2024-12-08 03:06:42 +00:00

109 lines
3.0 KiB
JSON

{
"id": "CVE-2014-8607",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-06-10T18:59:04.753",
"lastModified": "2024-11-21T02:19:26.123",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! provides the MySQL username and password on the command line, which allows local users to obtain sensitive information via the ps command."
},
{
"lang": "es",
"value": "El plugin XCloner 3.1.1 para WordPress y 3.5.1 para Joomla! proporciona el nombre de usuario y la contrase\u00f1a de MySQL en la l\u00ednea de comando, lo que permite a usuarios locales obtener informaci\u00f3n sensible a trav\u00e9s de el comando ps."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 2.1,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xcloner:xcloner:3.1.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "94299BFC-3053-4D5C-8D02-96DB0C6A0875"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xcloner:xcloner:3.5.1:*:*:*:*:joomla\\!:*:*",
"matchCriteriaId": "ED77BB25-1C5C-4786-97C8-576215194DCF"
}
]
}
]
}
],
"references": [
{
"url": "http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vapid.dhs.org/advisory.php?v=110",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vapid.dhs.org/advisory.php?v=110",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}