mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
104 lines
3.0 KiB
JSON
104 lines
3.0 KiB
JSON
{
|
|
"id": "CVE-2006-4954",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-09-23T10:07:00.000",
|
|
"lastModified": "2017-07-20T01:33:24.913",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The updateuser servlet in Neon WebMail for Java before 5.08 does not validate the in_id parameter, which allows remote attackers to modify information of arbitrary users, as demonstrated by modifying (1) passwords and (2) permissions, (3) viewing profile settings, and (4) creating and (5) deleting users."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El servlet updateuser en Neon WebMail para Java anterior a 5.08 no valida el par\u00e1metro in_id, lo que permite a un atacante remoto modificar informaci\u00f3n de usuarios de su elecci\u00f3n, como se demuestra con la modificaci\u00f3n de (1) contrase\u00f1as y (2) permisos, (3)ajustado el perfil de visionado, y (4) creando y (5)elminando usuarios."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:neosys:neon_webmail:5.06:*:java:*:*:*:*:*",
|
|
"matchCriteriaId": "11B4EF7A-0FBC-47B8-9655-987B9E176E1F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:neosys:neon_webmail:5.07:*:java:*:*:*:*:*",
|
|
"matchCriteriaId": "9841D3E7-74B1-48A6-A840-D429C75921CD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://vuln.sg/neonmail506-en.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/20109",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/84203",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29089",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |