2024-12-08 03:06:42 +00:00

343 lines
13 KiB
JSON

{
"id": "CVE-2012-0811",
"sourceIdentifier": "secalert@redhat.com",
"published": "2014-10-01T14:55:10.120",
"lastModified": "2024-11-21T01:35:46.227",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Postfix Admin (tambi\u00e9n conocido como postfixadmin) anterior a 2.3.5 permiten a usuarios remotos autenticados ejecutar comandos SQL a trav\u00e9s de (1) el par\u00e1metro pw en la funci\u00f3n pacrypt, cuando mysql_encrypt est\u00e1 configurado, o (2) vectores no especificados que se utilizan en los ficheros de las copias de seguridad generados por backup.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3.4",
"matchCriteriaId": "23A80121-F089-4DE1-8086-7454D66E8FEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB5D16A3-59DA-407B-82E4-65C39EBD3710"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7A4BE9-7CBE-404F-B577-933AC26E6E81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8872C496-2430-4EA6-B417-51C6877B874A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "66B95D87-5B0B-48F6-8379-2521CFDE7CA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A09799F5-6084-4F06-B851-4FEA7873BF35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9230082E-FE88-4001-A614-43E8DD76471B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "258010A6-6B75-4663-AD5C-E7AD48B38DEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "602E668A-1343-457B-B0E1-CAB3CCA05BD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "83C3C7F7-016F-458B-B40D-E06080552045"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FE51A934-BFD2-4E61-9827-A934995BDCAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BDF57DB8-3D17-4868-9FDF-81A0645FBC5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "7D7ECFA4-01CF-4C44-949D-7781767B724A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "A568A8FC-7BB0-431B-8BFE-1BF28DD545B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B2273956-8CEB-439E-8841-953580AE673D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9E074865-92E2-4AFC-8542-00273FDFACEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1274628A-B6F8-48DA-A7B0-7629362A0383"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "123ED520-D9A9-457E-B0FF-2164678F2FDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7F03CC36-4E01-4298-8BF2-208EC2126E2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DA763611-3C94-40EB-AC16-F6860FCBFDAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E8725859-159E-49A5-91F2-12A6B300AE76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3B5347-F7FD-4291-8535-9D71F9F49568"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E2750F62-79D5-41ED-8624-4DC36A23A03D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D09CC9-07C8-42C7-B7B2-25251C8615A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F28A5B6A-466B-4B24-9BD4-9DE15642A724"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8E7B624-C991-4EA1-A977-6C06F57B4E2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E899C1C0-18D1-43DE-BC55-C3C14F5395D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "903BF741-FD7E-41F7-802D-88A09B7EFFFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0A444A-E6FE-4585-BA6C-6061A87C6144"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "161082B7-A757-496C-9D35-681851CEA10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B02E2034-BB39-4B86-81CA-3BB93A4E4849"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "29CF0FA6-F4F6-4A4B-89A6-057F835FFE89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0055B0EA-775F-4670-A3F9-C1676DBB97D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "363704AE-66A9-4B58-A57E-47748F299471"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5226F933-9FB6-4BF6-AC3B-1A22D22F92F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0066AE84-D27D-4E9B-851B-40EDFD07C0BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2B739C7B-93CC-4367-B006-E8A721ECBCF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE8A81E-3856-4908-B7B7-9CF511CA2A21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B935272-1EC7-4C70-8299-9DC7594809EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1647690F-D015-4DC4-9FB7-F5E9F0C430D9"
}
]
}
]
}
],
"references": [
{
"url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin",
"source": "secalert@redhat.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/01/26/5",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/01/27/5",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/51680",
"source": "secalert@redhat.com"
},
{
"url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT",
"source": "secalert@redhat.com"
},
{
"url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/01/26/5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/01/27/5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/51680",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}