2024-12-08 03:06:42 +00:00

150 lines
4.8 KiB
JSON

{
"id": "CVE-2013-7346",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-03-27T16:55:05.613",
"lastModified": "2024-11-21T02:00:48.047",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in Symphony CMS before 2.3.2 allows remote attackers to hijack the authentication of administrators for requests that conduct SQL injection attacks via the sort parameter to system/authors/, related to CVE-2013-2559."
},
{
"lang": "es",
"value": "Vulnerabilidad de CSRF en Symphony CMS anterior a 2.3.2 permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores para solicitudes que realizan ataques de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sort hacia system/authors/, relacionado con CVE-2013-2559."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getsymphony:symphony:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3.1",
"matchCriteriaId": "6C440112-0B21-4832-A89C-1A343B627039"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getsymphony:symphony:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "254956B4-E86A-429C-A8E6-0ABA833A9DB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getsymphony:symphony:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "13379528-0C53-474F-B2E7-D5650C7F5F3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getsymphony:symphony:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8865CA96-3DF6-4499-8CEC-59977CC86FEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getsymphony:symphony:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "570A8AE5-E4A6-4400-982C-F725D15E35ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getsymphony:symphony:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EB2D9ACA-2A2A-4169-A8AC-ED259921E24B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getsymphony:symphony:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "394B8CA2-4C11-4C2C-8BFE-C2BADA341502"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getsymphony:symphony:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D49697-497A-44EC-892B-DB8C5545AFE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getsymphony:symphony:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C922F66F-8E3D-404C-95B7-C57DA8DDC162"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getsymphony:symphony:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DF41854C-206A-4BCF-B6FD-55253E3BC0AF"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0018.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://www.htbridge.com/advisory/HTB23148",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0018.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://www.htbridge.com/advisory/HTB23148",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}