René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

135 lines
4.1 KiB
JSON

{
"id": "CVE-2006-4900",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-22T22:07:00.000",
"lastModified": "2021-04-09T16:21:30.627",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, allows remote authenticated users to read and delete arbitrary files via \"..\" sequences in the eSCCAdHocHtmlFile parameter to eSMPAuditServlet, which is not properly handled by the getadhochtml function."
},
{
"lang": "es",
"value": "Vulnerabilidad de directorio transversal en Computer Associates (CA) eTrust Security Command Center 1.0 y r8 hasta SP1 CR2, permite a un usuario remoto validado leer y borrar archivos de sue elecci\u00f3n a trav\u00e9s de la secuancia \"..\" en el par\u00e1metro eSCCAdHocHtmlFile a eSMPAuditServlet, lo cual no es manejado adecuadamente a trav\u00e9s de la funci\u00f3n getadhochtml."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:*:*:*:*:*:*:*",
"matchCriteriaId": "BB8C8321-1BE6-476D-910E-6BBDBE683309"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr1:*:*:*:*:*",
"matchCriteriaId": "054689EB-D43E-4C0F-B504-FE615607332A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr2:*:*:*:*:*",
"matchCriteriaId": "40DC453F-12F6-4D51-ADFF-71D2628F3CD8"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1016910",
"source": "cve@mitre.org"
},
{
"url": "http://users.tpg.com.au/adsl2dvp/advisories/200608-computerassociates.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/446611/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/446716/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/20139",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/3738",
"source": "cve@mitre.org"
},
{
"url": "http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93243&date=2006/9",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34617",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29104",
"source": "cve@mitre.org"
}
]
}