2023-11-07 21:03:21 +00:00

105 lines
3.7 KiB
JSON

{
"id": "CVE-2006-5957",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-11-17T01:07:00.000",
"lastModified": "2023-11-07T01:59:42.813",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in INFINICART allow remote attackers to execute arbitrary SQL commands via the (1) groupid parameter in (a) browse_group.asp, (2) productid parameter in (b) added_to_cart.asp, and (3) catid and (4) subid parameter in (c) browsesubcat.asp. NOTE: the vendor has disputed this report, saying \"The vulnerabilities mentioned were never present in our official released products but only in the unofficial demo version. However we do appreciate the information. We have update our demo version and made sure all those vulnerabilities are fixed."
},
{
"lang": "es",
"value": "** IMPUGNADA ** M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en INFINICART permiten a un atacante remoto ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro (1) groupid en (a) browse_group.asp, (2) productid parameter en (b) added_to_cart.asp, y (3) catid y (4)el par\u00e1metro subid in (c) browsesubcat.asp. NOTA: el fabricante ha impugnado este informe, diciendo que \"las vulnerabilidades mencionadas nunca han estado presentes en nuestros productos lanzados oficialmente, solamente en las versiones de demostraci\u00f3n no oficiales. No obstante, agradecemos la informaci\u00f3n. Hemos actualizado nuestra versi\u00f3n de demostraci\u00f3n y nos hemos asegurado que todas esas vulnerabilidades han sido corregidas\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infinicart:infinicart:*:*:*:*:*:*:*:*",
"matchCriteriaId": "054DDD74-BD07-4E44-B6C7-01F0707EDFE4"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/22865",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/1881",
"source": "cve@mitre.org"
},
{
"url": "http://www.attrition.org/pipermail/vim/2006-December/001162.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/451322/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/21043",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/4501",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}