mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
167 lines
5.3 KiB
JSON
167 lines
5.3 KiB
JSON
{
|
|
"id": "CVE-2014-2017",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2018-01-18T14:29:00.227",
|
|
"lastModified": "2018-02-06T17:28:57.800",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CRLF injection vulnerability in OXID eShop Professional Edition before 4.7.11 and 4.8.x before 4.8.4, Enterprise Edition before 5.0.11 and 5.1.x before 5.1.4, and Community Edition before 4.7.11 and 4.8.x before 4.8.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de inyecci\u00f3n CRLF en OXID eShop Professional Edition en versiones anteriores a la 4.7.11 y versiones 4.8.x anteriores a la 4.8.4, Enterprise Edition en versiones anteriores a la 5.0.11 y versiones 5.1.x anteriores a la 5.1.4, y Community Edition en versiones anteriores a la 4.7.11 y versiones 4.8.x anteriores a la 4.8.4 permite que atacantes remotos inyecten cabeceras HTTP arbitrarias y lleven a cabo ataques de separaci\u00f3n de respuesta HTTP mediante vectores sin especificar."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-93"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxidforge:eshop:*:*:*:*:professional:*:*:*",
|
|
"versionEndExcluding": "4.7.11",
|
|
"matchCriteriaId": "B9832B3A-E424-459B-A7B3-0BA9340B19F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxidforge:eshop:*:*:*:*:professional:*:*:*",
|
|
"versionStartIncluding": "4.8.0",
|
|
"versionEndExcluding": "4.8.4",
|
|
"matchCriteriaId": "492B4045-1EF9-46AB-BEDE-DF7CFF3142D4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxidforge:eshop:*:*:*:*:enterprise:*:*:*",
|
|
"versionEndExcluding": "5.0.11",
|
|
"matchCriteriaId": "9CCC0261-5936-4765-8312-1B98A1511434"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxidforge:eshop:*:*:*:*:enterprise:*:*:*",
|
|
"versionStartIncluding": "5.1.0",
|
|
"versionEndExcluding": "5.1.4",
|
|
"matchCriteriaId": "9D5B483E-C3B9-4F7A-951E-84E96B41C4E1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxidforge:eshop:*:*:*:*:community:*:*:*",
|
|
"versionEndExcluding": "4.7.11",
|
|
"matchCriteriaId": "EDE4017D-A067-4445-BFEE-57C7F7BBB751"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oxidforge:eshop:*:*:*:*:community:*:*:*",
|
|
"versionStartIncluding": "4.8.0",
|
|
"versionEndExcluding": "4.8.4",
|
|
"matchCriteriaId": "41A3F4A7-262F-48C8-874D-9AF25DDB939F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://bugs.oxid-esales.com/view.php?id=5635",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Issue Tracking",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://oxidforge.org/en/security-bulletin-2014-002.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |