René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.3 KiB
JSON

{
"id": "CVE-2006-6047",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-11-22T00:07:00.000",
"lastModified": "2018-10-17T21:46:22.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in manager/index.php in Etomite 0.6.1.2 allows remote authenticated administrators to include and execute arbitrary local files via a .. (dot dot) in the f parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en manager/index.php en Etomite 0.6.1.2 permite a administradores remotos autenticados incluir y ejecutar ficheros locales mediante una secuencia .. en el par\u00e1metro f, como ha sido demostrado inyectando secuencias PHP en un fichero de log de Apache HTTP Server, el cual es entonces incluido por index.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:etomite:etomite:0.6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E547A925-A065-4453-B550-1FF960B70129"
}
]
}
]
}
],
"references": [
{
"url": "http://www.0xcafebabe.it/sploits/etm_0612_remote_com.pl",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.etomite.org/forums/index.php?showtopic=6388",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/451838/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/451930/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/21135",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/4558",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30329",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/2790",
"source": "cve@mitre.org"
}
]
}