2024-12-08 03:06:42 +00:00

222 lines
7.5 KiB
JSON

{
"id": "CVE-2006-4256",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-08-21T20:04:00.000",
"lastModified": "2024-11-21T00:15:30.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "index.php in Horde Application Framework before 3.1.2 allows remote attackers to include web pages from other sites, which could be useful for phishing attacks, via a URL in the url parameter, aka \"cross-site referencing.\" NOTE: some sources have referred to this issue as XSS, but it is different than classic XSS."
},
{
"lang": "es",
"value": "index.php en Horde Application Framework anerior a 3.1.2 permite a atacantes remotos incluir p\u00e1ginas web de otros sitios, lo que podr\u00eda ser \u00fatil para ataques de phishing, mediante una URL en el par\u00e1metro url, tambi\u00e9n conocido como \"referencia en sitios cruzados\" (cross-site referencing). NOTA: algunas fuetnes se han referido a este problema como XSS, pero es diferente del cl\u00e1sico XSS."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC8BBFC-263E-4735-847D-5544D18922E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8DB1F389-5D64-4B8C-B207-7D23F0C12DBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BE8892DF-11F2-4991-97E8-D561DEAC4F5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3B46B6F5-055E-44EB-BB78-503811C0E57C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "66B197B0-F3B7-40D6-9872-C1A94622C242"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0.4_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAEAAF02-1B61-421A-887C-107B7234262B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0.4_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "01557585-CE92-49FB-B9BB-AAAE7D355BE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2698E2D7-09BF-4490-B362-4245CD3087D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B40A46-117D-4D85-8CC8-27236A3280C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FEFBECFF-D1A4-465D-B59F-E70246DE4BE7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "57ABD1BD-6676-4B54-9F3E-FACF1346794F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "79EC6167-5D16-4236-8EBC-412EE1784802"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:application_framework:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4F6A2A-05B6-42EA-8F61-D0AB610A6757"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.horde.org/archives/announce/2006/000292.html",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/21500",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/27565",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/1422",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016713",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2007/dsa-1406",
"source": "cve@mitre.org"
},
{
"url": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2456",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/443360/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/3309",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28411",
"source": "cve@mitre.org"
},
{
"url": "http://lists.horde.org/archives/announce/2006/000292.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/21500",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/27565",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securityreason.com/securityalert/1422",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securitytracker.com/id?1016713",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.debian.org/security/2007/dsa-1406",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2456",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/443360/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2006/3309",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28411",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}