2024-12-08 03:06:42 +00:00

121 lines
4.4 KiB
JSON

{
"id": "CVE-2015-3141",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-05-20T19:59:02.450",
"lastModified": "2024-11-21T02:28:45.543",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Synametrics Technologies Xeams 4.5 Build 5755 and earlier allow remote attackers to hijack the authentication of administrators for requests that create an (1) SMTP domain or a (2) user via a request to /FrontController; or conduct cross-site scripting (XSS) attacks via the (3) domainname parameter to /FrontController, when creating a new SMTP domain configuration; the (4) txtRecipient parameter to /FrontController, when creating a new forwarder; the (5) popFetchServer, (6) popFetchUser, or (7) popFetchRecipient parameter to /FrontController, when creating a new POP3 Fetcher account; or the (8) Smtp HELO domain in the Advanced Server Configuration."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de CSRF en Synametrics Technologies Xeams 4.5 Build 5755 y versiones ateriores permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores para peticiones que crean un (1) dominio SMTP o un (2) usuario a trav\u00e9s de una petici\u00f3n a /FrontController o llevar a cabo ataques de secuencias de comandos en sitios cruzados (XSS) a trav\u00e9s de (3) el par\u00e1metro domainname en /FrontController, cuando se crea una nueva configuraci\u00f3n de dominio SMTP; (4) el par\u00e1metro txtRecipient en /FrontController, cuando se crea un nuevo forwarder; el par\u00e1metro (5) popFetchServer, (6) popFetchUser o (7) popFetchRecipient en /FrontController, cuando se crea una nueva cuenta POP3 Fetcher o (8) el dominio Smtp HELO en el Advanced Server Configuration."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synametrics:xeams:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.5",
"matchCriteriaId": "C4197410-2B43-4FBF-95B3-C73610D47DD9"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/show/osvdb/121847",
"source": "cve@mitre.org"
},
{
"url": "http://packetstormsecurity.com/files/131844/Xeams-4.5-Build-5755-CSRF-Cross-Site-Scripting.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/74578",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/36949/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://osvdb.org/show/osvdb/121847",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://packetstormsecurity.com/files/131844/Xeams-4.5-Build-5755-CSRF-Cross-Site-Scripting.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/74578",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.exploit-db.com/exploits/36949/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}