mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
183 lines
6.5 KiB
JSON
183 lines
6.5 KiB
JSON
{
|
|
"id": "CVE-2008-5847",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-01-05T20:30:02.360",
|
|
"lastModified": "2024-11-21T00:55:01.590",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Constructr CMS 3.02.5 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information by reading the hash column."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Constructr CMS v3.02.5 y anteriores, almacena las contrase\u00f1as como texto sin cifrar en una base de datos MySQL, lo que permite a atacantes, dependiendo del contexto, obtener informaci\u00f3n sensible al leer la columna resumen."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
|
|
"baseScore": 2.6,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 4.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-255"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.02.5",
|
|
"matchCriteriaId": "C2C54FD3-F2B4-4CF8-898B-2842F835D85D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.00.0:alpha:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F0EC8A6-0487-4DFB-81AF-1EEA412FFCD1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.00.1:alpha:*:*:*:*:*:*",
|
|
"matchCriteriaId": "37056EFA-2603-4D92-8739-147D029036C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.00.2:alpha:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E04D2B0-4ACF-483A-8976-33972B2A4185"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.0:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "52CA7C4F-59C5-4B95-9824-C0268248CF4E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.1:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68B8B4AC-AF06-4BB7-B96D-F77E7161CE83"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.2:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A2B90E5-8634-4D57-A140-125A529A7FBA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.3:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "290D1E78-8940-4256-9003-1FC04708521A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.4:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE01A0E6-246E-48E5-9B17-CB7E2AE5636C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.5:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0A4BC9B-0B57-40C2-8A73-2DDE52395347"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.6:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB35F6DF-BCFB-4829-A8E2-0B0D8E7E71C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.7:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87AA8CC5-B419-4280-84C5-DED823A9A718"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.8:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9045683D-C074-4271-B482-C7412E61D512"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.9:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F2FCA30-B101-4FE9-ADBC-3A12D3C665F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ECE2BD73-09A9-49EA-8C49-5364C5843EB3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71855527-18D0-41C1-B14D-5E5DE554B2C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80BED065-8EBF-4272-B10D-D95A8B36162D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C6266966-8355-4565-A0C1-EA4E25EE37E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B41D022-CBC0-4F1E-8ADA-BDAB192F77FD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/4868",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.exploit-db.com/exploits/7529",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/4868",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://www.exploit-db.com/exploits/7529",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |