-ED9A-4459-B84E-9D552A6C4EEF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDD7903B-96A0-4022-ADD8-306155E4595B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB82785A-1099-4730-9782-803F0577EFDE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB1BC2A6-1B10-457A-AC41-F500CABF8C41"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:etherpad:etherpad:1.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04955F09-99FB-4B0B-BA82-84EF7B5EB859"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2015/04/11/1",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Mailing List",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2015/04/12/1",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Mailing List",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/74056",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/ether/etherpad-lite/commit/9d4e5f6",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |