René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

96 lines
3.2 KiB
JSON

{
"id": "CVE-2006-6392",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-12-08T01:28:00.000",
"lastModified": "2017-07-29T01:29:30.983",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in index.php in plx Web Studio (aka plxWebDev) plx Pay 3.2 and earlier allows remote attackers to include and execute arbitrary local files, or obtain user credentials and other sensitive information, via a .. (dot dot) in the read parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information."
},
{
"lang": "es",
"value": "Vulnerabilidad de escalado de directorio en index.php del plx Web Studio (tambi\u00e9n conocido como plxWebDev), plx Pay 3.2 y versiones anteriores permite a atacantes remotos la inclusi\u00f3n y ejecuci\u00f3n de ficheros locales de su elecci\u00f3n, o la obtenci\u00f3n de las credenciales del usuario, as\u00ed como de otra informaci\u00f3n sensible, mediante .. (punto punto)en el par\u00e1metro read. NOTA: la procedencia de esta informaci\u00f3n es desconocida; los detalles se obtienen a partir de la informaci\u00f3n de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:plx_web_studio:plx_pay:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.2",
"matchCriteriaId": "692E02C2-3A87-44F9-A8E6-01C948A0DD10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:plx_web_studio:plx_pay:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85BF9492-19D6-4ACE-8458-A5CBB1EEC0CF"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/21379",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/4809",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30619",
"source": "cve@mitre.org"
}
]
}