2024-12-08 03:06:42 +00:00

131 lines
4.0 KiB
JSON

{
"id": "CVE-2015-3640",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-07-21T14:29:00.570",
"lastModified": "2024-11-21T02:29:32.907",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "phpMyBackupPro 2.5 and earlier does not properly escape the \".\" character in request parameters, which allows remote authenticated users with knowledge of a web-accessible and web-writeable directory on the target system to inject and execute arbitrary PHP scripts by injecting scripts via the path, filename, and dirs parameters to scheduled.php, and making requests to injected scripts."
},
{
"lang": "es",
"value": "phpMyBackupPro versi\u00f3n 2.5 y anteriores, no escapan apropiadamente del car\u00e1cter \".\" en los par\u00e1metros de petici\u00f3n, que permite a los usuarios autenticados remotos con conocimiento de un directorio web accesible y escribible en el sistema de destino inyectar y ejecutar scripts PHP arbitrarios mediante la inyecci\u00f3n scripts por medio de los par\u00e1metros path, filename y dirs en el archivo schedule.php, y hacer peticiones en scripts inyectados."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"baseScore": 6.0,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpmybackuppro:phpmybackuppro:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.5",
"matchCriteriaId": "B9EF59DD-8BB0-461C-8D22-9BFFE222B02E"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2015/05/04/4",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032250",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/05/04/4",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032250",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}