2024-12-08 03:06:42 +00:00

129 lines
5.5 KiB
JSON

{
"id": "CVE-2015-2142",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-10-06T22:29:00.383",
"lastModified": "2024-11-21T02:26:51.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Issuetracker phpBugTracker before 1.7.0 allow remote authenticated users to (1) hijack the authentication of users for requests that cause an unspecified impact via the id parameter to project.php, (2) hijack the authentication of users for requests that cause an unspecified impact via the group_id parameter to group.php, (3) hijack the authentication of users for requests that delete statuses via the status_id parameter to status.php, (4) hijack the authentication of users for requests that delete severities via the severity_id parameter to severity.php, (5) hijack the authentication of users for requests that cause an unspecified impact via the priority_id parameter to priority.php, (6) hijack the authentication of users for requests that delete the operating system via the os_id parameter to os.php, (7) hijack the authentication of users for requests that delete databases via the database_id parameter to database.php, or (8) hijack the authentication of users for requests that delete sites via the site_id parameter to sites.php."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de Cross-Site Request Forgery (CSRF) en Issuetracker phpBugTracker en versiones anteriores a la 1.7.0 permiten que usuarios autenticados remotos (1) secuestren la autenticaci\u00f3n de usuarios para peticiones que causan un impacto sin especificar mediante el par\u00e1metro id a project.php, (2) secuestren la autenticaci\u00f3n de usuarios para peticiones que causan un impacto sin especificar mediante el par\u00e1metro group_id a group.php, (3) secuestren la autenticaci\u00f3n de usuarios para peticiones que eliminan estados mediante el par\u00e1metro status_id a status.php, (4) secuestren la autenticaci\u00f3n de usuarios para peticiones que eliminan gravedades mediante el par\u00e1metro severity_id a severity.php, (5) secuestren la autenticaci\u00f3n de usuarios para peticiones que causan un impacto sin especificar mediante el par\u00e1metro priority_id a priority.php, (6) secuestren la autenticaci\u00f3n de usuarios para peticiones que eliminan el sistema operativo mediante el par\u00e1metro os_id a os.php, (7) secuestren la autenticaci\u00f3n de usuarios para peticiones que eliminan bases de datos mediante el par\u00e1metro database_id a database.php o (8) secuestren la autenticaci\u00f3n de usuarios para peticiones que eliminan sitios mediante el par\u00e1metro site_id a sites.php."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"baseScore": 6.0,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpbugtracker_project:phpbugtracker:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.6.0",
"matchCriteriaId": "657F4CDF-E015-47FD-9BE0-1E677DDB3D05"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2015/02/28/1",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/a-v-k/phpBugTracker/issues/4",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/02/28/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/a-v-k/phpBugTracker/issues/4",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}