mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
343 lines
13 KiB
JSON
343 lines
13 KiB
JSON
{
|
|
"id": "CVE-2012-0811",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2014-10-01T14:55:10.120",
|
|
"lastModified": "2024-11-21T01:35:46.227",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Postfix Admin (tambi\u00e9n conocido como postfixadmin) anterior a 2.3.5 permiten a usuarios remotos autenticados ejecutar comandos SQL a trav\u00e9s de (1) el par\u00e1metro pw en la funci\u00f3n pacrypt, cuando mysql_encrypt est\u00e1 configurado, o (2) vectores no especificados que se utilizan en los ficheros de las copias de seguridad generados por backup.php."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"baseScore": 6.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.3.4",
|
|
"matchCriteriaId": "23A80121-F089-4DE1-8086-7454D66E8FEA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB5D16A3-59DA-407B-82E4-65C39EBD3710"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A7A4BE9-7CBE-404F-B577-933AC26E6E81"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8872C496-2430-4EA6-B417-51C6877B874A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66B95D87-5B0B-48F6-8379-2521CFDE7CA9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A09799F5-6084-4F06-B851-4FEA7873BF35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9230082E-FE88-4001-A614-43E8DD76471B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "258010A6-6B75-4663-AD5C-E7AD48B38DEE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "602E668A-1343-457B-B0E1-CAB3CCA05BD1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "83C3C7F7-016F-458B-B40D-E06080552045"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE51A934-BFD2-4E61-9827-A934995BDCAB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDF57DB8-3D17-4868-9FDF-81A0645FBC5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7D7ECFA4-01CF-4C44-949D-7781767B724A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A568A8FC-7BB0-431B-8BFE-1BF28DD545B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2273956-8CEB-439E-8841-953580AE673D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E074865-92E2-4AFC-8542-00273FDFACEC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1274628A-B6F8-48DA-A7B0-7629362A0383"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "123ED520-D9A9-457E-B0FF-2164678F2FDA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F03CC36-4E01-4298-8BF2-208EC2126E2D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA763611-3C94-40EB-AC16-F6860FCBFDAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E8725859-159E-49A5-91F2-12A6B300AE76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6D3B5347-F7FD-4291-8535-9D71F9F49568"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2750F62-79D5-41ED-8624-4DC36A23A03D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1D09CC9-07C8-42C7-B7B2-25251C8615A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F28A5B6A-466B-4B24-9BD4-9DE15642A724"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8E7B624-C991-4EA1-A977-6C06F57B4E2F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E899C1C0-18D1-43DE-BC55-C3C14F5395D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "903BF741-FD7E-41F7-802D-88A09B7EFFFF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F0A444A-E6FE-4585-BA6C-6061A87C6144"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "161082B7-A757-496C-9D35-681851CEA10B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B02E2034-BB39-4B86-81CA-3BB93A4E4849"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "29CF0FA6-F4F6-4A4B-89A6-057F835FFE89"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0055B0EA-775F-4670-A3F9-C1676DBB97D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "363704AE-66A9-4B58-A57E-47748F299471"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5226F933-9FB6-4BF6-AC3B-1A22D22F92F7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0066AE84-D27D-4E9B-851B-40EDFD07C0BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B739C7B-93CC-4367-B006-E8A721ECBCF2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BAE8A81E-3856-4908-B7B7-9CF511CA2A21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B935272-1EC7-4C70-8299-9DC7594809EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1647690F-D015-4DC4-9FB7-F5E9F0C430D9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/01/26/5",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/01/27/5",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/51680",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/01/26/5",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/01/27/5",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/51680",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |