2024-12-08 03:06:42 +00:00

160 lines
5.0 KiB
JSON

{
"id": "CVE-2011-5004",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-12-25T01:55:04.490",
"lastModified": "2024-11-21T01:33:24.633",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted file upload vulnerability in models/importcsv.php in the Fabrik (com_fabrik) component before 2.1.1 for Joomla! allows remote authenticated users with Manager privileges to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory."
},
{
"lang": "es",
"value": "Vulnerabilidad de subida no restringida de ficheros en models/importcsv.php en el componente Fabrik (com_fabrik) anterior a v2.1.1 para Joomla! permite a atacantes remotos con privilegios Manager ejecutar c\u00f3digo de su elecci\u00f3n al subir un fichero con una extensi\u00f3n ejecutable, accediendo posteriormente mediante una petici\u00f3n directa del fichero en un directorio no especificado."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"baseScore": 6.0,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabrikar:com_fabrikar:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1",
"matchCriteriaId": "34FFE454-F543-4C5E-A0C2-66C3AE55D11C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabrikar:com_fabrikar:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D99E7AAD-7334-42C2-856E-4BE0ABBED097"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabrikar:com_fabrikar:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBCDEBA-EC87-4671-B8DF-F2EB38FB1EFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabrikar:com_fabrikar:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D2AFD198-6B30-4991-8873-FBE32BBD4E34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabrikar:com_fabrikar:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "314C5956-E3AE-469E-AE2B-CDCCF8661870"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabrikar:com_fabrikar:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "557F950F-8D8E-4384-8233-A3E3193C065D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AC7400C-F6AF-4B5E-A34B-0222F94DCC46"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/47036",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.ohloh.net/p/3417/commits/145749116",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/77371",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/50823",
"source": "cve@mitre.org"
},
{
"url": "http://www.vulnerability-lab.com/get_content.php?id=342",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/47036",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.ohloh.net/p/3417/commits/145749116",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/77371",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/50823",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vulnerability-lab.com/get_content.php?id=342",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}