2024-12-08 03:06:42 +00:00

114 lines
3.3 KiB
JSON

{
"id": "CVE-2008-5653",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-12-17T18:30:01.267",
"lastModified": "2024-11-21T00:54:33.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the loginADP function in ajaxp.php in MyioSoft AjaxPortal 3.0 allows remote attackers to execute arbitrary SQL commands via the rsargs parameter, as reachable through the username parameter. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n loginADP de ajaxp.php de MyioSoft AjaxPortal v3.0, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro rsargs, como se puede alcanzar a trav\u00e9s del par\u00e1metro \"username\" (nombre de usuario). NOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:myiosoft.com:ajaxportal:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A495D32-547A-4B0E-BEB6-D2FF4350CF42"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/49700",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/32673",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/32199",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/7044",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/49700",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/32673",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/32199",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.exploit-db.com/exploits/7044",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}