mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
288 lines
10 KiB
JSON
288 lines
10 KiB
JSON
{
|
|
"id": "CVE-2012-6637",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2014-03-03T04:50:46.203",
|
|
"lastModified": "2024-11-21T01:46:34.943",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier do not anchor the end of domain-name regular expressions, which allows remote attackers to bypass a whitelist protection mechanism via a domain name that contains an acceptable name as an initial substring."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Apache Cordova 3.3.0 y anteriores y Adobe PhoneGap 2.9.0 y anteriores no identifican las expresiones regulares del final de un nombre de dominio, lo que permite a atacantes remotos evadir un mecanismo de protecci\u00f3n de lista blanca a trav\u00e9s de un nombre de dominio que contiene un nombre aceptable como subcadena inicial."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 7.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cordova:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.3.0",
|
|
"matchCriteriaId": "66A5703F-E43E-4F18-AC7B-534761942DCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cordova:3.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74BBFE10-2CB5-446D-9D83-E5C39F6F47C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cordova:3.0.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "273742B5-559F-4BC5-994E-D559D4008108"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cordova:3.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6D2A0ACB-2E9C-4639-8C9B-4F0004C8DF9E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cordova:3.1.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8A468C2-55F1-4C6C-A547-D7E5B68EABC2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cordova:3.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C93B210-E664-447B-8859-0432CE8D4F00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cordova:3.2.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8F8721A-3968-438A-967D-B8B911F73CB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apache:cordova:3.3.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE1A4A77-DC7F-4C97-A7FC-5BF7E73D5DB6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.9.0",
|
|
"matchCriteriaId": "AE71EC19-A23D-45B1-984B-DDD27A3DF2F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3B05BE6-D8DA-40C8-BA86-67B1FD906975"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.0.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C57DD500-22A7-4209-AEF7-DC8930F1BDD9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16EC33AF-5D22-418D-8604-EB549A197209"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C8124E0-6A2F-493E-875E-1D0E613A366B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.2.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D6D5BDFF-A635-45D6-A346-754BFACD00A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.2.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A0B3637-4927-47AD-87A0-EE411C12EE06"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6451A3E-BEB0-4EE0-AD88-8CE3E048CB10"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.3.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBEEDD73-74C5-4299-8509-324A829623D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.3.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0BC85762-A07D-4C44-8458-08FC2F717462"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C19E85E-6E96-4F24-8A10-393B9DB1770F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.4.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA489695-A354-4921-903F-65AD650BCB61"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B534832-D498-4881-AC3D-342FE50FC405"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.5.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C20AC3F-8A9D-4450-AB38-2FC4A19605F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7121F63A-3A8E-458F-87F2-DFA5A16802AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.6.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC93C958-7FBC-427E-89E4-C84B97471EFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F81B0017-2BF3-4315-BFF5-B7CD5DF98A60"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.7.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7535E5BD-A4F0-45B9-BA79-8FE2783A58D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFDC0304-7948-41DF-A330-1773E3B6336B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "695CDE63-FDA3-4EDC-8D1E-D8921CCD3B54"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:phonegap:2.9.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F500CA59-28E5-4EC0-B698-2A26DD4BCC46"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://labs.mwrinfosecurity.com/blog/2012/04/30/building-android-javajavascript-bridges/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://openwall.com/lists/oss-security/2014/02/07/9",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/bugtraq/2014/Jan/96",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.internetsociety.org/ndss2014/programme#session3",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://labs.mwrinfosecurity.com/blog/2012/04/30/building-android-javajavascript-bridges/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://openwall.com/lists/oss-security/2014/02/07/9",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/bugtraq/2014/Jan/96",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.internetsociety.org/ndss2014/programme#session3",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |